data
dict
{ "proceeding": { "id": "17D45VtKis4", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONnn", "doi": "10.1109/ICDM.2018.00084", "title": "Collapsed Variational Inference for Nonparametric Bayesian Group Factor Analysis", "normalizedTitle": "Collapsed Variational Inference for Nonparametric Bayesian Group Factor Analysis", "abstract": "Group factor analysis (GFA) methods have been widely used to infer the common structure and the group-specific signals from multiple related datasets in various fields including systems biology and neuroimaging. To date, most available GFA models require Gibbs sampling or slice sampling to perform inference, which prevents the practical application of GFA to large-scale data. In this paper we present an efficient collapsed variational inference (CVI) algorithm for the nonparametric Bayesian group factor analysis (NGFA) model built upon an hierarchical beta Bernoulli process. Our CVI algorithm proceeds by marginalizing out the group-specific beta process parameters, and then approximating the true posterior in the collapsed space using mean field methods. Experimental results on both synthetic and real-world data demonstrate the effectiveness of our CVI algorithm for the NGFA compared with state-of-the-art GFA methods.", "abstracts": [ { "abstractType": "Regular", "content": "Group factor analysis (GFA) methods have been widely used to infer the common structure and the group-specific signals from multiple related datasets in various fields including systems biology and neuroimaging. To date, most available GFA models require Gibbs sampling or slice sampling to perform inference, which prevents the practical application of GFA to large-scale data. In this paper we present an efficient collapsed variational inference (CVI) algorithm for the nonparametric Bayesian group factor analysis (NGFA) model built upon an hierarchical beta Bernoulli process. Our CVI algorithm proceeds by marginalizing out the group-specific beta process parameters, and then approximating the true posterior in the collapsed space using mean field methods. Experimental results on both synthetic and real-world data demonstrate the effectiveness of our CVI algorithm for the NGFA compared with state-of-the-art GFA methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Group factor analysis (GFA) methods have been widely used to infer the common structure and the group-specific signals from multiple related datasets in various fields including systems biology and neuroimaging. To date, most available GFA models require Gibbs sampling or slice sampling to perform inference, which prevents the practical application of GFA to large-scale data. In this paper we present an efficient collapsed variational inference (CVI) algorithm for the nonparametric Bayesian group factor analysis (NGFA) model built upon an hierarchical beta Bernoulli process. Our CVI algorithm proceeds by marginalizing out the group-specific beta process parameters, and then approximating the true posterior in the collapsed space using mean field methods. Experimental results on both synthetic and real-world data demonstrate the effectiveness of our CVI algorithm for the NGFA compared with state-of-the-art GFA methods.", "fno": "08594893", "keywords": [ "Hidden Markov Models", "Inference Algorithms", "Bayes Methods", "Computational Modeling", "Approximation Algorithms", "Analytical Models", "Data Models", "Group Factor Analysis", "Hierarchical Beta Bernoulli Processes", "Collapsed Variational Inference" ], "authors": [ { "affiliation": null, "fullName": "Sikun Yang", "givenName": "Sikun", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heinz Koeppl", "givenName": "Heinz", "surname": "Koeppl", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "687-696", "year": "2018", "issn": null, "isbn": "978-1-5386-9159-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08594892", "articleId": "17D45WrVg0N", "__typename": "AdjacentArticleType" }, "next": { "fno": "08594894", "articleId": "17D45WrVgdk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pdp/2018/4975/0/497501a666", "title": "Implementation of Bayesian Inference In Distributed Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a666/12OmNBh8gUF", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2014/7981/0/7981a527", "title": "A Bayesian Nonparametric Topic Model for User Interest Modeling", "doi": null, "abstractUrl": "/proceedings-article/cse/2014/7981a527/12OmNyO8tMr", "parentPublication": { "id": "proceedings/cse/2014/7981/0", "title": "2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837836", "title": "Triply Stochastic Variational Inference for Non-linear Beta Process Factor Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837836/12OmNzZWbxd", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/02/06809161", "title": "A Bayesian Nonparametric Approach to Image Super-Resolution", "doi": null, "abstractUrl": "/journal/tp/2015/02/06809161/13rRUIJuxwv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/11/07374715", "title": "Bayesian Non-Parametric Clustering of Ranking Data", "doi": null, "abstractUrl": "/journal/tp/2016/11/07374715/13rRUyfKIJc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/05/ttp2013051121", "title": "Learning Topic Models by Belief Propagation", "doi": null, "abstractUrl": "/journal/tp/2013/05/ttp2013051121/13rRUygT7gz", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/08/08588399", "title": "Advances in Variational Inference", "doi": null, "abstractUrl": "/journal/tp/2019/08/08588399/17D45W2Wyy3", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09018114", "title": "Copula Guided Parallel Gibbs Sampling for Nonparametric and Coherent Topic Discovery", "doi": null, "abstractUrl": "/journal/tk/2022/01/09018114/1hN4iBNAecg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378319", "title": "Consensus Variational and Monte Carlo Algorithms for Bayesian Nonparametric Clustering", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378319/1s646o6qJ0Y", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09616417", "title": "Unsupervised Grouped Axial Data Modeling via Hierarchical Bayesian Nonparametric Models With Watson Distributions", "doi": null, "abstractUrl": "/journal/tp/2022/12/09616417/1yA75wj4MPm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LIRyvy3czK", "title": "2018 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "acronym": "mlui", "groupId": "1849158", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1LIRzgCUp7a", "doi": "10.1109/MLUI52768.2018.10075559", "title": "Speculative Execution for Guided Visual Analytics", "normalizedTitle": "Speculative Execution for Guided Visual Analytics", "abstract": "We propose the concept of Speculative Execution for Visual Analytics and discuss its effectiveness for model exploration and optimization. Speculative Execution enables the automatic generation of alternative, competing model configurations that do not alter the current model state unless explicitly confirmed by the user. These alternatives are computed based on either user interactions or model quality measures and can be explored using delta-visualizations. By automatically proposing modeling alternatives, systems employing Speculative Execution can shorten the gap between users and models, reduce the confirmation bias and speed up optimization processes. In this paper, we have assembled five application scenarios showcasing the potential of Speculative Execution, as well as a potential for further research.", "abstracts": [ { "abstractType": "Regular", "content": "We propose the concept of Speculative Execution for Visual Analytics and discuss its effectiveness for model exploration and optimization. Speculative Execution enables the automatic generation of alternative, competing model configurations that do not alter the current model state unless explicitly confirmed by the user. These alternatives are computed based on either user interactions or model quality measures and can be explored using delta-visualizations. By automatically proposing modeling alternatives, systems employing Speculative Execution can shorten the gap between users and models, reduce the confirmation bias and speed up optimization processes. In this paper, we have assembled five application scenarios showcasing the potential of Speculative Execution, as well as a potential for further research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose the concept of Speculative Execution for Visual Analytics and discuss its effectiveness for model exploration and optimization. Speculative Execution enables the automatic generation of alternative, competing model configurations that do not alter the current model state unless explicitly confirmed by the user. These alternatives are computed based on either user interactions or model quality measures and can be explored using delta-visualizations. By automatically proposing modeling alternatives, systems employing Speculative Execution can shorten the gap between users and models, reduce the confirmation bias and speed up optimization processes. In this paper, we have assembled five application scenarios showcasing the potential of Speculative Execution, as well as a potential for further research.", "fno": "10075559", "keywords": [ "Data Analysis", "Data Visualisation", "Optimisation", "Automatic Alternative Generation", "Current Model State", "Delta Visualizations", "Guided Visual Analytics", "Model Configurations", "Model Exploration", "Model Quality Measures", "Modeling Alternatives", "Optimization", "Speculative Execution", "User Interactions", "Human Computer Interaction", "Analytical Models", "Computational Modeling", "Visual Analytics", "Current Measurement", "Conferences", "Machine Learning", "Human Centered Computing", "Visual Analytics", "Speculative Execution", "Spec Ex" ], "authors": [ { "affiliation": "University of Konstanz", "fullName": "Fabian Sperrle", "givenName": "Fabian", "surname": "Sperrle", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Darmstadt", "fullName": "Jürgen Bernard", "givenName": "Jürgen", "surname": "Bernard", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stuttgart", "fullName": "Michael Sedlmair", "givenName": "Michael", "surname": "Sedlmair", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz", "fullName": "Daniel Keim", "givenName": "Daniel", "surname": "Keim", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz, University of Ontario Institute of Technology", "fullName": "Mennatallah El-Assady", "givenName": "Mennatallah", "surname": "El-Assady", "__typename": "ArticleAuthorType" } ], "idPrefix": "mlui", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2018", "issn": null, "isbn": "978-1-6654-4063-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10075647", "articleId": "1LIRyBc2BXi", "__typename": "AdjacentArticleType" }, "next": { "fno": "10075648", "articleId": "1LIRyUMEbxm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isca/1995/698/0/00524555", "title": "Unconstrained speculative execution with predicated state buffering", "doi": null, "abstractUrl": "/proceedings-article/isca/1995/00524555/12OmNB1eJC4", "parentPublication": { "id": "proceedings/isca/1995/698/0", "title": "Proceedings 22nd Annual International Symposium on Computer Architecture", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400529", "title": "VAST Challenge 2012: Visual analytics for big data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400529/12OmNwlqhST", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718615", "title": "Expanding the Scope: Interaction Design Perspectives for Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718615/12OmNxGSm6x", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400507", "title": "Agile visual analytics for banking cyber “big data”", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400507/12OmNyPQ4EL", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/1998/8566/0/85660309", "title": "Dynamic Schemes for Speculative Execution of Code", "doi": null, "abstractUrl": "/proceedings-article/mascots/1998/85660309/12OmNzdoMBf", "parentPublication": { "id": "proceedings/mascots/1998/8566/0", "title": "Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06908006", "title": "Personal Visualization and Personal Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2018/6240/0/624000a217", "title": "Harmonizing Speculative and Non-Speculative Execution in Architectures for Ordered Parallelism", "doi": null, "abstractUrl": "/proceedings-article/micro/2018/624000a217/17D45WXIkFX", "parentPublication": { "id": "proceedings/micro/2018/6240/0", "title": "2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08467535", "title": "Visual Analytics for Topic Model Optimization based on User-Steerable Speculative Execution", "doi": null, "abstractUrl": "/journal/tg/2019/01/08467535/17D45XeKgtW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2022/01/08871168", "title": "Optimizing Speculative Execution in Spark Heterogeneous Environments", "doi": null, "abstractUrl": "/journal/cc/2022/01/08871168/1eaVKk2R6F2", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2020/4661/0/09138997", "title": "Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution", "doi": null, "abstractUrl": "/proceedings-article/isca/2020/09138997/1lsarJCIoPC", "parentPublication": { "id": "proceedings/isca/2020/4661/0", "title": "2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pttUyyzzpu", "title": "2020 IEEE International Conference on Services Computing (SCC)", "acronym": "scc", "groupId": "1001209", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pttYXBgHPa", "doi": "10.1109/SCC49832.2020.00017", "title": "BSE-MAML: Model Agnostic Meta-Reinforcement Learning via Bayesian Structured Exploration", "normalizedTitle": "BSE-MAML: Model Agnostic Meta-Reinforcement Learning via Bayesian Structured Exploration", "abstract": "Deep reinforcement learning (RL) is playing an increasingly important role in web services such as news recommendation, vulnerability detection, and personalized services. Exploration is a key component of RL, which determines whether these RL-based applications could find effective solutions eventually. In this paper, we propose a novel gradient-based fast adaptation approach for model agnostic meta-reinforcement learning via Bayesian structure exploration (BSE-MAML). BSE-MAML could effectively learn exploration strategies from prior experience by updating policy with embedding latent space via a Bayesian mechanism. Coherent stochasticity injected by latent space are more efficient than random noise, and can produce exploration strategies to perform well in novel environment. We have conducted extensive experiments to evaluate BSE-MAML. Experimental results show that BSE-MAML achieves better performance in exploration in realistic environments with sparse rewards, compared to state-of-the-art meta-RL algorithms, RL methods without learning exploration strategies, and task-agnostic exploration approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Deep reinforcement learning (RL) is playing an increasingly important role in web services such as news recommendation, vulnerability detection, and personalized services. Exploration is a key component of RL, which determines whether these RL-based applications could find effective solutions eventually. In this paper, we propose a novel gradient-based fast adaptation approach for model agnostic meta-reinforcement learning via Bayesian structure exploration (BSE-MAML). BSE-MAML could effectively learn exploration strategies from prior experience by updating policy with embedding latent space via a Bayesian mechanism. Coherent stochasticity injected by latent space are more efficient than random noise, and can produce exploration strategies to perform well in novel environment. We have conducted extensive experiments to evaluate BSE-MAML. Experimental results show that BSE-MAML achieves better performance in exploration in realistic environments with sparse rewards, compared to state-of-the-art meta-RL algorithms, RL methods without learning exploration strategies, and task-agnostic exploration approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep reinforcement learning (RL) is playing an increasingly important role in web services such as news recommendation, vulnerability detection, and personalized services. Exploration is a key component of RL, which determines whether these RL-based applications could find effective solutions eventually. In this paper, we propose a novel gradient-based fast adaptation approach for model agnostic meta-reinforcement learning via Bayesian structure exploration (BSE-MAML). BSE-MAML could effectively learn exploration strategies from prior experience by updating policy with embedding latent space via a Bayesian mechanism. Coherent stochasticity injected by latent space are more efficient than random noise, and can produce exploration strategies to perform well in novel environment. We have conducted extensive experiments to evaluate BSE-MAML. Experimental results show that BSE-MAML achieves better performance in exploration in realistic environments with sparse rewards, compared to state-of-the-art meta-RL algorithms, RL methods without learning exploration strategies, and task-agnostic exploration approaches.", "fno": "878900a060", "keywords": [ "Bayes Methods", "Gradient Methods", "Learning Artificial Intelligence", "Web Services", "RL Methods", "Exploration Strategies", "Task Agnostic Exploration", "BSE MAML", "Model Agnostic Meta Reinforcement Learning", "Deep Reinforcement Learning", "Web Services", "RL Based Applications", "Bayesian Structure Exploration", "Latent Space", "Meta RL Algorithms", "Gradient Based Fast Adaptation", "Adaptation Models", "Web Services", "Stochastic Processes", "Service Computing", "Probabilistic Logic", "Bayes Methods", "Task Analysis", "Deep Reinforcement Learning", "Exploration", "Services Computing", "Web Services" ], "authors": [ { "affiliation": "National University of Defense Technology,National Lab for Parallel and Distributed Processing,Changsha,China", "fullName": "Haonan Wang", "givenName": "Haonan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,National Lab for Parallel and Distributed Processing,Changsha,China", "fullName": "Yiyun Zhang", "givenName": "Yiyun", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,National Lab for Parallel and Distributed Processing,Changsha,China", "fullName": "Dawei Feng", "givenName": "Dawei", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,National Lab for Parallel and Distributed Processing,Changsha,China", "fullName": "Dongsheng Li", "givenName": "Dongsheng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,National Lab for Parallel and Distributed Processing,Changsha,China", "fullName": "Feng Huang", "givenName": "Feng", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "scc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "60-67", "year": "2020", "issn": null, "isbn": "978-1-7281-8789-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "878900a057", "articleId": "1pttW1jo0Qo", "__typename": "AdjacentArticleType" }, "next": { "fno": "878900a068", "articleId": "1pttXvNuPrG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tc/2016/12/07435265", "title": "Model-Free Reinforcement Learning and Bayesian Classification in System-Level Power Management", "doi": null, "abstractUrl": "/journal/tc/2016/12/07435265/13rRUxlgybi", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09924601", "title": "Improving Actor-Critic Reinforcement Learning via Hamiltonian Monte Carlo Method", "doi": null, "abstractUrl": "/journal/ai/5555/01/09924601/1HBI1TzrNew", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956522", "title": "Dynamic Model-Agnostic Meta-Learning for Incremental Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956522/1IHqtXnRFMk", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedcs/2022/5541/0/554100a485", "title": "Improving Generalization of Model-Agnostic Meta-Learning by Channel Exchanging", "doi": null, "abstractUrl": "/proceedings-article/icedcs/2022/554100a485/1JC1ptROHio", "parentPublication": { "id": "proceedings/icedcs/2022/5541/0", "title": "2022 International Conference on Electronics and Devices, Computational Science (ICEDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800l1154", "title": "RL-CycleGAN: Reinforcement Learning Aware Simulation-to-Real", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800l1154/1m3nUtTysSY", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800c376", "title": "Learning to Forget for Meta-Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800c376/1m3omCfrWy4", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413158", "title": "MetaMix: Improved Meta-Learning with Interpolation-based Consistency Regularization", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413158/1tmiHRvoWAg", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09507366", "title": "Learning to Forget for Meta-Learning via Task-and-Layer-Wise Attenuation", "doi": null, "abstractUrl": "/journal/tp/2022/11/09507366/1vNfwvGL09a", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a131", "title": "Stochastic Observation Prediction for Efficient Reinforcement Learning in Robotics", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a131/1xPspCWwQ0g", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtss/2021/2802/0/280200a240", "title": "Event-Triggered and Time-Triggered Duration Calculus for Model-Free Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/rtss/2021/280200a240/1z92gjdGr60", "parentPublication": { "id": "proceedings/rtss/2021/2802/0", "title": "2021 IEEE Real-Time Systems Symposium (RTSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4L", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmclJV", "doi": "10.1109/VAST.2006.261416", "title": "Beyond Usability: Evaluation Aspects of Visual Analytic Environments", "normalizedTitle": "Beyond Usability: Evaluation Aspects of Visual Analytic Environments", "abstract": "A new field of research, visual analytics, has been introduced. This has been defined as \"the science of analytical reasoning facilitated by interactive visual interfaces\" (Thomas and Cook, 2005). Visual analytic environments, therefore, support analytical reasoning using visual representations and interactions, with data representations and transformation capabilities, to support production, presentation, and dissemination. As researchers begin to develop visual analytic environments, it is advantageous to develop metrics and methodologies to help researchers measure the progress of their work and understand the impact their work has on the users who work in such environments. This paper presents five areas or aspects of visual analytic environments that should be considered as metrics and methodologies for evaluation are developed. Evaluation aspects need to include usability, but it is necessary to go beyond basic usability. The areas of situation awareness, collaboration, interaction, creativity, and utility are proposed as the five evaluation areas for initial consideration. The steps that need to be undertaken to develop systematic evaluation methodologies and metrics for visual analytic environments are outlined", "abstracts": [ { "abstractType": "Regular", "content": "A new field of research, visual analytics, has been introduced. This has been defined as \"the science of analytical reasoning facilitated by interactive visual interfaces\" (Thomas and Cook, 2005). Visual analytic environments, therefore, support analytical reasoning using visual representations and interactions, with data representations and transformation capabilities, to support production, presentation, and dissemination. As researchers begin to develop visual analytic environments, it is advantageous to develop metrics and methodologies to help researchers measure the progress of their work and understand the impact their work has on the users who work in such environments. This paper presents five areas or aspects of visual analytic environments that should be considered as metrics and methodologies for evaluation are developed. Evaluation aspects need to include usability, but it is necessary to go beyond basic usability. The areas of situation awareness, collaboration, interaction, creativity, and utility are proposed as the five evaluation areas for initial consideration. The steps that need to be undertaken to develop systematic evaluation methodologies and metrics for visual analytic environments are outlined", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new field of research, visual analytics, has been introduced. This has been defined as \"the science of analytical reasoning facilitated by interactive visual interfaces\" (Thomas and Cook, 2005). Visual analytic environments, therefore, support analytical reasoning using visual representations and interactions, with data representations and transformation capabilities, to support production, presentation, and dissemination. As researchers begin to develop visual analytic environments, it is advantageous to develop metrics and methodologies to help researchers measure the progress of their work and understand the impact their work has on the users who work in such environments. This paper presents five areas or aspects of visual analytic environments that should be considered as metrics and methodologies for evaluation are developed. Evaluation aspects need to include usability, but it is necessary to go beyond basic usability. The areas of situation awareness, collaboration, interaction, creativity, and utility are proposed as the five evaluation areas for initial consideration. The steps that need to be undertaken to develop systematic evaluation methodologies and metrics for visual analytic environments are outlined", "fno": "04035759", "keywords": [ "Utility", "Usability", "Visual Analytic Environments", "Analytical Reasoning", "Interactive Visual Interfaces", "Visual Representations", "Evaluation Metrics", "Situation Awareness", "Collaboration", "Interaction", "Creativity" ], "authors": [ { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "J. Scholtz", "givenName": "J.", "surname": "Scholtz", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "145-150", "year": "2006", "issn": null, "isbn": "1-4244-0591-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04035758", "articleId": "12OmNqBtj1L", "__typename": "AdjacentArticleType" }, "next": { "fno": "04035760", "articleId": "12OmNqBtiCX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wsc/1996/3383/0/3383740", "title": "Comparison of simulation environments through analytic hierarchy process", "doi": null, "abstractUrl": "/proceedings-article/wsc/1996/3383740/12OmNqNos9z", "parentPublication": { "id": "proceedings/wsc/1996/3383/0", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2006/0591/0/04035747", "title": "Interactive Visual Synthesis of Analytic Knowledge", "doi": null, "abstractUrl": "/proceedings-article/vast/2006/04035747/12OmNrMZpEE", "parentPublication": { "id": "proceedings/vast/2006/0591/0", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a330", "title": "WeiboEvents: A Crowd Sourcing Weibo Visual Analytic System", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a330/12OmNweTvM5", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/06/mcg2015060042", "title": "ENTVis: A Visual Analytic Tool for Entropy-Based Network Traffic Anomaly Detection", "doi": null, "abstractUrl": "/magazine/cg/2015/06/mcg2015060042/13rRUyg2jQ7", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585669", "title": "Warning, Bias May Occur: A Proposed Approach to Detecting Cognitive Bias in Interactive Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585669/17D45X0yjSw", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2019/7789/0/08679500", "title": "Plane Based Visual Odometry for Structural and Low-Texture Environments Using RGB-D Sensors", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2019/08679500/18Xknbsd7BS", "parentPublication": { "id": "proceedings/bigcomp/2019/7789/0", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658790", "title": "Visual Analytic Workflow to Understand Students’ Performance in Computer Science Courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658790/18j9pOuyFt6", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1996/3383/0/00873360", "title": "Comparison of simulation environments through analytic hierarchy process", "doi": null, "abstractUrl": "/proceedings-article/wsc/1996/00873360/1D89vs0S2g8", "parentPublication": { "id": "proceedings/wsc/1996/3383/0", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2018/4063/0/10075648", "title": "Using Hidden Markov Models to Determine Cognitive States of Visual Analytic Users", "doi": null, "abstractUrl": "/proceedings-article/mlui/2018/10075648/1LIRyUMEbxm", "parentPublication": { "id": "proceedings/mlui/2018/4063/0", "title": "2018 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a045", "title": "A Case Study of Using Analytic Provenance to Reconstruct User Trust in a Guided Visual Analytics System", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a045/1yQB6KjO9oI", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G4EK69bHXi", "title": "2022 Annual Modeling and Simulation Conference (ANNSIM)", "acronym": "annsim", "groupId": "1831925", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G4ESPxlxks", "doi": "10.23919/ANNSIM55834.2022.9859344", "title": "Video Analytic Data Reduction Model For Fog Computing", "normalizedTitle": "Video Analytic Data Reduction Model For Fog Computing", "abstract": "The large volumes of video data cause network congestion and high latency in the centralized cloud computing system. Fog computing architecture that enables employing edge devices has already been used to address these problems. This paper proposes an application model called Video Analytic Data Reduction Model (VADRM) that divides video analytic jobs into smaller tasks with fewer processing requirements. The prototype of VADRM application model for typical video analytics applications (i.e., surveillance cameras) is implemented by Convolutional Neural Network (CNN). The analytical model is created based on the workload characterization of the prototype and used in the general simulation to measure the effectiveness of VADRM for employing edge computing instead of the cloud. The results show VADRM can allocate 45&#x0025; of the data size for edge processing and 55.50&#x0025; for cloud processing. iFogSim toolkit is used to simulate the fog environment and measure network performance when using VADRM model.", "abstracts": [ { "abstractType": "Regular", "content": "The large volumes of video data cause network congestion and high latency in the centralized cloud computing system. Fog computing architecture that enables employing edge devices has already been used to address these problems. This paper proposes an application model called Video Analytic Data Reduction Model (VADRM) that divides video analytic jobs into smaller tasks with fewer processing requirements. The prototype of VADRM application model for typical video analytics applications (i.e., surveillance cameras) is implemented by Convolutional Neural Network (CNN). The analytical model is created based on the workload characterization of the prototype and used in the general simulation to measure the effectiveness of VADRM for employing edge computing instead of the cloud. The results show VADRM can allocate 45&#x0025; of the data size for edge processing and 55.50&#x0025; for cloud processing. iFogSim toolkit is used to simulate the fog environment and measure network performance when using VADRM model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The large volumes of video data cause network congestion and high latency in the centralized cloud computing system. Fog computing architecture that enables employing edge devices has already been used to address these problems. This paper proposes an application model called Video Analytic Data Reduction Model (VADRM) that divides video analytic jobs into smaller tasks with fewer processing requirements. The prototype of VADRM application model for typical video analytics applications (i.e., surveillance cameras) is implemented by Convolutional Neural Network (CNN). The analytical model is created based on the workload characterization of the prototype and used in the general simulation to measure the effectiveness of VADRM for employing edge computing instead of the cloud. The results show VADRM can allocate 45% of the data size for edge processing and 55.50% for cloud processing. iFogSim toolkit is used to simulate the fog environment and measure network performance when using VADRM model.", "fno": "09859344", "keywords": [ "Cloud Computing", "Neural Nets", "Video Signal Processing", "Video Surveillance", "Video Analytic Data Reduction Model", "Fog Computing", "Video Data Cause Network Congestion", "Centralized Cloud Computing System", "Divides Video Analytic Jobs", "VADRM Application Model", "Typical Video Analytics Applications", "Analytical Model", "Fog Environment", "Measure Network Performance", "VADRM Model", "Analytical Models", "Cloud Computing", "Computational Modeling", "Visual Analytics", "Prototypes", "Data Models", "Task Analysis", "Video Analytics", "Fog Computing", "Edge Computing", "I Fog Sim", "Convolutional Neural Network" ], "authors": [ { "affiliation": "Ryerson University 350 Victoria Street,Distributed Systems & Multimedia Processing Laboratory (DSMP lab),Department of Computer Science,Toronto,ON,CANADA", "fullName": "Abdolreza Abhari", "givenName": "Abdolreza", "surname": "Abhari", "__typename": "ArticleAuthorType" }, { "affiliation": "Ryerson University 350 Victoria Street,Distributed Systems & Multimedia Processing Laboratory (DSMP lab),Department of Computer Science,Toronto,ON,CANADA", "fullName": "Dipak Pudasaini", "givenName": "Dipak", "surname": "Pudasaini", "__typename": "ArticleAuthorType" } ], "idPrefix": "annsim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "851-862", "year": "2022", "issn": null, "isbn": "978-1-71-385288-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09859346", "articleId": "1G4EUBhA6iY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09859375", "articleId": "1G4EOgOAnWo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cloud/2012/4755/0/4755a147", "title": "Towards Quality Aware Collaborative Video Analytic Cloud", "doi": null, "abstractUrl": "/proceedings-article/cloud/2012/4755a147/12OmNCfjesG", "parentPublication": { "id": "proceedings/cloud/2012/4755/0", "title": "2012 IEEE Fifth International Conference on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/03/mcg2016030072", "title": "Knowledge-Assisted Ranking: A Visual Analytic Application for Sports Event Data", "doi": null, "abstractUrl": "/magazine/cg/2016/03/mcg2016030072/13rRUyekIZN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cd/2018/06/mcd2018060028", "title": "Accelerator Virtualization in Fog Computing: Moving from the Cloud to the Edge", "doi": null, "abstractUrl": "/magazine/cd/2018/06/mcd2018060028/17D45WaTknu", "parentPublication": { "id": "mags/cd", "title": "IEEE Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc-companion/2018/0359/0/08605797", "title": "FogQN: An Analytic Model for Fog/Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/ucc-companion/2018/08605797/17D45XuDNFY", "parentPublication": { "id": "proceedings/ucc-companion/2018/0359/0", "title": "2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633626", "title": "Adaptive Edge and Fog Computing Paradigm for Wide Area Video and Audio Surveillance", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633626/17D45XwUAN7", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/04/09839465", "title": "<sc>OsmoticGate</sc>: Adaptive Edge-Based Real-Time Video Analytics for the Internet of Things", "doi": null, "abstractUrl": "/journal/tc/2023/04/09839465/1FisUU6lynK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2022/8611/0/861100a175", "title": "Preva: Protecting Inference Privacy through Policy-based Video-frame Transformation", "doi": null, "abstractUrl": "/proceedings-article/sec/2022/861100a175/1JC1gxUcmK4", "parentPublication": { "id": "proceedings/sec/2022/8611/0", "title": "2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfc/2019/3236/0/323600a069", "title": "Autonomic Resource Management Using Analytic Models for Fog/Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/icfc/2019/323600a069/1cYif6qaiyI", "parentPublication": { "id": "proceedings/icfc/2019/3236/0", "title": "2019 IEEE International Conference on Fog Computing (ICFC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2022/04/09373950", "title": "Autonomic Resource Management for Fog Computing", "doi": null, "abstractUrl": "/journal/cc/2022/04/09373950/1rPt2F977vG", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ctisc/2021/1868/0/186800a112", "title": "A Novel Incentive Mechanism Based on Repeated Game in Fog Computing", "doi": null, "abstractUrl": "/proceedings-article/ctisc/2021/186800a112/1wG6jb6M1vW", "parentPublication": { "id": "proceedings/ctisc/2021/1868/0", "title": "2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8wTfz", "title": "2011 International Conference on Virtual Reality and Visualization", "acronym": "icvrv", "groupId": "1800579", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNvjQ93S", "doi": "10.1109/ICVRV.2011.30", "title": "Interactive Visual Analysis of Vortex in 3D Flow with FFDL", "normalizedTitle": "Interactive Visual Analysis of Vortex in 3D Flow with FFDL", "abstract": "Feature visualization plays an important role in visualization of complicated flows because it can highlight the feature of the flows with a simplified representation. The traditional feature visualization methods may exact some important features in flow field imprecisely due to the lack of the knowledge and the experience of the user. This paper gives a particle-based visualization system which is developed with the application of the interactive fuzzy feature extraction and interactive visual analysis theories. To obtain a more precise feature extraction, we have proposed an interactive fuzzy feature description language (FFDL) and an interactive fuzzy feature extraction algorithm. Based on the work before, we introduced the proportion ration for different rules and optimized our algorithm in practice further by communicating with specific researchers and doing lots of experiments. The further experiments show that our method can not only make full use of the ability of the user to extract the features precisely, but also reflect the uncertainty of the numerical simulation data.", "abstracts": [ { "abstractType": "Regular", "content": "Feature visualization plays an important role in visualization of complicated flows because it can highlight the feature of the flows with a simplified representation. The traditional feature visualization methods may exact some important features in flow field imprecisely due to the lack of the knowledge and the experience of the user. This paper gives a particle-based visualization system which is developed with the application of the interactive fuzzy feature extraction and interactive visual analysis theories. To obtain a more precise feature extraction, we have proposed an interactive fuzzy feature description language (FFDL) and an interactive fuzzy feature extraction algorithm. Based on the work before, we introduced the proportion ration for different rules and optimized our algorithm in practice further by communicating with specific researchers and doing lots of experiments. The further experiments show that our method can not only make full use of the ability of the user to extract the features precisely, but also reflect the uncertainty of the numerical simulation data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Feature visualization plays an important role in visualization of complicated flows because it can highlight the feature of the flows with a simplified representation. The traditional feature visualization methods may exact some important features in flow field imprecisely due to the lack of the knowledge and the experience of the user. This paper gives a particle-based visualization system which is developed with the application of the interactive fuzzy feature extraction and interactive visual analysis theories. To obtain a more precise feature extraction, we have proposed an interactive fuzzy feature description language (FFDL) and an interactive fuzzy feature extraction algorithm. Based on the work before, we introduced the proportion ration for different rules and optimized our algorithm in practice further by communicating with specific researchers and doing lots of experiments. The further experiments show that our method can not only make full use of the ability of the user to extract the features precisely, but also reflect the uncertainty of the numerical simulation data.", "fno": "4602a295", "keywords": [ "Interactive Fuzzy Feature Extraction", "Fuzzy Feature Description Language", "Human Computer Interaction", "Interactive Visual Analysis" ], "authors": [ { "affiliation": null, "fullName": "En-Ya Shen", "givenName": "En-Ya", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hua-Xun Xu", "givenName": "Hua-Xun", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wen-Ke Wang", "givenName": "Wen-Ke", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xun Cai", "givenName": "Xun", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Liang Zeng", "givenName": "Liang", "surname": "Zeng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Si-Kun Li", "givenName": "Si-Kun", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvrv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "295-298", "year": "2011", "issn": null, "isbn": "978-0-7695-4602-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4602a291", "articleId": "12OmNrIaeaA", "__typename": "AdjacentArticleType" }, "next": { "fno": "4602a299", "articleId": "12OmNqyUUsh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822664", "title": "MICS: Medical image classification visual system", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822664/12OmNBSSVm5", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a005", "title": "A Fuzzy Interactive Approach for Decentralized Bilevel Programming Problem with a Common Decision Variable", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a005/12OmNBhHt9H", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmm/2005/2164/0/21640458", "title": "Interactive Visual Retrieval System for Large Scale 3D Models Database", "doi": null, "abstractUrl": "/proceedings-article/mmm/2005/21640458/12OmNwKGApa", "parentPublication": { "id": "proceedings/mmm/2005/2164/0", "title": "Multi-Media Modeling Conference, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2007/2928/0/29280148", "title": "Interactive 3D Forensic Visualisation: Virtual Interactive Prototype", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2007/29280148/12OmNx0A7GK", "parentPublication": { "id": "proceedings/cgiv/2007/2928/0", "title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2005/2396/0/23960054", "title": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "doi": null, "abstractUrl": "/proceedings-article/cmv/2005/23960054/12OmNyp9MkT", "parentPublication": { "id": "proceedings/cmv/2005/2396/0", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126229", "title": "Multi-scale morphological volume segmentation and visualization", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126229/12OmNzaQogz", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061340", "title": "Interactive Visual Analysis of Set-Typed Data", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061340/13rRUIM2VGX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/01/mcg2017010027", "title": "Interactive Exploration of 3D Scanned Baggage", "doi": null, "abstractUrl": "/magazine/cg/2017/01/mcg2017010027/13rRUwbaqNY", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1998/04/mcg1998040066", "title": "Interactive 3D Visualization of Optical Phenomena", "doi": null, "abstractUrl": "/magazine/cg/1998/04/mcg1998040066/13rRUwbs1UN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061699", "title": "Interactive Visual Steering - Rapid Visual Prototyping of a Common Rail Injection System", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061699/13rRUxNmPDM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWvH8", "title": "Ontologies in Interactive Systems, International Workshop on", "acronym": "ontoract", "groupId": "1002598", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwJgANF", "doi": "10.1109/ONTORACT.2008.19", "title": "Ontologies in Interactive Systems - ONTORACT", "normalizedTitle": "Ontologies in Interactive Systems - ONTORACT", "abstract": "Since April 2008, a \"Digital Inclusion\" research cluster gathering researchers and professional practitioners from British universities and industry has focused on discussing and developing methodologies to increase the accessibility of digital systems to \"digitally disenfranchised groups\", including special needs and elderly users.We here report on the Ontologies and Interactive Systems international workshop (Ontoract'08), which was held as a related activity to this initiative. The workshop gathered experts and researchers who discussed their respective expertise and exchanged their experiences of using knowledge-based methodologies and techniques to solve complex HCI and Interaction Design issues. Of particular interest were solutions designed to address the challenges of inclusion for all in the digital society.", "abstracts": [ { "abstractType": "Regular", "content": "Since April 2008, a \"Digital Inclusion\" research cluster gathering researchers and professional practitioners from British universities and industry has focused on discussing and developing methodologies to increase the accessibility of digital systems to \"digitally disenfranchised groups\", including special needs and elderly users.We here report on the Ontologies and Interactive Systems international workshop (Ontoract'08), which was held as a related activity to this initiative. The workshop gathered experts and researchers who discussed their respective expertise and exchanged their experiences of using knowledge-based methodologies and techniques to solve complex HCI and Interaction Design issues. Of particular interest were solutions designed to address the challenges of inclusion for all in the digital society.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since April 2008, a \"Digital Inclusion\" research cluster gathering researchers and professional practitioners from British universities and industry has focused on discussing and developing methodologies to increase the accessibility of digital systems to \"digitally disenfranchised groups\", including special needs and elderly users.We here report on the Ontologies and Interactive Systems international workshop (Ontoract'08), which was held as a related activity to this initiative. The workshop gathered experts and researchers who discussed their respective expertise and exchanged their experiences of using knowledge-based methodologies and techniques to solve complex HCI and Interaction Design issues. Of particular interest were solutions designed to address the challenges of inclusion for all in the digital society.", "fno": "3542a003", "keywords": [ "Ontology", "Interactive Systems", "Human Computer Interaction", "Digital Inclusion" ], "authors": [ { "affiliation": null, "fullName": "Matt-Mouley Bouamrane", "givenName": "Matt-Mouley", "surname": "Bouamrane", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Saturnino Luz", "givenName": "Saturnino", "surname": "Luz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Masood Masoodian", "givenName": "Masood", "surname": "Masoodian", "__typename": "ArticleAuthorType" } ], "idPrefix": "ontoract", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-09-01T00:00:00", "pubType": "proceedings", "pages": "3-6", "year": "2008", "issn": null, "isbn": "978-0-7695-3542-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3542z007", "articleId": "12OmNvD8Rw5", "__typename": "AdjacentArticleType" }, "next": { "fno": "3542a009", "articleId": "12OmNAXxXeU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2015/6775/0/6775a364", "title": "Designing Medical Interactive Systems Via Assessment of Human Mental Workload", "doi": null, "abstractUrl": "/proceedings-article/cbms/2015/6775a364/12OmNBE7MnS", "parentPublication": { "id": "proceedings/cbms/2015/6775/0", "title": "2015 IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ozchi/1998/9206/0/92060220", "title": "Cognitive Work Analysis and the Analysis, Design, and Evaluation of Human-Computer Interactive Systems", "doi": null, "abstractUrl": "/proceedings-article/ozchi/1998/92060220/12OmNBUS7bN", "parentPublication": { "id": "proceedings/ozchi/1998/9206/0", "title": "Computer-Human Interaction, Australasian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118603", "title": "User centred interactive search in the humanities", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118603/12OmNBWi6It", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a176", "title": "Design decisions for a Brazilian t-commerce application", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a176/12OmNBdJ5ih", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2011/4602/0/4602a295", "title": "Interactive Visual Analysis of Vortex in 3D Flow with FFDL", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2011/4602a295/12OmNvjQ93S", "parentPublication": { "id": "proceedings/icvrv/2011/4602/0", "title": "2011 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118632", "title": "Studying digital library users in the wild: theories, methods, and analytical approaches", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118632/12OmNwHQBdP", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2013/4968/0/4968a509", "title": "Challenges of Testing for Critical Interactive Systems", "doi": null, "abstractUrl": "/proceedings-article/icst/2013/4968a509/12OmNxaNGlH", "parentPublication": { "id": "proceedings/icst/2013/4968/0", "title": "2013 IEEE Sixth International Conference on Software Testing, Verification and Validation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hcc/2001/7198/0/00995272", "title": "Multilevel modelling and design of visual interactive systems", "doi": null, "abstractUrl": "/proceedings-article/hcc/2001/00995272/12OmNzmLxTm", "parentPublication": { "id": "proceedings/hcc/2001/7198/0", "title": "Proceedings of HCC 2001. IEEE Symposium on Human-Centric Computing Languages and Environments", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1998/04/mcg1998040066", "title": "Interactive 3D Visualization of Optical Phenomena", "doi": null, "abstractUrl": "/magazine/cg/1998/04/mcg1998040066/13rRUwbs1UN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2006/05/x5010", "title": "Guest Editors' Introduction: Intelligent Systems for Interactive Entertainment", "doi": null, "abstractUrl": "/magazine/ex/2006/05/x5010/13rRUxZRbtI", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy49sKc", "title": "Intelligence Information Processing and Trusted Computing, International Symposium on", "acronym": "iptc", "groupId": "1800227", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNx2QUL1", "doi": "10.1109/IPTC.2010.79", "title": "Power-Law Distribution of Human Behaviors in Internet Forums", "normalizedTitle": "Power-Law Distribution of Human Behaviors in Internet Forums", "abstract": "Internet and database technology provide the conditions for us to learn human behaviors empirically. Exploring these behaviors is important for us to understand internet users’ surfing habits, and to set the stage for better research on social dynamics closer to reality. In this paper, we explore the Internet users’ post and reply behaviors et al. in an internet forum, Tianya. Statistical analysis shows that, internet users’ post, reply, replied, page view, in-degree and out-degree distribution all follow power-law form, which is qualitatively agree with achievements of other researchers.", "abstracts": [ { "abstractType": "Regular", "content": "Internet and database technology provide the conditions for us to learn human behaviors empirically. Exploring these behaviors is important for us to understand internet users’ surfing habits, and to set the stage for better research on social dynamics closer to reality. In this paper, we explore the Internet users’ post and reply behaviors et al. in an internet forum, Tianya. Statistical analysis shows that, internet users’ post, reply, replied, page view, in-degree and out-degree distribution all follow power-law form, which is qualitatively agree with achievements of other researchers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Internet and database technology provide the conditions for us to learn human behaviors empirically. Exploring these behaviors is important for us to understand internet users’ surfing habits, and to set the stage for better research on social dynamics closer to reality. In this paper, we explore the Internet users’ post and reply behaviors et al. in an internet forum, Tianya. Statistical analysis shows that, internet users’ post, reply, replied, page view, in-degree and out-degree distribution all follow power-law form, which is qualitatively agree with achievements of other researchers.", "fno": "4196a286", "keywords": [ "Web Mining", "Empirical Analysis", "Human Behavior", "Power Law", "Internet Forum" ], "authors": [ { "affiliation": null, "fullName": "Xia-Meng Si", "givenName": "Xia-Meng", "surname": "Si", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yun Liu", "givenName": "Yun", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iptc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "286-289", "year": "2010", "issn": null, "isbn": "978-0-7695-4196-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4196a282", "articleId": "12OmNs0C9Je", "__typename": "AdjacentArticleType" }, "next": { "fno": "4196a290", "articleId": "12OmNANBZvn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/socinfo/2009/3706/0/3706a074", "title": "On Mining and Social Role Discovery in Internet Forums", "doi": null, "abstractUrl": "/proceedings-article/socinfo/2009/3706a074/12OmNAq3hLK", "parentPublication": { "id": "proceedings/socinfo/2009/3706/0", "title": "Social Informatics, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07364019", "title": "Understanding the time characteristic of user behavior on online forums", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364019/12OmNrYCXVm", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/internet/2009/3748/0/3748a101", "title": "On the Packet Delay Distribution in Power-Law Networks", "doi": null, "abstractUrl": "/proceedings-article/internet/2009/3748a101/12OmNroij1w", "parentPublication": { "id": "proceedings/internet/2009/3748/0", "title": "Evolving Internet, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfn/2009/3567/0/3567a038", "title": "A Pow-Law Model for Internet Topology with Hierarchy", "doi": null, "abstractUrl": "/proceedings-article/icfn/2009/3567a038/12OmNwDACts", "parentPublication": { "id": "proceedings/icfn/2009/3567/0", "title": "Future Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2010/4138/0/4138a306", "title": "Mining Interaction Behaviors for Email Reply Order Prediction", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a306/12OmNwJgAMk", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/2/3801b275", "title": "Toward a Generic Framework for Modeling Human Behaviors in Crowd Simulation", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801b275/12OmNxTVU0v", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/2", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/06149194", "title": "Empirical analysis of online anonymity and user behaviors: the impact of real name policy", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/06149194/12OmNyKJiDq", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/1/3407a515", "title": "Assessing Online Behaviors through Discussion Forums in NGO's Daily Working Life", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407a515/12OmNyRPgx4", "parentPublication": { "id": "iccit/2008/3407/1", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2011/4517/0/4517a384", "title": "Automatic Online Monitoring and Data-Mining Internet Forums", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2011/4517a384/12OmNyuPKSC", "parentPublication": { "id": "proceedings/iih-msp/2011/4517/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsa/2022/1728/0/172800a124", "title": "Designing Internet of Behaviors Systems", "doi": null, "abstractUrl": "/proceedings-article/icsa/2022/172800a124/1DDCs9neOGI", "parentPublication": { "id": "proceedings/icsa/2022/1728/0", "title": "2022 IEEE 19th International Conference on Software Architecture (ICSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPPN", "title": "2009 Second International Conference on Information and Computing Science", "acronym": "icic", "groupId": "1002818", "volume": "4", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyxXlmH", "doi": "10.1109/ICIC.2009.392", "title": "The Study on Reasonability of Retrospective Power", "normalizedTitle": "The Study on Reasonability of Retrospective Power", "abstract": "There is an increasingly concern with the use of retrospective power. Some researchers suggested calculating the retrospective power after conducting hypothesis testing, particularly in meta-analysis. They considered that retro-spective power can be used to determine whether the sample size is sufficient in an experiment and that the combination of retrospective power and prior power can enhance the power of current and future studies. Furthermore, the commonly used statistical software packages, such as SPSS and SAS, provide retrospective power analysis in some modules. However, some pointed out the abuse of retrospective power. In this study, we used Monte Carlo technique to estimate the retrospective power in t-test and ANOVA to address this issue. We found that four styles of retrospective powers, including observed power, plug-in power, unbiased power and median power, are highly positive correlated. They dispersed distribute in the range of (0.05, 1). The width of 25th-75th percentages achieved 0.38-0.54, the standard deviations 0.25-0.30 for 0.7 of the statistical power. However, they all monotonously decreased in respect to P value. The retrospective powers were negatively correlated with P values with Pearson coefficients ranged from -0.753 to -0.831 (p", "abstracts": [ { "abstractType": "Regular", "content": "There is an increasingly concern with the use of retrospective power. Some researchers suggested calculating the retrospective power after conducting hypothesis testing, particularly in meta-analysis. They considered that retro-spective power can be used to determine whether the sample size is sufficient in an experiment and that the combination of retrospective power and prior power can enhance the power of current and future studies. Furthermore, the commonly used statistical software packages, such as SPSS and SAS, provide retrospective power analysis in some modules. However, some pointed out the abuse of retrospective power. In this study, we used Monte Carlo technique to estimate the retrospective power in t-test and ANOVA to address this issue. We found that four styles of retrospective powers, including observed power, plug-in power, unbiased power and median power, are highly positive correlated. They dispersed distribute in the range of (0.05, 1). The width of 25th-75th percentages achieved 0.38-0.54, the standard deviations 0.25-0.30 for 0.7 of the statistical power. However, they all monotonously decreased in respect to P value. The retrospective powers were negatively correlated with P values with Pearson coefficients ranged from -0.753 to -0.831 (p", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There is an increasingly concern with the use of retrospective power. Some researchers suggested calculating the retrospective power after conducting hypothesis testing, particularly in meta-analysis. They considered that retro-spective power can be used to determine whether the sample size is sufficient in an experiment and that the combination of retrospective power and prior power can enhance the power of current and future studies. Furthermore, the commonly used statistical software packages, such as SPSS and SAS, provide retrospective power analysis in some modules. However, some pointed out the abuse of retrospective power. In this study, we used Monte Carlo technique to estimate the retrospective power in t-test and ANOVA to address this issue. We found that four styles of retrospective powers, including observed power, plug-in power, unbiased power and median power, are highly positive correlated. They dispersed distribute in the range of (0.05, 1). The width of 25th-75th percentages achieved 0.38-0.54, the standard deviations 0.25-0.30 for 0.7 of the statistical power. However, they all monotonously decreased in respect to P value. The retrospective powers were negatively correlated with P values with Pearson coefficients ranged from -0.753 to -0.831 (p", "fno": "3634d323", "keywords": [ "NAME" ], "authors": [ { "affiliation": null, "fullName": "Jun Qian", "givenName": "Jun", "surname": "Qian", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chun-quan Ou", "givenName": "Chun-quan", "surname": "Ou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tao Wang", "givenName": "Tao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ping-yan Chen", "givenName": "Ping-yan", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-05-01T00:00:00", "pubType": "proceedings", "pages": "323-326", "year": "2009", "issn": null, "isbn": "978-0-7695-3634-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3634d382", "articleId": "12OmNyrqzDn", "__typename": "AdjacentArticleType" }, "next": { "fno": "3634d327", "articleId": "12OmNzCF4Sy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsm/1989/1965/0/00065206", "title": "The retrospective introduction of abstraction into software", "doi": null, "abstractUrl": "/proceedings-article/icsm/1989/00065206/12OmNwE9Orj", "parentPublication": { "id": "proceedings/icsm/1989/1965/0", "title": "Proceedings 1989 Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2014/7434/0/7434a624", "title": "Application Research on Retrospective Analysis System in Network Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a624/12OmNxE2mLC", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2016/3682/0/3682b090", "title": "The Right Metric for Efficient Supercomputing: A Ten-Year Retrospective", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682b090/12OmNy3AgDj", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiswc/2015/0088/0/0088a110", "title": "A Retrospective Look Back on the Road Towards Energy Proportionality", "doi": null, "abstractUrl": "/proceedings-article/iiswc/2015/0088a110/12OmNyp9Mmj", "parentPublication": { "id": "proceedings/iiswc/2015/0088/0", "title": "2015 IEEE International Symposium on Workload Characterization (IISWC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2012/3051/0/015seng", "title": "Retrospective on “Power-Sensitive Multithreaded Architecture”", "doi": null, "abstractUrl": "/proceedings-article/iccd/2012/015seng/12OmNzVoBBA", "parentPublication": { "id": "proceedings/iccd/2012/3051/0", "title": "2012 IEEE 30th International Conference on Computer Design (ICCD 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/agile/2010/7731/0/05562804", "title": "The Impact of Organization, Project and Governance Variables on Software Quality and Project Success", "doi": null, "abstractUrl": "/proceedings-article/agile/2010/05562804/12OmNzcPAxz", "parentPublication": { "id": "proceedings/agile/2010/7731/0", "title": "2010 Agile Conference (AGILE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2007/07/l0865", "title": "Analysis of Parallel Algorithms for Matrix Chain Product and Matrix Powers on Distributed Memory Systems", "doi": null, "abstractUrl": "/journal/td/2007/07/l0865/13rRUyft7CD", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2019/6297/0/09151475", "title": "Study on the Radiant Power of Ambient Electromagnetic Wave", "doi": null, "abstractUrl": "/proceedings-article/iccis/2019/09151475/1lRlLcII0N2", "parentPublication": { "id": "proceedings/iccis/2019/6297/0", "title": "2019 4th International Conference on Communication and Information Systems (ICCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222030", "title": "Passing the Data Baton : A Retrospective Analysis on Data Science Work and Workers", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222030/1nTqvtS8DcY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn-symposium/2020/8314/0/09363271", "title": "Retrospective Sensing Based on Federated Learning in the IoT", "doi": null, "abstractUrl": "/proceedings-article/lcn-symposium/2020/09363271/1rDUXG8tcIg", "parentPublication": { "id": "proceedings/lcn-symposium/2020/8314/0", "title": "2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisN", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VtKixt", "doi": "10.1109/BELIV.2018.8634420", "title": "How to Evaluate an Evaluation Study? Comparing and Contrasting Practices in Vis with Those of Other Disciplines : Position Paper", "normalizedTitle": "How to Evaluate an Evaluation Study? Comparing and Contrasting Practices in Vis with Those of Other Disciplines : Position Paper", "abstract": "Evaluative practices within vis research are not routinely compared to those of psychology, sociology, or other areas of empirical study, leaving vis vulnerable to the replicability crisis that has embroiled scientific research more generally. In this position paper, we compare contemporary vis evaluative practices against those in those other disciplines, and make concrete recommendations as to how vis evaluative practice can be improved through the use of quantitative, qualitative, and mixed research methods. We summarize our discussion and recommendations as a checklist, that we intend to be used a resource for vis researchers conducting evaluative studies, and for reviewers evaluating the merits of such studies.", "abstracts": [ { "abstractType": "Regular", "content": "Evaluative practices within vis research are not routinely compared to those of psychology, sociology, or other areas of empirical study, leaving vis vulnerable to the replicability crisis that has embroiled scientific research more generally. In this position paper, we compare contemporary vis evaluative practices against those in those other disciplines, and make concrete recommendations as to how vis evaluative practice can be improved through the use of quantitative, qualitative, and mixed research methods. We summarize our discussion and recommendations as a checklist, that we intend to be used a resource for vis researchers conducting evaluative studies, and for reviewers evaluating the merits of such studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Evaluative practices within vis research are not routinely compared to those of psychology, sociology, or other areas of empirical study, leaving vis vulnerable to the replicability crisis that has embroiled scientific research more generally. In this position paper, we compare contemporary vis evaluative practices against those in those other disciplines, and make concrete recommendations as to how vis evaluative practice can be improved through the use of quantitative, qualitative, and mixed research methods. We summarize our discussion and recommendations as a checklist, that we intend to be used a resource for vis researchers conducting evaluative studies, and for reviewers evaluating the merits of such studies.", "fno": "08634420", "keywords": [ "Data Visualisation", "Empirical Study", "Replicability Crisis", "Vis Evaluative Practice", "Psychology", "Standards", "Sociology", "Visualization", "Human Computer Interaction", "Computer Science", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Department of Computer Science, University of British Columbia", "fullName": "Anamaria Crisan", "givenName": "Anamaria", "surname": "Crisan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Psychology, University of British Columbia", "fullName": "Madison Elliott", "givenName": "Madison", "surname": "Elliott", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "&#xa;28&#xa;-&#xa;36&#xa;", "year": "2018", "issn": null, "isbn": "978-1-5386-6884-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08634027", "articleId": "17D45WwsQ7C", "__typename": "AdjacentArticleType" }, "next": { "fno": "08634103", "articleId": "17D45VsBTXJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2014/3922/0/07044011", "title": "Proven practices that can reduce stereotype threat in engineering education: A literature review", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044011/12OmNCbU2Vv", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cseet/2003/1869/0/18690052", "title": "Soft(ware) Skills in Context: Corporate Usability Training Aiming at Cross-Disciplinary Collaboration", "doi": null, "abstractUrl": "/proceedings-article/cseet/2003/18690052/12OmNxiKrZt", "parentPublication": { "id": "proceedings/cseet/2003/1869/0", "title": "Software Engineering Education and Training, Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757576", "title": "A team-approach to putting learner-centered principles to practice in a large course on Human-Computer Interaction", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757576/12OmNyQYtfo", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07870966", "title": "Sharing, Communication, and Music Listening: A Diary Study of Technology Use by Pre-teens and Adolescents", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07870966/12OmNyRPgPv", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903512", "title": "Thirty-Two Years of IEEE VIS: Authors, Fields of Study and Citations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903512/1GZol4dym8U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10003102", "title": "Scalability in Visualization", "doi": null, "abstractUrl": "/journal/tg/5555/01/10003102/1Jv6onSqGf6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2019/4064/0/10075560", "title": "Machine Learning from User Interaction for Visualization and Analytics: A Workshop-Generated Research Agenda", "doi": null, "abstractUrl": "/proceedings-article/mlui/2019/10075560/1LIRveJELtK", "parentPublication": { "id": "proceedings/mlui/2019/4064/0", "title": "2019 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802427", "title": "VIS Keynote Address : When Visualization Met Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802427/1cJ6YTM2KGc", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a011", "title": "Pipelines Bent, Pipelines Broken: Interdisciplinary Self-Reflection on the Impact of COVID-19 on Current and Future Research (Position Paper)", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a011/1q0FOhu4q88", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09523770", "title": "A Survey on ML4VIS: Applying Machine Learning Advances to Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09523770/1wnLgd43B5K", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17PYEiwhTsD", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "acronym": "aicis", "groupId": "1830467", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17PYEjG6pn7", "doi": "10.1109/AiCIS.2018.00040", "title": "Enhancement of State Estimation Power System Based Hybrid Algorithm", "normalizedTitle": "Enhancement of State Estimation Power System Based Hybrid Algorithm", "abstract": "with the growing of power system, monitoring has become more complexity. State estimation is a beneficial tool, which improve in monitoring of a power system. The main objective aim of all power state estimation is to determine the best estimated state for power system variables by using statistical methods. Despite, The complexity and development of electrical network, the measurements still inaccurate due to the tolerance of measurement devices. This make the need of enhancing and optimizing the state estimation of power system is become an important topic for researchers. In this paper a hybrid algorithm has been done using WLS, WLAV state estimation methods and Particle Swarm Optimization (PSO) was used. IEEE 14-bus has been tested using the proposed algorithm (PSO-WLS). The experimental results show its effectiveness of the proposed algorithm to enhancing state estimation of power system.", "abstracts": [ { "abstractType": "Regular", "content": "with the growing of power system, monitoring has become more complexity. State estimation is a beneficial tool, which improve in monitoring of a power system. The main objective aim of all power state estimation is to determine the best estimated state for power system variables by using statistical methods. Despite, The complexity and development of electrical network, the measurements still inaccurate due to the tolerance of measurement devices. This make the need of enhancing and optimizing the state estimation of power system is become an important topic for researchers. In this paper a hybrid algorithm has been done using WLS, WLAV state estimation methods and Particle Swarm Optimization (PSO) was used. IEEE 14-bus has been tested using the proposed algorithm (PSO-WLS). The experimental results show its effectiveness of the proposed algorithm to enhancing state estimation of power system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "with the growing of power system, monitoring has become more complexity. State estimation is a beneficial tool, which improve in monitoring of a power system. The main objective aim of all power state estimation is to determine the best estimated state for power system variables by using statistical methods. Despite, The complexity and development of electrical network, the measurements still inaccurate due to the tolerance of measurement devices. This make the need of enhancing and optimizing the state estimation of power system is become an important topic for researchers. In this paper a hybrid algorithm has been done using WLS, WLAV state estimation methods and Particle Swarm Optimization (PSO) was used. IEEE 14-bus has been tested using the proposed algorithm (PSO-WLS). The experimental results show its effectiveness of the proposed algorithm to enhancing state estimation of power system.", "fno": "918800a164", "keywords": [ "Least Squares Approximations", "Particle Swarm Optimisation", "Power System Measurement", "Power System State Estimation", "Enhancing State Estimation", "State Estimation Power System", "Hybrid Algorithm", "Power System State Estimation", "Power System Monitoring", "Particle Swarm Optimization", "PSO WLS", "WLAV State Estimation Methods", "Power System Variables", "Estimated State", "Power Systems", "State Estimation", "Optimization", "Sociology", "Statistics", "Measurement Uncertainty", "Jacobian Matrices", "WLS", "PSO", "State Estimation", "Power System", "Optimization" ], "authors": [ { "affiliation": "Department of Electrical power engineering techniques,Electrical Engineering Technical College,Middle Technical University,", "fullName": "Mothafer A. Hussein", "givenName": "Mothafer A.", "surname": "Hussein", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical power engineering techniques,Electrical Engineering Technical College,Middle Technical University", "fullName": "Ahmed Jasim Sultan", "givenName": "Ahmed Jasim", "surname": "Sultan", "__typename": "ArticleAuthorType" } ], "idPrefix": "aicis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "164-169", "year": "2018", "issn": null, "isbn": "978-1-5386-9188-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "918800a159", "articleId": "17PYEkhzsxq", "__typename": "AdjacentArticleType" }, "next": { "fno": "918800a170", "articleId": "17PYEiwhTsM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aspdac/1998/4425/0/00669550", "title": "A hybrid power model for RTL power estimation", "doi": null, "abstractUrl": "/proceedings-article/aspdac/1998/00669550/12OmNCmpcGM", "parentPublication": { "id": "proceedings/aspdac/1998/4425/0", "title": "Proceedings of 1998 Asia and South Pacific Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1988/0847/0/00017054", "title": "Power system state estimate on a personal computer", "doi": null, "abstractUrl": "/proceedings-article/ssst/1988/00017054/12OmNqIhFPr", "parentPublication": { "id": "proceedings/ssst/1988/0847/0", "title": "The Twentieth Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icrteect/2017/6266/0/6266a077", "title": "Particle Filter Based State Estimation of Power System", "doi": null, "abstractUrl": "/proceedings-article/icrteect/2017/6266a077/12OmNvmowSM", "parentPublication": { "id": "proceedings/icrteect/2017/6266/0", "title": "2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2014/2233/0/2233a156", "title": "Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation", "doi": null, "abstractUrl": "/proceedings-article/dsn/2014/2233a156/12OmNwqft15", "parentPublication": { "id": "proceedings/dsn/2014/2233/0", "title": "2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1990/2038/0/00138149", "title": "Parallel state estimation in power systems", "doi": null, "abstractUrl": "/proceedings-article/ssst/1990/00138149/12OmNx76TFW", "parentPublication": { "id": "proceedings/ssst/1990/2038/0", "title": "Proceedings The Twenty-Second Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2015/6656/0/6656a609", "title": "State Estimation of a Distribution System Using WLS and EKF Techniques", "doi": null, "abstractUrl": "/proceedings-article/iri/2015/6656a609/12OmNx7ouON", "parentPublication": { "id": "proceedings/iri/2015/6656/0", "title": "2015 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2014/5970/0/07054266", "title": "State estimation for energy theft detection in microgrids", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2014/07054266/12OmNxX3utW", "parentPublication": { "id": "proceedings/chinacom/2014/5970/0", "title": "2014 9th International Conference on Communications and Networking in China (CHINACOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/peits/2008/3342/0/3342a252", "title": "Support Vector Machine Based Approach for State Estimation of Iraqi Super Grid Network", "doi": null, "abstractUrl": "/proceedings-article/peits/2008/3342a252/12OmNxYbSYi", "parentPublication": { "id": "proceedings/peits/2008/3342/0", "title": "2008 Workshop on Power Electronics and Intelligent Transportation System", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07847011", "title": "Securing Power System State Estimation", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07847011/12OmNxcMSmG", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sges/2020/8550/0/855000a627", "title": "Implementing Two Stage Hybrid State Estimation with Various Approaches", "doi": null, "abstractUrl": "/proceedings-article/sges/2020/855000a627/1rITFoifFks", "parentPublication": { "id": "proceedings/sges/2020/8550/0", "title": "2020 International Conference on Smart Grids and Energy Systems (SGES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FT2jYh50bK", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1FT2qBNtdUQ", "doi": null, "title": "StreamingHub: Interactive Stream Analysis Workflows", "normalizedTitle": "StreamingHub: Interactive Stream Analysis Workflows", "abstract": "Reusable data/code and reproducible analyses are foundational to quality research. This aspect, however, is often overlooked when designing interactive stream analysis workflows for time-series data (e.g., eye-tracking data). A mechanism to transmit informative metadata alongside data may allow such workflows to intelligently consume data, propagate metadata to downstream tasks, and thereby auto-generate reusable, reproducible analytic outputs with zero supervision. Moreover, a visual programming interface to design, develop, and execute such workflows may allow rapid prototyping for interdisciplinary research. Capitalizing on these ideas, we propose StreamingHub, a framework to build metadata propagating, interactive stream analysis workflows using visual programming. We conduct two case studies to evaluate the generalizability of our framework. Simultaneously, we use two heuristics to evaluate their computational fluidity and data growth. Results show that our framework generalizes to multiple tasks with a minimal performance overhead. CCS CONCEPTS &#x2022; Information systems &#x2192; Document representation; Data management systems; &#x2022; Human-centered computing &#x2192; Visualization.", "abstracts": [ { "abstractType": "Regular", "content": "Reusable data/code and reproducible analyses are foundational to quality research. This aspect, however, is often overlooked when designing interactive stream analysis workflows for time-series data (e.g., eye-tracking data). A mechanism to transmit informative metadata alongside data may allow such workflows to intelligently consume data, propagate metadata to downstream tasks, and thereby auto-generate reusable, reproducible analytic outputs with zero supervision. Moreover, a visual programming interface to design, develop, and execute such workflows may allow rapid prototyping for interdisciplinary research. Capitalizing on these ideas, we propose StreamingHub, a framework to build metadata propagating, interactive stream analysis workflows using visual programming. We conduct two case studies to evaluate the generalizability of our framework. Simultaneously, we use two heuristics to evaluate their computational fluidity and data growth. Results show that our framework generalizes to multiple tasks with a minimal performance overhead. CCS CONCEPTS &#x2022; Information systems &#x2192; Document representation; Data management systems; &#x2022; Human-centered computing &#x2192; Visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Reusable data/code and reproducible analyses are foundational to quality research. This aspect, however, is often overlooked when designing interactive stream analysis workflows for time-series data (e.g., eye-tracking data). A mechanism to transmit informative metadata alongside data may allow such workflows to intelligently consume data, propagate metadata to downstream tasks, and thereby auto-generate reusable, reproducible analytic outputs with zero supervision. Moreover, a visual programming interface to design, develop, and execute such workflows may allow rapid prototyping for interdisciplinary research. Capitalizing on these ideas, we propose StreamingHub, a framework to build metadata propagating, interactive stream analysis workflows using visual programming. We conduct two case studies to evaluate the generalizability of our framework. Simultaneously, we use two heuristics to evaluate their computational fluidity and data growth. Results show that our framework generalizes to multiple tasks with a minimal performance overhead. CCS CONCEPTS • Information systems → Document representation; Data management systems; • Human-centered computing → Visualization.", "fno": "09852945", "keywords": [ "Data Analysis", "Interactive Systems", "Meta Data", "Software Prototyping", "Visual Programming", "Streaming Hub", "Reproducible Analysis", "Time Series Data", "Metadata", "Visual Programming Interface", "Interactive Stream Analysis Workflows", "Data Code Analysis", "Rapid Prototyping", "Human Computer Interaction", "Visualization", "Data Visualization", "Metadata", "Programming", "Rapid Prototyping", "Libraries", "Interactive Stream Analysis", "Scientific Workflows", "Metadata" ], "authors": [ { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Yasith Jayawardana", "givenName": "Yasith", "surname": "Jayawardana", "__typename": "ArticleAuthorType" }, { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Vikas G. Ashok", "givenName": "Vikas G.", "surname": "Ashok", "__typename": "ArticleAuthorType" }, { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Sampath Jayarathna", "givenName": "Sampath", "surname": "Jayarathna", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2022", "issn": null, "isbn": "978-1-4503-9345-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09852833", "articleId": "1FT2phqojE4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09852956", "articleId": "1FT2lCOOxyM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/e-science/2016/4273/0/07870920", "title": "Interactive provenance summaries for reproducible science", "doi": null, "abstractUrl": "/proceedings-article/e-science/2016/07870920/12OmNqBbHRS", "parentPublication": { "id": "proceedings/e-science/2016/4273/0", "title": "2016 IEEE 12th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840628", "title": "Managing hot metadata for scientific workflows on multisite clouds", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840628/12OmNyLA5Ai", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cain/2022/9275/0/927500a048", "title": "Pynblint: a Static Analyzer for Python Jupyter Notebooks", "doi": null, "abstractUrl": "/proceedings-article/cain/2022/927500a048/1EhsiPxVOQU", "parentPublication": { "id": "proceedings/cain/2022/9275/0", "title": "2022 IEEE/ACM 1st International Conference on AI Engineering – Software Engineering for AI (CAIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/geicse/2022/9294/0/929400a080", "title": "A social-cognitive analysis of a female-focused hackathon", "doi": null, "abstractUrl": "/proceedings-article/geicse/2022/929400a080/1FRKvCo3uxy", "parentPublication": { "id": "proceedings/geicse/2022/9294/0", "title": "2022 IEEE/ACM 3rd International Workshop on Gender Equality, Diversity and Inclusion in Software Engineering (GEICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fairware/2022/9292/0/929200a025", "title": "Detecting Obstacles to Collaboration in an Online Participatory Democracy Platform: A Use-case Driven Analysis", "doi": null, "abstractUrl": "/proceedings-article/fairware/2022/929200a025/1FRL7AObtNC", "parentPublication": { "id": "proceedings/fairware/2022/9292/0", "title": "2022 IEEE/ACM International Workshop on Equitable Data & Technology (FairWare)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852952", "title": "A Prototype Gutenberg-HathiTrust Sentence-level Parallel Corpus for OCR Error Analysis: Pilot Investigations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852952/1FT2lKOHLNu", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852961", "title": "SchenQL: A query language for bibliographic data with aggregations and domain-specific functions", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852961/1FT2lYVxuGk", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852923", "title": "A Library Perspective on Nearly-Unsupervised Information Extraction Workflows in Digital Libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852923/1FT2od9UeYg", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2017/5114/0/09926263", "title": "Scientific User Behavior and Data-Sharing Trends in a Petascale File System", "doi": null, "abstractUrl": "/proceedings-article/sc/2017/09926263/1HOxxXxwhKE", "parentPublication": { "id": "proceedings/sc/2017/5114/0", "title": "SC17: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2022/6124/0/612400a403", "title": "Augmenting Singularity to Generate Fine-grained Workflows, Record Trails, and Data Provenance", "doi": null, "abstractUrl": "/proceedings-article/e-science/2022/612400a403/1J6hvEytl96", "parentPublication": { "id": "proceedings/e-science/2022/6124/0", "title": "2022 IEEE 18th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wutzGkF9Zu", "title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)", "acronym": "iciddt", "groupId": "1841164", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1wutLC6a7q8", "doi": "10.1109/ICIDDT52279.2020.00017", "title": "Human-computer Interactive Showcases Design for the Application of Commercial Space", "normalizedTitle": "Human-computer Interactive Showcases Design for the Application of Commercial Space", "abstract": "Nowadays, the method of \"culture plus technology\" should be used flexibly in the design of showcases, and the cultural characteristics should be reflected in the unique history, culture, tradition and patterns of the region. It will become a way of character design that taking human-computer interaction and natural interaction as the form of technological display, and it&#x2019;s also another way to introduce and promote traditional culture. This paper takes the human-computer Interactive Technology as the starting point of showcases design, finding the problems of showcases in commercial space via investigation and research. Based on the problem analysis, it concludes the crux of the design of the current showcases and explores new design principles and applications to provide a basis for the subsequent design.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, the method of \"culture plus technology\" should be used flexibly in the design of showcases, and the cultural characteristics should be reflected in the unique history, culture, tradition and patterns of the region. It will become a way of character design that taking human-computer interaction and natural interaction as the form of technological display, and it&#x2019;s also another way to introduce and promote traditional culture. This paper takes the human-computer Interactive Technology as the starting point of showcases design, finding the problems of showcases in commercial space via investigation and research. Based on the problem analysis, it concludes the crux of the design of the current showcases and explores new design principles and applications to provide a basis for the subsequent design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, the method of \"culture plus technology\" should be used flexibly in the design of showcases, and the cultural characteristics should be reflected in the unique history, culture, tradition and patterns of the region. It will become a way of character design that taking human-computer interaction and natural interaction as the form of technological display, and it’s also another way to introduce and promote traditional culture. This paper takes the human-computer Interactive Technology as the starting point of showcases design, finding the problems of showcases in commercial space via investigation and research. Based on the problem analysis, it concludes the crux of the design of the current showcases and explores new design principles and applications to provide a basis for the subsequent design.", "fno": "036700a055", "keywords": [ "Human Computer Interaction", "Humanities", "User Centred Design", "Character Design", "Natural Interaction", "Technological Display", "Traditional Culture", "Human Computer Interactive Technology", "Showcases Design", "Design Principles", "Culture Plus Technology", "Cultural Characteristics", "Unique History", "Human Computer Interaction", "Technological Innovation", "Propulsion", "Market Research", "History", "Cultural Differences", "Commercial Space", "Interactive Showcases Design", "Integration Of Culture And Technology" ], "authors": [ { "affiliation": "Wuhan Institute of Design and Sciences,Wuhan,China", "fullName": "Jing Wang", "givenName": "Jing", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Institute of Design and Sciences,Wuhan,China", "fullName": "Yi Wen Chen", "givenName": "Yi Wen", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Institute of Design and Sciences,Wuhan,China", "fullName": "Han Zhong", "givenName": "Han", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Institute of Design and Sciences,Wuhan,China", "fullName": "Ang Wang", "givenName": "Ang", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciddt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "55-58", "year": "2020", "issn": null, "isbn": "978-1-6654-0367-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "036700a049", "articleId": "1wutKasToR2", "__typename": "AdjacentArticleType" }, "next": { "fno": "036700a059", "articleId": "1wutIkuF4OY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mines/2009/3843/2/3843b046", "title": "Computer-Human Interaction: The Principles of User Interface in Chinese Website Design", "doi": null, "abstractUrl": "/proceedings-article/mines/2009/3843b046/12OmNBDQbnO", "parentPublication": { "id": "proceedings/mines/2009/3843/2", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccae/2009/3569/0/3569a230", "title": "Human-Computer Interaction: Process and Principles of Human-Computer Interface Design", "doi": null, "abstractUrl": "/proceedings-article/iccae/2009/3569a230/12OmNrJAdRj", "parentPublication": { "id": "proceedings/iccae/2009/3569/0", "title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2011/4689/0/06363394", "title": "How to Apply Context-Awareness in an Adaptive e-Learning Environment to Improve Personalization Capabilities?", "doi": null, "abstractUrl": "/proceedings-article/sccc/2011/06363394/12OmNvEQset", "parentPublication": { "id": "proceedings/sccc/2011/4689/0", "title": "2011 30th International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icrccs/2009/3927/0/3927a229", "title": "Realization of Human-Computer Interaction Functions in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icrccs/2009/3927a229/12OmNvT2piU", "parentPublication": { "id": "proceedings/icrccs/2009/3927/0", "title": "Research Challenges in Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04285082", "title": "Human-Centered Multimedia E-Learning System for Real-Time Interactive Distance Education", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04285082/12OmNwEJ0Uv", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2021/2186/0/218600a231", "title": "Design and Implementation of China&#x0027;s Ancient Silk Road Platform Based on Human-Computer Interaction", "doi": null, "abstractUrl": "/proceedings-article/icaice/2021/218600a231/1Et4Hri1Ik0", "parentPublication": { "id": "proceedings/icaice/2021/2186/0", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2023/01/09899717", "title": "Virtual Reality: A Journey From Vision to Commodity", "doi": null, "abstractUrl": "/magazine/an/2023/01/09899717/1GSnzBdV2SY", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2019/4528/0/452800a575", "title": "Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive Media", "doi": null, "abstractUrl": "/proceedings-article/dsc/2019/452800a575/1fHjMnWrh1m", "parentPublication": { "id": "proceedings/dsc/2019/4528/0", "title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2021/01/09321524", "title": "From Lapel Pins to Coffee Cups: Links Between Corporate and Material Culture, Lessons From IBM", "doi": null, "abstractUrl": "/magazine/an/2021/01/09321524/1qmbj3jYUJa", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a567", "title": "The Developments and Prospects of Integration of Culture and Sci-tech in China", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a567/1ziPnvEecKY", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCwUmAi", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNAJ4pfS", "doi": "10.1109/JCDL.2004.240063", "title": "Capturing content for virtual museums: from pieces to exhibits", "normalizedTitle": "Capturing content for virtual museums: from pieces to exhibits", "abstract": "Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This poster describes a novel method for digitally recording not only individual museum pieces, but entire museum exhibits (consisting of one or more rooms or spaces). The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique are described. This work is part of the Virseum project (http://ils.unc.edu/bmh/virseum) at the School of Information and Library Science at the University of North Carolina at Chapel Hill (UNC). In addition to the standard capture of items and exhibits for virtual access, this methodology opens the door for many other applications, including the design of virtual (never physically implemented) exhibits and pieces.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This poster describes a novel method for digitally recording not only individual museum pieces, but entire museum exhibits (consisting of one or more rooms or spaces). The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique are described. This work is part of the Virseum project (http://ils.unc.edu/bmh/virseum) at the School of Information and Library Science at the University of North Carolina at Chapel Hill (UNC). In addition to the standard capture of items and exhibits for virtual access, this methodology opens the door for many other applications, including the design of virtual (never physically implemented) exhibits and pieces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This poster describes a novel method for digitally recording not only individual museum pieces, but entire museum exhibits (consisting of one or more rooms or spaces). The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique are described. This work is part of the Virseum project (http://ils.unc.edu/bmh/virseum) at the School of Information and Library Science at the University of North Carolina at Chapel Hill (UNC). In addition to the standard capture of items and exhibits for virtual access, this methodology opens the door for many other applications, including the design of virtual (never physically implemented) exhibits and pieces.", "fno": "01336158", "keywords": [ "Layout", "Software Libraries", "Visualization", "Virtual Reality", "Computer Displays", "Art", "Internet", "Human Computer Interaction", "Subspace Constraints", "Documentation" ], "authors": [ { "affiliation": "Sch. of Inf. & Libr. Sci., North Carolina Univ., Chapel Hill, NC, USA", "fullName": "B. Hemminger", "givenName": "B.", "surname": "Hemminger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "G. Bolas", "givenName": "G.", "surname": "Bolas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. Carr", "givenName": "D.", "surname": "Carr", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "P. Jones", "givenName": "P.", "surname": "Jones", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. Schiff", "givenName": "D.", "surname": "Schiff", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "N. England", "givenName": "N.", "surname": "England", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "379", "year": "2004", "issn": null, "isbn": "1-58113-832-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01336157", "articleId": "12OmNxd4tvj", "__typename": "AdjacentArticleType" }, "next": { "fno": "01336159", "articleId": "12OmNyGbIa0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2015/7644/0/7644a568", "title": "New Approach of Museums Information Dissemination in the Digital Age - Taking the Development and Design of Museum APP as an Example", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a568/12OmNqEji0N", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialsens/2018/6165/0/616501a038", "title": "5 Steps to Make Art Museums Tweet Influentially", "doi": null, "abstractUrl": "/proceedings-article/socialsens/2018/616501a038/12OmNx0A7Cz", "parentPublication": { "id": "proceedings/socialsens/2018/6165/0", "title": "2018 International Workshop on Social Sensing (SocialSens)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2014/4677/0/4677a377", "title": "A New Virtual Museum Equipped with Automatic Video Content Generator", "doi": null, "abstractUrl": "/proceedings-article/cw/2014/4677a377/12OmNxVlTMk", "parentPublication": { "id": "proceedings/cw/2014/4677/0", "title": "2014 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2011/4532/0/4532a057", "title": "A Multichannel Information System to Build and Deliver Rich User-Experiences in Exhibits and Museums", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2011/4532a057/12OmNxeutat", "parentPublication": { "id": "proceedings/bwcca/2011/4532/0", "title": "2011 International Conference on Broadband and Wireless Computing, Communication and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2013/3211/0/3211a408", "title": "SmARTweet: A Location-Based Smart Application for Exhibits and Museums", "doi": null, "abstractUrl": "/proceedings-article/sitis/2013/3211a408/12OmNyKrH9C", "parentPublication": { "id": "proceedings/sitis/2013/3211/0", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336227", "title": "Visiting virtual reality museum exhibits", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336227/12OmNyTOssS", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visapp/2014/8133/3/07295086", "title": "Towards a more effective way of presenting Virtual Reality museums exhibits", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295086/12OmNyyeWxZ", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a237", "title": "Bringing Museums to Juvenile Prison Inmates through Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a237/1KmF7KbR0Pu", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a225", "title": "Toward inclusivity: Virtual reality museums for the visually impaired", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a225/1KmF9FKnXyg", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a513", "title": "Deepfake Portraits in Augmented Reality for Museum Exhibits", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a513/1yeQTODhIJ2", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvnwVnk", "title": "2018 IEEE 36th VLSI Test Symposium (VTS)", "acronym": "vts", "groupId": "1000804", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNAolGVh", "doi": "10.1109/VTS.2018.8368668", "title": "Innovative practices on design & test for flexible hybrid electronics", "normalizedTitle": "Innovative practices on design & test for flexible hybrid electronics", "abstract": "The IP session focuses on design and test aspects of emerging flexible hybrid electronics (FHE). The first contribution discusses process design kit for flexible hybrid electronics. The second presentation identifies challenges of FHE design and test as well as application examples and future opportunities. The last contribution discusses design and test considerations for FHE including a proof-of-concept demonstration using proprietary FHE technologies.", "abstracts": [ { "abstractType": "Regular", "content": "The IP session focuses on design and test aspects of emerging flexible hybrid electronics (FHE). The first contribution discusses process design kit for flexible hybrid electronics. The second presentation identifies challenges of FHE design and test as well as application examples and future opportunities. The last contribution discusses design and test considerations for FHE including a proof-of-concept demonstration using proprietary FHE technologies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The IP session focuses on design and test aspects of emerging flexible hybrid electronics (FHE). The first contribution discusses process design kit for flexible hybrid electronics. The second presentation identifies challenges of FHE design and test as well as application examples and future opportunities. The last contribution discusses design and test considerations for FHE including a proof-of-concept demonstration using proprietary FHE technologies.", "fno": "08368668", "keywords": [ "Process Design", "Integrated Circuit Modeling", "Wearable Sensors", "Internet Of Things", "Design Automation", "Tools", "Layout" ], "authors": [ { "affiliation": "Hewlett Packard Labs, USA", "fullName": "Tsung-Ching Jim Huang", "givenName": "Tsung-Ching Jim", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "NextFlex, USA", "fullName": "Jason Marsh", "givenName": "Jason", "surname": "Marsh", "__typename": "ArticleAuthorType" }, { "affiliation": "Micross Components USA", "fullName": "Scott H. Goodwin", "givenName": "Scott H.", "surname": "Goodwin", "__typename": "ArticleAuthorType" }, { "affiliation": "RTI International, USA", "fullName": "Dorota S. Temple", "givenName": "Dorota S.", "surname": "Temple", "__typename": "ArticleAuthorType" }, { "affiliation": "Hewlett Packard Labs, USA", "fullName": "Tsung-Ching Jim Huang", "givenName": "Tsung-Ching Jim", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "vts", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2018", "issn": "2375-1053", "isbn": "978-1-5386-3774-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08368667", "articleId": "12OmNqI04Rl", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vts/2010/6649/0/05469610", "title": "Design, analysis, and test of low-power and reliable flexible electronics", "doi": null, "abstractUrl": "/proceedings-article/vts/2010/05469610/12OmNArtha1", "parentPublication": { "id": "proceedings/vts/2010/6649/0", "title": "2010 28th VLSI Test Symposium (VTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/delta/2004/2081/0/01409809", "title": "Testability issues in superconductor electronics", "doi": null, "abstractUrl": "/proceedings-article/delta/2004/01409809/12OmNqEji13", "parentPublication": { "id": "proceedings/delta/2004/2081/0", "title": "Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1980/020/0/01585281", "title": "The Electronics Engineer's Design Station", "doi": null, "abstractUrl": "/proceedings-article/dac/1980/01585281/12OmNyXMQki", "parentPublication": { "id": "proceedings/dac/1980/020/0", "title": "17th Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2010/7054/0/05457220", "title": "Pseudo-CMOS: A novel design style for flexible electronics", "doi": null, "abstractUrl": "/proceedings-article/date/2010/05457220/12OmNyfdOJg", "parentPublication": { "id": "proceedings/date/2010/7054/0", "title": "2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/test/1989/9999/0/00082367", "title": "Flexible, high-performance pin electronics implementation", "doi": null, "abstractUrl": "/proceedings-article/test/1989/00082367/12OmNz6iOlc", "parentPublication": { "id": "proceedings/test/1989/9999/0", "title": "1989 International Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2011/12/05608541", "title": "High productivity circuit methodology for a semi-custom embedded processor", "doi": null, "abstractUrl": "/journal/si/2011/12/05608541/13rRUNvgz1E", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/dt/2011/06/mdt2011060008", "title": "Robust Circuit Design for Flexible Electronics", "doi": null, "abstractUrl": "/magazine/dt/2011/06/mdt2011060008/13rRUyuegkS", "parentPublication": { "id": "mags/dt", "title": "IEEE Design & Test of Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/dt/2011/06/mdt2011060004", "title": "The Promise of Flexible Electronics", "doi": null, "abstractUrl": "/magazine/dt/2011/06/mdt2011060004/13rRUyuvRt0", "parentPublication": { "id": "mags/dt", "title": "IEEE Design & Test of Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/2018/9466/0/946600a191", "title": "A Monobit Built-In Test and Diagnostic System for Flexible Electronic Interconnect", "doi": null, "abstractUrl": "/proceedings-article/ats/2018/946600a191/17D45Xh13v4", "parentPublication": { "id": "proceedings/ats/2018/9466/0", "title": "2018 IEEE 27th Asian Test Symposium (ATS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vts/2019/1170/0/08758661", "title": "Optimized Stress Testing for Flexible Hybrid Electronics Designs", "doi": null, "abstractUrl": "/proceedings-article/vts/2019/08758661/1bzYBqXPR0k", "parentPublication": { "id": "proceedings/vts/2019/1170/0", "title": "2019 IEEE 37th VLSI Test Symposium (VTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZX1", "title": "2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "acronym": "iiki", "groupId": "1805504", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNC943Pu", "doi": "10.1109/IIKI.2016.89", "title": "Processing and Mining of Multi-source Scientific and Technical Literature Data", "normalizedTitle": "Processing and Mining of Multi-source Scientific and Technical Literature Data", "abstract": "Compared with the traditional multi-source data, the data of scientific and technical literature are mainly based on different scientific and technological documents. Their contents are more emphasis on technical and correlation. The paper took the data of scientific and technical periodical papers, patent and scientific and technical policies as examples, described the characteristics of data about multi-source scientific and technical literature, the method of data processing. And it introduced the author's research work on data processing and analysis for multi-source scientific and technical literature. Experiments showed that proposed model and method in the paper had certain effect. It was necessary to explore the application of multi-source scientific and technical literature.", "abstracts": [ { "abstractType": "Regular", "content": "Compared with the traditional multi-source data, the data of scientific and technical literature are mainly based on different scientific and technological documents. Their contents are more emphasis on technical and correlation. The paper took the data of scientific and technical periodical papers, patent and scientific and technical policies as examples, described the characteristics of data about multi-source scientific and technical literature, the method of data processing. And it introduced the author's research work on data processing and analysis for multi-source scientific and technical literature. Experiments showed that proposed model and method in the paper had certain effect. It was necessary to explore the application of multi-source scientific and technical literature.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Compared with the traditional multi-source data, the data of scientific and technical literature are mainly based on different scientific and technological documents. Their contents are more emphasis on technical and correlation. The paper took the data of scientific and technical periodical papers, patent and scientific and technical policies as examples, described the characteristics of data about multi-source scientific and technical literature, the method of data processing. And it introduced the author's research work on data processing and analysis for multi-source scientific and technical literature. Experiments showed that proposed model and method in the paper had certain effect. It was necessary to explore the application of multi-source scientific and technical literature.", "fno": "5952a010", "keywords": [ "Data Mining", "Document Handling", "Patents", "Public Domain Software", "Technical Literature Data", "Traditional Multisource Data", "Scientific Literature", "Different Scientific Documents", "Technological Documents", "Technical Correlation", "Patent", "Data Processing", "Patents", "Indexes", "Correlation", "Data Processing", "Internet", "Libraries", "Multi Source", "Scientific And Technical Literature", "Big Data" ], "authors": [ { "affiliation": null, "fullName": "Wen Zeng", "givenName": "Wen", "surname": "Zeng", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiki", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "10-13", "year": "2016", "issn": null, "isbn": "978-1-5090-5952-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5952a004", "articleId": "12OmNqI04On", "__typename": "AdjacentArticleType" }, "next": { "fno": "5952a014", "articleId": "12OmNy5zsvF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iiki/2016/5952/0/5952a079", "title": "Literature-Based Scientific Research Event Model", "doi": null, "abstractUrl": "/proceedings-article/iiki/2016/5952a079/12OmNqBKUcD", "parentPublication": { "id": "proceedings/iiki/2016/5952/0", "title": "2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2017/3861/0/07991622", "title": "Scholarly Data Mining: Making Sense of Scientific Literature", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2017/07991622/12OmNqGA5fq", "parentPublication": { "id": "proceedings/jcdl/2017/3861/0", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2018/5119/0/511901a001", "title": "A Mining and Visualizing System for Large-Scale Chinese Technical Standards", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2018/511901a001/12OmNvkpliU", "parentPublication": { "id": "proceedings/bigdataservice/2018/5119/0", "title": "2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796921", "title": "Mining Research Problems from Scientific Literature", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796921/12OmNwwd2ZO", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004466", "title": "Knowledge based dimensionality reduction for technical text mining", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004466/12OmNzdoMT3", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2015/8297/0/8297a307", "title": "Citation Impact Categorization: For Scientific Literature", "doi": null, "abstractUrl": "/proceedings-article/cse/2015/8297a307/12OmNzwpU3C", "parentPublication": { "id": "proceedings/cse/2015/8297/0", "title": "2015 IEEE 18th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/09/07570239", "title": "A Survey on Visual Approaches for Analyzing Scientific Literature and Patents", "doi": null, "abstractUrl": "/journal/tg/2017/09/07570239/13rRUB7a115", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1996/05/r5028", "title": "Federating Diverse Collections of Scientific Literature", "doi": null, "abstractUrl": "/magazine/co/1996/05/r5028/13rRUwjXZMV", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2018/0441/0/08703870", "title": "Exploration on Chinese Term Recognition and Semantic Analysis of Scientific &#x0026; Technical Literature", "doi": null, "abstractUrl": "/proceedings-article/skg/2018/08703870/19JEdgqcMUM", "parentPublication": { "id": "proceedings/skg/2018/0441/0", "title": "2018 14th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2020/6698/0/669800a870", "title": "Data Visualization for Making Sense of Scientific Literature", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2020/669800a870/1kuHK1dn6ko", "parentPublication": { "id": "proceedings/icitbs/2020/6698/0", "title": "2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrF2DIa", "title": "2017 21st International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8fihf", "doi": "10.1109/iV.2017.65", "title": "Acceptance and Usability of Interactive Infographics in Online Newspapers", "normalizedTitle": "Acceptance and Usability of Interactive Infographics in Online Newspapers", "abstract": "Interactive infographics are a powerful tool to represent and communicate complex information. In datadriven journalism journalists use interactive infographics to explain new insights and facts while telling complex stories on the basis of retrieved data. However, readers of online news are still unexperienced while using interactive infographics. The results of a user survey among readers of online newspapers show how readers use and interact with interactive infographics in online newspapers. To improve the acceptance among users and to identify success factors of their utilization the results of a usability study of interactive infographics are presented.", "abstracts": [ { "abstractType": "Regular", "content": "Interactive infographics are a powerful tool to represent and communicate complex information. In datadriven journalism journalists use interactive infographics to explain new insights and facts while telling complex stories on the basis of retrieved data. However, readers of online news are still unexperienced while using interactive infographics. The results of a user survey among readers of online newspapers show how readers use and interact with interactive infographics in online newspapers. To improve the acceptance among users and to identify success factors of their utilization the results of a usability study of interactive infographics are presented.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Interactive infographics are a powerful tool to represent and communicate complex information. In datadriven journalism journalists use interactive infographics to explain new insights and facts while telling complex stories on the basis of retrieved data. However, readers of online news are still unexperienced while using interactive infographics. The results of a user survey among readers of online newspapers show how readers use and interact with interactive infographics in online newspapers. To improve the acceptance among users and to identify success factors of their utilization the results of a usability study of interactive infographics are presented.", "fno": "0831a176", "keywords": [ "Communication Complexity", "Electronic Publishing", "Information Retrieval", "Interactive Systems", "Internet", "Online Newspapers", "Interactive Infographics", "Complex Information", "Datadriven Journalism Journalists", "Retrieved Data", "Usability Study", "Tools", "Usability", "Navigation", "Visualization", "Data Visualization", "Media", "Interactive Infographics", "Information Graphics", "Information Visualization", "Interaction", "Data Driven Journalism", "Online Journalism", "Online Newspaper", "Usability", "Success Factor" ], "authors": [ { "affiliation": null, "fullName": "Sandra Zwinger", "givenName": "Sandra", "surname": "Zwinger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Julia Langer", "givenName": "Julia", "surname": "Langer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael Zeiller", "givenName": "Michael", "surname": "Zeiller", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "176-181", "year": "2017", "issn": "2375-0138", "isbn": "978-1-5386-0831-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0831a170", "articleId": "12OmNyQph8I", "__typename": "AdjacentArticleType" }, "next": { "fno": "0831a182", "articleId": "12OmNAGw15i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2016/9041/0/9041a366", "title": "Infographics or Graphics+Text: Which Material is Best for Robust Learning?", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a366/12OmNAgGwfh", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a401", "title": "Scrollytelling – An Analysis of Visual Storytelling in Online Journalism", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a401/17D45XfSETg", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a056", "title": "Automatic Infogram Generation for Online Journalism", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a056/1cMFaoRMwYE", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08813126", "title": "Text-to-Viz: Automatic Generation of Infographics from Proportion-Related Natural Language Statements", "doi": null, "abstractUrl": "/journal/tg/2020/01/08813126/1cOhCUrVI1G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028528", "title": "Infographics as a Reflective Assignment Method in Requirements Engineering e-Course?", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028528/1iffsAh8t7a", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09233469", "title": "Retrieve-Then-Adapt: Example-based Automatic Generation for Proportion-related Infographics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09233469/1o52VTez1QY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274229", "title": "Learning via Summarizing Infographics Assignment in Software Engineering Management e-Course?", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274229/1phRJWVdOHC", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a031", "title": "Parsing and Summarizing Infographics with Synthetically Trained Icon Detection", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a031/1tTts9CdeyQ", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09444798", "title": "InfoColorizer: Interactive Recommendation of Color Palettes for Infographics", "doi": null, "abstractUrl": "/journal/tg/2022/12/09444798/1u51zekYoA8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552591", "title": "Interactive Data Comics", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552591/1xibWdHwteo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCwUmAi", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNyTOssS", "doi": "10.1109/JCDL.2004.240087", "title": "Visiting virtual reality museum exhibits", "normalizedTitle": "Visiting virtual reality museum exhibits", "abstract": "Summary form only given. Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This exhibit demonstrates a novel method for digitally recording entire museum exhibits and allowing them to be explored in virtual reality. The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects as recorded by a laser range finder. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique is demonstrated on a laptop PC. Visitors to the demonstration are able to learn about the process of digitizing 3D environments like museum exhibits and creating virtual reality environments from them. Place themselves in one of three virtual reality exhibits and explore the multiple rooms and artifacts comprising the exhibits (Ackland Art Museum, living room, Clue murder scene).", "abstracts": [ { "abstractType": "Regular", "content": "Summary form only given. Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This exhibit demonstrates a novel method for digitally recording entire museum exhibits and allowing them to be explored in virtual reality. The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects as recorded by a laser range finder. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique is demonstrated on a laptop PC. Visitors to the demonstration are able to learn about the process of digitizing 3D environments like museum exhibits and creating virtual reality environments from them. Place themselves in one of three virtual reality exhibits and explore the multiple rooms and artifacts comprising the exhibits (Ackland Art Museum, living room, Clue murder scene).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Summary form only given. Virtual museums provide ways to capture the content of a real museum in a digital (electronic) form and make this digital form more universally available. This exhibit demonstrates a novel method for digitally recording entire museum exhibits and allowing them to be explored in virtual reality. The methodology allows anyone with access to the Internet or a PC to experience anywhere, anytime, any part of the museum's collection or exhibits (past, present and future). Users can explore the museum exhibits in a virtual reality that is both spatially accurate and visually compelling. All objects and 3D scenes are seen in precise full color photographic quality detail. The scene and objects are polygonal meshes representing the surfaces of objects as recorded by a laser range finder. This permits making measurements directly on the scene with millimeter precision. The methodology, its application to capturing museum exhibits, and examples of exhibits recorded using this technique is demonstrated on a laptop PC. Visitors to the demonstration are able to learn about the process of digitizing 3D environments like museum exhibits and creating virtual reality environments from them. Place themselves in one of three virtual reality exhibits and explore the multiple rooms and artifacts comprising the exhibits (Ackland Art Museum, living room, Clue murder scene).", "fno": "01336227", "keywords": [ "Virtual Reality", "Layout", "Art", "Software Libraries", "Internet", "Surface Emitting Lasers", "Portable Computers", "Human Computer Interaction", "Documentation", "Algorithm Design And Analysis" ], "authors": [ { "affiliation": "Sch. of Inf. & Libr. Sci., North Carolina Univ., Chapel Hill, NC, USA", "fullName": "B. Hemminger", "givenName": "B.", "surname": "Hemminger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "G. Bolas", "givenName": "G.", "surname": "Bolas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. Schiff", "givenName": "D.", "surname": "Schiff", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "423", "year": "2004", "issn": null, "isbn": "1-58113-832-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01336226", "articleId": "12OmNzzfTlH", "__typename": "AdjacentArticleType" }, "next": { "fno": "01336228", "articleId": "12OmNrY3Lqo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2004/832/0/01336158", "title": "Capturing content for virtual museums: from pieces to exhibits", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336158/12OmNAJ4pfS", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icce/2002/1509/0/15091139", "title": "Development of Internet Virtual Butterfly Museum", "doi": null, "abstractUrl": "/proceedings-article/icce/2002/15091139/12OmNqJZgEO", "parentPublication": { "id": "proceedings/icce/2002/1509/0", "title": "Computers in Education, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2018/6580/0/658001a144", "title": "On the Interactive Display of Virtual Aerospace Museum Based on Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icris/2018/658001a144/12OmNqzu6Oe", "parentPublication": { "id": "proceedings/icris/2018/6580/0", "title": "2018 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2016/1552/0/07574692", "title": "Creating new museum experiences for virtual reality", "doi": null, "abstractUrl": "/proceedings-article/icmew/2016/07574692/12OmNxVDuPe", "parentPublication": { "id": "proceedings/icmew/2016/1552/0", "title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsps/2009/3654/0/3654a606", "title": "X3D-Based Virtual Reality Experiences in Water Museum Exhibitions", "doi": null, "abstractUrl": "/proceedings-article/icsps/2009/3654a606/12OmNyXMQeH", "parentPublication": { "id": "proceedings/icsps/2009/3654/0", "title": "2009 International Conference on Signal Processing Systems (ICSPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmso/2008/3484/0/3484a372", "title": "Research on Chinese Museum Design Based on Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/wmso/2008/3484a372/12OmNyfdOUP", "parentPublication": { "id": "proceedings/wmso/2008/3484/0", "title": "Modelling, Simulation and Optimization, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visapp/2014/8133/3/07295086", "title": "Towards a more effective way of presenting Virtual Reality museums exhibits", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295086/12OmNyyeWxZ", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446581", "title": "VR Touch Museum", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446581/13bd1fKQxrI", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200b021", "title": "Design of 3D Exhibition Hall System of Art Museum Based On Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200b021/1BmO4qNyqR2", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a513", "title": "Deepfake Portraits in Augmented Reality for Museum Exhibits", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a513/1yeQTODhIJ2", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRouq", "doi": "10.1109/BigData.2017.8257958", "title": "Universal distant reading through metadata proxies with archivespark", "normalizedTitle": "Universal distant reading through metadata proxies with archivespark", "abstract": "Digitization and the large-scale preservation of digitized content have engendered new ways of accessing and analyzing collections concurrent with other data mining and extraction efforts. Distant reading refers to the analysis of entire collections instead of close reading individual items like a single physical book or electronic document. The steps performed in distant reading are often common across various types of data collections like books, journals, or web archives, sources that are very valuable and have often been neglected as Big Data. We have extended our tool ArchiveSpark, originally designed to efficiently process Web archives, in order to support arbitrary data collections being served from either local or remote data sources by using metadata proxies. The ability to share and reuse researcher workflows across disciplines with very different datasets makes ArchiveSpark a universal distant reading framework. In this paper, we describe ArchiveSpark's design extensions along an example of how it can be leveraged to analyze symptoms of Polio mentioned in journals from the Medical Heritage Library. Our experiments demonstrate how users can reuse large portions of their job pipeline to accomplish a specific task across diverse data types and sources. Migrating an ArchiveSpark job to process a different dataset introduces an additional average code complexity of only 4.8%. Its expressiveness, scalability, extensibility, reusability, and efficiency has the potential to advance novel and rich methods of scholarly inquiry.", "abstracts": [ { "abstractType": "Regular", "content": "Digitization and the large-scale preservation of digitized content have engendered new ways of accessing and analyzing collections concurrent with other data mining and extraction efforts. Distant reading refers to the analysis of entire collections instead of close reading individual items like a single physical book or electronic document. The steps performed in distant reading are often common across various types of data collections like books, journals, or web archives, sources that are very valuable and have often been neglected as Big Data. We have extended our tool ArchiveSpark, originally designed to efficiently process Web archives, in order to support arbitrary data collections being served from either local or remote data sources by using metadata proxies. The ability to share and reuse researcher workflows across disciplines with very different datasets makes ArchiveSpark a universal distant reading framework. In this paper, we describe ArchiveSpark's design extensions along an example of how it can be leveraged to analyze symptoms of Polio mentioned in journals from the Medical Heritage Library. Our experiments demonstrate how users can reuse large portions of their job pipeline to accomplish a specific task across diverse data types and sources. Migrating an ArchiveSpark job to process a different dataset introduces an additional average code complexity of only 4.8%. Its expressiveness, scalability, extensibility, reusability, and efficiency has the potential to advance novel and rich methods of scholarly inquiry.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Digitization and the large-scale preservation of digitized content have engendered new ways of accessing and analyzing collections concurrent with other data mining and extraction efforts. Distant reading refers to the analysis of entire collections instead of close reading individual items like a single physical book or electronic document. The steps performed in distant reading are often common across various types of data collections like books, journals, or web archives, sources that are very valuable and have often been neglected as Big Data. We have extended our tool ArchiveSpark, originally designed to efficiently process Web archives, in order to support arbitrary data collections being served from either local or remote data sources by using metadata proxies. The ability to share and reuse researcher workflows across disciplines with very different datasets makes ArchiveSpark a universal distant reading framework. In this paper, we describe ArchiveSpark's design extensions along an example of how it can be leveraged to analyze symptoms of Polio mentioned in journals from the Medical Heritage Library. Our experiments demonstrate how users can reuse large portions of their job pipeline to accomplish a specific task across diverse data types and sources. Migrating an ArchiveSpark job to process a different dataset introduces an additional average code complexity of only 4.8%. Its expressiveness, scalability, extensibility, reusability, and efficiency has the potential to advance novel and rich methods of scholarly inquiry.", "fno": "08257958", "keywords": [ "Metadata", "Libraries", "Tools", "Internet", "Indexes", "Big Data", "Data Mining", "Digital Libraries", "Web Archives", "Distant Reading" ], "authors": [ { "affiliation": "L3S Research Center, Appelstr. 9a, 30167 Hannover, Germany", "fullName": "Helge Holzmann", "givenName": "Helge", "surname": "Holzmann", "__typename": "ArticleAuthorType" }, { "affiliation": "Internet Archive, 300 Funston Avenue, San Francisco, CA 94118, USA", "fullName": "Vinay Goel", "givenName": "Vinay", "surname": "Goel", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for the History of Medicine, Francis A. Countway Library of Medicine, 10 Shattuck Street, Boston, MA 02115, USA", "fullName": "Emily Novak Gustainis", "givenName": "Emily Novak", "surname": "Gustainis", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "459-464", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08257957", "articleId": "17D45WHONss", "__typename": "AdjacentArticleType" }, "next": { "fno": "08257959", "articleId": "17D45XcttlI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2016/9005/0/07840790", "title": "Change detection and classification of digital collections", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840790/12OmNBPc8An", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840983", "title": "Traces through time: A probabilistic approach to connected archival data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840983/12OmNxEBzkm", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017606", "title": "Active Reading of Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017606/13rRUyYSWl5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2017/1996/0/08029356", "title": "TeenRead: An Adolescents Reading Recommendation System Towards Online Bibliotherapy", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2017/08029356/17D45W9KVHC", "parentPublication": { "id": "proceedings/bigdata-congress/2017/1996/0", "title": "2017 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671715", "title": "An AI-Assisted Framework for Rapid Conversion of Descriptive Photo Metadata into Linked Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671715/1A8j1vU9Q8E", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020957", "title": "A Data-Driven Approach to Reparative Description at the University of Chicago", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020957/1KfSKPE54mA", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2019/1547/0/154700a001", "title": "Automatic Generation of Initial Reading Lists: Requirements and Solutions", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2019/154700a001/1ckrH7fKKe4", "parentPublication": { "id": "proceedings/jcdl/2019/1547/0", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09152170", "title": "TransVis: Integrated Distant and Close Reading of Othello Translations", "doi": null, "abstractUrl": "/journal/tg/2022/02/09152170/1lRhwZDVlpm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2020/9153/0/915300a030", "title": "Visualizing a Large Spatiotemporal Collection of Historic Photography with a Generous Interface", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2020/915300a030/1pZ0XvrgcQE", "parentPublication": { "id": "proceedings/vis4dh/2020/9153/0", "title": "2020 IEEE 5th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378493", "title": "Feature-based Distant Domain Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378493/1s64LqlWKu4", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ckrD0rVw1q", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ckrICw7mWk", "doi": "10.1109/JCDL.2019.00110", "title": "Warclight: A Rails Engine for Web Archive Discovery", "normalizedTitle": "Warclight: A Rails Engine for Web Archive Discovery", "abstract": "This paper describes the development of Warclight, a portmanteau of the open-source Blacklight platform and the ISO-standard Web ARChive file format. Warclight allows users to explore web archives that have been indexed into Apache Solr using the UK Web Archive's Web Archive Discovery tool. Referencing previous work, we explain how the standard search engine results page is inadequate to support scholarly inquiries. Instead, Warclight provides full-text and faceted search, as well as faceted browsing, to enable exploration and discovery. Given the large sizes of many web archives, we share experiences with deploying our tool at scale using a federated architecture.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the development of Warclight, a portmanteau of the open-source Blacklight platform and the ISO-standard Web ARChive file format. Warclight allows users to explore web archives that have been indexed into Apache Solr using the UK Web Archive's Web Archive Discovery tool. Referencing previous work, we explain how the standard search engine results page is inadequate to support scholarly inquiries. Instead, Warclight provides full-text and faceted search, as well as faceted browsing, to enable exploration and discovery. Given the large sizes of many web archives, we share experiences with deploying our tool at scale using a federated architecture.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the development of Warclight, a portmanteau of the open-source Blacklight platform and the ISO-standard Web ARChive file format. Warclight allows users to explore web archives that have been indexed into Apache Solr using the UK Web Archive's Web Archive Discovery tool. Referencing previous work, we explain how the standard search engine results page is inadequate to support scholarly inquiries. Instead, Warclight provides full-text and faceted search, as well as faceted browsing, to enable exploration and discovery. Given the large sizes of many web archives, we share experiences with deploying our tool at scale using a federated architecture.", "fno": "154700a442", "keywords": [ "Information Retrieval Systems", "Internet", "Search Engines", "Warclight", "Open Source Blacklight Platform", "ISO Standard Web AR Chive File Format", "Standard Search Engine Results Page", "UK Web Archive", "Rails Engine", "Web Archive Discovery Tool", "Libraries", "Tools", "Uniform Resource Locators", "Standards", "Indexes", "Internet", "Buildings", "Search", "Solr" ], "authors": [ { "affiliation": "York University Libraries", "fullName": "Nick Ruest", "givenName": "Nick", "surname": "Ruest", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo", "fullName": "Ian Milligan", "givenName": "Ian", "surname": "Milligan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo", "fullName": "Jimmy Lin", "givenName": "Jimmy", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "442-443", "year": "2019", "issn": null, "isbn": "978-1-7281-1547-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "154700a440", "articleId": "1ckrFdkQc4o", "__typename": "AdjacentArticleType" }, "next": { "fno": "154700a444", "articleId": "1ckrDSUDHmU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigdata-congress/2015/7278/0/07207302", "title": "Internet Archives as a Tool for Research: Decay in Large Scale Archival Records", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207302/12OmNB9t6jY", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2018/2659/0/265901a126", "title": "How Perceptions of Web Resource Boundaries Differ for Institutional and Personal Archives", "doi": null, "abstractUrl": "/proceedings-article/iri/2018/265901a126/12OmNBO3K7f", "parentPublication": { "id": "proceedings/iri/2018/2659/0", "title": "2018 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2004/2195/0/21950179", "title": "Semantic Web Digital Archive Integration", "doi": null, "abstractUrl": "/proceedings-article/dexa/2004/21950179/12OmNqHqSnm", "parentPublication": { "id": "proceedings/dexa/2004/2195/0", "title": "Proceedings. 15th International Workshop on Database and Expert Systems Applications, 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2012/3049/0/06274198", "title": "Data-Intensive Services for Large-Scale Archive Access", "doi": null, "abstractUrl": "/proceedings-article/scc/2012/06274198/12OmNroiiZZ", "parentPublication": { "id": "proceedings/scc/2012/3049/0", "title": "2012 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559568", "title": "ArchiveSpark: Efficient Web archive access, extraction and derivation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559568/12OmNxYtuaf", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559567", "title": "The Dawn of today's popular domains: A study of the archived German Web over 18 years", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559567/12OmNzE54Bh", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970188", "title": "Finding pages on the unarchived Web", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970188/12OmNzXnNmr", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852832", "title": "ABCDEF - The 6 key features behind scalable, multi-tenant web archive processing with ARCH: Archive, Big Data, Concurrent, Distributed, Efficient, Flexible", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852832/1FT2ltWqklG", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2019/1547/0/154700a424", "title": "Web Archive Analysis Using Hive and SparkSQL", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2019/154700a424/1ckrE2Cpj7G", "parentPublication": { "id": "proceedings/jcdl/2019/1547/0", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2019/1547/0/154700a172", "title": "MementoMap Framework for Flexible and Adaptive Web Archive Profiling", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2019/154700a172/1ckrIvYMbcc", "parentPublication": { "id": "proceedings/jcdl/2019/1547/0", "title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1h81oza1jwY", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1h81vg2L6Jq", "doi": "10.1109/ICDAR.2019.00164", "title": "Indiscapes: Instance Segmentation Networks for Layout Parsing of Historical Indic Manuscripts", "normalizedTitle": "Indiscapes: Instance Segmentation Networks for Layout Parsing of Historical Indic Manuscripts", "abstract": "Historical palm-leaf manuscript and early paper documents from Indian subcontinent form an important part of the world's literary and cultural heritage. Despite their importance, large-scale annotated Indic manuscript image datasets do not exist. To address this deficiency, we introduce Indiscapes, the first ever dataset with multi-regional layout annotations for historical Indic manuscripts. To address the challenge of large diversity in scripts and presence of dense, irregular layout elements (e.g. text lines, pictures, multiple documents per image), we adapt a Fully Convolutional Deep Neural Network architecture for fully automatic, instance-level spatial layout parsing of manuscript images. We demonstrate the effectiveness of proposed architecture on images from the Indiscapes dataset. For annotation flexibility and keeping the non-technical nature of domain experts in mind, we also contribute a custom, web-based GUI annotation tool and a dashboard-style analytics portal. Overall, our contributions set the stage for enabling downstream applications such as OCR and word-spotting in historical Indic manuscripts at scale.", "abstracts": [ { "abstractType": "Regular", "content": "Historical palm-leaf manuscript and early paper documents from Indian subcontinent form an important part of the world's literary and cultural heritage. Despite their importance, large-scale annotated Indic manuscript image datasets do not exist. To address this deficiency, we introduce Indiscapes, the first ever dataset with multi-regional layout annotations for historical Indic manuscripts. To address the challenge of large diversity in scripts and presence of dense, irregular layout elements (e.g. text lines, pictures, multiple documents per image), we adapt a Fully Convolutional Deep Neural Network architecture for fully automatic, instance-level spatial layout parsing of manuscript images. We demonstrate the effectiveness of proposed architecture on images from the Indiscapes dataset. For annotation flexibility and keeping the non-technical nature of domain experts in mind, we also contribute a custom, web-based GUI annotation tool and a dashboard-style analytics portal. Overall, our contributions set the stage for enabling downstream applications such as OCR and word-spotting in historical Indic manuscripts at scale.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Historical palm-leaf manuscript and early paper documents from Indian subcontinent form an important part of the world's literary and cultural heritage. Despite their importance, large-scale annotated Indic manuscript image datasets do not exist. To address this deficiency, we introduce Indiscapes, the first ever dataset with multi-regional layout annotations for historical Indic manuscripts. To address the challenge of large diversity in scripts and presence of dense, irregular layout elements (e.g. text lines, pictures, multiple documents per image), we adapt a Fully Convolutional Deep Neural Network architecture for fully automatic, instance-level spatial layout parsing of manuscript images. We demonstrate the effectiveness of proposed architecture on images from the Indiscapes dataset. For annotation flexibility and keeping the non-technical nature of domain experts in mind, we also contribute a custom, web-based GUI annotation tool and a dashboard-style analytics portal. Overall, our contributions set the stage for enabling downstream applications such as OCR and word-spotting in historical Indic manuscripts at scale.", "fno": "301400a999", "keywords": [ "Convolutional Neural Nets", "Document Image Processing", "Graphical User Interfaces", "History", "Image Classification", "Image Segmentation", "Learning Artificial Intelligence", "Optical Character Recognition", "Text Analysis", "Instance Segmentation Networks", "Historical Indic Manuscripts", "Historical Palm Leaf Manuscript", "Early Paper Documents", "Indian Subcontinent", "Indic Manuscript Image Datasets", "Multiregional Layout Annotations", "Dense Layout Elements", "Irregular Layout Elements", "Fully Convolutional Deep Neural Network Architecture", "Fully Automatic Instance Level Spatial Layout Parsing", "Indiscapes Dataset", "Cultural Heritage", "Annotation Flexibility", "Domain Experts", "Web Based GUI Annotation Tool", "OCR", "Word Spotting", "Layout", "Tools", "Degradation", "Feature Extraction", "Semantics", "Image Segmentation", "Libraries", "Document Layout Parsing", "Palm Leaf Manuscripts", "Semantic Instance Segmentation", "Deep Networks", "Indic" ], "authors": [ { "affiliation": "International Institute of Information Technology, Hyderabad (IIIT-H)", "fullName": "Abhishek Prusty", "givenName": "Abhishek", "surname": "Prusty", "__typename": "ArticleAuthorType" }, { "affiliation": "International Institute of Information Technology, Hyderabad (IIIT-H)", "fullName": "Sowmya Aitha", "givenName": "Sowmya", "surname": "Aitha", "__typename": "ArticleAuthorType" }, { "affiliation": "International Institute of Information Technology, Hyderabad (IIIT-H)", "fullName": "Abhishek Trivedi", "givenName": "Abhishek", "surname": "Trivedi", "__typename": "ArticleAuthorType" }, { "affiliation": "International Institute of Information Technology, Hyderabad (IIIT-H)", "fullName": "Ravi Kiran Sarvadevabhatla", "givenName": "Ravi Kiran", "surname": "Sarvadevabhatla", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "999-1006", "year": "2019", "issn": null, "isbn": "978-1-7281-3014-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "301400a993", "articleId": "1h81pmcW208", "__typename": "AdjacentArticleType" }, "next": { "fno": "301400b007", "articleId": "1h81yRAIPVC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628771", "title": "Text Line Extraction Using DMLP Classifiers for Historical Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628771/12OmNBO3Kfp", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2016/0981/0/0981a471", "title": "DIVA-HisDB: A Precisely Annotated Large Dataset of Challenging Medieval Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2016/0981a471/12OmNqBbHMW", "parentPublication": { "id": "proceedings/icfhr/2016/0981/0", "title": "2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a508", "title": "Layout Analysis for Historical Manuscripts Using Sift Features", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a508/12OmNqIQS6r", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2010/4221/0/4221a182", "title": "Semi-automatic Annotation Tool for Medieval Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2010/4221a182/12OmNwHyZY9", "parentPublication": { "id": "proceedings/icfhr/2010/4221/0", "title": "Frontiers in Handwriting Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2016/1792/0/1792a126", "title": "Creating Ground Truth for Historical Manuscripts with Document Graphs and Scribbling Interaction", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a126/12OmNzUPplv", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a293", "title": "Alignment of Historical Handwritten Manuscripts Using Siamese Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a293/12OmNzaQojr", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2014/4335/0/06981109", "title": "Document Writer Analysis with Rejection for Historical Arabic Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2014/06981109/12OmNzxPTGA", "parentPublication": { "id": "proceedings/icfhr/2014/4335/0", "title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a534", "title": "Writer Identification for Historical Manuscripts: Analysis and Optimisation of a Classifier as an Easy-to-Use Tool for Scholars from the Humanities", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a534/17D45WXIkzI", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/2/505402a031", "title": "HInDoLA: A Unified Cloud-Based Platform for Annotation, Visualization and Machine Learning-Based Layout Analysis of Historical Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505402a031/1eLycSvlyZG", "parentPublication": { "id": "icdarw/2019/5054/2", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a738", "title": "Layout Analysis on Challenging Historical Arabic Manuscripts using Siamese Network", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a738/1h81vmDN5ao", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgood28Alq", "title": "Convergence Information Technology, International Conference on", "acronym": "iccit", "groupId": "1001590", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGRG7v", "doi": "10.1109/ICCIT.2008.207", "title": "Towards a Visual Graph-Based Story Outline Authoring", "normalizedTitle": "Towards a Visual Graph-Based Story Outline Authoring", "abstract": "In this paper we present an authoring tool for collaborative visual creation of story outlines. A visual graph-based approach was adopted in order to allow story outlining of a wide range of types and genres of stories, while offering a story representation paradigm suitable for multi-author collaboration and for the integration and organisation of external sources of documentation of the story. Such a paradigm of story representation is also effective for an easy and semiautomatic rapid creation of story prototypes which can be obtained by mean of a specifically developed templating engine.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we present an authoring tool for collaborative visual creation of story outlines. A visual graph-based approach was adopted in order to allow story outlining of a wide range of types and genres of stories, while offering a story representation paradigm suitable for multi-author collaboration and for the integration and organisation of external sources of documentation of the story. Such a paradigm of story representation is also effective for an easy and semiautomatic rapid creation of story prototypes which can be obtained by mean of a specifically developed templating engine.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we present an authoring tool for collaborative visual creation of story outlines. A visual graph-based approach was adopted in order to allow story outlining of a wide range of types and genres of stories, while offering a story representation paradigm suitable for multi-author collaboration and for the integration and organisation of external sources of documentation of the story. Such a paradigm of story representation is also effective for an easy and semiautomatic rapid creation of story prototypes which can be obtained by mean of a specifically developed templating engine.", "fno": "3407a369", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Ivan Blecic", "givenName": "Ivan", "surname": "Blecic", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Arnaldo Cecchini", "givenName": "Arnaldo", "surname": "Cecchini", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Giuseppe A. Trunfio", "givenName": "Giuseppe A.", "surname": "Trunfio", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "369-374", "year": "2008", "issn": null, "isbn": "978-0-7695-3407-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3407a364", "articleId": "12OmNynJMNE", "__typename": "AdjacentArticleType" }, "next": { "fno": "3407a375", "articleId": "12OmNwvVrFR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic3/2015/7947/0/07346682", "title": "Multi-stage children story speech synthesis for Hindi", "doi": null, "abstractUrl": "/proceedings-article/ic3/2015/07346682/12OmNBigFo5", "parentPublication": { "id": "proceedings/ic3/2015/7947/0", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2009/4715/0/05350592", "title": "The structure of a story", "doi": null, "abstractUrl": "/proceedings-article/fie/2009/05350592/12OmNrGsDkv", "parentPublication": { "id": "proceedings/fie/2009/4715/0", "title": "2009 39th IEEE Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a573", "title": "A Semantic Triplet Based Story Classifier", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a573/12OmNxR5ULL", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compcon/1996/7414/0/74140463", "title": "The Making of \"Toy Story\"", "doi": null, "abstractUrl": "/proceedings-article/compcon/1996/74140463/12OmNxRWI71", "parentPublication": { "id": "proceedings/compcon/1996/7414/0", "title": "Computer Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aamas/2004/2092/1/20920186", "title": "An Intent-Driven Planner for Multi-Agent Story Generation", "doi": null, "abstractUrl": "/proceedings-article/aamas/2004/20920186/12OmNyRPgHr", "parentPublication": { "id": "proceedings/aamas/2004/2092/1", "title": "Autonomous Agents and Multiagent Systems, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a084", "title": "Kindergarten Children as Story Makers: The Effect of the Digital Medium", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a084/12OmNzDehap", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2019/0810/0/08818925", "title": "A Framework for Authoring Logically Ordered Visual Data Stories", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2019/08818925/1dsfTRHa1ZS", "parentPublication": { "id": "proceedings/vl-hcc/2019/0810/0", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222368", "title": "Calliope: Automatic Visual Data Story Generation from a Spreadsheet", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222368/1nTqjtc45d6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a331", "title": "Story ARtist", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a331/1qpzByTcXqU", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800b149", "title": "Multi-agent Story-based Settlement Generation", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800b149/1zw5RfcjGSY", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkEU4f", "title": "2011 IEEE International Conference on Multimedia and Expo", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNrkBwkg", "doi": "10.1109/ICME.2011.6011900", "title": "News video story sentiment classification and ranking", "normalizedTitle": "News video story sentiment classification and ranking", "abstract": "In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-supervised learning approach is utilized to classify the news stories into sentiment classes. Graph based semi-supervised learning is able to tackle the problem of lacking labeled data. After classification, two sentiment classes are obtained: positive and negative. In order to project the news videos into sentiment space, a multimodal approach by fusing the text sentiment and visual representation scores is adopted to rank the videos in each class. For sentiment representation, inter and intra sentiment class analysis is conducted based on affinity propagation clustering and PageRank algorithm. A user study is conducted to evaluate the video ranking performance. The experimental results on the selected topics are promising and demonstrate the proposed approach is effective.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-supervised learning approach is utilized to classify the news stories into sentiment classes. Graph based semi-supervised learning is able to tackle the problem of lacking labeled data. After classification, two sentiment classes are obtained: positive and negative. In order to project the news videos into sentiment space, a multimodal approach by fusing the text sentiment and visual representation scores is adopted to rank the videos in each class. For sentiment representation, inter and intra sentiment class analysis is conducted based on affinity propagation clustering and PageRank algorithm. A user study is conducted to evaluate the video ranking performance. The experimental results on the selected topics are promising and demonstrate the proposed approach is effective.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-supervised learning approach is utilized to classify the news stories into sentiment classes. Graph based semi-supervised learning is able to tackle the problem of lacking labeled data. After classification, two sentiment classes are obtained: positive and negative. In order to project the news videos into sentiment space, a multimodal approach by fusing the text sentiment and visual representation scores is adopted to rank the videos in each class. For sentiment representation, inter and intra sentiment class analysis is conducted based on affinity propagation clustering and PageRank algorithm. A user study is conducted to evaluate the video ranking performance. The experimental results on the selected topics are promising and demonstrate the proposed approach is effective.", "fno": "06011900", "keywords": [ "Visualization", "Speech Recognition", "Joining Processes", "Clustering Algorithms", "Error Analysis", "Training Data", "Training", "News Video Analysis", "Sentiment Classification", "Personalized News Video", "Semi Supervised Learning" ], "authors": [ { "affiliation": "Graduate University of Chinese Academy of Sciences, Beijing, 100190, China", "fullName": "Chunxi Liu", "givenName": null, "surname": "Chunxi Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate University of Chinese Academy of Sciences, Beijing, 100190, China", "fullName": "Li Su", "givenName": null, "surname": "Li Su", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate University of Chinese Academy of Sciences, Beijing, 100190, China", "fullName": "Qingming Huang", "givenName": null, "surname": "Qingming Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Lab of Intell. Info. Process., Inst. of Comput. Tech., CAS, Beijing, 100190, China", "fullName": "Shuqiang Jiang", "givenName": null, "surname": "Shuqiang Jiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2011", "issn": "1945-7871", "isbn": "978-1-61284-348-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06011899", "articleId": "12OmNrIJqqV", "__typename": "AdjacentArticleType" }, "next": { "fno": "06011901", "articleId": "12OmNyr8YlH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2006/0366/0/04036778", "title": "Adaptive Video News Story Tracking based on Earth Mover'S Distance", "doi": null, "abstractUrl": "/proceedings-article/icme/2006/04036778/12OmNAFWONz", "parentPublication": { "id": "proceedings/icme/2006/0366/0", "title": "2006 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394401", "title": "A hierarchical approach to story segmentation of large broadcast news video corpus", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394401/12OmNAKM04m", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/adl/1998/8464/0/84640168", "title": "Story Segmentation and Detection of Commercials in Broadcast News Video", "doi": null, "abstractUrl": "/proceedings-article/adl/1998/84640168/12OmNqzcvA3", "parentPublication": { "id": "proceedings/adl/1998/8464/0", "title": "Advances in Digital Libraries Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2016/0662/0/0662a471", "title": "A Scalable Approach for Sentiment Analysis of Turkish Tweets and Linking Tweets to News", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a471/12OmNrNh0wC", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/6/3736f077", "title": "News Video Story Segmentation Based on Naïve Bayes Model", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f077/12OmNvFpExe", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284772", "title": "News Video Retrieval using Implicit Event Semantics", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284772/12OmNvT2p3v", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2009/3571/4/3571d482", "title": "News Video Story Segmentation Based on Topic Caption Text and Audio Information", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571d482/12OmNwGIcx9", "parentPublication": { "id": "proceedings/gcis/2009/3571/4", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2010/7491/0/05582989", "title": "Event based news video people classification and ranking using multimodality features", "doi": null, "abstractUrl": "/proceedings-article/icme/2010/05582989/12OmNzICER3", "parentPublication": { "id": "proceedings/icme/2010/7491/0", "title": "2010 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2018/4195/0/08551568", "title": "TV News Story Segmentation Using Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icmew/2018/08551568/17D45XfSEV9", "parentPublication": { "id": "proceedings/icmew/2018/4195/0", "title": "2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2020/9234/0/923400a271", "title": "News Video Story Segmentation with Multi-Modality Features", "doi": null, "abstractUrl": "/proceedings-article/icdh/2020/923400a271/1uGY3amsEus", "parentPublication": { "id": "proceedings/icdh/2020/9234/0", "title": "2020 8th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZfq", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwkzuuR", "doi": "10.1109/VLHCC.2011.6070396", "title": "Embedding and evolution of spreadsheet models in spreadsheet systems", "normalizedTitle": "Embedding and evolution of spreadsheet models in spreadsheet systems", "abstract": "This paper describes the embedding of ClassSheet models in spreadsheet systems. ClassSheet models are well-known and describe the business logic of spreadsheet data. We embed this domain specific model representation on the (general purpose) spreadsheet system. By defining such an embedding, we provide end users a model-driven engineering spreadsheet developing environment. End users can interact with both the model and the spreadsheet data in the same environment. Moreover, we use advanced techniques to evolve spreadsheets and models and to have them synchronized. In this paper we present our work on extending a widely used spreadsheet system with such a model-driven spreadsheet engineering environment.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the embedding of ClassSheet models in spreadsheet systems. ClassSheet models are well-known and describe the business logic of spreadsheet data. We embed this domain specific model representation on the (general purpose) spreadsheet system. By defining such an embedding, we provide end users a model-driven engineering spreadsheet developing environment. End users can interact with both the model and the spreadsheet data in the same environment. Moreover, we use advanced techniques to evolve spreadsheets and models and to have them synchronized. In this paper we present our work on extending a widely used spreadsheet system with such a model-driven spreadsheet engineering environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the embedding of ClassSheet models in spreadsheet systems. ClassSheet models are well-known and describe the business logic of spreadsheet data. We embed this domain specific model representation on the (general purpose) spreadsheet system. By defining such an embedding, we provide end users a model-driven engineering spreadsheet developing environment. End users can interact with both the model and the spreadsheet data in the same environment. Moreover, we use advanced techniques to evolve spreadsheets and models and to have them synchronized. In this paper we present our work on extending a widely used spreadsheet system with such a model-driven spreadsheet engineering environment.", "fno": "06070396", "keywords": [ "Data Models", "Unified Modeling Language", "Object Oriented Modeling", "Atmospheric Modeling", "Synchronization", "Visualization", "Concrete" ], "authors": [ { "affiliation": "Univ. do Minho, Braga, Portugal", "fullName": "J. Cunha", "givenName": "J.", "surname": "Cunha", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. do Minho, Braga, Portugal", "fullName": "J. Mendes", "givenName": "J.", "surname": "Mendes", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. do Minho, Braga, Portugal", "fullName": "J. Saraiva", "givenName": "J.", "surname": "Saraiva", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. do Minho, Braga, Portugal", "fullName": "J. P. Fernandes", "givenName": "J. P.", "surname": "Fernandes", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "179-186", "year": "2011", "issn": "1943-6092", "isbn": "978-1-4577-1246-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06070395", "articleId": "12OmNAfPITn", "__typename": "AdjacentArticleType" }, "next": { "fno": "06070397", "articleId": "12OmNA0MZ0p", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2011/1246/0/06070409", "title": "ClassSheet-driven spreadsheet environments", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070409/12OmNANTAxA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/1589a356", "title": "Towards systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/1589a356/12OmNBKW9B8", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883039", "title": "Embedding model-driven spreadsheet queries in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883039/12OmNvkplan", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2012/0852/0/06344473", "title": "Extension and implementation of ClassSheet models", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2012/06344473/12OmNwwd30f", "parentPublication": { "id": "proceedings/vlhcc/2012/0852/0", "title": "2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117587", "title": "Spreadsheet Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117587/12OmNxG1yJV", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbes/2015/9272/0/9272a140", "title": "Automatic Spreadsheet Generation from Conceptual Models", "doi": null, "abstractUrl": "/proceedings-article/sbes/2015/9272a140/12OmNz6iOKX", "parentPublication": { "id": "proceedings/sbes/2015/9272/0", "title": "2015 29th Brazilian Symposium on Software Engineering (SBES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a196", "title": "Refactoring Meets Model-Driven Spreadsheet Evolution", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a196/12OmNzWfp3b", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227239", "title": "MDSheet: A framework for model-driven spreadsheet engineering", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227239/12OmNzuZUsW", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2015/03/06915751", "title": "Embedding, Evolution, and Validation of Model-Driven Spreadsheets", "doi": null, "abstractUrl": "/journal/ts/2015/03/06915751/13rRUy3xY9X", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103459", "title": "Systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103459/17D45Xh13tN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZWW", "title": "2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)", "acronym": "smartcity", "groupId": "1812824", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNylKAS9", "doi": "10.1109/SmartCity.2015.84", "title": "Social Media Story Telling", "normalizedTitle": "Social Media Story Telling", "abstract": "The number of documents on the web increases rapidly and often there is an enormous information overlap between different sources covering the same topic. Since it is impractical to read through all posts regarding a subject, there is a need for summaries combining the most relevant facts. In this context combining information from different sources in form of stories is an important method to provide perspective, while presenting and enriching the existing content in an interesting, natural and narrative way. Today, stories are often not available or they have been elaborately written and selected by journalists. Thus, we present an automated approach to create stories from multiple input documents. Furthermore the developed framework implements strategies to visualize stories and link content to related sources of information, such as images, tweets and encyclopedia records ready to be explored by the reader. Our approach combines deriving a story line from a graph of interlinked sources with a story-centric multi-document summarization.", "abstracts": [ { "abstractType": "Regular", "content": "The number of documents on the web increases rapidly and often there is an enormous information overlap between different sources covering the same topic. Since it is impractical to read through all posts regarding a subject, there is a need for summaries combining the most relevant facts. In this context combining information from different sources in form of stories is an important method to provide perspective, while presenting and enriching the existing content in an interesting, natural and narrative way. Today, stories are often not available or they have been elaborately written and selected by journalists. Thus, we present an automated approach to create stories from multiple input documents. Furthermore the developed framework implements strategies to visualize stories and link content to related sources of information, such as images, tweets and encyclopedia records ready to be explored by the reader. Our approach combines deriving a story line from a graph of interlinked sources with a story-centric multi-document summarization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The number of documents on the web increases rapidly and often there is an enormous information overlap between different sources covering the same topic. Since it is impractical to read through all posts regarding a subject, there is a need for summaries combining the most relevant facts. In this context combining information from different sources in form of stories is an important method to provide perspective, while presenting and enriching the existing content in an interesting, natural and narrative way. Today, stories are often not available or they have been elaborately written and selected by journalists. Thus, we present an automated approach to create stories from multiple input documents. Furthermore the developed framework implements strategies to visualize stories and link content to related sources of information, such as images, tweets and encyclopedia records ready to be explored by the reader. Our approach combines deriving a story line from a graph of interlinked sources with a story-centric multi-document summarization.", "fno": "1893a279", "keywords": [ "Blogs", "Data Mining", "Context", "Data Visualization", "Joining Processes", "Media", "Writing", "Linearization", "Social Media", "Summarization", "Story Telling", "Events" ], "authors": [ { "affiliation": null, "fullName": "Patrick Hennig", "givenName": "Patrick", "surname": "Hennig", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Philipp Berger", "givenName": "Philipp", "surname": "Berger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christian Dullweber", "givenName": "Christian", "surname": "Dullweber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Moritz Finke", "givenName": "Moritz", "surname": "Finke", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fabian Maschler", "givenName": "Fabian", "surname": "Maschler", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Julian Risch", "givenName": "Julian", "surname": "Risch", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christoph Meinel", "givenName": "Christoph", "surname": "Meinel", "__typename": "ArticleAuthorType" } ], "idPrefix": "smartcity", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "279-284", "year": "2015", "issn": null, "isbn": "978-1-5090-1893-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1893a273", "articleId": "12OmNyKrH6S", "__typename": "AdjacentArticleType" }, "next": { "fno": "1893a285", "articleId": "12OmNrH1PEk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2016/0806/0/07550829", "title": "Business process ontology for defining user story", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550829/12OmNBv2CdL", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/1/3407a369", "title": "Towards a Visual Graph-Based Story Outline Authoring", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407a369/12OmNqGRG7v", "parentPublication": { "id": "iccit/2008/3407/1", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011900", "title": "News video story sentiment classification and ranking", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011900/12OmNrkBwkg", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a572", "title": "A Basic Study on Spoiler Detection from Review Comments Using Story Documents", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a572/12OmNvzJG7J", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2017/3488/0/3488a292", "title": "A Reference Method for User Story Requirements in Agile Systems Development", "doi": null, "abstractUrl": "/proceedings-article/rew/2017/3488a292/12OmNxRF72n", "parentPublication": { "id": "proceedings/rew/2017/3488/0", "title": "2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/5/00495329", "title": "Arts ancient and digital: telling stories old and new", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495329/12OmNxiKrXH", "parentPublication": { "id": "proceedings/hicss/1996/7324/5", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a061", "title": "Automated Storytelling Evaluation and Story Chain Generation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a061/12OmNyRPgrX", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061139", "title": "Narrative Visualization: Telling Stories with Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061139/13rRUxAAST1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903555", "title": "Erato: Cooperative Data Story Editing via Fact Interpolation", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903555/1GZonJBJC1y", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222368", "title": "Calliope: Automatic Visual Data Story Generation from a Spreadsheet", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222368/1nTqjtc45d6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuZUzr", "title": "Proceedings of the Tenth Conference on Artificial Intelligence for Applications", "acronym": "caia", "groupId": "1000050", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNylbosM", "doi": "10.1109/CAIA.1994.323665", "title": "Automatic generation of explanations for spreadsheet applications", "normalizedTitle": "Automatic generation of explanations for spreadsheet applications", "abstract": "Applications developed by end-users using spreadsheets cannot be effectively distributed to other users because of the need for adequate information on the functioning of the applications themselves. In fact, building an explanation facility to support an application is a time-consuming task. This paper illustrates the realization of a tool for the automatic generation of explanations in conventional spreadsheet applications. The system works in two stages: the first one corresponds to the construction of a knowledge base containing the information on the mathematical relations coded into a programmed spreadsheet; the second one consists of the generation of explanations (concerning the quantities used in the spreadsheet and their relationships) from the representation previously built.<>", "abstracts": [ { "abstractType": "Regular", "content": "Applications developed by end-users using spreadsheets cannot be effectively distributed to other users because of the need for adequate information on the functioning of the applications themselves. In fact, building an explanation facility to support an application is a time-consuming task. This paper illustrates the realization of a tool for the automatic generation of explanations in conventional spreadsheet applications. The system works in two stages: the first one corresponds to the construction of a knowledge base containing the information on the mathematical relations coded into a programmed spreadsheet; the second one consists of the generation of explanations (concerning the quantities used in the spreadsheet and their relationships) from the representation previously built.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Applications developed by end-users using spreadsheets cannot be effectively distributed to other users because of the need for adequate information on the functioning of the applications themselves. In fact, building an explanation facility to support an application is a time-consuming task. This paper illustrates the realization of a tool for the automatic generation of explanations in conventional spreadsheet applications. The system works in two stages: the first one corresponds to the construction of a knowledge base containing the information on the mathematical relations coded into a programmed spreadsheet; the second one consists of the generation of explanations (concerning the quantities used in the spreadsheet and their relationships) from the representation previously built.", "fno": "00323665", "keywords": [ "Spreadsheet Programs", "Explanation", "Knowledge Representation", "Automatic Explanation Generation", "Spreadsheet Applications", "Knowledge Base", "Mathematical Relations", "Quantities", "Knowledge Representation", "Distributed Applications", "Mathematical Model", "Buildings", "Remuneration", "Computer Languages", "Mathematical Programming", "Application Software", "Data Mining", "Terminology", "Technological Innovation", "Graphical Models" ], "authors": [ { "affiliation": "Dipartimento di Inf. e Sistemistica, Rome Univ., Italy", "fullName": "D. Nardi", "givenName": "D.", "surname": "Nardi", "__typename": "ArticleAuthorType" }, { "affiliation": "Dipartimento di Inf. e Sistemistica, Rome Univ., Italy", "fullName": "G. Serrecchia", "givenName": "G.", "surname": "Serrecchia", "__typename": "ArticleAuthorType" } ], "idPrefix": "caia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "268,269,270,271,272,273,274", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00323664", "articleId": "12OmNBB0bZX", "__typename": "AdjacentArticleType" }, "next": { "fno": "00323666", "articleId": "12OmNwseEWd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2016/0252/0/07739679", "title": "Finding errors in the Enron spreadsheet corpus", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2016/07739679/12OmNAle6pg", "parentPublication": { "id": "proceedings/vlhcc/2016/0252/0", "title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/1589a356", "title": "Towards systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/1589a356/12OmNBKW9B8", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2000/0493/4/04934007", "title": "Is This Spreadsheet a Tax Evader? How H.M. Customs and Excise Test Spreadsheet Applications", "doi": null, "abstractUrl": "/proceedings-article/hicss/2000/04934007/12OmNBuL1aa", "parentPublication": { "id": "proceedings/hicss/2000/0493/4", "title": "Proceedings of the 33rd Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2016/3601/0/3601a167", "title": "Static Spreadsheet Analysis", "doi": null, "abstractUrl": "/proceedings-article/issrew/2016/3601a167/12OmNqzcvRz", "parentPublication": { "id": "proceedings/issrew/2016/3601/0", "title": "2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405300", "title": "Detecting code smells in spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405300/12OmNrH1PEf", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117587", "title": "Spreadsheet Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117587/12OmNxG1yJV", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbes/2015/9272/0/9272a140", "title": "Automatic Spreadsheet Generation from Conceptual Models", "doi": null, "abstractUrl": "/proceedings-article/sbes/2015/9272a140/12OmNz6iOKX", "parentPublication": { "id": "proceedings/sbes/2015/9272/0", "title": "2015 29th Brazilian Symposium on Software Engineering (SBES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2016/4205/0/4205a162", "title": "VEnron: A Versioned Spreadsheet Corpus and Related Evolution Analysis", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2016/4205a162/12OmNzBOid5", "parentPublication": { "id": "proceedings/icse-c/2016/4205/0", "title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1993/3970/0/00269580", "title": "A WYSIWYC (what you see is what you compute) spreadsheet", "doi": null, "abstractUrl": "/proceedings-article/vl/1993/00269580/12OmNzgeLED", "parentPublication": { "id": "proceedings/vl/1993/3970/0", "title": "Proceedings 1993 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103459", "title": "Systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103459/17D45Xh13tN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dsfR2yEMbS", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vl-hcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dsfTRHa1ZS", "doi": "10.1109/VLHCC.2019.8818925", "title": "A Framework for Authoring Logically Ordered Visual Data Stories", "normalizedTitle": "A Framework for Authoring Logically Ordered Visual Data Stories", "abstract": "Visual data storytelling has gained widespread adoption as a means of communicating information visualisation. This is partly due to the increased interest in data journalism. Besides being engaging, it has been shown to foster better comprehension and memorability of information to target audiences. The visual data story authoring process involves several stages. However, current tools neither consolidate the visual data story creation process nor integrate the essential features, such as the recommendation of logically sequenced story pieces, for producing coherent narratives. This paper briefly demonstrates our approach and framework for supporting the creation of logically sequenced visual data stories.", "abstracts": [ { "abstractType": "Regular", "content": "Visual data storytelling has gained widespread adoption as a means of communicating information visualisation. This is partly due to the increased interest in data journalism. Besides being engaging, it has been shown to foster better comprehension and memorability of information to target audiences. The visual data story authoring process involves several stages. However, current tools neither consolidate the visual data story creation process nor integrate the essential features, such as the recommendation of logically sequenced story pieces, for producing coherent narratives. This paper briefly demonstrates our approach and framework for supporting the creation of logically sequenced visual data stories.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual data storytelling has gained widespread adoption as a means of communicating information visualisation. This is partly due to the increased interest in data journalism. Besides being engaging, it has been shown to foster better comprehension and memorability of information to target audiences. The visual data story authoring process involves several stages. However, current tools neither consolidate the visual data story creation process nor integrate the essential features, such as the recommendation of logically sequenced story pieces, for producing coherent narratives. This paper briefly demonstrates our approach and framework for supporting the creation of logically sequenced visual data stories.", "fno": "08818925", "keywords": [ "Authoring Systems", "Data Visualisation", "Multimedia Computing", "Data Journalism", "Visual Data Story Authoring Process", "Visual Data Story Creation Process", "Logically Sequenced Visual Data Stories", "Visual Data Storytelling", "Information Visualisation", "Data Visualization", "Visualization", "Australia", "Task Analysis", "Computational Modeling", "Tools" ], "authors": [ { "affiliation": "Swinburne University of Technology, Melbourne, Australia", "fullName": "Humphrey O. Obie", "givenName": "Humphrey O.", "surname": "Obie", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology, Melbourne, Australia", "fullName": "Caslon Chua", "givenName": "Caslon", "surname": "Chua", "__typename": "ArticleAuthorType" }, { "affiliation": "Deakin University, Geelong, Australia", "fullName": "Iman Avazpour", "givenName": "Iman", "surname": "Avazpour", "__typename": "ArticleAuthorType" }, { "affiliation": "Deakin University, Geelong, Australia", "fullName": "Mohamed Abdelrazek", "givenName": "Mohamed", "surname": "Abdelrazek", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University, Melbourne, Australia", "fullName": "John Grundy", "givenName": "John", "surname": "Grundy", "__typename": "ArticleAuthorType" }, { "affiliation": "CSIRO Data61, Sydney, Australia", "fullName": "Tomasz Bednarz", "givenName": "Tomasz", "surname": "Bednarz", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl-hcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "257-259", "year": "2019", "issn": null, "isbn": "978-1-7281-0810-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08818841", "articleId": "1dsfSIjkpTW", "__typename": "AdjacentArticleType" }, "next": { "fno": "08818831", "articleId": "1dsfUXEo5Fu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccit/2008/3407/1/3407a369", "title": "Towards a Visual Graph-Based Story Outline Authoring", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407a369/12OmNqGRG7v", "parentPublication": { "id": "iccit/2008/3407/1", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/05/mcg2015050084", "title": "More Than Telling a Story: Transforming Data into Visually Shared Stories", "doi": null, "abstractUrl": "/magazine/cg/2015/05/mcg2015050084/13rRUxjyX6v", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a390", "title": "Storytelling Canvas: A Visual Framework for Developing and Delivering Resonating Stories", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a390/17D45We0UCY", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200c032", "title": "AESOP: Abstract Encoding of Stories, Objects, and Pictures", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200c032/1BmKfFADRao", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222368", "title": "Calliope: Automatic Visual Data Story Generation from a Spreadsheet", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222368/1nTqjtc45d6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09523761", "title": "Evaluating Effects of Background Stories on Graph Perception", "doi": null, "abstractUrl": "/journal/tg/2022/12/09523761/1wnLgUKA2fm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552203", "title": "A Design Space for Applying the Freytag&#x0027;s Pyramid Structure to Data Stories", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552203/1xic2a0UxkA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a209", "title": "On the impact of using different templates on creating and understanding user stories", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a209/1yDjHCtW360", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a504", "title": "Agile Requirements Engineering: From User Stories to Software Architectures", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a504/1yDjI0l5LUc", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a345", "title": "Refining User Stories via Example Mapping: An Empirical Investigation", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a345/1yDjL51yNri", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rlF4UYddF6", "title": "2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "acronym": "aike", "groupId": "1828385", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rlF6mJIj04", "doi": "10.1109/AIKE48582.2020.00046", "title": "Toward Explanation-Centered Story Generation", "normalizedTitle": "Toward Explanation-Centered Story Generation", "abstract": "This study proposes the need for explanation-centered story generation, with the objective of extending the method of doing so. Explanation-Centered Story Generation is a concept that generates a story from an explanation, offering a mechanism for the story generation system to generate multiple forms of stories in this manner.", "abstracts": [ { "abstractType": "Regular", "content": "This study proposes the need for explanation-centered story generation, with the objective of extending the method of doing so. Explanation-Centered Story Generation is a concept that generates a story from an explanation, offering a mechanism for the story generation system to generate multiple forms of stories in this manner.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study proposes the need for explanation-centered story generation, with the objective of extending the method of doing so. Explanation-Centered Story Generation is a concept that generates a story from an explanation, offering a mechanism for the story generation system to generate multiple forms of stories in this manner.", "fno": "870800a202", "keywords": [ "Realistic Images", "Rendering Computer Graphics", "Explanation Centered Story Generation System", "Knowledge Engineering", "Conferences", "Explanation", "Narrative Generation", "Story" ], "authors": [ { "affiliation": "Aomori University,Faculty of Software and Information Technology,Edogawa City, Tokyo,Japan", "fullName": "Jumpei Ono", "givenName": "Jumpei", "surname": "Ono", "__typename": "ArticleAuthorType" }, { "affiliation": "Iwate Prefectural University,Faculty of Software and Information Science,Takizawa, Iwate,Japan", "fullName": "Miku Kawai", "givenName": "Miku", "surname": "Kawai", "__typename": "ArticleAuthorType" }, { "affiliation": "Iwate Prefectural University,Faculty of Software and Information Science,Takizawa, Iwate,Japan", "fullName": "Takashi Ogata", "givenName": "Takashi", "surname": "Ogata", "__typename": "ArticleAuthorType" } ], "idPrefix": "aike", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "202-203", "year": "2020", "issn": null, "isbn": "978-1-7281-8708-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "870800a200", "articleId": "1rlF7lPrEGY", "__typename": "AdjacentArticleType" }, "next": { "fno": "870800a205", "articleId": "1rlF7eO0Za0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2013/0174/0/06607870", "title": "A story generation mechanism based on the cooperation of micro/macro story techniques: As a module in the integrated narrative generation system", "doi": null, "abstractUrl": "/proceedings-article/icis/2013/06607870/12OmNqFJhQy", "parentPublication": { "id": "proceedings/icis/2013/0174/0", "title": "2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2009/4715/0/05350592", "title": "The structure of a story", "doi": null, "abstractUrl": "/proceedings-article/fie/2009/05350592/12OmNrGsDkv", "parentPublication": { "id": "proceedings/fie/2009/4715/0", "title": "2009 39th IEEE Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aamas/2004/2092/1/20920186", "title": "An Intent-Driven Planner for Multi-Agent Story Generation", "doi": null, "abstractUrl": "/proceedings-article/aamas/2004/20920186/12OmNyRPgHr", "parentPublication": { "id": "proceedings/aamas/2004/2092/1", "title": "Autonomous Agents and Multiagent Systems, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/03/mcg2006030023", "title": "From Linear Story Generation to Branching Story Graphs", "doi": null, "abstractUrl": "/magazine/cg/2006/03/mcg2006030023/13rRUwInv91", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2014/02/06571208", "title": "Shall i compare thee to another story?: an empirical study of analogy-based story generation", "doi": null, "abstractUrl": "/journal/ci/2014/02/06571208/13rRUxEhFv8", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2022/9342/0/934200a109", "title": "Voting Item: Story-work in human-centric software engineering", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/934200a109/1Eo5Nm9eZZC", "parentPublication": { "id": "proceedings/chase/2022/9342/0", "title": "2022 IEEE/ACM 15th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100a646", "title": "Multiple Story Generation Using Story Techniques Included in a Story : Full/Regular Research Paper, CSCI-ISCS", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a646/1EpL2MUcdnq", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a163", "title": "Interpreting Categorical Data Classifiers using Explanation-based Locality", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a163/1KBr42Oepfa", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222368", "title": "Calliope: Automatic Visual Data Story Generation from a Spreadsheet", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222368/1nTqjtc45d6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400a690", "title": "Explanation Generation in a Kabuki Dance Stage Performing Structure Simulation System", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400a690/1uGZ0nOwbNS", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwbcJ4J", "title": "Proceedings Sixth Australian Conference on Computer-Human Interaction", "acronym": "ozchi", "groupId": "1000154", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNBZYTnu", "doi": "10.1109/OZCHI.1996.559982", "title": "Automated General Visualizations", "normalizedTitle": "Automated General Visualizations", "abstract": "Abstract: This paper details research on systems which use a small set of objects to visualize event-based data from a number of potential domains, including programming languages. Empirical research suggests that user understanding of visualizations is principally defined by the visual attributes of the objects, such as position and colour, rather than with the functionality of these objects. This work shows that general visualizations are possible for event-based data domains. If the output visualization is well laid out, then it is nearly indistinguishable from visualizations specifically designed for a data set. Future work lies in the development of more intelligent systems which are capable of creating user friendly layouts.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: This paper details research on systems which use a small set of objects to visualize event-based data from a number of potential domains, including programming languages. Empirical research suggests that user understanding of visualizations is principally defined by the visual attributes of the objects, such as position and colour, rather than with the functionality of these objects. This work shows that general visualizations are possible for event-based data domains. If the output visualization is well laid out, then it is nearly indistinguishable from visualizations specifically designed for a data set. Future work lies in the development of more intelligent systems which are capable of creating user friendly layouts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: This paper details research on systems which use a small set of objects to visualize event-based data from a number of potential domains, including programming languages. Empirical research suggests that user understanding of visualizations is principally defined by the visual attributes of the objects, such as position and colour, rather than with the functionality of these objects. This work shows that general visualizations are possible for event-based data domains. If the output visualization is well laid out, then it is nearly indistinguishable from visualizations specifically designed for a data set. Future work lies in the development of more intelligent systems which are capable of creating user friendly layouts.", "fno": "75250012", "keywords": [ "Data Visualisation Automated General Visualizations Event Based Data User Understanding Functionality Output Visualization Intelligent Systems User Friendly Layouts" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Exeter Univ., UK", "fullName": "D. Manuel", "givenName": "D.", "surname": "Manuel", "__typename": "ArticleAuthorType" } ], "idPrefix": "ozchi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-11-01T00:00:00", "pubType": "proceedings", "pages": "0012", "year": "1996", "issn": null, "isbn": "0-8186-7525-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "75250006", "articleId": "12OmNvnfkaj", "__typename": "AdjacentArticleType" }, "next": { "fno": "75250019", "articleId": "12OmNroijl9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbDd", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "acronym": "acsat", "groupId": "1802667", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwcCIJt", "doi": "10.1109/ACSAT.2013.91", "title": "Qualitative Findings on the Use of Mobile Phones by Malaysian Older People", "normalizedTitle": "Qualitative Findings on the Use of Mobile Phones by Malaysian Older People", "abstract": "This paper reports on qualitative findings that have been obtained from a study about mobile phone usage by Malaysian older people. The information has been classified into various categories such as usage, difficulties encountered with the physical interface of the mobile phone, functions complexity, cost, language related issues, ideal phone and etc. In this study, two similar experiments were carried out that focus on focus groups. In addition, the use of personas as a tool in elicitation was explored. Mobile phones can potentially play an important role in helping older people in many ways if the problems related to the use of mobile phone can be solved. It is customer product that relates to theories of identity, culture and social structure. The findings presented in this paper may have implications for the design of mobile phones in general. It may be concluded that the usability of current mobile phones has to be enhanced in order to cater the needs of other groups of users, including older people.", "abstracts": [ { "abstractType": "Regular", "content": "This paper reports on qualitative findings that have been obtained from a study about mobile phone usage by Malaysian older people. The information has been classified into various categories such as usage, difficulties encountered with the physical interface of the mobile phone, functions complexity, cost, language related issues, ideal phone and etc. In this study, two similar experiments were carried out that focus on focus groups. In addition, the use of personas as a tool in elicitation was explored. Mobile phones can potentially play an important role in helping older people in many ways if the problems related to the use of mobile phone can be solved. It is customer product that relates to theories of identity, culture and social structure. The findings presented in this paper may have implications for the design of mobile phones in general. It may be concluded that the usability of current mobile phones has to be enhanced in order to cater the needs of other groups of users, including older people.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper reports on qualitative findings that have been obtained from a study about mobile phone usage by Malaysian older people. The information has been classified into various categories such as usage, difficulties encountered with the physical interface of the mobile phone, functions complexity, cost, language related issues, ideal phone and etc. In this study, two similar experiments were carried out that focus on focus groups. In addition, the use of personas as a tool in elicitation was explored. Mobile phones can potentially play an important role in helping older people in many ways if the problems related to the use of mobile phone can be solved. It is customer product that relates to theories of identity, culture and social structure. The findings presented in this paper may have implications for the design of mobile phones in general. It may be concluded that the usability of current mobile phones has to be enhanced in order to cater the needs of other groups of users, including older people.", "fno": "2758a435", "keywords": [ "Mobile Handsets", "Sociology", "Statistics", "Aging", "Manuals", "Mobile Communication", "Complexity Theory", "Personas", "Older People", "Mobile Phone", "Focus Group" ], "authors": [ { "affiliation": null, "fullName": "Sofianiza Abd Malik", "givenName": "Sofianiza Abd", "surname": "Malik", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Muna Azuddin", "givenName": "Muna", "surname": "Azuddin", "__typename": "ArticleAuthorType" } ], "idPrefix": "acsat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "435-439", "year": "2013", "issn": null, "isbn": "978-1-4799-2758-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2758a429", "articleId": "12OmNqGRGdX", "__typename": "AdjacentArticleType" }, "next": { "fno": "2758a440", "articleId": "12OmNAXPyoU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/percomw/2010/6605/0/05470652", "title": "PerFallD: A pervasive fall detection system using mobile phones", "doi": null, "abstractUrl": "/proceedings-article/percomw/2010/05470652/12OmNAXxX0L", "parentPublication": { "id": "proceedings/percomw/2010/6605/0", "title": "2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2014/7646/0/7646a362", "title": "Defining and Analyzing a Gesture Set for Interactive TV Remote on Touchscreen Phones", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2014/7646a362/12OmNBOllrx", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2014/7646/0", "title": "2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2012/4818/0/4818a247", "title": "Cell Phones Price Forecast Based on Adaptive Sliding Windows", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2012/4818a247/12OmNC4eSrM", "parentPublication": { "id": "proceedings/dcabes/2012/4818/0", "title": "2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2017/0560/0/08026222", "title": "Collaborative panoramic image generation from multiple mobile phones", "doi": null, "abstractUrl": "/proceedings-article/icmew/2017/08026222/12OmNqNG3kN", "parentPublication": { "id": "proceedings/icmew/2017/0560/0", "title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2010/9343/0/05643551", "title": "Point-and-shoot for ubiquitous tagging on mobile phones", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643551/12OmNwc3wBy", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itag/2015/7874/0/7874a022", "title": "Gamified Mobile/Online Learning for Personal Care Givers for People with Disabilities and Older People", "doi": null, "abstractUrl": "/proceedings-article/itag/2015/7874a022/12OmNxGAL7u", "parentPublication": { "id": "proceedings/itag/2015/7874/0", "title": "2015 International Conference on Interactive Technologies and Games (iTAG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a396", "title": "Teaching Older People Using Web Technology: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a396/12OmNxj236w", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a390", "title": "Older People and the Use of Mobile Phones: An Interview Study", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a390/12OmNyv7mk3", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2014/06/06375704", "title": "E-Shadow: Lubricating Social Interaction Using Mobile Phones", "doi": null, "abstractUrl": "/journal/tc/2014/06/06375704/13rRUwjoNw5", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2020/7002/0/700200a965", "title": "Mobile Phones Know Your Keystrokes through the Sounds from Finger&#x2019;s Tapping on the Screen", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2020/700200a965/1rsiJoRokww", "parentPublication": { "id": "proceedings/icdcs/2020/7002/0", "title": "2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qRNrlo577W", "title": "2020 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qRO9tzh3vG", "doi": "10.1109/VIS47514.2020.00063", "title": "Explainable Spatial Clustering: Leveraging Spatial Data in Radiation Oncology", "normalizedTitle": "Explainable Spatial Clustering: Leveraging Spatial Data in Radiation Oncology", "abstract": "Advances in data collection in radiation therapy have led to an abundance of opportunities for applying data mining and machine learning techniques to promote new data-driven insights. In light of these advances, supporting collaboration between machine learning experts and clinicians is important for facilitating better development and adoption of these models. Although many medical use-cases rely on spatial data, where understanding and visualizing the underlying structure of the data is important, little is known about the interpretability of spatial clustering results by clinical audiences. In this work, we reflect on the design of visualizations for explaining novel approaches to clustering complex anatomical data from head and neck cancer patients. These visualizations were developed, through participatory design, for clinical audiences during a multi-year collaboration with radiation oncologists and statisticians. We distill this collaboration into a set of lessons learned for creating visual and explainable spatial clustering for clinical users.", "abstracts": [ { "abstractType": "Regular", "content": "Advances in data collection in radiation therapy have led to an abundance of opportunities for applying data mining and machine learning techniques to promote new data-driven insights. In light of these advances, supporting collaboration between machine learning experts and clinicians is important for facilitating better development and adoption of these models. Although many medical use-cases rely on spatial data, where understanding and visualizing the underlying structure of the data is important, little is known about the interpretability of spatial clustering results by clinical audiences. In this work, we reflect on the design of visualizations for explaining novel approaches to clustering complex anatomical data from head and neck cancer patients. These visualizations were developed, through participatory design, for clinical audiences during a multi-year collaboration with radiation oncologists and statisticians. We distill this collaboration into a set of lessons learned for creating visual and explainable spatial clustering for clinical users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Advances in data collection in radiation therapy have led to an abundance of opportunities for applying data mining and machine learning techniques to promote new data-driven insights. In light of these advances, supporting collaboration between machine learning experts and clinicians is important for facilitating better development and adoption of these models. Although many medical use-cases rely on spatial data, where understanding and visualizing the underlying structure of the data is important, little is known about the interpretability of spatial clustering results by clinical audiences. In this work, we reflect on the design of visualizations for explaining novel approaches to clustering complex anatomical data from head and neck cancer patients. These visualizations were developed, through participatory design, for clinical audiences during a multi-year collaboration with radiation oncologists and statisticians. We distill this collaboration into a set of lessons learned for creating visual and explainable spatial clustering for clinical users.", "fno": "801400a281", "keywords": [ "Cancer", "Data Analysis", "Data Mining", "Data Visualisation", "Learning Artificial Intelligence", "Medical Computing", "Pattern Clustering", "Radiation Therapy", "Tumours", "Complex Anatomical Data", "Radiation Oncologists", "Spatial Clustering", "Spatial Data", "Data Collection", "Radiation Therapy", "Data Mining", "Data Driven Insights", "Machine Learning Experts", "Visualization", "Data Visualization", "Collaboration", "Machine Learning", "Oncology", "Spatial Databases", "Cancer", "Data Clustering And Aggregation", "Life Sciences", "Collaboration", "Mixed Initiative Human Machine Analysis", "Guidelines" ], "authors": [ { "affiliation": "University of Illinois at Chicago", "fullName": "Andrew Wentzel", "givenName": "Andrew", "surname": "Wentzel", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Iowa", "fullName": "Guadalupe Canahuate", "givenName": "Guadalupe", "surname": "Canahuate", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas", "fullName": "Lisanne V. van Dijk", "givenName": "Lisanne V.", "surname": "van Dijk", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas", "fullName": "Abdallah S.R. Mohamed", "givenName": "Abdallah S.R.", "surname": "Mohamed", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas", "fullName": "C. David Fuller", "givenName": "C. David", "surname": "Fuller", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Chicago", "fullName": "G. Elisabeta Marai", "givenName": "G. Elisabeta", "surname": "Marai", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "281-285", "year": "2020", "issn": null, "isbn": "978-1-7281-8014-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "801400a276", "articleId": "1qRO38Eb3gI", "__typename": "AdjacentArticleType" }, "next": { "fno": "801400a286", "articleId": "1qROcQvKnM4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vahc/2017/3187/0/08387502", "title": "Using network graphs to visualize changing documentation styles in an oncology practice before and after opennotes implementation", "doi": null, "abstractUrl": "/proceedings-article/vahc/2017/08387502/12OmNvkGW8Q", "parentPublication": { "id": "proceedings/vahc/2017/3187/0", "title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2009/4488/0/05355065", "title": "Improving radiation oncology using a low-cost wireless accelerometer", "doi": null, "abstractUrl": "/proceedings-article/lcn/2009/05355065/12OmNwHhoPx", "parentPublication": { "id": "proceedings/lcn/2009/4488/0", "title": "2009 IEEE 34th Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1978/9999/0/00679902", "title": "Computers In Radiation Oncology: The Third Decade", "doi": null, "abstractUrl": "/proceedings-article/scamc/1978/00679902/12OmNwwd2NH", "parentPublication": { "id": "proceedings/scamc/1978/9999/0", "title": "1978 The Second Annual Symposium on Computer Application in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1994/5550/0/00323675", "title": "OaSiS: integrating safety reasoning for decision support in oncology", "doi": null, "abstractUrl": "/proceedings-article/caia/1994/00323675/12OmNx6xHqa", "parentPublication": { "id": "proceedings/caia/1994/5550/0", "title": "Proceedings of the Tenth Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1993/3752/0/00263009", "title": "Human factors in radiation oncology therapy: some software control interface issues", "doi": null, "abstractUrl": "/proceedings-article/cbms/1993/00263009/12OmNxFaLAB", "parentPublication": { "id": "proceedings/cbms/1993/3752/0", "title": "Proceedings of the Sixth Annual 1993 IEEE Symposium Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2014/5786/0/06863947", "title": "“Informatics integrated into front end management of radiation oncology patients”", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2014/06863947/12OmNyPQ4QV", "parentPublication": { "id": "proceedings/iccabs/2014/5786/0", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2014/5786/0/06863948", "title": "“A global view of how technology is guiding radiation therapeutics for cancers”", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2014/06863948/12OmNyxXltU", "parentPublication": { "id": "proceedings/iccabs/2014/5786/0", "title": "2014 IEEE 4th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1978/9999/0/00679903", "title": "Computer-Controlled Radiation Therapy", "doi": null, "abstractUrl": "/proceedings-article/scamc/1978/00679903/12OmNzSh11D", "parentPublication": { "id": "proceedings/scamc/1978/9999/0", "title": "1978 The Second Annual Symposium on Computer Application in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2013/2503/0/2293a125", "title": "SOAD: Securing Oncology EMR by Anonymizing DICOM Images", "doi": null, "abstractUrl": "/proceedings-article/fit/2013/2293a125/12OmNzWfp6d", "parentPublication": { "id": "proceedings/fit/2013/2503/0", "title": "2013 11th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367d132", "title": "Creating a Data Science Platform for Developing Complication Risk Models for Personalized Treatment Planning in Radiation Oncology", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367d132/12OmNzvz6Mj", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiqV", "title": "2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "acronym": "mobilesoft", "groupId": "1809584", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONsO", "doi": "", "title": "P2A: A Tool for Converting Pixels to Animated Mobile Application User Interfaces", "normalizedTitle": "P2A: A Tool for Converting Pixels to Animated Mobile Application User Interfaces", "abstract": "Developing mobile applications is typically a labor-intensive process in which software engineers manually re-implement in code screen designs, inter-screen transitions, and in-screen animations developed by user interface and user experience experts. Other engineering domains have used computer vision techniques to automate human perception and manual data entry tasks. The P2A tool adopts computer vision techniques for developing animated mobile applications. P2A infers from mobile application screen designs the user interface portion of an application's source code and other assets that are ready to be compiled and executed on a mobile phone. Among others, inferred mobile applications contain inter-screen transitions and in-screen animations. In our experiments on screenshots of 30 highly-ranked third-party Android applications, the P2A-generated application user interfaces exhibited high pixel-to-pixel similarity with their input screenshots. P2A took an average of 26 seconds to infer in-screen animations.", "abstracts": [ { "abstractType": "Regular", "content": "Developing mobile applications is typically a labor-intensive process in which software engineers manually re-implement in code screen designs, inter-screen transitions, and in-screen animations developed by user interface and user experience experts. Other engineering domains have used computer vision techniques to automate human perception and manual data entry tasks. The P2A tool adopts computer vision techniques for developing animated mobile applications. P2A infers from mobile application screen designs the user interface portion of an application's source code and other assets that are ready to be compiled and executed on a mobile phone. Among others, inferred mobile applications contain inter-screen transitions and in-screen animations. In our experiments on screenshots of 30 highly-ranked third-party Android applications, the P2A-generated application user interfaces exhibited high pixel-to-pixel similarity with their input screenshots. P2A took an average of 26 seconds to infer in-screen animations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Developing mobile applications is typically a labor-intensive process in which software engineers manually re-implement in code screen designs, inter-screen transitions, and in-screen animations developed by user interface and user experience experts. Other engineering domains have used computer vision techniques to automate human perception and manual data entry tasks. The P2A tool adopts computer vision techniques for developing animated mobile applications. P2A infers from mobile application screen designs the user interface portion of an application's source code and other assets that are ready to be compiled and executed on a mobile phone. Among others, inferred mobile applications contain inter-screen transitions and in-screen animations. In our experiments on screenshots of 30 highly-ranked third-party Android applications, the P2A-generated application user interfaces exhibited high pixel-to-pixel similarity with their input screenshots. P2A took an average of 26 seconds to infer in-screen animations.", "fno": "571200a224", "keywords": [ "Computer Animation", "Computer Vision", "Mobile Computing", "Mobile Handsets", "User Interfaces", "P 2 A", "Animated Mobile Application User Interfaces", "Labor Intensive Process", "Software Engineers", "Code Screen Designs", "Inter Screen Transitions", "In Screen Animations", "User Experience Experts", "Engineering Domains", "Computer Vision Techniques", "Human Perception", "Manual Data Entry Tasks", "Mobile Application Screen", "User Interface Portion", "Mobile Phone", "Inferred Mobile Applications", "Third Party Android Applications", "High Pixel To Pixel Similarity", "Animation", "User Interfaces", "Mobile Applications", "Facebook", "Prototypes", "Tools", "Smart Phones", "Mobile Software Engineering", "Pixel Based Design" ], "authors": [ { "affiliation": null, "fullName": "Siva Natarajan", "givenName": "Siva", "surname": "Natarajan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christoph Csallner", "givenName": "Christoph", "surname": "Csallner", "__typename": "ArticleAuthorType" } ], "idPrefix": "mobilesoft", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-05-01T00:00:00", "pubType": "proceedings", "pages": "224-235", "year": "2018", "issn": null, "isbn": "978-1-4503-5712-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "571200a219", "articleId": "17D45VTRopV", "__typename": "AdjacentArticleType" }, "next": { "fno": "571200a236", "articleId": "17D45Xi9rVm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2015/0025/0/0025a248", "title": "Reverse Engineering Mobile Application User Interfaces with REMAUI (T)", "doi": null, "abstractUrl": "/proceedings-article/ase/2015/0025a248/12OmNBQkwXF", "parentPublication": { "id": "proceedings/ase/2015/0025/0", "title": "2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2004/8696/0/86960027", "title": "Effect Lines for Specifying Animation Effects", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2004/86960027/12OmNxE2mTv", "parentPublication": { "id": "proceedings/vlhcc/2004/8696/0", "title": "Proceedings. 2004 IEEE Symposium on Visual Languages and Human Centric Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/3982/2/3982b509", "title": "Evaluating the Effects of Animations on Mobile Application Learnability", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/3982b509/12OmNzVXNME", "parentPublication": { "id": "proceedings/iccea/2010/3982/2", "title": "Computer Engineering and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2014/7434/0/7434a210", "title": "Design of a Flash Digital Watermarking Application Using MATLAB GUI", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a210/12OmNzt0Iss", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550198", "title": "Expressing animated performances through puppeteering", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550198/12OmNzzP5AB", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2018/6909/0/690901a088", "title": "Animated KUI", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2018/690901a088/13bd1sx4Zt7", "parentPublication": { "id": "proceedings/nicoint/2018/6909/0", "title": "2018 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2022/9628/0/962800a253", "title": "Cross-Device Difference Detector for Mobile Application GUI Compatibility Testing", "doi": null, "abstractUrl": "/proceedings-article/icstw/2022/962800a253/1E2wtNUTP1e", "parentPublication": { "id": "proceedings/icstw/2022/9628/0", "title": "2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2022/9594/0/959400a102", "title": "Impact of animated objects on autistic and non-autistic users", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2022/959400a102/1EmribfEu9a", "parentPublication": { "id": "proceedings/icse-seis/2022/9594/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b286", "title": "Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don&#x0027;t Guidelines", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b286/1pK5kNntHH2", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a201", "title": "Gemini<sup>2</sup>: Generating Keyframe-Oriented Animated Transitions Between Statistical Graphics", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a201/1yXuksPe8ne", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxbW4PJ", "title": "2013 Mexican International Conference on Computer Science (ENC)", "acronym": "enc", "groupId": "1000139", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBp52IG", "doi": "10.1109/ENC.2013.8", "title": "Preparing Text Reports from Web Pages Employing Similarity Tests", "normalizedTitle": "Preparing Text Reports from Web Pages Employing Similarity Tests", "abstract": "The World Wide Web is the main source of information for many organizations and common users. However, the analysis and selection of the web content is still an arduous manual task in many cases. When a web query is sent towards a web search engine, a list of URLs is received, frequently ordered by popularity (such as Google's PageRank algorithm). Then, the user must read and analyze each URL in order to find out the convenient information. In this work a method that automatically constructs a text report induced by a web query from a set of URLs is presented. The method extracts text slices (excerpts) from web pages considering the most similar text w.r.t. a web query as slicing criterion. A slice is composed by document object model (DOM) nodes, whereas similarity is calculated using standard techniques employed in natural language processing.", "abstracts": [ { "abstractType": "Regular", "content": "The World Wide Web is the main source of information for many organizations and common users. However, the analysis and selection of the web content is still an arduous manual task in many cases. When a web query is sent towards a web search engine, a list of URLs is received, frequently ordered by popularity (such as Google's PageRank algorithm). Then, the user must read and analyze each URL in order to find out the convenient information. In this work a method that automatically constructs a text report induced by a web query from a set of URLs is presented. The method extracts text slices (excerpts) from web pages considering the most similar text w.r.t. a web query as slicing criterion. A slice is composed by document object model (DOM) nodes, whereas similarity is calculated using standard techniques employed in natural language processing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The World Wide Web is the main source of information for many organizations and common users. However, the analysis and selection of the web content is still an arduous manual task in many cases. When a web query is sent towards a web search engine, a list of URLs is received, frequently ordered by popularity (such as Google's PageRank algorithm). Then, the user must read and analyze each URL in order to find out the convenient information. In this work a method that automatically constructs a text report induced by a web query from a set of URLs is presented. The method extracts text slices (excerpts) from web pages considering the most similar text w.r.t. a web query as slicing criterion. A slice is composed by document object model (DOM) nodes, whereas similarity is calculated using standard techniques employed in natural language processing.", "fno": "5087a013", "keywords": [ "Web Pages", "Vectors", "Software Tools", "Standards", "Natural Language Processing", "Google", "Summarization", "Information Retrieval", "Slicing", "Similarity" ], "authors": [ { "affiliation": "Inst. Tecnol. de La Piedad, La Piedad, Mexico", "fullName": "J. Guadalupe Ramos", "givenName": "J.", "surname": "Guadalupe Ramos", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. Tecnol. de La Piedad, La Piedad, Mexico", "fullName": "Juan C. Solorio", "givenName": "Juan C.", "surname": "Solorio", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. Tecnol. de La Piedad, La Piedad, Mexico", "fullName": "Lourdes Campoy", "givenName": "Lourdes", "surname": "Campoy", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. Tecnol. de La Piedad, La Piedad, Mexico", "fullName": "Sebastian Ruiz", "givenName": "Sebastian", "surname": "Ruiz", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. Tecnol. de La Piedad, La Piedad, Mexico", "fullName": "Nicolas Jasso", "givenName": "Nicolas", "surname": "Jasso", "__typename": "ArticleAuthorType" } ], "idPrefix": "enc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "13-19", "year": "2013", "issn": "1550-4069", "isbn": "978-0-7695-5087-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5087a007", "articleId": "12OmNrH1PAK", "__typename": "AdjacentArticleType" }, "next": { "fno": "5087a020", "articleId": "12OmNqG0SJd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/chinagrid/2010/7543/0/05563021", "title": "Improving Range Query Performance on Historic Web Page Data", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2010/05563021/12OmNBDgZ2d", "parentPublication": { "id": "proceedings/chinagrid/2010/7543/0", "title": "2010 Fifth Annual ChinaGrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2012/4681/0/06234428", "title": "EvilSeed: A Guided Approach to Finding Malicious Web Pages", "doi": null, "abstractUrl": "/proceedings-article/sp/2012/06234428/12OmNCdBDOR", "parentPublication": { "id": "proceedings/sp/2012/4681/0", "title": "2012 IEEE Symposium on Security and Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2008/3504/0/3504a331", "title": "Enhancing URL Normalization Using Metadata of Web Pages", "doi": null, "abstractUrl": "/proceedings-article/iccee/2008/3504a331/12OmNrY3LCH", "parentPublication": { "id": "proceedings/iccee/2008/3504/0", "title": "2008 International Conference on Computer and Electrical Engineering (ICCEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2010/4193/0/4193a079", "title": "Crawling Result Pages for Data Extraction Based on URL Classification", "doi": null, "abstractUrl": "/proceedings-article/wisa/2010/4193a079/12OmNvjyxWV", "parentPublication": { "id": "proceedings/wisa/2010/4193/0", "title": "Web Information Systems and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606627", "title": "Reverb: Recommending code-related web pages", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606627/12OmNxisQR6", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2012/1536/0/06211134", "title": "An Analysis of URLs Generated from JavaScript Code", "doi": null, "abstractUrl": "/proceedings-article/icis/2012/06211134/12OmNyVes2L", "parentPublication": { "id": "proceedings/icis/2012/1536/0", "title": "2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2012/0227/1/06495087", "title": "An Agent-Based Focused Crawling Framework for Topic- and Genre-Related Web Document Discovery", "doi": null, "abstractUrl": "/proceedings-article/ictai/2012/06495087/12OmNym2bPR", "parentPublication": { "id": "proceedings/ictai/2012/0227/1", "title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2009/3726/2/3726b376", "title": "Matchmaking Using Natural Language Descriptions: Linking Customers with Enterprise Service Descriptions", "doi": null, "abstractUrl": "/proceedings-article/compsac/2009/3726b376/12OmNznkJX0", "parentPublication": { "id": "proceedings/compsac/2009/3726/2", "title": "2009 33rd Annual IEEE International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/06/06945905", "title": "What Can Pictures Tell Us About Web Pages? Improving Document Search Using Images", "doi": null, "abstractUrl": "/journal/tp/2015/06/06945905/13rRUIIVldT", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718370", "title": "Detection of Malicious URLs through an Ensemble of Machine Learning Techniques", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718370/1BogNgfhDrO", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvzJG4b", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "2", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNCh0Pc8", "doi": "10.1109/ICME.2004.1394311", "title": "Optimizing similarity based visualization in content based image retrieval", "normalizedTitle": "Optimizing similarity based visualization in content based image retrieval", "abstract": "In any CBIR system, visualization is important, either to show the final result to the user or to form the basis for interaction. Advanced systems use 2D similarity based visualization which shows not only the information of one image itself but also the relations between images. A problem in interactive 2D visualization is the overlap between the images displayed. This obviously reduces the search capability. Simply spreading the images on the screen space will not preserve the relations between them. In this paper, we propose a visualization scheme which reduces the overlap as well as preserves the general distribution of the images displayed. Results show that an effective balance between display of structures and limited overlap can be achieved", "abstracts": [ { "abstractType": "Regular", "content": "In any CBIR system, visualization is important, either to show the final result to the user or to form the basis for interaction. Advanced systems use 2D similarity based visualization which shows not only the information of one image itself but also the relations between images. A problem in interactive 2D visualization is the overlap between the images displayed. This obviously reduces the search capability. Simply spreading the images on the screen space will not preserve the relations between them. In this paper, we propose a visualization scheme which reduces the overlap as well as preserves the general distribution of the images displayed. Results show that an effective balance between display of structures and limited overlap can be achieved", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In any CBIR system, visualization is important, either to show the final result to the user or to form the basis for interaction. Advanced systems use 2D similarity based visualization which shows not only the information of one image itself but also the relations between images. A problem in interactive 2D visualization is the overlap between the images displayed. This obviously reduces the search capability. Simply spreading the images on the screen space will not preserve the relations between them. In this paper, we propose a visualization scheme which reduces the overlap as well as preserves the general distribution of the images displayed. Results show that an effective balance between display of structures and limited overlap can be achieved", "fno": "01394311", "keywords": [ "Content Based Retrieval", "Data Visualisation", "Image Retrieval", "Optimisation", "Visual Databases", "Content Based Image Retrieval", "Similarity Based Visualization Optimization", "CBIR System Visualization", "2 D Similarity Based Visualization", "Image Information", "Image Inter Relations", "Interactive 2 D Visualization", "Image Overlap Limitation", "Displayed Images", "Search Capability", "Screen Space", "General Image Distribution", "Structure Display", "Image Retrieval", "Content Based Retrieval", "Data Visualization", "Displays", "Image Databases", "Visual Databases", "Intelligent Systems", "Intelligent Sensors", "Information Systems", "Bridges" ], "authors": [ { "affiliation": "Intelligent Sensory Inf. Syst., Amsterdam Univ., Netherlands", "fullName": "G.P. Nguyen", "givenName": "G.P.", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Intelligent Sensory Inf. Syst., Amsterdam Univ., Netherlands", "fullName": "M. Worring", "givenName": "M.", "surname": "Worring", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "759,760,761,762", "year": "2004", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01394310", "articleId": "12OmNwoPtkB", "__typename": "AdjacentArticleType" }, "next": { "fno": "01394312", "articleId": "12OmNxGSlZv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmlc/2003/7865/3/01259799", "title": "A graph clustering algorithm with applications to content-based image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259799/12OmNAJm0lp", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2001/1198/0/11980042", "title": "SPATIAL VISUALIZATION FOR CONTENT-BASED IMAGE RETRIEVAL", "doi": null, "abstractUrl": "/proceedings-article/icme/2001/11980042/12OmNAkWvzI", "parentPublication": { "id": "proceedings/icme/2001/1198/0", "title": "IEEE International Conference on Multimedia and Expo, 2001. ICME 2001.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2001/7010/1/00982766", "title": "Research on content-based remote sensing image retrieval: the strategy for visual feature selection, extraction, description and similarity measurement", "doi": null, "abstractUrl": "/proceedings-article/icii/2001/00982766/12OmNApu5KZ", "parentPublication": { "id": "proceedings/icii/2001/7010/1", "title": "2001 International Conferences on Info-tech and Info-net. Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hisb/2011/4407/0/4407a158", "title": "A Scalable Reference Standard of Visual Similarity for a Content-Based Image Retrieval System", "doi": null, "abstractUrl": "/proceedings-article/hisb/2011/4407a158/12OmNBp52v9", "parentPublication": { "id": "proceedings/hisb/2011/4407/0", "title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761683", "title": "Interactive feature visualization for image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761683/12OmNC2fGwI", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04285117", "title": "Content Based Image Retrieval Using Manifold-Ranking of Blocks", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04285117/12OmNwvVrL6", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sisap/2009/3765/0/3765a156", "title": "Text-Based and Content-Based Image Retrieval on Flickr: DEMO", "doi": null, "abstractUrl": "/proceedings-article/sisap/2009/3765a156/12OmNx3ZjkF", "parentPublication": { "id": "proceedings/sisap/2009/3765/0", "title": "Similarity Search and Applications, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/5/01260136", "title": "The fuzzy similarity measures for content-based image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01260136/12OmNyuy9Yu", "parentPublication": { "id": "proceedings/icmlc/2003/7865/1", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asset/1999/0122/0/01220136", "title": "Content-Based Image Retrieval Systems", "doi": null, "abstractUrl": "/proceedings-article/asset/1999/01220136/12OmNzahcdQ", "parentPublication": { "id": "proceedings/asset/1999/0122/0", "title": "Application-Specific Software Engineering and Technology, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2001/05/k0846", "title": "Learning Similarity Matching in Multimedia Content-Based Retrieval", "doi": null, "abstractUrl": "/journal/tk/2001/05/k0846/13rRUyeTVif", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyQq", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "acronym": "quatic", "groupId": "1001784", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxbW4Ve", "doi": "10.1109/QUATIC.2014.63", "title": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "normalizedTitle": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "abstract": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morphosyntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "abstracts": [ { "abstractType": "Regular", "content": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morphosyntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morphosyntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "fno": "6133a247", "keywords": [ "Natural Language Processing", "Semantics", "Cognition", "Syntactics", "Indexes", "Reuse Of Experiences", "Incident Management Process", "Case Based Reasoning", "Natural Language Processing" ], "authors": [ { "affiliation": null, "fullName": "Glauber de Tarso Vieira Bezerra", "givenName": "Glauber de Tarso Vieira", "surname": "Bezerra", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vladia Celia Monteiro Pinheiro", "givenName": "Vladia Celia Monteiro", "surname": "Pinheiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Adriano Bessa Albuquerque", "givenName": "Adriano Bessa", "surname": "Albuquerque", "__typename": "ArticleAuthorType" } ], "idPrefix": "quatic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "247-254", "year": "2014", "issn": null, "isbn": "978-1-4799-6133-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6133a246", "articleId": "12OmNvUaNlF", "__typename": "AdjacentArticleType" }, "next": { "fno": "6133a255", "articleId": "12OmNz6iOvy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/repa/2014/6328/0/06894837", "title": "Requirement boilerplates: Transition from manually-enforced to automatically-verifiable natural language patterns", "doi": null, "abstractUrl": "/proceedings-article/repa/2014/06894837/12OmNAYGlBp", "parentPublication": { "id": "proceedings/repa/2014/6328/0", "title": "2014 IEEE 4th International Workshop on Requirements Patterns (RePa)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1994/6785/0/00346404", "title": "Docile agents to process natural language", "doi": null, "abstractUrl": "/proceedings-article/tai/1994/00346404/12OmNArtheg", "parentPublication": { "id": "proceedings/tai/1994/6785/0", "title": "Proceedings Sixth International Conference on Tools with Artificial Intelligence. TAI 94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acling/2015/9154/0/07422278", "title": "A Proposed Approach for Arabic Language Segmentation", "doi": null, "abstractUrl": "/proceedings-article/acling/2015/07422278/12OmNBAqZGW", "parentPublication": { "id": "proceedings/acling/2015/9154/0", "title": "2015 First International Conference on Arabic Computational Linguistics (ACLing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2017/3035/1/3035a135", "title": "Extracting Business Process Models Using Natural Language Processing (NLP) Techniques", "doi": null, "abstractUrl": "/proceedings-article/cbi/2017/3035a135/12OmNCfSqHo", "parentPublication": { "id": "cbi/2017/3035/1", "title": "2017 IEEE 19th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2015/9961/0/9961a130", "title": "Chinese Natural Language Processing Based on Semantic Structure Tree", "doi": null, "abstractUrl": "/proceedings-article/csa/2015/9961a130/12OmNx3Zjqb", "parentPublication": { "id": "proceedings/csa/2015/9961/0", "title": "2015 International Conference on Computer Science and Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a058", "title": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a058/12OmNxw5BwI", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227119", "title": "Constructing parser for industrial software specifications containing formal and natural language description", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227119/12OmNzdoMqS", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a536", "title": "Natural Language Requirements Processing: From Research to Practice", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a536/13bd1fph1ym", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a438", "title": "NEARM: Natural Language Enhanced Association Rules Mining", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a438/18jXHHUsSf6", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2020/9926/2/09140266", "title": "Semantic search using Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/cbi/2020/09140266/1lu6SkF3MME", "parentPublication": { "id": "proceedings/cbi/2020/9926/2", "title": "2020 IEEE 22nd Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyQq", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "acronym": "quatic", "groupId": "1001784", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxw5BwI", "doi": "10.1109/QUATIC.2014.14", "title": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "normalizedTitle": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "abstract": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morph syntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "abstracts": [ { "abstractType": "Regular", "content": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morph syntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Information Technology (IT) Governance need for tools and processes that assist the qualification, retention and reuse of solutions to leverage the management of incidents. In this sense, this work proposes a process for resolving incidents, whose differential is the use of CBR (Case Based Reasoning) and NLP (Natural Language Processing) techniques, aiming the reuse of experience in handling similar incidents. Specially, NLP techniques, such as morph syntactic analysis and semantic textual similarity, are used in the retrieval phase of the CBR system. We applied the proposed process in a real scenario after the deployment of an ERP system in a mixed capital company, in order to validate if the use of CBR and NLP components in an Incident Management Process optimizes the handling of incidents.", "fno": "6133a058", "keywords": [ "Natural Language Processing", "Semantics", "Cognition", "Syntactics", "Indexes", "Organizations", "Reuse Of Experiences", "Incident Management Process", "Case Based Reasoning", "Natural Language Processing" ], "authors": [ { "affiliation": null, "fullName": "Glauber Bezerra", "givenName": "Glauber", "surname": "Bezerra", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vladia Pinheiro", "givenName": "Vladia", "surname": "Pinheiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Adriano Bessa", "givenName": "Adriano", "surname": "Bessa", "__typename": "ArticleAuthorType" } ], "idPrefix": "quatic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "58-65", "year": "2014", "issn": null, "isbn": "978-1-4799-6133-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6133a048", "articleId": "12OmNylboCI", "__typename": "AdjacentArticleType" }, "next": { "fno": "6133a066", "articleId": "12OmNCeaQ12", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/repa/2014/6328/0/06894837", "title": "Requirement boilerplates: Transition from manually-enforced to automatically-verifiable natural language patterns", "doi": null, "abstractUrl": "/proceedings-article/repa/2014/06894837/12OmNAYGlBp", "parentPublication": { "id": "proceedings/repa/2014/6328/0", "title": "2014 IEEE 4th International Workshop on Requirements Patterns (RePa)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1994/6785/0/00346404", "title": "Docile agents to process natural language", "doi": null, "abstractUrl": "/proceedings-article/tai/1994/00346404/12OmNArtheg", "parentPublication": { "id": "proceedings/tai/1994/6785/0", "title": "Proceedings Sixth International Conference on Tools with Artificial Intelligence. TAI 94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2015/9961/0/9961a130", "title": "Chinese Natural Language Processing Based on Semantic Structure Tree", "doi": null, "abstractUrl": "/proceedings-article/csa/2015/9961a130/12OmNx3Zjqb", "parentPublication": { "id": "proceedings/csa/2015/9961/0", "title": "2015 International Conference on Computer Science and Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a247", "title": "Incident Management Optimization through the Reuse of Experiences and Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a247/12OmNxbW4Ve", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2015/7511/0/07105552", "title": "Multi agent based incident management system according to ITIL", "doi": null, "abstractUrl": "/proceedings-article/iscv/2015/07105552/12OmNyeECyO", "parentPublication": { "id": "proceedings/iscv/2015/7511/0", "title": "2015 Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/1994/6330/0/00336772", "title": "Reuse of modular software with automated comment analysis", "doi": null, "abstractUrl": "/proceedings-article/icsm/1994/00336772/12OmNzVoBsk", "parentPublication": { "id": "proceedings/icsm/1994/6330/0", "title": "Proceedings International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227119", "title": "Constructing parser for industrial software specifications containing formal and natural language description", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227119/12OmNzdoMqS", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962557", "title": "Students&#x2019; Feedback About Their Experiences in EPICS Using Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962557/1IHoromIMPC", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1973/05/06536715", "title": "Research in natural language", "doi": null, "abstractUrl": "/magazine/co/1973/05/06536715/1hN4zrPn20w", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2020/9926/2/09140266", "title": "Semantic search using Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/cbi/2020/09140266/1lu6SkF3MME", "parentPublication": { "id": "proceedings/cbi/2020/9926/2", "title": "2020 IEEE 22nd Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIaeeV", "title": "2016 Third European Network Intelligence Conference (ENIC)", "acronym": "enic", "groupId": "1804885", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNy5R3Gm", "doi": "10.1109/ENIC.2016.011", "title": "A Comparative Analysis of Network-Based Similarity Measures for Scientific Paper Recommendations", "normalizedTitle": "A Comparative Analysis of Network-Based Similarity Measures for Scientific Paper Recommendations", "abstract": "In this paper three similarity measures for scientific papers are compared: bibliographic coupling, co-citation coupling and cosine similarity. All three measures are based on the connections of papers in citation networks. The comparison is conducted both on a mathematical as well as an empirical level. The latter is performed on a real citation network as well as artificially generated networks. The mathematical comparison shows that some measures are structurally very similar, yet if node pairs are ordered according to their similarity, the two measures do not always produce the same rankings. The empirical evaluation shows that bibliographic coupling and one variant of cosine similarity tend to produce the same rankings. The same holds for co-citation coupling and another variant of cosine similarity. Therefore, if only rankings are considered, these measures are interchangeable. The rankings produced by co-citation coupling and bibliographic coupling on the other hand are very different. This also applies to the two cosine similarity variants. Therefore, these measures are not interchangeable.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper three similarity measures for scientific papers are compared: bibliographic coupling, co-citation coupling and cosine similarity. All three measures are based on the connections of papers in citation networks. The comparison is conducted both on a mathematical as well as an empirical level. The latter is performed on a real citation network as well as artificially generated networks. The mathematical comparison shows that some measures are structurally very similar, yet if node pairs are ordered according to their similarity, the two measures do not always produce the same rankings. The empirical evaluation shows that bibliographic coupling and one variant of cosine similarity tend to produce the same rankings. The same holds for co-citation coupling and another variant of cosine similarity. Therefore, if only rankings are considered, these measures are interchangeable. The rankings produced by co-citation coupling and bibliographic coupling on the other hand are very different. This also applies to the two cosine similarity variants. Therefore, these measures are not interchangeable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper three similarity measures for scientific papers are compared: bibliographic coupling, co-citation coupling and cosine similarity. All three measures are based on the connections of papers in citation networks. The comparison is conducted both on a mathematical as well as an empirical level. The latter is performed on a real citation network as well as artificially generated networks. The mathematical comparison shows that some measures are structurally very similar, yet if node pairs are ordered according to their similarity, the two measures do not always produce the same rankings. The empirical evaluation shows that bibliographic coupling and one variant of cosine similarity tend to produce the same rankings. The same holds for co-citation coupling and another variant of cosine similarity. Therefore, if only rankings are considered, these measures are interchangeable. The rankings produced by co-citation coupling and bibliographic coupling on the other hand are very different. This also applies to the two cosine similarity variants. Therefore, these measures are not interchangeable.", "fno": "07838040", "keywords": [ "Bibliographic Systems", "Citation Analysis", "Recommender Systems", "Scientific Information Systems", "Network Based Similarity Measures", "Scientific Paper Recommendations", "Bibliographic Coupling", "Cocitation Coupling", "Citation Networks", "Cosine Similarity Variants", "Couplings", "Recommender Systems", "Terminology", "Measurement", "Mathematical Model", "Biochemistry", "Europe" ], "authors": [ { "affiliation": null, "fullName": "Laura Steinert", "givenName": "Laura", "surname": "Steinert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H. Ulrich Hoppe", "givenName": "H. Ulrich", "surname": "Hoppe", "__typename": "ArticleAuthorType" } ], "idPrefix": "enic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-09-01T00:00:00", "pubType": "proceedings", "pages": "17-24", "year": "2016", "issn": null, "isbn": "978-1-5090-3455-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07838039", "articleId": "12OmNykCcfF", "__typename": "AdjacentArticleType" }, "next": { "fno": "07838041", "articleId": "12OmNBC8ACN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2014/5569/0/06970149", "title": "Personalised PageRank for making recommendations in digital cultural heritage collections", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970149/12OmNAnuTzL", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a524", "title": "Dispersion Based Similarity for Mining Similar Papers in Citation Network", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a524/12OmNvAiSem", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624024", "title": "A preliminary investigation of using age and distance measures in the detection of evolutionary couplings", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624024/12OmNvkpkZH", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115680", "title": "Predicting relevance of change recommendations", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115680/12OmNxUv6dE", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2017/4283/0/4283a063", "title": "Toward Altmetric-Driven Research-Paper Recommender System Framework", "doi": null, "abstractUrl": "/proceedings-article/sitis/2017/4283a063/12OmNxWLTvA", "parentPublication": { "id": "proceedings/sitis/2017/4283/0", "title": "2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206505", "title": "A family of contextual measures of similarity between distributions with application to image retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206505/12OmNy1SFC6", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559583", "title": "Evaluating link-based recommendations for Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559583/12OmNzR8Czz", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2018/0441/0/08703936", "title": "Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits", "doi": null, "abstractUrl": "/proceedings-article/skg/2018/08703936/19JEcrWa1Bm", "parentPublication": { "id": "proceedings/skg/2018/0441/0", "title": "2018 14th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccairo/2018/9576/0/08698358", "title": "Collaborative Filtering Using Fuzzy Rank-Based Similarity Measures", "doi": null, "abstractUrl": "/proceedings-article/iccairo/2018/08698358/19wAXXAshwY", "parentPublication": { "id": "proceedings/iccairo/2018/9576/0", "title": "2018 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2018/0437/0/043700a031", "title": "A Correlation Analysis between Halstead Complexity Measures and other Software Measures", "doi": null, "abstractUrl": "/proceedings-article/clei/2018/043700a031/1cdP43BJJ16", "parentPublication": { "id": "proceedings/clei/2018/0437/0", "title": "2018 XLIV Latin American Computer Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kuHFd2k9Ow", "title": "2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "acronym": "icitbs", "groupId": "1811384", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kuHSLtb7hK", "doi": "10.1109/ICITBS49701.2020.00210", "title": "Text Summarization Generation Based on Semantic Similarity", "normalizedTitle": "Text Summarization Generation Based on Semantic Similarity", "abstract": "In recent years, with the continuous development of deep learning and natural language processing, sequence-to-sequence based model has become the mainstream of abstractive summarization generation, and achieved good results. However, there are some problems of low semantic similarity in the abstracts generated by traditional models. In this work, our goal is to improve semantic relevance between source texts and simplified texts for abstract generation, we propose a text Abstract generation model based on semantic similarity. We use encoder to represent the source document and decoder to generate the summary, and then calculate the semantic similarity between the source document and the generated summary. Experiments show that the generated abstract is more similar to the original text, and more in line with the standards of human writing Abstract.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, with the continuous development of deep learning and natural language processing, sequence-to-sequence based model has become the mainstream of abstractive summarization generation, and achieved good results. However, there are some problems of low semantic similarity in the abstracts generated by traditional models. In this work, our goal is to improve semantic relevance between source texts and simplified texts for abstract generation, we propose a text Abstract generation model based on semantic similarity. We use encoder to represent the source document and decoder to generate the summary, and then calculate the semantic similarity between the source document and the generated summary. Experiments show that the generated abstract is more similar to the original text, and more in line with the standards of human writing Abstract.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, with the continuous development of deep learning and natural language processing, sequence-to-sequence based model has become the mainstream of abstractive summarization generation, and achieved good results. However, there are some problems of low semantic similarity in the abstracts generated by traditional models. In this work, our goal is to improve semantic relevance between source texts and simplified texts for abstract generation, we propose a text Abstract generation model based on semantic similarity. We use encoder to represent the source document and decoder to generate the summary, and then calculate the semantic similarity between the source document and the generated summary. Experiments show that the generated abstract is more similar to the original text, and more in line with the standards of human writing Abstract.", "fno": "669800a946", "keywords": [ "Abstracting", "Computational Linguistics", "Learning Artificial Intelligence", "Natural Language Processing", "Neural Nets", "Text Analysis", "Source Document", "Generated Summary", "Text Summarization Generation", "Deep Learning", "Natural Language Processing", "Sequence To Sequence Based Model", "Abstractive Summarization Generation", "Semantic Similarity", "Semantic Relevance", "Source Texts", "Simplified Texts", "Text Abstract Generation Model", "Encoder", "Decoder", "Deep Learning", "Analytical Models", "Smart Cities", "Semantics", "Writing", "Loss Measurement", "Natural Language Processing", "Natural Language Process", "Sequence To Sequence Model", "Abstractive Summarization", "Semantic Similarity" ], "authors": [ { "affiliation": "Beijing Institute of Graphic Communication", "fullName": "Jingjing Chen", "givenName": "Jingjing", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Graphic Communication", "fullName": "Fucheng You", "givenName": "Fucheng", "surname": "You", "__typename": "ArticleAuthorType" } ], "idPrefix": "icitbs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-01-01T00:00:00", "pubType": "proceedings", "pages": "946-949", "year": "2020", "issn": null, "isbn": "978-1-7281-6698-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "669800a942", "articleId": "1kuI0GRnF8k", "__typename": "AdjacentArticleType" }, "next": { "fno": "669800a950", "articleId": "1kuHNL4wMBG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icitbs/2018/4201/0/420101a307", "title": "Extraction Algorithm of English Text Summarization for English Teaching", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2018/420101a307/12OmNqBKTXo", "parentPublication": { "id": "proceedings/icitbs/2018/4201/0", "title": "2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406304", "title": "Consensus Similarity Measure for Short Text Clustering", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406304/12OmNviZlLh", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2017/3349/0/3349a144", "title": "Short Text Similarity Calculation Using Semantic Information", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2017/3349a144/12OmNyFU6ZA", "parentPublication": { "id": "proceedings/bigcom/2017/3349/0", "title": "2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/2/4143b022", "title": "Semantic Similarity Measurements for Multi-lingual Short Texts Using Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143b022/12OmNz5apNR", "parentPublication": { "id": "wi-iat/2014/4143/2", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2006/08/k1138", "title": "Sentence Similarity Based on Semantic Nets and Corpus Statistics", "doi": null, "abstractUrl": "/journal/tk/2006/08/k1138/13rRUxCitJD", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a266", "title": "Improved Semantic Similarity Method Based on HowNet for Text Clustering", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a266/17D45XH89nb", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit/2018/0385/0/08672665", "title": "Arabic Semantic Similarity Approaches - Review", "doi": null, "abstractUrl": "/proceedings-article/acit/2018/08672665/18IpjTacTiE", "parentPublication": { "id": "proceedings/acit/2018/0385/0", "title": "2018 International Arab Conference on Information Technology (ACIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a036", "title": "Semantic Similarity Metrics for Evaluating Source Code Summarization", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a036/1EpKGgt7Pl6", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictech/2022/9694/0/969400a225", "title": "Research and Application of Automatic Text Summarization Technology Based on Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ictech/2022/969400a225/1FWmsIfe77O", "parentPublication": { "id": "proceedings/ictech/2022/9694/0", "title": "2022 11th International Conference of Information and Communication Technology (ICTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2018/9571/0/652800a265", "title": "Deep Variation Autoencoder with Topic Information for Text Similarity", "doi": null, "abstractUrl": "/proceedings-article/iccia/2018/652800a265/1a3xfEvmaT6", "parentPublication": { "id": "proceedings/iccia/2018/9571/0", "title": "2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmjOtkX0Os", "doi": "10.1109/ICPR48806.2021.9412460", "title": "GCNs-Based Context-Aware Short Text Similarity Model", "normalizedTitle": "GCNs-Based Context-Aware Short Text Similarity Model", "abstract": "Semantic textual similarity is a fundamental task in text mining and natural language processing (NLP), which has profound research value. The essential step for text similarity is text representation learning. Recently, researches have explored the graph convolutional network (GCN) techniques on text representation, since GCN does well in handling complex structures and preserving syntactic information. However, current GCN models are usually limited to very shallow layers due to the vanishing gradient problem, which can not capture non-local dependency information of sentences. In this paper, we propose a GCNs-based context-aware (GCSTS) model that applies iterated GCN blocks to train deeper GCNs. Recurrently employing the same GCN block prevents over-fitting and provides broad effective input width. Combined with dense connections, GCSTS can be trained more deeply. Besides, we use dynamic graph structures in the block, which further extends the receptive field of each vertex in graphs, learning better sentence representations. Experiments show that our model outperforms existing models on several text similarity datasets, while also verify that GCNs-based text representation models can be trained in a deeper manner, rather than being trained in two or three layers.", "abstracts": [ { "abstractType": "Regular", "content": "Semantic textual similarity is a fundamental task in text mining and natural language processing (NLP), which has profound research value. The essential step for text similarity is text representation learning. Recently, researches have explored the graph convolutional network (GCN) techniques on text representation, since GCN does well in handling complex structures and preserving syntactic information. However, current GCN models are usually limited to very shallow layers due to the vanishing gradient problem, which can not capture non-local dependency information of sentences. In this paper, we propose a GCNs-based context-aware (GCSTS) model that applies iterated GCN blocks to train deeper GCNs. Recurrently employing the same GCN block prevents over-fitting and provides broad effective input width. Combined with dense connections, GCSTS can be trained more deeply. Besides, we use dynamic graph structures in the block, which further extends the receptive field of each vertex in graphs, learning better sentence representations. Experiments show that our model outperforms existing models on several text similarity datasets, while also verify that GCNs-based text representation models can be trained in a deeper manner, rather than being trained in two or three layers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Semantic textual similarity is a fundamental task in text mining and natural language processing (NLP), which has profound research value. The essential step for text similarity is text representation learning. Recently, researches have explored the graph convolutional network (GCN) techniques on text representation, since GCN does well in handling complex structures and preserving syntactic information. However, current GCN models are usually limited to very shallow layers due to the vanishing gradient problem, which can not capture non-local dependency information of sentences. In this paper, we propose a GCNs-based context-aware (GCSTS) model that applies iterated GCN blocks to train deeper GCNs. Recurrently employing the same GCN block prevents over-fitting and provides broad effective input width. Combined with dense connections, GCSTS can be trained more deeply. Besides, we use dynamic graph structures in the block, which further extends the receptive field of each vertex in graphs, learning better sentence representations. Experiments show that our model outperforms existing models on several text similarity datasets, while also verify that GCNs-based text representation models can be trained in a deeper manner, rather than being trained in two or three layers.", "fno": "09412460", "keywords": [ "Data Mining", "Graph Theory", "Learning Artificial Intelligence", "Natural Language Processing", "Text Analysis", "Preserving Syntactic Information", "Current GCN Models", "Vanishing Gradient Problem", "GCN Block", "Deeper GC Ns", "Dynamic Graph Structures", "Sentence Representations", "Text Similarity Datasets", "GC Ns Based Text Representation Models", "GC Ns Based Context Aware Short Text Similarity Model", "Semantic Textual Similarity", "Text Mining", "Natural Language Processing", "Profound Research Value", "Text Representation Learning", "Graph Convolutional Network Techniques", "Complex Structures", "Text Mining", "Semantics", "Syntactics", "Natural Language Processing", "Pattern Recognition", "Task Analysis", "Context Modeling" ], "authors": [ { "affiliation": "School of Computer Engineering and Science, Shanghai University", "fullName": "Xiaoqi Sun", "givenName": "Xiaoqi", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering and Science, Shanghai University", "fullName": "Shaochun Wu", "givenName": "Shaochun", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering and Science, Shanghai University, Shanghai Institute for Advanced Communication and Data Science, Shanghai Engineering Research Center of Intelligent Computing System,Shanghai,China,200444", "fullName": "Yue Liu", "givenName": "Yue", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "1329-1335", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412861", "articleId": "1tmiM0Kwn7i", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412890", "articleId": "1tmhjaOacx2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07363801", "title": "SyntacticDiff: Operator-based transformation for comparative text mining", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363801/12OmNApLGmY", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2017/2407/0/2407a342", "title": "Statistical and Semantic Features to Measure Sentence Similarity in Portuguese", "doi": null, "abstractUrl": "/proceedings-article/bracis/2017/2407a342/12OmNBNM8TW", "parentPublication": { "id": "proceedings/bracis/2017/2407/0", "title": "2017 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406304", "title": "Consensus Similarity Measure for Short Text Clustering", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406304/12OmNviZlLh", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2017/3349/0/3349a144", "title": "Short Text Similarity Calculation Using Semantic Information", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2017/3349a144/12OmNyFU6ZA", "parentPublication": { "id": "proceedings/bigcom/2017/3349/0", "title": "2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2019/6783/0/08665505", "title": "Syntactic Graph Convolution in Multi-Task Learning for Identifying and Classifying the Argument Component", "doi": null, "abstractUrl": "/proceedings-article/icsc/2019/08665505/18qcdslrChi", "parentPublication": { "id": "proceedings/icsc/2019/6783/0", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a404", "title": "Text Semantic Representation Based on Knowledge Graph Correction", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a404/1FUVO1IgtPi", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a420", "title": "Graph Convolutional Networks for Fast Text Classification", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a420/1GNtp6dDqRG", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2022/6399/0/639900a405", "title": "Research on Dual-channel Text Feature Extraction Method Based on Neural Network", "doi": null, "abstractUrl": "/proceedings-article/aiam/2022/639900a405/1LRlLdbp49W", "parentPublication": { "id": "proceedings/aiam/2022/6399/0", "title": "2022 4th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j266", "title": "DeepGCNs: Can GCNs Go As Deep As CNNs?", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j266/1hQqlpGkSxa", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194505", "title": "BaKGraSTeC: A Background Knowledge Graph Based Method for Short Text Classification", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194505/1n2nmoWJiDe", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wYlk2PVYic", "title": "2021 3rd International Conference on Natural Language Processing (ICNLP)", "acronym": "icnlp", "groupId": "1843064", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wYlpQugYik", "doi": "10.1109/ICNLP52887.2021.00017", "title": "A Multi-feature Fusion Method for Tibetan Sentence Similarity Calculation", "normalizedTitle": "A Multi-feature Fusion Method for Tibetan Sentence Similarity Calculation", "abstract": "Sentence similarity calculation has an important position in natural language processing and is the basis of text similarity calculation, therefore its accuracy affects the performance of natural language processing. In order to solve the problem of Tibetan sentence similarity calculation, this paper analyzes the contribution of sentence edit distance, sentence structure, sentence length, word order, and the same word to sentence similarity, designs a multi-feature fusion model for Tibetan sentence similarity calculation, proposes a multi-feature fusion method for Tibetan sentence similarity calculation. Experimental results show that the proposed method has achieved good results in Tibetan sentence similarity calculations.", "abstracts": [ { "abstractType": "Regular", "content": "Sentence similarity calculation has an important position in natural language processing and is the basis of text similarity calculation, therefore its accuracy affects the performance of natural language processing. In order to solve the problem of Tibetan sentence similarity calculation, this paper analyzes the contribution of sentence edit distance, sentence structure, sentence length, word order, and the same word to sentence similarity, designs a multi-feature fusion model for Tibetan sentence similarity calculation, proposes a multi-feature fusion method for Tibetan sentence similarity calculation. Experimental results show that the proposed method has achieved good results in Tibetan sentence similarity calculations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Sentence similarity calculation has an important position in natural language processing and is the basis of text similarity calculation, therefore its accuracy affects the performance of natural language processing. In order to solve the problem of Tibetan sentence similarity calculation, this paper analyzes the contribution of sentence edit distance, sentence structure, sentence length, word order, and the same word to sentence similarity, designs a multi-feature fusion model for Tibetan sentence similarity calculation, proposes a multi-feature fusion method for Tibetan sentence similarity calculation. Experimental results show that the proposed method has achieved good results in Tibetan sentence similarity calculations.", "fno": "141100a068", "keywords": [ "Image Fusion", "Natural Language Processing", "Text Analysis", "Tibetan Sentence Similarity Calculation", "Natural Language Processing", "Text Similarity Calculation", "Multifeature Fusion Method", "Analytical Models", "Natural Language Processing", "Tibetan", "Sentence", "Similarity", "Nature Language Process", "Multi Feature" ], "authors": [ { "affiliation": "QingHai Normal University,College of Computer Science and Technology, Tibetan Information Processing and Machine Translation Key Laboratory of QingHai Province, Key Laboratory of Tibetan Information Processing in Education Ministry,XiNing,China", "fullName": "XiLin Chen", "givenName": "XiLin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "QingHai Normal University, Southwest Minzu University,College of Computer Science and Technology, Tibetan Information Processing and Machine Translation Key Laboratory of QingHai Province, Key Laboratory of Tibetan Information Processing in Education Ministry,XiNing,China", "fullName": "Cai ZhiJie", "givenName": "Cai", "surname": "ZhiJie", "__typename": "ArticleAuthorType" }, { "affiliation": "Southwest Minzu University,ChengDu,China", "fullName": "CaiRang ZhuoMa", "givenName": "CaiRang", "surname": "ZhuoMa", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnlp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "68-72", "year": "2021", "issn": null, "isbn": "978-1-6654-1411-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "141100a057", "articleId": "1wYll9sjRPa", "__typename": "AdjacentArticleType" }, "next": { "fno": "141100a073", "articleId": "1wYlmC0DXxe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bracis/2017/2407/0/2407a342", "title": "Statistical and Semantic Features to Measure Sentence Similarity in Portuguese", "doi": null, "abstractUrl": "/proceedings-article/bracis/2017/2407a342/12OmNBNM8TW", "parentPublication": { "id": "proceedings/bracis/2017/2407/0", "title": "2017 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2014/4173/0/4173a329", "title": "A Method for Tibetan Text Orientation Identification", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2014/4173a329/12OmNqyUUFb", "parentPublication": { "id": "proceedings/bwcca/2014/4173/0", "title": "2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmit/2008/3556/0/3556a786", "title": "The Researching on Similarity Calculation Based on HNC", "doi": null, "abstractUrl": "/proceedings-article/mmit/2008/3556a786/12OmNwBT1nt", "parentPublication": { "id": "proceedings/mmit/2008/3556/0", "title": "MultiMedia and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2013/2809/0/2809a292", "title": "Tibetan Concept Similarity Computation Based on Ontology", "doi": null, "abstractUrl": "/proceedings-article/icinis/2013/2809a292/12OmNx5GTYz", "parentPublication": { "id": "proceedings/icinis/2013/2809/0", "title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2015/8315/0/8315a594", "title": "Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy Model", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2015/8315a594/12OmNyvoXdz", "parentPublication": { "id": "proceedings/bwcca/2015/8315/0", "title": "2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2006/08/k1138", "title": "Sentence Similarity Based on Semantic Nets and Corpus Statistics", "doi": null, "abstractUrl": "/journal/tk/2006/08/k1138/13rRUxCitJD", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2021/3757/0/375700b133", "title": "Semantic Similarity Calculation based on Adaptive Semi-supervised Method", "doi": null, "abstractUrl": "/proceedings-article/cecit/2021/375700b133/1CdEWatVuhy", "parentPublication": { "id": "proceedings/cecit/2021/3757/0", "title": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecnlpir/2022/7382/0/738200a108", "title": "A Named Entity Recognition Method for Tibetan based on SWF-Cascade-BiLSTM-CRF Mode", "doi": null, "abstractUrl": "/proceedings-article/ecnlpir/2022/738200a108/1KMQ4DBBjig", "parentPublication": { "id": "proceedings/ecnlpir/2022/7382/0", "title": "2022 European Conference on Natural Language Processing and Information Retrieval (ECNLPIR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2020/8278/0/827800a268", "title": "Calculation of Chinese-Thai Cross-Language Similarity Based on Sentence Embedding", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2020/827800a268/1p4AGvjEady", "parentPublication": { "id": "proceedings/icsgea/2020/8278/0", "title": "2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2021/1411/0/141100a033", "title": "A Corpus Preprocessing Method for Syllable-Level Tibetan Text Classification", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2021/141100a033/1wYlnP86fLO", "parentPublication": { "id": "proceedings/icnlp/2021/1411/0", "title": "2021 3rd International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zL1CunfrGM", "title": "2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)", "acronym": "icaa", "groupId": "1842748", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zL1LxhbFqU", "doi": "10.1109/ICAA53760.2021.00058", "title": "Text Similarity Based on Post-training BERT", "normalizedTitle": "Text Similarity Based on Post-training BERT", "abstract": "Text similarity is an important taskin natural language processing. The pre-training BERT model which is get from through large-scale corpus traininghas achieved good results in various natural language processing tasks. However, domain knowledge is not introduced to the model. After the post-training through domain data, the bias of the model for the domain knowledge will be reduced, which improves performance in reading comprehension and emotional aspect extraction. In this paper, the domain knowledge is introduced through the post-training andthen text similarity is discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Text similarity is an important taskin natural language processing. The pre-training BERT model which is get from through large-scale corpus traininghas achieved good results in various natural language processing tasks. However, domain knowledge is not introduced to the model. After the post-training through domain data, the bias of the model for the domain knowledge will be reduced, which improves performance in reading comprehension and emotional aspect extraction. In this paper, the domain knowledge is introduced through the post-training andthen text similarity is discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Text similarity is an important taskin natural language processing. The pre-training BERT model which is get from through large-scale corpus traininghas achieved good results in various natural language processing tasks. However, domain knowledge is not introduced to the model. After the post-training through domain data, the bias of the model for the domain knowledge will be reduced, which improves performance in reading comprehension and emotional aspect extraction. In this paper, the domain knowledge is introduced through the post-training andthen text similarity is discussed.", "fno": "373000a279", "keywords": [ "Natural Language Processing", "Text Analysis", "Domain Data", "Domain Knowledge", "Emotional Aspect Extraction", "Large Scale Corpus Training", "Natural Language Processing", "Post Training BERT", "Pre Training BERT Model", "Text Similarity", "Automation", "Computational Modeling", "Bit Error Rate", "Natural Language Processing", "Data Models", "Data Mining", "Task Analysis" ], "authors": [ { "affiliation": "Beijing Leadsec Technology Co., Ltd,Beijing,China,100193", "fullName": "Yongping Xing", "givenName": "Yongping", "surname": "Xing", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Venustech Co., Ltd,Beijing,China,100193", "fullName": "Chaoyi Bian", "givenName": "Chaoyi", "surname": "Bian", "__typename": "ArticleAuthorType" } ], "idPrefix": "icaa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "279-282", "year": "2021", "issn": null, "isbn": "978-1-6654-3730-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "373000a275", "articleId": "1zL1U6mor0Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "373000a283", "articleId": "1zL1PXWmNTq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnlp/2022/9544/0/954400a324", "title": "Unmasking the Stereotypes: Evaluating Social Biases in Chinese BERT", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a324/1GNtk4oHQJy", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020161", "title": "Emotion Recognition on StackOverflow Posts Using BERT", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020161/1KfSLrQPEOY", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a292", "title": "Supporting the construction of mystery novel knowledge graphs using BERT", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a292/1LFKOZw8BEs", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2022/6265/0/626500a120", "title": "Named Entity Recognition of Chinese Legal Text Based on BERT", "doi": null, "abstractUrl": "/proceedings-article/icaml/2022/626500a120/1LkfAYjDrDG", "parentPublication": { "id": "proceedings/icaml/2022/6265/0", "title": "2022 4th International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800g757", "title": "Sketch-BERT: Learning Sketch Bidirectional Encoder Representation From Transformers by Self-Supervised Learning of Sketch Gestalt", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800g757/1m3ossfYmxq", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a437", "title": "Text Editing for Augmented Distilled BERT", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a437/1pP3x176Ke4", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374339", "title": "When BERT Meets Bilbo: A Learning Curve Analysis of Pretrained Language Model on Disease Classification", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374339/1rUIWnNUuiY", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377869", "title": "Named Entity Recognition on Morphologically Rich Language: Exploring the Performance of BERT with varying Training Levels", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377869/1s64uGIpYfS", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412167", "title": "Adversarial Training for Aspect-Based Sentiment Analysis with BERT", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412167/1tmhkgFIhBm", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2021/1252/0/125200a145", "title": "DA-BERT: Enhancing Knowledge Selection in Dialog via Domain Adapted BERT with Dynamic Masking Probability", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2021/125200a145/1xxcG34vO7u", "parentPublication": { "id": "proceedings/smartcomp/2021/1252/0", "title": "2021 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyqRnt3", "title": "2006 Second International Symposium on Plant Growth Modeling, Simulation, Visualization and Applications", "acronym": "pma", "groupId": "1001757", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNyqRn3k", "doi": "10.1109/PMA.2006.16", "title": "Biometrical Models as Tools for Forest Ecosystem Management", "normalizedTitle": "Biometrical Models as Tools for Forest Ecosystem Management", "abstract": "This paper sketches how forest management functions in Europe and how knowledge about forest ecosystems can be instilled into the planning process via models. Simulation models support decisions by scenario analysis, which display the consequences of management options with respect to decisive system variables. While elsewhere plantations for intensive wood-production are separated from forests for conservation, in European forests a multitude of functions is integrated. This concept requires models, which quantify the ecological, economical, and social consequences of treatment options. The required information can be delivered by hybrid models, which are on the one hand simple enough with respect to input data, driving variables, and application, on the other hand sufficiently mechanistic in order to display matter and energy flow. Recommendations are given for a convergence of empirical and mechanistic models, for integration of models into the information flow of management, and for a successful transfer of scientific knowledge to end-users.", "abstracts": [ { "abstractType": "Regular", "content": "This paper sketches how forest management functions in Europe and how knowledge about forest ecosystems can be instilled into the planning process via models. Simulation models support decisions by scenario analysis, which display the consequences of management options with respect to decisive system variables. While elsewhere plantations for intensive wood-production are separated from forests for conservation, in European forests a multitude of functions is integrated. This concept requires models, which quantify the ecological, economical, and social consequences of treatment options. The required information can be delivered by hybrid models, which are on the one hand simple enough with respect to input data, driving variables, and application, on the other hand sufficiently mechanistic in order to display matter and energy flow. Recommendations are given for a convergence of empirical and mechanistic models, for integration of models into the information flow of management, and for a successful transfer of scientific knowledge to end-users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper sketches how forest management functions in Europe and how knowledge about forest ecosystems can be instilled into the planning process via models. Simulation models support decisions by scenario analysis, which display the consequences of management options with respect to decisive system variables. While elsewhere plantations for intensive wood-production are separated from forests for conservation, in European forests a multitude of functions is integrated. This concept requires models, which quantify the ecological, economical, and social consequences of treatment options. The required information can be delivered by hybrid models, which are on the one hand simple enough with respect to input data, driving variables, and application, on the other hand sufficiently mechanistic in order to display matter and energy flow. Recommendations are given for a convergence of empirical and mechanistic models, for integration of models into the information flow of management, and for a successful transfer of scientific knowledge to end-users.", "fno": "2851a209", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Hans Pretzsch", "givenName": "Hans", "surname": "Pretzsch", "__typename": "ArticleAuthorType" } ], "idPrefix": "pma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "209-215", "year": "2006", "issn": null, "isbn": "978-0-7695-2851-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2851a202", "articleId": "12OmNqFa5qe", "__typename": "AdjacentArticleType" }, "next": { "fno": "2851a216", "articleId": "12OmNzy7uOe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iacsit-sc/2009/3653/0/3653a550", "title": "Transect-Plot Inventory, a Method for Arid and Semi Arid Forest: Case Study Rahim Abad Pistachio Forest", "doi": null, "abstractUrl": "/proceedings-article/iacsit-sc/2009/3653a550/12OmNAle6OG", "parentPublication": { "id": "proceedings/iacsit-sc/2009/3653/0", "title": "Computer Science and Information Technology, International Association of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a129", "title": "Unsupervised Random Forest Manifold Alignment for Lipreading", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a129/12OmNCvcLIR", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2014/7100/0/07073259", "title": "Self-adaptive heterogeneous random forest", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2014/07073259/12OmNqIzh4K", "parentPublication": { "id": "proceedings/aiccsa/2014/7100/0", "title": "2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2005/2424/0/24240669", "title": "Towards a Forest Information System for Europe", "doi": null, "abstractUrl": "/proceedings-article/dexa/2005/24240669/12OmNyL0Tii", "parentPublication": { "id": "proceedings/dexa/2005/2424/0", "title": "16th International Workshop on Database and Expert Systems Applications (DEXA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2012/4699/0/4699a232", "title": "Accelerating a Random Forest Classifier: Multi-Core, GP-GPU, or FPGA?", "doi": null, "abstractUrl": "/proceedings-article/fccm/2012/4699a232/12OmNz2kql5", "parentPublication": { "id": "proceedings/fccm/2012/4699/0", "title": "Field-Programmable Custom Computing Machines, Annual IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2013/2809/0/2809a296", "title": "Application of Hani People's Traditional Knowledge on Forest Management", "doi": null, "abstractUrl": "/proceedings-article/icinis/2013/2809a296/12OmNzwpUmZ", "parentPublication": { "id": "proceedings/icinis/2013/2809/0", "title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/05/06583153", "title": "Learning Nonlinear Functions Using Regularized Greedy Forest", "doi": null, "abstractUrl": "/journal/tp/2014/05/06583153/13rRUwbaqW2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cacml/2022/8290/0/829000a193", "title": "Attacking Random Forest Classifiers based on Shortest Path Algorithm", "doi": null, "abstractUrl": "/proceedings-article/cacml/2022/829000a193/1FY1pVsjc4g", "parentPublication": { "id": "proceedings/cacml/2022/8290/0", "title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2019/4732/0/09316542", "title": "Exploration of Carbon Nanotube Forest Synthesis-Structure Relationships Using Physics-Based Simulation and Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/aipr/2019/09316542/1qiWiIaqEmY", "parentPublication": { "id": "proceedings/aipr/2019/4732/0", "title": "2019 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412014", "title": "On learning Random Forests for Random Forest-clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412014/1tmjr5IVIYM", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJspq9r0KA", "doi": "10.1109/BigData47090.2019.9006235", "title": "Hybrid 2D and 3D Visual Analytics of Network Simulation Data", "normalizedTitle": "Hybrid 2D and 3D Visual Analytics of Network Simulation Data", "abstract": "We present a visualization architecture to support 2D and 3D visual analytics applications. The architecture is designed to be data-flow-oriented and reconfigurable such that several diverse visualization components can operate as one integrated system. Our prototype application allows users to visually analyze the results of a complex 3D network simulation data both on large high-resolution display and HTC Vive Head Mounted Display. The network simulation outputs variables describing various characteristics of network connectivity between the moving nodes on the ground and in the air interacting in a dynamically changing 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the network simulation in a virtual environment showing the timevarying results in a 3D environment. The Unity application runs on a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the different 2D visualization components including a 2D map. Preliminary results show our data-centric design provides a usercentric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "abstracts": [ { "abstractType": "Regular", "content": "We present a visualization architecture to support 2D and 3D visual analytics applications. The architecture is designed to be data-flow-oriented and reconfigurable such that several diverse visualization components can operate as one integrated system. Our prototype application allows users to visually analyze the results of a complex 3D network simulation data both on large high-resolution display and HTC Vive Head Mounted Display. The network simulation outputs variables describing various characteristics of network connectivity between the moving nodes on the ground and in the air interacting in a dynamically changing 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the network simulation in a virtual environment showing the timevarying results in a 3D environment. The Unity application runs on a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the different 2D visualization components including a 2D map. Preliminary results show our data-centric design provides a usercentric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a visualization architecture to support 2D and 3D visual analytics applications. The architecture is designed to be data-flow-oriented and reconfigurable such that several diverse visualization components can operate as one integrated system. Our prototype application allows users to visually analyze the results of a complex 3D network simulation data both on large high-resolution display and HTC Vive Head Mounted Display. The network simulation outputs variables describing various characteristics of network connectivity between the moving nodes on the ground and in the air interacting in a dynamically changing 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the network simulation in a virtual environment showing the timevarying results in a 3D environment. The Unity application runs on a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the different 2D visualization components including a 2D map. Preliminary results show our data-centric design provides a usercentric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "fno": "09006235", "keywords": [ "Data Analysis", "Data Visualisation", "Helmet Mounted Displays", "Unity Application", "2 D Visualization Framework", "High Resolution Display System", "Data Centric Design", "Network Simulation Data", "Visualization Architecture", "3 D Visual Analytics Applications", "HTC Vive Head Mounted Display", "2 D Charting Tools", "Complete Immersive Head Mounted Display Device", "User Centric Visualization Tool", "Data Visualization", "Three Dimensional Displays", "Two Dimensional Displays", "Servers", "Protocols", "Visual Analytics", "Tools", "Component", "Formatting", "Style", "Styling" ], "authors": [ { "affiliation": "CCDC Army Research Laboratory,Computational and Information Science Directorate,APG,USA", "fullName": "Simon Su", "givenName": "Simon", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "CCDC Army Research Laboratory,Computational and Information Science Directorate,APG,USA", "fullName": "Vincent Perry", "givenName": "Vincent", "surname": "Perry", "__typename": "ArticleAuthorType" }, { "affiliation": "CCDC Army Research Laboratory,Computational and Information Science Directorate,APG,USA", "fullName": "Venkat Dasari", "givenName": "Venkat", "surname": "Dasari", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "3992-3999", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006423", "articleId": "1hJrIVgcw6c", "__typename": "AdjacentArticleType" }, "next": { "fno": "09005959", "articleId": "1hJsxRGQPYc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ispdc/2016/4152/0/07904314", "title": "Research on Monocular Visual Odometry Based on 3D-2D Motion Estimation", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2016/07904314/12OmNAhfIvL", "parentPublication": { "id": "proceedings/ispdc/2016/4152/0", "title": "2016 15th International Symposium on Parallel and Distributed Computing (ISPDC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532837", "title": "Eyegaze analysis of displays with combined 2D and 3D views", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532837/12OmNBvkdk6", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2007/3056/0/30560063", "title": "LUMAR: A Hybrid Spatial Display System for 2D and 3D Handheld Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icat/2007/30560063/12OmNwpoFDq", "parentPublication": { "id": "proceedings/icat/2007/3056/0", "title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811033", "title": "Creating Virtual 3D See-Through Experiences on Large-size 2D Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811033/12OmNzZEAqd", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a247", "title": "Development View and Cut Generation of 3D Object Surface for Simulating Haptic Feedback with 2D Lateral Force", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a247/12OmNzmclN7", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08533893", "title": "Building Multiple Coordinated Spaces for Effective Immersive Analytics through Distributed Cognition", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08533893/17D45Wuc3a3", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802454", "title": "EmbeddingVis: A Visual Analytics Approach to Comparative Network Embedding Inspection", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802454/1cJ6YEzEuQ0", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089663", "title": "Slicing-Volume: Hybrid 3D/2D Multi-target Selection Technique for Dense Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089663/1jIxdJFH8as", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/searis/2018/6272/0/09180229", "title": "Realtime Interactive Hybrid 2D and 3D Visual Analytics on Large High Resolution Display and Immersive Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/searis/2018/09180229/1mK7jikqxkQ", "parentPublication": { "id": "proceedings/searis/2018/6272/0", "title": "2018 IEEE 11th Workshop on Software Engineering and Architectures for Real-time Interactive Systems (SEARIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/searis/2018/6272/0/09180231", "title": "VD1: a technical approach to a hybrid 2D and 3D desktop environment", "doi": null, "abstractUrl": "/proceedings-article/searis/2018/09180231/1mK7jmn4lbO", "parentPublication": { "id": "proceedings/searis/2018/6272/0", "title": "2018 IEEE 11th Workshop on Software Engineering and Architectures for Real-time Interactive Systems (SEARIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rvCq9dNOeI", "title": "2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)", "acronym": "icpads", "groupId": "1000534", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rvCw0LZ33O", "doi": "10.1109/ICPADS51040.2020.00035", "title": "Massively Parallel Causal Inference of Whole Brain Dynamics at Single Neuron Resolution", "normalizedTitle": "Massively Parallel Causal Inference of Whole Brain Dynamics at Single Neuron Resolution", "abstract": "Empirical Dynamic Modeling (EDM) is a nonlinear time series causal inference framework. The latest implementation of EDM, cppEDM, has only been used for small datasets due to computational cost. With the growth of data collection capabilities, there is a great need to identify causal relationships in large datasets. We present mpEDM, a parallel distributed implementation of EDM optimized for modern GPU-centric supercomputers. We improve the original algorithm to reduce redundant computation and optimize the implementation to fully utilize hardware resources such as GPUs and SIMD units. As a use case, we run mpEDM on AI Bridging Cloud Infrastructure (ABCI) using datasets of an entire animal brain sampled at single neuron resolution to identify dynamical causation patterns across the brain. mpEDM is 1,530&#x00D7; faster than cppEDM and a dataset containing 101,729 neuron was analyzed in 199 seconds on 512 nodes. This is the largest EDM causal inference achieved to date.", "abstracts": [ { "abstractType": "Regular", "content": "Empirical Dynamic Modeling (EDM) is a nonlinear time series causal inference framework. The latest implementation of EDM, cppEDM, has only been used for small datasets due to computational cost. With the growth of data collection capabilities, there is a great need to identify causal relationships in large datasets. We present mpEDM, a parallel distributed implementation of EDM optimized for modern GPU-centric supercomputers. We improve the original algorithm to reduce redundant computation and optimize the implementation to fully utilize hardware resources such as GPUs and SIMD units. As a use case, we run mpEDM on AI Bridging Cloud Infrastructure (ABCI) using datasets of an entire animal brain sampled at single neuron resolution to identify dynamical causation patterns across the brain. mpEDM is 1,530&#x00D7; faster than cppEDM and a dataset containing 101,729 neuron was analyzed in 199 seconds on 512 nodes. This is the largest EDM causal inference achieved to date.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Empirical Dynamic Modeling (EDM) is a nonlinear time series causal inference framework. The latest implementation of EDM, cppEDM, has only been used for small datasets due to computational cost. With the growth of data collection capabilities, there is a great need to identify causal relationships in large datasets. We present mpEDM, a parallel distributed implementation of EDM optimized for modern GPU-centric supercomputers. We improve the original algorithm to reduce redundant computation and optimize the implementation to fully utilize hardware resources such as GPUs and SIMD units. As a use case, we run mpEDM on AI Bridging Cloud Infrastructure (ABCI) using datasets of an entire animal brain sampled at single neuron resolution to identify dynamical causation patterns across the brain. mpEDM is 1,530× faster than cppEDM and a dataset containing 101,729 neuron was analyzed in 199 seconds on 512 nodes. This is the largest EDM causal inference achieved to date.", "fno": "907400a196", "keywords": [ "Brain", "Cloud Computing", "Neurophysiology", "Parallel Processing", "Time Series", "Cpp EDM", "Brain Dynamics", "Empirical Dynamic Modeling", "Nonlinear Time Series Causal Inference Framework", "Massively Parallel Causal Inference", "Whole Brain Dynamics", "AI Bridging Cloud Infrastructure", "ABCI", "EDM Causal Inference", "SIMD", "Dynamical Causation Patterns", "Single Neuron Resolution", "Animal Brain", "Redundant Computation", "Modern GPU Centric Supercomputers", "Mp EDM", "Causal Relationships", "Data Collection Capabilities", "Computational Cost", "Computational Modeling", "Heuristic Algorithms", "Neurons", "Time Series Analysis", "Data Collection", "Supercomputers", "Hardware", "Empirical Dynamic Modeling", "Causal Inference", "Parallel Distributed Computing", "GPU", "High Performance Computing", "Neuroscience" ], "authors": [ { "affiliation": "Nara Institute of Science and Technology,Nara,Japan", "fullName": "Wassapon Watanakeesuntorn", "givenName": "Wassapon", "surname": "Watanakeesuntorn", "__typename": "ArticleAuthorType" }, { "affiliation": "Nara Institute of Science and Technology,Nara,Japan", "fullName": "Keichi Takahashi", "givenName": "Keichi", "surname": "Takahashi", "__typename": "ArticleAuthorType" }, { "affiliation": "Nara Institute of Science and Technology,Nara,Japan", "fullName": "Kohei Ichikawa", "givenName": "Kohei", "surname": "Ichikawa", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Department of the Interior,Florida,USA", "fullName": "Joseph Park", "givenName": "Joseph", "surname": "Park", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Diego,California,USA", "fullName": "George Sugihara", "givenName": "George", "surname": "Sugihara", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Advanced Industrial Science and Technology,Tsukuba,Japan", "fullName": "Ryousei Takano", "givenName": "Ryousei", "surname": "Takano", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Advanced Industrial Science and Technology,Tsukuba,Japan", "fullName": "Jason Haga", "givenName": "Jason", "surname": "Haga", "__typename": "ArticleAuthorType" }, { "affiliation": "Salk Institute for Biological Studies,California,USA", "fullName": "Gerald M. Pao", "givenName": "Gerald M.", "surname": "Pao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpads", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "196-205", "year": "2020", "issn": null, "isbn": "978-1-7281-9074-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "907400a188", "articleId": "1rvCuSJT6kU", "__typename": "AdjacentArticleType" }, "next": { "fno": "907400a206", "articleId": "1rvCqcGXKPC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcs/2017/3250/0/08035160", "title": "Programmed Neuron Cells' Morphology Multiphase Assessment", "doi": null, "abstractUrl": "/proceedings-article/hpcs/2017/08035160/12OmNAndija", "parentPublication": { "id": "proceedings/hpcs/2017/3250/0", "title": "2017 International Conference on High-Performance Computing & Simulation (HPCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/2/04021273", "title": "Development of a Neuron Based Internet Game Driven by a Brain-Computer Interface System", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/04021273/12OmNApLGq4", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci-cc/2012/2795/0/06311125", "title": "The Ersatz Brain Project: A brain-like computer architecture for cognition", "doi": null, "abstractUrl": "/proceedings-article/icci-cc/2012/06311125/12OmNBgQFMW", "parentPublication": { "id": "proceedings/icci-cc/2012/2795/0", "title": "2012 11th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011916", "title": "Causal flow", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011916/12OmNxxvANK", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2016/4571/0/4571a445", "title": "Neuron Activity Extraction and Network Analysis on Mouse Brain Videos", "doi": null, "abstractUrl": "/proceedings-article/ism/2016/4571a445/12OmNyKrH9S", "parentPublication": { "id": "proceedings/ism/2016/4571/0", "title": "2016 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2010/8485/0/05635201", "title": "Causal Reasoning with Neuron Diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635201/12OmNyRPgSL", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a126", "title": "Automatic 3D Single Neuron Reconstruction with Exhaustive Tracing", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a126/12OmNyvY9sc", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742370", "title": "The Neuron Navigator: Exploring the information pathway through the neural maze", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742370/12OmNzxgHEL", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2018/0169/0/016900a001", "title": "Computationally Efficient Low Power Neuron Model for Digital Brain", "doi": null, "abstractUrl": "/proceedings-article/cis/2018/016900a001/17D45XacGjQ", "parentPublication": { "id": "proceedings/cis/2018/0169/0", "title": "2018 14th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a289", "title": "Optimization Algorithms in Reconstructions of Neuron Morphology: An Overview", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a289/1ehBI4wpbUc", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgooAyzAEU", "title": "2016 17th IEEE International Conference on Mobile Data Management (MDM)", "acronym": "mdm", "groupId": "1000468", "volume": "2", "displayVolume": "2", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvkYxbW", "doi": "10.1109/MDM.2016.88", "title": "Evolving Centralities in Temporal Graphs: A Twitter Network Analysis", "normalizedTitle": "Evolving Centralities in Temporal Graphs: A Twitter Network Analysis", "abstract": "In online social media systems users are not only posting, consuming, and sharing content, but also creating new and destroying existing connections in the underlying social network. This behavior lead us to investigate how user structural position reacts with the evolution of the underlying social network structure. While centrality metrics have been studied in the past, much less is known about their temporal behaviors and processing, mainly when analyzing not just networks snapshots, but interval graphs. Here, we study Twitter follower/followee network and how users centralities evolve over time. Our analysis is founded on temporal graphs theory. First, we model Twitter as a temporal network and revisit the concept of shortest path considering the time dimension. We show how to compute closeness and betweenness centralities using fastest paths. Then, we propose a baseline algorithm for mining streams of temporal networks. The task is to find all pairs fastest paths inside an observation window. We find that Twitter users are fairly dynamic and from one moment to the next, they can assume (or leave) central roles in the network.", "abstracts": [ { "abstractType": "Regular", "content": "In online social media systems users are not only posting, consuming, and sharing content, but also creating new and destroying existing connections in the underlying social network. This behavior lead us to investigate how user structural position reacts with the evolution of the underlying social network structure. While centrality metrics have been studied in the past, much less is known about their temporal behaviors and processing, mainly when analyzing not just networks snapshots, but interval graphs. Here, we study Twitter follower/followee network and how users centralities evolve over time. Our analysis is founded on temporal graphs theory. First, we model Twitter as a temporal network and revisit the concept of shortest path considering the time dimension. We show how to compute closeness and betweenness centralities using fastest paths. Then, we propose a baseline algorithm for mining streams of temporal networks. The task is to find all pairs fastest paths inside an observation window. We find that Twitter users are fairly dynamic and from one moment to the next, they can assume (or leave) central roles in the network.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In online social media systems users are not only posting, consuming, and sharing content, but also creating new and destroying existing connections in the underlying social network. This behavior lead us to investigate how user structural position reacts with the evolution of the underlying social network structure. While centrality metrics have been studied in the past, much less is known about their temporal behaviors and processing, mainly when analyzing not just networks snapshots, but interval graphs. Here, we study Twitter follower/followee network and how users centralities evolve over time. Our analysis is founded on temporal graphs theory. First, we model Twitter as a temporal network and revisit the concept of shortest path considering the time dimension. We show how to compute closeness and betweenness centralities using fastest paths. Then, we propose a baseline algorithm for mining streams of temporal networks. The task is to find all pairs fastest paths inside an observation window. We find that Twitter users are fairly dynamic and from one moment to the next, they can assume (or leave) central roles in the network.", "fno": "0883b043", "keywords": [ "Data Mining", "Graph Theory", "Social Networking Online", "Temporal Graph", "Twitter Network Analysis", "Online Social Media System", "Social Network Structure", "Centrality Metrics", "Interval Graph", "Twitter Follower Followee Network", "Shortest Path Concept", "Closeness Centrality", "Betweenness Centrality", "Temporal Network Mining", "Twitter", "Measurement", "Crawlers", "Algorithm Design And Analysis", "Data Mining", "Approximation Algorithms", "Temporal Networks", "Evolving Networks", "Evolving Centralities" ], "authors": [ { "affiliation": "Sch. of Comput. Sci., Fed. Univ. of Uberlandia, Uberlandia, Brazil", "fullName": "Fabiola S.F. Pereira", "givenName": "Fabiola S.F.", "surname": "Pereira", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Comput. Sci., Fed. Univ. of Uberlandia, Uberlandia, Brazil", "fullName": "Sandra de Amo", "givenName": "Sandra", "surname": "de Amo", "__typename": "ArticleAuthorType" }, { "affiliation": "LIAAD, Univ. of Porto, Porto, Portugal", "fullName": "João Gama", "givenName": "João", "surname": "Gama", "__typename": "ArticleAuthorType" } ], "idPrefix": "mdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "43-48", "year": "2016", "issn": "2375-0324", "isbn": "978-1-5090-0883-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0883b037", "articleId": "12OmNzGDsMW", "__typename": "AdjacentArticleType" }, "next": { "fno": "0883b049", "articleId": "12OmNx2QUMq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsaa/2016/5206/0/07796890", "title": "Temporal Network Change Detection Using Network Centralities", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796890/12OmNBp52Ke", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialinformatics/2012/5015/0/5015a145", "title": "Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning", "doi": null, "abstractUrl": "/proceedings-article/socialinformatics/2012/5015a145/12OmNqHqSpQ", "parentPublication": { "id": "proceedings/socialinformatics/2012/5015/0", "title": "International Conference on Social Informatics (SocialInformatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sehs/2016/4168/0/4168a043", "title": "Mining Twitter Data for Influenza Detection and Surveillance", "doi": null, "abstractUrl": "/proceedings-article/sehs/2016/4168a043/12OmNrY3LwK", "parentPublication": { "id": "proceedings/sehs/2016/4168/0", "title": "2016 IEEE/ACM International Workshop on Software Engineering in Healthcare Systems (SEHS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcloud/2014/6719/0/6719a326", "title": "Personalized Recommender System on Whom to Follow in Twitter", "doi": null, "abstractUrl": "/proceedings-article/bdcloud/2014/6719a326/12OmNroijcK", "parentPublication": { "id": "proceedings/bdcloud/2014/6719/0", "title": "2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2010/3984/0/3984b257", "title": "Twitter Quo Vadis: Is Twitter Bitter or Are Tweets Sweet?", "doi": null, "abstractUrl": "/proceedings-article/itng/2010/3984b257/12OmNs4S8Le", "parentPublication": { "id": "proceedings/itng/2010/3984/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836730", "title": "Tracking Language Mobility in the Twitter Landscape", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836730/12OmNwtEEOM", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2015/7278/0/07207304", "title": "How Has Twitter Changed the Event Discussion Scenario? A Spatio-temporal Diffusion Analysis", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207304/12OmNyUnEDS", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/2/4143b186", "title": "Time Makes Sense: Event Discovery in Twitter Using Temporal Similarity", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143b186/12OmNyXMQnq", "parentPublication": { "id": "wi-iat/2014/4143/2", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113317", "title": "Rhythms in Twitter", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113317/12OmNzahc7o", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2020/4266/0/09094110", "title": "Pulse of the City: Spatio-Temporal Twitter Content Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdew/2020/09094110/1jQRGfEAnSg", "parentPublication": { "id": "proceedings/icdew/2020/4266/0", "title": "2020 IEEE 36th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPPI", "title": "Temporal Representation and Reasoning, International Syposium on", "acronym": "time", "groupId": "1000750", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNzgeLCZ", "doi": "10.1109/TIME.2003.1214895", "title": "Spatio-Temporal Data Mining with Expected Distribution Domain Generalization Graphs", "normalizedTitle": "Spatio-Temporal Data Mining with Expected Distribution Domain Generalization Graphs", "abstract": "We describe a method for spatio-temporal data mining based on expected distribution domain generalization (ExGen) graphs. Using familiar calendar and geographical concepts, such as workdays, weeks, climatic regions, and countries, spatio-temporal data can be aggregated into summaries in many ways. We automatically search for a summary with a distribution that is anomalous, i.e., far from user expectations. We repeatedly ranking possible summaries according to current expectations, and then allow the user to adjust these expectations.", "abstracts": [ { "abstractType": "Regular", "content": "We describe a method for spatio-temporal data mining based on expected distribution domain generalization (ExGen) graphs. Using familiar calendar and geographical concepts, such as workdays, weeks, climatic regions, and countries, spatio-temporal data can be aggregated into summaries in many ways. We automatically search for a summary with a distribution that is anomalous, i.e., far from user expectations. We repeatedly ranking possible summaries according to current expectations, and then allow the user to adjust these expectations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We describe a method for spatio-temporal data mining based on expected distribution domain generalization (ExGen) graphs. Using familiar calendar and geographical concepts, such as workdays, weeks, climatic regions, and countries, spatio-temporal data can be aggregated into summaries in many ways. We automatically search for a summary with a distribution that is anomalous, i.e., far from user expectations. We repeatedly ranking possible summaries according to current expectations, and then allow the user to adjust these expectations.", "fno": "19120181", "keywords": [], "authors": [ { "affiliation": "University of Regina", "fullName": "Howard J. Hamilton", "givenName": "Howard J.", "surname": "Hamilton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Regina", "fullName": "Liqiang Geng", "givenName": "Liqiang", "surname": "Geng", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Regina", "fullName": "Leah Findlater", "givenName": "Leah", "surname": "Findlater", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Regina", "fullName": "Dee Jay Randall", "givenName": "Dee Jay", "surname": "Randall", "__typename": "ArticleAuthorType" } ], "idPrefix": "time", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2003-07-01T00:00:00", "pubType": "proceedings", "pages": "181", "year": "2003", "issn": "1530-1311", "isbn": "0-7695-1912-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "19120174", "articleId": "12OmNwcCIHW", "__typename": "AdjacentArticleType" }, "next": { "fno": "19120192", "articleId": "12OmNqOffwQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vl/1999/0216/0/02160187", "title": "Visual Specification of Spatio-Temporal Developments", "doi": null, "abstractUrl": "/proceedings-article/vl/1999/02160187/12OmNAo45D2", "parentPublication": { "id": "proceedings/vl/1999/0216/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2005/2488/0/24880270", "title": "Spatio-Temporal Relevant Logic as the Logical Basis for Spatio-Temporal Information Systems", "doi": null, "abstractUrl": "/proceedings-article/ictai/2005/24880270/12OmNCfAPwB", "parentPublication": { "id": "proceedings/ictai/2005/2488/0", "title": "17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euc/2010/4322/0/4322a112", "title": "GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams", "doi": null, "abstractUrl": "/proceedings-article/euc/2010/4322a112/12OmNvqmUFl", "parentPublication": { "id": "proceedings/euc/2010/4322/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smbv/2001/1327/0/13270103", "title": "Spatio-Temporal Stereo Using Multi-Resolution Subdivision Surfaces", "doi": null, "abstractUrl": "/proceedings-article/smbv/2001/13270103/12OmNxwENmZ", "parentPublication": { "id": "proceedings/smbv/2001/1327/0", "title": "Proceedings IEEE Workshop on Stereo and Multi-Baseline Vision (SMBV 2001)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2002/1695/2/169520617", "title": "Illumination Invariant Segmentation of Spatio-Temporal Images by Spatio-Temporal Markov Random Field Model", "doi": null, "abstractUrl": "/proceedings-article/icpr/2002/169520617/12OmNzd7bbp", "parentPublication": { "id": "proceedings/icpr/2002/1695/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/5/3735e150", "title": "A Novel Spatio-temporal Clustering Approach by Process Similarity", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735e150/12OmNzhna9t", "parentPublication": { "id": "proceedings/fskd/2009/3735/5", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2018/7247/0/724701a347", "title": "Discovering Spatio-Temporal Relationships among IoT Services", "doi": null, "abstractUrl": "/proceedings-article/icws/2018/724701a347/13rRUzphDAf", "parentPublication": { "id": "proceedings/icws/2018/7247/0", "title": "2018 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594957", "title": "Distribution Preserving Multi-task Regression for Spatio-Temporal Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594957/17D45XuDNFg", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c900", "title": "Towards Spatio- Temporal Aware Traffic Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c900/1FwFtXKptp6", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800k0233", "title": "Action Genome: Actions As Compositions of Spatio-Temporal Scene Graphs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800k0233/1m3ncaIPDck", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kaMxDONP0Y", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kaMMemJo1G", "doi": "10.1109/ICDE48307.2020.00102", "title": "An Interval-centric Model for Distributed Computing over Temporal Graphs", "normalizedTitle": "An Interval-centric Model for Distributed Computing over Temporal Graphs", "abstract": "Algorithms for temporal property graphs may be time-dependent (TD), navigating the structure and time concurrently, or time-independent (TI), operating separately on different snapshots. Currently, there is no unified and scalable programming abstraction to design TI and TD algorithms over large temporal graphs. We propose an interval-centric computing model (ICM) for distributed and iterative processing of temporal graphs, where a vertex's time-interval is a unit of data-parallel computation. It introduces a unique time-warp operator for temporal partitioning and grouping of messages that hides the complexity of designing temporal algorithms, while avoiding redundancy in user logic calls and messages sent. GRAPHITE is our implementation of ICM over Apache Giraph, and we use it to design 12 TI and TD algorithms from literature. We rigorously evaluate its performance for diverse real-world temporal graphs - as large as 131M vertices and 5.5B edges, and as long as 219 snapshots. Our comparison with 4 baseline platforms on a 10-node commodity cluster shows that ICM shares compute and messaging across intervals to out-perform them by up to 25&#x00D7;, and matches them even in worst-case scenarios. GRAPHITE also exhibits weak-scaling with near-perfect efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Algorithms for temporal property graphs may be time-dependent (TD), navigating the structure and time concurrently, or time-independent (TI), operating separately on different snapshots. Currently, there is no unified and scalable programming abstraction to design TI and TD algorithms over large temporal graphs. We propose an interval-centric computing model (ICM) for distributed and iterative processing of temporal graphs, where a vertex's time-interval is a unit of data-parallel computation. It introduces a unique time-warp operator for temporal partitioning and grouping of messages that hides the complexity of designing temporal algorithms, while avoiding redundancy in user logic calls and messages sent. GRAPHITE is our implementation of ICM over Apache Giraph, and we use it to design 12 TI and TD algorithms from literature. We rigorously evaluate its performance for diverse real-world temporal graphs - as large as 131M vertices and 5.5B edges, and as long as 219 snapshots. Our comparison with 4 baseline platforms on a 10-node commodity cluster shows that ICM shares compute and messaging across intervals to out-perform them by up to 25&#x00D7;, and matches them even in worst-case scenarios. GRAPHITE also exhibits weak-scaling with near-perfect efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Algorithms for temporal property graphs may be time-dependent (TD), navigating the structure and time concurrently, or time-independent (TI), operating separately on different snapshots. Currently, there is no unified and scalable programming abstraction to design TI and TD algorithms over large temporal graphs. We propose an interval-centric computing model (ICM) for distributed and iterative processing of temporal graphs, where a vertex's time-interval is a unit of data-parallel computation. It introduces a unique time-warp operator for temporal partitioning and grouping of messages that hides the complexity of designing temporal algorithms, while avoiding redundancy in user logic calls and messages sent. GRAPHITE is our implementation of ICM over Apache Giraph, and we use it to design 12 TI and TD algorithms from literature. We rigorously evaluate its performance for diverse real-world temporal graphs - as large as 131M vertices and 5.5B edges, and as long as 219 snapshots. Our comparison with 4 baseline platforms on a 10-node commodity cluster shows that ICM shares compute and messaging across intervals to out-perform them by up to 25×, and matches them even in worst-case scenarios. GRAPHITE also exhibits weak-scaling with near-perfect efficiency.", "fno": "09101617", "keywords": [ "Computational Complexity", "Graph Theory", "Iterative Methods", "Parallel Algorithms", "Pattern Clustering", "Interval Centric Model", "Distributed Computing", "Temporal Property Graphs", "Time Independent", "Unified Programming Abstraction", "Scalable Programming Abstraction", "TD Algorithms", "Interval Centric Computing Model", "ICM", "Distributed Processing", "Iterative Processing", "Vertex", "Data Parallel Computation", "Unique Time Warp Operator", "Temporal Partitioning", "Temporal Algorithms", "TI", "Real World Temporal Graphs", "GRAPHITE", "Apache Giraph", "Computational Modeling", "Data Models", "Partitioning Algorithms", "Scalability", "Navigation", "Programming", "Graphite" ], "authors": [ { "affiliation": "Indian Institute of Science,Bangalore", "fullName": "Swapnil Gandhi", "givenName": "Swapnil", "surname": "Gandhi", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Science,Bangalore", "fullName": "Yogesh Simmhan", "givenName": "Yogesh", "surname": "Simmhan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "1129-1140", "year": "2020", "issn": null, "isbn": "978-1-7281-2903-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09101715", "articleId": "1kaMCMjAyNa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09101458", "articleId": "1kaMzzAojII", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdcs/2017/1792/0/1792a775", "title": "DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792a775/12OmNAfPIOD", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2014/4249/0/4249a143", "title": "Towards Cloud-Based Distributed Scaleable Processing over Large-Scale Temporal Graphs", "doi": null, "abstractUrl": "/proceedings-article/wetice/2014/4249a143/12OmNAtst85", "parentPublication": { "id": "proceedings/wetice/2014/4249/0", "title": "2014 IEEE 23rd International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprise (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2014/4860/0/06912120", "title": "Temporal join processing with the adaptive Replacement Cache - Temporal Data policy", "doi": null, "abstractUrl": "/proceedings-article/icis/2014/06912120/12OmNx965x0", "parentPublication": { "id": "proceedings/icis/2014/4860/0", "title": "2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/3/01259757", "title": "ISITL: intrusion signatures in augmented interval temporal logic", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259757/12OmNyUnEGW", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1999/06/t0579", "title": "Temporal Partitioning and Scheduling Data Flow Graphs for Reconfigurable Computers", "doi": null, "abstractUrl": "/journal/tc/1999/06/t0579/13rRUxE04sJ", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09706278", "title": "Durable Subgraph Matching on Temporal Graphs", "doi": null, "abstractUrl": "/journal/tk/2023/05/09706278/1AO28d1GLxC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c656", "title": "Scalable Motif Counting for Large-scale Temporal Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c656/1FwFFkyH2Ja", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101764", "title": "Shortest Path Queries for Indoor Venues with Temporal Variations", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101764/1kaMy4YTVJK", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222072", "title": "Multiscale Snapshots: Visual Analysis of Temporal Summaries in Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222072/1nTqwNTE1AQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631526", "title": "Min Hop and Foremost Paths in Interval Temporal Graphs", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631526/1zmvNSh2O0U", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtq7bTYJi", "doi": "10.1109/PacificVis52677.2021.00016", "title": "Stable Visual Summaries for Trajectory Collections", "normalizedTitle": "Stable Visual Summaries for Trajectory Collections", "abstract": "The availability of devices that track moving objects has led to an explosive growth in trajectory data. When exploring the resulting large trajectory collections, visual summaries are a useful tool to identify time intervals of interest. A typical approach is to represent the spatial positions of the tracked objects at each time step via a one-dimensional ordering; visualizations of such orderings can then be placed in temporal order along a time line. There are two main criteria to assess the quality of the resulting visual summary: spatial quality &#x2013; how well does the ordering capture the structure of the data at each time step, and stability &#x2013; how coherent are the orderings over consecutive time steps or temporal ranges?In this paper we introduce a new Stable Principal Component (SPC) method to compute such orderings, which is explicitly parameterized for stability, allowing a trade-off between the spatial quality and stability. We conduct extensive computational experiments that quantitatively compare the orderings produced by ours and other stable dimensionality-reduction methods to various state-of-the-art approaches using a set of well-established quality metrics that capture spatial quality and stability. We conclude that stable dimensionality reduction outperforms existing methods on stability, without sacrificing spatial quality or efficiency; in particular, our new SPC method does so at a fraction of the computational costs.", "abstracts": [ { "abstractType": "Regular", "content": "The availability of devices that track moving objects has led to an explosive growth in trajectory data. When exploring the resulting large trajectory collections, visual summaries are a useful tool to identify time intervals of interest. A typical approach is to represent the spatial positions of the tracked objects at each time step via a one-dimensional ordering; visualizations of such orderings can then be placed in temporal order along a time line. There are two main criteria to assess the quality of the resulting visual summary: spatial quality &#x2013; how well does the ordering capture the structure of the data at each time step, and stability &#x2013; how coherent are the orderings over consecutive time steps or temporal ranges?In this paper we introduce a new Stable Principal Component (SPC) method to compute such orderings, which is explicitly parameterized for stability, allowing a trade-off between the spatial quality and stability. We conduct extensive computational experiments that quantitatively compare the orderings produced by ours and other stable dimensionality-reduction methods to various state-of-the-art approaches using a set of well-established quality metrics that capture spatial quality and stability. We conclude that stable dimensionality reduction outperforms existing methods on stability, without sacrificing spatial quality or efficiency; in particular, our new SPC method does so at a fraction of the computational costs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The availability of devices that track moving objects has led to an explosive growth in trajectory data. When exploring the resulting large trajectory collections, visual summaries are a useful tool to identify time intervals of interest. A typical approach is to represent the spatial positions of the tracked objects at each time step via a one-dimensional ordering; visualizations of such orderings can then be placed in temporal order along a time line. There are two main criteria to assess the quality of the resulting visual summary: spatial quality – how well does the ordering capture the structure of the data at each time step, and stability – how coherent are the orderings over consecutive time steps or temporal ranges?In this paper we introduce a new Stable Principal Component (SPC) method to compute such orderings, which is explicitly parameterized for stability, allowing a trade-off between the spatial quality and stability. We conduct extensive computational experiments that quantitatively compare the orderings produced by ours and other stable dimensionality-reduction methods to various state-of-the-art approaches using a set of well-established quality metrics that capture spatial quality and stability. We conclude that stable dimensionality reduction outperforms existing methods on stability, without sacrificing spatial quality or efficiency; in particular, our new SPC method does so at a fraction of the computational costs.", "fno": "393100a061", "keywords": [ "Data Analysis", "Data Visualisation", "Object Detection", "Principal Component Analysis", "Temporal Order", "Time Line", "Resulting Visual Summary", "Ordering Capture", "Orderings", "Consecutive Time Steps", "Temporal Ranges", "Stable Principal Component Method", "Stable Dimensionality Reduction Methods", "Well Established Quality Metrics", "Capture Spatial Quality", "Stable Dimensionality Reduction", "Stable Visual Summaries", "Trajectory Collections", "Trajectory Data", "Spatial Positions", "Tracked Objects", "One Dimensional Ordering", "Dimensionality Reduction", "Measurement", "Visualization", "Stability Criteria", "Data Visualization", "Tools", "Explosives", "Human Centered Computing", "Visualization", "Visualization Techniques", "Mathematics Of Computing", "Probability And Statistics", "Statistical Paradigms", "Dimensionality Reduction" ], "authors": [ { "affiliation": "TU Wien", "fullName": "Jules Wulms", "givenName": "Jules", "surname": "Wulms", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz", "fullName": "Juri Buchmüller", "givenName": "Juri", "surname": "Buchmüller", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Eindhoven", "fullName": "Wouter Meulemans", "givenName": "Wouter", "surname": "Meulemans", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Eindhoven", "fullName": "Kevin Verbeek", "givenName": "Kevin", "surname": "Verbeek", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Eindhoven", "fullName": "Bettina Speckmann", "givenName": "Bettina", "surname": "Speckmann", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "61-70", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a051", "articleId": "1tTtrcoidWg", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a071", "articleId": "1tTtpUW1NwA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2013/4797/0/06596128", "title": "Visual summaries for graph collections", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596128/12OmNs5rkPo", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009060993", "title": "Interactive Dimensionality Reduction Through User-defined Combinations of Quality Metrics", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009060993/13rRUEgs2tm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019841", "title": "Stable Treemaps via Local Moves", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019841/13rRUIJcWlt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a158", "title": "A Stable Greedy Insertion Treemap Algorithm for Software Evolution Visualization", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a158/17D45WwsQ70", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904436", "title": "SizePairs: Achieving Stable and Balanced Temporal Treemaps using Hierarchical Size-based Pairing", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904436/1H1gs021YFa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a018", "title": "Autoencoder-Aided Visualization of Collections of Morse Complexes", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a018/1J2XJI32OZi", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a259", "title": "Classification and Visualization of Lyric Collections Using Guided LDA", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a259/1KaFOls9QKQ", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10098581", "title": "GCSTI: A Single-Cell Pseudotemporal Trajectory Inference Method Based on Graph Compression", "doi": null, "abstractUrl": "/journal/tb/5555/01/10098581/1Mg66GK4cwg", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800c239", "title": "Unsupervised Dimension Reduction Using Supervised Orthogonal Discriminant Projection for Clustering", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800c239/1dPoiMQZwvC", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222072", "title": "Multiscale Snapshots: Visual Analysis of Temporal Summaries in Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222072/1nTqwNTE1AQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAOsMGx", "title": "Fifth Annual Conference on AI, and Planning in High Autonomy Systems", "acronym": "aihas", "groupId": "1000028", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBbHwj", "doi": "10.1109/AIHAS.1994.390482", "title": "Modeling the interactive mode of SmartPath", "normalizedTitle": "Modeling the interactive mode of SmartPath", "abstract": "SmartPath is a highway system simulator. The program can be used to test, simulate, and evaluate the performance of the designs of different modules and instrumentations, such as engine models, sensors, and communications. The package consists of two separate modules: simulation and animation. The simulation runs on Sun Spare or Silicon Graphics workstations. The animation program, runs on Silicon Graphics workstations, and it produces a three-dimensional, color animation of AHS traffic. SmartPath could be used in two modes. In the batch mode, the simulator is run-first to generate data which could then be viewed using the animator. In the interactive mode, the simulator and animator run simultaneously allowing the user to control vehicle manoeuvres in real time. This feature allows the system to mix \"manual\" and \"automated\" vehicles and to test the robustness of the control algorithms. In this paper, we describe the modeling of basic elements of the interactive mode of SmartPath and the interfaces used to allow interactive control of vehicles.<>", "abstracts": [ { "abstractType": "Regular", "content": "SmartPath is a highway system simulator. The program can be used to test, simulate, and evaluate the performance of the designs of different modules and instrumentations, such as engine models, sensors, and communications. The package consists of two separate modules: simulation and animation. The simulation runs on Sun Spare or Silicon Graphics workstations. The animation program, runs on Silicon Graphics workstations, and it produces a three-dimensional, color animation of AHS traffic. SmartPath could be used in two modes. In the batch mode, the simulator is run-first to generate data which could then be viewed using the animator. In the interactive mode, the simulator and animator run simultaneously allowing the user to control vehicle manoeuvres in real time. This feature allows the system to mix \"manual\" and \"automated\" vehicles and to test the robustness of the control algorithms. In this paper, we describe the modeling of basic elements of the interactive mode of SmartPath and the interfaces used to allow interactive control of vehicles.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "SmartPath is a highway system simulator. The program can be used to test, simulate, and evaluate the performance of the designs of different modules and instrumentations, such as engine models, sensors, and communications. The package consists of two separate modules: simulation and animation. The simulation runs on Sun Spare or Silicon Graphics workstations. The animation program, runs on Silicon Graphics workstations, and it produces a three-dimensional, color animation of AHS traffic. SmartPath could be used in two modes. In the batch mode, the simulator is run-first to generate data which could then be viewed using the animator. In the interactive mode, the simulator and animator run simultaneously allowing the user to control vehicle manoeuvres in real time. This feature allows the system to mix \"manual\" and \"automated\" vehicles and to test the robustness of the control algorithms. In this paper, we describe the modeling of basic elements of the interactive mode of SmartPath and the interfaces used to allow interactive control of vehicles.", "fno": "00390482", "keywords": [ "Traffic Engineering Computing", "Road Traffic", "Traffic Control", "Digital Simulation", "Computer Animation", "Interactive Systems", "Batch Processing Computers", "Highway System Simulator", "Smart Path", "Animation", "Silicon Graphics Workstations", "Sun Spare Workstation", "Batch Mode", "Interactive Mode", "Interactive Vehicle Control", "Raod Traffic", "Animation", "Silicon", "Graphics", "Workstations", "Vehicles", "Road Transportation", "Testing", "Instruments", "Engines", "Packaging" ], "authors": [ { "affiliation": "Dept. of Electr. Eng. & Comput. Sci., California Univ., Berkeley, CA, USA", "fullName": "F.H. Eskafi", "givenName": "F.H.", "surname": "Eskafi", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. Eng. & Comput. Sci., California Univ., Berkeley, CA, USA", "fullName": "D. Khorramabadi", "givenName": "D.", "surname": "Khorramabadi", "__typename": "ArticleAuthorType" } ], "idPrefix": "aihas", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "251,252,253,254,255,256", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00390481", "articleId": "12OmNyYDDKu", "__typename": "AdjacentArticleType" }, "next": { "fno": "00390483", "articleId": "12OmNzV70NX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/simsym/1991/2169/0/00151508", "title": "GAME: an object-oriented approach to computer animation in flexible manufacturing system modelling", "doi": null, "abstractUrl": "/proceedings-article/simsym/1991/00151508/12OmNAolH8W", "parentPublication": { "id": "proceedings/simsym/1991/2169/0", "title": "Proceedings of the 24th Annual Simulation Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1994/6240/0/00324005", "title": "Towards the autonomous animation of multiple human figures", "doi": null, "abstractUrl": "/proceedings-article/ca/1994/00324005/12OmNBTs7By", "parentPublication": { "id": "proceedings/ca/1994/6240/0", "title": "Proceedings of Computer Animation '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/1997/7889/0/78890263", "title": "A generic system for interactive real-time animation", "doi": null, "abstractUrl": "/proceedings-article/ecbs/1997/78890263/12OmNC8MsqI", "parentPublication": { "id": "proceedings/ecbs/1997/7889/0", "title": "Engineering of Computer-Based Systems, IEEE International Conference on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacific-graphics/2010/4205/0/4205a001", "title": "Procedural Modeling of Water Caustics and Foamy Water for Cartoon Animation", "doi": null, "abstractUrl": "/proceedings-article/pacific-graphics/2010/4205a001/12OmNCf1Dqs", "parentPublication": { "id": "proceedings/pacific-graphics/2010/4205/0", "title": "Pacific Conference on Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770841", "title": "Control of Motion in Character Animation", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770841/12OmNCfSqGT", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880068", "title": "Modeling, Tracking and Interactive Animation of Faces and Heads Using Input from Video", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880068/12OmNwfKjaJ", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1990/72/0/00129495", "title": "Proof: the general purpose animator", "doi": null, "abstractUrl": "/proceedings-article/wsc/1990/00129495/12OmNx0A7F1", "parentPublication": { "id": "proceedings/wsc/1990/72/0", "title": "1990 Winter Simulation Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2005/2389/0/23890307", "title": "An Image-Based Shading Pipeline for 2D Animation", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2005/23890307/12OmNx8wTgw", "parentPublication": { "id": "proceedings/sibgrapi/2005/2389/0", "title": "XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1987/06/mcg1987060039", "title": "Interactive Design of 3D Computer-Animated Legged Animal Motion", "doi": null, "abstractUrl": "/magazine/cg/1987/06/mcg1987060039/13rRUIJuxxI", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b563", "title": "Analysis on the Reform of Teaching Mode of Computer Animation Production in Colleges and Universities Based on Flip Classroom", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b563/1tzyZEfQ7T2", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrJiCDE", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW)", "acronym": "edocw", "groupId": "1000275", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNym2c8F", "doi": "10.1109/EDOCW.2014.37", "title": "Navigation among Model Sketches on Large Interactive Displays", "normalizedTitle": "Navigation among Model Sketches on Large Interactive Displays", "abstract": "Modeling, whether for conceptualization or specification, is a key activity in software engineering and many other design and engineering disciplines. Especially in early project phases, most users prefer informal models sketched on whiteboards over heavyweight CASE tools that enforce a formal notation. But since physical whiteboards can offer only limited flexibility and usability when dealing with large model sets, large interactive displays are increasingly used to efficiently support the modeling process. In this paper, we present an approach that focuses on the navigation among model sketches that are created on such displays. We strive to hide the separation of model files and the underlying file system from the users whenever possible. Instead of laboriously navigating across file names and directories, the users shall be enabled to navigate among model sketches and related artifacts via intuitive gestures, using the semantics and relationships of the elements themselves. Additionally, our approach explicitly visualizes otherwise hidden relationships between the created artifacts and allows easy and direct access to their content.", "abstracts": [ { "abstractType": "Regular", "content": "Modeling, whether for conceptualization or specification, is a key activity in software engineering and many other design and engineering disciplines. Especially in early project phases, most users prefer informal models sketched on whiteboards over heavyweight CASE tools that enforce a formal notation. But since physical whiteboards can offer only limited flexibility and usability when dealing with large model sets, large interactive displays are increasingly used to efficiently support the modeling process. In this paper, we present an approach that focuses on the navigation among model sketches that are created on such displays. We strive to hide the separation of model files and the underlying file system from the users whenever possible. Instead of laboriously navigating across file names and directories, the users shall be enabled to navigate among model sketches and related artifacts via intuitive gestures, using the semantics and relationships of the elements themselves. Additionally, our approach explicitly visualizes otherwise hidden relationships between the created artifacts and allows easy and direct access to their content.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Modeling, whether for conceptualization or specification, is a key activity in software engineering and many other design and engineering disciplines. Especially in early project phases, most users prefer informal models sketched on whiteboards over heavyweight CASE tools that enforce a formal notation. But since physical whiteboards can offer only limited flexibility and usability when dealing with large model sets, large interactive displays are increasingly used to efficiently support the modeling process. In this paper, we present an approach that focuses on the navigation among model sketches that are created on such displays. We strive to hide the separation of model files and the underlying file system from the users whenever possible. Instead of laboriously navigating across file names and directories, the users shall be enabled to navigate among model sketches and related artifacts via intuitive gestures, using the semantics and relationships of the elements themselves. Additionally, our approach explicitly visualizes otherwise hidden relationships between the created artifacts and allows easy and direct access to their content.", "fno": "5467a191", "keywords": [ "Navigation", "Unified Modeling Language", "Software", "Semantics", "Computer Aided Software Engineering", "Visualization" ], "authors": [ { "affiliation": null, "fullName": "Markus Kleffmann", "givenName": "Markus", "surname": "Kleffmann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthias Book", "givenName": "Matthias", "surname": "Book", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Volker Gruhn", "givenName": "Volker", "surname": "Gruhn", "__typename": "ArticleAuthorType" } ], "idPrefix": "edocw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "191-200", "year": "2014", "issn": null, "isbn": "978-1-4799-5467-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5467a182", "articleId": "12OmNBt3qoT", "__typename": "AdjacentArticleType" }, "next": { "fno": "5467a201", "articleId": "12OmNvA1h8T", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vissoft/2017/1003/0/1003a094", "title": "Round-Trip Sketches: Supporting the Lifecycle of Software Development Sketches from Analog to Digital and Back", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2017/1003a094/12OmNqC2uZO", "parentPublication": { "id": "proceedings/vissoft/2017/1003/0", "title": "2017 IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2009/3998/0/05090052", "title": "Supporting task-oriented navigation in IDEs with configurable HeatMaps", "doi": null, "abstractUrl": "/proceedings-article/icpc/2009/05090052/12OmNwwd2IH", "parentPublication": { "id": "proceedings/icpc/2009/3998/0", "title": "2009 IEEE 17th International Conference on Program Comprehension (ICPC 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883024", "title": "CodeGraffiti: Using hand-drawn sketches connected to code bases in navigation tasks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883024/12OmNwxlrdw", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/modelsward/2014/8066/0/07018489", "title": "Model-driven GUI generation and navigation for Android BIS apps", "doi": null, "abstractUrl": "/proceedings-article/modelsward/2014/07018489/12OmNxX3uuc", "parentPublication": { "id": "proceedings/modelsward/2014/8066/0", "title": "2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07871004", "title": "Sketching Gesture-Based Applications in a Collaborative Working Environment with Wall-Sized Displays", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07871004/12OmNxbEtOu", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sst/2015/5593/0/5593a001", "title": "Establishing and Navigating Trace Links between Elements of Informal Diagram Sketches", "doi": null, "abstractUrl": "/proceedings-article/sst/2015/5593a001/12OmNyFU73s", "parentPublication": { "id": "proceedings/sst/2015/5593/0", "title": "2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability (SST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2018/4969/0/08330244", "title": "OctoBubbles: A Multi-view interactive environment for concurrent visualization and synchronization of UML models and code", "doi": null, "abstractUrl": "/proceedings-article/saner/2018/08330244/12OmNyQYt8M", "parentPublication": { "id": "proceedings/saner/2018/4969/0", "title": "2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tefse/2013/0495/0/06620150", "title": "Towards recovering and maintaining trace links for model sketches across interactive displays", "doi": null, "abstractUrl": "/proceedings-article/tefse/2013/06620150/12OmNzYNNn6", "parentPublication": { "id": "proceedings/tefse/2013/0495/0", "title": "2013 International Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/5725/0/572501a093", "title": "Sketching with a Purpose: Moving from Supporting Modeling to Supporting Software Engineering Activities", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/572501a093/13bd1gJ1v0T", "parentPublication": { "id": "proceedings/chase/2018/5725/0", "title": "2018 IEEE/ACM 11th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/02/mcg2013020047", "title": "3D Freehand Gestural Navigation for Interactive Public Displays", "doi": null, "abstractUrl": "/magazine/cg/2013/02/mcg2013020047/13rRUy0HYMj", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tzywdsEsQo", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "acronym": "icmcce", "groupId": "1824464", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1tzyYIzikY8", "doi": "10.1109/ICMCCE51767.2020.00441", "title": "An Interactive Animation for Demonstrating Ship Maneuvering plotting", "normalizedTitle": "An Interactive Animation for Demonstrating Ship Maneuvering plotting", "abstract": "Based on analyzing characteristics and requirements of naval ship maneuvering plotting, this paper puts forward an intuitive, accurate, and interactive animation. After introducing the basic elements of animation, such as geometric objects, computational objects, and annotation objects, we propose the time and position constraints between objects, and then describe the actual generation mechanism including dynamic geometric figures, object attributes and detail optimizing. The preliminary practice based on hand-drawn software proves the animation is superior to common forms. As an automatic solution platform for ship maneuvering plotting problems, the animation also provides a new idea for navigation plotting automation.", "abstracts": [ { "abstractType": "Regular", "content": "Based on analyzing characteristics and requirements of naval ship maneuvering plotting, this paper puts forward an intuitive, accurate, and interactive animation. After introducing the basic elements of animation, such as geometric objects, computational objects, and annotation objects, we propose the time and position constraints between objects, and then describe the actual generation mechanism including dynamic geometric figures, object attributes and detail optimizing. The preliminary practice based on hand-drawn software proves the animation is superior to common forms. As an automatic solution platform for ship maneuvering plotting problems, the animation also provides a new idea for navigation plotting automation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Based on analyzing characteristics and requirements of naval ship maneuvering plotting, this paper puts forward an intuitive, accurate, and interactive animation. After introducing the basic elements of animation, such as geometric objects, computational objects, and annotation objects, we propose the time and position constraints between objects, and then describe the actual generation mechanism including dynamic geometric figures, object attributes and detail optimizing. The preliminary practice based on hand-drawn software proves the animation is superior to common forms. As an automatic solution platform for ship maneuvering plotting problems, the animation also provides a new idea for navigation plotting automation.", "fno": "231400c021", "keywords": [ "Computer Animation", "Naval Engineering Computing", "Ships", "Interactive Animation", "Geometric Objects", "Computational Objects", "Position Constraints", "Generation Mechanism", "Dynamic Geometric Figures", "Navigation Plotting Automation", "Naval Ship Maneuvering Plotting", "Intuitive Animation", "Hand Drawn Software", "Geometry", "Navigation", "Production", "Tools", "Animation", "Mechanical Variables Measurement", "Software", "Interactive Animation", "Dynamic Geometry", "Ship Maneuvering Plotting" ], "authors": [ { "affiliation": "Navy Submarine Academy,Department of Navigation and Communication,QingDao,China", "fullName": "Wang Xiaohai", "givenName": "Wang", "surname": "Xiaohai", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Academic Testing & Evaluation, Navy Submarine Academy,QingDao,China", "fullName": "Yang Xiaoxiao", "givenName": "Yang", "surname": "Xiaoxiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Navy Submarine Academy,Department of Navigation and Communication,QingDao,China", "fullName": "Ji Chao", "givenName": "Ji", "surname": "Chao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmcce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "2021-2025", "year": "2020", "issn": null, "isbn": "978-1-6654-2314-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "231400c014", "articleId": "1tzz5KXRenK", "__typename": "AdjacentArticleType" }, "next": { "fno": "231400c026", "articleId": "1tzyyG5asX6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoip/2010/4252/1/4252a689", "title": "Maneuvering Characteristics Study in Steady State of Human-Ship System", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252a689/12OmNAoUTkD", "parentPublication": { "id": "proceedings/icoip/2010/4252/2", "title": "Optoelectronics and Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2010/4400/0/4400a252", "title": "Generic Face Animation", "doi": null, "abstractUrl": "/proceedings-article/sccc/2010/4400a252/12OmNBhpS0Y", "parentPublication": { "id": "proceedings/sccc/2010/4400/0", "title": "2010 XXIX International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2016/3575/0/3575a232", "title": "Research of Automatic Collision Avoidance Based on Ship Maneuvering", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2016/3575a232/12OmNsbGvDR", "parentPublication": { "id": "proceedings/iciicii/2016/3575/0", "title": "2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2014/4871/0/06918688", "title": "Online Bayesian learning and classification of ship-to-ship interactions for port safety", "doi": null, "abstractUrl": "/proceedings-article/avss/2014/06918688/12OmNvSKNLT", "parentPublication": { "id": "proceedings/avss/2014/4871/0", "title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880098", "title": "Facial Animation", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvgip/2008/3476/0/3476a512", "title": "Animation Geometry Compression Using the Linear Discriminant Analysis", "doi": null, "abstractUrl": "/proceedings-article/icvgip/2008/3476a512/12OmNvlPkEK", "parentPublication": { "id": "proceedings/icvgip/2008/3476/0", "title": "Computer Vision, Graphics &amp; Image Processing, Indian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvmp/2010/4268/0/4268a171", "title": "Prominence Driven Character Animation", "doi": null, "abstractUrl": "/proceedings-article/cvmp/2010/4268a171/12OmNxFaLtB", "parentPublication": { "id": "proceedings/cvmp/2010/4268/0", "title": "2010 Conference on Visual Media Production", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1997/8144/0/81440356", "title": "Animation of user algorithms on the Web", "doi": null, "abstractUrl": "/proceedings-article/vl/1997/81440356/12OmNyGbIhG", "parentPublication": { "id": "proceedings/vl/1997/8144/0", "title": "Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No.97TB100180)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2022/9463/0/09882340", "title": "A Fuzzy Neural Network Control Strategy for Ship Maneuvering Motion", "doi": null, "abstractUrl": "/proceedings-article/icis/2022/09882340/1GBSvKrKKt2", "parentPublication": { "id": "proceedings/icis/2022/9463/0", "title": "2022 IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2021/4065/0/406500a113", "title": "Blending Collision Avoidance Animation in Synthetically Generated Locomotion", "doi": null, "abstractUrl": "/proceedings-article/cw/2021/406500a113/1yBF5oGhaoM", "parentPublication": { "id": "proceedings/cw/2021/4065/0", "title": "2021 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8th4", "title": "Proceedings of the 1990 IEEE Workshop on Visual Languages", "acronym": "wvl", "groupId": "1000793", "volume": "0", "displayVolume": "0", "year": "1990", "__typename": "ProceedingType" }, "article": { "id": "12OmNCxbXIk", "doi": "10.1109/WVL.1990.128376", "title": "Automatic visualization of the dynamic behaviour of programs by animation of the language interpreter", "normalizedTitle": "Automatic visualization of the dynamic behaviour of programs by animation of the language interpreter", "abstract": "A system for visualizing the dynamic behavior of programs written in the NeWS language is presented. Experience with the system's design and implementation is discussed. The functionality of the current prototype is described. By presenting multiple views of execution and supplying default animations for the various operators of the language and its dynamic concepts and mechanisms, the system can help the user develop a better feel for the execution model of NeWS.<>", "abstracts": [ { "abstractType": "Regular", "content": "A system for visualizing the dynamic behavior of programs written in the NeWS language is presented. Experience with the system's design and implementation is discussed. The functionality of the current prototype is described. By presenting multiple views of execution and supplying default animations for the various operators of the language and its dynamic concepts and mechanisms, the system can help the user develop a better feel for the execution model of NeWS.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A system for visualizing the dynamic behavior of programs written in the NeWS language is presented. Experience with the system's design and implementation is discussed. The functionality of the current prototype is described. By presenting multiple views of execution and supplying default animations for the various operators of the language and its dynamic concepts and mechanisms, the system can help the user develop a better feel for the execution model of NeWS.", "fno": "00128376", "keywords": [ "Computer Animation", "Visual Programming", "Automatic Visualization", "Dynamic Behaviour", "Language Interpreter", "Ne WS Language", "Multiple Views", "Default Animations", "Visualization", "Animation", "Programming Profession", "Algorithm Design And Analysis", "Virtual Machining", "Object Oriented Modeling", "Computer Languages", "Page Description Languages", "Computer Science", "Educational Institutions" ], "authors": [ { "affiliation": "Queen Mary & Westfield Coll., London Univ., UK", "fullName": "S. Masnavi", "givenName": "S.", "surname": "Masnavi", "__typename": "ArticleAuthorType" } ], "idPrefix": "wvl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1990-01-01T00:00:00", "pubType": "proceedings", "pages": "16,17,18,19,20,21", "year": "1990", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00128375", "articleId": "12OmNrFkeSq", "__typename": "AdjacentArticleType" }, "next": { "fno": "00128377", "articleId": "12OmNC4eSH5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vl/1999/0216/0/02160280", "title": "Smooth Animation of Algorithms in a Declarative Framework", "doi": null, "abstractUrl": "/proceedings-article/vl/1999/02160280/12OmNASILS2", "parentPublication": { "id": "proceedings/vl/1999/0216/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1993/1381/0/00718043", "title": "Proof Animation: Better Animation for Your Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/1993/00718043/12OmNBBQZoj", "parentPublication": { "id": "proceedings/wsc/1993/1381/0", "title": "Proceedings of 1993 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1994/6240/0/00323995", "title": "Integrating a scripting language into an interactive animation system", "doi": null, "abstractUrl": "/proceedings-article/ca/1994/00323995/12OmNButq8k", "parentPublication": { "id": "proceedings/ca/1994/6240/0", "title": "Proceedings of Computer Animation '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394334", "title": "An extensible scripting language for interactive animation in a speech-enabled virtual environment", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394334/12OmNCbU2XL", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2015/9331/0/9331a156", "title": "A Declarative Language Interpreter for CEP", "doi": null, "abstractUrl": "/proceedings-article/edocw/2015/9331a156/12OmNqNG3gg", "parentPublication": { "id": "proceedings/edocw/2015/9331/0", "title": "2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2000/206/0/00870488", "title": "Little-JIL/Juliette: a process definition language and interpreter", "doi": null, "abstractUrl": "/proceedings-article/icse/2000/00870488/12OmNqOwQJ5", "parentPublication": { "id": "proceedings/icse/2000/206/0", "title": "Proceedings of International Conference on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2016/4155/0/4155a058", "title": "An Empirical Study of Programming Paradigms for Animation", "doi": null, "abstractUrl": "/proceedings-article/chase/2016/4155a058/12OmNwBjP6H", "parentPublication": { "id": "proceedings/chase/2016/4155/0", "title": "2016 IEEE/ACM Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccl/1990/2036/0/00063755", "title": "A practical animation language for software development", "doi": null, "abstractUrl": "/proceedings-article/iccl/1990/00063755/12OmNx38vOY", "parentPublication": { "id": "proceedings/iccl/1990/2036/0", "title": "Proceedings. 1990 International Conference on Computer Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1991/2152/0/00170176", "title": "Functional language for enacting software processes", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1991/00170176/12OmNx7XH8O", "parentPublication": { "id": "proceedings/cmpsac/1991/2152/0", "title": "1991 The Fifteenth Annual International Computer Software & Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925459", "title": "Generating robotic emotional body language with variational autoencoders", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925459/1fHGBT53HYQ", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqqu", "title": "2013 10th International Conference Computer Graphics, Imaging and Visualization (CGIV)", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxR5UN3", "doi": "10.1109/CGIV.2013.32", "title": "Progressive Animation Sequences", "normalizedTitle": "Progressive Animation Sequences", "abstract": "3D animations have been widely used in the movie and gaming industries. However, the huge storage requirements of dynamic mesh data make it difficult for a number of applications such as rendering, transmitting over a network, etc.This study proposes a multiresolution representation for 3D animation. The results show that the coarse animation appears by using only 10% of the original faces. More detailed animation appears by using 80% of original faces, but only requires 3% of original storage space. Consequently, this approach enables a continuous level of detail for dynamic 3D mesh sequences.", "abstracts": [ { "abstractType": "Regular", "content": "3D animations have been widely used in the movie and gaming industries. However, the huge storage requirements of dynamic mesh data make it difficult for a number of applications such as rendering, transmitting over a network, etc.This study proposes a multiresolution representation for 3D animation. The results show that the coarse animation appears by using only 10% of the original faces. More detailed animation appears by using 80% of original faces, but only requires 3% of original storage space. Consequently, this approach enables a continuous level of detail for dynamic 3D mesh sequences.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D animations have been widely used in the movie and gaming industries. However, the huge storage requirements of dynamic mesh data make it difficult for a number of applications such as rendering, transmitting over a network, etc.This study proposes a multiresolution representation for 3D animation. The results show that the coarse animation appears by using only 10% of the original faces. More detailed animation appears by using 80% of original faces, but only requires 3% of original storage space. Consequently, this approach enables a continuous level of detail for dynamic 3D mesh sequences.", "fno": "5051a011", "keywords": [ "Animation", "Geometry", "Three Dimensional Displays", "Principal Component Analysis", "Indexes", "Equations", "Mathematical Model", "Dynamic 3 D Mesh", "Progressive Animation", "Compression" ], "authors": [ { "affiliation": null, "fullName": "Pai-Feng Lee", "givenName": "Pai-Feng", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "11-16", "year": "2013", "issn": null, "isbn": "978-0-7695-5051-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5051a001", "articleId": "12OmNBpVPSY", "__typename": "AdjacentArticleType" }, "next": { "fno": "5051a017", "articleId": "12OmNrnJ6VZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmew/2014/4717/0/06890554", "title": "Realtime speech-driven facial animation using Gaussian Mixture Models", "doi": null, "abstractUrl": "/proceedings-article/icmew/2014/06890554/12OmNBC8Ayh", "parentPublication": { "id": "proceedings/icmew/2014/4717/0", "title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2010/4400/0/4400a252", "title": "Generic Face Animation", "doi": null, "abstractUrl": "/proceedings-article/sccc/2010/4400a252/12OmNBhpS0Y", "parentPublication": { "id": "proceedings/sccc/2010/4400/0", "title": "2010 XXIX International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880098", "title": "Facial Animation", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvgip/2008/3476/0/3476a512", "title": "Animation Geometry Compression Using the Linear Discriminant Analysis", "doi": null, "abstractUrl": "/proceedings-article/icvgip/2008/3476a512/12OmNvlPkEK", "parentPublication": { "id": "proceedings/icvgip/2008/3476/0", "title": "Computer Vision, Graphics &amp; Image Processing, Indian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/2001/7237/0/00982373", "title": "Face animation based on observed 3D speech dynamics", "doi": null, "abstractUrl": "/proceedings-article/ca/2001/00982373/12OmNvnfke8", "parentPublication": { "id": "proceedings/ca/2001/7237/0", "title": "Proceedings Computer Animation 2001. Fourteenth Conference on Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacific-graphics/2010/4205/0/4205a005", "title": "Representing Progressive Dynamic 3D Meshes and Applications", "doi": null, "abstractUrl": "/proceedings-article/pacific-graphics/2010/4205a005/12OmNxWuiz1", "parentPublication": { "id": "proceedings/pacific-graphics/2010/4205/0", "title": "Pacific Conference on Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880175", "title": "From Text Description to Animation Sequences", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880175/12OmNxwENK7", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/alpit/2008/3273/0/3273a257", "title": "3D Visible Speech Animation Driven by Chinese Prosody Markup Language", "doi": null, "abstractUrl": "/proceedings-article/alpit/2008/3273a257/12OmNxwncJs", "parentPublication": { "id": "proceedings/alpit/2008/3273/0", "title": "Advanced Language Processing and Web Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771426", "title": "Data-driven animation of hand-object interactions", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771426/12OmNzWfp4p", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08352750", "title": "Surface Motion Capture Animation Synthesis", "doi": null, "abstractUrl": "/journal/tg/2019/06/08352750/13rRUwjXZSl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwErpHy", "title": "Proceedings Computer Animation 2001. Fourteenth Conference on Computer Animation", "acronym": "ca", "groupId": "1000121", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNyPQ4Oi", "doi": "10.1109/CA.2001.982383", "title": "Integration of optimization by genetic algorithms into an L-system-based animation system", "normalizedTitle": "Integration of optimization by genetic algorithms into an L-system-based animation system", "abstract": "In computer graphics L-systems represent a powerful rule-based language for modeling complex objects and their animation. However, designing objects and animations by rules is a difficult task because designers often cannot foresee the consequences of rules. This is especially true for non-experts in the domain. Therefore, we propose to enhance an L-system based animation system with evolutionary features based on genetic algorithms (GAs). These features support the designers' task of interactively modeling objects and animations. Starting from an initial population of L-system-defined objects, the computer proposes iteratively new populations based on fitness value that are determined by the designers' creative or functional criteria. Moreover, automatic optimization of L-system-defined objects/animations is possible if an appropriate fitness function can be found for a given problem. We present a concept to integrate optimization by genetic algorithms into an L-system based animation system. Typical examples, such as automatic function optimization and creative interactive design of objects, illustrate our work.", "abstracts": [ { "abstractType": "Regular", "content": "In computer graphics L-systems represent a powerful rule-based language for modeling complex objects and their animation. However, designing objects and animations by rules is a difficult task because designers often cannot foresee the consequences of rules. This is especially true for non-experts in the domain. Therefore, we propose to enhance an L-system based animation system with evolutionary features based on genetic algorithms (GAs). These features support the designers' task of interactively modeling objects and animations. Starting from an initial population of L-system-defined objects, the computer proposes iteratively new populations based on fitness value that are determined by the designers' creative or functional criteria. Moreover, automatic optimization of L-system-defined objects/animations is possible if an appropriate fitness function can be found for a given problem. We present a concept to integrate optimization by genetic algorithms into an L-system based animation system. Typical examples, such as automatic function optimization and creative interactive design of objects, illustrate our work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In computer graphics L-systems represent a powerful rule-based language for modeling complex objects and their animation. However, designing objects and animations by rules is a difficult task because designers often cannot foresee the consequences of rules. This is especially true for non-experts in the domain. Therefore, we propose to enhance an L-system based animation system with evolutionary features based on genetic algorithms (GAs). These features support the designers' task of interactively modeling objects and animations. Starting from an initial population of L-system-defined objects, the computer proposes iteratively new populations based on fitness value that are determined by the designers' creative or functional criteria. Moreover, automatic optimization of L-system-defined objects/animations is possible if an appropriate fitness function can be found for a given problem. We present a concept to integrate optimization by genetic algorithms into an L-system based animation system. Typical examples, such as automatic function optimization and creative interactive design of objects, illustrate our work.", "fno": "00982383", "keywords": [ "Computer Animation", "Knowledge Based Systems", "Genetic Algorithms", "Digital Simulation", "Computer Graphics", "L System Based Animation System", "Rule Based Language", "Complex Object Modeling", "Evolutionary Features", "Genetic Algorithms", "Interactive Modeling", "Fitness Value", "Functional Criteria", "Creative Criteria", "Automatic Function Optimization", "Creative Interactive Design", "Genetic Algorithms", "Animation", "Computer Graphics", "Design Optimization", "Layout", "Production Systems", "Fractals", "Real Time Systems", "Genetic Programming", "Biological Cells" ], "authors": [ { "affiliation": "MultiMedia Lab., Zurich Univ., Switzerland", "fullName": "H. Noser", "givenName": "H.", "surname": "Noser", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "P. Stucki", "givenName": "P.", "surname": "Stucki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H.-P. Walser", "givenName": "H.-P.", "surname": "Walser", "__typename": "ArticleAuthorType" } ], "idPrefix": "ca", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188,189,190,191,192,193,194,195,196,197,198,199,200,201,202,203,204,205,206,207,208,209,210,211,212,213,214,215,216,217,218,219,220,221,222,223,224,225,226,227,228,229,230,231,232,233,234,235,236,237,238,239,240,241,242,243,244,245,246,247,248,249,250,251,252,253", "year": "2001", "issn": "1087-4844", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00982382", "articleId": "12OmNx4Q6Ff", "__typename": "AdjacentArticleType" }, "next": { "fno": "00982384", "articleId": "12OmNCvcLKd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/searis/2012/1249/0/06231167", "title": "The ICEA plug-in for virtual reality, immersive creation and edition of animation", "doi": null, "abstractUrl": "/proceedings-article/searis/2012/06231167/12OmNAQJzOL", "parentPublication": { "id": "proceedings/searis/2012/1249/0", "title": "2012 5th Workshop on Software Engineering and Architectures for Realtime Interactive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/2000/0840/0/08400095", "title": "Structured Interactive Animation for Multimedia Documents", "doi": null, "abstractUrl": "/proceedings-article/vl/2000/08400095/12OmNAQanx1", "parentPublication": { "id": "proceedings/vl/2000/0840/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1996/7588/0/75880184", "title": "AniLan --- An Animation Language", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880184/12OmNAXglMn", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1993/1381/0/00718043", "title": "Proof Animation: Better Animation for Your Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/1993/00718043/12OmNBBQZoj", "parentPublication": { "id": "proceedings/wsc/1993/1381/0", "title": "Proceedings of 1993 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2010/4400/0/4400a252", "title": "Generic Face Animation", "doi": null, "abstractUrl": "/proceedings-article/sccc/2010/4400a252/12OmNBhpS0Y", "parentPublication": { "id": "proceedings/sccc/2010/4400/0", "title": "2010 XXIX International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccl/1990/2036/0/00063755", "title": "A practical animation language for software development", "doi": null, "abstractUrl": "/proceedings-article/iccl/1990/00063755/12OmNx38vOY", "parentPublication": { "id": "proceedings/iccl/1990/2036/0", "title": "Proceedings. 1990 International Conference on Computer Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2012/2027/0/06266500", "title": "Interactive 3D Animation System for Web3D", "doi": null, "abstractUrl": "/proceedings-article/icmew/2012/06266500/12OmNzkMlVP", "parentPublication": { "id": "proceedings/icmew/2012/2027/0", "title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1995/02/v0175", "title": "Obliq-3D: A High-Level, Fast-Turnaround 3D Animation System", "doi": null, "abstractUrl": "/journal/tg/1995/02/v0175/13rRUwghd4Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/01/v0002", "title": "High-Quality Animation of 2D Steady Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2004/01/v0002/13rRUwwaKsV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a935", "title": "Immersive Animation Authoring in Industrial VR Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a935/1J7Wg05jJeM", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J7W6LmbCw0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "9973799", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J7Wj0kJrJm", "doi": "10.1109/ISMAR-Adjunct57072.2022.00092", "title": "Real-time Expressive Avatar Animation Generation based on Monocular Videos", "normalizedTitle": "Real-time Expressive Avatar Animation Generation based on Monocular Videos", "abstract": "The technologies for generating real-time animated avatars are very useful in the fields of VR/AR animation and entertainment. Most of the existing studies, however, always require the technology of time-consuming motion capture at high cost. This paper proposes an efficient lightweight framework of dynamic avatar animation, which can generate all the facial expressions, gestures, and torso movements properly in real time. The entire technique is driven only by monocular camera videos. Specifically, the 3D posture and facial landmarks of the monocular videos can be calculated by using Blaze-pose key points in our proposed framework. Then, a novel adaptor mapping function is proposed to transform the kinematic topology into the rigid skeletons of avatars. Without the dependency of a high-cost motion capture instrument and also without the limitation of the topology, our approach produces avatar animations with a higher level of fidelity. Finally, animations, including lip movements, facial expressions, and limb motions, are generated in a unified framework, which allows our 3D virtual avatar to act exactly like a real person. We have conducted extensive experiments to demonstrate the efficacy of applications in real-time avatar-related research. Our project and software are publicly available for further research or practical use (https://github.com/xianfei/SysMocap/).", "abstracts": [ { "abstractType": "Regular", "content": "The technologies for generating real-time animated avatars are very useful in the fields of VR/AR animation and entertainment. Most of the existing studies, however, always require the technology of time-consuming motion capture at high cost. This paper proposes an efficient lightweight framework of dynamic avatar animation, which can generate all the facial expressions, gestures, and torso movements properly in real time. The entire technique is driven only by monocular camera videos. Specifically, the 3D posture and facial landmarks of the monocular videos can be calculated by using Blaze-pose key points in our proposed framework. Then, a novel adaptor mapping function is proposed to transform the kinematic topology into the rigid skeletons of avatars. Without the dependency of a high-cost motion capture instrument and also without the limitation of the topology, our approach produces avatar animations with a higher level of fidelity. Finally, animations, including lip movements, facial expressions, and limb motions, are generated in a unified framework, which allows our 3D virtual avatar to act exactly like a real person. We have conducted extensive experiments to demonstrate the efficacy of applications in real-time avatar-related research. Our project and software are publicly available for further research or practical use (https://github.com/xianfei/SysMocap/).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The technologies for generating real-time animated avatars are very useful in the fields of VR/AR animation and entertainment. Most of the existing studies, however, always require the technology of time-consuming motion capture at high cost. This paper proposes an efficient lightweight framework of dynamic avatar animation, which can generate all the facial expressions, gestures, and torso movements properly in real time. The entire technique is driven only by monocular camera videos. Specifically, the 3D posture and facial landmarks of the monocular videos can be calculated by using Blaze-pose key points in our proposed framework. Then, a novel adaptor mapping function is proposed to transform the kinematic topology into the rigid skeletons of avatars. Without the dependency of a high-cost motion capture instrument and also without the limitation of the topology, our approach produces avatar animations with a higher level of fidelity. Finally, animations, including lip movements, facial expressions, and limb motions, are generated in a unified framework, which allows our 3D virtual avatar to act exactly like a real person. We have conducted extensive experiments to demonstrate the efficacy of applications in real-time avatar-related research. Our project and software are publicly available for further research or practical use (https://github.com/xianfei/SysMocap/).", "fno": "536500a429", "keywords": [ "Avatars", "Computer Animation", "Face Recognition", "Gesture Recognition", "Image Motion Analysis", "Motion Estimation", "Video Signal Processing", "Virtual Reality", "3 D Virtual Avatar", "Avatar Animations", "Blaze Pose Key Points", "Dynamic Avatar Animation", "Efficient Lightweight Framework", "Entertainment", "Facial Expressions", "Facial Landmarks", "High Cost Motion Capture Instrument", "Limb Motions", "Monocular Camera Videos", "Monocular Videos", "Real Time Animated Avatars", "Real Time Avatar Related Research", "Time Expressive Avatar Animation Generation", "Time Consuming Motion Capture", "Three Dimensional Displays", "Avatars", "Instruments", "Dynamics", "Animation", "Cameras", "Real Time Systems", "Computing Methodologies Computer Graphics Animation Motion Capture", "Human Centered Computing Human Computer Interaction HCI Interactive Systems And Tools" ], "authors": [ { "affiliation": "Beijing Information Science and Technology University,Computer School", "fullName": "Wenfeng Song", "givenName": "Wenfeng", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Information Science and Technology University,Computer School", "fullName": "Xianfei Wang", "givenName": "Xianfei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Advanced Innovation Center for Biomedical Engineering, Beihang University,State Key Laboratory of Virtual Reality Technology and Systems", "fullName": "Yang Gao", "givenName": "Yang", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University Beijing,State Key Laboratory of Virtual Reality Technology and Systems, Peng Cheng Laboratory,Shenzhen,China", "fullName": "Aimin Hao", "givenName": "Aimin", "surname": "Hao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Information Science and Technology University,Computer School", "fullName": "Xia Hou", "givenName": "Xia", "surname": "Hou", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "429-434", "year": "2022", "issn": null, "isbn": "978-1-6654-5365-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "536500a423", "articleId": "1J7W9Q9t1aE", "__typename": "AdjacentArticleType" }, "next": { "fno": "536500a435", "articleId": "1J7WmNmjy1i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2011/9140/0/05771400", "title": "Real-time avatar animation from a single image", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771400/12OmNButpYT", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771383", "title": "Real-time avatar animation from a single image", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771383/12OmNqNXEmD", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2008/1971/0/04480758", "title": "Creating a Speech Enabled Avatar from a Single Photograph", "doi": null, "abstractUrl": "/proceedings-article/vr/2008/04480758/12OmNrMHOjV", "parentPublication": { "id": "proceedings/vr/2008/1971/0", "title": "IEEE Virtual Reality 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549379", "title": "Head motion animation using avatar gaze space", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549379/12OmNxRWI3d", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a057", "title": "Visual Fidelity Effects on Expressive Self-avatar in Virtual Reality: First Impressions Matter", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a057/1CJc41zMnFC", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0279", "title": "EMOCA: Emotion Driven Monocular Face Capture and Animation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0279/1H0NpdUlHGM", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798353", "title": "Rapid 3D Avatar Creation System Using a Single Depth Camera", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798353/1cJ11TRykmY", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/05/08998352", "title": "Using Facial Animation to Increase the Enfacement Illusion and Avatar Self-Identification", "doi": null, "abstractUrl": "/journal/tg/2020/05/08998352/1hpPCCB7Bte", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a091", "title": "MoveBox: Democratizing MoCap for the Microsoft Rocketbox Avatar Library", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a091/1qpzzqGXwA0", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a128", "title": "AlterEcho: Loose Avatar-Streamer Coupling for Expressive VTubing", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a128/1yeCWKEosp2", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zWE36wtuCY", "title": "2021 International Conference on 3D Vision (3DV)", "acronym": "3dv", "groupId": "1800494", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zWEorFlxks", "doi": "10.1109/3DV53792.2021.00037", "title": "Dance In the Wild: Monocular Human Animation with Neural Dynamic Appearance Synthesis", "normalizedTitle": "Dance In the Wild: Monocular Human Animation with Neural Dynamic Appearance Synthesis", "abstract": "Synthesizing dynamic appearances of humans in motion plays a central role in applications such as ARWR and video editing. While many recent methods have been proposed to tackle this problem, handling loose garments with complex textures and high dynamic motion still remains challenging. In this paper, we propose a video based appearance synthesis method that tackles such challenges and demonstrates high quality results for in-the-wild videos that have not been shown before. Specifically, we adopt a StyleGAN based architecture to the task of person specific video based motion retargeting. We introduce a novel motion signature that is used to modulate the generator weights to capture dynamic appearance changes as well as regularizing the single frame based pose estimates to improve temporal coherency. We evaluate our method on a set of challenging videos and show that our approach achieves state-of-the-art performance both qualitatively and quantitatively.", "abstracts": [ { "abstractType": "Regular", "content": "Synthesizing dynamic appearances of humans in motion plays a central role in applications such as ARWR and video editing. While many recent methods have been proposed to tackle this problem, handling loose garments with complex textures and high dynamic motion still remains challenging. In this paper, we propose a video based appearance synthesis method that tackles such challenges and demonstrates high quality results for in-the-wild videos that have not been shown before. Specifically, we adopt a StyleGAN based architecture to the task of person specific video based motion retargeting. We introduce a novel motion signature that is used to modulate the generator weights to capture dynamic appearance changes as well as regularizing the single frame based pose estimates to improve temporal coherency. We evaluate our method on a set of challenging videos and show that our approach achieves state-of-the-art performance both qualitatively and quantitatively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Synthesizing dynamic appearances of humans in motion plays a central role in applications such as ARWR and video editing. While many recent methods have been proposed to tackle this problem, handling loose garments with complex textures and high dynamic motion still remains challenging. In this paper, we propose a video based appearance synthesis method that tackles such challenges and demonstrates high quality results for in-the-wild videos that have not been shown before. Specifically, we adopt a StyleGAN based architecture to the task of person specific video based motion retargeting. We introduce a novel motion signature that is used to modulate the generator weights to capture dynamic appearance changes as well as regularizing the single frame based pose estimates to improve temporal coherency. We evaluate our method on a set of challenging videos and show that our approach achieves state-of-the-art performance both qualitatively and quantitatively.", "fno": "268800a268", "keywords": [ "Computer Animation", "Image Motion Analysis", "Image Sequences", "Image Texture", "Neural Nets", "Pose Estimation", "Video Signal Processing", "Dance", "Monocular Human Animation", "Neural Dynamic Appearance Synthesis", "Video Editing", "Loose Garments", "Complex Textures", "High Dynamic Motion", "In The Wild Videos", "Style GAN Based Architecture", "Person Specific Video Based Motion Retargeting", "Motion Signature", "Dynamic Appearance Changes", "Challenging Videos", "Video Based Appearance Synthesis", "Three Dimensional Displays", "Dynamics", "Clothing", "Animation", "Generators", "Task Analysis", "Human Synthesis", "Dynamic Clothes" ], "authors": [ { "affiliation": "Adobe Research", "fullName": "Tuanfeng Y. Wang", "givenName": "Tuanfeng Y.", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Duygu Ceylan", "givenName": "Duygu", "surname": "Ceylan", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Krishna Kumar Singh", "givenName": "Krishna Kumar", "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": "University College London,Adobe Research", "fullName": "Niloy J. Mitra", "givenName": "Niloy J.", "surname": "Mitra", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "268-277", "year": "2021", "issn": null, "isbn": "978-1-6654-2688-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "268800a258", "articleId": "1zWEgPajWa4", "__typename": "AdjacentArticleType" }, "next": { "fno": "268800a278", "articleId": "1zWE5ygcUDe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034a777", "title": "Realtime Dynamic 3D Facial Reconstruction for Monocular Video In-the-Wild", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a777/12OmNxaNGhz", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08352750", "title": "Surface Motion Capture Animation Synthesis", "doi": null, "abstractUrl": "/journal/tg/2019/06/08352750/13rRUwjXZSl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09870173", "title": "NerfCap: Human Performance Capture With Dynamic Neural Radiance Fields", "doi": null, "abstractUrl": "/journal/tg/5555/01/09870173/1GgcSqKQSM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a429", "title": "Real-time Expressive Avatar Animation Generation based on Monocular Videos", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a429/1J7Wj0kJrJm", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a376", "title": "Dynamic Surface Animation using Generative Networks", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a376/1ezRAfa5neE", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f932", "title": "Everybody Dance Now", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f932/1hVlaSrG1qg", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093395", "title": "Do As I Do: Transferring Human Motion and Appearance between Monocular Videos with Spatial and Temporal Constraints", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093395/1jPbrEovs3e", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800f263", "title": "G3AN: Disentangling Appearance and Motion for Video Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800f263/1m3nR9fRn32", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900g583", "title": "Deep Animation Video Interpolation in the Wild", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900g583/1yeJEtrAPMA", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900k0821", "title": "Self-Supervised Video GANs: Learning for Appearance Consistency and Motion Coherency", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900k0821/1yeJd7VywBG", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC1GueH", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyo1nKt", "doi": "", "title": "Hypergraph matching based on Marginalized Constrained Compatibility", "normalizedTitle": "Hypergraph matching based on Marginalized Constrained Compatibility", "abstract": "We aim to match two hypergraphs via pairwise characterization of multiple relationships. To this end, we introduce a technique referred to as Marginalized Constrained Compatibility Estimation (MCCE), which transforms the compatibility tensor representing hyper-edge similarities into a compatibility matrix representing edge similarities. We then cluster graph vertices associated with the compatibility matrix and extract its dominant set as the optimal matches. Our MCCE-based method overcomes the information loss arising in arithmetic average, which is commonly used for marginal-ization in the hypergraph matching literature. Experiments demonstrate the effectiveness of our method.", "abstracts": [ { "abstractType": "Regular", "content": "We aim to match two hypergraphs via pairwise characterization of multiple relationships. To this end, we introduce a technique referred to as Marginalized Constrained Compatibility Estimation (MCCE), which transforms the compatibility tensor representing hyper-edge similarities into a compatibility matrix representing edge similarities. We then cluster graph vertices associated with the compatibility matrix and extract its dominant set as the optimal matches. Our MCCE-based method overcomes the information loss arising in arithmetic average, which is commonly used for marginal-ization in the hypergraph matching literature. Experiments demonstrate the effectiveness of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We aim to match two hypergraphs via pairwise characterization of multiple relationships. To this end, we introduce a technique referred to as Marginalized Constrained Compatibility Estimation (MCCE), which transforms the compatibility tensor representing hyper-edge similarities into a compatibility matrix representing edge similarities. We then cluster graph vertices associated with the compatibility matrix and extract its dominant set as the optimal matches. Our MCCE-based method overcomes the information loss arising in arithmetic average, which is commonly used for marginal-ization in the hypergraph matching literature. Experiments demonstrate the effectiveness of our method.", "fno": "06460777", "keywords": [ "Estimation Theory", "Feature Extraction", "Graph Theory", "Image Matching", "Image Representation", "Matrix Algebra", "Pattern Clustering", "Set Theory", "Tensors", "Pairwise Characterized Multiple Relationships", "Marginalized Constrained Compatibility Estimation", "Compatibility Tensor", "Hyperedge Similarity Representation", "Compatibility Matrix", "Edge Similarity Representation", "Cluster Graph Vertices", "MCCE Based Method", "Information Loss", "Arithmetic Average", "Optimal Hypergraph Matching Marginalization", "Dominant Set Method", "Tensile Stress", "Educational Institutions", "Estimation", "Equations", "Prototypes", "Transforms", "Optimal Matching" ], "authors": [ { "affiliation": "University of Electronic Science and Technology of China", "fullName": "Jiang Su", "givenName": "Jiang", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Electronic Science and Technology of China", "fullName": "Le Dong", "givenName": "Le", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "China University of Petroleum (Huadong)", "fullName": "Peng Ren", "givenName": "Peng", "surname": "Ren", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of York", "fullName": "Edwin R. Hancock", "givenName": "Edwin R.", "surname": "Hancock", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "2922-2925", "year": "2012", "issn": "1051-4651", "isbn": "978-1-4673-2216-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06460776", "articleId": "12OmNyYm2DQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06460778", "articleId": "12OmNxRF6Xp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851f062", "title": "Tensor Power Iteration for Multi-graph Matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851f062/12OmNwEJ0F0", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460091", "title": "Diffusion-driven high-order matching of partial deformable shapes", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460091/12OmNz2TCvg", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2012/4914/0/4914a259", "title": "On the Service Discovery Using Context-Awareness, Semantic Matching and Behavioural Compatibility", "doi": null, "abstractUrl": "/proceedings-article/cse/2012/4914a259/12OmNz4SODT", "parentPublication": { "id": "proceedings/cse/2012/4914/0", "title": "2012 IEEE 15th International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457e914", "title": "Alternating Direction Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457e914/12OmNzFMFnb", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460487", "title": "Spectral correspondence method for fingerprint minutia matching", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460487/12OmNzvQI1k", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/06/07482852", "title": "An Efficient Multilinear Optimization Framework for Hypergraph Matching", "doi": null, "abstractUrl": "/journal/tp/2017/06/07482852/13rRUxly96N", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/03/ttp2014030479", "title": "Fast and Scalable Approximate Spectral Matching for Higher Order Graph Matching", "doi": null, "abstractUrl": "/journal/tp/2014/03/ttp2014030479/13rRUyY28ZD", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545827", "title": "A Game- Theoretic Hyper-Graph Matching Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545827/17D45WXIkES", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545450", "title": "Online Multi-Target Tracking with Tensor-Based High-Order Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545450/17D45XzbnLk", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139866", "title": "A High-Throughput Solver for Marginalized Graph Kernels on GPU", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139866/1lss8c3fpL2", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19m3yLbYQdq", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "acronym": "iiai-aai", "groupId": "1801921", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "19m3H1W4wIU", "doi": "10.1109/IIAI-AAI.2018.00164", "title": "A Hypergraph Based Formal Description Technique for Enterprise Architecture Representation", "normalizedTitle": "A Hypergraph Based Formal Description Technique for Enterprise Architecture Representation", "abstract": "This paper provides a description about a hypergraph-based formalism for representing enterprise architecture, including formalized constraints for enterprise architecture definition. The paper describes a solid concept using the TOGAF Content Metamodel and the hypergraph theory. Hypergraphs provide a flexible mathematical structure to describe complex relationships in an enterprise architecture, mirroring the dependencies among components, and exploring integrity and consistency issues. The approach outlined in this paper offers extended analytical potential for discrepancy checking in complex enterprise architecture structures utilizing the tool set of hypergraph theory. The proposed approach can be used for extending EAM-based analysis of business information systems.", "abstracts": [ { "abstractType": "Regular", "content": "This paper provides a description about a hypergraph-based formalism for representing enterprise architecture, including formalized constraints for enterprise architecture definition. The paper describes a solid concept using the TOGAF Content Metamodel and the hypergraph theory. Hypergraphs provide a flexible mathematical structure to describe complex relationships in an enterprise architecture, mirroring the dependencies among components, and exploring integrity and consistency issues. The approach outlined in this paper offers extended analytical potential for discrepancy checking in complex enterprise architecture structures utilizing the tool set of hypergraph theory. The proposed approach can be used for extending EAM-based analysis of business information systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper provides a description about a hypergraph-based formalism for representing enterprise architecture, including formalized constraints for enterprise architecture definition. The paper describes a solid concept using the TOGAF Content Metamodel and the hypergraph theory. Hypergraphs provide a flexible mathematical structure to describe complex relationships in an enterprise architecture, mirroring the dependencies among components, and exploring integrity and consistency issues. The approach outlined in this paper offers extended analytical potential for discrepancy checking in complex enterprise architecture structures utilizing the tool set of hypergraph theory. The proposed approach can be used for extending EAM-based analysis of business information systems.", "fno": "744701a799", "keywords": [ "Business Data Processing", "Formal Specification", "Graph Theory", "Information Systems", "Software Architecture", "Formal Description Technique", "Enterprise Architecture Representation", "Hypergraph Based Formalism", "Formalized Constraints", "Enterprise Architecture Definition", "Hypergraph Theory", "Exploring Integrity", "Consistency Issues", "EAM Based Analysis", "Enterprise Architecture Structures", "TOGAF Content Metamodel", "Analytical Models", "Organizations", "Planning", "Tools", "Complexity Theory", "Mathematical Model", "Enterprise Architecture", "TOGAF", "Artefact", "Formal Modelling", "Hypergraph" ], "authors": [ { "affiliation": "Dept. of Inf. Syst., Corvinus Univ. of Budapest, Budapest, Hungary", "fullName": "Dora Ori", "givenName": "Dora", "surname": "Ori", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Inf. Syst., Eotvos Lorand Univ., Budapest, Hungary", "fullName": "Bálint Molnár", "givenName": "Bálint", "surname": "Molnár", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiai-aai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "799-804", "year": "2018", "issn": null, "isbn": "978-1-5386-7447-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "744701a793", "articleId": "19m3IDPsjMA", "__typename": "AdjacentArticleType" }, "next": { "fno": "744701a805", "articleId": "19m3JsLjLQk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edocw/2014/5467/0/5467a003", "title": "Enterprise Architecture Schools of Thought: An Exploratory Study", "doi": null, "abstractUrl": "/proceedings-article/edocw/2014/5467a003/12OmNBpmDCN", "parentPublication": { "id": "proceedings/edocw/2014/5467/0", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2015/9331/0/9331a164", "title": "Tutorial: Towards Orthographic Enterprise Architecture Modeling", "doi": null, "abstractUrl": "/proceedings-article/edocw/2015/9331a164/12OmNBqMDCm", "parentPublication": { "id": "proceedings/edocw/2015/9331/0", "title": "2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/07070308", "title": "Consolidating Enterprise Architecture Management Research", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/07070308/12OmNC4wtCT", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2014/5779/2/5779b141", "title": "Information Provision as a Success Factor in the Architectural Support of Enterprise Transformations", "doi": null, "abstractUrl": "/proceedings-article/cbi/2014/5779b141/12OmNvAS4pf", "parentPublication": { "id": "proceedings/cbi/2014/5779/2", "title": "2014 IEEE 16th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2014/5467/0/5467a266", "title": "Towards a Framework for Enterprise Architecture Analytics", "doi": null, "abstractUrl": "/proceedings-article/edocw/2014/5467a266/12OmNvD8RCY", "parentPublication": { "id": "proceedings/edocw/2014/5467/0", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2017/1568/0/1568a071", "title": "Introducing a Coordination Perspective to Enterprise Architecture Management Research", "doi": null, "abstractUrl": "/proceedings-article/edocw/2017/1568a071/12OmNx76TU6", "parentPublication": { "id": "proceedings/edocw/2017/1568/0", "title": "2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2013/3048/0/3048a194", "title": "Business Building Blocks as Coordination Mechanism for Enterprise Transformations", "doi": null, "abstractUrl": "/proceedings-article/edocw/2013/3048a194/12OmNxiKs0X", "parentPublication": { "id": "proceedings/edocw/2013/3048/0", "title": "2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2016/9933/0/07584394", "title": "Untangling EA's Long Path of Becoming a Partner for Business Transformation: The Case of Swiss Federal Railways", "doi": null, "abstractUrl": "/proceedings-article/edocw/2016/07584394/12OmNyTOsld", "parentPublication": { "id": "proceedings/edocw/2016/9933/0", "title": "2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2018/4141/0/414100a153", "title": "Theories to Understand the Dynamic Nature of Enterprise Architecture", "doi": null, "abstractUrl": "/proceedings-article/edocw/2018/414100a153/17D45WXIkAj", "parentPublication": { "id": "proceedings/edocw/2018/4141/0", "title": "2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2019/0650/1/065001a165", "title": "Managing Strategy in Digital Transformation Context: An Exploratory Analysis of Enterprise Architecture Management Support", "doi": null, "abstractUrl": "/proceedings-article/cbi/2019/065001a165/1cI6wG75vuU", "parentPublication": { "id": "cbi/2019/0650/1", "title": "2019 IEEE 21st Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AqwYO1eX72", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AqxnbOPIJ2", "doi": "10.1109/ICDM51629.2021.00019", "title": "Hypergraph Ego-networks and Their Temporal Evolution", "normalizedTitle": "Hypergraph Ego-networks and Their Temporal Evolution", "abstract": "Interactions involving multiple objects simultaneously are ubiquitous across many domains. The systems these interactions inhabit can be modelled using hypergraphs, a generalization of traditional graphs in which each edge can connect any number of nodes. Analyzing the global and static properties of these hypergraphs has led to a plethora of novel findings regarding how these modelled system are structured. However, less is known about the localized structure of these systems and how they evolve over time. In this paper, we propose the study of hypergraph ego-networks, a structure that can be used to model higher-order interactions involving a single node. We also propose the temporal reconstruction of hypergraph ego-networks as a benchmark problem for models that aim to predict the local temporal structure of hypergraphs. By combining a deep learning binary classifier with a hill-climbing algorithm, we will present a model for reconstructing hypergraph ego-networks by incorporating structural patterns found across multiple domains.", "abstracts": [ { "abstractType": "Regular", "content": "Interactions involving multiple objects simultaneously are ubiquitous across many domains. The systems these interactions inhabit can be modelled using hypergraphs, a generalization of traditional graphs in which each edge can connect any number of nodes. Analyzing the global and static properties of these hypergraphs has led to a plethora of novel findings regarding how these modelled system are structured. However, less is known about the localized structure of these systems and how they evolve over time. In this paper, we propose the study of hypergraph ego-networks, a structure that can be used to model higher-order interactions involving a single node. We also propose the temporal reconstruction of hypergraph ego-networks as a benchmark problem for models that aim to predict the local temporal structure of hypergraphs. By combining a deep learning binary classifier with a hill-climbing algorithm, we will present a model for reconstructing hypergraph ego-networks by incorporating structural patterns found across multiple domains.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Interactions involving multiple objects simultaneously are ubiquitous across many domains. The systems these interactions inhabit can be modelled using hypergraphs, a generalization of traditional graphs in which each edge can connect any number of nodes. Analyzing the global and static properties of these hypergraphs has led to a plethora of novel findings regarding how these modelled system are structured. However, less is known about the localized structure of these systems and how they evolve over time. In this paper, we propose the study of hypergraph ego-networks, a structure that can be used to model higher-order interactions involving a single node. We also propose the temporal reconstruction of hypergraph ego-networks as a benchmark problem for models that aim to predict the local temporal structure of hypergraphs. By combining a deep learning binary classifier with a hill-climbing algorithm, we will present a model for reconstructing hypergraph ego-networks by incorporating structural patterns found across multiple domains.", "fno": "239800a091", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Pattern Classification", "Hypergraph Ego Networks", "Interactions Inhabit", "Hypergraphs", "Modelled System", "Model Higher Order Interactions", "Local Temporal Structure", "Deep Learning", "Analytical Models", "Conferences", "Predictive Models", "Benchmark Testing", "Prediction Algorithms", "Classification Algorithms", "Hypergraphs", "Data Mining", "Deep Learning", "Machine Learning", "Ego Networks" ], "authors": [ { "affiliation": "Cornell University", "fullName": "Cazamere Comrie", "givenName": "Cazamere", "surname": "Comrie", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University", "fullName": "Jon Kleinberg", "givenName": "Jon", "surname": "Kleinberg", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "91-100", "year": "2021", "issn": null, "isbn": "978-1-6654-2398-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "239800a081", "articleId": "1AqxkfMhmLK", "__typename": "AdjacentArticleType" }, "next": { "fno": "239800a101", "articleId": "1Aqx0KHBdPG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/si/1999/01/00748202", "title": "Multilevel hypergraph partitioning: applications in VLSI domain", "doi": null, "abstractUrl": "/journal/si/1999/01/00748202/13rRUILtJwF", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/05/08391739", "title": "HyperX: A Scalable Hypergraph Framework", "doi": null, "abstractUrl": "/journal/tk/2019/05/08391739/13rRUNvya9B", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/10/06570719", "title": "Context-Aware Hypergraph Construction for Robust Spectral Clustering", "doi": null, "abstractUrl": "/journal/tk/2014/10/06570719/13rRUwjoNxw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a310", "title": "THyMe+: Temporal Hypergraph Motifs and Fast Algorithms for Exact Counting", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a310/1Aqxb83rx3G", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b246", "title": "Hypergraph Neural Networks for Hypergraph Matching", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b246/1BmH2Hl5H2g", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2022/9747/0/974700a275", "title": "NWHy: A Framework for Hypergraph Analytics: Representations, Data structures, and Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2022/974700a275/1Fu9xVhUFyM", "parentPublication": { "id": "proceedings/ipdpsw/2022/9747/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a849", "title": "THINK: Temporal Hypergraph Hyperbolic Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a849/1KpCmdynhio", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222341", "title": "Visual Analytics for Temporal Hypergraph Model Exploration", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222341/1nTqGZHBYM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378335", "title": "Hypergraph Attention Isomorphism Network by Learning Line Graph Expansion", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378335/1s64ocFjOEg", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09525190", "title": "Adaptive Hypergraph Auto-Encoder for Relational Data Clustering", "doi": null, "abstractUrl": "/journal/tk/2023/03/09525190/1wuoOAnJzmo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1EVihIUabss", "title": "2021 Ninth International Conference on Advanced Cloud and Big Data (CBD)", "acronym": "cbd", "groupId": "1803748", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1EVioxW9YbK", "doi": "10.1109/CBD54617.2021.00035", "title": "An Optimization Method for Weight Computation in Hypergraph Transductive Learning Model", "normalizedTitle": "An Optimization Method for Weight Computation in Hypergraph Transductive Learning Model", "abstract": "Compared with the graph structure, the hyper-graph structure can convey more complex and multivariate relationships. In addition, hypergraphs are more capable of portraying and mining higher-order nonlinear correlations among objects. Therefore, it has been widely used in feature selection, clustering classification, and addressing other issues, and hypergraph learning has also become an important branch in the field of machine learning. Hypergraph learning, however, is a relatively high time consuming learning algorithm, because in its iterative solving process, there are lots of high-dimension matrix computations with large-scale parameters. This paper proposes an optimization of the weights, which is constructed by Gaussian kernel, in hyper-graph transductive learning model the weight matrix is replaced by fixed parameters when constructing the hypergraph laplacian matrix, which reduces the time consuming of weights computation in iterative process. Extensive experimental with semi-supervised node classification experiment results on the UCI and Kaggle datasets show that the optimized model reduces the time consuming of the hypergraph model, while ensuring classification accuracy. After model optimization, the four accuracy indicators fluctuate on average 3.03%, the time consuming is reduced by 28.99% on average, and the maximum saving is 42.84%.", "abstracts": [ { "abstractType": "Regular", "content": "Compared with the graph structure, the hyper-graph structure can convey more complex and multivariate relationships. In addition, hypergraphs are more capable of portraying and mining higher-order nonlinear correlations among objects. Therefore, it has been widely used in feature selection, clustering classification, and addressing other issues, and hypergraph learning has also become an important branch in the field of machine learning. Hypergraph learning, however, is a relatively high time consuming learning algorithm, because in its iterative solving process, there are lots of high-dimension matrix computations with large-scale parameters. This paper proposes an optimization of the weights, which is constructed by Gaussian kernel, in hyper-graph transductive learning model the weight matrix is replaced by fixed parameters when constructing the hypergraph laplacian matrix, which reduces the time consuming of weights computation in iterative process. Extensive experimental with semi-supervised node classification experiment results on the UCI and Kaggle datasets show that the optimized model reduces the time consuming of the hypergraph model, while ensuring classification accuracy. After model optimization, the four accuracy indicators fluctuate on average 3.03%, the time consuming is reduced by 28.99% on average, and the maximum saving is 42.84%.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Compared with the graph structure, the hyper-graph structure can convey more complex and multivariate relationships. In addition, hypergraphs are more capable of portraying and mining higher-order nonlinear correlations among objects. Therefore, it has been widely used in feature selection, clustering classification, and addressing other issues, and hypergraph learning has also become an important branch in the field of machine learning. Hypergraph learning, however, is a relatively high time consuming learning algorithm, because in its iterative solving process, there are lots of high-dimension matrix computations with large-scale parameters. This paper proposes an optimization of the weights, which is constructed by Gaussian kernel, in hyper-graph transductive learning model the weight matrix is replaced by fixed parameters when constructing the hypergraph laplacian matrix, which reduces the time consuming of weights computation in iterative process. Extensive experimental with semi-supervised node classification experiment results on the UCI and Kaggle datasets show that the optimized model reduces the time consuming of the hypergraph model, while ensuring classification accuracy. After model optimization, the four accuracy indicators fluctuate on average 3.03%, the time consuming is reduced by 28.99% on average, and the maximum saving is 42.84%.", "fno": "074500a158", "keywords": [ "Data Mining", "Graph Theory", "Iterative Methods", "Learning Artificial Intelligence", "Pattern Classification", "Hypergraphs", "Higher Order Nonlinear Correlations", "Hypergraph Learning", "Machine Learning", "Relatively High Time", "Iterative Solving Process", "High Dimension Matrix Computations", "Hyper Graph Transductive", "Weight Matrix", "Hypergraph Laplacian Matrix", "Weights Computation", "Iterative Process", "Semisupervised Node Classification Experiment Results", "Optimized Model", "Hypergraph Model", "Model Optimization", "Optimization Method", "Weight Computation", "Hypergraph Transductive Learning Model", "Hyper Graph Structure", "Complex Relationships", "Multivariate Relationships", "Machine Learning Algorithms", "Laplace Equations", "Computational Modeling", "Optimization Methods", "Machine Learning", "Feature Extraction", "Data Models", "Hypergraph Transductive Learning", "Weight Matrix", "Laplacian" ], "authors": [ { "affiliation": "Information Processing Technology Provincial Key Laboratory for Computer Soochow University,School of Computer Science and Technology,Suzhou,China", "fullName": "Zhe Yang", "givenName": "Zhe", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Information Processing Technology Provincial Key Laboratory for Computer Soochow University,School of Computer Science and Technology,Suzhou,China", "fullName": "Liangkui Xu", "givenName": "Liangkui", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Information Processing Technology Provincial Key Laboratory for Computer Soochow University,School of Computer Science and Technology,Suzhou,China", "fullName": "Ziyu Bu", "givenName": "Ziyu", "surname": "Bu", "__typename": "ArticleAuthorType" }, { "affiliation": "Information Processing Technology Provincial Key Laboratory for Computer Soochow University,School of Computer Science and Technology,Suzhou,China", "fullName": "Yipeng Chen", "givenName": "Yipeng", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "158-163", "year": "2022", "issn": null, "isbn": "978-1-6654-0745-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "074500a151", "articleId": "1EVihRuXgBy", "__typename": "AdjacentArticleType" }, "next": { "fno": "074500a164", "articleId": "1EVimFyCDJK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209d880", "title": "A Hypergraph Kernel from Isomorphism Tests", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d880/12OmNAoUTku", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460777", "title": "Hypergraph matching based on Marginalized Constrained Compatibility", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460777/12OmNyo1nKt", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/09/07064739", "title": "Visual Classification by Z_$\\ell _1$_Z -Hypergraph Modeling", "doi": null, "abstractUrl": "/journal/tk/2015/09/07064739/13rRUxZzAhZ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/12/08493549", "title": "Dual Hypergraph Regularized PCA for Biclustering of Tumor Gene Expression Data", "doi": null, "abstractUrl": "/journal/tk/2019/12/08493549/14qdcRk7agg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2022/2055/0/205500b159", "title": "Spectral Hypergraph Sparsifiers of Nearly Linear Size", "doi": null, "abstractUrl": "/proceedings-article/focs/2022/205500b159/1BtfB7K0XdK", "parentPublication": { "id": "proceedings/focs/2022/2055/0", "title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991629", "title": "Distributed Hypergraph Laplacian for Face Anti -spoofing with Monocular Images", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991629/1JwPUtO2H9S", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09141415", "title": "Data Representation by Joint Hypergraph Embedding and Sparse Coding", "doi": null, "abstractUrl": "/journal/tk/2022/05/09141415/1lu2y88rPcA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/06/09169850", "title": "Hypergraph Partitioning With Embeddings", "doi": null, "abstractUrl": "/journal/tk/2022/06/09169850/1mmOxMdvt1S", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222341", "title": "Visual Analytics for Temporal Hypergraph Model Exploration", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222341/1nTqGZHBYM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09264674", "title": "Hypergraph Learning: Methods and Practices", "doi": null, "abstractUrl": "/journal/tp/2022/05/09264674/1oSTGZQHJgA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Fu96jCrxug", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "acronym": "ipdpsw", "groupId": "1800044", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Fu9xVhUFyM", "doi": "10.1109/IPDPSW55747.2022.00057", "title": "NWHy: A Framework for Hypergraph Analytics: Representations, Data structures, and Algorithms", "normalizedTitle": "NWHy: A Framework for Hypergraph Analytics: Representations, Data structures, and Algorithms", "abstract": "This paper presents NWHypergraph, (NWHy), a parallel high-performance C++ framework for both exact and approximate hypergraph analytics. NWHy provides data structures for various representations of hypergraphs and their associated graph projections (lower order approximations), including a new technique for hypergraph representation called adjoin graphs. We present a set of hypergraph algorithms for exact and approximate hypergraph analytics implemented in NWHy and demonstrate scalability and performance, operating on a variety of hypergraph representations, that is competitive with the state of the art. In addition, we propose two new queue-based algorithms for s-line graph construction, a lower-order approximation of hypergraphs, to demonstrate the effectiveness and versatility of work queue-based algorithm design. Our queue-based algorithms demonstrate similar performance to the non-queue-based algorithms for bipartite graphs.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents NWHypergraph, (NWHy), a parallel high-performance C++ framework for both exact and approximate hypergraph analytics. NWHy provides data structures for various representations of hypergraphs and their associated graph projections (lower order approximations), including a new technique for hypergraph representation called adjoin graphs. We present a set of hypergraph algorithms for exact and approximate hypergraph analytics implemented in NWHy and demonstrate scalability and performance, operating on a variety of hypergraph representations, that is competitive with the state of the art. In addition, we propose two new queue-based algorithms for s-line graph construction, a lower-order approximation of hypergraphs, to demonstrate the effectiveness and versatility of work queue-based algorithm design. Our queue-based algorithms demonstrate similar performance to the non-queue-based algorithms for bipartite graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents NWHypergraph, (NWHy), a parallel high-performance C++ framework for both exact and approximate hypergraph analytics. NWHy provides data structures for various representations of hypergraphs and their associated graph projections (lower order approximations), including a new technique for hypergraph representation called adjoin graphs. We present a set of hypergraph algorithms for exact and approximate hypergraph analytics implemented in NWHy and demonstrate scalability and performance, operating on a variety of hypergraph representations, that is competitive with the state of the art. In addition, we propose two new queue-based algorithms for s-line graph construction, a lower-order approximation of hypergraphs, to demonstrate the effectiveness and versatility of work queue-based algorithm design. Our queue-based algorithms demonstrate similar performance to the non-queue-based algorithms for bipartite graphs.", "fno": "974700a275", "keywords": [ "Approximation Theory", "C Language", "Data Structures", "Graph Theory", "Parallel Programming", "Queueing Theory", "Queue Based Algorithms", "Nonqueue Based Algorithms", "NW Hy", "Approximate Hypergraph Analytics", "Data Structures", "Hypergraph Representation", "Parallel High Performance C Framework", "Distributed Processing", "Scalability", "Conferences", "C Languages", "Approximation Algorithms", "Data Structures", "Bipartite Graph", "Hypergraph Analytics", "Hypergraph Representation", "Parallel Hypergraph Algorithms" ], "authors": [ { "affiliation": "University of Washington", "fullName": "Xu T. Liu", "givenName": "Xu T.", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Lab", "fullName": "Jesun Firoz", "givenName": "Jesun", "surname": "Firoz", "__typename": "ArticleAuthorType" }, { "affiliation": "Washington State University", "fullName": "Assefaw H. Gebremedhin", "givenName": "Assefaw H.", "surname": "Gebremedhin", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Washington", "fullName": "Andrew Lumsdaine", "givenName": "Andrew", "surname": "Lumsdaine", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdpsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "275-284", "year": "2022", "issn": null, "isbn": "978-1-6654-9747-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "974700a265", "articleId": "1Fu9bcM2sog", "__typename": "AdjacentArticleType" }, "next": { "fno": "974700a285", "articleId": "1Fu9Ei37q5G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/allerton/2008/2925/0/04797585", "title": "Weight distribution of codes on hypergraphs", "doi": null, "abstractUrl": "/proceedings-article/allerton/2008/04797585/12OmNBigFnz", "parentPublication": { "id": "proceedings/allerton/2008/2925/0", "title": "2008 46th Annual Allerton Conference on Communication, Control, and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1998/9172/0/91720684", "title": "Improved Bounds and Algorithms for Hypergraph Two-Coloring", "doi": null, "abstractUrl": "/proceedings-article/focs/1998/91720684/12OmNrIJqCg", "parentPublication": { "id": "proceedings/focs/1998/9172/0", "title": "Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftcs/1988/0867/0/00005346", "title": "The connectivity of hypergraph and the design of fault-tolerant multibus systems", "doi": null, "abstractUrl": "/proceedings-article/ftcs/1988/00005346/12OmNrYCXG2", "parentPublication": { "id": "proceedings/ftcs/1988/0867/0", "title": "1988 The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/05/08391739", "title": "HyperX: A Scalable Hypergraph Framework", "doi": null, "abstractUrl": "/journal/tk/2019/05/08391739/13rRUNvya9B", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09721603", "title": "Topological Simplifications of Hypergraphs", "doi": null, "abstractUrl": "/journal/tg/5555/01/09721603/1BhzoNy6wWA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073582", "title": "Random Preferential Attachment Hypergraph", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073582/1jjAhNUEqWI", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09187569", "title": "Distributed Hypergraph Processing Using Intersection Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/07/09187569/1mVFlr5j4Aw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/06/09169850", "title": "Hypergraph Partitioning With Embeddings", "doi": null, "abstractUrl": "/journal/tk/2022/06/09169850/1mmOxMdvt1S", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222341", "title": "Visual Analytics for Temporal Hypergraph Model Exploration", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222341/1nTqGZHBYM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378335", "title": "Hypergraph Attention Isomorphism Network by Learning Line Graph Expansion", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378335/1s64ocFjOEg", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KpChQa9kQ0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KpCmdynhio", "doi": "10.1109/ICDM54844.2022.00096", "title": "THINK: Temporal Hypergraph Hyperbolic Network", "normalizedTitle": "THINK: Temporal Hypergraph Hyperbolic Network", "abstract": "Network-based time series forecasting is a challenging task as it involves complex geometric properties, higher-order relations, and scale-free characteristics. Previous work has modeled network-based series as oversimplified graphs or has ignored the power law dynamics of real-world temporal and dynamic networks, which could yield suboptimal results. With the aim to address these issues, here we propose THINK, a novel framework based on hypergraph learning that captures the hyperbolic properties of time-evolving dynamic hypergraphs. We design an elegant hyperbolic distance-aware hypergraph attention mechanism to better capture informative internal structural features on the Poincar&#x00E9; ball. Through quantitative and conceptual analysis on seven tasks across temporal, and time-evolving dynamic hypergraphs, we demonstrate THINK&#x2019;s practicality in comparison to a variety of benchmarks spanning finance, health, and energy networks.", "abstracts": [ { "abstractType": "Regular", "content": "Network-based time series forecasting is a challenging task as it involves complex geometric properties, higher-order relations, and scale-free characteristics. Previous work has modeled network-based series as oversimplified graphs or has ignored the power law dynamics of real-world temporal and dynamic networks, which could yield suboptimal results. With the aim to address these issues, here we propose THINK, a novel framework based on hypergraph learning that captures the hyperbolic properties of time-evolving dynamic hypergraphs. We design an elegant hyperbolic distance-aware hypergraph attention mechanism to better capture informative internal structural features on the Poincar&#x00E9; ball. Through quantitative and conceptual analysis on seven tasks across temporal, and time-evolving dynamic hypergraphs, we demonstrate THINK&#x2019;s practicality in comparison to a variety of benchmarks spanning finance, health, and energy networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network-based time series forecasting is a challenging task as it involves complex geometric properties, higher-order relations, and scale-free characteristics. Previous work has modeled network-based series as oversimplified graphs or has ignored the power law dynamics of real-world temporal and dynamic networks, which could yield suboptimal results. With the aim to address these issues, here we propose THINK, a novel framework based on hypergraph learning that captures the hyperbolic properties of time-evolving dynamic hypergraphs. We design an elegant hyperbolic distance-aware hypergraph attention mechanism to better capture informative internal structural features on the Poincaré ball. Through quantitative and conceptual analysis on seven tasks across temporal, and time-evolving dynamic hypergraphs, we demonstrate THINK’s practicality in comparison to a variety of benchmarks spanning finance, health, and energy networks.", "fno": "509900a849", "keywords": [ "Complex Networks", "Graph Theory", "Hyperbolic Equations", "Learning Artificial Intelligence", "Time Series", "Complex Geometric Properties", "Dynamic Networks", "Energy Networks", "Higher Order Relations", "Hyperbolic Distance Aware Hypergraph Attention Mechanism", "Hyperbolic Properties", "Hypergraph Learning", "Informative Internal Structural Features", "Network Based Series", "Network Based Time Series Forecasting", "Oversimplified Graphs", "Power Law Dynamics", "Scale Free Characteristics", "Temporal Hypergraph Hyperbolic Network", "THINK", "Time Evolving Dynamic Hypergraphs", "Time Series Analysis", "Buildings", "Finance", "Benchmark Testing", "Data Mining", "Task Analysis", "Forecasting", "Hyperbolic", "Hypergraphs", "Spatio Temporal Forecasting" ], "authors": [ { "affiliation": "University of Illinois at Urbana-Champaign", "fullName": "Shivam Agarwal", "givenName": "Shivam", "surname": "Agarwal", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Ramit Sawhney", "givenName": "Ramit", "surname": "Sawhney", "__typename": "ArticleAuthorType" }, { "affiliation": "BITS Pilani", "fullName": "Megh Thakkar", "givenName": "Megh", "surname": "Thakkar", "__typename": "ArticleAuthorType" }, { "affiliation": "Mohamed bin Zayed University of Artificial Intelligence", "fullName": "Preslav Nakov", "givenName": "Preslav", "surname": "Nakov", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Urbana-Champaign", "fullName": "Jiawei Han", "givenName": "Jiawei", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Vanderbilt University", "fullName": "Tyler Derr", "givenName": "Tyler", "surname": "Derr", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "849-854", "year": "2022", "issn": null, "isbn": "978-1-6654-5099-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "509900a843", "articleId": "1KpCjGgC1DW", "__typename": "AdjacentArticleType" }, "next": { "fno": "509900a855", "articleId": "1KpCFMZhy3S", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2021/2398/0/239800a310", "title": "THyMe+: Temporal Hypergraph Motifs and Fast Algorithms for Exact Counting", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a310/1Aqxb83rx3G", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a091", "title": "Hypergraph Ego-networks and Their Temporal Evolution", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a091/1AqxnbOPIJ2", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09782536", "title": "Hypergraph Collaborative Network on Vertices and Hyperedges", "doi": null, "abstractUrl": "/journal/tp/2023/03/09782536/1DGRXX38Y9i", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300b621", "title": "Dynamic Hypergraph Convolutional Network", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300b621/1FwFAmjJMju", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09999499", "title": "Hyperbolic Temporal Network Embedding", "doi": null, "abstractUrl": "/journal/tk/5555/01/09999499/1JrMz2WQoO4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222341", "title": "Visual Analytics for Temporal Hypergraph Model Exploration", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222341/1nTqGZHBYM8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100a061", "title": "Near-linear Size Hypergraph Cut Sparsifiers", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100a061/1qyxsIgiUUw", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378335", "title": "Hypergraph Attention Isomorphism Network by Learning Line Graph Expansion", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378335/1s64ocFjOEg", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09525190", "title": "Adaptive Hypergraph Auto-Encoder for Relational Data Clustering", "doi": null, "abstractUrl": "/journal/tk/2023/03/09525190/1wuoOAnJzmo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a154", "title": "A Hyperbolic-to-Hyperbolic Graph Convolutional Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a154/1yeJgfbgw6Y", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yXu6NL4pqw", "title": "2021 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yXukGBCJTq", "doi": "10.1109/VIS49827.2021.9623305", "title": "Towards a Survey on Static and Dynamic Hypergraph Visualizations", "normalizedTitle": "Towards a Survey on Static and Dynamic Hypergraph Visualizations", "abstract": "Leveraging hypergraph structures to model advanced processes has gained much attention over the last few years in many areas, ranging from protein-interaction in computational biology to image retrieval using machine learning. Hypergraph models can provide a more accurate representation of the underlying processes while reducing the overall number of links compared to regular representations. However, interactive visualization methods for hypergraphs and hypergraph-based models have rarely been explored or systematically analyzed. This paper reviews the existing research landscape for hypergraph and hypergraph model visualizations and assesses the currently employed techniques. We provide an overview and a categorization of proposed approaches, focusing on performance, scalability, interaction support, successful evaluation, and the ability to represent different underlying data structures, including a recent demand for a temporal representation of interaction networks and their improvements beyond graph-based methods. Lastly, we discuss the strengths and weaknesses of the approaches and give an insight into the future challenges arising in this emerging research field.", "abstracts": [ { "abstractType": "Regular", "content": "Leveraging hypergraph structures to model advanced processes has gained much attention over the last few years in many areas, ranging from protein-interaction in computational biology to image retrieval using machine learning. Hypergraph models can provide a more accurate representation of the underlying processes while reducing the overall number of links compared to regular representations. However, interactive visualization methods for hypergraphs and hypergraph-based models have rarely been explored or systematically analyzed. This paper reviews the existing research landscape for hypergraph and hypergraph model visualizations and assesses the currently employed techniques. We provide an overview and a categorization of proposed approaches, focusing on performance, scalability, interaction support, successful evaluation, and the ability to represent different underlying data structures, including a recent demand for a temporal representation of interaction networks and their improvements beyond graph-based methods. Lastly, we discuss the strengths and weaknesses of the approaches and give an insight into the future challenges arising in this emerging research field.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Leveraging hypergraph structures to model advanced processes has gained much attention over the last few years in many areas, ranging from protein-interaction in computational biology to image retrieval using machine learning. Hypergraph models can provide a more accurate representation of the underlying processes while reducing the overall number of links compared to regular representations. However, interactive visualization methods for hypergraphs and hypergraph-based models have rarely been explored or systematically analyzed. This paper reviews the existing research landscape for hypergraph and hypergraph model visualizations and assesses the currently employed techniques. We provide an overview and a categorization of proposed approaches, focusing on performance, scalability, interaction support, successful evaluation, and the ability to represent different underlying data structures, including a recent demand for a temporal representation of interaction networks and their improvements beyond graph-based methods. Lastly, we discuss the strengths and weaknesses of the approaches and give an insight into the future challenges arising in this emerging research field.", "fno": "333500a081", "keywords": [ "Data Mining", "Data Structures", "Data Visualisation", "Graph Theory", "Image Retrieval", "Learning Artificial Intelligence", "Network Theory Graphs", "Proteins", "Static Hypergraph Visualizations", "Dynamic Hypergraph Visualizations", "Leveraging Hypergraph Structures", "Advanced Processes", "Protein Interaction", "Computational Biology", "Image Retrieval", "Machine Learning", "Hypergraph Models", "Regular Representations", "Interactive Visualization Methods", "Hypergraphs", "Hypergraph Based Models", "Existing Research Landscape", "Hypergraph Model Visualizations", "Interaction Support", "Different Underlying Data Structures", "Temporal Representation", "Interaction Networks", "Graph Based Methods", "Proteins", "Analytical Models", "Visualization", "Computational Modeling", "Biological System Modeling", "Scalability", "Image Retrieval", "Hypergraphs", "Hypergraph Model", "Temporal", "Visualization", "Visual Analytics", "Survey" ], "authors": [ { "affiliation": "University of Konstanz,Germany", "fullName": "Maximilian T. Fischer", "givenName": "Maximilian T.", "surname": "Fischer", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz,Germany", "fullName": "Alexander Frings", "givenName": "Alexander", "surname": "Frings", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz,Germany", "fullName": "Daniel A. Keim", "givenName": "Daniel A.", "surname": "Keim", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz,Germany", "fullName": "Daniel Seebacher", "givenName": "Daniel", "surname": "Seebacher", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "81-85", "year": "2021", "issn": null, "isbn": "978-1-6654-3335-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "333500a076", "articleId": "1yXuiT4GCbK", "__typename": "AdjacentArticleType" }, "next": { "fno": "333500a086", "articleId": "1yXuaVpYCXe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2015/9504/0/9504a775", "title": "Scalable Hypergraph Learning and Processing", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a775/12OmNB8TUhV", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/2008/3183/0/3183a418", "title": "Hypergraph Acyclicity and Extension Preservation Theorems", "doi": null, "abstractUrl": "/proceedings-article/lics/2008/3183a418/12OmNBZYTnt", "parentPublication": { "id": "proceedings/lics/2008/3183/0", "title": "23rd Annual IEEE Symposium on Logic in Computer Science (LICS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/05/08391739", "title": "HyperX: A Scalable Hypergraph Framework", "doi": null, "abstractUrl": "/journal/tk/2019/05/08391739/13rRUNvya9B", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2018/7447/0/744701a799", "title": "A Hypergraph Based Formal Description Technique for Enterprise Architecture Representation", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2018/744701a799/19m3H1W4wIU", "parentPublication": { "id": "proceedings/iiai-aai/2018/7447/0", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2022/2027/0/202700a184", "title": "Hardware-Accelerated Hypergraph Processing with Chain-Driven Scheduling", "doi": null, "abstractUrl": "/proceedings-article/hpca/2022/202700a184/1Ds0h32ECQg", "parentPublication": { "id": "proceedings/hpca/2022/2027/0", "title": "2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2022/9747/0/974700a275", "title": "NWHy: A Framework for Hypergraph Analytics: Representations, Data structures, and Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2022/974700a275/1Fu9xVhUFyM", "parentPublication": { "id": "proceedings/ipdpsw/2022/9747/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020506", "title": "Functional Ball Dropping: A superfast hypergraph generation scheme", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020506/1KfRbfnOlTq", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/01/08789484", "title": "Analyzing Dynamic Hypergraphs with Parallel Aggregated Ordered Hypergraph Visualization", "doi": null, "abstractUrl": "/journal/tg/2021/01/08789484/1ch5Lx3gcVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073582", "title": "Random Preferential Attachment Hypergraph", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073582/1jjAhNUEqWI", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378335", "title": "Hypergraph Attention Isomorphism Network by Learning Line Graph Expansion", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378335/1s64ocFjOEg", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTppAa", "title": "11th IAPR International Conference on Pattern Recognition. Vol.II. Conference B: Pattern Recognition Methodology and Systems", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNwpXRX6", "doi": "10.1109/ICPR.1992.201718", "title": "A non-linear projection method based on Kohonen's topology preserving maps", "normalizedTitle": "A non-linear projection method based on Kohonen's topology preserving maps", "abstract": "A nonlinear projection method is presented to visualize high-dimensional data as a two-dimensional image. The proposed method is based on the topology preserving mapping algorithm of Kohonen (1990). This algorithm is used to train a two-dimensional network structure. Then, the interpoint distances in the feature space between the units in the network are graphically displayed to show the underlying structure of the data. The authors present and discuss some methods to quantify how well a topology preserving mapping algorithm maps the high-dimensional input data onto the network structure. They compare the projection method with the well-known method of Sammon (1969). Experiments indicate that the performance of the Kohonen projection method is comparable or better than Sammon's method. Another advantage of the method is that its time complexity only depends on the resolution of the output image, and not on the size of the dataset.<>", "abstracts": [ { "abstractType": "Regular", "content": "A nonlinear projection method is presented to visualize high-dimensional data as a two-dimensional image. The proposed method is based on the topology preserving mapping algorithm of Kohonen (1990). This algorithm is used to train a two-dimensional network structure. Then, the interpoint distances in the feature space between the units in the network are graphically displayed to show the underlying structure of the data. The authors present and discuss some methods to quantify how well a topology preserving mapping algorithm maps the high-dimensional input data onto the network structure. They compare the projection method with the well-known method of Sammon (1969). Experiments indicate that the performance of the Kohonen projection method is comparable or better than Sammon's method. Another advantage of the method is that its time complexity only depends on the resolution of the output image, and not on the size of the dataset.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A nonlinear projection method is presented to visualize high-dimensional data as a two-dimensional image. The proposed method is based on the topology preserving mapping algorithm of Kohonen (1990). This algorithm is used to train a two-dimensional network structure. Then, the interpoint distances in the feature space between the units in the network are graphically displayed to show the underlying structure of the data. The authors present and discuss some methods to quantify how well a topology preserving mapping algorithm maps the high-dimensional input data onto the network structure. They compare the projection method with the well-known method of Sammon (1969). Experiments indicate that the performance of the Kohonen projection method is comparable or better than Sammon's method. Another advantage of the method is that its time complexity only depends on the resolution of the output image, and not on the size of the dataset.", "fno": "00201718", "keywords": [ "Computational Complexity", "Image Recognition", "Learning Systems", "Neural Nets", "Topology", "2 D Image Recognition", "Learning Systems", "Pattern Recognition", "Kohonens Topology Preserving Maps", "Nonlinear Projection Method", "Feature Space", "High Dimensional Input Data", "Kohonen Projection Method", "Time Complexity", "Network Topology", "Computer Science", "Data Analysis", "Iterative Algorithms", "Data Visualization", "Physics", "Image Resolution", "Inspection", "Pattern Recognition", "Displays" ], "authors": [ { "affiliation": "Fac. of Appl. Phys., Delft Univ. of Technol., Netherlands", "fullName": "M.A. Kraaijveld", "givenName": "M.A.", "surname": "Kraaijveld", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "41,42,43,44,45", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00201717", "articleId": "12OmNwwd30D", "__typename": "AdjacentArticleType" }, "next": { "fno": "00201719", "articleId": "12OmNywfKBG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2008/2174/0/04761132", "title": "Ridge Regression for Two Dimensional Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761132/12OmNAYoKw5", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/1/4356a165", "title": "Two-Dimensional Neighborhood Structure Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356a165/12OmNC8uRko", "parentPublication": { "id": "proceedings/cmsp/2011/4356/1", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgec/2010/4281/0/4281a394", "title": "Patch-based Face Hallucination with Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/icgec/2010/4281a394/12OmNqGitUC", "parentPublication": { "id": "proceedings/icgec/2010/4281/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284831", "title": "Bilateral Back-Projection for Single Image Super Resolution", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284831/12OmNvwTGBE", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1993/3752/0/00262992", "title": "Convolution reverse-projection", "doi": null, "abstractUrl": "/proceedings-article/cbms/1993/00262992/12OmNwI8ceM", "parentPublication": { "id": "proceedings/cbms/1993/3752/0", "title": "Proceedings of the Sixth Annual 1993 IEEE Symposium Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/reconfig/2006/0689/0/04099981", "title": "Digital Hardware Architectures of Kohonen's Self Organizing Feature Maps with Exponential Neighboring Function", "doi": null, "abstractUrl": "/proceedings-article/reconfig/2006/04099981/12OmNyQGRXf", "parentPublication": { "id": "proceedings/reconfig/2006/0689/0", "title": "Reconfigurable Computing and FPGAs, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572619", "title": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572619/12OmNz2kqgu", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1998/05/i0572", "title": "Intrinsic Dimensionality Estimation With Optimally Topology Preserving Maps", "doi": null, "abstractUrl": "/journal/tp/1998/05/i0572/13rRUxly96v", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222271", "title": "TopoMap: A 0-dimensional Homology Preserving Projection of High-Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222271/1nTrwyIRc1W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c014", "title": "A Sparse Local Preserving Projection Method Based On Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c014/1tzz5KXRenK", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAOsMGw", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "acronym": "iciev", "groupId": "1802578", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2kqgu", "doi": "10.1109/ICIEV.2013.6572619", "title": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method", "normalizedTitle": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method", "abstract": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method is reported in this paper. In directional elemental image generation, directional projection geometry is considered for each pixel in order to directional elemental image projection. In this scheme, the elemental image resizing method is used to prevent elemental image mismatch with the lens pitch due to directional projection. By using directional elemental image projection scheme, viewing zone of reconstructed image can be controlled according to the directional projection angle.", "abstracts": [ { "abstractType": "Regular", "content": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method is reported in this paper. In directional elemental image generation, directional projection geometry is considered for each pixel in order to directional elemental image projection. In this scheme, the elemental image resizing method is used to prevent elemental image mismatch with the lens pitch due to directional projection. By using directional elemental image projection scheme, viewing zone of reconstructed image can be controlled according to the directional projection angle.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Three dimensional projection-type integral imaging display system using directional projection and elemental image resizing method is reported in this paper. In directional elemental image generation, directional projection geometry is considered for each pixel in order to directional elemental image projection. In this scheme, the elemental image resizing method is used to prevent elemental image mismatch with the lens pitch due to directional projection. By using directional elemental image projection scheme, viewing zone of reconstructed image can be controlled according to the directional projection angle.", "fno": "06572619", "keywords": [ "Geometry", "Image Reconstruction", "Three Dimensional Projection Type Integral Imaging Display System", "Directional Projection Method", "Elemental Image Resizing Method", "Directional Elemental Image Generation", "Directional Projection Geometry", "Directional Elemental Image Projection", "Elemental Image Mismatch", "Image Reconstruction", "Lenses", "Arrays", "Imaging", "Image Reconstruction", "Three Dimensional Displays", "Geometry", "Image Resolution", "Integral Imaging", "Elemental Image Resizing", "Directional Projection", "3 D Display" ], "authors": [ { "affiliation": "School of Electrical and Computer Engineering, Chungbuk National University, Cheongju, Korea, Republic of", "fullName": "Md. Ashraful Alam", "givenName": "Md. Ashraful", "surname": "Alam", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electrical and Computer Engineering, Chungbuk National University, Cheongju, Korea, Republic of", "fullName": "Mei-Lan Piao", "givenName": "Mei-Lan", "surname": "Piao", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electrical and Computer Engineering, Chungbuk National University, Cheongju, Korea, Republic of", "fullName": "Li Gang", "givenName": "Li", "surname": "Gang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electrical and Computer Engineering, Chungbuk National University, Cheongju, Korea, Republic of", "fullName": "Yan-Ling Piao", "givenName": "Yan-Ling", "surname": "Piao", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electrical and Computer Engineering, Chungbuk National University, Cheongju, Korea, Republic of", "fullName": "Nam Kim", "givenName": "Nam", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciev", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-05-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2013", "issn": null, "isbn": "978-1-4799-0400-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06572618", "articleId": "12OmNxjjEjI", "__typename": "AdjacentArticleType" }, "next": { "fno": "06572620", "articleId": "12OmNrAMEIv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2006/0224/0/01667679", "title": "Long Visualization Depth Autostereoscopic Display using Light Field Rendering based Integral Videography", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/01667679/12OmNvDZEZe", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcip/2009/3699/2/3699b160", "title": "Computational Integral Imaging Reconstruction Technique with High Image Resolution", "doi": null, "abstractUrl": "/proceedings-article/apcip/2009/3699b160/12OmNvHGryD", "parentPublication": { "id": "proceedings/apcip/2009/3699/1", "title": "Information Processing, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459380", "title": "Optimal multiple surfaces searching for video/image resizing - a graph-theoretic approach", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459380/12OmNvSKNV0", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccm/2008/3290/1/3290a133", "title": "Three-Dimensional Computational Integral Imaging Reconstruction by Use of Pixel Blocks Interpolation", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a133/12OmNvStcA6", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2011/4484/0/4484a125", "title": "A Projection Profile-Based Algorithm for Content-Aware Image Resizing", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2011/4484a125/12OmNwBjP4m", "parentPublication": { "id": "proceedings/cgiv/2011/4484/0", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2012/4745/0/4745a596", "title": "Image Resizing Based on Geometry Preservation with Seam Carving", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2012/4745a596/12OmNwdbV2X", "parentPublication": { "id": "proceedings/trustcom/2012/4745/0", "title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/3/01326475", "title": "A multiresolution directional filter bank for image applications", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326475/12OmNwekjEG", "parentPublication": { "id": "proceedings/icassp/2004/8484/3", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2010/6425/0/05453456", "title": "Spatially Scalable Video Coding Based on Hybrid Epitomic Resizing", "doi": null, "abstractUrl": "/proceedings-article/dcc/2010/05453456/12OmNwoghcM", "parentPublication": { "id": "proceedings/dcc/2010/6425/0", "title": "2010 Data Compression Conference (DCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/01/ttg2014010111", "title": "Summarization-Based Image Resizing by Intelligent Object Carving", "doi": null, "abstractUrl": "/journal/tg/2014/01/ttg2014010111/13rRUyYSWkY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a134", "title": "Improved convex set projection algorithm for Image sequence reconstruction", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a134/1oRj062Qpuo", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiso", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XeKgmH", "doi": "10.1109/SIBGRAPI.2018.00050", "title": "Inverse Projection of Vector Fields", "normalizedTitle": "Inverse Projection of Vector Fields", "abstract": "Vector fields play an essential role in a large range of scientific applications. They are commonly generated through computer simulations. Such simulations may be a costly process since they usually require an intensive computational time. When researchers want to quantify the uncertainty in such kind of applications, usually an ensemble of vector fields realizations are generated, making the process much more expensive. The main contribution of this paper is to present a new method, based on the inverse projection technique, to quickly and consistently generate 2D vector fields similar to the ones in the ensemble, which after an evaluation of a specialist could enlarge the ensemble in order to better represent the uncertainty. Through the Helmholtz-Hodge Decomposition, we obtain the divergence-free, rotational-free and harmonic components of a vector field. With those components and the original ensemble in hand, it is possible to derive new realizations from their projections into a 2-dimensional space. To do so, we propose the use of an inverse projection technique individually in each component projected space. Results are obtained in real-time, through an interactive interface. A set of multi-method wind forecast realizations were used to demonstrate the results obtained with this approach.", "abstracts": [ { "abstractType": "Regular", "content": "Vector fields play an essential role in a large range of scientific applications. They are commonly generated through computer simulations. Such simulations may be a costly process since they usually require an intensive computational time. When researchers want to quantify the uncertainty in such kind of applications, usually an ensemble of vector fields realizations are generated, making the process much more expensive. The main contribution of this paper is to present a new method, based on the inverse projection technique, to quickly and consistently generate 2D vector fields similar to the ones in the ensemble, which after an evaluation of a specialist could enlarge the ensemble in order to better represent the uncertainty. Through the Helmholtz-Hodge Decomposition, we obtain the divergence-free, rotational-free and harmonic components of a vector field. With those components and the original ensemble in hand, it is possible to derive new realizations from their projections into a 2-dimensional space. To do so, we propose the use of an inverse projection technique individually in each component projected space. Results are obtained in real-time, through an interactive interface. A set of multi-method wind forecast realizations were used to demonstrate the results obtained with this approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Vector fields play an essential role in a large range of scientific applications. They are commonly generated through computer simulations. Such simulations may be a costly process since they usually require an intensive computational time. When researchers want to quantify the uncertainty in such kind of applications, usually an ensemble of vector fields realizations are generated, making the process much more expensive. The main contribution of this paper is to present a new method, based on the inverse projection technique, to quickly and consistently generate 2D vector fields similar to the ones in the ensemble, which after an evaluation of a specialist could enlarge the ensemble in order to better represent the uncertainty. Through the Helmholtz-Hodge Decomposition, we obtain the divergence-free, rotational-free and harmonic components of a vector field. With those components and the original ensemble in hand, it is possible to derive new realizations from their projections into a 2-dimensional space. To do so, we propose the use of an inverse projection technique individually in each component projected space. Results are obtained in real-time, through an interactive interface. A set of multi-method wind forecast realizations were used to demonstrate the results obtained with this approach.", "fno": "926400a337", "keywords": [ "Vectors", "Helmholtz Hodge Decomposition", "Multimethod Wind Forecast Realization", "Component Projected Space", "Vector Field", "Inverse Projection Technique", "Two Dimensional Displays", "Uncertainty", "Interpolation", "Harmonic Analysis", "Dimensionality Reduction", "Computational Modeling", "Data Visualization", "Vector Fields", "Inverse Projection", "Shepard Interpolation" ], "authors": [ { "affiliation": null, "fullName": "Paula Ceccon Ribeiro", "givenName": "Paula", "surname": "Ceccon Ribeiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hélio Lopes", "givenName": "Hélio", "surname": "Lopes", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "337-344", "year": "2018", "issn": null, "isbn": "978-1-5386-9264-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "926400a329", "articleId": "17D45XwUAJr", "__typename": "AdjacentArticleType" }, "next": { "fno": "926400a345", "articleId": "17D45VTRosD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sibgrapi/2015/7962/0/7962a250", "title": "Exploratory Segmentation of Vector Fields Using Multidimensional Projection", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2015/7962a250/12OmNBLdKJ0", "parentPublication": { "id": "proceedings/sibgrapi/2015/7962/0", "title": "2015 28th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a456", "title": "Topology Analysis of Vector Fields and Application Prospect", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a456/12OmNxGja5R", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2010/8420/0/05720353", "title": "Topology Aware Vector Field Denoising", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2010/05720353/12OmNz6iOsi", "parentPublication": { "id": "proceedings/sibgrapi/2010/8420/0", "title": "2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1988/02/i0248", "title": "A Projection Operator for the Restoration of Divergence-Free Vector Fields", "doi": null, "abstractUrl": "/journal/tp/1988/02/i0248/13rRUxDqS9c", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101717", "title": "Design of 2D Time-Varying Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101717/13rRUxNEqPP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122763", "title": "Visualization of Morse Connection Graphs for Topologically Rich 2D Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122763/13rRUxNW1Zp", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2021/2172/0/217200a001", "title": "Dimension reduction of inverse kinematics of seven-degree-of-freedom manipulator based on pose separation method", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2021/217200a001/1ANLrWVtloQ", "parentPublication": { "id": "proceedings/wcmeim/2021/2172/0", "title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a031", "title": "Scalar2Vec: Translating Scalar Fields to Vector Fields via Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a031/1E2wnSSZrl6", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09166766", "title": "Meshless Approximation and Helmholtz-Hodge Decomposition of Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2022/02/09166766/1mgaO3cO3aU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222353", "title": "Implicit Multidimensional Projection of Local Subspaces", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222353/1nTqcxPMEIE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lPGXn8hEiI", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1lPH7mqchRC", "doi": "10.1109/CVPRW50498.2020.00436", "title": "Persistent Homology-based Projection Pursuit", "normalizedTitle": "Persistent Homology-based Projection Pursuit", "abstract": "Dimensionality reduction problem is stated as finding a mapping f:X &#x2208; R<sup>m</sup> &#x2192; Z &#x2208; R<sup>n</sup>, where &#x226A; m while preserving some relevant properties of the data. We formulate topology-preserving dimensionality reduction as finding the optimal orthogonal projection to the lower-dimensional subspace which minimizes discrepancy between persistent diagrams of the original data and the projection. This generalizes the classic projection pursuit algorithm which was originally designed to preserve the number of clusters, i.e. the 0-order topological invariant of the data. Our approach further allows to preserve k-th order invariants within the principled framework. We further pose the resulting optimization problem as the Riemannian optimization problem which allows for a natural and efficient solution.", "abstracts": [ { "abstractType": "Regular", "content": "Dimensionality reduction problem is stated as finding a mapping f:X &#x2208; R<sup>m</sup> &#x2192; Z &#x2208; R<sup>n</sup>, where &#x226A; m while preserving some relevant properties of the data. We formulate topology-preserving dimensionality reduction as finding the optimal orthogonal projection to the lower-dimensional subspace which minimizes discrepancy between persistent diagrams of the original data and the projection. This generalizes the classic projection pursuit algorithm which was originally designed to preserve the number of clusters, i.e. the 0-order topological invariant of the data. Our approach further allows to preserve k-th order invariants within the principled framework. We further pose the resulting optimization problem as the Riemannian optimization problem which allows for a natural and efficient solution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Dimensionality reduction problem is stated as finding a mapping f:X ∈ Rm → Z ∈ Rn, where ≪ m while preserving some relevant properties of the data. We formulate topology-preserving dimensionality reduction as finding the optimal orthogonal projection to the lower-dimensional subspace which minimizes discrepancy between persistent diagrams of the original data and the projection. This generalizes the classic projection pursuit algorithm which was originally designed to preserve the number of clusters, i.e. the 0-order topological invariant of the data. Our approach further allows to preserve k-th order invariants within the principled framework. We further pose the resulting optimization problem as the Riemannian optimization problem which allows for a natural and efficient solution.", "fno": "09150784", "keywords": [ "Optimisation", "Topology", "Lower Dimensional Subspace", "Persistent Diagrams", "Classic Projection Pursuit", "0 Order Topological Invariant", "Riemannian Optimization Problem", "Persistent Homology Based Projection Pursuit", "Dimensionality Reduction Problem", "Relevant Properties", "Topology Preserving Dimensionality Reduction", "Optimal Orthogonal Projection", "Principled Framework", "Topology", "Optimization", "Manifolds", "Dimensionality Reduction", "Loss Measurement", "Clustering Algorithms" ], "authors": [ { "affiliation": "Skolkovo Institute of Science and Technology,Moscow,Russia,121205", "fullName": "Oleg Kachan", "givenName": "Oleg", "surname": "Kachan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "3744-3751", "year": "2020", "issn": null, "isbn": "978-1-7281-9360-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09150841", "articleId": "1lPHztEgrwQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "09150791", "articleId": "1lPGZhSzB04", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asia/2009/3910/0/3910a202", "title": "Appearance-Based Subspace Projection Techniques for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/asia/2009/3910a202/12OmNANTAyx", "parentPublication": { "id": "proceedings/asia/2009/3910/0", "title": "2009 International Asia Symposium on Intelligent Interaction and Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a128", "title": "Finding Local Anomalies in Very High Dimensional Space", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a128/12OmNAkWvut", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109a380", "title": "Dimensionality Reduction for Distributed Vision Systems Using Random Projection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a380/12OmNC8uRhA", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/1/4356a165", "title": "Two-Dimensional Neighborhood Structure Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356a165/12OmNC8uRko", "parentPublication": { "id": "proceedings/cmsp/2011/4356/1", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/4/3119d613", "title": "Locality Preserving Projection in Orthogonal Domain", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119d613/12OmNvTTckq", "parentPublication": { "id": "proceedings/cisp/2008/3119/4", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2006/12/k1600", "title": "Multi-Output Regularized Feature Projection", "doi": null, "abstractUrl": "/journal/tk/2006/12/k1600/13rRUILtJzN", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/12/i2143", "title": "Orthogonal Neighborhood Preserving Projections: A Projection-Based Dimensionality Reduction Technique", "doi": null, "abstractUrl": "/journal/tp/2007/12/i2143/13rRUwbaqVU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a402", "title": "Data Classification: Dimensionality Reduction Using Combined and Non-combined Multidimensional Projection Techniques", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a402/17D45X0yjV2", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/09/08693535", "title": "Feature Selective Projection with Low-Rank Embedding and Dual Laplacian Regularization", "doi": null, "abstractUrl": "/journal/tk/2020/09/08693535/19iRbOuhl9C", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c014", "title": "A Sparse Local Preserving Projection Method Based On Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c014/1tzz5KXRenK", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNykCcdi", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNrnJ6W1", "doi": "10.1109/CVPRW.2016.131", "title": "On Time-Series Topological Data Analysis: New Data and Opportunities", "normalizedTitle": "On Time-Series Topological Data Analysis: New Data and Opportunities", "abstract": "This work introduces a new dataset and framework for the exploration of topological data analysis (TDA) techniques applied to time-series data. We examine the end-toend TDA processing pipeline for persistent homology applied to time-delay embeddings of time series – embeddings that capture the underlying system dynamics from which time series data is acquired. In particular, we consider stability with respect to time series length, the approximation accuracy of sparse filtration methods, and the discriminating ability of persistence diagrams as a feature for learning. We explore these properties across a wide range of time-series datasets spanning multiple domains for single source multi-segment signals as well as multi-source single segment signals. Our analysis and dataset captures the entire TDA processing pipeline and includes time-delay embeddings, persistence diagrams, topological distance measures, as well as kernels for similarity learning and classification tasks for a broad set of time-series data sources. We outline the TDA framework and rationale behind the dataset and provide insights into the role of TDA for time-series analysis as well as opportunities for new work.", "abstracts": [ { "abstractType": "Regular", "content": "This work introduces a new dataset and framework for the exploration of topological data analysis (TDA) techniques applied to time-series data. We examine the end-toend TDA processing pipeline for persistent homology applied to time-delay embeddings of time series – embeddings that capture the underlying system dynamics from which time series data is acquired. In particular, we consider stability with respect to time series length, the approximation accuracy of sparse filtration methods, and the discriminating ability of persistence diagrams as a feature for learning. We explore these properties across a wide range of time-series datasets spanning multiple domains for single source multi-segment signals as well as multi-source single segment signals. Our analysis and dataset captures the entire TDA processing pipeline and includes time-delay embeddings, persistence diagrams, topological distance measures, as well as kernels for similarity learning and classification tasks for a broad set of time-series data sources. We outline the TDA framework and rationale behind the dataset and provide insights into the role of TDA for time-series analysis as well as opportunities for new work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work introduces a new dataset and framework for the exploration of topological data analysis (TDA) techniques applied to time-series data. We examine the end-toend TDA processing pipeline for persistent homology applied to time-delay embeddings of time series – embeddings that capture the underlying system dynamics from which time series data is acquired. In particular, we consider stability with respect to time series length, the approximation accuracy of sparse filtration methods, and the discriminating ability of persistence diagrams as a feature for learning. We explore these properties across a wide range of time-series datasets spanning multiple domains for single source multi-segment signals as well as multi-source single segment signals. Our analysis and dataset captures the entire TDA processing pipeline and includes time-delay embeddings, persistence diagrams, topological distance measures, as well as kernels for similarity learning and classification tasks for a broad set of time-series data sources. We outline the TDA framework and rationale behind the dataset and provide insights into the role of TDA for time-series analysis as well as opportunities for new work.", "fno": "1437b014", "keywords": [ "Kernel", "Topology", "Pipelines", "Time Series Analysis", "Three Dimensional Displays", "Context", "Support Vector Machines" ], "authors": [ { "affiliation": null, "fullName": "Lee M. Seversky", "givenName": "Lee M.", "surname": "Seversky", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shelby Davis", "givenName": "Shelby", "surname": "Davis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthew Berger", "givenName": "Matthew", "surname": "Berger", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "1014-1022", "year": "2016", "issn": "2160-7516", "isbn": "978-1-5090-1437-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1437b006", "articleId": "12OmNBgQFHn", "__typename": "AdjacentArticleType" }, "next": { "fno": "1437b023", "articleId": "12OmNqBtiHM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigdataservice/2015/8128/0/8128a223", "title": "AntsBOA: A New Time Series Pipeline for Big Data Processing, Analyzing and Querying in Online Advertising Application", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2015/8128a223/12OmNBTs7CC", "parentPublication": { "id": "proceedings/bigdataservice/2015/8128/0", "title": "2015 IEEE First International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a384", "title": "Visualizing Dynamic Gene Interactions to Reverse Engineer Gene Regulatory Networks Using Topological Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a384/12OmNwBT1sd", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/07/08249544", "title": "Sparse-TDA: Sparse Realization of Topological Data Analysis for Multi-Way Classification", "doi": null, "abstractUrl": "/journal/tk/2018/07/08249544/13rRUNvyafy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a460", "title": "ReTriM: Reconstructive Triplet Loss for Learning Reduced Embeddings for Multi-Variate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a460/1AjSE0QXGAU", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b119", "title": "The evolution pattern of world trade network based on topological data analysis", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b119/1ByeUlJgrN6", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a238", "title": "Topological Data Analysis for Portfolio Management of Cryptocurrencies", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a238/1gAwW6q3Icw", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101514", "title": "Data Series Indexing Gone Parallel", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101514/1kaMPe06R5C", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222093", "title": "Localized Topological Simplification of Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222093/1nTrExzmT5e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isctt/2020/8575/0/857500a228", "title": "The Topological Properties of COVID-19 Global Activity Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/isctt/2020/857500a228/1rHePWWXtGo", "parentPublication": { "id": "proceedings/isctt/2020/8575/0", "title": "2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412768", "title": "A Hybrid Metric based on Persistent Homology and its Application to Signal Classification", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412768/1tmhAJtw0yk", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A8gmCnipkA", "title": "2021 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A8hqpvSjn2", "doi": "10.1109/BigData52589.2021.9671368", "title": "Activation Landscapes as a Topological Summary of Neural Network Performance", "normalizedTitle": "Activation Landscapes as a Topological Summary of Neural Network Performance", "abstract": "We use topological data analysis (TDA) to study how data transforms as it passes through successive layers of a deep neural network (DNN). We compute the persistent homology of the activation data for each layer of the network and summarize this information using persistence landscapes. The resulting feature map provides both an informative visualization of the network and a kernel for statistical analysis and machine learning. A statistical test shows that it correlates with classification accuracy. We observe that the topological complexity often increases with training and that the topological complexity does not decrease with each layer.", "abstracts": [ { "abstractType": "Regular", "content": "We use topological data analysis (TDA) to study how data transforms as it passes through successive layers of a deep neural network (DNN). We compute the persistent homology of the activation data for each layer of the network and summarize this information using persistence landscapes. The resulting feature map provides both an informative visualization of the network and a kernel for statistical analysis and machine learning. A statistical test shows that it correlates with classification accuracy. We observe that the topological complexity often increases with training and that the topological complexity does not decrease with each layer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We use topological data analysis (TDA) to study how data transforms as it passes through successive layers of a deep neural network (DNN). We compute the persistent homology of the activation data for each layer of the network and summarize this information using persistence landscapes. The resulting feature map provides both an informative visualization of the network and a kernel for statistical analysis and machine learning. A statistical test shows that it correlates with classification accuracy. We observe that the topological complexity often increases with training and that the topological complexity does not decrease with each layer.", "fno": "09671368", "keywords": [ "Data Analysis", "Data Visualisation", "Image Classification", "Learning Artificial Intelligence", "Neural Nets", "Statistical Analysis", "Topological Summary", "Neural Network Performance", "Topological Data Analysis", "TDA", "Data Transforms", "Successive Layers", "Deep Neural Network", "DNN", "Persistent Homology", "Activation Data", "Persistence Landscapes", "Resulting Feature Map", "Informative Visualization", "Statistical Analysis", "Machine Learning", "Statistical Test", "Topological Complexity", "Activation Landscapes", "Training", "Deep Learning", "Data Analysis", "Statistical Analysis", "Neural Networks", "Data Visualization", "Transforms", "Topological Data Analysis", "Persistent Homology", "Persistence Landscapes", "Deep Neural Networks", "Topological Complexity", "Local Homology" ], "authors": [ { "affiliation": "University of Florida,Department of Medicine,Gainesville,USA", "fullName": "Matthew Wheeler", "givenName": "Matthew", "surname": "Wheeler", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Florida,CISE Department,Gainesville,USA", "fullName": "Jose Bouza", "givenName": "Jose", "surname": "Bouza", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Florida,Department of Mathematics,Gainesville,USA", "fullName": "Peter Bubenik", "givenName": "Peter", "surname": "Bubenik", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "3865-3870", "year": "2021", "issn": null, "isbn": "978-1-6654-3902-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09671525", "articleId": "1A8gMJq8KTS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09671483", "articleId": "1A8hi50JX4A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2016/1437/0/1437b014", "title": "On Time-Series Topological Data Analysis: New Data and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b014/12OmNrnJ6W1", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/2/0367b386", "title": "Detection of Irregularities and Rips by Finding Critical Points of Morse Theory — Preliminary Results on Analysis on Sales Data", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367b386/12OmNvpNIqA", "parentPublication": { "id": "compsac/2017/0367/2", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622175", "title": "Topological approaches to skin disease image analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622175/17D45XeKgnd", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020423", "title": "Stable Topological Feature Vectors via Hermite Function Expansion on Persistence Curves", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020423/1KfRC2DMiJy", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a238", "title": "Topological Data Analysis for Portfolio Management of Cryptocurrencies", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a238/1gAwW6q3Icw", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983312", "title": "Topological Data Analysis on Magnetic Resonance Image Biomarkers", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983312/1hgugr5x9ZK", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150874", "title": "Smooth Summaries of Persistence Diagrams and Texture Classification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150874/1lPH0I4ZRQY", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a150", "title": "Exploration of Topological Data Analysis In 3D Printing", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a150/1oRiWPcsMtW", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378216", "title": "Topology Preserving Data Reduction for Computing Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378216/1s64J6qKBvW", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a015", "title": "Application of Topological Data Analysis in Co-infections and Its Effectiveness", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a015/1tROxvA7JZu", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmhAJtw0yk", "doi": "10.1109/ICPR48806.2021.9412768", "title": "A Hybrid Metric based on Persistent Homology and its Application to Signal Classification", "normalizedTitle": "A Hybrid Metric based on Persistent Homology and its Application to Signal Classification", "abstract": "Topological Data Analysis (TDA) is a rising field in machine learning. TDA seeks to extract information about the shape of a data set by examining its topological and geometric properties. Persistence diagrams, one of main tools in TDA, store topological information about the data. Persistence curves, a recently developed framework, provides a canonical and flexible way to encode the information presented in persistence diagrams into vectors. Based on persistence curves, the main contributions of this work are to (1) provide new sets of features for time series, (2) prove that these features are robust to noise, (3) propose a hybrid metric that takes both geometric and topological information of the time series into account. Finally, we apply these metrics to all the datasets in the UCR Time Series Classification Archive. Empirical results show that the proposed metrics perform better than the relevant benchmark in most cases.", "abstracts": [ { "abstractType": "Regular", "content": "Topological Data Analysis (TDA) is a rising field in machine learning. TDA seeks to extract information about the shape of a data set by examining its topological and geometric properties. Persistence diagrams, one of main tools in TDA, store topological information about the data. Persistence curves, a recently developed framework, provides a canonical and flexible way to encode the information presented in persistence diagrams into vectors. Based on persistence curves, the main contributions of this work are to (1) provide new sets of features for time series, (2) prove that these features are robust to noise, (3) propose a hybrid metric that takes both geometric and topological information of the time series into account. Finally, we apply these metrics to all the datasets in the UCR Time Series Classification Archive. Empirical results show that the proposed metrics perform better than the relevant benchmark in most cases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topological Data Analysis (TDA) is a rising field in machine learning. TDA seeks to extract information about the shape of a data set by examining its topological and geometric properties. Persistence diagrams, one of main tools in TDA, store topological information about the data. Persistence curves, a recently developed framework, provides a canonical and flexible way to encode the information presented in persistence diagrams into vectors. Based on persistence curves, the main contributions of this work are to (1) provide new sets of features for time series, (2) prove that these features are robust to noise, (3) propose a hybrid metric that takes both geometric and topological information of the time series into account. Finally, we apply these metrics to all the datasets in the UCR Time Series Classification Archive. Empirical results show that the proposed metrics perform better than the relevant benchmark in most cases.", "fno": "09412768", "keywords": [ "Data Analysis", "Learning Artificial Intelligence", "Pattern Classification", "Signal Classification", "Time Series", "Topology", "Hybrid Metric", "Persistent Homology", "Signal Classification", "Topological Data Analysis", "TDA", "Rising Field", "Machine Learning", "Topological Properties", "Geometric Properties", "Persistence Diagrams", "Store Topological Information", "Persistence Curves", "Recently Developed Framework", "Geometric Information", "UCR Time Series Classification Archive", "Measurement", "Weight Measurement", "Data Analysis", "Shape", "Time Series Analysis", "Transforms", "Benchmark Testing" ], "authors": [ { "affiliation": "University of North Carolina,Program of Informatics and Analytics,Greensboro", "fullName": "Austin Lawson", "givenName": "Austin", "surname": "Lawson", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina,Department of Mathematics and Statistics,Greensboro", "fullName": "Yu-Min Chung", "givenName": "Yu-Min", "surname": "Chung", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina,Department of Mathematics and Statistics,Greensboro", "fullName": "William Cruse", "givenName": "William", "surname": "Cruse", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "9944-9950", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412205", "articleId": "1tmjcNMinsc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412479", "articleId": "1tmjCveYeaY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2016/1437/0/1437b014", "title": "On Time-Series Topological Data Analysis: New Data and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b014/12OmNrnJ6W1", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09931659", "title": "Cycle Registration in Persistent Homology With Applications in Topological Bootstrap", "doi": null, "abstractUrl": "/journal/tp/2023/05/09931659/1HOt84IIIc8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2022/8611/0/861100a387", "title": "Quantum Persistent Homology for Time Series", "doi": null, "abstractUrl": "/proceedings-article/sec/2022/861100a387/1JC1jOjkvgk", "parentPublication": { "id": "proceedings/sec/2022/8611/0", "title": "2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a634", "title": "Polytopal Complex Construction and Use in Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a634/1KBr0gpxlM4", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020423", "title": "Stable Topological Feature Vectors via Hermite Function Expansion on Persistence Curves", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020423/1KfRC2DMiJy", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900b089", "title": "Homology-Separating Triangulated Euler Characteristic Curve", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900b089/1KpCF87kpTW", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a238", "title": "Topological Data Analysis for Portfolio Management of Cryptocurrencies", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a238/1gAwW6q3Icw", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150874", "title": "Smooth Summaries of Persistence Diagrams and Texture Classification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150874/1lPH0I4ZRQY", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a636", "title": "Persistent Homology on Streaming Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a636/1rgGoCFz78Y", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378216", "title": "Topology Preserving Data Reduction for Computing Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378216/1s64J6qKBvW", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aD", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNARiM01", "doi": "10.1109/VISUAL.1996.568120", "title": "Untangling Knots by Stochastic Energy Optimization", "normalizedTitle": "Untangling Knots by Stochastic Energy Optimization", "abstract": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically-based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "abstracts": [ { "abstractType": "Regular", "content": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically-based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically-based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "fno": "36730279", "keywords": [], "authors": [ { "affiliation": "University of Illinois at Chicago", "fullName": "Milana Huang", "givenName": "Milana", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Chicago", "fullName": "Robert P. Grzeszczuk", "givenName": "Robert P.", "surname": "Grzeszczuk", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Chicago", "fullName": "Louis H. Kauffman", "givenName": "Louis H.", "surname": "Kauffman", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-10-01T00:00:00", "pubType": "proceedings", "pages": "279", "year": "1996", "issn": "1070-2385", "isbn": "0-7803-3673-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "36730271", "articleId": "12OmNAP1Z01", "__typename": "AdjacentArticleType" }, "next": { "fno": "36730287", "articleId": "12OmNx57HWm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2016/1451/0/07465247", "title": "Visualizing knots and braids with touchable 3D manipulatives", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2016/07465247/12OmNAXxX8A", "parentPublication": { "id": "proceedings/pacificvis/2016/1451/0", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532843", "title": "Visualization of the genus of knots", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532843/12OmNCdBDZg", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660073", "title": "Visualizing the tightening of knots", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660073/12OmNrJAdUQ", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1996/864/0/00568120", "title": "Untangling knots by stochastic energy optimization", "doi": null, "abstractUrl": "/proceedings-article/visual/1996/00568120/12OmNvkpl7H", "parentPublication": { "id": "proceedings/visual/1996/864/0", "title": "Proceedings of Seventh Annual IEEE Visualization '96", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740118", "title": "A distributed algorithm for the detection of local cycles and knots", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740118/12OmNxWcHfa", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2005/9462/0/01532844", "title": "Visualizing the tightening of knots", "doi": null, "abstractUrl": "/proceedings-article/vis/2005/01532844/12OmNyRPgFh", "parentPublication": { "id": "proceedings/vis/2005/9462/0", "title": "IEEE Visualization 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660072", "title": "Visualization of the Genus of Knots", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660072/12OmNySosMr", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1997/03/v0262", "title": "Physically-Based Stochastic Simplification of Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/1997/03/v0262/13rRUwInvAQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622560", "title": "Untangling Mathematical Knots with Simulated Annealing and Opposition-Based Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622560/17D45Wuc327", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216595", "title": "A Suggestive Interface for Untangling Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216595/1nJsMuACwtG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwWorB", "title": "Proceedings of Seventh Annual IEEE Visualization '96", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNvkpl7H", "doi": "10.1109/VISUAL.1996.568120", "title": "Untangling knots by stochastic energy optimization", "normalizedTitle": "Untangling knots by stochastic energy optimization", "abstract": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "abstracts": [ { "abstractType": "Regular", "content": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A method for visualizing unknottedness of mathematical knots via energy optimization with simulated annealing is presented. In this method a potential field is formed around a tangled rope that causes it to self-repel. By allowing the rope to evolve in this field in search of an energy minimizing configuration we can determine the knot type of the initial configuration. In particular, it is natural to conjecture that if such a \"charged rope\" was not initially knotted, it will reach its minimal potential in a circular configuration, given a suitable energy functional. Because situations potentially arise in which the functional may not be strictly unimodal, we suggest it to be advantageous to use a robust stochastic optimization technique (simulated annealing), rather than a deterministic hill climber common in physically based approaches, to make sure that the evolving rope does not settle in a suboptimal configuration. The same method is applicable to simplifying arbitrary knots and links and for establishing knot equivalence. Aside from its theoretical appeal, the method promises to solve practical problems common in genetic research and polymer design.", "fno": "00568120", "keywords": [ "Data Visualisation", "Knot Untangling", "Stochastic Energy Optimization", "Unknottedness Visualization", "Mathematical Knots", "Simulated Annealing", "Potential Field", "Tangled Rope", "Energy Minimizing Configuration", "Knot Type", "Circular Configuration", "Energy Functional", "Robust Stochastic Optimization Technique", "Evolving Rope", "Suboptimal Configuration", "Arbitrary Knots", "Knot Equivalence", "Genetic Research", "Polymer Design", "Stochastic Processes", "Visualization", "Polynomials", "Laboratories", "Mathematics", "Radiology", "Optimization Methods", "Simulated Annealing", "Robustness", "Genetics" ], "authors": [ { "affiliation": "Dept. of Electr. Eng. & Comput. Sci., Illinois Univ., Chicago, IL, USA", "fullName": "Milana Huang", "givenName": null, "surname": "Milana Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "R.P. Grzeszczuk", "givenName": "R.P.", "surname": "Grzeszczuk", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "L.H. Kauffman", "givenName": "L.H.", "surname": "Kauffman", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-01-01T00:00:00", "pubType": "proceedings", "pages": "279-286", "year": "1996", "issn": null, "isbn": "0-89791-864-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00568115", "articleId": "12OmNy49sLa", "__typename": "AdjacentArticleType" }, "next": { "fno": "00568122", "articleId": "12OmNwBjP5P", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1996/3673/0/36730279", "title": "Untangling Knots by Stochastic Energy Optimization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1996/36730279/12OmNARiM01", "parentPublication": { "id": "proceedings/ieee-vis/1996/3673/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/1/3304a496", "title": "Luminance Optimization in Closed Environments by Simulated Annealing", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304a496/12OmNBsLPb8", "parentPublication": { "id": "icnc/2008/3304/1", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2008/3493/0/3493a443", "title": "Simulated Annealing on Cubic Splines for Vectorizing Outlines of Generic Shapes", "doi": null, "abstractUrl": "/proceedings-article/sitis/2008/3493a443/12OmNqBtj0H", "parentPublication": { "id": "proceedings/sitis/2008/3493/0", "title": "2008 IEEE International Conference on Signal Image Technology and Internet Based Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isai/2016/1585/0/1585a576", "title": "An Annealing Stochastic Ranking Mechanism for Constrained Evolutionary Optimization", "doi": null, "abstractUrl": "/proceedings-article/isai/2016/1585a576/12OmNqJq4ye", "parentPublication": { "id": "proceedings/isai/2016/1585/0", "title": "2016 International Conference on Information System and Artificial Intelligence (ISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2010/4081/0/4081a117", "title": "Beam Pattern Optimization Using MVDR and Simulated Annealing", "doi": null, "abstractUrl": "/proceedings-article/sose/2010/4081a117/12OmNqzu6MS", "parentPublication": { "id": "proceedings/sose/2010/4081/0", "title": "2010 Fifth IEEE International Symposium on Service Oriented System Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1997/03/v0262", "title": "Physically-Based Stochastic Simplification of Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/1997/03/v0262/13rRUwInvAQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/09/07558244", "title": "Knot Optimization for Biharmonic B-splines on Manifold Triangle Meshes", "doi": null, "abstractUrl": "/journal/tg/2017/09/07558244/13rRUxly95G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622560", "title": "Untangling Mathematical Knots with Simulated Annealing and Opposition-Based Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622560/17D45Wuc327", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ateee/2021/2083/0/208300a087", "title": "Research on Control Method of Comfortable Lighting and Energy Saving Lighting", "doi": null, "abstractUrl": "/proceedings-article/ateee/2021/208300a087/1AH8sJ2dFCg", "parentPublication": { "id": "proceedings/ateee/2021/2083/0", "title": "2021 International Conference on Advanced Technology of Electrical Engineering and Energy (ATEEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216595", "title": "A Suggestive Interface for Untangling Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216595/1nJsMuACwtG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwncA2", "title": "Proceedings of 9th International Parallel Processing Symposium", "acronym": "ipps", "groupId": "1000538", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNxWcHfa", "doi": "10.1109/IPPS.1995.395923", "title": "A distributed algorithm for the detection of local cycles and knots", "normalizedTitle": "A distributed algorithm for the detection of local cycles and knots", "abstract": "The purpose of this paper is to present an efficient distributed cycle/knot detection, algorithm for general graphs which will determine whether a given node is a member of a knot or a cycle. This is relevant to an application such as parallel simulation in which (1) cycles and knots can arise frequently, (2) the size of the graph is very large and (3) it is necessary to know if a given node is in a cycle or a knot. The algorithm is based on a diffusing computation. It requires less communication cost than preceding algorithms and is the first algorithm capable of detecting both cycles and knots. The algorithm differs from the classical diffusing computation methods through its use of incomplete search messages to speed up the computation. The algorithm requires a total of at most 2m messages, where m is the number of links. This is compared to Chandy-Misra's algorithm (1982) which requires at least (3m+n), where n is a number of nodes and m is the number of links. The algorithm. Requires O(log(n)) bits of memory. Various applications for the cycle/knot detection algorithm are presented. In particular, we demonstrate its importance to deadlock detection to algorithms for parallel simulation which employ a blocking paradigm and a deadlock breaking technique known as TNE/DLTNE.", "abstracts": [ { "abstractType": "Regular", "content": "The purpose of this paper is to present an efficient distributed cycle/knot detection, algorithm for general graphs which will determine whether a given node is a member of a knot or a cycle. This is relevant to an application such as parallel simulation in which (1) cycles and knots can arise frequently, (2) the size of the graph is very large and (3) it is necessary to know if a given node is in a cycle or a knot. The algorithm is based on a diffusing computation. It requires less communication cost than preceding algorithms and is the first algorithm capable of detecting both cycles and knots. The algorithm differs from the classical diffusing computation methods through its use of incomplete search messages to speed up the computation. The algorithm requires a total of at most 2m messages, where m is the number of links. This is compared to Chandy-Misra's algorithm (1982) which requires at least (3m+n), where n is a number of nodes and m is the number of links. The algorithm. Requires O(log(n)) bits of memory. Various applications for the cycle/knot detection algorithm are presented. In particular, we demonstrate its importance to deadlock detection to algorithms for parallel simulation which employ a blocking paradigm and a deadlock breaking technique known as TNE/DLTNE.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The purpose of this paper is to present an efficient distributed cycle/knot detection, algorithm for general graphs which will determine whether a given node is a member of a knot or a cycle. This is relevant to an application such as parallel simulation in which (1) cycles and knots can arise frequently, (2) the size of the graph is very large and (3) it is necessary to know if a given node is in a cycle or a knot. The algorithm is based on a diffusing computation. It requires less communication cost than preceding algorithms and is the first algorithm capable of detecting both cycles and knots. The algorithm differs from the classical diffusing computation methods through its use of incomplete search messages to speed up the computation. The algorithm requires a total of at most 2m messages, where m is the number of links. This is compared to Chandy-Misra's algorithm (1982) which requires at least (3m+n), where n is a number of nodes and m is the number of links. The algorithm. Requires O(log(n)) bits of memory. Various applications for the cycle/knot detection algorithm are presented. In particular, we demonstrate its importance to deadlock detection to algorithms for parallel simulation which employ a blocking paradigm and a deadlock breaking technique known as TNE/DLTNE.", "fno": "70740118", "keywords": [ "Distributed Algorithms Concurrency Control Graph Theory Distributed Algorithm Cycles Knots 2 M Messages Speed Up Diffusing Computation Deadlock Detection Parallel Simulation Blocking Paradigm Deadlock Breaking" ], "authors": [ { "affiliation": "Sch. of Comput. Sci., McGill Univ., Montreal, Que., Canada", "fullName": "A. Boukerche", "givenName": "A.", "surname": "Boukerche", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Comput. Sci., McGill Univ., Montreal, Que., Canada", "fullName": "C. Tropper", "givenName": "C.", "surname": "Tropper", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipps", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-04-01T00:00:00", "pubType": "proceedings", "pages": "118", "year": "1995", "issn": "1063-7133", "isbn": "0-8186-7074-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "70740113", "articleId": "12OmNx7G5Uh", "__typename": "AdjacentArticleType" }, "next": { "fno": "70740130", "articleId": "12OmNyKa63D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisB", "title": "2018 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Wuc327", "doi": "10.1109/BigData.2018.8622560", "title": "Untangling Mathematical Knots with Simulated Annealing and Opposition-Based Learning", "normalizedTitle": "Untangling Mathematical Knots with Simulated Annealing and Opposition-Based Learning", "abstract": "The fundamental problem in knot theory is to determine whether a given knot is an unknot. Solving such problem with existing computational algorithms or heuristic methods still remains challenging. In this paper we describe a hybrid algorithm that employs simulated annealing (SA) algorithm and opposition-based learning strategy to simplify and accelerate the simulation of mathematical knot relaxation. In our work, mathematical knots are modeled as closed node-link diagrams with energies charged at each node. A mathematical force model with adaptive step sizes is incorporated into SA for new individual generation. One elementary move with a descending number of nodes is included to prune the conformation and reduce the redundant information following the isotopy consistency. However, the force-directed model may be trapped to a local energy minimum. To overcome such intrinsic limitation, we adopt an opposition force based learning strategy to tackle this problem. With a flexible neighborhood and the instructive disturbance information, the knot geometry is able to untangle quickly and can reach the global minimum state without extra intervention. Illustrative test cases are presented, including three unknots and two classical knots with complex isotopy.", "abstracts": [ { "abstractType": "Regular", "content": "The fundamental problem in knot theory is to determine whether a given knot is an unknot. Solving such problem with existing computational algorithms or heuristic methods still remains challenging. In this paper we describe a hybrid algorithm that employs simulated annealing (SA) algorithm and opposition-based learning strategy to simplify and accelerate the simulation of mathematical knot relaxation. In our work, mathematical knots are modeled as closed node-link diagrams with energies charged at each node. A mathematical force model with adaptive step sizes is incorporated into SA for new individual generation. One elementary move with a descending number of nodes is included to prune the conformation and reduce the redundant information following the isotopy consistency. However, the force-directed model may be trapped to a local energy minimum. To overcome such intrinsic limitation, we adopt an opposition force based learning strategy to tackle this problem. With a flexible neighborhood and the instructive disturbance information, the knot geometry is able to untangle quickly and can reach the global minimum state without extra intervention. Illustrative test cases are presented, including three unknots and two classical knots with complex isotopy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The fundamental problem in knot theory is to determine whether a given knot is an unknot. Solving such problem with existing computational algorithms or heuristic methods still remains challenging. In this paper we describe a hybrid algorithm that employs simulated annealing (SA) algorithm and opposition-based learning strategy to simplify and accelerate the simulation of mathematical knot relaxation. In our work, mathematical knots are modeled as closed node-link diagrams with energies charged at each node. A mathematical force model with adaptive step sizes is incorporated into SA for new individual generation. One elementary move with a descending number of nodes is included to prune the conformation and reduce the redundant information following the isotopy consistency. However, the force-directed model may be trapped to a local energy minimum. To overcome such intrinsic limitation, we adopt an opposition force based learning strategy to tackle this problem. With a flexible neighborhood and the instructive disturbance information, the knot geometry is able to untangle quickly and can reach the global minimum state without extra intervention. Illustrative test cases are presented, including three unknots and two classical knots with complex isotopy.", "fno": "08622560", "keywords": [ "Knot Equivalence", "Simulated Annealing", "Opposition Based Learning" ], "authors": [ { "affiliation": "Dept. of Comp Eng. & Comp Sci., Speed School of Engineering University of Lousiville, Louisville, USA", "fullName": "Juan Lin", "givenName": "Juan", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp Eng. & Comp Sci., Speed School of Engineering University of Lousiville, Louisville, USA", "fullName": "Hui Zhang", "givenName": "Hui", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "4245-4253", "year": "2018", "issn": null, "isbn": "978-1-5386-5035-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08622202", "articleId": "17D45WIXbOQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08622085", "articleId": "17D45Xh13vu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1996/3673/0/36730279", "title": "Untangling Knots by Stochastic Energy Optimization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1996/36730279/12OmNARiM01", "parentPublication": { "id": "proceedings/ieee-vis/1996/3673/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2016/1451/0/07465247", "title": "Visualizing knots and braids with touchable 3D manipulatives", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2016/07465247/12OmNAXxX8A", "parentPublication": { "id": "proceedings/pacificvis/2016/1451/0", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532843", "title": "Visualization of the genus of knots", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532843/12OmNCdBDZg", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1996/864/0/00568120", "title": "Untangling knots by stochastic energy optimization", "doi": null, "abstractUrl": "/proceedings-article/visual/1996/00568120/12OmNvkpl7H", "parentPublication": { "id": "proceedings/visual/1996/864/0", "title": "Proceedings of Seventh Annual IEEE Visualization '96", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740118", "title": "A distributed algorithm for the detection of local cycles and knots", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740118/12OmNxWcHfa", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660072", "title": "Visualization of the Genus of Knots", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660072/12OmNySosMr", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1997/03/v0262", "title": "Physically-Based Stochastic Simplification of Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/1997/03/v0262/13rRUwInvAQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/1998/08/l0748", "title": "A Distributed Graph Algorithm for the Detection of Local Cycles and Knots", "doi": null, "abstractUrl": "/journal/td/1998/08/l0748/13rRUyuNsF3", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216595", "title": "A Suggestive Interface for Untangling Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216595/1nJsMuACwtG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700d891", "title": "Ellipse Detection and Localization with Applications to Knots in Sawn Lumber Images", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700d891/1uqGoOOVpv2", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJrJB4UCbu", "doi": "10.1109/BigData47090.2019.9006309", "title": "Parallelized Topological Relaxation Algorithm", "normalizedTitle": "Parallelized Topological Relaxation Algorithm", "abstract": "Geometric problems of interest to mathematical visualization applications involve changing structures, such as the moves that transform one knot into an equivalent knot. In this paper, we describe mathematical entities (curves and surfaces) as link-node graphs, and make use of energy-driven relaxation algorithms to optimize their geometric shapes by moving knots and surfaces to their simplified equivalence. Furthermore, we design and conFigure parallel functional units in the relaxation algorithms to accelerate the computation these mathematical deformations require. Results show that we can achieve significant performance optimization via the proposed threading model and level of parallelization.", "abstracts": [ { "abstractType": "Regular", "content": "Geometric problems of interest to mathematical visualization applications involve changing structures, such as the moves that transform one knot into an equivalent knot. In this paper, we describe mathematical entities (curves and surfaces) as link-node graphs, and make use of energy-driven relaxation algorithms to optimize their geometric shapes by moving knots and surfaces to their simplified equivalence. Furthermore, we design and conFigure parallel functional units in the relaxation algorithms to accelerate the computation these mathematical deformations require. Results show that we can achieve significant performance optimization via the proposed threading model and level of parallelization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geometric problems of interest to mathematical visualization applications involve changing structures, such as the moves that transform one knot into an equivalent knot. In this paper, we describe mathematical entities (curves and surfaces) as link-node graphs, and make use of energy-driven relaxation algorithms to optimize their geometric shapes by moving knots and surfaces to their simplified equivalence. Furthermore, we design and conFigure parallel functional units in the relaxation algorithms to accelerate the computation these mathematical deformations require. Results show that we can achieve significant performance optimization via the proposed threading model and level of parallelization.", "fno": "09006309", "keywords": [ "Computational Geometry", "Data Visualisation", "Graph Theory", "Optimisation", "Parallel Programming", "Simplified Equivalence", "Performance Optimization", "Threading Model", "Parallelized Topological Relaxation Algorithm", "Mathematical Visualization Applications", "Equivalent Knot", "Link Node Graphs", "Energy Driven Relaxation Algorithms", "Geometric Shapes", "Force", "Three Dimensional Displays", "Task Analysis", "Instruction Sets", "Two Dimensional Displays", "Parallel Algorithms", "Time Complexity", "Mathematical Visualization", "Topological Relaxation", "Parallel Computing", "Performance Tuning", "Python" ], "authors": [ { "affiliation": "Indiana University,Bloomington,USA", "fullName": "Guangchen Ruan", "givenName": "Guangchen", "surname": "Ruan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Louisville,Louisville,USA", "fullName": "Hui Zhang", "givenName": "Hui", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "3406-3415", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006353", "articleId": "1hJssibkKLm", "__typename": "AdjacentArticleType" }, "next": { "fno": "09006311", "articleId": "1hJs2Tst5qE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/nicoint/2016/2305/0/2305a152", "title": "3D Simulator of a Rolling Baton on Cylindrical Surfaces", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a152/12OmNAWH9DN", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07759988", "title": "An efficient approach to find knot region in protein structure", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07759988/12OmNBpmDRm", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candar/2017/2087/0/2087a401", "title": "Synchronizing Parallel Geometric Algorithms on Multi-core Machines", "doi": null, "abstractUrl": "/proceedings-article/candar/2017/2087a401/12OmNCgJeaQ", "parentPublication": { "id": "proceedings/candar/2017/2087/0", "title": "2017 Fifth International Symposium on Computing and Networking (CANDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840864", "title": "Accelerating mathematical knot simulations with R on the web", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840864/12OmNvEhfYM", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a333", "title": "Tracking Deformable Surfaces That Undergo Topological Changes Using an RGB-D Camera", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a333/12OmNyugyRN", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156371", "title": "Adaptive particle relaxation for time surfaces", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156371/12OmNzJbR3z", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876027", "title": "Visualizing 2-dimensional Manifolds with Curve Handles in 4D", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876027/13rRUxly95D", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a901", "title": "Deformable Surface Tracking by Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a901/1hQqlPMirWU", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216595", "title": "A Suggestive Interface for Untangling Mathematical Knots", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216595/1nJsMuACwtG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09224154", "title": "Mode Surfaces of Symmetric Tensor Fields: Topological Analysis and Seamless Extraction", "doi": null, "abstractUrl": "/journal/tg/2021/02/09224154/1nV63QG11le", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrNh0vw", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNx3q73A", "doi": "10.1109/ICPR.2014.759", "title": "An Evaluation of the Faster STORM Method for Super-resolution Microscopy", "normalizedTitle": "An Evaluation of the Faster STORM Method for Super-resolution Microscopy", "abstract": "Development of new stochastic super-resolution methods together with fluorescence microscopy imaging enables visualization of biological processes at increasing spatial and temporal resolution. Quantitative evaluation of such imaging experiments call for computational analysis methods that localize the signals with high precision and recall. Furthermore, it is desirable that the methods are fast and possible to parallelize so that the ever increasing amounts of collected data can be handled in an efficient way. We herein address signal detection in super-resolution microscopy by approaches based on compressed sensing. We describe how a previously published approach can be parallelized, reducing processing time at least four times. We also evaluate the effect of a greedy optimization approach on signal recovery at high noise and molecule density. Furthermore, our evaluation reveals how previously published compressed sensing algorithms have a performance that degrades to that of a random signal detector at high molecule density. Finally, we show the approximation of the imaging system's point spread function affects recall and precision of signal detection, illustrating the importance of parameter optimization. We evaluate the methods on synthetic data with varying signal to noise ratio and increasing molecular density, and visualize performance on real super-resolution microscopy data from a time-lapse sequence of living cells.", "abstracts": [ { "abstractType": "Regular", "content": "Development of new stochastic super-resolution methods together with fluorescence microscopy imaging enables visualization of biological processes at increasing spatial and temporal resolution. Quantitative evaluation of such imaging experiments call for computational analysis methods that localize the signals with high precision and recall. Furthermore, it is desirable that the methods are fast and possible to parallelize so that the ever increasing amounts of collected data can be handled in an efficient way. We herein address signal detection in super-resolution microscopy by approaches based on compressed sensing. We describe how a previously published approach can be parallelized, reducing processing time at least four times. We also evaluate the effect of a greedy optimization approach on signal recovery at high noise and molecule density. Furthermore, our evaluation reveals how previously published compressed sensing algorithms have a performance that degrades to that of a random signal detector at high molecule density. Finally, we show the approximation of the imaging system's point spread function affects recall and precision of signal detection, illustrating the importance of parameter optimization. We evaluate the methods on synthetic data with varying signal to noise ratio and increasing molecular density, and visualize performance on real super-resolution microscopy data from a time-lapse sequence of living cells.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Development of new stochastic super-resolution methods together with fluorescence microscopy imaging enables visualization of biological processes at increasing spatial and temporal resolution. Quantitative evaluation of such imaging experiments call for computational analysis methods that localize the signals with high precision and recall. Furthermore, it is desirable that the methods are fast and possible to parallelize so that the ever increasing amounts of collected data can be handled in an efficient way. We herein address signal detection in super-resolution microscopy by approaches based on compressed sensing. We describe how a previously published approach can be parallelized, reducing processing time at least four times. We also evaluate the effect of a greedy optimization approach on signal recovery at high noise and molecule density. Furthermore, our evaluation reveals how previously published compressed sensing algorithms have a performance that degrades to that of a random signal detector at high molecule density. Finally, we show the approximation of the imaging system's point spread function affects recall and precision of signal detection, illustrating the importance of parameter optimization. We evaluate the methods on synthetic data with varying signal to noise ratio and increasing molecular density, and visualize performance on real super-resolution microscopy data from a time-lapse sequence of living cells.", "fno": "5209e435", "keywords": [ "Storms", "Signal To Noise Ratio", "Signal Resolution", "Microscopy", "Spatial Resolution", "Live Cell Imaging", "Super Resolution Microscopy", "Compressed Sensing", "High Density Images" ], "authors": [ { "affiliation": null, "fullName": "Omer Ishaq", "givenName": "Omer", "surname": "Ishaq", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Johan Elf", "givenName": "Johan", "surname": "Elf", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carolina Wahlby", "givenName": "Carolina", "surname": "Wahlby", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "4435-4440", "year": "2014", "issn": "1051-4651", "isbn": "978-1-4799-5209-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5209e429", "articleId": "12OmNqzcvSu", "__typename": "AdjacentArticleType" }, "next": { "fno": "5209e441", "articleId": "12OmNwG90fH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2013/3022/0/3022a178", "title": "Super-Resolution 3D Reconstruction of Thick Biological Samples: A Computer Vision Perspective", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2013/3022a178/12OmNBO3Kgz", "parentPublication": { "id": "proceedings/iccvw/2013/3022/0", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458116", "title": "Bspline based Super-Resolution Construction of Textured Images", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458116/12OmNqIzh9t", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733b084", "title": "Multi-Resolution Data Fusion for Super-Resolution Electron Microscopy", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b084/12OmNqNXEsL", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2015/8146/0/07340509", "title": "The effect of dictionary learning algorithms on super-resolution hyperspectral reconstruction", "doi": null, "abstractUrl": "/proceedings-article/icat/2015/07340509/12OmNwvDQvU", "parentPublication": { "id": "proceedings/icat/2015/8146/0", "title": "2015 XXV International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c327", "title": "Resolution-Enhanced Lensless Color Shadow Imaging Microscopy Based on Large Field-of-View Submicron-Pixel Imaging Sensors", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c327/17D45Wc1IKe", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b448", "title": "Deep Super Resolution for Recovering Physiological Information from Videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b448/17D45Xq6dzp", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2019/3263/0/08747339", "title": "Data-Driven Design for Fourier Ptychographic Microscopy", "doi": null, "abstractUrl": "/proceedings-article/iccp/2019/08747339/1bcJxd7LNWo", "parentPublication": { "id": "proceedings/iccp/2019/3263/0", "title": "2019 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2019/3263/0/08747334", "title": "STORM: Super-resolving Transients by OveRsampled Measurements", "doi": null, "abstractUrl": "/proceedings-article/iccp/2019/08747334/1bcJxs5oV1e", "parentPublication": { "id": "proceedings/iccp/2019/3263/0", "title": "2019 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c433", "title": "Kernel Modeling Super-Resolution on Real Low-Resolution Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c433/1hQqxkiAwjC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a569", "title": "Video-rate acquisition fluorescence microscopy via generative adversarial networks", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a569/1pBMo7sHayk", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC19", "title": "SC Conference", "acronym": "sc", "groupId": "1000729", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNxcvh7f", "doi": "10.1109/SC.2012.26", "title": "Byte-precision level of detail processing for variable precision analytics", "normalizedTitle": "Byte-precision level of detail processing for variable precision analytics", "abstract": "I/O bottlenecks in HPC applications are becoming a more pressing problem as compute capabilities continue to outpace I/O capabilities. While double-precision simulation data often must be stored losslessly, the loss of some of the fractional component may introduce acceptably small errors to many types of scientific analyses. Given this observation, we develop a precision level of detail (APLOD) library, which partitions double-precision datasets along user-defined byte boundaries. APLOD parameterizes the analysis accuracy-I/O performance tradeoff, bounds maximum relative error, maintains I/O access patterns compared to full precision, and operates with low overhead. Using ADIOS as an I/O use-case, we show proportional reduction in disk access time to the degree of precision. Finally, we show the effects of partial precision analysis on accuracy for operations such as k-means and Fourier analysis, finding a strong applicability for the use of varying degrees of precision to reduce the cost of analyzing extreme-scale data.", "abstracts": [ { "abstractType": "Regular", "content": "I/O bottlenecks in HPC applications are becoming a more pressing problem as compute capabilities continue to outpace I/O capabilities. While double-precision simulation data often must be stored losslessly, the loss of some of the fractional component may introduce acceptably small errors to many types of scientific analyses. Given this observation, we develop a precision level of detail (APLOD) library, which partitions double-precision datasets along user-defined byte boundaries. APLOD parameterizes the analysis accuracy-I/O performance tradeoff, bounds maximum relative error, maintains I/O access patterns compared to full precision, and operates with low overhead. Using ADIOS as an I/O use-case, we show proportional reduction in disk access time to the degree of precision. Finally, we show the effects of partial precision analysis on accuracy for operations such as k-means and Fourier analysis, finding a strong applicability for the use of varying degrees of precision to reduce the cost of analyzing extreme-scale data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "I/O bottlenecks in HPC applications are becoming a more pressing problem as compute capabilities continue to outpace I/O capabilities. While double-precision simulation data often must be stored losslessly, the loss of some of the fractional component may introduce acceptably small errors to many types of scientific analyses. Given this observation, we develop a precision level of detail (APLOD) library, which partitions double-precision datasets along user-defined byte boundaries. APLOD parameterizes the analysis accuracy-I/O performance tradeoff, bounds maximum relative error, maintains I/O access patterns compared to full precision, and operates with low overhead. Using ADIOS as an I/O use-case, we show proportional reduction in disk access time to the degree of precision. Finally, we show the effects of partial precision analysis on accuracy for operations such as k-means and Fourier analysis, finding a strong applicability for the use of varying degrees of precision to reduce the cost of analyzing extreme-scale data.", "fno": "1000a088", "keywords": [ "Multiresolution Analysis", "Accuracy", "Wavelet Transforms", "Vectors", "Layout", "Context" ], "authors": [ { "affiliation": null, "fullName": "John Jenkins", "givenName": "John", "surname": "Jenkins", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eric R. Schendel", "givenName": "Eric R.", "surname": "Schendel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sriram Lakshminarasimhan", "givenName": "Sriram", "surname": "Lakshminarasimhan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David A. Boyuka", "givenName": "David A.", "surname": "Boyuka", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Terry Rogers", "givenName": "Terry", "surname": "Rogers", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stephane Ethier", "givenName": "Stephane", "surname": "Ethier", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Robert Ross", "givenName": "Robert", "surname": "Ross", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Scott Klasky", "givenName": "Scott", "surname": "Klasky", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nagiza F. Samatova", "givenName": "Nagiza F.", "surname": "Samatova", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "1-11", "year": "2012", "issn": "2167-4329", "isbn": "978-1-4673-0805-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1000a087", "articleId": "12OmNBlFQXr", "__typename": "AdjacentArticleType" }, "next": { "fno": "1000a089", "articleId": "12OmNAY79dw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdpsw/2012/4676/0/4676b378", "title": "Implementation and Evaluation of Triple Precision BLAS Subroutines on GPUs", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2012/4676b378/12OmNBqMDgo", "parentPublication": { "id": "proceedings/ipdpsw/2012/4676/0", "title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/1995/7089/0/70890222", "title": "Hardware Design and Arithmetic Algorithms for a Variable-Precision, Interval Arithmetic Coprocessor", "doi": null, "abstractUrl": "/proceedings-article/arith/1995/70890222/12OmNCu4nf9", "parentPublication": { "id": "proceedings/arith/1995/7089/0", "title": "Computer Arithmetic, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/1994/6517/0/00331799", "title": "A variable-precision interval arithmetic processor", "doi": null, "abstractUrl": "/proceedings-article/asap/1994/00331799/12OmNy4IF2m", "parentPublication": { "id": "proceedings/asap/1994/6517/0", "title": "Proceedings of IEEE International Conference on Application Specific Array Processors (ASSAP'94)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewdts/2014/7630/0/07027071", "title": "Resistance calibration method without external precision elements", "doi": null, "abstractUrl": "/proceedings-article/ewdts/2014/07027071/12OmNzVoBKd", "parentPublication": { "id": "proceedings/ewdts/2014/7630/0", "title": "2014 East-West Design & Test Symposium (EWDTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2000/05/t0387", "title": "A Family of Variable-Precision Interval Arithmetic Processors", "doi": null, "abstractUrl": "/journal/tc/2000/05/t0387/13rRUILLkuE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ia3/2018/0186/0/018600a061", "title": "High-Performance GPU Implementation of PageRank with Reduced Precision Based on Mantissa Segmentation", "doi": null, "abstractUrl": "/proceedings-article/ia3/2018/018600a061/18jXxMhlJBK", "parentPublication": { "id": "proceedings/ia3/2018/0186/0", "title": "2018 IEEE/ACM 8th Workshop on Irregular Applications: Architectures and Algorithms (IA3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2020/02/08873631", "title": "NV-Journaling: Locality-Aware Journaling Using Byte-Addressable Non-Volatile Memory", "doi": null, "abstractUrl": "/journal/tc/2020/02/08873631/1ecASUiYTGU", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/2020/7120/0/09154490", "title": "Variable Precision 16-Bit Floating-Point Vector Unit for Embedded Processors", "doi": null, "abstractUrl": "/proceedings-article/arith/2020/09154490/1lZE31WHFTy", "parentPublication": { "id": "proceedings/arith/2020/7120/0", "title": "2020 IEEE 27th Symposium on Computer Arithmetic (ARITH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a256", "title": "A Time-efficient and High-performance FPGA-based Continuous Floating-point Matrix Computing Accelerating Architecture for Control System", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a256/1oRiX3Pnb44", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/correctness/2021/2061/0/206100a001", "title": "Finding large Poisson polynomials using four-level variable precision", "doi": null, "abstractUrl": "/proceedings-article/correctness/2021/206100a001/1zzqkkZ7Xck", "parentPublication": { "id": "proceedings/correctness/2021/2061/0", "title": "2021 IEEE/ACM 5th International Workshop on Software Correctness for HPC Applications (Correctness)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8wTeX", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "acronym": "aici", "groupId": "1003069", "volume": "1", "displayVolume": "1", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNynsbuP", "doi": "10.1109/AICI.2010.85", "title": "An Empirical Study of Centering in Chinese Anaphoric Resolution", "normalizedTitle": "An Empirical Study of Centering in Chinese Anaphoric Resolution", "abstract": "We have examined the optimal setting of the basic centering parameters: utterance, ranking, and R1-pronouns. The results reveal that when utterance is defined as shorter chunks of text sequences, zero pronouns can be resolved better. Pronoun resolution is less sensitive to the setting of utterance. Among the ranking-affecting factors, the grammatical roles played by the discourse entities and their syntactic hierarchies have greater bearing on their discourse salience. The pervasive higher precision rate in zero pronoun resolution suggests that zero pronouns are more suitable to be chosen as R1-pronouns when Centering is applied to Chinese anaphora resolution.", "abstracts": [ { "abstractType": "Regular", "content": "We have examined the optimal setting of the basic centering parameters: utterance, ranking, and R1-pronouns. The results reveal that when utterance is defined as shorter chunks of text sequences, zero pronouns can be resolved better. Pronoun resolution is less sensitive to the setting of utterance. Among the ranking-affecting factors, the grammatical roles played by the discourse entities and their syntactic hierarchies have greater bearing on their discourse salience. The pervasive higher precision rate in zero pronoun resolution suggests that zero pronouns are more suitable to be chosen as R1-pronouns when Centering is applied to Chinese anaphora resolution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have examined the optimal setting of the basic centering parameters: utterance, ranking, and R1-pronouns. The results reveal that when utterance is defined as shorter chunks of text sequences, zero pronouns can be resolved better. Pronoun resolution is less sensitive to the setting of utterance. Among the ranking-affecting factors, the grammatical roles played by the discourse entities and their syntactic hierarchies have greater bearing on their discourse salience. The pervasive higher precision rate in zero pronoun resolution suggests that zero pronouns are more suitable to be chosen as R1-pronouns when Centering is applied to Chinese anaphora resolution.", "fno": "4225a373", "keywords": [ "NLP", "Centering Theory", "Chinese Anaphora Resolution" ], "authors": [ { "affiliation": null, "fullName": "Duan Manjuan", "givenName": "Duan", "surname": "Manjuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiang Ping", "givenName": "Jiang", "surname": "Ping", "__typename": "ArticleAuthorType" } ], "idPrefix": "aici", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "373-377", "year": "2010", "issn": null, "isbn": "978-0-7695-4225-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4225a369", "articleId": "12OmNrJ11vI", "__typename": "AdjacentArticleType" }, "next": { "fno": "4225a378", "articleId": "12OmNzlD9cA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iita/2009/3859/3/3859c466", "title": "Study on the Chinese Character Prototypes Based on Topological Theory", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859c466/12OmNAXxX34", "parentPublication": { "id": "proceedings/iita/2009/3859/3", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2012/4886/0/4886a049", "title": "Anaphora Resolution in Bangla Using Global Discourse Knowledge", "doi": null, "abstractUrl": "/proceedings-article/ialp/2012/4886a049/12OmNAolGIG", "parentPublication": { "id": "proceedings/ialp/2012/4886/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2012/4859/0/4859a250", "title": "Non-negative Matrix Factorisation-Based Verb Semantics for 3rd Person Pronoun Resolution", "doi": null, "abstractUrl": "/proceedings-article/icsc/2012/4859a250/12OmNB06la5", "parentPublication": { "id": "proceedings/icsc/2012/4859/0", "title": "2012 IEEE Sixth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2011/4554/0/4554a085", "title": "Research of Event Pronoun Resolution", "doi": null, "abstractUrl": "/proceedings-article/ialp/2011/4554a085/12OmNBJNL03", "parentPublication": { "id": "proceedings/ialp/2011/4554/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2011/4584/0/4584a487", "title": "The Application of Graph Theory in Old Chinese Phonology Study", "doi": null, "abstractUrl": "/proceedings-article/cis/2011/4584a487/12OmNBp52vi", "parentPublication": { "id": "proceedings/cis/2011/4584/0", "title": "2011 Seventh International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a731", "title": "Chinese Pronominal Anaphora Resolution Based on Conditional Random Fields", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a731/12OmNCxtyNG", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a455", "title": "An Empirical Evaluation on Online Chinese Handwriting Databases", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a455/12OmNvjQ8YO", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2011/4515/0/4515a156", "title": "Empirical Study of Chinese Text Similarity Computation Based on Machine Translation", "doi": null, "abstractUrl": "/proceedings-article/skg/2011/4515a156/12OmNvqmUJg", "parentPublication": { "id": "proceedings/skg/2011/4515/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2011/4554/0/4554a181", "title": "Character-Level System Combination: An Empirical Study for English-to-Chinese Spoken Language Translation", "doi": null, "abstractUrl": "/proceedings-article/ialp/2011/4554a181/12OmNyuPLiw", "parentPublication": { "id": "proceedings/ialp/2011/4554/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470371", "title": "An empirical study on knee arthritis remedies", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470371/12OmNzTH0Sp", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WrVg4k", "doi": "10.1109/CVPR.2018.00266", "title": "Unsupervised Sparse Dirichlet-Net for Hyperspectral Image Super-Resolution", "normalizedTitle": "Unsupervised Sparse Dirichlet-Net for Hyperspectral Image Super-Resolution", "abstract": "In many computer vision applications, obtaining images of high resolution in both the spatial and spectral domains are equally important. However, due to hardware limitations, one can only expect to acquire images of high resolution in either the spatial or spectral domains. This paper focuses on hyperspectral image super-resolution (HSI-SR), where a hyperspectral image (HSI) with low spatial resolution (LR) but high spectral resolution is fused with a multispectral image (MSI) with high spatial resolution (HR) but low spectral resolution to obtain HR HSI. Existing deep learning-based solutions are all supervised that would need a large training set and the availability of HR HSI, which is unrealistic. Here, we make the first attempt to solving the HSI-SR problem using an unsupervised encoder-decoder architecture that carries the following uniquenesses. First, it is composed of two encoder-decoder networks, coupled through a shared decoder, in order to preserve the rich spectral information from the HSI network. Second, the network encourages the representations from both modalities to follow a sparse Dirichlet distribution which naturally incorporates the two physical constraints of HSI and MSI. Third, the angular difference between representations are minimized in order to reduce the spectral distortion. We refer to the proposed architecture as unsupervised Sparse Dirichlet-Net, or uSDN. Extensive experimental results demonstrate the superior performance of uSDN as compared to the state-of-the-art.", "abstracts": [ { "abstractType": "Regular", "content": "In many computer vision applications, obtaining images of high resolution in both the spatial and spectral domains are equally important. However, due to hardware limitations, one can only expect to acquire images of high resolution in either the spatial or spectral domains. This paper focuses on hyperspectral image super-resolution (HSI-SR), where a hyperspectral image (HSI) with low spatial resolution (LR) but high spectral resolution is fused with a multispectral image (MSI) with high spatial resolution (HR) but low spectral resolution to obtain HR HSI. Existing deep learning-based solutions are all supervised that would need a large training set and the availability of HR HSI, which is unrealistic. Here, we make the first attempt to solving the HSI-SR problem using an unsupervised encoder-decoder architecture that carries the following uniquenesses. First, it is composed of two encoder-decoder networks, coupled through a shared decoder, in order to preserve the rich spectral information from the HSI network. Second, the network encourages the representations from both modalities to follow a sparse Dirichlet distribution which naturally incorporates the two physical constraints of HSI and MSI. Third, the angular difference between representations are minimized in order to reduce the spectral distortion. We refer to the proposed architecture as unsupervised Sparse Dirichlet-Net, or uSDN. Extensive experimental results demonstrate the superior performance of uSDN as compared to the state-of-the-art.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In many computer vision applications, obtaining images of high resolution in both the spatial and spectral domains are equally important. However, due to hardware limitations, one can only expect to acquire images of high resolution in either the spatial or spectral domains. This paper focuses on hyperspectral image super-resolution (HSI-SR), where a hyperspectral image (HSI) with low spatial resolution (LR) but high spectral resolution is fused with a multispectral image (MSI) with high spatial resolution (HR) but low spectral resolution to obtain HR HSI. Existing deep learning-based solutions are all supervised that would need a large training set and the availability of HR HSI, which is unrealistic. Here, we make the first attempt to solving the HSI-SR problem using an unsupervised encoder-decoder architecture that carries the following uniquenesses. First, it is composed of two encoder-decoder networks, coupled through a shared decoder, in order to preserve the rich spectral information from the HSI network. Second, the network encourages the representations from both modalities to follow a sparse Dirichlet distribution which naturally incorporates the two physical constraints of HSI and MSI. Third, the angular difference between representations are minimized in order to reduce the spectral distortion. We refer to the proposed architecture as unsupervised Sparse Dirichlet-Net, or uSDN. Extensive experimental results demonstrate the superior performance of uSDN as compared to the state-of-the-art.", "fno": "642000c511", "keywords": [ "Computer Vision", "Geophysical Image Processing", "Hyperspectral Imaging", "Image Coding", "Image Resolution", "Learning Artificial Intelligence", "Hyperspectral Image Super Resolution", "Spatial Domains", "Spectral Domains", "Multispectral Image", "HR HSI", "HSI SR Problem", "Unsupervised Encoder Decoder Architecture", "HSI Network", "Spectral Distortion", "Unsupervised Sparse Dirichlet Net", "Spatial Resolution", "Spectral Resolution", "Computer Vision Applications", "Deep Learning Based Solutions", "Spatial Resolution", "Decoding", "Hyperspectral Imaging", "Distortion", "Sensors" ], "authors": [ { "affiliation": null, "fullName": "Ying Qu", "givenName": "Ying", "surname": "Qu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hairong Qi", "givenName": "Hairong", "surname": "Qi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chiman Kwan", "givenName": "Chiman", "surname": "Kwan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "2511-2520", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000c502", "articleId": "17D45W2WyzE", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000c521", "articleId": "17D45WZZ7ER", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457d862", "title": "Hyperspectral Image Super-Resolution via Non-local Sparse Tensor Factorization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d862/12OmNqIQSfz", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d586", "title": "Hyperspectral Super-Resolution by Coupled Spectral Unmixing", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d586/12OmNxbmSDc", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2018/5321/0/08499097", "title": "Single Hyperspectral Image Super-Resolution with Grouped Deep Recursive Residual Network", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499097/17D45WrVg3R", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a277", "title": "Hyperspectral Image High-resolution via Subspace-Based Non-Convex Arctangent-Rank Regularization", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a277/1AUpBzVbwJ2", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/09992028", "title": "A Deep Framework for Hyperspectral Image Fusion between Different Satellites", "doi": null, "abstractUrl": "/journal/tp/5555/01/09992028/1Jevycfh6Jq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1653", "title": "Hyperspectral Image Super-Resolution With Optimized RGB Guidance", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1653/1gyrGMCjcgE", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i558", "title": "Hyperspectral Image Reconstruction Using Deep External and Internal Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i558/1hVlNogNnH2", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300e330", "title": "Multi-Level and Multi-Scale Spatial and Spectral Fusion CNN for Hyperspectral Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300e330/1i5mnPdVCVO", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102881", "title": "Unsupervised Deep Hyperspectral Super-Resolution With Unregistered Images", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102881/1kwriBTcZHO", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800d070", "title": "Unsupervised Adaptation Learning for Hyperspectral Imagery Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800d070/1m3o0GOLeTe", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iTvczdcyc0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "8972688", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iTvlh1qLGU", "doi": "10.1109/CVPRW.2019.00236", "title": "An Epipolar Volume Autoencoder With Adversarial Loss for Deep Light Field Super-Resolution", "normalizedTitle": "An Epipolar Volume Autoencoder With Adversarial Loss for Deep Light Field Super-Resolution", "abstract": "When capturing a light field of a scene, one typically faces a trade-off between more spatial or more angular resolution. Fortunately, light fields are also a rich source of information for solving the problem of super-resolution. Contrary to single image approaches, where high-frequency content has to be hallucinated to be the most likely source of the downscaled version, sub-aperture views from the light field can help with an actual reconstruction of those details that have been removed by downsampling. In this paper, we propose a three-dimensional generative adversarial autoencoder network to recover the high-resolution light field from a low-resolution light field with a sparse set of viewpoints. We require only three views along both horizontal and vertical axis to increase angular resolution by a factor of three while at the same time increasing spatial resolution by a factor of either two or four in each direction, respectively.", "abstracts": [ { "abstractType": "Regular", "content": "When capturing a light field of a scene, one typically faces a trade-off between more spatial or more angular resolution. Fortunately, light fields are also a rich source of information for solving the problem of super-resolution. Contrary to single image approaches, where high-frequency content has to be hallucinated to be the most likely source of the downscaled version, sub-aperture views from the light field can help with an actual reconstruction of those details that have been removed by downsampling. In this paper, we propose a three-dimensional generative adversarial autoencoder network to recover the high-resolution light field from a low-resolution light field with a sparse set of viewpoints. We require only three views along both horizontal and vertical axis to increase angular resolution by a factor of three while at the same time increasing spatial resolution by a factor of either two or four in each direction, respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When capturing a light field of a scene, one typically faces a trade-off between more spatial or more angular resolution. Fortunately, light fields are also a rich source of information for solving the problem of super-resolution. Contrary to single image approaches, where high-frequency content has to be hallucinated to be the most likely source of the downscaled version, sub-aperture views from the light field can help with an actual reconstruction of those details that have been removed by downsampling. In this paper, we propose a three-dimensional generative adversarial autoencoder network to recover the high-resolution light field from a low-resolution light field with a sparse set of viewpoints. We require only three views along both horizontal and vertical axis to increase angular resolution by a factor of three while at the same time increasing spatial resolution by a factor of either two or four in each direction, respectively.", "fno": "250600b853", "keywords": [ "Image Reconstruction", "Image Resolution", "Image Sampling", "Image Sensors", "Neural Nets", "Angular Resolution", "Spatial Resolution", "Epipolar Volume Autoencoder", "Adversarial Loss", "Deep Light Field Super Resolution", "High Frequency Content", "Three Dimensional Generative Adversarial Autoencoder Network", "High Resolution Light Field", "Low Resolution Light Field", "Spatial Resolution", "Signal Resolution", "Cameras", "Decoding", "Image Reconstruction", "Inverse Problems" ], "authors": [ { "affiliation": "University of Konstanz, Germany", "fullName": "Minchen Zhu", "givenName": "Minchen", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz, Germany", "fullName": "Anna Alperovich", "givenName": "Anna", "surname": "Alperovich", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz, Germany", "fullName": "Ole Johannsen", "givenName": "Ole", "surname": "Johannsen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz, Germany", "fullName": "Antonin Sulc", "givenName": "Antonin", "surname": "Sulc", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz, Germany", "fullName": "Bastian Goldluecke", "givenName": "Bastian", "surname": "Goldluecke", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "1853-1861", "year": "2019", "issn": null, "isbn": "978-1-7281-2506-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250600b843", "articleId": "1iTvtmHJzWw", "__typename": "AdjacentArticleType" }, "next": { "fno": "250600b862", "articleId": "1iTvdNRsRS8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sitis/2016/5698/0/07907555", "title": "The Effect of Light Field Reconstruction and Angular Resolution Reduction on the Quality of Experience", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907555/12OmNB8TUh4", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733b277", "title": "Compressive Light Field Reconstructions Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b277/12OmNs0C9Cb", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a057", "title": "Learning a Deep Convolutional Network for Light-Field Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a057/12OmNyL0TyY", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/03/ttp2014030606", "title": "Variational Light Field Analysis for Disparity Estimation and Super-Resolution", "doi": null, "abstractUrl": "/journal/tp/2014/03/ttp2014030606/13rRUxC0SPN", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/05/08620368", "title": "Light Field Super-Resolution Using a Low-Rank Prior and Deep Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2020/05/08620368/17D45Wt3Exc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09716806", "title": "Disentangling Light Fields for Super-Resolution and Disparity Estimation", "doi": null, "abstractUrl": "/journal/tp/2023/01/09716806/1B5WzcrxgIM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09798876", "title": "Deep Light Field Spatial Super-Resolution Using Heterogeneous Imaging", "doi": null, "abstractUrl": "/journal/tg/5555/01/09798876/1Eho8QXQucg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2022/7218/0/09859373", "title": "LFC-SASR: Light Field Coding Using Spatial and Angular Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859373/1G4F0ndbVoQ", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/08924770", "title": "Revisiting Spatio-Angular Trade-off in Light Field Cameras and Extended Applications in Super-Resolution", "doi": null, "abstractUrl": "/journal/tg/2021/06/08924770/1fvZlX1pNU4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b804", "title": "Light Field Super-Resolution: A Benchmark", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b804/1iTvo7kjJFm", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ikdZO7kJFe", "title": "2019 15th International Conference on eScience (eScience)", "acronym": "escience", "groupId": "1001511", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ike4M9w3e0", "doi": "10.1109/eScience.2019.00008", "title": "SOMOSPIE: A Modular SOil MOisture SPatial Inference Engine Based on Data-Driven Decisions", "normalizedTitle": "SOMOSPIE: A Modular SOil MOisture SPatial Inference Engine Based on Data-Driven Decisions", "abstract": "The current availability of soil moisture data over large areas comes from satellite remote sensing technologies (i.e., radar-based systems), but these data have coarse resolution and often exhibit large spatial information gaps. Where data are too coarse or sparse for a given need (e.g., precision farming), one can leverage machine-learning techniques coupled with other sources of environmental information (e.g., topography) to generate gap-free information at a finer spatial resolution (i.e., increased granularity). To this end, we develop a spatial inference engine consisting of modular stages for processing spatial environmental data, generating predictions with machine-learning techniques, and analyzing these predictions. We demonstrate the functionality of this approach and the effects of data processing choices via multiple prediction maps over a United States ecological region with a highly diverse soil moisture profile (i.e., the Middle Atlantic Coastal Plains). The relevance of our work derives from a pressing need to improve the spatial representation of soil moisture for applications in environmental sciences (e.g., ecological niche modeling, carbon monitoring systems, and other Earth system models) and precision farming (e.g., optimizing irrigation practices and other land management decisions).", "abstracts": [ { "abstractType": "Regular", "content": "The current availability of soil moisture data over large areas comes from satellite remote sensing technologies (i.e., radar-based systems), but these data have coarse resolution and often exhibit large spatial information gaps. Where data are too coarse or sparse for a given need (e.g., precision farming), one can leverage machine-learning techniques coupled with other sources of environmental information (e.g., topography) to generate gap-free information at a finer spatial resolution (i.e., increased granularity). To this end, we develop a spatial inference engine consisting of modular stages for processing spatial environmental data, generating predictions with machine-learning techniques, and analyzing these predictions. We demonstrate the functionality of this approach and the effects of data processing choices via multiple prediction maps over a United States ecological region with a highly diverse soil moisture profile (i.e., the Middle Atlantic Coastal Plains). The relevance of our work derives from a pressing need to improve the spatial representation of soil moisture for applications in environmental sciences (e.g., ecological niche modeling, carbon monitoring systems, and other Earth system models) and precision farming (e.g., optimizing irrigation practices and other land management decisions).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The current availability of soil moisture data over large areas comes from satellite remote sensing technologies (i.e., radar-based systems), but these data have coarse resolution and often exhibit large spatial information gaps. Where data are too coarse or sparse for a given need (e.g., precision farming), one can leverage machine-learning techniques coupled with other sources of environmental information (e.g., topography) to generate gap-free information at a finer spatial resolution (i.e., increased granularity). To this end, we develop a spatial inference engine consisting of modular stages for processing spatial environmental data, generating predictions with machine-learning techniques, and analyzing these predictions. We demonstrate the functionality of this approach and the effects of data processing choices via multiple prediction maps over a United States ecological region with a highly diverse soil moisture profile (i.e., the Middle Atlantic Coastal Plains). The relevance of our work derives from a pressing need to improve the spatial representation of soil moisture for applications in environmental sciences (e.g., ecological niche modeling, carbon monitoring systems, and other Earth system models) and precision farming (e.g., optimizing irrigation practices and other land management decisions).", "fno": "245100a001", "keywords": [ "Ecology", "Environmental Management", "Environmental Science Computing", "Geophysics Computing", "Inference Mechanisms", "Irrigation", "Learning Artificial Intelligence", "Moisture", "Remote Sensing", "Soil", "Environmental Sciences", "Earth System Models", "Data Driven Decisions", "Soil Moisture Data", "Satellite Remote Sensing Technologies", "Radar Based Systems", "Modular Soil Moisture Spatial Inference Engine", "Spatial Representation", "Highly Diverse Soil Moisture Profile", "United States Ecological Region", "Multiple Prediction Maps", "Spatial Environmental Data", "Modular Stages", "Finer Spatial Resolution", "Gap Free Information", "Environmental Information", "Machine Learning Techniques", "Precision Farming", "Spatial Information Gaps", "Coarse Resolution", "Soil Moisture", "Spatial Resolution", "Engines", "Data Models", "Satellites", "Machine Learning", "Soil Moisture", "Remote Sensing", "Machine Learning", "Data Driven Decisions" ], "authors": [ { "affiliation": "University of Tennessee", "fullName": "Danny Rorabaugh", "givenName": "Danny", "surname": "Rorabaugh", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Delaware", "fullName": "Mario Guevara", "givenName": "Mario", "surname": "Guevara", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Delaware", "fullName": "Ricardo Llamas", "givenName": "Ricardo", "surname": "Llamas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Delaware", "fullName": "Joy Kitson", "givenName": "Joy", "surname": "Kitson", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Delaware", "fullName": "Rodrigo Vargas", "givenName": "Rodrigo", "surname": "Vargas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee", "fullName": "Michela Taufer", "givenName": "Michela", "surname": "Taufer", "__typename": "ArticleAuthorType" } ], "idPrefix": "escience", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2019", "issn": null, "isbn": "978-1-7281-2451-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "245100z022", "articleId": "1ike52olfAQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "245100a011", "articleId": "1ike33ZP0e4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cso/2011/4335/0/4335b339", "title": "A Satellite Remote Sensing Monitoring Model for Soil Moisture Based on Artificial Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cso/2011/4335b339/12OmNASraYW", "parentPublication": { "id": "proceedings/cso/2011/4335/0", "title": "2011 Fourth International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipsn/2012/6469/0/06920949", "title": "In-situ soil moisture sensing: Measurement scheduling and estimation using compressive sensing", "doi": null, "abstractUrl": "/proceedings-article/ipsn/2012/06920949/12OmNBVIUwz", "parentPublication": { "id": "proceedings/ipsn/2012/6469/0", "title": "2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/1/3563a528", "title": "Validation of Two Soil Moisture Products from ERS Scatterometer Data over East China", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563a528/12OmNCvLXYE", "parentPublication": { "id": "proceedings/ettandgrs/2008/3563/1", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/1/3682a140", "title": "Effects of Climate Change on Soil Moisture over China from 1960-2006", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682a140/12OmNsbGvHH", "parentPublication": { "id": "proceedings/esiat/2009/3682/1", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2015/9957/0/07373988", "title": "Research on Soil Moisture Measurement Using Moisture Sensor", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2015/07373988/12OmNzlD9GW", "parentPublication": { "id": "proceedings/iiai-aai/2015/9957/0", "title": "2015 IIAI 4th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b356", "title": "Spatial Variability of Surface Soil Moisture in Semi-arid Region of Northern China", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b356/12OmNzlD9gf", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258536", "title": "Data analytics for modeling soil moisture patterns across united states ecoclimatic domains", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258536/17D45WIXbRZ", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/10061277", "title": "SoilTAG: Fine-Grained Soil Moisture Sensing Through Chipless Tags", "doi": null, "abstractUrl": "/journal/tm/5555/01/10061277/1LiKMcfHoeA", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2020/4199/0/09016572", "title": "Low-Cost Fog Computing Platform for Soil Moisture Management", "doi": null, "abstractUrl": "/proceedings-article/icoin/2020/09016572/1hQqRVE52TK", "parentPublication": { "id": "proceedings/icoin/2020/4199/0", "title": "2020 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a696", "title": "AMSR-E soil moisture inversion based on GRNN neural network", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a696/1rvCDb6bbLa", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyRg4ma", "title": "IEEE Symposium on Interactive Ray Tracing 2006", "acronym": "rt", "groupId": "1001330", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNBBzoiL", "doi": "10.1109/RT.2006.280208", "title": "Ray Tracing for the Movie `Cars'", "normalizedTitle": "Ray Tracing for the Movie `Cars'", "abstract": "This paper describes how we extended Pixar's RenderMan renderer with ray tracing abilities. In order to ray trace highly complex scenes we use multiresolution geometry and texture caches, and use ray differentials to determine the appropriate resolution. With this method we are able to efficiently ray trace scenes with much more geometry and texture data than there is main memory. Movie-quality rendering of scenes of such complexity had only previously been possible with pure scanline rendering algorithms. Adding ray tracing to the renderer enables many additional effects such as accurate reflections, detailed shadows, and ambient occlusion. The ray tracing functionality has been used in many recent movies, including Pixar's latest movie `Cars'. This paper also describes some of the practical ray tracing issues from the production of `Cars'", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes how we extended Pixar's RenderMan renderer with ray tracing abilities. In order to ray trace highly complex scenes we use multiresolution geometry and texture caches, and use ray differentials to determine the appropriate resolution. With this method we are able to efficiently ray trace scenes with much more geometry and texture data than there is main memory. Movie-quality rendering of scenes of such complexity had only previously been possible with pure scanline rendering algorithms. Adding ray tracing to the renderer enables many additional effects such as accurate reflections, detailed shadows, and ambient occlusion. The ray tracing functionality has been used in many recent movies, including Pixar's latest movie `Cars'. This paper also describes some of the practical ray tracing issues from the production of `Cars'", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes how we extended Pixar's RenderMan renderer with ray tracing abilities. In order to ray trace highly complex scenes we use multiresolution geometry and texture caches, and use ray differentials to determine the appropriate resolution. With this method we are able to efficiently ray trace scenes with much more geometry and texture data than there is main memory. Movie-quality rendering of scenes of such complexity had only previously been possible with pure scanline rendering algorithms. Adding ray tracing to the renderer enables many additional effects such as accurate reflections, detailed shadows, and ambient occlusion. The ray tracing functionality has been used in many recent movies, including Pixar's latest movie `Cars'. This paper also describes some of the practical ray tracing issues from the production of `Cars'", "fno": "04061539", "keywords": [ "Cache Storage", "Cinematography", "Computational Geometry", "Humanities", "Image Texture", "Ray Tracing", "Rendering Computer Graphics", "Ray Tracing", "Extended Pixar Render Man Renderer", "Multiresolution Geometry", "Texture Caches", "Movie Quality Rendering", "Scanline Rendering Algorithms", "Pixar Cars Movie", "Ray Tracing", "Motion Pictures", "Layout", "Rendering Computer Graphics", "Optical Reflection", "Geometry", "Production", "Testing", "Animation", "Tiles" ], "authors": [ { "affiliation": "Pixar Animation Studios. e-mail: per@pixar.com", "fullName": "Per H. Christensen", "givenName": "Per H.", "surname": "Christensen", "__typename": "ArticleAuthorType" }, { "affiliation": "Pixar Animation Studios. e-mail: jfong@pixar.com", "fullName": "Julian Fong", "givenName": "Julian", "surname": "Fong", "__typename": "ArticleAuthorType" }, { "affiliation": "Pixar Animation Studios. e-mail: dml@pixar.com", "fullName": "David M. Laur", "givenName": "David M.", "surname": "Laur", "__typename": "ArticleAuthorType" }, { "affiliation": "Pixar Animation Studios. e-mail: dana@pixar.com", "fullName": "Dana Batali", "givenName": "Dana", "surname": "Batali", "__typename": "ArticleAuthorType" } ], "idPrefix": "rt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-09-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2006", "issn": null, "isbn": "1-4244-0693-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04061538", "articleId": "12OmNzmtWu7", "__typename": "AdjacentArticleType" }, "next": { "fno": "04061532", "articleId": "12OmNAtaRXb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/rt/2008/2741/0/04634641", "title": "A straightforward CUDA implementation for interactive ray-tracing", "doi": null, "abstractUrl": "/proceedings-article/rt/2008/04634641/12OmNAY79ml", "parentPublication": { "id": "proceedings/rt/2008/2741/0", "title": "Symposium on Interactive Ray Tracing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910011", "title": "Distributed Interactive Ray Tracing of Dynamic Scenes", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910011/12OmNBO3KjK", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2008/2741/0/04634619", "title": "Large ray packets for real-time Whitted ray tracing", "doi": null, "abstractUrl": "/proceedings-article/rt/2008/04634619/12OmNwcCITG", "parentPublication": { "id": "proceedings/rt/2008/2741/0", "title": "Symposium on Interactive Ray Tracing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2005/9330/0/01500343", "title": "Ray tracing on the desktop: when and how?", "doi": null, "abstractUrl": "/proceedings-article/cgi/2005/01500343/12OmNyjccyJ", "parentPublication": { "id": "proceedings/cgi/2005/9330/0", "title": "Computer Graphics International 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2012/4725/0/4725a131", "title": "Real Time Ray Tracing for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/svr/2012/4725a131/12OmNzcPAGy", "parentPublication": { "id": "proceedings/svr/2012/4725/0", "title": "2012 14th Symposium on Virtual and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2006/0693/0/04061538", "title": "Ray Tracing for the Movie \"Car\"", "doi": null, "abstractUrl": "/proceedings-article/rt/2006/04061538/12OmNzmtWu7", "parentPublication": { "id": "proceedings/rt/2006/0693/0", "title": "IEEE Symposium on Interactive Ray Tracing 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2008/2741/0/04634652", "title": "A proposal for terminology related to ray tracing", "doi": null, "abstractUrl": "/proceedings-article/rt/2008/04634652/12OmNzxgHHn", "parentPublication": { "id": "proceedings/rt/2008/2741/0", "title": "Symposium on Interactive Ray Tracing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1988/02/mcg1988020060", "title": "Spacetime Ray Tracing for Animation", "doi": null, "abstractUrl": "/magazine/cg/1988/02/mcg1988020060/13rRUwInvD5", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2001/02/mcg2001020022", "title": "A Benchmark for Animated Ray Tracing", "doi": null, "abstractUrl": "/magazine/cg/2001/02/mcg2001020022/13rRUyp7u1i", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222372", "title": "Ray Tracing Structured AMR Data Using ExaBricks", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222372/1nTqdQ0THGw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbqkqYrug", "doi": "10.1109/WACV45572.2020.9093484", "title": "HistoNet: Predicting size histograms of object instances", "normalizedTitle": "HistoNet: Predicting size histograms of object instances", "abstract": "We propose to predict histograms of object sizes in crowded scenes directly without any explicit object instance segmentation. What makes this task challenging is the high density of objects (of the same category), which makes instance identification hard. Instead of explicitly segmenting object instances, we show that directly learning histograms of object sizes improves accuracy while using drastically less parameters. This is very useful for application scenarios where explicit, pixel-accurate instance segmentation is not needed, but there lies interest in the overall distribution of instance sizes. Our core applications are in biology, where we estimate the size distribution of soldier fly larvae, and medicine, where we estimate the size distribution of cancer cells as an intermediate step to calculate the tumor cellularity score. Given an image with hundreds of small object instances, we output the total count and the size histogram. We also provide a new data set for this task, the FlyLarvae data set, which consists of 11,000 larvae instances labeled pixel-wise. Our method results in an overall improvement in the count and size distribution prediction as compared to state-of-the-art instance segmentation method Mask R-CNN [11].", "abstracts": [ { "abstractType": "Regular", "content": "We propose to predict histograms of object sizes in crowded scenes directly without any explicit object instance segmentation. What makes this task challenging is the high density of objects (of the same category), which makes instance identification hard. Instead of explicitly segmenting object instances, we show that directly learning histograms of object sizes improves accuracy while using drastically less parameters. This is very useful for application scenarios where explicit, pixel-accurate instance segmentation is not needed, but there lies interest in the overall distribution of instance sizes. Our core applications are in biology, where we estimate the size distribution of soldier fly larvae, and medicine, where we estimate the size distribution of cancer cells as an intermediate step to calculate the tumor cellularity score. Given an image with hundreds of small object instances, we output the total count and the size histogram. We also provide a new data set for this task, the FlyLarvae data set, which consists of 11,000 larvae instances labeled pixel-wise. Our method results in an overall improvement in the count and size distribution prediction as compared to state-of-the-art instance segmentation method Mask R-CNN [11].", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose to predict histograms of object sizes in crowded scenes directly without any explicit object instance segmentation. What makes this task challenging is the high density of objects (of the same category), which makes instance identification hard. Instead of explicitly segmenting object instances, we show that directly learning histograms of object sizes improves accuracy while using drastically less parameters. This is very useful for application scenarios where explicit, pixel-accurate instance segmentation is not needed, but there lies interest in the overall distribution of instance sizes. Our core applications are in biology, where we estimate the size distribution of soldier fly larvae, and medicine, where we estimate the size distribution of cancer cells as an intermediate step to calculate the tumor cellularity score. Given an image with hundreds of small object instances, we output the total count and the size histogram. We also provide a new data set for this task, the FlyLarvae data set, which consists of 11,000 larvae instances labeled pixel-wise. Our method results in an overall improvement in the count and size distribution prediction as compared to state-of-the-art instance segmentation method Mask R-CNN [11].", "fno": "09093484", "keywords": [ "Biology Computing", "Cancer", "Image Classification", "Image Segmentation", "Learning Artificial Intelligence", "Object Detection", "Statistical Analysis", "Tumours", "Object Instances", "Object Sizes", "Explicit Object Instance Segmentation", "Instance Identification", "Pixel Accurate Instance Segmentation", "Size Distribution", "Size Histogram", "Instance Segmentation Method", "Mask R CNN", "Larvae Instances", "Crowded Scenes", "Tumor Cellularity Score", "Histograms", "Image Segmentation", "Task Analysis", "Estimation", "Computer Architecture", "Training", "Cancer" ], "authors": [ { "affiliation": "TU Munich", "fullName": "Kishan Sharma", "givenName": "Kishan", "surname": "Sharma", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich & EAWAG", "fullName": "Moritz Gold", "givenName": "Moritz", "surname": "Gold", "__typename": "ArticleAuthorType" }, { "affiliation": "EAWAG", "fullName": "Christian Zurbruegg", "givenName": "Christian", "surname": "Zurbruegg", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Munich", "fullName": "Laura Leal-Taixé", "givenName": "Laura", "surname": "Leal-Taixé", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Jan Dirk Wegner", "givenName": "Jan Dirk", "surname": "Wegner", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "3626-3634", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093603", "articleId": "1jPbsdiSQRa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093608", "articleId": "1jPbqIu3jLa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isip/2010/4261/0/4261a046", "title": "Study of Multiple Instances Schedule Based on Object Pool", "doi": null, "abstractUrl": "/proceedings-article/isip/2010/4261a046/12OmNAs2trc", "parentPublication": { "id": "proceedings/isip/2010/4261/0", "title": "2010 Third International Symposium on Information Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851d678", "title": "Instance-Level Video Segmentation from Object Tracks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851d678/12OmNzTppD3", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0003", "title": "InSeGAN: A Generative Approach to Segmenting Identical Instances in Depth Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0003/1BmEt2qf5MA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g890", "title": "Instances as Queries", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g890/1BmGoGRmmlO", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859911", "title": "Mining Valuable Source Domain Instances for Privacy-Preserving Domain Adaptive Object Detection", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859911/1G9EzIagwtq", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956034", "title": "Space-correlated Contrastive Representation Learning with Multiple Instances", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956034/1IHoTUhBEYM", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300c637", "title": "Normalized Object Coordinate Space for Category-Level 6D Object Pose and Size Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300c637/1gyrK7aTvLq", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300c777", "title": "Unsupervised Joint 3D Object Model Learning and 6D Pose Estimation for Depth-Based Instance Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300c777/1i5mKggU8Sc", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150880", "title": "Continual Learning of Object Instances", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150880/1lPHf27V65a", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800j736", "title": "Classifying, Segmenting, and Tracking Object Instances in Video with Mask Propagation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800j736/1m3nmSZjAB2", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzgeLGj", "title": "2018 IEEE Workshop on Mining and Analyzing Interaction Histories (MAINT)", "acronym": "maint", "groupId": "1825064", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNBhpS2e", "doi": "10.1109/MAINT.2018.8323089", "title": "Integrating source code search into git client for effective retrieving of change history", "normalizedTitle": "Integrating source code search into git client for effective retrieving of change history", "abstract": "In order to achieve effective development management, it is important to manipulate and understand the change histories of source code in a repository. Although general version control systems provide change history manipulation, these systems are restricted to line-based and textual operations such as grep and diff. As such, these systems cannot follow the syntax/semantics of the source code. While various studies have examined querying and searching source codes, these methods cannot follow historical changes. The key concept of this paper is the integration of a source code search technique into Git commands that manipulate historical data in a repository. This paper presents MJgit, a prototype tool for achieving the above goal. In order to evaluate the proposed tool, we conducted a performance experiment using actual software repositories.", "abstracts": [ { "abstractType": "Regular", "content": "In order to achieve effective development management, it is important to manipulate and understand the change histories of source code in a repository. Although general version control systems provide change history manipulation, these systems are restricted to line-based and textual operations such as grep and diff. As such, these systems cannot follow the syntax/semantics of the source code. While various studies have examined querying and searching source codes, these methods cannot follow historical changes. The key concept of this paper is the integration of a source code search technique into Git commands that manipulate historical data in a repository. This paper presents MJgit, a prototype tool for achieving the above goal. In order to evaluate the proposed tool, we conducted a performance experiment using actual software repositories.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to achieve effective development management, it is important to manipulate and understand the change histories of source code in a repository. Although general version control systems provide change history manipulation, these systems are restricted to line-based and textual operations such as grep and diff. As such, these systems cannot follow the syntax/semantics of the source code. While various studies have examined querying and searching source codes, these methods cannot follow historical changes. The key concept of this paper is the integration of a source code search technique into Git commands that manipulate historical data in a repository. This paper presents MJgit, a prototype tool for achieving the above goal. In order to evaluate the proposed tool, we conducted a performance experiment using actual software repositories.", "fno": "08323089", "keywords": [ "History", "Tools", "Computer Bugs", "Software", "Java", "Standards", "Prototypes", "Code Change History", "Source Code Search", "M Jgit", "Git", "Abstract Syntax Tree" ], "authors": [ { "affiliation": "Graduate School of Information Science and Technology, Osaka University, Japan", "fullName": "Miwa Sasaki", "givenName": "Miwa", "surname": "Sasaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School of Information Science and Technology, Osaka University, Japan", "fullName": "Shinsuke Matsumoto", "givenName": "Shinsuke", "surname": "Matsumoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School of Information Science and Technology, Osaka University, Japan", "fullName": "Shinji Kusumoto", "givenName": "Shinji", "surname": "Kusumoto", "__typename": "ArticleAuthorType" } ], "idPrefix": "maint", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2018", "issn": null, "isbn": "978-1-5386-6011-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08323088", "articleId": "12OmNAolH8t", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/issrew/2013/2552/0/06688888", "title": "Mining A change history to quickly identify bug locations : A case study of the Eclipse project", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688888/12OmNwdL7ih", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2008/3429/0/3429a017", "title": "Retrieving Task-Related Clusters from Change History", "doi": null, "abstractUrl": "/proceedings-article/wcre/2008/3429a017/12OmNwoPtmL", "parentPublication": { "id": "proceedings/wcre/2008/3429/0", "title": "2008 15th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550864", "title": "A hosting service of multi-language historage repositories", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550864/12OmNyo1o2v", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2013/0215/0/06693086", "title": "Detecting bad smells in source code using change history information", "doi": null, "abstractUrl": "/proceedings-article/ase/2013/06693086/12OmNzGlRBU", "parentPublication": { "id": "proceedings/ase/2013/0215/0", "title": "2013 IEEE/ACM 28th International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2015/8469/0/07081858", "title": "Historef: A tool for edit history refactoring", "doi": null, "abstractUrl": "/proceedings-article/saner/2015/07081858/12OmNzgeLDP", "parentPublication": { "id": "proceedings/saner/2015/8469/0", "title": "2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a034", "title": "Public Git Archive: A Big Code Dataset for All", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a034/17D45WODaqy", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a095", "title": "Git-Based Integrated Uncertainty Manager", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a095/1cJ7iTrqyLm", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a079", "title": "Coming: A Tool for Mining Change Pattern Instances from Git Commits", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a079/1cJ7izADQLC", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2019/3412/0/341200a433", "title": "git2net - Mining Time-Stamped Co-Editing Networks from Large git Repositories", "doi": null, "abstractUrl": "/proceedings-article/msr/2019/341200a433/1dx9zOI6D3q", "parentPublication": { "id": "proceedings/msr/2019/3412/0", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222261", "title": "Githru: Visual Analytics for Understanding Software Development History Through Git Metadata Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222261/1nTr2r0gvqo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCeaPZH", "title": "2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNC8MsyW", "doi": "10.1109/ISSRE.2016.38", "title": "Switching to Git: The Good, the Bad, and the Ugly", "normalizedTitle": "Switching to Git: The Good, the Bad, and the Ugly", "abstract": "Since its introduction 10 years ago, GIT has taken the world of version control systems (VCS) by storm. Its success is partly due to creating opportunities for new usage patterns that empower developers to work more efficiently. However, the resulting change in both user behavior and the way GIT stores changes impacts data mining and data analytics procedures [6], [13]. While some of these unique characteristics can be managed by adjusting mining and analytical techniques, others can lead to severe data loss and the inability to audit code changes, e.g. knowing the full history of changes of code related to security and privacy functionality. Thus, switching to GIT comes with challenges to established development process analytics. This paper is based on our experience in attempting to provide continuous process analysis for Microsoft product teams who switching to GIT as their primary VCS. We illustrate how GIT's concepts and usage patterns create a need for changing well-established data analytic processes. The goal of this paper is to raise awareness how certain GIT operations may damage or even destroy information about historical code changes necessary for continuous data development process analytics. To that end, we provide a list of common GIT usage patterns with a description of how these operations impact data mining applications. Finally, we provide examples of how one may counteract the effects of such destructive operations in the future. We further provide a new algorithm to detect integration paths that is specific to distributed version control systems like GIT, which allows us to reconstruct the information that is crucial to most development process analytics.", "abstracts": [ { "abstractType": "Regular", "content": "Since its introduction 10 years ago, GIT has taken the world of version control systems (VCS) by storm. Its success is partly due to creating opportunities for new usage patterns that empower developers to work more efficiently. However, the resulting change in both user behavior and the way GIT stores changes impacts data mining and data analytics procedures [6], [13]. While some of these unique characteristics can be managed by adjusting mining and analytical techniques, others can lead to severe data loss and the inability to audit code changes, e.g. knowing the full history of changes of code related to security and privacy functionality. Thus, switching to GIT comes with challenges to established development process analytics. This paper is based on our experience in attempting to provide continuous process analysis for Microsoft product teams who switching to GIT as their primary VCS. We illustrate how GIT's concepts and usage patterns create a need for changing well-established data analytic processes. The goal of this paper is to raise awareness how certain GIT operations may damage or even destroy information about historical code changes necessary for continuous data development process analytics. To that end, we provide a list of common GIT usage patterns with a description of how these operations impact data mining applications. Finally, we provide examples of how one may counteract the effects of such destructive operations in the future. We further provide a new algorithm to detect integration paths that is specific to distributed version control systems like GIT, which allows us to reconstruct the information that is crucial to most development process analytics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since its introduction 10 years ago, GIT has taken the world of version control systems (VCS) by storm. Its success is partly due to creating opportunities for new usage patterns that empower developers to work more efficiently. However, the resulting change in both user behavior and the way GIT stores changes impacts data mining and data analytics procedures [6], [13]. While some of these unique characteristics can be managed by adjusting mining and analytical techniques, others can lead to severe data loss and the inability to audit code changes, e.g. knowing the full history of changes of code related to security and privacy functionality. Thus, switching to GIT comes with challenges to established development process analytics. This paper is based on our experience in attempting to provide continuous process analysis for Microsoft product teams who switching to GIT as their primary VCS. We illustrate how GIT's concepts and usage patterns create a need for changing well-established data analytic processes. The goal of this paper is to raise awareness how certain GIT operations may damage or even destroy information about historical code changes necessary for continuous data development process analytics. To that end, we provide a list of common GIT usage patterns with a description of how these operations impact data mining applications. Finally, we provide examples of how one may counteract the effects of such destructive operations in the future. We further provide a new algorithm to detect integration paths that is specific to distributed version control systems like GIT, which allows us to reconstruct the information that is crucial to most development process analytics.", "fno": "9002a400", "keywords": [ "Data Mining", "Switches", "History", "Software", "Data Analysis", "Process Control", "Version Control Systems", "Mining Software Repositories", "Process Analysis" ], "authors": [ { "affiliation": null, "fullName": "Sascha Just", "givenName": "Sascha", "surname": "Just", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kim Herzig", "givenName": "Kim", "surname": "Herzig", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jacek Czerwonka", "givenName": "Jacek", "surname": "Czerwonka", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brendan Murphy", "givenName": "Brendan", "surname": "Murphy", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "400-411", "year": "2016", "issn": "2332-6549", "isbn": "978-1-4673-9002-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9002a388", "articleId": "12OmNx8OuuU", "__typename": "AdjacentArticleType" }, "next": { "fno": "9002a412", "articleId": "12OmNzWfp03", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisa/2013/0602/0/06579457", "title": "A Git Source Repository Analysis Tool Based on a Novel Branch-Oriented Approach", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579457/12OmNCctf8J", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/2017/3018/0/08005074", "title": "Bar induction: The good, the bad, and the ugly", "doi": null, "abstractUrl": "/proceedings-article/lics/2017/08005074/12OmNCulYmd", "parentPublication": { "id": "proceedings/lics/2017/3018/0", "title": "2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/2008/3141/0/3141a003", "title": "Robotics Today: The Good, Bad, and Ugly", "doi": null, "abstractUrl": "/proceedings-article/ecbs/2008/3141a003/12OmNwEJ0HX", "parentPublication": { "id": "proceedings/ecbs/2008/3141/0", "title": "Engineering of Computer-Based Systems, IEEE International Conference on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a540", "title": "How to Analyze Git Repositories with Command Line Tools: We're not in Kansas Anymore", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a540/13bd1fKQxrh", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mi/2000/02/m2003", "title": "The Good, the Bad, and the Ugly", "doi": null, "abstractUrl": "/magazine/mi/2000/02/m2003/13rRUx0gerV", "parentPublication": { "id": "mags/mi", "title": "IEEE Micro", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2019/01/08666649", "title": "Vehicle Telematics: The Good, Bad and Ugly", "doi": null, "abstractUrl": "/magazine/co/2019/01/08666649/18mLBWLow3m", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbac-pad/2022/5155/0/515500a293", "title": "Parallelizing Git Checkout: a Case Study of I/O Parallelism", "doi": null, "abstractUrl": "/proceedings-article/sbac-pad/2022/515500a293/1JgrxVjhHRS", "parentPublication": { "id": "proceedings/sbac-pad/2022/5155/0", "title": "2022 IEEE 34th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2019/3412/0/341200a433", "title": "git2net - Mining Time-Stamped Co-Editing Networks from Large git Repositories", "doi": null, "abstractUrl": "/proceedings-article/msr/2019/341200a433/1dx9zOI6D3q", "parentPublication": { "id": "proceedings/msr/2019/3412/0", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222261", "title": "Githru: Visual Analytics for Understanding Software Development History Through Git Metadata Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222261/1nTr2r0gvqo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400b044", "title": "FPGA for Aggregate Processing: The Good, The Bad, and The Ugly", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400b044/1uGXA0LZygg", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqzcvOA", "title": "2013 International Conference on Information Science and Applications (ICISA)", "acronym": "icisa", "groupId": "1800053", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNCctf8J", "doi": "10.1109/ICISA.2013.6579457", "title": "A Git Source Repository Analysis Tool Based on a Novel Branch-Oriented Approach", "normalizedTitle": "A Git Source Repository Analysis Tool Based on a Novel Branch-Oriented Approach", "abstract": "Code repositories of the version control systems have been used as important raw material in lots of developer behavior studies. In such research, commits are usually considered as a unit of development phases, even though they contain limited information over development process. Unlike former source code management systems, Git provides branching, which are the unit of concurrent and independent development activities in a whole project. Branches have significant advantages over commits from the viewpoint of the developer behavior researchers. By exploiting the characteristics of branching, we propose a Git branch analysis tool. The proposed tool automatically extracts branching data from Git repositories and performs statistical and graphical analysis on them. Through a few case studies using a number of popular OSS project repositories, we showed that the proposed branch-oriented analyzer is able to perform more insightful analysis than the existing commit-based analyzers.", "abstracts": [ { "abstractType": "Regular", "content": "Code repositories of the version control systems have been used as important raw material in lots of developer behavior studies. In such research, commits are usually considered as a unit of development phases, even though they contain limited information over development process. Unlike former source code management systems, Git provides branching, which are the unit of concurrent and independent development activities in a whole project. Branches have significant advantages over commits from the viewpoint of the developer behavior researchers. By exploiting the characteristics of branching, we propose a Git branch analysis tool. The proposed tool automatically extracts branching data from Git repositories and performs statistical and graphical analysis on them. Through a few case studies using a number of popular OSS project repositories, we showed that the proposed branch-oriented analyzer is able to perform more insightful analysis than the existing commit-based analyzers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Code repositories of the version control systems have been used as important raw material in lots of developer behavior studies. In such research, commits are usually considered as a unit of development phases, even though they contain limited information over development process. Unlike former source code management systems, Git provides branching, which are the unit of concurrent and independent development activities in a whole project. Branches have significant advantages over commits from the viewpoint of the developer behavior researchers. By exploiting the characteristics of branching, we propose a Git branch analysis tool. The proposed tool automatically extracts branching data from Git repositories and performs statistical and graphical analysis on them. Through a few case studies using a number of popular OSS project repositories, we showed that the proposed branch-oriented analyzer is able to perform more insightful analysis than the existing commit-based analyzers.", "fno": "06579457", "keywords": [ "Data Mining", "Linux", "History", "Kernel", "Open Source Software", "Merging", "Conferences" ], "authors": [ { "affiliation": null, "fullName": "HaeJun Lee", "givenName": "HaeJun", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bon-Keun Seo", "givenName": "Bon-Keun", "surname": "Seo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Euiseong Seo", "givenName": "Euiseong", "surname": "Seo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icisa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-06-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2013", "issn": null, "isbn": "978-1-4799-0602-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06579453", "articleId": "12OmNrY3LpB", "__typename": "AdjacentArticleType" }, "next": { "fno": "06579461", "articleId": "12OmNvnfk9U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vissoft/2016/3850/0/3850a001", "title": "Merge-Tree: Visualizing the Integration of Commits into Linux", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2016/3850a001/12OmNBp52I5", "parentPublication": { "id": "proceedings/vissoft/2016/3850/0", "title": "2016 IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwesep/2016/1851/0/1851a007", "title": "How do GitHub Users Feel with Pull-Based Development?", "doi": null, "abstractUrl": "/proceedings-article/iwesep/2016/1851a007/12OmNBpVQ5n", "parentPublication": { "id": "proceedings/iwesep/2016/1851/0", "title": "2016 7th International Workshop on Empirical Software Engineering in Practice (IWESEP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2012/1760/0/06224297", "title": "How Distributed Version Control Systems impact open source software projects", "doi": null, "abstractUrl": "/proceedings-article/msr/2012/06224297/12OmNqBKTNx", "parentPublication": { "id": "proceedings/msr/2012/1760/0", "title": "2012 9th IEEE Working Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367f310", "title": "Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367f310/12OmNrkjVpk", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2017/2141/0/2141a380", "title": "An Application of the PageRank Algorithm to Commit Evaluation on Git Repository", "doi": null, "abstractUrl": "/proceedings-article/seaa/2017/2141a380/12OmNx76TKW", "parentPublication": { "id": "proceedings/seaa/2017/2141/0", "title": "2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2016/3806/0/3806a290", "title": "Recovering Commit Branch of Origin from GitHub Repositories", "doi": null, "abstractUrl": "/proceedings-article/icsme/2016/3806a290/12OmNxETaeB", "parentPublication": { "id": "proceedings/icsme/2016/3806/0", "title": "2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2015/5594/0/5594a470", "title": "A Dataset of the Activity of the Git Super-repository of Linux in 2012", "doi": null, "abstractUrl": "/proceedings-article/msr/2015/5594a470/12OmNzE54I2", "parentPublication": { "id": "proceedings/msr/2015/5594/0", "title": "2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a079", "title": "Coming: A Tool for Mining Change Pattern Instances from Git Commits", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a079/1cJ7izADQLC", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800b082", "title": "Developer Reputation Estimator (DRE)", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800b082/1gysWhpgJIQ", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2021/8710/0/871000a295", "title": "TNM: A Tool for Mining of Socio-Technical Data from Git Repositories", "doi": null, "abstractUrl": "/proceedings-article/msr/2021/871000a295/1tB7jzhuMlG", "parentPublication": { "id": "proceedings/msr/2021/8710/0/", "title": "2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirW", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "acronym": "msr", "groupId": "1001959", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WXIkz1", "doi": "", "title": "A Graph-Based Dataset of Commit History of Real-World Android apps", "normalizedTitle": "A Graph-Based Dataset of Commit History of Real-World Android apps", "abstract": "Obtaining a good dataset to conduct empirical studies on the engineering of Android apps is an open challenge. To start tackling this challenge, we present AndroidTimeMachine, the rst, self-contained, publicly available dataset weaving spread-out data sources about real-world, open-source Android apps. Encoded as a graph-based database, AndroidTimeMachine concerns 8,431 real open-source Android apps and contains: (i) metadata about the apps' GitHub projects, (ii) Git repositories with full commit history and (iii) metadata extracted from the Google Play store, such as app ratings and permissions.", "abstracts": [ { "abstractType": "Regular", "content": "Obtaining a good dataset to conduct empirical studies on the engineering of Android apps is an open challenge. To start tackling this challenge, we present AndroidTimeMachine, the rst, self-contained, publicly available dataset weaving spread-out data sources about real-world, open-source Android apps. Encoded as a graph-based database, AndroidTimeMachine concerns 8,431 real open-source Android apps and contains: (i) metadata about the apps' GitHub projects, (ii) Git repositories with full commit history and (iii) metadata extracted from the Google Play store, such as app ratings and permissions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Obtaining a good dataset to conduct empirical studies on the engineering of Android apps is an open challenge. To start tackling this challenge, we present AndroidTimeMachine, the rst, self-contained, publicly available dataset weaving spread-out data sources about real-world, open-source Android apps. Encoded as a graph-based database, AndroidTimeMachine concerns 8,431 real open-source Android apps and contains: (i) metadata about the apps' GitHub projects, (ii) Git repositories with full commit history and (iii) metadata extracted from the Google Play store, such as app ratings and permissions.", "fno": "571601a030", "keywords": [ "Google", "Databases", "Metadata", "History", "Open Source Software", "Containers", "Android", "Mining Software Repositories", "Dataset" ], "authors": [ { "affiliation": null, "fullName": "Franz-Xaver Geiger", "givenName": "Franz-Xaver", "surname": "Geiger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ivano Malavolta", "givenName": "Ivano", "surname": "Malavolta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Luca Pascarella", "givenName": "Luca", "surname": "Pascarella", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fabio Palomba", "givenName": "Fabio", "surname": "Palomba", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dario Di Nucci", "givenName": "Dario", "surname": "Di Nucci", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alberto Bacchelli", "givenName": "Alberto", "surname": "Bacchelli", "__typename": "ArticleAuthorType" } ], "idPrefix": "msr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-05-01T00:00:00", "pubType": "proceedings", "pages": "30-33", "year": "2018", "issn": null, "isbn": "978-1-4503-5716-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "571601a026", "articleId": "17D45XH89o2", "__typename": "AdjacentArticleType" }, "next": { "fno": "571601a034", "articleId": "17D45WODaqy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2016/3845/0/07582761", "title": "Taming Android fragmentation: Characterizing and detecting compatibility issues for Android apps", "doi": null, "abstractUrl": "/proceedings-article/ase/2016/07582761/12OmNvjyxtN", "parentPublication": { "id": "proceedings/ase/2016/3845/0", "title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2017/2669/0/07972725", "title": "Code Smells in iOS Apps: How Do They Compare to Android?", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2017/07972725/12OmNvzJFTJ", "parentPublication": { "id": "proceedings/mobilesoft/2017/2669/0", "title": "2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2018/7870/0/787000a334", "title": "How Maintainability Issues of Android Apps Evolve", "doi": null, "abstractUrl": "/proceedings-article/icsme/2018/787000a334/17D45WB0qdj", "parentPublication": { "id": "proceedings/icsme/2018/7870/0", "title": "2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a265", "title": "Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a265/17D45XfSETl", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2019/0591/0/08668030", "title": "Characterizing and Detecting Inefficient Image Displaying Issues in Android Apps", "doi": null, "abstractUrl": "/proceedings-article/saner/2019/08668030/18uSwJMUhFK", "parentPublication": { "id": "proceedings/saner/2019/0591/0", "title": "2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2022/9301/0/930100a125", "title": "Adoption of Third-party Libraries in Mobile Apps: A Case Study on Open-source Android Applications", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2022/930100a125/1EpM1Ejn2hy", "parentPublication": { "id": "proceedings/mobilesoft/2022/9301/0", "title": "2022 IEEE/ACM 9th International Conference on Mobile Software Engineering and Systems (MobileSoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2019/0869/0/086900a878", "title": "PIVOT: Learning API-Device Correlations to Facilitate Android Compatibility Issue Detection", "doi": null, "abstractUrl": "/proceedings-article/icse/2019/086900a878/1cMFwBnf1O8", "parentPublication": { "id": "proceedings/icse/2019/0869/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2019/3395/0/339500a020", "title": "A Framework for Testing Android Apps by Reusing Test Cases", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2019/339500a020/1cTILNHt5TO", "parentPublication": { "id": "proceedings/mobilesoft/2019/3395/0", "title": "2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2020/9248/0/924800a132", "title": "Annotation practices in Android apps", "doi": null, "abstractUrl": "/proceedings-article/scam/2020/924800a132/1oFGZoPXicU", "parentPublication": { "id": "proceedings/scam/2020/9248/0", "title": "2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2020/7122/0/712200a230", "title": "Search-Based Test Generation for Android Apps", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2020/712200a230/1pcSGvnzhEk", "parentPublication": { "id": "proceedings/icse-companion/2020/7122/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18uSs85VsRO", "title": "2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "acronym": "saner", "groupId": "1831544", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18uSw0U0Wre", "doi": "10.1109/SANER.2019.8668034", "title": "Knowledge Graphing Git Repositories: A Preliminary Study", "normalizedTitle": "Knowledge Graphing Git Repositories: A Preliminary Study", "abstract": "Knowledge Graph, being able to connect information from a variety of sources, has become very famous in recent years since its creation in 2012 by Google. Researchers in our community have leveraged Knowledge Graph to achieve various purposes such as improving API caveats accessibilities, generating answers to developer questions, and reasoning common software weaknesses, etc. In this work, we would like to leverage the knowledge graph concept for helping developers and project managers to comprehend software repositories. To this end, we design and implement a prototype tool called GitGraph, which takes as input a Git repository and constructs automatically a knowledge graph associated with the repository. Our preliminary experimental results show that GitGraph can correctly generate knowledge graphs for Git projects and the generated graphs are also useful for users to comprehend the projects. More specifically, the knowledge graph, on one hand, provides a graphic interface that users can interactively explore the integrated artefacts such as commits and changed methods, while on the other hand, provides a convenient means for users to search for advanced relations between the different artefacts.", "abstracts": [ { "abstractType": "Regular", "content": "Knowledge Graph, being able to connect information from a variety of sources, has become very famous in recent years since its creation in 2012 by Google. Researchers in our community have leveraged Knowledge Graph to achieve various purposes such as improving API caveats accessibilities, generating answers to developer questions, and reasoning common software weaknesses, etc. In this work, we would like to leverage the knowledge graph concept for helping developers and project managers to comprehend software repositories. To this end, we design and implement a prototype tool called GitGraph, which takes as input a Git repository and constructs automatically a knowledge graph associated with the repository. Our preliminary experimental results show that GitGraph can correctly generate knowledge graphs for Git projects and the generated graphs are also useful for users to comprehend the projects. More specifically, the knowledge graph, on one hand, provides a graphic interface that users can interactively explore the integrated artefacts such as commits and changed methods, while on the other hand, provides a convenient means for users to search for advanced relations between the different artefacts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Knowledge Graph, being able to connect information from a variety of sources, has become very famous in recent years since its creation in 2012 by Google. Researchers in our community have leveraged Knowledge Graph to achieve various purposes such as improving API caveats accessibilities, generating answers to developer questions, and reasoning common software weaknesses, etc. In this work, we would like to leverage the knowledge graph concept for helping developers and project managers to comprehend software repositories. To this end, we design and implement a prototype tool called GitGraph, which takes as input a Git repository and constructs automatically a knowledge graph associated with the repository. Our preliminary experimental results show that GitGraph can correctly generate knowledge graphs for Git projects and the generated graphs are also useful for users to comprehend the projects. More specifically, the knowledge graph, on one hand, provides a graphic interface that users can interactively explore the integrated artefacts such as commits and changed methods, while on the other hand, provides a convenient means for users to search for advanced relations between the different artefacts.", "fno": "08668034", "keywords": [ "Application Program Interfaces", "Graph Theory", "Knowledge Management", "Software Engineering", "Software Tools", "Knowledge Graph Concept", "Knowledge Graphing Git Repositories", "API Caveats Accessibilities", "Git Graph", "Git Projects", "Database Languages", "Metadata", "Control Systems", "Web Services", "Google", "Prototypes" ], "authors": [ { "affiliation": "Beijing University of Posts and Telecommunications, Beijing, China", "fullName": "Yanjie Zhao", "givenName": "Yanjie", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications, Beijing, China", "fullName": "Haoyu Wang", "givenName": "Haoyu", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Harbin Institute of Technology, Harbin, China", "fullName": "Lei Ma", "givenName": "Lei", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University, Melbourne, Australia", "fullName": "Yuxin Liu", "givenName": "Yuxin", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University, Melbourne, Australia", "fullName": "Li Li", "givenName": "Li", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University, Melbourne, Australia", "fullName": "John Grundy", "givenName": "John", "surname": "Grundy", "__typename": "ArticleAuthorType" } ], "idPrefix": "saner", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-02-01T00:00:00", "pubType": "proceedings", "pages": "599-603", "year": "2019", "issn": "1534-5351", "isbn": "978-1-7281-0591-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08667992", "articleId": "18uSvCOWSfS", "__typename": "AdjacentArticleType" }, "next": { "fno": "08668010", "articleId": "18uSuPT882k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2016/0662/0/0662a242", "title": "Integration Strategies for Enterprise Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a242/12OmNApLGq6", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2017/2141/0/2141a380", "title": "An Application of the PageRank Algorithm to Commit Evaluation on Git Repository", "doi": null, "abstractUrl": "/proceedings-article/seaa/2017/2141a380/12OmNx76TKW", "parentPublication": { "id": "proceedings/seaa/2017/2141/0", "title": "2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406287", "title": "A Semantic Knowledge Management System for Government Repositories", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406287/12OmNy5hRjh", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a030", "title": "A Graph-Based Dataset of Commit History of Real-World Android apps", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a030/17D45WXIkz1", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a151", "title": "Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student&#x0027;s software projects", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a151/1FJ5sIPZiec", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a123", "title": "SecretHunter: A Large-scale Secret Scanner for Public Git Repositories", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a123/1LFMga9me8U", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a025", "title": "Building a Broad Knowledge Graph for Products", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a025/1aDSVHdfvyg", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2019/3412/0/341200a433", "title": "git2net - Mining Time-Stamped Co-Editing Networks from Large git Repositories", "doi": null, "abstractUrl": "/proceedings-article/msr/2019/341200a433/1dx9zOI6D3q", "parentPublication": { "id": "proceedings/msr/2019/3412/0", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2020/02/08994851", "title": "Bringing Semantic Knowledge Graph Technology to Your Data", "doi": null, "abstractUrl": "/magazine/so/2020/02/08994851/1hkQOii6A9i", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222261", "title": "Githru: Visual Analytics for Understanding Software Development History Through Git Metadata Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222261/1nTr2r0gvqo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cJ7haJo31C", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "acronym": "icse-companion", "groupId": "1002125", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ7iTrqyLm", "doi": "10.1109/ICSE-Companion.2019.00047", "title": "Git-Based Integrated Uncertainty Manager", "normalizedTitle": "Git-Based Integrated Uncertainty Manager", "abstract": "Nowadays, many software systems are required to be updated and delivered in a short period of time. It is important for developers to make software embrace uncertainty, because user requirements or design decisions are not always completely determined. This paper introduces iArch-U, an Eclipse-based uncertainty-aware software development tool chain, for developers to properly describe, trace, and manage uncertainty crosscutting over UML modeling, Java programming, and testing phases. Integrating with Git, iArch-U can manage why/when/where uncertain concerns arise or are fixed to be certain in a project. In this tool demonstration, we show the world of uncertainty-aware software development using iArch-U. Our tool is open source software released from http://posl.github.io/iArch/.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, many software systems are required to be updated and delivered in a short period of time. It is important for developers to make software embrace uncertainty, because user requirements or design decisions are not always completely determined. This paper introduces iArch-U, an Eclipse-based uncertainty-aware software development tool chain, for developers to properly describe, trace, and manage uncertainty crosscutting over UML modeling, Java programming, and testing phases. Integrating with Git, iArch-U can manage why/when/where uncertain concerns arise or are fixed to be certain in a project. In this tool demonstration, we show the world of uncertainty-aware software development using iArch-U. Our tool is open source software released from http://posl.github.io/iArch/.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, many software systems are required to be updated and delivered in a short period of time. It is important for developers to make software embrace uncertainty, because user requirements or design decisions are not always completely determined. This paper introduces iArch-U, an Eclipse-based uncertainty-aware software development tool chain, for developers to properly describe, trace, and manage uncertainty crosscutting over UML modeling, Java programming, and testing phases. Integrating with Git, iArch-U can manage why/when/where uncertain concerns arise or are fixed to be certain in a project. In this tool demonstration, we show the world of uncertainty-aware software development using iArch-U. Our tool is open source software released from http://posl.github.io/iArch/.", "fno": "176400a095", "keywords": [ "Public Domain Software", "Software Engineering", "Uncertainty Handling", "Unified Modeling Language", "I Arch U", "Open Source Software", "Integrated Uncertainty Manager", "Software Systems", "User Requirements", "Eclipse Based Uncertainty Aware Software Development Tool Chain", "Uncertainty Crosscutting", "Git", "Uncertainty", "Unified Modeling Language", "Software", "Tools", "Java", "History", "Printers", "Uncertainty", "Management", "Trace", "Git", "IDE" ], "authors": [ { "affiliation": "Kyushu University", "fullName": "Naoyasu Ubayashi", "givenName": "Naoyasu", "surname": "Ubayashi", "__typename": "ArticleAuthorType" }, { "affiliation": "Edirium K.K., Japan", "fullName": "Takuya Watanabe", "givenName": "Takuya", "surname": "Watanabe", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu University", "fullName": "Yasutaka Kamei", "givenName": "Yasutaka", "surname": "Kamei", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu University", "fullName": "Ryosuke Sato", "givenName": "Ryosuke", "surname": "Sato", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse-companion", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "95-98", "year": "2019", "issn": null, "isbn": "978-1-7281-1764-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "176400a091", "articleId": "1cJ7lUuNG9i", "__typename": "AdjacentArticleType" }, "next": { "fno": "176400a099", "articleId": "1cJ7iZTnn2g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/quatic/2016/3581/0/3581a015", "title": "Expressing Measurement Uncertainty in Software Models", "doi": null, "abstractUrl": "/proceedings-article/quatic/2016/3581a015/12OmNAZOK1b", "parentPublication": { "id": "proceedings/quatic/2016/3581/0", "title": "2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227159", "title": "Partial models: Towards modeling and reasoning with uncertainty", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227159/12OmNBgQFSA", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2017/0426/0/07964594", "title": "iArch-U: Interface-Centric Integrated Uncertainty-Aware Development Environment", "doi": null, "abstractUrl": "/proceedings-article/mise/2017/07964594/12OmNxE2mNd", "parentPublication": { "id": "proceedings/mise/2017/0426/0", "title": "2017 IEEE/ACM 9th International Workshop on Modelling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2015/7055/0/7055a007", "title": "Modularity for Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/mise/2015/7055a007/12OmNxG1yWW", "parentPublication": { "id": "proceedings/mise/2015/7055/0", "title": "2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/models/2017/3492/0/3492a179", "title": "Managing Design-Time Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/models/2017/3492a179/12OmNyVes6K", "parentPublication": { "id": "proceedings/models/2017/3492/0", "title": "2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sew/2005/2306/0/23060228", "title": "Uncertainty: A Meta-Property of Software", "doi": null, "abstractUrl": "/proceedings-article/sew/2005/23060228/12OmNzlUKx3", "parentPublication": { "id": "proceedings/sew/2005/2306/0", "title": "29th Annual IEEE/NASA Software Engineering Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a272", "title": "Poster: Exploring Uncertainty in GitHub OSS Projects: When and How Do Developers Face Uncertainty?", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a272/13bd1eJgoij", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2018/5841/0/584100a238", "title": "Uncertainty Management for Global Software Development Teams", "doi": null, "abstractUrl": "/proceedings-article/quatic/2018/584100a238/17D45WLdYPM", "parentPublication": { "id": "proceedings/quatic/2018/5841/0", "title": "2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2023/03/10058802", "title": "Uncertainty Management in Dependable and Intelligent Embedded Software", "doi": null, "abstractUrl": "/magazine/co/2023/03/10058802/1Ldkh9AuaXu", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2019/2231/0/223100a019", "title": "Belief Uncertainty in Software Models", "doi": null, "abstractUrl": "/proceedings-article/mise/2019/223100a019/1ehBvfsOEAo", "parentPublication": { "id": "proceedings/mise/2019/2231/0", "title": "2019 IEEE/ACM 11th International Workshop on Modelling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cJ7haJo31C", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "acronym": "icse-companion", "groupId": "1002125", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ7izADQLC", "doi": "10.1109/ICSE-Companion.2019.00043", "title": "Coming: A Tool for Mining Change Pattern Instances from Git Commits", "normalizedTitle": "Coming: A Tool for Mining Change Pattern Instances from Git Commits", "abstract": "Software repositories such as Git have become a relevant source of information for software engineer researchers. For instance, the detection of commits that fulfill a given criterion (e.g., bugfixing commits) is one of the most frequent tasks done to understand the software evolution. However, to our knowledge, there is no open-source tool that, given a Git repository, returns all the instances of a given code change pattern. In this paper we present Coming, a tool that takes as input a Git repository and mines instances of code change patterns present on each commit. For that, Coming computes fine-grained code changes between two consecutive revisions, analyzes those changes to determine if they correspond to an instance of a change pattern (specified by the user using XML), and finally, after analyzing all the commits, it presents a) the frequency of code changes and b) the instances found in each commit. We evaluate Coming on a set of 28 pairs of revisions from Defects4J, finding instances of change patterns that involve If conditions on 26 of them.", "abstracts": [ { "abstractType": "Regular", "content": "Software repositories such as Git have become a relevant source of information for software engineer researchers. For instance, the detection of commits that fulfill a given criterion (e.g., bugfixing commits) is one of the most frequent tasks done to understand the software evolution. However, to our knowledge, there is no open-source tool that, given a Git repository, returns all the instances of a given code change pattern. In this paper we present Coming, a tool that takes as input a Git repository and mines instances of code change patterns present on each commit. For that, Coming computes fine-grained code changes between two consecutive revisions, analyzes those changes to determine if they correspond to an instance of a change pattern (specified by the user using XML), and finally, after analyzing all the commits, it presents a) the frequency of code changes and b) the instances found in each commit. We evaluate Coming on a set of 28 pairs of revisions from Defects4J, finding instances of change patterns that involve If conditions on 26 of them.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Software repositories such as Git have become a relevant source of information for software engineer researchers. For instance, the detection of commits that fulfill a given criterion (e.g., bugfixing commits) is one of the most frequent tasks done to understand the software evolution. However, to our knowledge, there is no open-source tool that, given a Git repository, returns all the instances of a given code change pattern. In this paper we present Coming, a tool that takes as input a Git repository and mines instances of code change patterns present on each commit. For that, Coming computes fine-grained code changes between two consecutive revisions, analyzes those changes to determine if they correspond to an instance of a change pattern (specified by the user using XML), and finally, after analyzing all the commits, it presents a) the frequency of code changes and b) the instances found in each commit. We evaluate Coming on a set of 28 pairs of revisions from Defects4J, finding instances of change patterns that involve If conditions on 26 of them.", "fno": "176400a079", "keywords": [ "Data Mining", "Program Debugging", "Public Domain Software", "Software Maintenance", "XML", "Change Pattern Instances", "Git Commits", "Software Repositories", "Software Engineer Researchers", "Software Evolution", "Open Source Tool", "Git Repository", "Code Change Patterns", "Coming Tool", "Bug Fixing Commits", "Defects 4 J", "Computer Bugs", "Tools", "Software", "XML", "Task Analysis", "Maintenance Engineering", "Libraries", "Code Changes", "Pattern Matching", "Code Changes Patterns", "Bugfixing", "Software Evolution", "Mining Software Repositories" ], "authors": [ { "affiliation": "Université Polytechnique Hauts-de-France", "fullName": "Matias Martinez", "givenName": "Matias", "surname": "Martinez", "__typename": "ArticleAuthorType" }, { "affiliation": "KTH Royal Institute of Technology", "fullName": "Martin Monperrus", "givenName": "Martin", "surname": "Monperrus", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse-companion", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "79-82", "year": "2019", "issn": null, "isbn": "978-1-7281-1764-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "176400a075", "articleId": "1cJ7hGyrOa4", "__typename": "AdjacentArticleType" }, "next": { "fno": "176400a083", "articleId": "1cJ7nJ7zVWo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/maint/2018/6011/0/08323089", "title": "Integrating source code search into git client for effective retrieving of change history", "doi": null, "abstractUrl": "/proceedings-article/maint/2018/08323089/12OmNBhpS2e", "parentPublication": { "id": "proceedings/maint/2018/6011/0", "title": "2018 IEEE Workshop on Mining and Analyzing Interaction Histories (MAINT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/1/0367a128", "title": "Can Developers’ Interaction Data Improve Change Recommendation?", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367a128/12OmNqGA578", "parentPublication": { "id": "proceedings/compsac/2017/0367/1", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2015/5594/0/5594a056", "title": "Mining Energy-Aware Commits", "doi": null, "abstractUrl": "/proceedings-article/msr/2015/5594a056/12OmNvD8Rrr", "parentPublication": { "id": "proceedings/msr/2015/5594/0", "title": "2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2017/2141/0/2141a380", "title": "An Application of the PageRank Algorithm to Commit Evaluation on Git Repository", "doi": null, "abstractUrl": "/proceedings-article/seaa/2017/2141a380/12OmNx76TKW", "parentPublication": { "id": "proceedings/seaa/2017/2141/0", "title": "2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a184", "title": "Identifying Supplementary Bug-fix Commits", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a184/144U9aN3JKT", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/03/08633335", "title": "Which Commits Can Be CI Skipped?", "doi": null, "abstractUrl": "/journal/ts/2021/03/08633335/17D45W1Oa1V", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2019/3094/0/309400a202", "title": "Aiding Code Change Understanding with Semantic Change Impact Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsme/2019/309400a202/1fHlIaug8WQ", "parentPublication": { "id": "proceedings/icsme/2019/3094/0", "title": "2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222261", "title": "Githru: Visual Analytics for Understanding Software Development History Through Git Metadata Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222261/1nTr2r0gvqo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2021/1403/0/140300a433", "title": "Warning-Introducing Commits vs Bug-Introducing Commits: A tool, statistical models, and a preliminary user study", "doi": null, "abstractUrl": "/proceedings-article/icpc/2021/140300a433/1tB7wA4SPaU", "parentPublication": { "id": "proceedings/icpc/2021/1403/0/", "title": "2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2021/1403/0/140300a219", "title": "Multi-Programming-Language Commits in OSS: An Empirical Study on Apache Projects", "doi": null, "abstractUrl": "/proceedings-article/icpc/2021/140300a219/1tB7wb6sYCY", "parentPublication": { "id": "proceedings/icpc/2021/1403/0/", "title": "2021 IEEE/ACM 29th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dx9xAtJSLu", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "acronym": "msr", "groupId": "1001959", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dx9ARcaK88", "doi": "10.1109/MSR.2019.00083", "title": "The Impact of Systematic Edits in History Slicing", "normalizedTitle": "The Impact of Systematic Edits in History Slicing", "abstract": "While extracting a subset of a commit history, specifying the necessary portion is a time-consuming task for developers. Several commit-based history slicing techniques have been proposed to identify dependencies between commits and to extract a related set of commits using a specific commit as a slicing criterion. However, the resulting subset of commits become large if commits for systematic edits whose changes do not depend on each other exist. We empirically investigated the impact of systematic edits on history slicing. In this study, commits in which systematic edits were detected are split between each file so that unnecessary dependencies between commits are eliminated. In several histories of open source systems, the size of history slices was reduced by 13.3-57.2% on average after splitting the commits for systematic edits.", "abstracts": [ { "abstractType": "Regular", "content": "While extracting a subset of a commit history, specifying the necessary portion is a time-consuming task for developers. Several commit-based history slicing techniques have been proposed to identify dependencies between commits and to extract a related set of commits using a specific commit as a slicing criterion. However, the resulting subset of commits become large if commits for systematic edits whose changes do not depend on each other exist. We empirically investigated the impact of systematic edits on history slicing. In this study, commits in which systematic edits were detected are split between each file so that unnecessary dependencies between commits are eliminated. In several histories of open source systems, the size of history slices was reduced by 13.3-57.2% on average after splitting the commits for systematic edits.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While extracting a subset of a commit history, specifying the necessary portion is a time-consuming task for developers. Several commit-based history slicing techniques have been proposed to identify dependencies between commits and to extract a related set of commits using a specific commit as a slicing criterion. However, the resulting subset of commits become large if commits for systematic edits whose changes do not depend on each other exist. We empirically investigated the impact of systematic edits on history slicing. In this study, commits in which systematic edits were detected are split between each file so that unnecessary dependencies between commits are eliminated. In several histories of open source systems, the size of history slices was reduced by 13.3-57.2% on average after splitting the commits for systematic edits.", "fno": "341200a555", "keywords": [ "Configuration Management", "Program Slicing", "Software Maintenance", "Commit History", "History Slices", "History Slicing", "Version Control Systems", "Software Maintenance", "Systematic Edits Detection", "Open Source Systems", "History", "Systematics", "Java", "Control Systems", "Tools", "Task Analysis", "Open Source Software", "Version Control", "History Slicing", "Systematic Edits" ], "authors": [ { "affiliation": "Tokyo Institute of Technology", "fullName": "Ryosuke Funaki", "givenName": "Ryosuke", "surname": "Funaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Institute of Technology", "fullName": "Shinpei Hayashi", "givenName": "Shinpei", "surname": "Hayashi", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Institute of Technology", "fullName": "Motoshi Saeki", "givenName": "Motoshi", "surname": "Saeki", "__typename": "ArticleAuthorType" } ], "idPrefix": "msr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "555-559", "year": "2019", "issn": null, "isbn": "978-1-7281-3412-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "341200z034", "articleId": "1DICrOOPEm4", "__typename": "AdjacentArticleType" }, "next": { "fno": "341200a560", "articleId": "1dx9AKb1FJe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/msr/2017/1544/0/07962375", "title": "Mining Change Histories for Unknown Systematic Edits", "doi": null, "abstractUrl": "/proceedings-article/msr/2017/07962375/12OmNvk7JPy", "parentPublication": { "id": "proceedings/msr/2017/1544/0", "title": "2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2015/0025/0/0025a686", "title": "Semantic Slicing of Software Version Histories (T)", "doi": null, "abstractUrl": "/proceedings-article/ase/2015/0025a686/12OmNvpew7t", "parentPublication": { "id": "proceedings/ase/2015/0025/0", "title": "2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606596", "title": "Lase: Locating and applying systematic edits by learning from examples", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606596/12OmNx7ov4u", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2015/8469/0/07081858", "title": "Historef: A tool for edit history refactoring", "doi": null, "abstractUrl": "/proceedings-article/saner/2015/07081858/12OmNzgeLDP", "parentPublication": { "id": "proceedings/saner/2015/8469/0", "title": "2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a057", "title": "CSlicerCloud: A Web-Based Semantic History Slicing Framework", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a057/13bd1fWcuDk", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2018/02/07843626", "title": "Semantic Slicing of Software Version Histories", "doi": null, "abstractUrl": "/journal/ts/2018/02/07843626/13rRUxBa5oP", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a030", "title": "A Graph-Based Dataset of Commit History of Real-World Android apps", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a030/17D45WXIkz1", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a565", "title": "Impact of Change Granularity in Refactoring Detection", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a565/1EpKKk1pRbW", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2020/5143/0/09054864", "title": "Refactoring Graphs: Assessing Refactoring over Time", "doi": null, "abstractUrl": "/proceedings-article/saner/2020/09054864/1iHVajwu3SM", "parentPublication": { "id": "proceedings/saner/2020/5143/0", "title": "2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a081", "title": "GenSlice: Generalized Semantic History Slicing", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a081/1oqKJ59LkFa", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dx9xAtJSLu", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "acronym": "msr", "groupId": "1001959", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dx9zOI6D3q", "doi": "10.1109/MSR.2019.00070", "title": "git2net - Mining Time-Stamped Co-Editing Networks from Large git Repositories", "normalizedTitle": "git2net - Mining Time-Stamped Co-Editing Networks from Large git Repositories", "abstract": "Data from software repositories have become an important foundation for the empirical study of software engineering processes. A recurring theme in the repository mining literature is the inference of developer networks capturing e.g. collaboration, coordination, or communication, from the commit history of projects. Most of the studied networks are based on the co-authorship of software artefacts defined at the level of files, modules, or packages. While this approach has led to insights into the social aspects of software development, it neglects detailed information on code changes and code ownership, e.g. which exact lines of code have been authored by which developers, that is contained in the commit log of software projects. Addressing this issue, we introduce git2net, a scalable python software that facilitates the extraction of fine-grained co-editing networks in large git repositories. It uses text mining techniques to analyse the detailed history of textual modifications within files. This information allows us to construct directed, weighted, and time-stamped networks, where a link signifies that one developer has edited a block of source code originally written by another developer. Our tool is applied in case studies of an Open Source and a commercial software project. We argue that it opens up a massive new source of high-resolution data on human collaboration patterns.", "abstracts": [ { "abstractType": "Regular", "content": "Data from software repositories have become an important foundation for the empirical study of software engineering processes. A recurring theme in the repository mining literature is the inference of developer networks capturing e.g. collaboration, coordination, or communication, from the commit history of projects. Most of the studied networks are based on the co-authorship of software artefacts defined at the level of files, modules, or packages. While this approach has led to insights into the social aspects of software development, it neglects detailed information on code changes and code ownership, e.g. which exact lines of code have been authored by which developers, that is contained in the commit log of software projects. Addressing this issue, we introduce git2net, a scalable python software that facilitates the extraction of fine-grained co-editing networks in large git repositories. It uses text mining techniques to analyse the detailed history of textual modifications within files. This information allows us to construct directed, weighted, and time-stamped networks, where a link signifies that one developer has edited a block of source code originally written by another developer. Our tool is applied in case studies of an Open Source and a commercial software project. We argue that it opens up a massive new source of high-resolution data on human collaboration patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data from software repositories have become an important foundation for the empirical study of software engineering processes. A recurring theme in the repository mining literature is the inference of developer networks capturing e.g. collaboration, coordination, or communication, from the commit history of projects. Most of the studied networks are based on the co-authorship of software artefacts defined at the level of files, modules, or packages. While this approach has led to insights into the social aspects of software development, it neglects detailed information on code changes and code ownership, e.g. which exact lines of code have been authored by which developers, that is contained in the commit log of software projects. Addressing this issue, we introduce git2net, a scalable python software that facilitates the extraction of fine-grained co-editing networks in large git repositories. It uses text mining techniques to analyse the detailed history of textual modifications within files. This information allows us to construct directed, weighted, and time-stamped networks, where a link signifies that one developer has edited a block of source code originally written by another developer. Our tool is applied in case studies of an Open Source and a commercial software project. We argue that it opens up a massive new source of high-resolution data on human collaboration patterns.", "fno": "341200a433", "keywords": [ "Data Mining", "Python", "Software Maintenance", "Source Code Software", "Text Analysis", "Commercial Software Project", "Git Repositories", "Software Repositories", "Software Engineering Processes", "Repository Mining Literature", "Software Artefacts", "Social Aspects", "Software Development", "Code Changes", "Commit Log", "Fine Grained Co Editing Networks", "Text Mining Techniques", "Time Stamped Networks", "Source Code", "Git 2 Net", "Scalable Python Software", "Time Stamped Co Editing Networks", "Software", "Data Mining", "Tools", "Collaboration", "Social Networking Online", "History", "Databases", "Network Analysis", "Data Analysis", "Collaboration Network", "Repository Mining", "Git", "Co Editing Networks", "Temporal Networks", "Social Networks", "Open Source", "Empirical Software Engineering" ], "authors": [ { "affiliation": "ETH Zürich", "fullName": "Christoph Gote", "givenName": "Christoph", "surname": "Gote", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Zürich", "fullName": "Ingo Scholtes", "givenName": "Ingo", "surname": "Scholtes", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich", "fullName": "Frank Schweitzer", "givenName": "Frank", "surname": "Schweitzer", "__typename": "ArticleAuthorType" } ], "idPrefix": "msr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "433-444", "year": "2019", "issn": null, "isbn": "978-1-7281-3412-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "341200a421", "articleId": "1dx9xNBxQGs", "__typename": "AdjacentArticleType" }, "next": { "fno": "341200a445", "articleId": "1dx9BGhY9K8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisa/2013/0602/0/06579457", "title": "A Git Source Repository Analysis Tool Based on a Novel Branch-Oriented Approach", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579457/12OmNCctf8J", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227209", "title": "Developer prioritization in bug repositories", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227209/12OmNvEhg3H", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2013/5056/0/5056a193", "title": "DevNet: Exploring Developer Collaboration in Heterogeneous Networks of Bug Repositories", "doi": null, "abstractUrl": "/proceedings-article/esem/2013/5056a193/12OmNvJXeyY", "parentPublication": { "id": "proceedings/esem/2013/5056/0", "title": "2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2018/5716/0/571601a426", "title": "Large-Scale Analysis of the Co-commit Patterns of the Active Developers in GitHub's Top Repositories", "doi": null, "abstractUrl": "/proceedings-article/msr/2018/571601a426/17D45WHONpE", "parentPublication": { "id": "proceedings/msr/2018/5716/0", "title": "2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2018/6834/0/08530644", "title": "Influence Indexing of Developers, Repositories, Technologies and Programming Languages on Social Coding Community GitHub", "doi": null, "abstractUrl": "/proceedings-article/ic3/2018/08530644/17D45WK5AnS", "parentPublication": { "id": "proceedings/ic3/2018/6834/0", "title": "2018 Eleventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2018/8292/0/829200a001", "title": "RepoVis: Visual Overviews and Full-Text Search in Software Repositories", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2018/829200a001/17D45WrVg7m", "parentPublication": { "id": "proceedings/vissoft/2018/8292/0", "title": "2018 IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2019/0591/0/08668034", "title": "Knowledge Graphing Git Repositories: A Preliminary Study", "doi": null, "abstractUrl": "/proceedings-article/saner/2019/08668034/18uSw0U0Wre", "parentPublication": { "id": "proceedings/saner/2019/0591/0", "title": "2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068629", "title": "PIMan: A Comprehensive Approach for Establishing Plausible Influence among Software Repositories", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068629/1LKx4G14MgM", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068714", "title": "ASONAM 2022 Tutorial I: Mining and Analysing Collaboration in git Repositories with git2net", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068714/1LKx8ddFb1K", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800b082", "title": "Developer Reputation Estimator (DRE)", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800b082/1gysWhpgJIQ", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oFGJ3B4U8w", "title": "2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE)", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oFGKLPB8ly", "doi": "10.1109/ISSRE5003.2020.00016", "title": "Understanding Merge Conflicts and Resolutions in Git Rebases", "normalizedTitle": "Understanding Merge Conflicts and Resolutions in Git Rebases", "abstract": "Software merging is an important activity during software development. Merge conflicts may arise and degrade the software quality. Empirical studies on software merging are helpful to understand developers' needs and the challenges of detecting and resolving conflicts. Existing studies collect merges by identifying commits that have more than one parent commit. Different from these explicit merges, rebasing branches is used to merge other changes but rewrites the evolutionary history. Hence, existing studies fail to identify implicit merges performed by rebasing branches. Consequently, the results of these studies may fail to provide comprehensive insights on software merging. In our study, we leverage the recently updated APIs of GitHub to study rebase activities in the pull requests. Our study shows that rebasing is widely used in pull requests. And our results indicate that, to resolve textual conflicts, developers adopt similar strategies shown in existing studies on explicit merges. However, in 34.2% of non-conflict rebase scenarios, developers add new changes during the rebase process. And this indicates that there are some new challenges of validating rebases. Our results provide useful insights for improving the state-of-the-art techniques on resolving conflicts and validating rebases.", "abstracts": [ { "abstractType": "Regular", "content": "Software merging is an important activity during software development. Merge conflicts may arise and degrade the software quality. Empirical studies on software merging are helpful to understand developers' needs and the challenges of detecting and resolving conflicts. Existing studies collect merges by identifying commits that have more than one parent commit. Different from these explicit merges, rebasing branches is used to merge other changes but rewrites the evolutionary history. Hence, existing studies fail to identify implicit merges performed by rebasing branches. Consequently, the results of these studies may fail to provide comprehensive insights on software merging. In our study, we leverage the recently updated APIs of GitHub to study rebase activities in the pull requests. Our study shows that rebasing is widely used in pull requests. And our results indicate that, to resolve textual conflicts, developers adopt similar strategies shown in existing studies on explicit merges. However, in 34.2% of non-conflict rebase scenarios, developers add new changes during the rebase process. And this indicates that there are some new challenges of validating rebases. Our results provide useful insights for improving the state-of-the-art techniques on resolving conflicts and validating rebases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Software merging is an important activity during software development. Merge conflicts may arise and degrade the software quality. Empirical studies on software merging are helpful to understand developers' needs and the challenges of detecting and resolving conflicts. Existing studies collect merges by identifying commits that have more than one parent commit. Different from these explicit merges, rebasing branches is used to merge other changes but rewrites the evolutionary history. Hence, existing studies fail to identify implicit merges performed by rebasing branches. Consequently, the results of these studies may fail to provide comprehensive insights on software merging. In our study, we leverage the recently updated APIs of GitHub to study rebase activities in the pull requests. Our study shows that rebasing is widely used in pull requests. And our results indicate that, to resolve textual conflicts, developers adopt similar strategies shown in existing studies on explicit merges. However, in 34.2% of non-conflict rebase scenarios, developers add new changes during the rebase process. And this indicates that there are some new challenges of validating rebases. Our results provide useful insights for improving the state-of-the-art techniques on resolving conflicts and validating rebases.", "fno": "987000a070", "keywords": [ "Application Program Interfaces", "Configuration Management", "Merging", "Software Development Management", "Software Maintenance", "Software Quality", "Git Rebases", "Software Merging", "Software Development", "Software Quality", "Explicit Merges", "Rebasing Branches", "Textual Conflicts", "Nonconflict Rebase Scenarios", "Rebase Process", "Git Hub", "Merging", "Software Quality", "Tools", "Software", "Software Reliability", "History", "Software Development Management", "Software Evolution", "Software Merging", "Merge Conflicts" ], "authors": [ { "affiliation": "National University of Defense Technology,Laboratory of Software Engineering for Complex Systems, College of Computer,Changsha,China,410073", "fullName": "Tao Ji", "givenName": "Tao", "surname": "Ji", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,Laboratory of Software Engineering for Complex Systems, College of Computer,Changsha,China,410073", "fullName": "Liqian Chen", "givenName": "Liqian", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,Laboratory of Software Engineering for Complex Systems, College of Computer,Changsha,China,410073", "fullName": "Xin Yi", "givenName": "Xin", "surname": "Yi", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,Laboratory of Software Engineering for Complex Systems, College of Computer,Changsha,China,410073", "fullName": "Xiaoguang Mao", "givenName": "Xiaoguang", "surname": "Mao", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "70-80", "year": "2020", "issn": null, "isbn": "978-1-7281-9870-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "987000a059", "articleId": "1oFGKIdVdQI", "__typename": "AdjacentArticleType" }, "next": { "fno": "987000a081", "articleId": "1oFGJFcE2ys", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icse/2012/1066/0/06227180", "title": "Improving early detection of software merge conflicts", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227180/12OmNvA1h1c", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a467", "title": "Software Practitioner Perspectives on Merge Conflicts and Resolutions", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a467/12OmNy2rS5W", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2017/4039/0/4039a058", "title": "An Empirical Examination of the Relationship between Code Smells and Merge Conflicts", "doi": null, "abstractUrl": "/proceedings-article/esem/2017/4039a058/12OmNylsZW0", "parentPublication": { "id": "proceedings/esem/2017/4039/0", "title": "2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/01/09684709", "title": "Spork: Structured Merge for Java With Formatting Preservation", "doi": null, "abstractUrl": "/journal/ts/2023/01/09684709/1AgmpjY15T2", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2021/0337/0/033700b291", "title": "SoManyConflicts: Resolve Many Merge Conflicts Interactively and Systematically", "doi": null, "abstractUrl": "/proceedings-article/ase/2021/033700b291/1AjT2Y7Qw0M", "parentPublication": { "id": "proceedings/ase/2021/0337/0", "title": "2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09814963", "title": "DeepMerge: Learning to Merge Programs", "doi": null, "abstractUrl": "/journal/ts/2023/04/09814963/1EJBsSRqO88", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2019/2968/0/08870173", "title": "Predicting Merge Conflicts in Collaborative Software Development", "doi": null, "abstractUrl": "/proceedings-article/esem/2019/08870173/1ecCNXNGRHy", "parentPublication": { "id": "proceedings/esem/2019/2968/0", "title": "2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a174", "title": "Detecting Semantic Conflicts via Automated Behavior Change Detection", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a174/1oqKNcyupMc", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2020/7122/0/712200a320", "title": "Towards Understanding and Fixing Upstream Merge Induced Conflicts in Divergent Forks: An Industrial Case Study", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2020/712200a320/1pcSGEdYiWY", "parentPublication": { "id": "proceedings/icse-companion/2020/7122/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seip/2020/7123/0/712300a172", "title": "Towards Understanding and Fixing Upstream Merge Induced Conflicts in Divergent Forks: An Industrial Case Study", "doi": null, "abstractUrl": "/proceedings-article/icse-seip/2020/712300a172/1pov0l4TjdC", "parentPublication": { "id": "proceedings/icse-seip/2020/7123/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwGIcBP", "title": "2011 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS)", "acronym": "codes-isss", "groupId": "1000314", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNC4eSzV", "doi": "10.1145/2039370.2039417", "title": "Dominator homomorphism based code matching for source-level simulation of embedded software", "normalizedTitle": "Dominator homomorphism based code matching for source-level simulation of embedded software", "abstract": "Relating optimized binary code and the source-level statements from which it was created can be challenging if an optimizing compiler was used to create the machine code. Moreover, this relation is crucial if a compiler-optimized program must be debugged or results from a low-level analysis need to be mapped to the source code to perform manual optimizations. Existing approaches for the debugging of optimized code usually require pervasive changes in the compiler and hence are not available for all architectures. Methods for analyzing non-functional properties of software components in complex systems (i.e. execution time and power consumption) often have similar constraints, if compiler optimizations are supported at all. This paper proposes two novel concepts to overcome these issues. To precisely relate source-level statements with the respective compiler-generated machine code, a method to reconstruct and disambiguate debug information is presented. Based on this information, an instrumentation technique is introduced which allows accurately simulating the execution of optimized binary code at the source code level. Experimental results show that by using this technique, arbitrary low-level properties of software components can be evaluated in a fast and accurate manner without running the software on the actual target hardware.", "abstracts": [ { "abstractType": "Regular", "content": "Relating optimized binary code and the source-level statements from which it was created can be challenging if an optimizing compiler was used to create the machine code. Moreover, this relation is crucial if a compiler-optimized program must be debugged or results from a low-level analysis need to be mapped to the source code to perform manual optimizations. Existing approaches for the debugging of optimized code usually require pervasive changes in the compiler and hence are not available for all architectures. Methods for analyzing non-functional properties of software components in complex systems (i.e. execution time and power consumption) often have similar constraints, if compiler optimizations are supported at all. This paper proposes two novel concepts to overcome these issues. To precisely relate source-level statements with the respective compiler-generated machine code, a method to reconstruct and disambiguate debug information is presented. Based on this information, an instrumentation technique is introduced which allows accurately simulating the execution of optimized binary code at the source code level. Experimental results show that by using this technique, arbitrary low-level properties of software components can be evaluated in a fast and accurate manner without running the software on the actual target hardware.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Relating optimized binary code and the source-level statements from which it was created can be challenging if an optimizing compiler was used to create the machine code. Moreover, this relation is crucial if a compiler-optimized program must be debugged or results from a low-level analysis need to be mapped to the source code to perform manual optimizations. Existing approaches for the debugging of optimized code usually require pervasive changes in the compiler and hence are not available for all architectures. Methods for analyzing non-functional properties of software components in complex systems (i.e. execution time and power consumption) often have similar constraints, if compiler optimizations are supported at all. This paper proposes two novel concepts to overcome these issues. To precisely relate source-level statements with the respective compiler-generated machine code, a method to reconstruct and disambiguate debug information is presented. Based on this information, an instrumentation technique is introduced which allows accurately simulating the execution of optimized binary code at the source code level. Experimental results show that by using this technique, arbitrary low-level properties of software components can be evaluated in a fast and accurate manner without running the software on the actual target hardware.", "fno": "06062303", "keywords": [ "Optimization", "Binary Codes", "Program Processors", "Timing", "Debugging", "Computer Architecture" ], "authors": [ { "affiliation": "FZI Forschungszentrum Inf., Karlsruhe, Germany", "fullName": "S. Stattelmann", "givenName": "S.", "surname": "Stattelmann", "__typename": "ArticleAuthorType" }, { "affiliation": "FZI Forschungszentrum Inf., Karlsruhe, Germany", "fullName": "O. Bringmann", "givenName": "O.", "surname": "Bringmann", "__typename": "ArticleAuthorType" }, { "affiliation": "FZI Forschungszentrum Inf., Karlsruhe, Germany", "fullName": "W. Rosenstiel", "givenName": "W.", "surname": "Rosenstiel", "__typename": "ArticleAuthorType" } ], "idPrefix": "codes-isss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "305-314", "year": "2011", "issn": null, "isbn": "978-1-4503-0715-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06062301", "articleId": "12OmNyKrHfI", "__typename": "AdjacentArticleType" }, "next": { "fno": "06062304", "articleId": "12OmNCfjepQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgo/2016/3778/0/07559551", "title": "Re-constructing high-level information for language-specific binary re-optimization", "doi": null, "abstractUrl": "/proceedings-article/cgo/2016/07559551/12OmNqGRGk3", "parentPublication": { "id": "proceedings/cgo/2016/3778/0", "title": "2016 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2011/1048/0/06037466", "title": "Control-Flow-Driven Source Level Timing Annotation for Embedded Software Models on Transaction Level", "doi": null, "abstractUrl": "/proceedings-article/dsd/2011/06037466/12OmNqJq4x5", "parentPublication": { "id": "proceedings/dsd/2011/1048/0", "title": "2011 14th Euromicro Conference on Digital System Design. Architectures, Methods and Tools. (DSD 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2012/2145/0/06176501", "title": "Accurate source-level simulation of embedded software with respect to compiler optimizations", "doi": null, "abstractUrl": "/proceedings-article/date/2012/06176501/12OmNwFicSZ", "parentPublication": { "id": "proceedings/date/2012/2145/0", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsid/2004/2072/0/20720261", "title": "Energy-Optimizing Source Code Transformations for OS-driven Embedded Software", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2004/20720261/12OmNy5hRmK", "parentPublication": { "id": "proceedings/vlsid/2004/2072/0", "title": "VLSI Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2016/3848/0/3848a167", "title": "Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers", "doi": null, "abstractUrl": "/proceedings-article/scam/2016/3848a167/12OmNzlD9s4", "parentPublication": { "id": "proceedings/scam/2016/3848/0", "title": "2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2018/9403/0/940300a054", "title": "Mapping Exceptions to High-Level Source Code on a Heterogeneous Architecture", "doi": null, "abstractUrl": "/proceedings-article/paap/2018/940300a054/19JE7WFZCy4", "parentPublication": { "id": "proceedings/paap/2018/9403/0", "title": "2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2021/2603/0/260300a288", "title": "SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries", "doi": null, "abstractUrl": "/proceedings-article/issrew/2021/260300a288/1AZO62bGrNm", "parentPublication": { "id": "proceedings/issrew/2021/2603/0", "title": "2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b100", "title": "BinDeep: Binary to Source Code Matching Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b100/1BBzAffULXG", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1995/2568/0/01383152", "title": "A Web Interface to Parallel Program Source Code Archetypes", "doi": null, "abstractUrl": "/proceedings-article/sc/1995/01383152/1D884qTuS3K", "parentPublication": { "id": "proceedings/sc/1995/2568/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2022/7408/0/740800a258", "title": "What Makefile? Detecting Compiler Information Without Source Using The Code Property Graph", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2022/740800a258/1Lxf3xQHXt6", "parentPublication": { "id": "proceedings/tps-isa/2022/7408/0", "title": "2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz4BdvU", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNqJq4ED", "doi": "10.1109/ASE.2017.8115645", "title": "In-memory fuzzing for binary code similarity analysis", "normalizedTitle": "In-memory fuzzing for binary code similarity analysis", "abstract": "Detecting similar functions in binary executables serves as a foundation for many binary code analysis and reuse tasks. By far, recognizing similar components in binary code remains a challenge. Existing research employs either static or dynamic approaches to capture program syntax or semantics-level features for comparison. However, there exist multiple design limitations in previous work, which result in relatively high cost, low accuracy and scalability, and thus severely impede their practical use. In this paper, we present a novel method that leverages in-memory fuzzing for binary code similarity analysis. Our prototype tool IMF-SIM applies in-memory fuzzing to launch analysis towards every function and collect traces of different kinds of program behaviors. The similarity score of two behavior traces is computed according to their longest common subsequence. To compare two functions, a feature vector is generated, whose elements are the similarity scores of the behavior trace-level comparisons. We train a machine learning model through labeled feature vectors; later, for a given feature vector by comparing two functions, the trained model gives a final score, representing the similarity score of the two functions. We evaluate IMF-SIM against binaries compiled by different compilers, optimizations, and commonly-used obfuscation methods, in total over one thousand binary executables. Our evaluation shows that IMF-SIM notably outperforms existing tools with higher accuracy and broader application scopes.", "abstracts": [ { "abstractType": "Regular", "content": "Detecting similar functions in binary executables serves as a foundation for many binary code analysis and reuse tasks. By far, recognizing similar components in binary code remains a challenge. Existing research employs either static or dynamic approaches to capture program syntax or semantics-level features for comparison. However, there exist multiple design limitations in previous work, which result in relatively high cost, low accuracy and scalability, and thus severely impede their practical use. In this paper, we present a novel method that leverages in-memory fuzzing for binary code similarity analysis. Our prototype tool IMF-SIM applies in-memory fuzzing to launch analysis towards every function and collect traces of different kinds of program behaviors. The similarity score of two behavior traces is computed according to their longest common subsequence. To compare two functions, a feature vector is generated, whose elements are the similarity scores of the behavior trace-level comparisons. We train a machine learning model through labeled feature vectors; later, for a given feature vector by comparing two functions, the trained model gives a final score, representing the similarity score of the two functions. We evaluate IMF-SIM against binaries compiled by different compilers, optimizations, and commonly-used obfuscation methods, in total over one thousand binary executables. Our evaluation shows that IMF-SIM notably outperforms existing tools with higher accuracy and broader application scopes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Detecting similar functions in binary executables serves as a foundation for many binary code analysis and reuse tasks. By far, recognizing similar components in binary code remains a challenge. Existing research employs either static or dynamic approaches to capture program syntax or semantics-level features for comparison. However, there exist multiple design limitations in previous work, which result in relatively high cost, low accuracy and scalability, and thus severely impede their practical use. In this paper, we present a novel method that leverages in-memory fuzzing for binary code similarity analysis. Our prototype tool IMF-SIM applies in-memory fuzzing to launch analysis towards every function and collect traces of different kinds of program behaviors. The similarity score of two behavior traces is computed according to their longest common subsequence. To compare two functions, a feature vector is generated, whose elements are the similarity scores of the behavior trace-level comparisons. We train a machine learning model through labeled feature vectors; later, for a given feature vector by comparing two functions, the trained model gives a final score, representing the similarity score of the two functions. We evaluate IMF-SIM against binaries compiled by different compilers, optimizations, and commonly-used obfuscation methods, in total over one thousand binary executables. Our evaluation shows that IMF-SIM notably outperforms existing tools with higher accuracy and broader application scopes.", "fno": "08115645", "keywords": [ "Binary Codes", "Tools", "Runtime", "Indexes", "Syntactics", "In Memory Fuzzing", "Code Similarity", "Reverse Engineering", "Taint Analysis" ], "authors": [ { "affiliation": "The Pennsylvania State University, University Park, PA 16802, USA", "fullName": "Shuai Wang", "givenName": "Shuai", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Pennsylvania State University, University Park, PA 16802, USA", "fullName": "Dinghao Wu", "givenName": "Dinghao", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "319-330", "year": "2017", "issn": null, "isbn": "978-1-5386-2684-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08115644", "articleId": "12OmNArthdK", "__typename": "AdjacentArticleType" }, "next": { "fno": "08115646", "articleId": "12OmNqH9hjL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457g345", "title": "Cross-Modality Binary Code Learning via Fusion Similarity Hashing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g345/12OmNAu1Fla", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d714", "title": "Fast Similarity Search Using Multiple Binary Codes", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d714/12OmNBA9oB4", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2017/12/07823022", "title": "Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection", "doi": null, "abstractUrl": "/journal/ts/2017/12/07823022/13rRUxC0SxE", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2019/11/08338420", "title": "Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation", "doi": null, "abstractUrl": "/journal/ts/2019/11/08338420/13rRUy3xY9Y", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2017/06/msp2017060077", "title": "Securing Binary Code", "doi": null, "abstractUrl": "/magazine/sp/2017/06/msp2017060077/13rRUyXKxSM", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2021/0337/0/033700b056", "title": "Binary Code Similarity Detection", "doi": null, "abstractUrl": "/proceedings-article/ase/2021/033700b056/1AjTfPAssCs", "parentPublication": { "id": "proceedings/ase/2021/0337/0", "title": "2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09813408", "title": "Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned", "doi": null, "abstractUrl": "/journal/ts/2023/04/09813408/1EECXnk0KK4", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2019/0676/0/067600a225", "title": "I/O Interaction Analysis of Binary Code", "doi": null, "abstractUrl": "/proceedings-article/wetice/2019/067600a225/1cJ1smIXiJG", "parentPublication": { "id": "proceedings/wetice/2019/0676/0", "title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/06/08721093", "title": "A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison", "doi": null, "abstractUrl": "/journal/ts/2021/06/08721093/1mq8psKKhiM", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2021/3572/0/357200a224", "title": "Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection", "doi": null, "abstractUrl": "/proceedings-article/dsn/2021/357200a224/1vQDqTiwni8", "parentPublication": { "id": "proceedings/dsn/2021/3572/0", "title": "2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAS9zx8", "title": "2012 19th Working Conference on Reverse Engineering", "acronym": "wcre", "groupId": "1000635", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNroijjS", "doi": "10.1109/WCRE.2012.11", "title": "Structured Binary Editing with a CFG Transformation Algebra", "normalizedTitle": "Structured Binary Editing with a CFG Transformation Algebra", "abstract": "Binary modification allows users to alter existing code or inject new code into programs without requiring source code, symbols, or debugging information. It is critically important that such modification not accidentally create a structurally invalid binary that has illegal control flow or executes invalid instructions. Unfortunately, current modification tools do not make this guarantee, instead relying on the user to manually ensure the modified binary is valid. In addition, they fail to provide high-level abstractions of the binary (e.g., functions), instead requiring the user to have a deep understanding of the idiosyncrasies of the instruction set and the behavior of the program. We present structured binary editing, which allows users to modify a program binary by modifying its control flow graph (CFG). We define an algebra of CFG transformations that is closed under a CFG validity constraint, thus ensuring that users can arbitrarily compose these transformations while preserving structural validity. We have implemented structured binary editing in the Dyninst binary analysis and instrumentation framework, creating a high-level binary modification toolkit. We demonstrate the usefulness of our approach by creating a hot patching tool that closes three vulnerabilities in a running, unmodified Apache HTTPD server without interrupting the server's execution.", "abstracts": [ { "abstractType": "Regular", "content": "Binary modification allows users to alter existing code or inject new code into programs without requiring source code, symbols, or debugging information. It is critically important that such modification not accidentally create a structurally invalid binary that has illegal control flow or executes invalid instructions. Unfortunately, current modification tools do not make this guarantee, instead relying on the user to manually ensure the modified binary is valid. In addition, they fail to provide high-level abstractions of the binary (e.g., functions), instead requiring the user to have a deep understanding of the idiosyncrasies of the instruction set and the behavior of the program. We present structured binary editing, which allows users to modify a program binary by modifying its control flow graph (CFG). We define an algebra of CFG transformations that is closed under a CFG validity constraint, thus ensuring that users can arbitrarily compose these transformations while preserving structural validity. We have implemented structured binary editing in the Dyninst binary analysis and instrumentation framework, creating a high-level binary modification toolkit. We demonstrate the usefulness of our approach by creating a hot patching tool that closes three vulnerabilities in a running, unmodified Apache HTTPD server without interrupting the server's execution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Binary modification allows users to alter existing code or inject new code into programs without requiring source code, symbols, or debugging information. It is critically important that such modification not accidentally create a structurally invalid binary that has illegal control flow or executes invalid instructions. Unfortunately, current modification tools do not make this guarantee, instead relying on the user to manually ensure the modified binary is valid. In addition, they fail to provide high-level abstractions of the binary (e.g., functions), instead requiring the user to have a deep understanding of the idiosyncrasies of the instruction set and the behavior of the program. We present structured binary editing, which allows users to modify a program binary by modifying its control flow graph (CFG). We define an algebra of CFG transformations that is closed under a CFG validity constraint, thus ensuring that users can arbitrarily compose these transformations while preserving structural validity. We have implemented structured binary editing in the Dyninst binary analysis and instrumentation framework, creating a high-level binary modification toolkit. We demonstrate the usefulness of our approach by creating a hot patching tool that closes three vulnerabilities in a running, unmodified Apache HTTPD server without interrupting the server's execution.", "fno": "4891a009", "keywords": [ "Algebra", "Instruments", "Cloning", "Runtime", "Binary Codes", "Debugging", "Libraries", "Binary Validity", "Binary Modification", "Binary Editing", "Graph Transformations" ], "authors": [ { "affiliation": null, "fullName": "Andrew R. Bernat", "givenName": "Andrew R.", "surname": "Bernat", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Barton P. Miller", "givenName": "Barton P.", "surname": "Miller", "__typename": "ArticleAuthorType" } ], "idPrefix": "wcre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "9-18", "year": "2012", "issn": "1095-1350", "isbn": "978-1-4673-4536-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4891a005", "articleId": "12OmNxYtu7W", "__typename": "AdjacentArticleType" }, "next": { "fno": "4891a019", "articleId": "12OmNyGbIfn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/colcom/2006/0428/0/04207557", "title": "View-centric Operational Transformation for Collaborative Editing", "doi": null, "abstractUrl": "/proceedings-article/colcom/2006/04207557/12OmNAk5HO2", "parentPublication": { "id": "proceedings/colcom/2006/0428/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/colcom/2006/0428/0/04207539", "title": "Tombstone Transformation Functions for Ensuring Consistency in Collaborative Editing Systems", "doi": null, "abstractUrl": "/proceedings-article/colcom/2006/04207539/12OmNvkYxcp", "parentPublication": { "id": "proceedings/colcom/2006/0428/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2013/2144/2/2144b159", "title": "A Hybrid Approach for Control Flow Graph Construction from Binary Code", "doi": null, "abstractUrl": "/proceedings-article/apsec/2013/2144b159/12OmNxFaLfu", "parentPublication": { "id": "apsec/2013/2144/2", "title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a053", "title": "Finite Element Mesh Editing through CAD Operations", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a053/12OmNxvwoVJ", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2012/4810/0/4810a039", "title": "BTMD: A Framework of Binary Translation Based Malcode Detector", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2012/4810a039/12OmNzVGcTW", "parentPublication": { "id": "proceedings/cyberc/2012/4810/0", "title": "2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a097", "title": "Lightweight Structured Visualization of Assembler Control Flow Based on Regular Expressions", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a097/12OmNzXFoAm", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1982/01/01702900", "title": "The Programmer's Apprentice: Knowledge Based Program Editing", "doi": null, "abstractUrl": "/journal/ts/1982/01/01702900/13rRUxBJho6", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1977/06/01702469", "title": "The Evolution of Programs: Automatic Program Modification", "doi": null, "abstractUrl": "/journal/ts/1977/06/01702469/13rRUxCitzW", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2019/11/08338420", "title": "Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation", "doi": null, "abstractUrl": "/journal/ts/2019/11/08338420/13rRUy3xY9Y", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2021/9630/0/963000a131", "title": "Binary level toolchain provenance identification with graph neural networks", "doi": null, "abstractUrl": "/proceedings-article/saner/2021/963000a131/1twfpkc3kfC", "parentPublication": { "id": "proceedings/saner/2021/9630/0", "title": "2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqyUUIi", "title": "Design, Automation & Test in Europe Conference & Exhibition", "acronym": "date", "groupId": "1000198", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwFicSZ", "doi": "10.1109/DATE.2012.6176501", "title": "Accurate source-level simulation of embedded software with respect to compiler optimizations", "normalizedTitle": "Accurate source-level simulation of embedded software with respect to compiler optimizations", "abstract": "Source code instrumentation is a widely used method to generate fast software simulation models by annotating timing information into application source code. Source-level simulation models can be easily integrated into SystemC based simulation environment for fast simulation of complex multiprocessor systems. The accurate back-annotation of the timing information relies on the mapping between source code and binary code. The compiler optimizations might make it hard to get accurate mapping information. This paper addresses the mapping problems caused by complex compiler optimizations, which are the main source of simulation errors. To obtain accurate mapping information, we propose a method called fine-grained flow mapping that establishes a mapping between sequences of control flow of source code and binary code. In case that the code structure of a program is heavily altered by compiler optimizations, we propose to replace the altered part of the source code with functionally-equivalent IR-level code which has an optimized structure, leading to Partly Optimized Source Code (POSC). Then the flow mapping can be established between the POSC and the binary code and the timing information is back-annotated to the POSC. Our experiments demonstrate the accuracy and speed of simulation models generated by our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Source code instrumentation is a widely used method to generate fast software simulation models by annotating timing information into application source code. Source-level simulation models can be easily integrated into SystemC based simulation environment for fast simulation of complex multiprocessor systems. The accurate back-annotation of the timing information relies on the mapping between source code and binary code. The compiler optimizations might make it hard to get accurate mapping information. This paper addresses the mapping problems caused by complex compiler optimizations, which are the main source of simulation errors. To obtain accurate mapping information, we propose a method called fine-grained flow mapping that establishes a mapping between sequences of control flow of source code and binary code. In case that the code structure of a program is heavily altered by compiler optimizations, we propose to replace the altered part of the source code with functionally-equivalent IR-level code which has an optimized structure, leading to Partly Optimized Source Code (POSC). Then the flow mapping can be established between the POSC and the binary code and the timing information is back-annotated to the POSC. Our experiments demonstrate the accuracy and speed of simulation models generated by our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Source code instrumentation is a widely used method to generate fast software simulation models by annotating timing information into application source code. Source-level simulation models can be easily integrated into SystemC based simulation environment for fast simulation of complex multiprocessor systems. The accurate back-annotation of the timing information relies on the mapping between source code and binary code. The compiler optimizations might make it hard to get accurate mapping information. This paper addresses the mapping problems caused by complex compiler optimizations, which are the main source of simulation errors. To obtain accurate mapping information, we propose a method called fine-grained flow mapping that establishes a mapping between sequences of control flow of source code and binary code. In case that the code structure of a program is heavily altered by compiler optimizations, we propose to replace the altered part of the source code with functionally-equivalent IR-level code which has an optimized structure, leading to Partly Optimized Source Code (POSC). Then the flow mapping can be established between the POSC and the binary code and the timing information is back-annotated to the POSC. Our experiments demonstrate the accuracy and speed of simulation models generated by our approach.", "fno": "06176501", "keywords": [ "Program Compilers", "C Language", "Digital Simulation", "Multiprocessing Systems", "POSC", "Source Level Simulation Model", "Embedded Software", "Compiler Optimizations", "Source Code Instrumentation", "Software Simulation Models", "Timing Information Back Annotation", "Application Source Code", "System C Based Simulation Environment", "Complex Multiprocessor System Simulation", "Source Code Binary Code Mapping", "Fine Grained Flow Mapping", "Source Code Binary Code Control Flow", "IR Level Code", "Partly Optimized Source Code", "Timing", "Optimization", "Binary Codes", "Accuracy", "Instruments", "Debugging", "Transforms" ], "authors": [], "idPrefix": "date", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-03-01T00:00:00", "pubType": "proceedings", "pages": "382-387", "year": "2012", "issn": "1530-1591", "isbn": "978-1-4577-2145-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06176500", "articleId": "12OmNwtWfOH", "__typename": "AdjacentArticleType" }, "next": { "fno": "06176502", "articleId": "12OmNxymo6u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isa/2008/3126/0/3126a020", "title": "A Security Protocol Compiler Generating C Source Codes", "doi": null, "abstractUrl": "/proceedings-article/isa/2008/3126a020/12OmNBVIUzc", "parentPublication": { "id": "proceedings/isa/2008/3126/0", "title": "2008 International Conference on Information Security and Assurance (ISA '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2011/4208/0/05763044", "title": "Fast and accurate resource conflict simulation for performance analysis of multi-core systems", "doi": null, "abstractUrl": "/proceedings-article/date/2011/05763044/12OmNCd2rNl", "parentPublication": { "id": "proceedings/date/2011/4208/0", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2011/4208/0/05763045", "title": "An approach to improve accuracy of source-level TLMs of embedded software", "doi": null, "abstractUrl": "/proceedings-article/date/2011/05763045/12OmNqyUUAT", "parentPublication": { "id": "proceedings/date/2011/4208/0", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2011/4356/0/05764678", "title": "Automated programmable control and parameterization of compiler optimizations", "doi": null, "abstractUrl": "/proceedings-article/cgo/2011/05764678/12OmNrY3LAf", "parentPublication": { "id": "proceedings/cgo/2011/4356/0", "title": "2011 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2012/2145/0/06176500", "title": "Hybrid source-level simulation of data caches using abstract cache models", "doi": null, "abstractUrl": "/proceedings-article/date/2012/06176500/12OmNwtWfOH", "parentPublication": { "id": "proceedings/date/2012/2145/0", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr/2010/4321/0/4321a117", "title": "Co-evolving Annotations and Source Code through Smart Annotations", "doi": null, "abstractUrl": "/proceedings-article/csmr/2010/4321a117/12OmNxEBzjj", "parentPublication": { "id": "proceedings/csmr/2010/4321/0", "title": "2010 14th European Conference on Software Maintenance and Reengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtcsa/2009/3787/0/3787a022", "title": "Flow Analysis on Intermediate Source Code for WCET Estimation of Compiler-Optimized Programs", "doi": null, "abstractUrl": "/proceedings-article/rtcsa/2009/3787a022/12OmNyugz23", "parentPublication": { "id": "proceedings/rtcsa/2009/3787/0", "title": "2009 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2011/4575/0/4575a231", "title": "GSM: An Efficient Code Generation Algorithm for Dynamic Binary Translator", "doi": null, "abstractUrl": "/proceedings-article/paap/2011/4575a231/12OmNzC5Tlc", "parentPublication": { "id": "proceedings/paap/2011/4575/0", "title": "Parallel Architectures, Algorithms and Programming, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2019/0591/0/08667977", "title": "Open-Source License Violations of Binary Software at Large Scale", "doi": null, "abstractUrl": "/proceedings-article/saner/2019/08667977/18uStMbh7eo", "parentPublication": { "id": "proceedings/saner/2019/0591/0", "title": "2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222367", "title": "CcNav: Understanding Compiler Optimizations in Binary Code", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222367/1nTqwBnSj6w", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxuXcvK", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "acronym": "icsme", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxbW4QJ", "doi": "10.1109/ICSME.2017.59", "title": "Semantics-Aware Machine Learning for Function Recognition in Binary Code", "normalizedTitle": "Semantics-Aware Machine Learning for Function Recognition in Binary Code", "abstract": "Function recognition in program binaries serves as the foundation for many binary instrumentation and analysis tasks. However, as binaries are usually stripped before distribution, function information is indeed absent in most binaries. By far, identifying functions in stripped binaries remains a challenge. Recent research work proposes to recognize functions in binary code through machine learning techniques. The recognition model, including typical function entry point patterns, is automatically constructed through learning. However, we observed that as previous work only leverages syntax-level features to train the model, binary obfuscation techniques can undermine the pre-learned models in real-world usage scenarios. In this paper, we propose FID, a semantics-based method to recognize functions in stripped binaries. We leverage symbolic execution to generate semantic information and learn the function recognition model through well-performing machine learning techniques.FID extracts semantic information from binary code and, therefore, is effectively adapted to different compilers and optimizations. Moreover, we also demonstrate that FID has high recognition accuracy on binaries transformed by widely-used obfuscation techniques. We evaluate FID with over four thousand test cases. Our evaluation shows that FID is comparable with previous work on normal binaries and it notably outperforms existing tools on obfuscated code.", "abstracts": [ { "abstractType": "Regular", "content": "Function recognition in program binaries serves as the foundation for many binary instrumentation and analysis tasks. However, as binaries are usually stripped before distribution, function information is indeed absent in most binaries. By far, identifying functions in stripped binaries remains a challenge. Recent research work proposes to recognize functions in binary code through machine learning techniques. The recognition model, including typical function entry point patterns, is automatically constructed through learning. However, we observed that as previous work only leverages syntax-level features to train the model, binary obfuscation techniques can undermine the pre-learned models in real-world usage scenarios. In this paper, we propose FID, a semantics-based method to recognize functions in stripped binaries. We leverage symbolic execution to generate semantic information and learn the function recognition model through well-performing machine learning techniques.FID extracts semantic information from binary code and, therefore, is effectively adapted to different compilers and optimizations. Moreover, we also demonstrate that FID has high recognition accuracy on binaries transformed by widely-used obfuscation techniques. We evaluate FID with over four thousand test cases. Our evaluation shows that FID is comparable with previous work on normal binaries and it notably outperforms existing tools on obfuscated code.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Function recognition in program binaries serves as the foundation for many binary instrumentation and analysis tasks. However, as binaries are usually stripped before distribution, function information is indeed absent in most binaries. By far, identifying functions in stripped binaries remains a challenge. Recent research work proposes to recognize functions in binary code through machine learning techniques. The recognition model, including typical function entry point patterns, is automatically constructed through learning. However, we observed that as previous work only leverages syntax-level features to train the model, binary obfuscation techniques can undermine the pre-learned models in real-world usage scenarios. In this paper, we propose FID, a semantics-based method to recognize functions in stripped binaries. We leverage symbolic execution to generate semantic information and learn the function recognition model through well-performing machine learning techniques.FID extracts semantic information from binary code and, therefore, is effectively adapted to different compilers and optimizations. Moreover, we also demonstrate that FID has high recognition accuracy on binaries transformed by widely-used obfuscation techniques. We evaluate FID with over four thousand test cases. Our evaluation shows that FID is comparable with previous work on normal binaries and it notably outperforms existing tools on obfuscated code.", "fno": "0992a388", "keywords": [ "Binary Codes", "Learning Artificial Intelligence", "Program Diagnostics", "Binary Code", "Typical Function Entry Point Patterns", "Binary Obfuscation Techniques", "FID", "Semantic Information", "Function Recognition Model", "Semantics Aware Machine Learning", "Program Binaries", "Binary Instrumentation", "Analysis Tasks", "Function Information", "Syntax Level Features", "Semantics", "Tools", "Syntactics", "Binary Codes", "Registers", "Reverse Engineering", "Instruments", "Reverse Engineering", "Machine Learning", "Function Recognition" ], "authors": [ { "affiliation": null, "fullName": "Shuai Wang", "givenName": "Shuai", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pei Wang", "givenName": "Pei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dinghao Wu", "givenName": "Dinghao", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-09-01T00:00:00", "pubType": "proceedings", "pages": "388-398", "year": "2017", "issn": null, "isbn": "978-1-5386-0992-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0992a376", "articleId": "12OmNwK7o5f", "__typename": "AdjacentArticleType" }, "next": { "fno": "0992a399", "articleId": "12OmNAXxWSF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcre/2003/2027/0/20270014", "title": "An Experimentation Framework for Evaluating Disassembly and Decompilation Tools for C++ and Java", "doi": null, "abstractUrl": "/proceedings-article/wcre/2003/20270014/12OmNBTJIOr", "parentPublication": { "id": "proceedings/wcre/2003/2027/0", "title": "10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2016/3806/0/3806a438", "title": "Towards Accurate Binary Correspondence Using Runtime-Observed Values", "doi": null, "abstractUrl": "/proceedings-article/icsme/2016/3806a438/12OmNBU1jGW", "parentPublication": { "id": "proceedings/icsme/2016/3806/0", "title": "2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115645", "title": "In-memory fuzzing for binary code similarity analysis", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115645/12OmNqJq4ED", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2014/7425/1/07091315", "title": "Recovery of Object Oriented Features from C++ Binaries", "doi": null, "abstractUrl": "/proceedings-article/apsec/2014/07091315/12OmNyqiaMR", "parentPublication": { "id": "proceedings/apsec/2014/7425/1", "title": "2014 21st Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2018/7870/0/787000a104", "title": "BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsme/2018/787000a104/17D45XzbnLn", "parentPublication": { "id": "proceedings/icsme/2018/7870/0", "title": "2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2023/9336/0/933600a800", "title": "PyFET: Forensically Equivalent Transformation for Python Binary Decompilation", "doi": null, "abstractUrl": "/proceedings-article/sp/2023/933600a800/1Js0DmsXjQQ", "parentPublication": { "id": "proceedings/sp/2023/9336/0/", "title": "2023 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2019/0676/0/067600a225", "title": "I/O Interaction Analysis of Binary Code", "doi": null, "abstractUrl": "/proceedings-article/wetice/2019/067600a225/1cJ1smIXiJG", "parentPublication": { "id": "proceedings/wetice/2019/0676/0", "title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2020/5809/0/580900a088", "title": "CATI: Context-Assisted Type Inference from Stripped Binaries", "doi": null, "abstractUrl": "/proceedings-article/dsn/2020/580900a088/1lUFjbUg6oU", "parentPublication": { "id": "proceedings/dsn/2020/5809/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2020/9346/0/934600a152", "title": "Binary Analysis with Architecture and Code Section Detection using Supervised Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/spw/2020/934600a152/1pF6VRDoo9y", "parentPublication": { "id": "proceedings/spw/2020/9346/0", "title": "2020 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/04/09325042", "title": "Function Representations for Binary Similarity", "doi": null, "abstractUrl": "/journal/tq/2022/04/09325042/1qnQQIT9ys8", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1EpKBI0PpuM", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "acronym": "icpc", "groupId": "1832745", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1EpKCytuT04", "doi": "10.1145/3524610.3527900", "title": "Exploring GNN Based Program Embedding Technologies for Binary Related Tasks", "normalizedTitle": "Exploring GNN Based Program Embedding Technologies for Binary Related Tasks", "abstract": "With the rapid growth of program scale, program analysis, mainte-nance and optimization become increasingly diverse and complex. Applying learning-assisted methodologies onto program analysis has attracted ever-increasing attention. However, a large number of program factors including syntax structures, semantics, running platforms and compilation configurations block the effective re-alization of these methods. To overcome these obstacles, existing works prefer to be on a basis of source code or abstract syntax tree, but unfortunately are sub-optimal for binary-oriented analysis tasks closely related to the compilation process. To this end, we propose a new program analysis approach that aims at solving program-level and procedure-level tasks with one model, by taking advantage of the great power of graph neural networks from the level of binary code. By fusing the semantics of control flow graphs, data flow graphs and call graphs into one model, and embedding instructions and values simultaneously, our method can effectively work around emerging compilation-related problems. By testing the proposed method on two tasks, binary similarity detection and dead store prediction, the results show that our method is able to achieve as high accuracy as 83.25&#x0025;, and 82.77&#x0025;.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid growth of program scale, program analysis, mainte-nance and optimization become increasingly diverse and complex. Applying learning-assisted methodologies onto program analysis has attracted ever-increasing attention. However, a large number of program factors including syntax structures, semantics, running platforms and compilation configurations block the effective re-alization of these methods. To overcome these obstacles, existing works prefer to be on a basis of source code or abstract syntax tree, but unfortunately are sub-optimal for binary-oriented analysis tasks closely related to the compilation process. To this end, we propose a new program analysis approach that aims at solving program-level and procedure-level tasks with one model, by taking advantage of the great power of graph neural networks from the level of binary code. By fusing the semantics of control flow graphs, data flow graphs and call graphs into one model, and embedding instructions and values simultaneously, our method can effectively work around emerging compilation-related problems. By testing the proposed method on two tasks, binary similarity detection and dead store prediction, the results show that our method is able to achieve as high accuracy as 83.25&#x0025;, and 82.77&#x0025;.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid growth of program scale, program analysis, mainte-nance and optimization become increasingly diverse and complex. Applying learning-assisted methodologies onto program analysis has attracted ever-increasing attention. However, a large number of program factors including syntax structures, semantics, running platforms and compilation configurations block the effective re-alization of these methods. To overcome these obstacles, existing works prefer to be on a basis of source code or abstract syntax tree, but unfortunately are sub-optimal for binary-oriented analysis tasks closely related to the compilation process. To this end, we propose a new program analysis approach that aims at solving program-level and procedure-level tasks with one model, by taking advantage of the great power of graph neural networks from the level of binary code. By fusing the semantics of control flow graphs, data flow graphs and call graphs into one model, and embedding instructions and values simultaneously, our method can effectively work around emerging compilation-related problems. By testing the proposed method on two tasks, binary similarity detection and dead store prediction, the results show that our method is able to achieve as high accuracy as 83.25%, and 82.77%.", "fno": "929800a366", "keywords": [ "Computational Linguistics", "Data Flow Graphs", "Embedded Systems", "Flow Graphs", "Graph Theory", "Learning Artificial Intelligence", "Neural Nets", "Program Compilers", "Program Diagnostics", "Program Embedding Technologies", "Binary Related Tasks", "Program Scale", "Mainte Nance", "Optimization", "Applying Learning Assisted Methodologies", "Ever Increasing Attention", "Program Factors", "Syntax Structures", "Semantics", "Compilation Configurations", "Abstract Syntax Tree", "Binary Oriented Analysis Tasks", "Compilation Process", "Program Analysis Approach", "Solving Program Level", "Procedure Level Tasks", "Graph Neural Networks", "Binary Code", "Control Flow Graphs", "Data Flow Graphs", "Embedding Instructions", "Compilation Related Problems", "Binary Similarity Detection", "Dead Store Prediction", "Analytical Models", "Semantics", "Binary Codes", "Syntactics", "Data Models", "Graph Neural Networks", "Flow Graphs", "Graph Neural Network", "Program Embedding", "Binary Similarity De Tection", "Dead Store Detection" ], "authors": [ { "affiliation": "Peking University,Beijing,China", "fullName": "Yixin Guo", "givenName": "Yixin", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "TikTok Inc,Mountain View,USA", "fullName": "Pengcheng Li", "givenName": "Pengcheng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Beijing,China", "fullName": "Yingwei Luo", "givenName": "Yingwei", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Beijing,China", "fullName": "Xiaolin Wang", "givenName": "Xiaolin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Michigan Tech,Houghton,USA", "fullName": "Zhenlin Wang", "givenName": "Zhenlin", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "366-377", "year": "2022", "issn": null, "isbn": "978-1-4503-9298-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "929800a354", "articleId": "1EpKJNnPuU0", "__typename": "AdjacentArticleType" }, "next": { "fno": "929800a378", "articleId": "1EpKFrwYM9i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/spdp/1991/2310/0/0218291", "title": "Embedding all binary trees in the hypercube", "doi": null, "abstractUrl": "/proceedings-article/spdp/1991/0218291/12OmNBOlltr", "parentPublication": { "id": "proceedings/spdp/1991/2310/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115645", "title": "In-memory fuzzing for binary code similarity analysis", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115645/12OmNqJq4ED", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/1994/6960/0/00465240", "title": "A hybrid program knowledge base for static program analyzers", "doi": null, "abstractUrl": "/proceedings-article/apsec/1994/00465240/12OmNx4gUj4", "parentPublication": { "id": "proceedings/apsec/1994/6960/0", "title": "Proceedings of 1st Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800a091", "title": "RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800a091/1BBzh1cjDvq", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2022/7956/0/795600a374", "title": "Adding Context to Source Code Representations for Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icsme/2022/795600a374/1JeFimjeUtq", "parentPublication": { "id": "proceedings/icsme/2022/7956/0", "title": "2022 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222367", "title": "CcNav: Understanding Compiler Optimizations in Binary Code", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222367/1nTqwBnSj6w", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvidl/2020/9481/0/948100a255", "title": "Similarity Measure for Binary Function Based on Graph Mover&#x2019;s Distance", "doi": null, "abstractUrl": "/proceedings-article/cvidl/2020/948100a255/1pbe6Ii3FOU", "parentPublication": { "id": "proceedings/cvidl/2020/9481/0", "title": "2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a818", "title": "Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a818/1r549JhpD68", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a145", "title": "DCDFNE: build dataset to evaluate binary codes diffing tools and train deep learning models", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a145/1ua4OyhWPQs", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ctisc/2021/1868/0/186800a017", "title": "Searching for similar binary code based on the influence of basic block vertex", "doi": null, "abstractUrl": "/proceedings-article/ctisc/2021/186800a017/1wG6p1mCMwM", "parentPublication": { "id": "proceedings/ctisc/2021/1868/0", "title": "2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iHT5h1sAne", "title": "2019 IEEE Real-Time Systems Symposium (RTSS)", "acronym": "rtss", "groupId": "1000619", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iHT6zc0r4Y", "doi": "10.1109/RTSS46320.2019.00022", "title": "Reconciling Compiler Optimizations and WCET Estimation Using Iterative Compilation", "normalizedTitle": "Reconciling Compiler Optimizations and WCET Estimation Using Iterative Compilation", "abstract": "Static Worst-Case Execution Time (WCET) estimation techniques operate upon the binary code of a program in order to provide the necessary input for schedulability analysis techniques. Compilers used to generate this binary code include tens of optimizations, that can radically change the flow information of the program. Such information is hard to be maintained across optimization passes and may render automatic extraction of important flow information, such as loop bounds, impossible. Thus, compiler optimizations, especially the sophisticated optimizations of mainstream compilers, are typically avoided. In this work, we explore for the first time iterative-compilation techniques that reconcile compiler optimizations and static WCET estimation. We propose a novel learning technique that selects sequences of optimizations that minimize the WCET estimate of a given program. We experimentally evaluate the proposed technique using an industrial WCET estimation tool (AbsInt aiT) over a set of 46 benchmarks from four different benchmarks suites, including reference WCET benchmark applications, image processing kernels and telecommunication applications. Experimental results show that WCET estimates are reduced on average by 20.3% using the proposed technique, as compared to the best compiler optimization level applicable.", "abstracts": [ { "abstractType": "Regular", "content": "Static Worst-Case Execution Time (WCET) estimation techniques operate upon the binary code of a program in order to provide the necessary input for schedulability analysis techniques. Compilers used to generate this binary code include tens of optimizations, that can radically change the flow information of the program. Such information is hard to be maintained across optimization passes and may render automatic extraction of important flow information, such as loop bounds, impossible. Thus, compiler optimizations, especially the sophisticated optimizations of mainstream compilers, are typically avoided. In this work, we explore for the first time iterative-compilation techniques that reconcile compiler optimizations and static WCET estimation. We propose a novel learning technique that selects sequences of optimizations that minimize the WCET estimate of a given program. We experimentally evaluate the proposed technique using an industrial WCET estimation tool (AbsInt aiT) over a set of 46 benchmarks from four different benchmarks suites, including reference WCET benchmark applications, image processing kernels and telecommunication applications. Experimental results show that WCET estimates are reduced on average by 20.3% using the proposed technique, as compared to the best compiler optimization level applicable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Static Worst-Case Execution Time (WCET) estimation techniques operate upon the binary code of a program in order to provide the necessary input for schedulability analysis techniques. Compilers used to generate this binary code include tens of optimizations, that can radically change the flow information of the program. Such information is hard to be maintained across optimization passes and may render automatic extraction of important flow information, such as loop bounds, impossible. Thus, compiler optimizations, especially the sophisticated optimizations of mainstream compilers, are typically avoided. In this work, we explore for the first time iterative-compilation techniques that reconcile compiler optimizations and static WCET estimation. We propose a novel learning technique that selects sequences of optimizations that minimize the WCET estimate of a given program. We experimentally evaluate the proposed technique using an industrial WCET estimation tool (AbsInt aiT) over a set of 46 benchmarks from four different benchmarks suites, including reference WCET benchmark applications, image processing kernels and telecommunication applications. Experimental results show that WCET estimates are reduced on average by 20.3% using the proposed technique, as compared to the best compiler optimization level applicable.", "fno": "09052174", "keywords": [ "Learning Artificial Intelligence", "Optimising Compilers", "Scheduling", "Iterative Compilation", "Binary Code", "Static WCET Estimation", "Learning Technique", "Industrial WCET Estimation Tool", "Compiler Optimization", "Schedulability Analysis", "Static Worst Case Execution Time Estimation Techniques", "Worst Case Execution Time Estimation Compiler Optimizations Iterative Compilation" ], "authors": [ { "affiliation": "INSA, IETR, UMR 6164, France", "fullName": "Mickaël Dardaillon", "givenName": "Mickaël", "surname": "Dardaillon", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ Rennes, Inria, CNRS, IRISA, France", "fullName": "Stefanos Skalistis", "givenName": "Stefanos", "surname": "Skalistis", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ Rennes, Inria, CNRS, IRISA, France", "fullName": "Isabelle Puaut", "givenName": "Isabelle", "surname": "Puaut", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ Rennes, Inria, CNRS, IRISA, France", "fullName": "Steven Derrien", "givenName": "Steven", "surname": "Derrien", "__typename": "ArticleAuthorType" } ], "idPrefix": "rtss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "133-145", "year": "2019", "issn": null, "isbn": "978-1-7281-6463-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09052196", "articleId": "1iHT6GUixfG", "__typename": "AdjacentArticleType" }, "next": { "fno": "09052181", "articleId": "1iHT8zg8gVi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ecrts/2008/3298/0/3298a321", "title": "WCET-driven Cache-based Procedure Positioning Optimizations", "doi": null, "abstractUrl": "/proceedings-article/ecrts/2008/3298a321/12OmNAnuTFf", "parentPublication": { "id": "proceedings/ecrts/2008/3298/0", "title": "2008 Euromicro Conference on Real-Time Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtcsa/2015/7855/0/7855a217", "title": "Tracing Flow Information for Tighter WCET Estimation: Application to Vectorization", "doi": null, "abstractUrl": "/proceedings-article/rtcsa/2015/7855a217/12OmNB8TUaW", "parentPublication": { "id": "proceedings/rtcsa/2015/7855/0", "title": "2015 IEEE 21st International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecrts/2011/0643/0/06001766", "title": "WCET-aware Register Allocation Based on Integer-Linear Programming", "doi": null, "abstractUrl": "/proceedings-article/ecrts/2011/06001766/12OmNrY3LqW", "parentPublication": { "id": "proceedings/ecrts/2011/0643/0", "title": "2011 23rd Euromicro Conference on Real-Time Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/1997/7977/0/79770114", "title": "Tuning compiler optimizations for simultaneous multithreading", "doi": null, "abstractUrl": "/proceedings-article/micro/1997/79770114/12OmNroijnK", "parentPublication": { "id": "proceedings/micro/1997/7977/0", "title": "Proceedings of 30th Annual International Symposium on Microarchitecture", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/estmed/2006/9783/0/04115464", "title": "Design of a WCET-Aware C Compiler", "doi": null, "abstractUrl": "/proceedings-article/estmed/2006/04115464/12OmNxWcHoZ", "parentPublication": { "id": "proceedings/estmed/2006/9783/0", "title": "2006 IEEE/ACM/IFIP Workshop on Embedded Systems for Real Time Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isorc/2010/4037/0/4037a115", "title": "Multi-objective Exploration of Compiler Optimizations for Real-Time Systems", "doi": null, "abstractUrl": "/proceedings-article/isorc/2010/4037a115/12OmNy5hRet", "parentPublication": { "id": "proceedings/isorc/2010/4037/0", "title": "2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csit/2013/2460/0/06710359", "title": "An Automatic tool for tuning compiler optimizations", "doi": null, "abstractUrl": "/proceedings-article/csit/2013/06710359/12OmNyUWR0b", "parentPublication": { "id": "proceedings/csit/2013/2460/0", "title": "2013 Computer Science and Information Technologies (CSIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2010/4108/0/4108b918", "title": "Superblock-Based Source Code Optimizations for WCET Reduction", "doi": null, "abstractUrl": "/proceedings-article/cit/2010/4108b918/12OmNyfvpRY", "parentPublication": { "id": "proceedings/cit/2010/4108/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecrts/2001/1221/0/12210029", "title": "Transformation of Path Information for WCET Analysis during Compilation", "doi": null, "abstractUrl": "/proceedings-article/ecrts/2001/12210029/12OmNz5JC9e", "parentPublication": { "id": "proceedings/ecrts/2001/1221/0", "title": "Proceedings 13th Euromicro Conference on Real-Time Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtas/2005/2302/0/23020138", "title": "Improving WCET by Optimizing Worst-Case Paths", "doi": null, "abstractUrl": "/proceedings-article/rtas/2005/23020138/12OmNzzP5Kr", "parentPublication": { "id": "proceedings/rtas/2005/2302/0", "title": "11th IEEE Real Time and Embedded Technology and Applications Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }