data
dict
{ "proceeding": { "id": "1cYi06q10li", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYi21LcNX2", "doi": "10.1109/ICALT.2019.00060", "title": "A Visualization Tool for Analyzing an Assembly Training in VR", "normalizedTitle": "A Visualization Tool for Analyzing an Assembly Training in VR", "abstract": "The objective of this research is to develop a web-based visualization tool that is used for analyzing an assembly in a Virtual Reality (VR) environment. As a case study, we have generated a virtual reality environment for an assembly simulation of a zero-G treadmill for use on spacecraft. A series of controlled user studies has been done to investigate the role of different visual cues (image and text) on user performance while performing manual assembly in an immersive VR setting (VIVE headset) and a non-immersive environment (desktop). However, this paper focuses on a visualization tool that will help to understand and explore VR data. The goal of the tool is to support interactive analytic process of data collected from the assembly planning of complex systems.", "abstracts": [ { "abstractType": "Regular", "content": "The objective of this research is to develop a web-based visualization tool that is used for analyzing an assembly in a Virtual Reality (VR) environment. As a case study, we have generated a virtual reality environment for an assembly simulation of a zero-G treadmill for use on spacecraft. A series of controlled user studies has been done to investigate the role of different visual cues (image and text) on user performance while performing manual assembly in an immersive VR setting (VIVE headset) and a non-immersive environment (desktop). However, this paper focuses on a visualization tool that will help to understand and explore VR data. The goal of the tool is to support interactive analytic process of data collected from the assembly planning of complex systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The objective of this research is to develop a web-based visualization tool that is used for analyzing an assembly in a Virtual Reality (VR) environment. As a case study, we have generated a virtual reality environment for an assembly simulation of a zero-G treadmill for use on spacecraft. A series of controlled user studies has been done to investigate the role of different visual cues (image and text) on user performance while performing manual assembly in an immersive VR setting (VIVE headset) and a non-immersive environment (desktop). However, this paper focuses on a visualization tool that will help to understand and explore VR data. The goal of the tool is to support interactive analytic process of data collected from the assembly planning of complex systems.", "fno": "348500a150", "keywords": [ "Assembly Planning", "Computer Based Training", "Computer Simulation", "Data Visualisation", "Internet", "Production Engineering Computing", "Space Vehicles", "Virtual Reality", "Immersive VR", "Nonimmersive Environment", "VR Data", "Assembly Planning", "Assembly Training", "Virtual Reality Environment", "Assembly Simulation", "Zero G Treadmill", "User Performance", "Manual Assembly", "Web Based Visualization Tool", "Spacecraft", "VIVE Headset", "Task Analysis", "Tools", "Data Visualization", "Visualization", "Image Color Analysis", "Training", "Two Dimensional Displays", "Visualization Tool", "User Study", "VR Study", "Statistical Relationship" ], "authors": [ { "affiliation": "The City College of New York, CUNY", "fullName": "Ronak Etemadpour", "givenName": "Ronak", "surname": "Etemadpour", "__typename": "ArticleAuthorType" }, { "affiliation": "The City College of New York, CUNY", "fullName": "Oleksandr Kozlenko", "givenName": "Oleksandr", "surname": "Kozlenko", "__typename": "ArticleAuthorType" }, { "affiliation": "Oklahoma State University", "fullName": "Prateek Dwivedi", "givenName": "Prateek", "surname": "Dwivedi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "150-152", "year": "2019", "issn": null, "isbn": "978-1-7281-3485-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "348500a145", "articleId": "1cYi13XNW4o", "__typename": "AdjacentArticleType" }, "next": { "fno": "348500a153", "articleId": "1cYi51K9MTS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/1999/0210/0/02100032", "title": "Virtual Reality and Augmented Reality as a Training Tool for Assembly Tasks", "doi": null, "abstractUrl": "/proceedings-article/iv/1999/02100032/12OmNAObbyR", "parentPublication": { "id": "proceedings/iv/1999/0210/0", "title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2018/6049/0/604901a395", "title": "Manual Assembly Training in Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/icalt/2018/604901a395/12OmNBKEyqp", "parentPublication": { "id": "proceedings/icalt/2018/6049/0", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/searis/2012/1249/0/06231166", "title": "VR JuggLua: A framework for VR applications combining Lua, OpenSceneGraph, and VR Juggler", "doi": null, "abstractUrl": "/proceedings-article/searis/2012/06231166/12OmNrkT7GZ", "parentPublication": { "id": "proceedings/searis/2012/1249/0", "title": "2012 5th Workshop on Software Engineering and Architectures for Realtime Interactive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2017/5504/0/08022722", "title": "Simplify methodology for developing VR applications based on shared VR materials", "doi": null, "abstractUrl": "/proceedings-article/snpd/2017/08022722/12OmNybx22l", "parentPublication": { "id": "proceedings/snpd/2017/5504/0", "title": "2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446312", "title": "VR-Assisted vs Video-Assisted Teacher Training", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446312/13bd1eY1x42", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a596", "title": "VR Wayfinding Training for People with Visual Impairment using VR Treadmill and VR Tracker", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a596/1CJf4aHcqoU", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400a606", "title": "Collaborative Virtual Assembly Environment for Product Design", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400a606/1jdDLZmoQJa", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a260", "title": "Influence of hand visualization on tool-based motor skills training in an immersive VR simulator", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a260/1pyswAXnugM", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a599", "title": "CDVVAR: VR/AR Collaborative Data Visualization Tool", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a599/1tnXiU5GF9K", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576372", "title": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576372/1y63pjBC6qs", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dsfR2yEMbS", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vl-hcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dsfTwoG4TK", "doi": "10.1109/VLHCC.2019.8818856", "title": "Studying the Benefits and Challenges of Immersive Dataflow Programming", "normalizedTitle": "Studying the Benefits and Challenges of Immersive Dataflow Programming", "abstract": "Creating Virtual Reality (VR) applications normally requires advanced knowledge of imperative programming, 3D modeling, reactive programming, and geometry. Immersive authoring tools propose to reduce the learning curve of VR programming by allowing users to create VR content while immersed in VR. Immersive authoring can take advantage of many of the features that make VR applications intuitive and natural to use-users can manipulate programming primitives through direct manipulation, immediately see the output of their code, and use their innate spatial reasoning capabilities when viewing a program. In this paper, we investigate the benefits and challenges of immersive dataflow authoring. We implemented an immersive authoring tool that enables dataflow programming in VR and conducted a series of retrospective interviews. We also describe design implications for future immersive authoring tools.", "abstracts": [ { "abstractType": "Regular", "content": "Creating Virtual Reality (VR) applications normally requires advanced knowledge of imperative programming, 3D modeling, reactive programming, and geometry. Immersive authoring tools propose to reduce the learning curve of VR programming by allowing users to create VR content while immersed in VR. Immersive authoring can take advantage of many of the features that make VR applications intuitive and natural to use-users can manipulate programming primitives through direct manipulation, immediately see the output of their code, and use their innate spatial reasoning capabilities when viewing a program. In this paper, we investigate the benefits and challenges of immersive dataflow authoring. We implemented an immersive authoring tool that enables dataflow programming in VR and conducted a series of retrospective interviews. We also describe design implications for future immersive authoring tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Creating Virtual Reality (VR) applications normally requires advanced knowledge of imperative programming, 3D modeling, reactive programming, and geometry. Immersive authoring tools propose to reduce the learning curve of VR programming by allowing users to create VR content while immersed in VR. Immersive authoring can take advantage of many of the features that make VR applications intuitive and natural to use-users can manipulate programming primitives through direct manipulation, immediately see the output of their code, and use their innate spatial reasoning capabilities when viewing a program. In this paper, we investigate the benefits and challenges of immersive dataflow authoring. We implemented an immersive authoring tool that enables dataflow programming in VR and conducted a series of retrospective interviews. We also describe design implications for future immersive authoring tools.", "fno": "08818856", "keywords": [ "Authoring Systems", "Data Flow Analysis", "Spatial Reasoning", "Virtual Reality", "Spatial Reasoning Capabilities", "Immersive Dataflow Authoring", "Immersive Authoring Tool", "Virtual Reality Applications", "VR Programming", "Immersive Dataflow Programming", "Programming", "Authoring Systems", "Tools", "Connectors", "Three Dimensional Displays", "Visualization", "Avatars", "Dataflow", "Immersive Authoring", "Virtual Reality" ], "authors": [ { "affiliation": "School of Information, The University of Michigan, Ann Arbor, MI, USA", "fullName": "Lei Zhang", "givenName": "Lei", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information, The University of Michigan, Ann Arbor, MI, USA", "fullName": "Steve Oney", "givenName": "Steve", "surname": "Oney", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl-hcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "223-227", "year": "2019", "issn": null, "isbn": "978-1-7281-0810-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08818907", "articleId": "1dsfSZulnW0", "__typename": "AdjacentArticleType" }, "next": { "fno": "08818900", "articleId": "1dsfVjV30li", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2002/1492/0/14920093", "title": "A Combined Immersive and Desktop Authoring Tool for Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2002/14920093/12OmNAi6vVS", "parentPublication": { "id": "proceedings/vr/2002/1492/0", "title": "Proceedings IEEE Virtual Reality 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2010/4124/0/4124a040", "title": "ARtalet: Tangible User Interface Based Immersive Augmented Reality Authoring Tool for Digilog Book", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2010/4124a040/12OmNrEL2B8", "parentPublication": { "id": "proceedings/isuvr/2010/4124/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892275", "title": "Socially immersive avatar-based communication", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892275/12OmNwEJ0VR", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440858", "title": "DXR: A Toolkit for Building Immersive Data Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440858/17D45XeKgxQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699236", "title": "The Trouble with Augmented Reality/Virtual Reality Authoring Tools", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699236/19F1TNjWjtK", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a065", "title": "RealityFlow: Open-Source Multi-User Immersive Authoring", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a065/1CJf41FrrTG", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a935", "title": "Immersive Animation Authoring in Industrial VR Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a935/1J7Wg05jJeM", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a044", "title": "A Novel Tool for Immersive Authoring of Experiential Learning in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a044/1tnWQy5llCg", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a633", "title": "Immersive Authoring of Virtual Reality Training", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a633/1tnXNG6t1x6", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576372", "title": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576372/1y63pjBC6qs", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyen1y0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAFWONK", "doi": "10.1109/FIE.2016.7757495", "title": "Teaching first year engineering students engineering design process and problem solving through service learning projects", "normalizedTitle": "Teaching first year engineering students engineering design process and problem solving through service learning projects", "abstract": "This paper presents the authors' practice of teaching first year engineering students the engineering design process and problem solving through service learning projects (SLPs). The SLPs are embedded in the First Year Seminar in Engineering, a first semester freshmen level course that all engineering freshmen at Gannon University are required to take. The SLP, identified by the combined effect from the course instructors, the university SL director, and the project stakeholder, lasts for the entire semester. Students, divided into several design teams, are given very specific step-by-step design guidelines to follow. During the design process, students are practicing how to approach and interpret the engineering design requirements, formulate engineering problems, propose different designs, and eventually solve the problem and evaluate the final product. This paper will walk the readers through each step of SLP from instructing point of view. It will present the challenges faced by students and the instructors and how to overcome them. It will also report on the lessons learned from the project. The student assessment and course evaluation will be presented and discussed as well.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents the authors' practice of teaching first year engineering students the engineering design process and problem solving through service learning projects (SLPs). The SLPs are embedded in the First Year Seminar in Engineering, a first semester freshmen level course that all engineering freshmen at Gannon University are required to take. The SLP, identified by the combined effect from the course instructors, the university SL director, and the project stakeholder, lasts for the entire semester. Students, divided into several design teams, are given very specific step-by-step design guidelines to follow. During the design process, students are practicing how to approach and interpret the engineering design requirements, formulate engineering problems, propose different designs, and eventually solve the problem and evaluate the final product. This paper will walk the readers through each step of SLP from instructing point of view. It will present the challenges faced by students and the instructors and how to overcome them. It will also report on the lessons learned from the project. The student assessment and course evaluation will be presented and discussed as well.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents the authors' practice of teaching first year engineering students the engineering design process and problem solving through service learning projects (SLPs). The SLPs are embedded in the First Year Seminar in Engineering, a first semester freshmen level course that all engineering freshmen at Gannon University are required to take. The SLP, identified by the combined effect from the course instructors, the university SL director, and the project stakeholder, lasts for the entire semester. Students, divided into several design teams, are given very specific step-by-step design guidelines to follow. During the design process, students are practicing how to approach and interpret the engineering design requirements, formulate engineering problems, propose different designs, and eventually solve the problem and evaluate the final product. This paper will walk the readers through each step of SLP from instructing point of view. It will present the challenges faced by students and the instructors and how to overcome them. It will also report on the lessons learned from the project. The student assessment and course evaluation will be presented and discussed as well.", "fno": "07757495", "keywords": [ "Proposals", "Stakeholders", "Problem Solving", "Seminars", "Prototypes", "Connectors", "Service Learning", "Engineering Design", "Problem Solving" ], "authors": [ { "affiliation": "Dept. of Electrical and Computer Engineering, Gannon University, Erie, PA, United States", "fullName": "Lin Zhao", "givenName": null, "surname": "Lin Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Mechanical Engineering, Gannon University, Erie, PA, United States", "fullName": "Karinna Vernaza", "givenName": "Karinna", "surname": "Vernaza", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2016", "issn": null, "isbn": "978-1-5090-1790-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07757494", "articleId": "12OmNxaw5eM", "__typename": "AdjacentArticleType" }, "next": { "fno": "07757496", "articleId": "12OmNCdk2O5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2012/1353/0/06462478", "title": "Work in progress: Teaching game design and robotics together: A natural marriage of computing and engineering design in a first-year engineering course", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462478/12OmNAjO6DW", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142696", "title": "Work in progress: Integration of topic modules and organization of session flow for the First-Year Seminar course in engineering to motivate and sustain student learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142696/12OmNAle6jl", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/2/01264762", "title": "Relative effectiveness of different first-year engineering seminars", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01264762/12OmNBKW9H7", "parentPublication": { "id": "proceedings/fie/2003/7961/2", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044150", "title": "First year engineering experience at Ferdowsi University of Mashhad", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044150/12OmNBa2iF4", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684842", "title": "Community learning component in first year seminar", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684842/12OmNwEJ0Tt", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2001/6669/3/00964017", "title": "Building community with the \"LINKS\" program: a first-year link between a basic communication course and other engineering courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2001/00964017/12OmNwIpNlh", "parentPublication": { "id": "proceedings/fie/2001/6669/3", "title": "31st Annual Frontiers in Education Conference. Impact on Engineering and Science Education. Conference Proceedings (Cat. No.01CH37193)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142802", "title": "Work in progress — Interdisciplinary international preprofessional service within the first-year engineering curriculum", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142802/12OmNx4gUms", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/2/01264763", "title": "Incorporation of freshman engineering projects", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01264763/12OmNzZEAqw", "parentPublication": { "id": "proceedings/fie/2003/7961/2", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962456", "title": "First Year Engineering Design: Course Design, Projects, Challenges, and Outcomes", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962456/1IHnUypFWzm", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637253", "title": "Peer-Mentoring in Design Projects in Project-Based Learning (PBL) at First-Year Engineering Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637253/1zuw1FtVw5y", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqdr6Q", "title": "2012 Frontiers in Education Conference Proceedings", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvjZ", "doi": "10.1109/FIE.2012.6462293", "title": "Understanding industry experiences: From problem solving to engineering students' learning gains", "normalizedTitle": "Understanding industry experiences: From problem solving to engineering students' learning gains", "abstract": "This paper reports the findings from surveying a diverse group of undergraduate engineering students (N∼100) who participated in summer industry experiences. The goal was to capture and understand (a) the nature of industry experiences and (b) students' learning outcome gains (cognitive and affective) during these industry experiences. Ultimately, we aim to understand how students learn in real-world problem solving contexts in order to transfer such learning and such experiences into the engineering classroom. In undergraduate curriculum, well-structured problems with known solutions acquired through preferred solution methods are encountered more frequently than ill-structured problems. The linear process of problem solving teaches students a procedure to be memorized, practiced, and habituated, a process that emphasizes getting answers over making meaning. Real-world problem solving, though, commonly encountered in industry experiences suffused with complex and ill-structured problems, foster cognitive development of essential, problem-based, and globally competitive problem solving skills. Although industry experiences offer many benefits and enable engineering students to begin the practice of solving real-world complex problems, there is limited research on students' learning outcomes and skill gains as a result of participating in such experiences. Further, there is a lack of understanding of characteristics of the problems or projects that students work on. Our research serves to address these limitations.", "abstracts": [ { "abstractType": "Regular", "content": "This paper reports the findings from surveying a diverse group of undergraduate engineering students (N∼100) who participated in summer industry experiences. The goal was to capture and understand (a) the nature of industry experiences and (b) students' learning outcome gains (cognitive and affective) during these industry experiences. Ultimately, we aim to understand how students learn in real-world problem solving contexts in order to transfer such learning and such experiences into the engineering classroom. In undergraduate curriculum, well-structured problems with known solutions acquired through preferred solution methods are encountered more frequently than ill-structured problems. The linear process of problem solving teaches students a procedure to be memorized, practiced, and habituated, a process that emphasizes getting answers over making meaning. Real-world problem solving, though, commonly encountered in industry experiences suffused with complex and ill-structured problems, foster cognitive development of essential, problem-based, and globally competitive problem solving skills. Although industry experiences offer many benefits and enable engineering students to begin the practice of solving real-world complex problems, there is limited research on students' learning outcomes and skill gains as a result of participating in such experiences. Further, there is a lack of understanding of characteristics of the problems or projects that students work on. Our research serves to address these limitations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper reports the findings from surveying a diverse group of undergraduate engineering students (N∼100) who participated in summer industry experiences. The goal was to capture and understand (a) the nature of industry experiences and (b) students' learning outcome gains (cognitive and affective) during these industry experiences. Ultimately, we aim to understand how students learn in real-world problem solving contexts in order to transfer such learning and such experiences into the engineering classroom. In undergraduate curriculum, well-structured problems with known solutions acquired through preferred solution methods are encountered more frequently than ill-structured problems. The linear process of problem solving teaches students a procedure to be memorized, practiced, and habituated, a process that emphasizes getting answers over making meaning. Real-world problem solving, though, commonly encountered in industry experiences suffused with complex and ill-structured problems, foster cognitive development of essential, problem-based, and globally competitive problem solving skills. Although industry experiences offer many benefits and enable engineering students to begin the practice of solving real-world complex problems, there is limited research on students' learning outcomes and skill gains as a result of participating in such experiences. Further, there is a lack of understanding of characteristics of the problems or projects that students work on. Our research serves to address these limitations.", "fno": "06462293", "keywords": [ "Industries", "Complexity Theory", "Problem Solving", "Knowledge Engineering", "Engineering Students", "Writing", "Instruments", "Complex Problem Solving", "Industry Experience", "Complexity", "Structuredness" ], "authors": [ { "affiliation": "School of Engineering, James Madison University, Harrisonburg, VA, USA", "fullName": "Jacquelyn K. S. Nagel", "givenName": "Jacquelyn K. S.", "surname": "Nagel", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineering, James Madison University, Harrisonburg, VA, USA", "fullName": "Olga Pierrakos", "givenName": "Olga", "surname": "Pierrakos", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Assessment and Research Studies, James Madison University, Harrisonburg, VA, USA", "fullName": "Anna Zilberberg", "givenName": "Anna", "surname": "Zilberberg", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Assessment and Research Studies, James Madison University, Harrisonburg, VA, USA", "fullName": "Sean McVay", "givenName": "Sean", "surname": "McVay", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2012", "issn": "0190-5848", "isbn": "978-1-4673-1353-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06462521", "articleId": "12OmNAnuTpJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06462411", "articleId": "12OmNCwlamh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2013/5261/0/06684964", "title": "Ill-structured problem solving in a workplace simulation environment: Challenges of the learning experience and skills developed", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684964/12OmNBqv2q8", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344305", "title": "Ambiguity during engineering problem solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344305/12OmNqNos5y", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142975", "title": "Work in progress — Robust engineering problems for the study of problem solving strategies", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142975/12OmNs0TKUx", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044345", "title": "\"Problem solving\" in engineering: Research on students' engineering design practices and mathematical modeling practices", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044345/12OmNxZkhtQ", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2015/9967/0/9967a164", "title": "Delayed Guidance: A Teaching-Learning Strategy to Develop Ill-Structured Problem Solving Skills in Engineering", "doi": null, "abstractUrl": "/proceedings-article/latice/2015/9967a164/12OmNz5s0F4", "parentPublication": { "id": "proceedings/latice/2015/9967/0", "title": "2015 International Conference on Learning and Teaching in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a401", "title": "Improvement of Problem Solving Skills in Engineering Drawing Using Blender Based Mental Rotation Training", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a401/12OmNzUPpdm", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757592", "title": "Developing more robust problem solvers through diversity of course experiences", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757592/12OmNzzP5EB", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a166", "title": "Technology Enhanced Learning (TEL) Environment to Develop Expansionist-Reductionist (ER) Thinking Skills through Software Design Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a166/17D45VTRosb", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962750", "title": "Improving engineering students’ problem-solving skills through think-aloud exercises", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962750/1IHnBWIc9RC", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962389", "title": "Impact of decision-making in heat transfer courses on students’ ability to solve authentic problems", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962389/1IHnS2UCfE4", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyen1y0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDha", "doi": "10.1109/FIE.2016.7757594", "title": "Abstraction and problem solving in an undergraduate electrical engineering circuits course", "normalizedTitle": "Abstraction and problem solving in an undergraduate electrical engineering circuits course", "abstract": "The ability to solve problems is a critical skill in all undergraduate engineering curricula. Students' capacity for problem solving is complicated by the fact that higher level reasoning skills, including the capacity for abstraction, are not innate in a person until the mid-twenties or later. The results of an exploratory study that looked at students' episodes of reasoning when solving problems in a sophomore level electrical circuits course are presented. Students' problem solving attempts are analyzed using the representation mapping framework developed by Hahn and Chater that is based on store representations of knowledge and how they are applied. This framework distinguishes between similarity and rules-based cognitive processes, and accounts for memory-bank, rules-based, similarity-based and prototype types of reasoning. Students were asked to think aloud when solving specific problems selected by the course instructor. The interviews were recorded, transcribed, and analyzed in detail to identify the types of reasoning and the degree of abstraction in the students' problem solving attempts. This study demonstrated that representation mapping is useful framework for studying students' problem solving skills in electrical engineering.", "abstracts": [ { "abstractType": "Regular", "content": "The ability to solve problems is a critical skill in all undergraduate engineering curricula. Students' capacity for problem solving is complicated by the fact that higher level reasoning skills, including the capacity for abstraction, are not innate in a person until the mid-twenties or later. The results of an exploratory study that looked at students' episodes of reasoning when solving problems in a sophomore level electrical circuits course are presented. Students' problem solving attempts are analyzed using the representation mapping framework developed by Hahn and Chater that is based on store representations of knowledge and how they are applied. This framework distinguishes between similarity and rules-based cognitive processes, and accounts for memory-bank, rules-based, similarity-based and prototype types of reasoning. Students were asked to think aloud when solving specific problems selected by the course instructor. The interviews were recorded, transcribed, and analyzed in detail to identify the types of reasoning and the degree of abstraction in the students' problem solving attempts. This study demonstrated that representation mapping is useful framework for studying students' problem solving skills in electrical engineering.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ability to solve problems is a critical skill in all undergraduate engineering curricula. Students' capacity for problem solving is complicated by the fact that higher level reasoning skills, including the capacity for abstraction, are not innate in a person until the mid-twenties or later. The results of an exploratory study that looked at students' episodes of reasoning when solving problems in a sophomore level electrical circuits course are presented. Students' problem solving attempts are analyzed using the representation mapping framework developed by Hahn and Chater that is based on store representations of knowledge and how they are applied. This framework distinguishes between similarity and rules-based cognitive processes, and accounts for memory-bank, rules-based, similarity-based and prototype types of reasoning. Students were asked to think aloud when solving specific problems selected by the course instructor. The interviews were recorded, transcribed, and analyzed in detail to identify the types of reasoning and the degree of abstraction in the students' problem solving attempts. This study demonstrated that representation mapping is useful framework for studying students' problem solving skills in electrical engineering.", "fno": "07757594", "keywords": [ "Cognition", "Problem Solving", "Switches", "Switching Circuits", "Problem Solving", "Abstraction", "Engineering Curriculum" ], "authors": [ { "affiliation": "Department of Electrical & Computer Engineering, University of Nebraska-Lincoln, USA", "fullName": "Presentacion Rivera-Reyes", "givenName": "Presentacion", "surname": "Rivera-Reyes", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical & Computer Engineering, University of Nebraska-Lincoln, USA", "fullName": "Lance C. Pérez", "givenName": "Lance C.", "surname": "Pérez", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2016", "issn": null, "isbn": "978-1-5090-1790-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07757593", "articleId": "12OmNAnuTDC", "__typename": "AdjacentArticleType" }, "next": { "fno": "07757595", "articleId": "12OmNvk7K0Z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2013/5009/0/5009a379", "title": "Technology-Enhanced Learning for Improving Complex Problem-Solving Expertise", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a379/12OmNBpEeME", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344247", "title": "Measuring undergraduate students' self-efficacy in engineering design in a project-based design course", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344247/12OmNqI04NV", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a417", "title": "Towards Scaffolding Problem-Solving Implementation Process in Undergraduate Programming Course", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a417/12OmNwNwzJS", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673549", "title": "Undergraduate research and complex problem solving: Understanding and translating such experiences to the classroom", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673549/12OmNxEjXRH", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2014/6489/0/6489a126", "title": "Guided Problem Solving and Group Programming: A Technology-Enhanced Teaching-Learning Strategy for Engineering Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/t4e/2014/6489a126/12OmNyvGyjm", "parentPublication": { "id": "proceedings/t4e/2014/6489/0", "title": "2014 IEEE Sixth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504a130", "title": "Supporting Problem-Solving in Mathematics with a Conversational Agent Capable of Representing Gifted Students' Knowledge", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504a130/12OmNyvY9xl", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659058", "title": "Assessing the Demand of Problems in an Undergraduate Electrical Engineering Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659058/18j93daTSM0", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962750", "title": "Improving engineering students’ problem-solving skills through think-aloud exercises", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962750/1IHnBWIc9RC", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waie/2022/6351/0/635100a086", "title": "A New Uncertain Reasoning Approach For Example Selection in the Example-Based Problem Solving Tutoring", "doi": null, "abstractUrl": "/proceedings-article/waie/2022/635100a086/1KzzpPI0vqo", "parentPublication": { "id": "proceedings/waie/2022/6351/0", "title": "2022 4th International Workshop on Artificial Intelligence and Education (WAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637347", "title": "Impact of Human Side of Engineering Approach in an Undergraduate Electromagnetics Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637347/1zuwnmjH14I", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyjLoSc", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNqNos5y", "doi": "10.1109/FIE.2015.7344305", "title": "Ambiguity during engineering problem solving", "normalizedTitle": "Ambiguity during engineering problem solving", "abstract": "Work place engineering problems are recognized as being complex and ambiguous. However, most of the problems students are asked to solve during their degree programs are classroom problems. Most studies of ambiguity in problem solving have defined ambiguity as a characteristic of the problems. We are interested in understanding how students interpret engineering problems, either creating or resolving ambiguity during their problem solving process. The research question that guides this study is: How is ambiguity manifested by engineering students as they solve problems? This study is part of a larger project examining engineering students' engineering problem solving across different types of engineering problems. Twenty materials engineering students were asked to solve four materials engineering problems during a think-aloud session. For the analysis, points of ambiguity during the problem-solving process were identified as periods in which the students specifically verbalized uncertainty. The points of ambiguity in the transcript were then analyzed through script analysis. More specifically textual instances of ambiguity were linked with three main periods and situational categories: a) the situation that caused the ambiguity, 2) what happened during the point of ambiguity, and 3) the reaction of the student after reaching the point of ambiguity. Results indicated that students experienced points of ambiguity in both closed- and open-ended problems. Several motifs were common to both types of problems, including confusion over how to use given values, not having necessary content knowledge, lack of self-confidence, and difficulty conceptualizing the problem. The lack of constraints inherent in the open-ended problems also caused additional ambiguity among some students. Our findings show that ambiguity can take many forms and is not just a function of the problem structure. Students reach points of ambiguity (e.g., points where they do not know what to do next), due to many factors. Some of these factors represent aspects of their academic and epistemological development. Our analysis to date suggests that students need more comprehensive training and practice to be prepared in facing problems that reflect the work in engineering practice. We are currently examining the data further to identify patterns in their response to ambiguity, which may help in developing pedagogical strategies and tools to support students' ability to successfully solve engineering problems.", "abstracts": [ { "abstractType": "Regular", "content": "Work place engineering problems are recognized as being complex and ambiguous. However, most of the problems students are asked to solve during their degree programs are classroom problems. Most studies of ambiguity in problem solving have defined ambiguity as a characteristic of the problems. We are interested in understanding how students interpret engineering problems, either creating or resolving ambiguity during their problem solving process. The research question that guides this study is: How is ambiguity manifested by engineering students as they solve problems? This study is part of a larger project examining engineering students' engineering problem solving across different types of engineering problems. Twenty materials engineering students were asked to solve four materials engineering problems during a think-aloud session. For the analysis, points of ambiguity during the problem-solving process were identified as periods in which the students specifically verbalized uncertainty. The points of ambiguity in the transcript were then analyzed through script analysis. More specifically textual instances of ambiguity were linked with three main periods and situational categories: a) the situation that caused the ambiguity, 2) what happened during the point of ambiguity, and 3) the reaction of the student after reaching the point of ambiguity. Results indicated that students experienced points of ambiguity in both closed- and open-ended problems. Several motifs were common to both types of problems, including confusion over how to use given values, not having necessary content knowledge, lack of self-confidence, and difficulty conceptualizing the problem. The lack of constraints inherent in the open-ended problems also caused additional ambiguity among some students. Our findings show that ambiguity can take many forms and is not just a function of the problem structure. Students reach points of ambiguity (e.g., points where they do not know what to do next), due to many factors. Some of these factors represent aspects of their academic and epistemological development. Our analysis to date suggests that students need more comprehensive training and practice to be prepared in facing problems that reflect the work in engineering practice. We are currently examining the data further to identify patterns in their response to ambiguity, which may help in developing pedagogical strategies and tools to support students' ability to successfully solve engineering problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Work place engineering problems are recognized as being complex and ambiguous. However, most of the problems students are asked to solve during their degree programs are classroom problems. Most studies of ambiguity in problem solving have defined ambiguity as a characteristic of the problems. We are interested in understanding how students interpret engineering problems, either creating or resolving ambiguity during their problem solving process. The research question that guides this study is: How is ambiguity manifested by engineering students as they solve problems? This study is part of a larger project examining engineering students' engineering problem solving across different types of engineering problems. Twenty materials engineering students were asked to solve four materials engineering problems during a think-aloud session. For the analysis, points of ambiguity during the problem-solving process were identified as periods in which the students specifically verbalized uncertainty. The points of ambiguity in the transcript were then analyzed through script analysis. More specifically textual instances of ambiguity were linked with three main periods and situational categories: a) the situation that caused the ambiguity, 2) what happened during the point of ambiguity, and 3) the reaction of the student after reaching the point of ambiguity. Results indicated that students experienced points of ambiguity in both closed- and open-ended problems. Several motifs were common to both types of problems, including confusion over how to use given values, not having necessary content knowledge, lack of self-confidence, and difficulty conceptualizing the problem. The lack of constraints inherent in the open-ended problems also caused additional ambiguity among some students. Our findings show that ambiguity can take many forms and is not just a function of the problem structure. Students reach points of ambiguity (e.g., points where they do not know what to do next), due to many factors. Some of these factors represent aspects of their academic and epistemological development. Our analysis to date suggests that students need more comprehensive training and practice to be prepared in facing problems that reflect the work in engineering practice. We are currently examining the data further to identify patterns in their response to ambiguity, which may help in developing pedagogical strategies and tools to support students' ability to successfully solve engineering problems.", "fno": "07344305", "keywords": [ "Problem Solving", "Engineering Students", "Strain", "Uncertainty", "Stress", "Training", "Problem Solving", "Ambiguity", "Qualitative Analysis" ], "authors": [ { "affiliation": "Department of Materials Science and Engineering, University of Florida, Gainesville, FL, USA", "fullName": "Elliot P. Douglas", "givenName": "Elliot P.", "surname": "Douglas", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Materials Science and Engineering, University of Florida, Gainesville, FL, USA", "fullName": "Sevcan Agdas", "givenName": "Sevcan", "surname": "Agdas", "__typename": "ArticleAuthorType" }, { "affiliation": "California State University East Bay, Hayw ard, CA, USA", "fullName": "Christine Lee", "givenName": "Christine", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Mary Lou Fulton Teachers College, Arizona State University Tempe, AZ, USA", "fullName": "Mirka Koro-Ljungberg", "givenName": "Mirka", "surname": "Koro-Ljungberg", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Human Development & Organizational Studies in Education University of Florida Gainesville, FL, USA", "fullName": "David J. Therriault", "givenName": "David J.", "surname": "Therriault", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2015", "issn": null, "isbn": "978-1-4799-8454-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07344304", "articleId": "12OmNAS9zGk", "__typename": "AdjacentArticleType" }, "next": { "fno": "07344306", "articleId": "12OmNCcbEiw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2012/1353/0/06462293", "title": "Understanding industry experiences: From problem solving to engineering students' learning gains", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462293/12OmNAkWvjZ", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684964", "title": "Ill-structured problem solving in a workplace simulation environment: Challenges of the learning experience and skills developed", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684964/12OmNBqv2q8", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142975", "title": "Work in progress — Robust engineering problems for the study of problem solving strategies", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142975/12OmNs0TKUx", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044345", "title": "\"Problem solving\" in engineering: Research on students' engineering design practices and mathematical modeling practices", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044345/12OmNxZkhtQ", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142841", "title": "Work in progress — The role of working memory and epistemic beliefs on open-ended problem solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142841/12OmNy4r3Xr", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2015/9967/0/9967a164", "title": "Delayed Guidance: A Teaching-Learning Strategy to Develop Ill-Structured Problem Solving Skills in Engineering", "doi": null, "abstractUrl": "/proceedings-article/latice/2015/9967a164/12OmNz5s0F4", "parentPublication": { "id": "proceedings/latice/2015/9967/0", "title": "2015 International Conference on Learning and Teaching in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a401", "title": "Improvement of Problem Solving Skills in Engineering Drawing Using Blender Based Mental Rotation Training", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a401/12OmNzUPpdm", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462475", "title": "Work in progress: Audio reflections provide evidence of metacognition during students' problem solving attempts", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462475/12OmNzmclYB", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962750", "title": "Improving engineering students’ problem-solving skills through think-aloud exercises", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962750/1IHnBWIc9RC", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273946", "title": "“I don’t want to be influenced by emotions”—Engineering students’ emotional positioning in discussions about wicked sustainability problems", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273946/1phRvXKFrBC", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1C8FRdMr6vu", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "acronym": "icise-ie", "groupId": "1841104", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1C8GzN3KLN6", "doi": "10.1109/ICISE-IE53922.2021.00207", "title": "Research on Solving Functional Zero Problem : Based on Polya's Problem-solving Theory", "normalizedTitle": "Research on Solving Functional Zero Problem : Based on Polya's Problem-solving Theory", "abstract": "Functional zero problem has always been the focus and difficulty in the National College Entrance Exam mathematics. Since functional zero problem involves a large amount of knowledge and operation, senior students often spend a lot of time and energy in solving the problem, but they have little or no effect. Therefore, it is significant to carry out research on solving functional zero problem. Polya, a famous American mathematics educator, put forward Polya’s problem-solving theory in the long-term practice of mathematics education. Its core content is a \"How to solve the problem table\". Polya’s problem-solving theory is conducive to the formation of effective problem-solving ideas for the solution of problems. In view of this, this research takes Polya’s problem-solving theory as the theoretical basis and tries to apply Polya’s problem-solving theory to solve functional zero problem: step one, understand the problem; step two, devise a plan; step three, carry out the plan; step four, look back.", "abstracts": [ { "abstractType": "Regular", "content": "Functional zero problem has always been the focus and difficulty in the National College Entrance Exam mathematics. Since functional zero problem involves a large amount of knowledge and operation, senior students often spend a lot of time and energy in solving the problem, but they have little or no effect. Therefore, it is significant to carry out research on solving functional zero problem. Polya, a famous American mathematics educator, put forward Polya’s problem-solving theory in the long-term practice of mathematics education. Its core content is a \"How to solve the problem table\". Polya’s problem-solving theory is conducive to the formation of effective problem-solving ideas for the solution of problems. In view of this, this research takes Polya’s problem-solving theory as the theoretical basis and tries to apply Polya’s problem-solving theory to solve functional zero problem: step one, understand the problem; step two, devise a plan; step three, carry out the plan; step four, look back.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Functional zero problem has always been the focus and difficulty in the National College Entrance Exam mathematics. Since functional zero problem involves a large amount of knowledge and operation, senior students often spend a lot of time and energy in solving the problem, but they have little or no effect. Therefore, it is significant to carry out research on solving functional zero problem. Polya, a famous American mathematics educator, put forward Polya’s problem-solving theory in the long-term practice of mathematics education. Its core content is a \"How to solve the problem table\". Polya’s problem-solving theory is conducive to the formation of effective problem-solving ideas for the solution of problems. In view of this, this research takes Polya’s problem-solving theory as the theoretical basis and tries to apply Polya’s problem-solving theory to solve functional zero problem: step one, understand the problem; step two, devise a plan; step three, carry out the plan; step four, look back.", "fno": "382900a904", "keywords": [ "Educational Courses", "Educational Institutions", "Mathematics", "Functional Zero Problem Solving", "Polya Problem Solving Theory", "National College Entrance Exam Mathematics", "Mathematics Education", "Understand The Problem", "Devise A Plan", "Carry Out The Plan", "Look Back", "Information Science", "Education", "Mathematics", "Problem Solving", "Functional Zero Problem", "Polyas Problem Solving Theory", "Mathematics", "High School" ], "authors": [ { "affiliation": "Guangxi Normal University,Department of Mathematics and Statistics,Guilin,China", "fullName": "Linfeng Han", "givenName": "Linfeng", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Guangxi Normal University,Department of Politics and Public Administration,Guilin,China", "fullName": "Wanlin Peng", "givenName": "Wanlin", "surname": "Peng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icise-ie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "904-907", "year": "2021", "issn": null, "isbn": "978-1-6654-3829-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "382900a900", "articleId": "1C8GqHHFyko", "__typename": "AdjacentArticleType" }, "next": { "fno": "382900a908", "articleId": "1C8GKof7gY0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2005/9077/0/01612196", "title": "Analysis of Algorithms: programming to problem solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612196/12OmNqGRGf5", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gamepec/2015/7207/0/07331851", "title": "Web Pro-Mc Physics as a support tool for improving physics problem solving skills", "doi": null, "abstractUrl": "/proceedings-article/gamepec/2015/07331851/12OmNqHItMK", "parentPublication": { "id": "proceedings/gamepec/2015/7207/0", "title": "2015 Game Physics and Mechanics International Conference (GAMEPEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190655", "title": "Computational thinking in mathematics education: A joint approach to encourage problem-solving ability", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190655/12OmNy7yEdl", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504a130", "title": "Supporting Problem-Solving in Mathematics with a Conversational Agent Capable of Representing Gifted Students' Knowledge", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504a130/12OmNyvY9xl", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2016/01/07110369", "title": "Reducing Mistakes in Mathematics Problem Solving through Behavioral Training with a Tablet Computer", "doi": null, "abstractUrl": "/journal/lt/2016/01/07110369/13rRUxBJhrk", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962412", "title": "A Study of Effectiveness and Problem Solving on Security Concepts with Model-Eliciting Activities", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962412/1IHnBlV9CBa", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2019/4540/0/08864524", "title": "Festarola: a Game for Improving Problem Solving Strategies", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2019/08864524/1e5ZrsYyERq", "parentPublication": { "id": "proceedings/vs-games/2019/4540/0", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028384", "title": "Analyzing the Effect of Computational Thinking on Mathematics through Educational Robotics", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028384/1iffbxwNZXG", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2021/2663/0/266300a019", "title": "Teaching Reduction as an Algorithmic Problem-Solving Strategy", "doi": null, "abstractUrl": "/proceedings-article/cste/2021/266300a019/1wG5PMBecnu", "parentPublication": { "id": "proceedings/cste/2021/2663/0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637226", "title": "Problem-solving skill development through STEM learning approaches", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637226/1zuwbqiRICA", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cYi06q10li", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYi2beuS4w", "doi": "10.1109/ICALT.2019.00071", "title": "Complex Problem Solving as a Construct of Inquiry, Computational Thinking and Mathematical Problem Solving", "normalizedTitle": "Complex Problem Solving as a Construct of Inquiry, Computational Thinking and Mathematical Problem Solving", "abstract": "Complex problem solving is one of the key skills for future jobs, but it has not been clearly operationalized. We hypothesized that it is a construct of inquiry, computational thinking, and mathematical problem solving. The hypothesis was empirically tested by administering tests to 261 high school students for assessing three inquiry skills, two dimensions of computational thinking and five mathematical problem solving skills. Confirmatory factor analysis showed a three factor model of inquiry skills and two factor model of computational thinking skills to have a good fit. Mathematical problem solving skills were characterized with a two factor model. These factors were combined in a higher-order factor model into one construct that could be defined as a complex problem solving skill.", "abstracts": [ { "abstractType": "Regular", "content": "Complex problem solving is one of the key skills for future jobs, but it has not been clearly operationalized. We hypothesized that it is a construct of inquiry, computational thinking, and mathematical problem solving. The hypothesis was empirically tested by administering tests to 261 high school students for assessing three inquiry skills, two dimensions of computational thinking and five mathematical problem solving skills. Confirmatory factor analysis showed a three factor model of inquiry skills and two factor model of computational thinking skills to have a good fit. Mathematical problem solving skills were characterized with a two factor model. These factors were combined in a higher-order factor model into one construct that could be defined as a complex problem solving skill.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Complex problem solving is one of the key skills for future jobs, but it has not been clearly operationalized. We hypothesized that it is a construct of inquiry, computational thinking, and mathematical problem solving. The hypothesis was empirically tested by administering tests to 261 high school students for assessing three inquiry skills, two dimensions of computational thinking and five mathematical problem solving skills. Confirmatory factor analysis showed a three factor model of inquiry skills and two factor model of computational thinking skills to have a good fit. Mathematical problem solving skills were characterized with a two factor model. These factors were combined in a higher-order factor model into one construct that could be defined as a complex problem solving skill.", "fno": "348500a227", "keywords": [ "Education", "Complex Problem Solving Skill", "Mathematical Problem Solving Skills", "Computational Thinking Skills", "Inquiry Skills Assessment", "Two Factor Model", "Education System", "Problem Solving", "Pattern Recognition", "Problem Solving", "Inquiry Based Learning", "Computational Thinking", "Mathematical Problem Solving", "Theory Building" ], "authors": [ { "affiliation": "Institute of Education, University of Tartu Tartu, Estonia", "fullName": "Margus Pedaste", "givenName": "Margus", "surname": "Pedaste", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Computer Science, University of Tartu, Tartu, Estonia", "fullName": "Tauno Palts", "givenName": "Tauno", "surname": "Palts", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education. University of Tartu, Tartu, Estonia", "fullName": "Külli Kori", "givenName": "Külli", "surname": "Kori", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, University of Tartu, Tartu, Estonia", "fullName": "Maarja Sõrmus", "givenName": "Maarja", "surname": "Sõrmus", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, University of Tartu, Tartu, Estonia", "fullName": "Äli Leijen", "givenName": "Äli", "surname": "Leijen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "227-231", "year": "2019", "issn": null, "isbn": "978-1-7281-3485-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "348500a224", "articleId": "1cYi4a76Be8", "__typename": "AdjacentArticleType" }, "next": { "fno": "348500a001", "articleId": "1cYi40HdIFq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2012/1353/0/06462528", "title": "Work in progress: A developmental approach to better problem solving: A model for bridging the Alverno Gap", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462528/12OmNB7tUsQ", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344097", "title": "Pivot thinking: Predicting entrepreneurial intent among engineering students and faculty using problem solving style preference", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344097/12OmNzcxZql", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462475", "title": "Work in progress: Audio reflections provide evidence of metacognition during students' problem solving attempts", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462475/12OmNzmclYB", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a166", "title": "Technology Enhanced Learning (TEL) Environment to Develop Expansionist-Reductionist (ER) Thinking Skills through Software Design Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a166/17D45VTRosb", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seet/2022/9592/0/959200a082", "title": "Designing Divergent Thinking, Creative Problem Solving Exams", "doi": null, "abstractUrl": "/proceedings-article/icse-seet/2022/959200a082/1EaOSfoWpX2", "parentPublication": { "id": "proceedings/icse-seet/2022/9592/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a671", "title": "Discipline-Specific Critical Thinking Curriculum with A Problem Solving Life Cycle Framework", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a671/1gjRrTr4v2o", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/02/09037266", "title": "Automatic Detection of Reflective Thinking in Mathematical Problem Solving Based on Unconstrained Bodily Exploration", "doi": null, "abstractUrl": "/journal/ta/2022/02/09037266/1ifd4ywuBO0", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028431", "title": "Examining the Effects of STEM PBL on Students’ Divergent Thinking Attitudes Related to Creative Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028431/1iffl3kHTR6", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028360", "title": "A National INCLUDES Alliance Effort to Integrate Problem-Solving Skills into Computer Science Curriculum", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028360/1iffpKmF0kg", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637226", "title": "Problem-solving skill development through STEM learning approaches", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637226/1zuwbqiRICA", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iff6Mv34Wc", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iff99obic8", "doi": "10.1109/FIE43999.2019.9028583", "title": "Behavioral Analytics for Distributed Practices in Programming Problem-Solving", "normalizedTitle": "Behavioral Analytics for Distributed Practices in Programming Problem-Solving", "abstract": "This Research Full Paper aims to investigate the learning analytics of students' problem solving when working on distributed programming practices. Typical programming practice activities (i.e. assignments) in a lecture-dominant course may violate the principles of distributed retrieval practice. However, there are tradeoffs between managing depth and breadth of the content and classroom disruptions with the modern platforms and technologies. In this work, we investigate students' behavioral analytics in distributed programming practices. A classroom study was conducted in an introductory programming course and the learners' patterns were observed. Results showed that there were three distinct patterns found: affirmative, experimental, and surrendering. Better-performing students demonstrated more affirmative behaviors and fewer surrendering acts; Below-average students showed a lack of persistence in distributed practices. Additionally, the study reconfirmed the value of spacing effects on learning, which is the importance of spending time and to spreading the working sessions to solve diverse quizzes. Ineffective trial-and-error strategy and neglect the power of practices can be two alarming behaviors in distributed programming practices. Finally, predictive models of performance were presented based on the behavioral patterns.", "abstracts": [ { "abstractType": "Regular", "content": "This Research Full Paper aims to investigate the learning analytics of students' problem solving when working on distributed programming practices. Typical programming practice activities (i.e. assignments) in a lecture-dominant course may violate the principles of distributed retrieval practice. However, there are tradeoffs between managing depth and breadth of the content and classroom disruptions with the modern platforms and technologies. In this work, we investigate students' behavioral analytics in distributed programming practices. A classroom study was conducted in an introductory programming course and the learners' patterns were observed. Results showed that there were three distinct patterns found: affirmative, experimental, and surrendering. Better-performing students demonstrated more affirmative behaviors and fewer surrendering acts; Below-average students showed a lack of persistence in distributed practices. Additionally, the study reconfirmed the value of spacing effects on learning, which is the importance of spending time and to spreading the working sessions to solve diverse quizzes. Ineffective trial-and-error strategy and neglect the power of practices can be two alarming behaviors in distributed programming practices. Finally, predictive models of performance were presented based on the behavioral patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This Research Full Paper aims to investigate the learning analytics of students' problem solving when working on distributed programming practices. Typical programming practice activities (i.e. assignments) in a lecture-dominant course may violate the principles of distributed retrieval practice. However, there are tradeoffs between managing depth and breadth of the content and classroom disruptions with the modern platforms and technologies. In this work, we investigate students' behavioral analytics in distributed programming practices. A classroom study was conducted in an introductory programming course and the learners' patterns were observed. Results showed that there were three distinct patterns found: affirmative, experimental, and surrendering. Better-performing students demonstrated more affirmative behaviors and fewer surrendering acts; Below-average students showed a lack of persistence in distributed practices. Additionally, the study reconfirmed the value of spacing effects on learning, which is the importance of spending time and to spreading the working sessions to solve diverse quizzes. Ineffective trial-and-error strategy and neglect the power of practices can be two alarming behaviors in distributed programming practices. Finally, predictive models of performance were presented based on the behavioral patterns.", "fno": "09028583", "keywords": [ "Computer Aided Instruction", "Computer Science Education", "Educational Courses", "Behavioral Analytics", "Distributed Practices", "Programming Problem Solving", "Learning Analytics", "Distributed Programming Practices", "Distributed Retrieval Practice", "Introductory Programming Course", "Programming Profession", "Problem Solving", "Reflection", "Knowledge Engineering", "Encoding", "Testing", "Distributed Practices", "Programming", "Self Assessment", "Problem Solving", "Educational Data Mining", "Behavioral Analytics" ], "authors": [ { "affiliation": "Arizona State University,School of computing, Informatics & Decision System Engineering,Tempe,AZ,USA", "fullName": "Mohammed Alzaid", "givenName": "Mohammed", "surname": "Alzaid", "__typename": "ArticleAuthorType" }, { "affiliation": "Arizona State University,School of computing, Informatics & Decision System Engineering,Tempe,AZ,USA", "fullName": "I-Han Hsiao", "givenName": "I-Han", "surname": "Hsiao", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2019", "issn": null, "isbn": "978-1-7281-1746-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09028360", "articleId": "1iffpKmF0kg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09028427", "articleId": "1ifflSl6VZS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2018/6049/0/604901a309", "title": "Career Sustaining Competencies for Managing Disruptions and Innovative Problem Solving in a Digitized World", "doi": null, "abstractUrl": "/proceedings-article/icalt/2018/604901a309/12OmNAlvHEe", "parentPublication": { "id": "proceedings/icalt/2018/6049/0", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044133", "title": "Synergies between writing stories and writing programs in problem-solving courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044133/12OmNqzu70C", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a417", "title": "Towards Scaffolding Problem-Solving Implementation Process in Undergraduate Programming Course", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a417/12OmNwNwzJS", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190706", "title": "Toward understanding novices' search process in programming problem solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190706/12OmNxxNbTa", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190655", "title": "Computational thinking in mathematics education: A joint approach to encourage problem-solving ability", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190655/12OmNy7yEdl", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2014/6489/0/6489a126", "title": "Guided Problem Solving and Group Programming: A Technology-Enhanced Teaching-Learning Strategy for Engineering Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/t4e/2014/6489a126/12OmNyvGyjm", "parentPublication": { "id": "proceedings/t4e/2014/6489/0", "title": "2014 IEEE Sixth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684774", "title": "Using problets for problem-solving exercises in introductory C++/Java/C# courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684774/12OmNz2TCtV", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659245", "title": "Effectiveness of Reflection on Programming Problem Solving Self-Assessments", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659245/18j97inF6A8", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a182", "title": "Design of metacognitive scaffolding for k-12 programming education and its effects on students' problem solving ability and metacognition", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a182/1AFsrLsRcAw", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028664", "title": "Fostering Problem Understanding as a Precursor to Problem-Solving in Computer Programming", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028664/1iffnISfV1S", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNviHKdU", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNApu5GT", "doi": "10.1109/EISIC.2013.46", "title": "Detecting Key Players in Criminal Networks Using Dynalink", "normalizedTitle": "Detecting Key Players in Criminal Networks Using Dynalink", "abstract": "Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.", "abstracts": [ { "abstractType": "Regular", "content": "Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Detecting key players in criminal networks is an important aspect of criminal investigation because it promotes the efficient use of available resources (human, financial, time, etc.). In this paper, we propose a new technique of detecting key players in co-offending networks using the Dynalink framework. Dynalink is a social network visualization tool developed intentionally employs visual analytics to visualize networks interactively over time. This novel technique proposed here employs the intuitive concept of centrality in detecting key players in criminal networks. The tool will allow crime analysts and investigators to visualize networks interactively over time and use this technique to discover criminal patterns and key players.", "fno": "06657156", "keywords": [ "Criminal Law", "Data Analysis", "Data Visualisation", "Social Networking Online", "Key Player Detection", "Criminal Networks", "Dynalink Framework", "Criminal Investigation", "Cooffending Networks", "Social Network Visualization Tool", "Visual Analytics", "Crime Analysts", "Criminal Patterns", "Cities And Towns", "Visual Analytics", "Data Visualization", "Image Color Analysis", "Social Network Services", "Vehicles", "Social Network Analysis", "Key Players", "Co Offending Networks", "Visual Analytics" ], "authors": [ { "affiliation": null, "fullName": "Andrew J. Park", "givenName": "Andrew J.", "surname": "Park", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Herbert H. Tsang", "givenName": "Herbert H.", "surname": "Tsang", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "208-211", "year": "2013", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06657155", "articleId": "12OmNBOCWmg", "__typename": "AdjacentArticleType" }, "next": { "fno": "06657157", "articleId": "12OmNBtCCAg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2012/4782/0/4782a217", "title": "Dynalink: A Framework for Dynamic Criminal Network Visualization", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a217/12OmNBuL1mk", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403722", "title": "Deciding resilient criminal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403722/12OmNCga1Vd", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042535", "title": "Visualization of social media flows with interactively identified key players", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042535/12OmNqEjhW2", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a581", "title": "Detecting Criminal Networks Using Social Similarity", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a581/12OmNrAdsHo", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921689", "title": "PEVNET: A framework for visualization of criminal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921689/12OmNrMZpG8", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657138", "title": "Visual Analysis of Heterogeneous Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657138/12OmNvA1hAw", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a360", "title": "Node Removal in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a360/12OmNxymo5L", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a232", "title": "Association and Centrality in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a232/12OmNyUFfHU", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a297", "title": "Detecting Key Players in Terrorist Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a297/12OmNyyO8Pu", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921623", "title": "Multi-objective optimization to identify key players in social networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921623/12OmNz5apM2", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNviHKdU", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBgz4AV", "doi": "10.1109/EISIC.2013.9", "title": "Issues for the Next Generation of Criminal Network Investigation Tools", "normalizedTitle": "Issues for the Next Generation of Criminal Network Investigation Tools", "abstract": "Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.", "abstracts": [ { "abstractType": "Regular", "content": "Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Criminal network investigation involves a number of complex knowledge management tasks and both humans and software tools play a central role in performing such tasks. The paper presents issues for future criminal network investigation tools. The research agenda is inspired partly by previous research from the hypertext field on how to build tools to structure, visualize, and manage knowledge and partly from previous research from the intelligence and security informatics field on tool support for criminal network investigation. Crime Fighter is used as an example to explore the limitations of current criminal network investigation tools and to propose issues that needs to be addressed by future tools.", "fno": "06657119", "keywords": [ "Hypermedia", "Security", "Software Tools", "Next Generation Criminal Network Investigation Tool", "Complex Knowledge Management Tasks", "Software Tools", "Hypertext Field", "Crime Fighter", "Data Models", "Software Tools", "Knowledge Management", "Analytical Models", "Data Visualization", "Terrorism", "Data Mining", "Research Agenda", "Hypertext", "Intelligence And Security Informatics", "Crime Fighter" ], "authors": [ { "affiliation": null, "fullName": "Uffe Kock Wiil", "givenName": "Uffe Kock", "surname": "Wiil", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "7-14", "year": "2013", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06657118", "articleId": "12OmNzBOhwN", "__typename": "AdjacentArticleType" }, "next": { "fno": "06657120", "articleId": "12OmNqyDjrQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2014/5877/0/06921593", "title": "MOSAIC: Criminal network analysis for multi-modal surveillance and decision support", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921593/12OmNAObbA4", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a009", "title": "Analyzing Structure of Terrorist Networks by Using Graph Metrics", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a009/12OmNxEjY93", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a232", "title": "Association and Centrality in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a232/12OmNyUFfHU", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a197", "title": "CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a197/12OmNyY4rqu", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042543", "title": "VACI: Towards visual analytics for criminal investigation", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042543/12OmNyoSbgr", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2016/6119/0/6119a017", "title": "A Framework for Criminal Network Analysis Using Big Data", "doi": null, "abstractUrl": "/proceedings-article/icebe/2016/6119a017/12OmNyqRnbl", "parentPublication": { "id": "proceedings/icebe/2016/6119/0", "title": "2016 IEEE 13th International Conference on e-Business Engineering (ICEBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iuce/2009/3619/0/3619a152", "title": "Interactive Intelligent Analysis Method: An Application of Criminal Investigation", "doi": null, "abstractUrl": "/proceedings-article/iuce/2009/3619a152/12OmNyvGyha", "parentPublication": { "id": "proceedings/iuce/2009/3619/0", "title": "2009 International Symposium on Intelligent Ubiquitous Computing and Education, IUCE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbase/2022/9639/0/963900a032", "title": "The Design and Implementation of Criminal Investigation Simulation Training System Based on VR Technology", "doi": null, "abstractUrl": "/proceedings-article/cbase/2022/963900a032/1MBRhxbP7he", "parentPublication": { "id": "proceedings/cbase/2022/9639/0", "title": "2022 International Conference on Cloud Computing, Big Data Applications and Software Engineering (CBASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222116", "title": "Visilant: Visual Support for the Exploration and Analytical Process Tracking in Criminal Investigations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222116/1nTqX2JTfG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2020/7083/0/708300a072", "title": "Criminal Investigation Image Retrieval Based on Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2020/708300a072/1oCn1VQKo0M", "parentPublication": { "id": "proceedings/iccnea/2020/7083/0", "title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SXT", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNrMZpG8", "doi": "10.1109/ASONAM.2014.6921689", "title": "PEVNET: A framework for visualization of criminal networks", "normalizedTitle": "PEVNET: A framework for visualization of criminal networks", "abstract": "No major criminal activity is possible without a comprehensive plot behind it. Detecting and understanding criminal activity has been a challenging task for the researchers in criminal networks. One important way of addressing those challenges has been visualization of criminal networks. We propose a framework called PEVNET in which existing visualization techniques for criminal networks are re-designed from a different perspective. Visualization features by way of merging, linking, and grouping of entity attributes is provided to criminal network investigators. Furthermore, we believe that the prevailing challenges to information visualization can be eliminated to a large extent by detecting evolving network patterns, which are extracted by way of visual analysis of criminal activity based on temporal data. Finally, the proposed framework will indicate the most central person in the network in a unique way, which will support the investigators' decision making.", "abstracts": [ { "abstractType": "Regular", "content": "No major criminal activity is possible without a comprehensive plot behind it. Detecting and understanding criminal activity has been a challenging task for the researchers in criminal networks. One important way of addressing those challenges has been visualization of criminal networks. We propose a framework called PEVNET in which existing visualization techniques for criminal networks are re-designed from a different perspective. Visualization features by way of merging, linking, and grouping of entity attributes is provided to criminal network investigators. Furthermore, we believe that the prevailing challenges to information visualization can be eliminated to a large extent by detecting evolving network patterns, which are extracted by way of visual analysis of criminal activity based on temporal data. Finally, the proposed framework will indicate the most central person in the network in a unique way, which will support the investigators' decision making.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "No major criminal activity is possible without a comprehensive plot behind it. Detecting and understanding criminal activity has been a challenging task for the researchers in criminal networks. One important way of addressing those challenges has been visualization of criminal networks. We propose a framework called PEVNET in which existing visualization techniques for criminal networks are re-designed from a different perspective. Visualization features by way of merging, linking, and grouping of entity attributes is provided to criminal network investigators. Furthermore, we believe that the prevailing challenges to information visualization can be eliminated to a large extent by detecting evolving network patterns, which are extracted by way of visual analysis of criminal activity based on temporal data. Finally, the proposed framework will indicate the most central person in the network in a unique way, which will support the investigators' decision making.", "fno": "06921689", "keywords": [ "Data Visualization", "Visualization", "Decision Making", "Social Network Services", "Conferences", "Joining Processes", "Feature Extraction", "Visualization Features", "Information Visualization", "Criminal Networks", "Visual Analysis", "Network Patterns", "Temporal Data" ], "authors": [ { "affiliation": "The Maersk Mc-Kinney Moeller Institute, University of Southern Denmark, Campusvej 55, 5230 Odense M, Denmark", "fullName": "Amer Rasheed", "givenName": "Amer", "surname": "Rasheed", "__typename": "ArticleAuthorType" }, { "affiliation": "The Maersk Mc-Kinney Moeller Institute, University of Southern Denmark, Campusvej 55, 5230 Odense M, Denmark", "fullName": "Uffe Kock Wiil", "givenName": "Uffe Kock", "surname": "Wiil", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "876-881", "year": "2014", "issn": null, "isbn": "978-1-4799-5877-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06921688", "articleId": "12OmNCmpcWo", "__typename": "AdjacentArticleType" }, "next": { "fno": "06921690", "articleId": "12OmNB0FxiU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657156", "title": "Detecting Key Players in Criminal Networks Using Dynalink", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657156/12OmNApu5GT", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a217", "title": "Dynalink: A Framework for Dynamic Criminal Network Visualization", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a217/12OmNBuL1mk", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2014/5103/0/5103a084", "title": "Constructing and Analyzing Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/spw/2014/5103a084/12OmNCwUmDV", "parentPublication": { "id": "proceedings/spw/2014/5103/0", "title": "2014 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a398", "title": "EVA: A Visualization Framework for Organizing Concept Sketches", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a398/12OmNqAU6GU", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403670", "title": "A system for analyzing criminal social networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403670/12OmNx0RIN3", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a360", "title": "Node Removal in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a360/12OmNxymo5L", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2012/4810/0/4810a027", "title": "Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2012/4810a027/12OmNy9Prll", "parentPublication": { "id": "proceedings/cyberc/2012/4810/0", "title": "2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2018/6884/0/08634267", "title": "A Case for Cognitive Models in Visualization Research : Position paper", "doi": null, "abstractUrl": "/proceedings-article/beliv/2018/08634267/17D45XDIXRH", "parentPublication": { "id": "proceedings/beliv/2018/6884/0", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222116", "title": "Visilant: Visual Support for the Exploration and Analytical Process Tracking in Criminal Investigations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222116/1nTqX2JTfG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552846", "title": "A Critical Reflection on Visualization Research: Where Do Decision Making Tasks Hide?", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552846/1xibYOLsNc4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBOll8c", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx0RIN3", "doi": "10.1145/2808797.2808827", "title": "A system for analyzing criminal social networks", "normalizedTitle": "A system for analyzing criminal social networks", "abstract": "The influential members of a criminal organization are usually targeted by criminal investigators for removal or surveillance. Identifying and capturing these influential members will most likely to disrupt the organization. We propose in this paper a forensic analysis system called CLDRI that can identify the most influential members of a criminal organization. First, a network representing a criminal organization is built from Mobile Communication Data that belongs to the organization. In such a network, a vertex represents an individual criminal and an edge represents the communication attempts between two criminals. CLDRI employs formulas that quantify the degree of importance of each vertex in the network relative to all other vertices. We present these formulas through series of improvement refinements. All the formulas incorporate novel-weighting schemes for the edges of networks. We evaluated the quality of CLDRI by comparing it experimentally with two systems. Results showed improvement.", "abstracts": [ { "abstractType": "Regular", "content": "The influential members of a criminal organization are usually targeted by criminal investigators for removal or surveillance. Identifying and capturing these influential members will most likely to disrupt the organization. We propose in this paper a forensic analysis system called CLDRI that can identify the most influential members of a criminal organization. First, a network representing a criminal organization is built from Mobile Communication Data that belongs to the organization. In such a network, a vertex represents an individual criminal and an edge represents the communication attempts between two criminals. CLDRI employs formulas that quantify the degree of importance of each vertex in the network relative to all other vertices. We present these formulas through series of improvement refinements. All the formulas incorporate novel-weighting schemes for the edges of networks. We evaluated the quality of CLDRI by comparing it experimentally with two systems. Results showed improvement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The influential members of a criminal organization are usually targeted by criminal investigators for removal or surveillance. Identifying and capturing these influential members will most likely to disrupt the organization. We propose in this paper a forensic analysis system called CLDRI that can identify the most influential members of a criminal organization. First, a network representing a criminal organization is built from Mobile Communication Data that belongs to the organization. In such a network, a vertex represents an individual criminal and an edge represents the communication attempts between two criminals. CLDRI employs formulas that quantify the degree of importance of each vertex in the network relative to all other vertices. We present these formulas through series of improvement refinements. All the formulas incorporate novel-weighting schemes for the edges of networks. We evaluated the quality of CLDRI by comparing it experimentally with two systems. Results showed improvement.", "fno": "07403670", "keywords": [ "Organizations", "Social Network Services", "Standards Organizations", "Forensics", "Semantics", "Mobile Handsets", "Mobile Communication", "Forensic Analysis", "Criminal Network", "Social Network", "Mobile Communication Data", "Digital Forensic" ], "authors": [ { "affiliation": "Electrical and Computer Engineering Department, Khalifa University, UAE", "fullName": "Kamal Taha", "givenName": "Kamal", "surname": "Taha", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Science and Technology, Bournemouth University, United Kingdom", "fullName": "Paul D. Yoo", "givenName": "Paul D.", "surname": "Yoo", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "1017-1023", "year": "2015", "issn": null, "isbn": "978-1-4503-3854-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07403669", "articleId": "12OmNCvcLH6", "__typename": "AdjacentArticleType" }, "next": { "fno": "07403671", "articleId": "12OmNxw5BvT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892e900", "title": "Investigating the Increase in Mobile Phone Evidence in Criminal Activities", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892e900/12OmNAR1aTc", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403722", "title": "Deciding resilient criminal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403722/12OmNCga1Vd", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2014/5103/0/5103a084", "title": "Constructing and Analyzing Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/spw/2014/5103a084/12OmNCwUmDV", "parentPublication": { "id": "proceedings/spw/2014/5103/0", "title": "2014 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a581", "title": "Detecting Criminal Networks Using Social Similarity", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a581/12OmNrAdsHo", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921689", "title": "PEVNET: A framework for visualization of criminal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921689/12OmNrMZpG8", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a009", "title": "Analyzing Structure of Terrorist Networks by Using Graph Metrics", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a009/12OmNxEjY93", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a360", "title": "Node Removal in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a360/12OmNxymo5L", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2012/4810/0/4810a027", "title": "Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2012/4810a027/12OmNy9Prll", "parentPublication": { "id": "proceedings/cyberc/2012/4810/0", "title": "2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e582", "title": "Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e582/12OmNyRPgqm", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a232", "title": "Association and Centrality in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a232/12OmNyUFfHU", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2XX", "title": "European Intelligence and Security Informatics Conference", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUFfHU", "doi": "10.1109/EISIC.2012.63", "title": "Association and Centrality in Criminal Networks", "normalizedTitle": "Association and Centrality in Criminal Networks", "abstract": "Network-based techniques are widely used in criminal investigations because patterns of association are actionable and understandable. Existing network models with nodes as first class entities and their related measures (e.g., social networks and centrality measures) are unable to capture and analyze the structural richness required to model and investigate criminal network entities and their associations. We demonstrate a need to rethink entity associations with one specific case (inspired by \\textit{The Wire}, a tv series about organized crime in Baltimore, United States) and corroborated by similar evidence from other cases. Our goal is to develop centrality measures for fragmented and non-navigational states of criminal network investigations. A network model with three basic first class entities is presented together with a topology of associations between network entities. We implement three of these associations and extend and test two centrality measures using Crime Fighter Investigator, a novel tool for criminal network investigation. Our findings show that the extended centrality measures offer new insights into criminal networks.", "abstracts": [ { "abstractType": "Regular", "content": "Network-based techniques are widely used in criminal investigations because patterns of association are actionable and understandable. Existing network models with nodes as first class entities and their related measures (e.g., social networks and centrality measures) are unable to capture and analyze the structural richness required to model and investigate criminal network entities and their associations. We demonstrate a need to rethink entity associations with one specific case (inspired by \\textit{The Wire}, a tv series about organized crime in Baltimore, United States) and corroborated by similar evidence from other cases. Our goal is to develop centrality measures for fragmented and non-navigational states of criminal network investigations. A network model with three basic first class entities is presented together with a topology of associations between network entities. We implement three of these associations and extend and test two centrality measures using Crime Fighter Investigator, a novel tool for criminal network investigation. Our findings show that the extended centrality measures offer new insights into criminal networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network-based techniques are widely used in criminal investigations because patterns of association are actionable and understandable. Existing network models with nodes as first class entities and their related measures (e.g., social networks and centrality measures) are unable to capture and analyze the structural richness required to model and investigate criminal network entities and their associations. We demonstrate a need to rethink entity associations with one specific case (inspired by \\textit{The Wire}, a tv series about organized crime in Baltimore, United States) and corroborated by similar evidence from other cases. Our goal is to develop centrality measures for fragmented and non-navigational states of criminal network investigations. A network model with three basic first class entities is presented together with a topology of associations between network entities. We implement three of these associations and extend and test two centrality measures using Crime Fighter Investigator, a novel tool for criminal network investigation. Our findings show that the extended centrality measures offer new insights into criminal networks.", "fno": "4782a232", "keywords": [ "Visualization", "Organizations", "Wires", "Semantics", "Social Network Services", "Analytical Models", "Network Topology", "Investigation", "Association", "Centrality", "Target Centric", "Board Based", "Criminal Networks" ], "authors": [ { "affiliation": null, "fullName": "Rasmus Rosenqvist Petersen", "givenName": "Rasmus Rosenqvist", "surname": "Petersen", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-08-01T00:00:00", "pubType": "proceedings", "pages": "232-241", "year": "2012", "issn": null, "isbn": "978-1-4673-2358-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4782a225", "articleId": "12OmNxzMnZ0", "__typename": "AdjacentArticleType" }, "next": { "fno": "4782a242", "articleId": "12OmNx7ouV4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2012/4799/0/4799a863", "title": "Covertness Centrality in Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a863/12OmNApu5sz", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/society/2013/4998/0/4998a080", "title": "Limited Attention and Centrality in Social Networks", "doi": null, "abstractUrl": "/proceedings-article/society/2013/4998a080/12OmNBDyAbS", "parentPublication": { "id": "proceedings/society/2013/4998/0", "title": "International Conference on Social Intelligence and Technology (SOCIETY)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a131", "title": "Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a131/12OmNBgQFJN", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2010/4138/0/4138a160", "title": "Optimizing Multiple Centrality Computations for Reputation Systems", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a160/12OmNCesr0E", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2012/4858/0/4858a202", "title": "Centrality Indices Computation in Dynamic Networks", "doi": null, "abstractUrl": "/proceedings-article/cit/2012/4858a202/12OmNwMFMet", "parentPublication": { "id": "proceedings/cit/2012/4858/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2008/3473/0/3473a291", "title": "On Novel Economic-Inspired Centrality Measures in Weighted Networks", "doi": null, "abstractUrl": "/proceedings-article/apscc/2008/3473a291/12OmNxRF6Xw", "parentPublication": { "id": "proceedings/apscc/2008/3473/0", "title": "2008 IEEE Asia-Pacific Services Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a360", "title": "Node Removal in Criminal Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a360/12OmNxymo5L", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a197", "title": "CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a197/12OmNyY4rqu", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icm/2011/4522/2/4522b096", "title": "Centrality Analysis of BBS Reply Networks", "doi": null, "abstractUrl": "/proceedings-article/icm/2011/4522b096/12OmNyxXlnp", "parentPublication": { "id": "proceedings/icm/2011/4522/2", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a372", "title": "Trust Centrality in Online Social Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a372/12OmNzTYC2g", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqAU6tA", "title": "2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)", "acronym": "cloudcom-asia", "groupId": "1803725", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzzxus6", "doi": "10.1109/CLOUDCOM-ASIA.2013.38", "title": "An Email Forensics Analysis Method Based on Social Network Analysis", "normalizedTitle": "An Email Forensics Analysis Method Based on Social Network Analysis", "abstract": "Computer crime investigation and forensics is an important research work to combat criminal activity in cyberspace. But the complexity of computer criminal groups makes the computer crime forensics to be a challenge. Email is an important communication mean in computer crime communication. So the email forensics is needed to organized crime. This paper proposed an email forensics method based on graph clustering method and social network analysis (SNA). We analyze and mine emails data of the suspicious users' accounts using the new method, which can create email communication network graph for suspicious computer criminal organizations. The algorithm developed can analyze computer organization's structure and core members. The effectiveness of the method proposed has been proved by our experimental data and results. The research may help investigators to find more email evidence and case clues and improve investigators' email forensic capability, especially to the investigation for organized crime.", "abstracts": [ { "abstractType": "Regular", "content": "Computer crime investigation and forensics is an important research work to combat criminal activity in cyberspace. But the complexity of computer criminal groups makes the computer crime forensics to be a challenge. Email is an important communication mean in computer crime communication. So the email forensics is needed to organized crime. This paper proposed an email forensics method based on graph clustering method and social network analysis (SNA). We analyze and mine emails data of the suspicious users' accounts using the new method, which can create email communication network graph for suspicious computer criminal organizations. The algorithm developed can analyze computer organization's structure and core members. The effectiveness of the method proposed has been proved by our experimental data and results. The research may help investigators to find more email evidence and case clues and improve investigators' email forensic capability, especially to the investigation for organized crime.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Computer crime investigation and forensics is an important research work to combat criminal activity in cyberspace. But the complexity of computer criminal groups makes the computer crime forensics to be a challenge. Email is an important communication mean in computer crime communication. So the email forensics is needed to organized crime. This paper proposed an email forensics method based on graph clustering method and social network analysis (SNA). We analyze and mine emails data of the suspicious users' accounts using the new method, which can create email communication network graph for suspicious computer criminal organizations. The algorithm developed can analyze computer organization's structure and core members. The effectiveness of the method proposed has been proved by our experimental data and results. The research may help investigators to find more email evidence and case clues and improve investigators' email forensic capability, especially to the investigation for organized crime.", "fno": "2830a563", "keywords": [ "Core Member", "Email Forensics", "Organized Crime", "Social Network Analysis SNA", "Betweenness Centrality" ], "authors": [ { "affiliation": null, "fullName": "Yan Hua Liu", "givenName": "Yan Hua", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guo Long Chen", "givenName": "Guo Long", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lili Xie", "givenName": "Lili", "surname": "Xie", "__typename": "ArticleAuthorType" } ], "idPrefix": "cloudcom-asia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "563-569", "year": "2013", "issn": null, "isbn": "978-1-4799-2830-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2830a557", "articleId": "12OmNzVXNOm", "__typename": "AdjacentArticleType" }, "next": { "fno": "2830a570", "articleId": "12OmNyYDDAI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mines/2011/4559/0/06103774", "title": "A Customizable Ranking Method for Digital Evidence Search through Interestingness Injection", "doi": null, "abstractUrl": "/proceedings-article/mines/2011/06103774/12OmNAqCtPQ", "parentPublication": { "id": "proceedings/mines/2011/4559/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/collaboratecom/2013/92/0/06679965", "title": "Towards comprehensive and collaborative forensics on email evidence", "doi": null, "abstractUrl": "/proceedings-article/collaboratecom/2013/06679965/12OmNCbCrY5", "parentPublication": { "id": "proceedings/collaboratecom/2013/92/0", "title": "2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2011/4517/0/4517a388", "title": "Development of Domestic and International Computer Forensics", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2011/4517a388/12OmNrJROWS", "parentPublication": { "id": "proceedings/iih-msp/2011/4517/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcs/2010/4074/0/4074a250", "title": "Application of PageRank Algorithm in Computer Forensics", "doi": null, "abstractUrl": "/proceedings-article/itcs/2010/4074a250/12OmNs4S8By", "parentPublication": { "id": "proceedings/itcs/2010/4074/0", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/2/05380245", "title": "Exploratory Study on Computer Forensics Technology", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/05380245/12OmNvjyxKD", "parentPublication": { "id": "proceedings/iccee/2009/3925/2", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/1/3322a528", "title": "New Digital Forensics Investigation Procedure Model", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322a528/12OmNxA3Z9g", "parentPublication": { "id": "proceedings/ncm/2008/3322/1", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897209", "title": "Anti-forensics techniques: An analytical review", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897209/12OmNxwncp0", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fgcn/2007/3048/2/30480154", "title": "Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics", "doi": null, "abstractUrl": "/proceedings-article/fgcn/2007/30480154/12OmNyPQ4Hj", "parentPublication": { "id": "proceedings/fgcn/2007/3048/2", "title": "Future Generation Communication and Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2003/04/j4015", "title": "Computer Forensics Education", "doi": null, "abstractUrl": "/magazine/sp/2003/04/j4015/13rRUxDItfB", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isceic/2021/4160/0/416000a141", "title": "Research on Electronic Data Forensics Based on RAM", "doi": null, "abstractUrl": "/proceedings-article/isceic/2021/416000a141/1yzP1ETW1j2", "parentPublication": { "id": "proceedings/isceic/2021/4160/0", "title": "2021 2nd International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipH", "title": "2017 IEEE Trustcom/BigDataSE/ICESS", "acronym": "trustcom-bigdatase-icess", "groupId": "1800729", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45WXIkGf", "doi": "10.1109/Trustcom/BigDataSE/ICESS.2017.302", "title": "Volkswagen Car Entertainment System Forensics", "normalizedTitle": "Volkswagen Car Entertainment System Forensics", "abstract": "Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving), the investigators focus on the acquisition of DNA, fingerprints and other identifying materials, usually non digital in nature. However, modern day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, personal data such as call logs, contact lists, SMS messages, pictures, and videos. In this paper, we describe some challenges associated with vehicle data forensics, an understudied area. Next, we present our case study on forensic acquisition and data analysis of an entertainment system on a Volkswagen car.", "abstracts": [ { "abstractType": "Regular", "content": "Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving), the investigators focus on the acquisition of DNA, fingerprints and other identifying materials, usually non digital in nature. However, modern day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, personal data such as call logs, contact lists, SMS messages, pictures, and videos. In this paper, we describe some challenges associated with vehicle data forensics, an understudied area. Next, we present our case study on forensic acquisition and data analysis of an entertainment system on a Volkswagen car.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving), the investigators focus on the acquisition of DNA, fingerprints and other identifying materials, usually non digital in nature. However, modern day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, personal data such as call logs, contact lists, SMS messages, pictures, and videos. In this paper, we describe some challenges associated with vehicle data forensics, an understudied area. Next, we present our case study on forensic acquisition and data analysis of an entertainment system on a Volkswagen car.", "fno": "08029505", "keywords": [ "Automobiles", "Digital Forensics", "Connectors", "Tools", "Entertainment Industry", "Law Enforcement", "Vehicle System Forensics", "Data Acquisition", "Volkswagen Car Forensics", "RNS 510 Forensics" ], "authors": [ { "affiliation": null, "fullName": "Daniel Jacobs", "givenName": "Daniel", "surname": "Jacobs", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kim-Kwang Raymond Choo", "givenName": "Kim-Kwang Raymond", "surname": "Choo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M-Tahar Kechadi", "givenName": "M-Tahar", "surname": "Kechadi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nhien-An Le-Khac", "givenName": "Nhien-An", "surname": "Le-Khac", "__typename": "ArticleAuthorType" } ], "idPrefix": "trustcom-bigdatase-icess", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "699-705", "year": "2017", "issn": "2324-9013", "isbn": "978-1-5090-4906-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08029504", "articleId": "17D45W2WyxL", "__typename": "AdjacentArticleType" }, "next": { "fno": "08029506", "articleId": "17D45X2fUFi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05719005", "title": "Bridging Differences in Digital Forensics for Law Enforcement and National Security", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05719005/12OmNqGRGbz", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2017/5504/0/08022758", "title": "Price evaluation model in second-hand car system based on BP neural network theory", "doi": null, "abstractUrl": "/proceedings-article/snpd/2017/08022758/12OmNrJAdKU", "parentPublication": { "id": "proceedings/snpd/2017/5504/0", "title": "2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07847047", "title": "Log Your Car: The Non-invasive Vehicle Forensics", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07847047/12OmNx3HIdh", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019488", "title": "Multimedia signatures for vehicle forensics", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019488/12OmNxFsmAS", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446461", "title": "In-Car 6-DoF Mixed Reality for Rear-Seat and Co-Driver Entertainment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446461/13bd1fHrlSc", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276764", "title": "A New Digital Forensics Model of Smart City Automated Vehicles", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276764/17D45XvMcd4", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0", "title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2019/01/08674170", "title": "Recent Advancements in Digital Forensics, Part 2", "doi": null, "abstractUrl": "/magazine/sp/2019/01/08674170/18GGoSAPeg0", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/citce/2021/2184/0/218400a171", "title": "The Necessity Analysis of Car Center Console in Car Based on Virtual Technology", "doi": null, "abstractUrl": "/proceedings-article/citce/2021/218400a171/1BtfVv8BIti", "parentPublication": { "id": "proceedings/citce/2021/2184/0", "title": "2021 International Conference on Computer, Internet of Things and Control Engineering (CITCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a031", "title": "AC3R: Automatically Reconstructing Car Crashes from Police Reports", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a031/1cJ7n8xSxMY", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a290", "title": "Automatically Reconstructing Car Crashes from Police Reports for Testing Self-Driving Cars", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a290/1cJ7nMlYJLW", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45Xh13vf", "doi": "10.1109/BigData.2017.8258362", "title": "Cyber crime investigations in the era of big data", "normalizedTitle": "Cyber crime investigations in the era of big data", "abstract": "The amount of data seized in Crime Investigations has increased enormously. Investigators are more than ever confronted with vast amount of heterogeneous data, highly-diverse data formats, increased complexity in distributed stored information. With constantly increasing network bandwidth it makes extremely challenging to process or even store part of the network traffic. Nevertheless, criminal investigations need to solve crimes in a timely manners. New computational methods, infrastructure and algorithmic approaches are required. Although Big Data is a challenge for criminal investigators, it can also help them make to source an detect patterns to prevent and solve crimes. This paper aims to raise attention to current challenges in Cyber Crime Investigations — related to Big Data — and possible ways to approach combating cybercrimes.", "abstracts": [ { "abstractType": "Regular", "content": "The amount of data seized in Crime Investigations has increased enormously. Investigators are more than ever confronted with vast amount of heterogeneous data, highly-diverse data formats, increased complexity in distributed stored information. With constantly increasing network bandwidth it makes extremely challenging to process or even store part of the network traffic. Nevertheless, criminal investigations need to solve crimes in a timely manners. New computational methods, infrastructure and algorithmic approaches are required. Although Big Data is a challenge for criminal investigators, it can also help them make to source an detect patterns to prevent and solve crimes. This paper aims to raise attention to current challenges in Cyber Crime Investigations — related to Big Data — and possible ways to approach combating cybercrimes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The amount of data seized in Crime Investigations has increased enormously. Investigators are more than ever confronted with vast amount of heterogeneous data, highly-diverse data formats, increased complexity in distributed stored information. With constantly increasing network bandwidth it makes extremely challenging to process or even store part of the network traffic. Nevertheless, criminal investigations need to solve crimes in a timely manners. New computational methods, infrastructure and algorithmic approaches are required. Although Big Data is a challenge for criminal investigators, it can also help them make to source an detect patterns to prevent and solve crimes. This paper aims to raise attention to current challenges in Cyber Crime Investigations — related to Big Data — and possible ways to approach combating cybercrimes.", "fno": "08258362", "keywords": [ "Computer Crime", "Big Data", "Digital Forensics", "Tools", "Computers", "Data Analysis", "Digital Forensics", "Big Data", "Cyber Crime", "Criminal Investigation", "Computational Intelligence" ], "authors": [ { "affiliation": "NTNU Digital Forensics Group, Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology", "fullName": "Andrii Shalaginov", "givenName": "Andrii", "surname": "Shalaginov", "__typename": "ArticleAuthorType" }, { "affiliation": "NTNU Digital Forensics Group, Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology", "fullName": "Jan William Johnsen", "givenName": "Jan William", "surname": "Johnsen", "__typename": "ArticleAuthorType" }, { "affiliation": "NTNU Digital Forensics Group, Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology", "fullName": "Katrin Franke", "givenName": "Katrin", "surname": "Franke", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "3672-3676", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08258361", "articleId": "17D45XeKgyx", "__typename": "AdjacentArticleType" }, "next": { "fno": "08258363", "articleId": "17D45W2WyyM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcc-css-icess/2015/8937/0/07336350", "title": "Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/hpcc-css-icess/2015/07336350/12OmNAH5dm1", "parentPublication": { "id": "proceedings/hpcc-css-icess/2015/8937/0", "title": "2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS) and 2015 IEEE 12th International Conf on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657122", "title": "How \"Digital\" is Traditional Crime?", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657122/12OmNBTs7A9", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/1/3322a528", "title": "New Digital Forensics Investigation Procedure Model", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322a528/12OmNxA3Z9g", "parentPublication": { "id": "proceedings/ncm/2008/3322/1", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/4525f404", "title": "Cyber Crime Assessment", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/4525f404/12OmNyQpgR3", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2009/3564/0/3564a143", "title": "The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data", "doi": null, "abstractUrl": "/proceedings-article/ares/2009/3564a143/12OmNzlUKee", "parentPublication": { "id": "proceedings/ares/2009/3564/0", "title": "2009 International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2004/04/r4050", "title": "Crime Data Mining: A General Framework and Some Examples", "doi": null, "abstractUrl": "/magazine/co/2004/04/r4050/13rRUwhpBTf", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0/751800a576", "title": "A Forensic System for Identifying the Suspects of a Crime with No Solid Material Evidences", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2018/751800a576/17D45XERmmz", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0", "title": "2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2022/5488/0/548800a342", "title": "GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2022/548800a342/1LvAoWvBP2M", "parentPublication": { "id": "proceedings/iscsic/2022/5488/0", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006596", "title": "Cybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006596/1hJsduYyj6g", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2020/7022/0/702200a113", "title": "Big Data Platform for Analysing Crime Evidences", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2020/702200a113/1mF8ydHpqQU", "parentPublication": { "id": "proceedings/bigdataservice/2020/7022/0", "title": "2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MBRelnGflK", "title": "2022 International Conference on Cloud Computing, Big Data Applications and Software Engineering (CBASE)", "acronym": "cbase", "groupId": "10092532", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1MBRhxbP7he", "doi": "10.1109/CBASE57816.2022.00014", "title": "The Design and Implementation of Criminal Investigation Simulation Training System Based on VR Technology", "normalizedTitle": "The Design and Implementation of Criminal Investigation Simulation Training System Based on VR Technology", "abstract": "In the face of the reform demand of the current training mode of applied technical talents in criminal investigation, combined with many shortcomings in the actual teaching process of investigation major, this paper will focus on the practical training, design the criminal investigation simulation training system with 3ds Max, Unity3D and other software programs as the core, integrate and package the system with ASP.NET framework, form a standard Web application, and publish it on the server. The system will complete the hierarchical structure design according to the MVC design pattern, and the functional modules will cover the whole process of criminal investigation, thus realizing the high reduction and reproduction of virtual simulation training environment and training projects, and innovatively introducing virtual simulation teaching methods and online teaching forms into criminal investigation professional courses. It is not only conducive to improving students' comprehensive ability and professional quality, but also conducive to overcoming the disadvantages of traditional practical teaching mode, and providing an effective new mode and method for cultivating high- quality applied criminal investigation technical talents.", "abstracts": [ { "abstractType": "Regular", "content": "In the face of the reform demand of the current training mode of applied technical talents in criminal investigation, combined with many shortcomings in the actual teaching process of investigation major, this paper will focus on the practical training, design the criminal investigation simulation training system with 3ds Max, Unity3D and other software programs as the core, integrate and package the system with ASP.NET framework, form a standard Web application, and publish it on the server. The system will complete the hierarchical structure design according to the MVC design pattern, and the functional modules will cover the whole process of criminal investigation, thus realizing the high reduction and reproduction of virtual simulation training environment and training projects, and innovatively introducing virtual simulation teaching methods and online teaching forms into criminal investigation professional courses. It is not only conducive to improving students' comprehensive ability and professional quality, but also conducive to overcoming the disadvantages of traditional practical teaching mode, and providing an effective new mode and method for cultivating high- quality applied criminal investigation technical talents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the face of the reform demand of the current training mode of applied technical talents in criminal investigation, combined with many shortcomings in the actual teaching process of investigation major, this paper will focus on the practical training, design the criminal investigation simulation training system with 3ds Max, Unity3D and other software programs as the core, integrate and package the system with ASP.NET framework, form a standard Web application, and publish it on the server. The system will complete the hierarchical structure design according to the MVC design pattern, and the functional modules will cover the whole process of criminal investigation, thus realizing the high reduction and reproduction of virtual simulation training environment and training projects, and innovatively introducing virtual simulation teaching methods and online teaching forms into criminal investigation professional courses. It is not only conducive to improving students' comprehensive ability and professional quality, but also conducive to overcoming the disadvantages of traditional practical teaching mode, and providing an effective new mode and method for cultivating high- quality applied criminal investigation technical talents.", "fno": "963900a032", "keywords": [ "Training", "Solid Modeling", "Visualization", "Three Dimensional Displays", "Virtual Reality", "Software", "Servers", "VR Technology", "Criminal Investigation", "Unity 3 D", "Training System", "ASP NET" ], "authors": [ { "affiliation": "Sichuan Judicial And Police Officers Peofessional College,Deyang,Sichuan,618000", "fullName": "Hong Zhou", "givenName": "Hong", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Sichuan Judicial And Police Officers Peofessional College,Deyang,Sichuan,618000", "fullName": "Yipeng Yang", "givenName": "Yipeng", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-09-01T00:00:00", "pubType": "proceedings", "pages": "32-35", "year": "2022", "issn": null, "isbn": "979-8-3503-9639-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "963900a027", "articleId": "1MBRh4FHK3m", "__typename": "AdjacentArticleType" }, "next": { "fno": "963900a036", "articleId": "1MBRjVlAdz2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657119", "title": "Issues for the Next Generation of Criminal Network Investigation Tools", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657119/12OmNBgz4AV", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2017/3588/0/3588a215", "title": "Methodology of Communication between a Criminal Database and a Virtual Reality Environment for Forensic Study", "doi": null, "abstractUrl": "/proceedings-article/svr/2017/3588a215/12OmNxymocm", "parentPublication": { "id": "proceedings/svr/2017/3588/0", "title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446614", "title": "Using Industrial Robots as Haptic Devices for VR-Training", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446614/13bd1h03qOq", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2019/1307/0/130700a143", "title": "The Application of VR Technology in the Construction of Learning Resources of Mobile Application Platform", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2019/130700a143/18Av0l0Iily", "parentPublication": { "id": "proceedings/icitbs/2019/1307/0", "title": "2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a173", "title": "Virtual Training Scheme for Practice Education in “New Business” Disciplines", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a173/1AUpI0uQ8BG", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/accc/2021/0743/0/074300a045", "title": "Apply VR to Carry out Crew Escape Training", "doi": null, "abstractUrl": "/proceedings-article/accc/2021/074300a045/1AqxR0BptlK", "parentPublication": { "id": "proceedings/accc/2021/0743/0", "title": "2021 2nd Asia Conference on Computers and Communications (ACCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a287", "title": "Towards VR Simulation-Based Training in Brain Death Determination", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a287/1CJfaMz7saI", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itei/2021/8050/0/805000a232", "title": "VR technology applied to traditional dance", "doi": null, "abstractUrl": "/proceedings-article/itei/2021/805000a232/1CzeG2lZvEI", "parentPublication": { "id": "proceedings/itei/2021/8050/0", "title": "2021 3rd International Conference on Internet Technology and Educational Informization (ITEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccgiv/2022/9250/0/925000a165", "title": "The Design and Development of Online Training System for Automobile Inspection and Maintenance Technology Specialty Based on Virtual Reality Technology", "doi": null, "abstractUrl": "/proceedings-article/iccgiv/2022/925000a165/1LxfoiNIUWA", "parentPublication": { "id": "proceedings/iccgiv/2022/9250/0", "title": "2022 2nd International Conference on Computer Graphics, Image and Virtualization (ICCGIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2020/7083/0/708300a072", "title": "Criminal Investigation Image Retrieval Based on Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2020/708300a072/1oCn1VQKo0M", "parentPublication": { "id": "proceedings/iccnea/2020/7083/0", "title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1bolVrAtqZq", "title": "2018 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1bolW6n2bG8", "doi": "10.1109/EISIC.2018.00023", "title": "Using Wearable Device Data in a Criminal Investigation: A Preliminary Study", "normalizedTitle": "Using Wearable Device Data in a Criminal Investigation: A Preliminary Study", "abstract": "Wearable devices collect and share data through social networks accessed by a smartphone. We can therefore view the smartphone carried by a criminal suspect as a central repository of information that may be useful in a criminal investigation. In this paper, we look at a simple case study involving a wearable fitness tracker. In particular, we try to determine if a phone synced with a fitness tracker can provide evidence related to the execution of a violent act.", "abstracts": [ { "abstractType": "Regular", "content": "Wearable devices collect and share data through social networks accessed by a smartphone. We can therefore view the smartphone carried by a criminal suspect as a central repository of information that may be useful in a criminal investigation. In this paper, we look at a simple case study involving a wearable fitness tracker. In particular, we try to determine if a phone synced with a fitness tracker can provide evidence related to the execution of a violent act.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Wearable devices collect and share data through social networks accessed by a smartphone. We can therefore view the smartphone carried by a criminal suspect as a central repository of information that may be useful in a criminal investigation. In this paper, we look at a simple case study involving a wearable fitness tracker. In particular, we try to determine if a phone synced with a fitness tracker can provide evidence related to the execution of a violent act.", "fno": "08752980", "keywords": [ "Data Handling", "Mobile Computing", "Police Data Processing", "Smart Phones", "Social Networking Online", "Wearable Computers", "Wearable Fitness Tracker", "Wearable Device Data", "Criminal Investigation", "Social Networks", "Smartphone", "Criminal Suspect", "Central Information Repository", "Violent Act Execution" ], "authors": [ { "affiliation": "British Columbia Institute of Technology, Burnaby, BC", "fullName": "Sarah McNary", "givenName": "Sarah", "surname": "McNary", "__typename": "ArticleAuthorType" }, { "affiliation": "British Columbia Institute of Technology, Burnaby, BC", "fullName": "Aaron Hunter", "givenName": "Aaron", "surname": "Hunter", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "85-85", "year": "2018", "issn": null, "isbn": "978-1-5386-9400-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08752947", "articleId": "1bolVCxakZG", "__typename": "AdjacentArticleType" }, "next": { "fno": "08752985", "articleId": "1bolWTl7IWc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mdm/2017/3932/0/07962486", "title": "A Look at Wearable Abandonment", "doi": null, "abstractUrl": "/proceedings-article/mdm/2017/07962486/12OmNB8kHVP", "parentPublication": { "id": "proceedings/mdm/2017/3932/0", "title": "2017 18th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657119", "title": "Issues for the Next Generation of Criminal Network Investigation Tools", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657119/12OmNBgz4AV", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ici/2011/4618/0/4618a118", "title": "Digital Fitness Connector: Smart Wearable System", "doi": null, "abstractUrl": "/proceedings-article/ici/2011/4618a118/12OmNCdk2wy", "parentPublication": { "id": "proceedings/ici/2011/4618/0", "title": "Informatics and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/1998/9074/0/90740033", "title": "Preliminary Investigation of Wearable Computers for Task Guidance in Aircraft Inspection", "doi": null, "abstractUrl": "/proceedings-article/iswc/1998/90740033/12OmNvIxeYa", "parentPublication": { "id": "proceedings/iswc/1998/9074/0", "title": "Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518406", "title": "Design of a Wearable Device for Monitoring SpO2 Continuously", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518406/12OmNxE2n0w", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a197", "title": "CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a197/12OmNyY4rqu", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042543", "title": "VACI: Towards visual analytics for criminal investigation", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042543/12OmNyoSbgr", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2017/1710/0/1710a672", "title": "Weightbit: An Advancement in Wearable Technology", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a672/12OmNzZmZxu", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b767", "title": "Security and Privacy Analysis of Wearable Health Device", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b767/1nkDeImgVbi", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2020/7083/0/708300a072", "title": "Criminal Investigation Image Retrieval Based on Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2020/708300a072/1oCn1VQKo0M", "parentPublication": { "id": "proceedings/iccnea/2020/7083/0", "title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxG1yTx", "title": "Sixth International Conference on Data Mining (ICDM'06)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNwE9OOF", "doi": "10.1109/ICDM.2006.39", "title": "Comparison of Descriptor Spaces for Chemical Compound Retrieval and Classification", "normalizedTitle": "Comparison of Descriptor Spaces for Chemical Compound Retrieval and Classification", "abstract": "In recent years the development of computational techniques that build models to correctly assign chemical compounds to various classes or to retrieve potential drug-like compounds has been an active area of research. Many of the best-performing techniques for these tasks utilize a descriptor-based representation of the compound that captures various aspects of the underlying molecular graph's topology. In this paper we compare different set of descriptors that are currently used for chemical compound classification. In this process, we also introduce four different descriptors derived from all connected fragments present in the molecular graphs. In addition, we introduce an extension to existing vector-based kernel functions to take into account the length of the fragments present in the descriptors. We experimentally evaluate the performance of the previously introduced and the new descriptors in the context of SVM-based classification and ranked-retrieval on 28 classification and retrieval problems derived from 18 datasets. Our experiments show that for both these tasks, the new descriptors consistently and statistically outperform previously developed schemes based on the widely used fingerprint- and Maces keys-based descriptors, as well as recently introduced descriptors obtained by mining and analyzing the structure of the molecular graphs.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years the development of computational techniques that build models to correctly assign chemical compounds to various classes or to retrieve potential drug-like compounds has been an active area of research. Many of the best-performing techniques for these tasks utilize a descriptor-based representation of the compound that captures various aspects of the underlying molecular graph's topology. In this paper we compare different set of descriptors that are currently used for chemical compound classification. In this process, we also introduce four different descriptors derived from all connected fragments present in the molecular graphs. In addition, we introduce an extension to existing vector-based kernel functions to take into account the length of the fragments present in the descriptors. We experimentally evaluate the performance of the previously introduced and the new descriptors in the context of SVM-based classification and ranked-retrieval on 28 classification and retrieval problems derived from 18 datasets. Our experiments show that for both these tasks, the new descriptors consistently and statistically outperform previously developed schemes based on the widely used fingerprint- and Maces keys-based descriptors, as well as recently introduced descriptors obtained by mining and analyzing the structure of the molecular graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years the development of computational techniques that build models to correctly assign chemical compounds to various classes or to retrieve potential drug-like compounds has been an active area of research. Many of the best-performing techniques for these tasks utilize a descriptor-based representation of the compound that captures various aspects of the underlying molecular graph's topology. In this paper we compare different set of descriptors that are currently used for chemical compound classification. In this process, we also introduce four different descriptors derived from all connected fragments present in the molecular graphs. In addition, we introduce an extension to existing vector-based kernel functions to take into account the length of the fragments present in the descriptors. We experimentally evaluate the performance of the previously introduced and the new descriptors in the context of SVM-based classification and ranked-retrieval on 28 classification and retrieval problems derived from 18 datasets. Our experiments show that for both these tasks, the new descriptors consistently and statistically outperform previously developed schemes based on the widely used fingerprint- and Maces keys-based descriptors, as well as recently introduced descriptors obtained by mining and analyzing the structure of the molecular graphs.", "fno": "04053093", "keywords": [ "Chemistry Computing", "Drugs", "Graph Theory", "Information Retrieval", "Pattern Classification", "Support Vector Machines", "Descriptor Space Comparison", "Chemical Compound Retrieval", "Chemical Compound Classification", "Drug Like Compound Retrieval", "Descriptor Based Representation", "Molecular Graph Topology", "Vector Based Kernel Function", "Descriptor Fragment Length", "SVM Based Classification", "Ranked Retrieval", "Chemical Compounds", "Information Retrieval", "Kernel", "Fingerprint Recognition", "Drugs", "Computer Science", "Cities And Towns", "Topology", "Data Mining", "Diseases" ], "authors": [ { "affiliation": "University of Minnesota, USA", "fullName": "Nikil Wale", "givenName": "Nikil", "surname": "Wale", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Minnesota, USA", "fullName": "George Karypis", "givenName": "George", "surname": "Karypis", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "678-689", "year": "2006", "issn": "1550-4786", "isbn": "0-7695-2701-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "270100667", "articleId": "12OmNANkodG", "__typename": "AdjacentArticleType" }, "next": { "fno": "270100690", "articleId": "12OmNqHqStb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2014/5464/0/06982869", "title": "Graph methods for predicting the function of chemical compounds", "doi": null, "abstractUrl": "/proceedings-article/grc/2014/06982869/12OmNA1mbg0", "parentPublication": { "id": "proceedings/grc/2014/5464/0", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2009/4830/0/05255025", "title": "Parallel branch-and-bound approach with MPI technology in inferring chemical compounds with path frequency", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255025/12OmNAYoKtR", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363857", "title": "Cell analytics in compound hit selection of bacterial inhibitors", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363857/12OmNwGZNO1", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999307", "title": "Efficient parallel algorithm for compound comparisons on multi-GPUs", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999307/12OmNxymocC", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420679", "title": "Predicting the Absorption Potential of Chemical Compounds Through a Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420679/13rRUxlgy2e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/02/09855220", "title": "Effectively Identifying Compound-Protein Interaction Using Graph Neural Representation", "doi": null, "abstractUrl": "/journal/tb/2023/02/09855220/1FKFy1x654Q", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a203", "title": "OntoQSAR: an Ontology for Interpreting Chemical and Biological Data in Quantitative Structure-Activity Relationship Studies", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a203/1iffAd5Kog0", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222282", "title": "ChemVA: Interactive Visual Analysis of Chemical Compound Similarity in Virtual Screening", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222282/1nTqBnKw66Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a190", "title": "FooDisNET: a database of food-compound-protein-disease associations", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a190/1pBMtNqJgic", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09442962", "title": "SPP-CPI: Predicting Compound–Protein Interactions Based On Neural Networks", "doi": null, "abstractUrl": "/journal/tb/2022/01/09442962/1tWJ2dwXTj2", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrnJ6Js", "title": "2010 Fifth Annual ChinaGrid Conference", "acronym": "chinagrid", "groupId": "1002436", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNy49sE1", "doi": "10.1109/ChinaGrid.2010.40", "title": "A Data Management System for Pre-docking in Large-Scale Virtual Screening", "normalizedTitle": "A Data Management System for Pre-docking in Large-Scale Virtual Screening", "abstract": "Virtual screening is a new approach attracting increasing levels of interest in the pharmaceutical industry, as a productive and cost-effective technology in the search for novel lead compounds. The preparation of millions of small molecular compounds is the prerequisite for large-scale virtual screening, and these massive data are usually provided with different format. In addition, scientists often need to select some of them that meet certain conditions. Therefore, an efficient data management approach is playing an important role in virtual screening process for managing large-scale small molecular compounds. In this paper, we represent a comprehensive data management framework for pre-docking in large-scale virtual screening. In this framework, we construct a distributed chemical database and utilize parallel processing approach to search certain molecules from the database on the scale of at least several million. We also develop a proxy schema, which is responsible to perform the basic function (such as, splitting large-scale data, update, insert and so on) a collection of multiple, logically interrelated databases distributed over a computer network, meanwhile, we design and establish a rule of splitting large-scale data with optimization. Finally, we simulate and demonstrate a stress test of constructing and searching database. It turns out that our proposal could make the preparing phase of virtual screening process more simple and efficient.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual screening is a new approach attracting increasing levels of interest in the pharmaceutical industry, as a productive and cost-effective technology in the search for novel lead compounds. The preparation of millions of small molecular compounds is the prerequisite for large-scale virtual screening, and these massive data are usually provided with different format. In addition, scientists often need to select some of them that meet certain conditions. Therefore, an efficient data management approach is playing an important role in virtual screening process for managing large-scale small molecular compounds. In this paper, we represent a comprehensive data management framework for pre-docking in large-scale virtual screening. In this framework, we construct a distributed chemical database and utilize parallel processing approach to search certain molecules from the database on the scale of at least several million. We also develop a proxy schema, which is responsible to perform the basic function (such as, splitting large-scale data, update, insert and so on) a collection of multiple, logically interrelated databases distributed over a computer network, meanwhile, we design and establish a rule of splitting large-scale data with optimization. Finally, we simulate and demonstrate a stress test of constructing and searching database. It turns out that our proposal could make the preparing phase of virtual screening process more simple and efficient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual screening is a new approach attracting increasing levels of interest in the pharmaceutical industry, as a productive and cost-effective technology in the search for novel lead compounds. The preparation of millions of small molecular compounds is the prerequisite for large-scale virtual screening, and these massive data are usually provided with different format. In addition, scientists often need to select some of them that meet certain conditions. Therefore, an efficient data management approach is playing an important role in virtual screening process for managing large-scale small molecular compounds. In this paper, we represent a comprehensive data management framework for pre-docking in large-scale virtual screening. In this framework, we construct a distributed chemical database and utilize parallel processing approach to search certain molecules from the database on the scale of at least several million. We also develop a proxy schema, which is responsible to perform the basic function (such as, splitting large-scale data, update, insert and so on) a collection of multiple, logically interrelated databases distributed over a computer network, meanwhile, we design and establish a rule of splitting large-scale data with optimization. Finally, we simulate and demonstrate a stress test of constructing and searching database. It turns out that our proposal could make the preparing phase of virtual screening process more simple and efficient.", "fno": "05563017", "keywords": [ "Chemical Engineering Computing", "Distributed Databases", "Parallel Processing", "Pharmaceuticals", "Data Management System", "Large Scale Virtual Screening", "Pharmaceutical Industry", "Cost Effective Technology", "Large Scale Small Molecular Compound", "Parallel Processing Approach", "Distributed Chemical Database", "Computer Network", "Large Scale Data", "Optimization", "Distributed Databases", "Compounds", "Chemicals", "Drugs", "Filtering", "Relational Databases", "Virtual Screening", "Data Management System", "Parallel Computing", "Chemical Database" ], "authors": [ { "affiliation": null, "fullName": "JiuQiang Chen", "givenName": "JiuQiang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "RuiSheng Zhang", "givenName": "RuiSheng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "ShiLin Chen", "givenName": "ShiLin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "LiFen Li", "givenName": "LiFen", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying Zhang", "givenName": "Ying", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "ChengDa Yuan", "givenName": "ChengDa", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lian Li", "givenName": "Lian", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "chinagrid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "109-114", "year": "2010", "issn": "1949-131X", "isbn": "978-1-4244-7543-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05563020", "articleId": "12OmNC3FGmI", "__typename": "AdjacentArticleType" }, "next": { "fno": "05563018", "articleId": "12OmNqzu6PW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/chinagrid/2010/7543/0/05563023", "title": "ChemDataBase 2: An Enhanced Chemical Database Management System for Virtual Screening", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2010/05563023/12OmNBz101d", "parentPublication": { "id": "proceedings/chinagrid/2010/7543/0", "title": "2010 Fifth Annual ChinaGrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2012/4897/0/4897a350", "title": "Hadoop MapReduce Framework to Implement Molecular Docking of Large-Scale Virtual Screening", "doi": null, "abstractUrl": "/proceedings-article/apscc/2012/4897a350/12OmNvRU0oB", "parentPublication": { "id": "proceedings/apscc/2012/4897/0", "title": "2012 IEEE Asia-Pacific Services Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2012/4357/0/06399686", "title": "Enhancing the effectiveness of virtual screening by using the ChemBioServer: Application to the discovery of PI3Kα inhibitors", "doi": null, "abstractUrl": "/proceedings-article/bibe/2012/06399686/12OmNxdVh0j", "parentPublication": { "id": "proceedings/bibe/2012/4357/0", "title": "2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2011/0885/0/06051740", "title": "A Data Management Tool for Virtual Screening on Grid", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2011/06051740/12OmNywxlIx", "parentPublication": { "id": "proceedings/chinagrid/2011/0885/0", "title": "2011 Sixth Annual Chinagrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2017/6611/0/07973756", "title": "mD3DOCKxb: An Ultra-Scalable CPU-MIC Coordinated Virtual Screening Framework", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2017/07973756/12OmNz5JBUz", "parentPublication": { "id": "proceedings/ccgrid/2017/6611/0", "title": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2014/4116/0/4116a536", "title": "Exploring Large Scale Receptor-Ligand Pairs in Molecular Docking Workflows in HPC Clouds", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2014/4116a536/12OmNzUPpin", "parentPublication": { "id": "proceedings/ipdpsw/2014/4116/0", "title": "2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2007/2833/0/04215439", "title": "Large Scale Deployment of Molecular Docking Application on Computational Grid infrastructures for Combating Malaria", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2007/04215439/183rAeGtLQY", "parentPublication": { "id": "proceedings/ccgrid/2007/2833/0", "title": "Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669513", "title": "Docking-based Virtual Screening with Multi-Task Learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669513/1A9WeSMJHkA", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a483", "title": "Research on Parallel Processing Method for Ultra-large-scale Drug Screening Data", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a483/1BmOj9ifDFK", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a251", "title": "A Protein Embedding Model for Drug Molecular Screening", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a251/1jdDwPZLRvO", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZq8", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyywxAA", "doi": "10.1109/BIBM.2014.6999387", "title": "Scaffold-based chemical space exploration", "normalizedTitle": "Scaffold-based chemical space exploration", "abstract": "The chemical space exploration is an in-silico lead discovery process which is not restricted by the existing compound libraries. On the other hand, the vastness of the chemical space can pose a limit on its application. That is also the case of a recently introduced molecular morphing-based method called Molpher which is focused on exploring the space between a pair of molecules by finding a connecting path between them. However, identification of this path is, in some cases, beyond the limits of the method due to the size of the space. Therefore, we are introducing a modified approach which utilizes chemical scaffolds in the exploration process. The new approach first simplifies the start and target compounds using their scaffolds, and subsequently finds a path within a much smaller space of scaffolds. This path forms a set of guides to be used for finding a path in the original chemical space. This way the originally complex problem is broken down into smaller problems which can be solved faster. Our method shows a significant speed-up over the existing approach (about 58%) and results in an increased number of cases in which the path is found for distant molecules.", "abstracts": [ { "abstractType": "Regular", "content": "The chemical space exploration is an in-silico lead discovery process which is not restricted by the existing compound libraries. On the other hand, the vastness of the chemical space can pose a limit on its application. That is also the case of a recently introduced molecular morphing-based method called Molpher which is focused on exploring the space between a pair of molecules by finding a connecting path between them. However, identification of this path is, in some cases, beyond the limits of the method due to the size of the space. Therefore, we are introducing a modified approach which utilizes chemical scaffolds in the exploration process. The new approach first simplifies the start and target compounds using their scaffolds, and subsequently finds a path within a much smaller space of scaffolds. This path forms a set of guides to be used for finding a path in the original chemical space. This way the originally complex problem is broken down into smaller problems which can be solved faster. Our method shows a significant speed-up over the existing approach (about 58%) and results in an increased number of cases in which the path is found for distant molecules.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The chemical space exploration is an in-silico lead discovery process which is not restricted by the existing compound libraries. On the other hand, the vastness of the chemical space can pose a limit on its application. That is also the case of a recently introduced molecular morphing-based method called Molpher which is focused on exploring the space between a pair of molecules by finding a connecting path between them. However, identification of this path is, in some cases, beyond the limits of the method due to the size of the space. Therefore, we are introducing a modified approach which utilizes chemical scaffolds in the exploration process. The new approach first simplifies the start and target compounds using their scaffolds, and subsequently finds a path within a much smaller space of scaffolds. This path forms a set of guides to be used for finding a path in the original chemical space. This way the originally complex problem is broken down into smaller problems which can be solved faster. Our method shows a significant speed-up over the existing approach (about 58%) and results in an increased number of cases in which the path is found for distant molecules.", "fno": "06999387", "keywords": [ "Chemicals", "Space Exploration", "Drugs", "Compounds", "Biology", "Databases", "Tin" ], "authors": [ { "affiliation": "Faculty of Mathematics and Physics, Charles University in Prague, Prague, Czech Republic", "fullName": "David Hoksza", "givenName": "David", "surname": "Hoksza", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Mathematics and Physics, Charles University in Prague, Prague, Czech Republic", "fullName": "Petr Skoda", "givenName": "Petr", "surname": "Skoda", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "1-3", "year": "2014", "issn": null, "isbn": "978-1-4799-5669-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06999386", "articleId": "12OmNwKGAkn", "__typename": "AdjacentArticleType" }, "next": { "fno": "06999388", "articleId": "12OmNCw3z9w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2013/0174/0/06607895", "title": "Chemical space visualization using ViFrame", "doi": null, "abstractUrl": "/proceedings-article/icis/2013/06607895/12OmNxQOjGi", "parentPublication": { "id": "proceedings/icis/2013/0174/0", "title": "2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2011/4391/0/4391a201", "title": "Exploration of Chemical Space by Molecular Morphing", "doi": null, "abstractUrl": "/proceedings-article/bibe/2011/4391a201/12OmNyrZLA1", "parentPublication": { "id": "proceedings/bibe/2011/4391/0", "title": "2011 IEEE 11th International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420679", "title": "Predicting the Absorption Potential of Chemical Compounds Through a Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420679/13rRUxlgy2e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08353138", "title": "Resource Cut, a New Bounding Procedure to Algorithms for Enumerating Tree-Like Chemical Graphs", "doi": null, "abstractUrl": "/journal/tb/2019/01/08353138/17D45XwUAMZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a363", "title": "Embedding of FDA Approved Drugs in Chemical Space Using Cascade Autoencoder with Metric Learning", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a363/1BYIFDtIOe4", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995561", "title": "HelixMO: Sample-Efficient Molecular Optimization in Scene-Sensitive Latent Space", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995561/1JC23yWxizC", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/09007520", "title": "Incorporating Clinical, Chemical and Biological Information for Predicting Small Molecule-microRNA Associations Based on Non-Negative Matrix Factorization", "doi": null, "abstractUrl": "/journal/tb/2021/06/09007520/1hJKfx8AYgM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a203", "title": "OntoQSAR: an Ontology for Interpreting Chemical and Biological Data in Quantitative Structure-Activity Relationship Studies", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a203/1iffAd5Kog0", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a251", "title": "A Protein Embedding Model for Drug Molecular Screening", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a251/1jdDwPZLRvO", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09104900", "title": "Generic Context-Aware Group Contributions", "doi": null, "abstractUrl": "/journal/tb/2022/01/09104900/1kj0H77uXfi", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jdDt7kZ5jq", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "acronym": "bigcomp", "groupId": "1803439", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jdDwPZLRvO", "doi": "10.1109/BigComp48618.2020.00-66", "title": "A Protein Embedding Model for Drug Molecular Screening", "normalizedTitle": "A Protein Embedding Model for Drug Molecular Screening", "abstract": "Application of machine learning method in new drug development can greatly shorten the process of experimental discovery and reduce the risk of clinical failure. However, the feature extraction of proteins sequence is very difficult due to the large dimension. To this end, we propose a Protein Embedding Model(PEM) for drug molecular screening to predict the interaction between proteins and small molecules. Specifically, PEM first classifies 20 kinds of amino acids into 6 categories to reduce the dimension and learns the representation of protein borrowing the idea of word embedding. Then the model uses multiple imputation to fill the physical and chemical properties of small molecule compounds. Finally, the model uses LightGBM model to predict the affinity value Ki between proteins and small molecules. Experiments show that the model can effectively extract the features of proteins and small molecules and outperforms other traditional methods on the data provided by a drug discovery and development company.", "abstracts": [ { "abstractType": "Regular", "content": "Application of machine learning method in new drug development can greatly shorten the process of experimental discovery and reduce the risk of clinical failure. However, the feature extraction of proteins sequence is very difficult due to the large dimension. To this end, we propose a Protein Embedding Model(PEM) for drug molecular screening to predict the interaction between proteins and small molecules. Specifically, PEM first classifies 20 kinds of amino acids into 6 categories to reduce the dimension and learns the representation of protein borrowing the idea of word embedding. Then the model uses multiple imputation to fill the physical and chemical properties of small molecule compounds. Finally, the model uses LightGBM model to predict the affinity value Ki between proteins and small molecules. Experiments show that the model can effectively extract the features of proteins and small molecules and outperforms other traditional methods on the data provided by a drug discovery and development company.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Application of machine learning method in new drug development can greatly shorten the process of experimental discovery and reduce the risk of clinical failure. However, the feature extraction of proteins sequence is very difficult due to the large dimension. To this end, we propose a Protein Embedding Model(PEM) for drug molecular screening to predict the interaction between proteins and small molecules. Specifically, PEM first classifies 20 kinds of amino acids into 6 categories to reduce the dimension and learns the representation of protein borrowing the idea of word embedding. Then the model uses multiple imputation to fill the physical and chemical properties of small molecule compounds. Finally, the model uses LightGBM model to predict the affinity value Ki between proteins and small molecules. Experiments show that the model can effectively extract the features of proteins and small molecules and outperforms other traditional methods on the data provided by a drug discovery and development company.", "fno": "603400a251", "keywords": [ "Biology Computing", "Drugs", "Feature Extraction", "Learning Artificial Intelligence", "Molecular Biophysics", "Pattern Classification", "Proteins", "Light GBM Model", "Drug Discovery", "Drug Molecular Screening", "Machine Learning Method", "Drug Development", "Experimental Discovery", "Clinical Failure", "Feature Extraction", "Word Embedding", "Molecule Compounds", "Protein Sequence", "Amino Acids", "Feature Extraction", "Drugs", "Protein Sequence", "Chemicals", "Compounds", "Protein Embedding", "Drug Molecular Screening", "Light GBM", "Multiple Imputation" ], "authors": [ { "affiliation": "Dalian University, China", "fullName": "Chao Che", "givenName": "Chao", "surname": "Che", "__typename": "ArticleAuthorType" }, { "affiliation": "Dalian University, China", "fullName": "Min Zhu", "givenName": "Min", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Sungkyunkwan University, Republic of Korea", "fullName": "Yongjun Zhu", "givenName": "Yongjun", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Dalian University, China", "fullName": "Qiang Zhang", "givenName": "Qiang", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dalian University, China", "fullName": "Dongsheng Zhou", "givenName": "Dongsheng", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Dalian University, China", "fullName": "Bin Wang", "givenName": "Bin", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigcomp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-02-01T00:00:00", "pubType": "proceedings", "pages": "251-254", "year": "2020", "issn": null, "isbn": "978-1-7281-6034-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "603400a247", "articleId": "1jdDyO110di", "__typename": "AdjacentArticleType" }, "next": { "fno": "603400a255", "articleId": "1jdDxHZOyIM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2011/1799/0/06120421", "title": "Discovering Drug-Protein Interactions Based on their Fingerprints", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120421/12OmNsbY6L4", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822758", "title": "Prediction and analysis of hot region in protein-protein interactions", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822758/12OmNyoiYV6", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a379", "title": "A Scatterplot-Based Visual Analytics Tool for Protein Pocket Properties", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a379/12OmNzayNu1", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/05/07931669", "title": "Drug Target Prediction by Multi-View Low Rank Embedding", "doi": null, "abstractUrl": "/journal/tb/2019/05/07931669/13rRUwI5TPC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09965616", "title": "CPGL: Prediction of Compound-Protein Interaction by Integrating Graph Attention Network With Long Short-Term Memory Neural Network", "doi": null, "abstractUrl": "/journal/tb/5555/01/09965616/1IHMM98y7eM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10018845", "title": "A Deep Neural Network-based Co-coding Method to Predict Drug-protein Interactions by Analyzing the Feature Consistency between Drugs and Proteins", "doi": null, "abstractUrl": "/journal/tb/5555/01/10018845/1K0DyMhbdNS", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinc/2022/0969/0/096900a116", "title": "Drug-target affinity prediction method based on consistent expression of heterogeneous data", "doi": null, "abstractUrl": "/proceedings-article/icinc/2022/096900a116/1M673uAUUcU", "parentPublication": { "id": "proceedings/icinc/2022/0969/0", "title": "2022 International Conference on Informatics, Networking and Computing (ICINC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a928", "title": "3D Deep Learning for Biological Function Prediction from Physical Fields", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a928/1qyxiJWhDNe", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/04/09419084", "title": "Detection of Binding Sites on SARS-CoV-2 Spike Protein Receptor-Binding Domain by Molecular Dynamics Simulations in Mixed Solvents", "doi": null, "abstractUrl": "/journal/tb/2021/04/09419084/1tcfAabAHza", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09425008", "title": "Drug-Target Interaction Prediction Using Multi-Head Self-Attention and Graph Attention Network", "doi": null, "abstractUrl": "/journal/tb/2022/04/09425008/1tnRUZeg0YU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pP3sSVh3BS", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pP3vMvGpQA", "doi": "10.1109/ICTAI50040.2020.00143", "title": "Fuzzy Classifiers for Chemical Compound Recognition from SAW Sensors Signals", "normalizedTitle": "Fuzzy Classifiers for Chemical Compound Recognition from SAW Sensors Signals", "abstract": "Chemical vapor analysis devices are booming, thanks to a growing need in areas such as security and quality control. These control devices are based on various technologies that are the subject of important researches in an ever-growing community of physicists and electronics. However, the data from these sensors are often processed by conventional algorithms poorly configured for the purpose of automatically recognizing target chemical compounds. These algorithms are often based on statistical models that are not always adapted to a limited number of learning data and demonstrated reproducibility problems for these kind of sensors. In this article, we propose to train fuzzy models and compare their performances with the classical methods of the state of the art, to show how practical they can be for such applications. Three different uses cases will be studied: toxic chemicals recognition, detection of counterfeit coffee capsules and detection of a chemical weapon among everyday products.", "abstracts": [ { "abstractType": "Regular", "content": "Chemical vapor analysis devices are booming, thanks to a growing need in areas such as security and quality control. These control devices are based on various technologies that are the subject of important researches in an ever-growing community of physicists and electronics. However, the data from these sensors are often processed by conventional algorithms poorly configured for the purpose of automatically recognizing target chemical compounds. These algorithms are often based on statistical models that are not always adapted to a limited number of learning data and demonstrated reproducibility problems for these kind of sensors. In this article, we propose to train fuzzy models and compare their performances with the classical methods of the state of the art, to show how practical they can be for such applications. Three different uses cases will be studied: toxic chemicals recognition, detection of counterfeit coffee capsules and detection of a chemical weapon among everyday products.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Chemical vapor analysis devices are booming, thanks to a growing need in areas such as security and quality control. These control devices are based on various technologies that are the subject of important researches in an ever-growing community of physicists and electronics. However, the data from these sensors are often processed by conventional algorithms poorly configured for the purpose of automatically recognizing target chemical compounds. These algorithms are often based on statistical models that are not always adapted to a limited number of learning data and demonstrated reproducibility problems for these kind of sensors. In this article, we propose to train fuzzy models and compare their performances with the classical methods of the state of the art, to show how practical they can be for such applications. Three different uses cases will be studied: toxic chemicals recognition, detection of counterfeit coffee capsules and detection of a chemical weapon among everyday products.", "fno": "922800a917", "keywords": [ "Automatic Optical Inspection", "Chemical Sensors", "Fuzzy Set Theory", "Learning Artificial Intelligence", "Neural Nets", "Pattern Classification", "Production Engineering Computing", "Quality Control", "Surface Acoustic Wave Sensors", "Weapons", "Fuzzy Classifiers", "Chemical Compound Recognition", "SAW Sensors Signals", "Chemical Vapor Analysis Devices", "Quality Control", "Control Devices", "Important Researches", "Physicists", "Electronics", "Conventional Algorithms", "Automatically Recognizing Target Chemical Compounds", "Statistical Models", "Learning Data", "Demonstrated Reproducibility Problems", "Fuzzy Models", "Toxic Chemicals Recognition", "Chemical Weapon", "Chemical Sensors", "Adaptation Models", "Weapons", "Toxic Chemicals", "Tools", "Chemical Compounds", "Chemicals", "Fuzzy Rule Based System", "Volatile Chemical Compounds", "Surface Acoustic Wave Sensors", "FURIA", "Fuzzy Decision Trees" ], "authors": [ { "affiliation": "CEA, LIST,Gif-sur-Yvette cedex,France,91191", "fullName": "Edwin Friedmann", "givenName": "Edwin", "surname": "Friedmann", "__typename": "ArticleAuthorType" }, { "affiliation": "CEA, LIST,Gif-sur-Yvette cedex,France,91191", "fullName": "Jean-Philippe Poli", "givenName": "Jean-Philippe", "surname": "Poli", "__typename": "ArticleAuthorType" }, { "affiliation": "CEA, LIST,Gif-sur-Yvette cedex,France,91191", "fullName": "Olivier Hotel", "givenName": "Olivier", "surname": "Hotel", "__typename": "ArticleAuthorType" }, { "affiliation": "CEA, LIST,Gif-sur-Yvette cedex,France,91191", "fullName": "Christine Mer-Calfati", "givenName": "Christine", "surname": "Mer-Calfati", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "917-922", "year": "2020", "issn": null, "isbn": "978-1-7281-9228-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922800a911", "articleId": "1pP3t9SnGgM", "__typename": "AdjacentArticleType" }, "next": { "fno": "922800a923", "articleId": "1pP3td7Dhuw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2014/5464/0/06982869", "title": "Graph methods for predicting the function of chemical compounds", "doi": null, "abstractUrl": "/proceedings-article/grc/2014/06982869/12OmNA1mbg0", "parentPublication": { "id": "proceedings/grc/2014/5464/0", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vdat/2015/1743/0/07208158", "title": "Introduction to MEMS; their applications as sensors for chemical & bio sensing", "doi": null, "abstractUrl": "/proceedings-article/vdat/2015/07208158/12OmNvSKNMU", "parentPublication": { "id": "proceedings/vdat/2015/1743/0", "title": "2015 19th International Symposium on VLSI Design and Test (VDAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2006/2701/0/04053093", "title": "Comparison of Descriptor Spaces for Chemical Compound Retrieval and Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2006/04053093/12OmNwE9OOF", "parentPublication": { "id": "proceedings/icdm/2006/2701/0", "title": "Sixth International Conference on Data Mining (ICDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363857", "title": "Cell analytics in compound hit selection of bacterial inhibitors", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363857/12OmNwGZNO1", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isee/2002/7214/0/01003263", "title": "Energy and chemical use in the production chain for microchips", "doi": null, "abstractUrl": "/proceedings-article/isee/2002/01003263/12OmNwvDQwz", "parentPublication": { "id": "proceedings/isee/2002/7214/0", "title": "Conference Record 2002 IEEE International Symposium on Electronics and the Environment", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999387", "title": "Scaffold-based chemical space exploration", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999387/12OmNyywxAA", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07744506", "title": "Enumerating Substituted Benzene Isomers of Tree-Like Chemical Graphs", "doi": null, "abstractUrl": "/journal/tb/2018/02/07744506/13rRUwdrdO9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420679", "title": "Predicting the Absorption Potential of Chemical Compounds Through a Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420679/13rRUxlgy2e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08353138", "title": "Resource Cut, a New Bounding Procedure to Algorithms for Enumerating Tree-Like Chemical Graphs", "doi": null, "abstractUrl": "/journal/tb/2019/01/08353138/17D45XwUAMZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09537687", "title": "A Novel Method for Inferring Chemical Compounds With Prescribed Topological Substructures Based on Integer Programming", "doi": null, "abstractUrl": "/journal/tb/2022/06/09537687/1wTikVowS3e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBC8AAL", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBsue6L", "doi": "10.1109/BIBE.2017.00-84", "title": "Holographic Interface for three-dimensional Visualization of MRI on HoloLens: A Prototype Platform for MRI Guided Neurosurgeries", "normalizedTitle": "Holographic Interface for three-dimensional Visualization of MRI on HoloLens: A Prototype Platform for MRI Guided Neurosurgeries", "abstract": "This work presents a prototype holographic interface (HI) for the 3D visualization of MRI data for the purpose of planning neurosurgical procedures. The presented HI (i) immerses the operator to a mixed reality (MiR) scene, which includes MRI data and virtual renderings, (ii) facilitates interactive manipulation of the objects of the MiR scene for planning and (iii) is the front-end of a pipeline that links the operator to the MRI scanner for on-the-fly control of the scanner. Preliminary qualitative evaluation revealed that holographic visualization of high-resolution 3D MRI data offers an intuitive and interactive perspective of the complex brain vasculature and anatomical structures. These early work further suggests that immersive experience may be an unparalleled tool in better planning neurosurgical procedures. Further development is required to speed up the pipeline from the MRI scanner to the HI and incorporating means of manipulations other than gestures.", "abstracts": [ { "abstractType": "Regular", "content": "This work presents a prototype holographic interface (HI) for the 3D visualization of MRI data for the purpose of planning neurosurgical procedures. The presented HI (i) immerses the operator to a mixed reality (MiR) scene, which includes MRI data and virtual renderings, (ii) facilitates interactive manipulation of the objects of the MiR scene for planning and (iii) is the front-end of a pipeline that links the operator to the MRI scanner for on-the-fly control of the scanner. Preliminary qualitative evaluation revealed that holographic visualization of high-resolution 3D MRI data offers an intuitive and interactive perspective of the complex brain vasculature and anatomical structures. These early work further suggests that immersive experience may be an unparalleled tool in better planning neurosurgical procedures. Further development is required to speed up the pipeline from the MRI scanner to the HI and incorporating means of manipulations other than gestures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work presents a prototype holographic interface (HI) for the 3D visualization of MRI data for the purpose of planning neurosurgical procedures. The presented HI (i) immerses the operator to a mixed reality (MiR) scene, which includes MRI data and virtual renderings, (ii) facilitates interactive manipulation of the objects of the MiR scene for planning and (iii) is the front-end of a pipeline that links the operator to the MRI scanner for on-the-fly control of the scanner. Preliminary qualitative evaluation revealed that holographic visualization of high-resolution 3D MRI data offers an intuitive and interactive perspective of the complex brain vasculature and anatomical structures. These early work further suggests that immersive experience may be an unparalleled tool in better planning neurosurgical procedures. Further development is required to speed up the pipeline from the MRI scanner to the HI and incorporating means of manipulations other than gestures.", "fno": "132401a021", "keywords": [ "Biomedical MRI", "Brain", "Data Visualisation", "Holography", "Medical Image Processing", "Neurophysiology", "Surgery", "Virtual Reality", "MRI Guided Neurosurgeries", "Mixed Reality Scene", "Mi R Scene", "MRI Scanner", "Holographic Visualization", "Neurosurgical Procedures", "Holographic Interface", "Holo Lens", "3 D MRI Data Visualization", "Virtual Renderings", "Brain Vasculature", "Three Dimensional Displays", "Planning", "Two Dimensional Displays", "Neurosurgery", "Rendering Computer Graphics", "Magnetic Resonance Imaging", "Holographic Visualization", "Surgery Intervention Planning", "Neurosurgery", "Holo Lens" ], "authors": [ { "affiliation": null, "fullName": "Cristina Marie Morales Mojica", "givenName": "Cristina Marie", "surname": "Morales Mojica", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nikhil V. Navkar", "givenName": "Nikhil V.", "surname": "Navkar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nikolaos V. Tsekos", "givenName": "Nikolaos V.", "surname": "Tsekos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dimitrios Tsagkaris", "givenName": "Dimitrios", "surname": "Tsagkaris", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew Webb", "givenName": "Andrew", "surname": "Webb", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Theodosios Birbilis", "givenName": "Theodosios", "surname": "Birbilis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ioannis Seimenis", "givenName": "Ioannis", "surname": "Seimenis", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "21-27", "year": "2017", "issn": "2471-7819", "isbn": "978-1-5386-1324-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "132401a015", "articleId": "12OmNBLdKLA", "__typename": "AdjacentArticleType" }, "next": { "fno": "132401a028", "articleId": "12OmNx7G690", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dicta/2005/2467/0/24670042", "title": "Medical Image Analysis for Image Guided Therapy", "doi": null, "abstractUrl": "/proceedings-article/dicta/2005/24670042/12OmNqHItBy", "parentPublication": { "id": "proceedings/dicta/2005/2467/0", "title": "Digital Image Computing: Techniques and Applications (DICTA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446450", "title": "Augmented Reality-Based Personalized Virtual Operative Anatomy for Neurosurgical Guidance and Training", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446450/13bd1gQYgEs", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545327", "title": "Breast Segmentation in MRI via U-Net Deep Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545327/17D45WK5Aqp", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a006", "title": "A 2.5D Cancer Segmentation for MRI Images Based on U-Net", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a006/17D45Wuc3ba", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09944177", "title": "An attention-guided CNN framework for segmentation and grading of glioma using 3D MRI scans", "doi": null, "abstractUrl": "/journal/tb/5555/01/09944177/1Ia7bQC43oA", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2019/1131/0/113100a254", "title": "Compressed Sensing MRI Reconstruction on Intel HARPv2", "doi": null, "abstractUrl": "/proceedings-article/fccm/2019/113100a254/1aPv045QWe4", "parentPublication": { "id": "proceedings/fccm/2019/1131/0", "title": "2019 IEEE 27th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797710", "title": "A Research Framework for Virtual-Reality Neurosurgery Based on Open-Source Tools", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797710/1cJ0FFm37Hi", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a065", "title": "3D Convolutional Neural Networks for Diagnosis of Alzheimer's Disease via Structural MRI", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a065/1mLMgmKvMxq", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b129", "title": "VRvisu++: A Tool for Virtual Reality-Based Visualization of MRI Images", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b129/1nkDf7BIHx6", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a247", "title": "Breast3D: An Augmented Reality System for Breast CT and MRI", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a247/1qpzE3VSLlK", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18j8Ecq0jn2", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18j8EwiuC9a", "doi": "10.1109/WACV.2019.00187", "title": "Deep Semantic Instance Segmentation of Tree-Like Structures Using Synthetic Data", "normalizedTitle": "Deep Semantic Instance Segmentation of Tree-Like Structures Using Synthetic Data", "abstract": "Tree-like structures, such as blood vessels, often express complexity at very fine scales, requiring high-resolution grids to adequately describe their shape. Such sparse morphology can alternately be represented by locations of centreline points, but learning from this type of data with deep learning is challenging due to it being unordered, and permutation invariant. In this work, we propose a deep neural network that directly consumes unordered points along the centreline of a branching structure, to identify the topology of the represented structure in a single-shot. Key to our approach is the use of a novel multi-task loss function, enabling instance segmentation of arbitrarily complex branching structures. We train the network solely using synthetically generated data, utilizing domain randomization to facilitate the transfer to real 2D and 3D data. Results show that our network can reliably extract meaningful information about branch locations, bifurcations and endpoints, and sets a new benchmark for semantic instance segmentation in branching structures.", "abstracts": [ { "abstractType": "Regular", "content": "Tree-like structures, such as blood vessels, often express complexity at very fine scales, requiring high-resolution grids to adequately describe their shape. Such sparse morphology can alternately be represented by locations of centreline points, but learning from this type of data with deep learning is challenging due to it being unordered, and permutation invariant. In this work, we propose a deep neural network that directly consumes unordered points along the centreline of a branching structure, to identify the topology of the represented structure in a single-shot. Key to our approach is the use of a novel multi-task loss function, enabling instance segmentation of arbitrarily complex branching structures. We train the network solely using synthetically generated data, utilizing domain randomization to facilitate the transfer to real 2D and 3D data. Results show that our network can reliably extract meaningful information about branch locations, bifurcations and endpoints, and sets a new benchmark for semantic instance segmentation in branching structures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tree-like structures, such as blood vessels, often express complexity at very fine scales, requiring high-resolution grids to adequately describe their shape. Such sparse morphology can alternately be represented by locations of centreline points, but learning from this type of data with deep learning is challenging due to it being unordered, and permutation invariant. In this work, we propose a deep neural network that directly consumes unordered points along the centreline of a branching structure, to identify the topology of the represented structure in a single-shot. Key to our approach is the use of a novel multi-task loss function, enabling instance segmentation of arbitrarily complex branching structures. We train the network solely using synthetically generated data, utilizing domain randomization to facilitate the transfer to real 2D and 3D data. Results show that our network can reliably extract meaningful information about branch locations, bifurcations and endpoints, and sets a new benchmark for semantic instance segmentation in branching structures.", "fno": "197500b713", "keywords": [ "Data Analysis", "Feature Extraction", "Image Segmentation", "Learning Artificial Intelligence", "Neural Nets", "Trees Mathematics", "Deep Learning", "Permutation Invariant", "Deep Neural Network", "Branching Structure", "Arbitrarily Complex Branching Structures", "Synthetically Generated Data", "Bifurcations", "Deep Semantic Instance Segmentation", "Tree Like Structures", "Blood Vessels", "High Resolution Grids", "Sparse Morphology", "Multitask Loss Function", "Centreline Points Location", "Three Dimensional Displays", "Neural Networks", "Task Analysis", "Two Dimensional Displays", "Training", "Semantics", "Periodic Structures" ], "authors": [ { "affiliation": null, "fullName": "Kerry Halupka", "givenName": "Kerry", "surname": "Halupka", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rahil Garnavi", "givenName": "Rahil", "surname": "Garnavi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stephen Moore", "givenName": "Stephen", "surname": "Moore", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-01-01T00:00:00", "pubType": "proceedings", "pages": "1713-1722", "year": "2019", "issn": "1550-5790", "isbn": "978-1-7281-1975-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "197500b703", "articleId": "18j8QxP4XcY", "__typename": "AdjacentArticleType" }, "next": { "fno": "197500b723", "articleId": "18j8ODkGxNe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscv/1995/7190/0/71900259", "title": "A central axis algorithm for 3D bronchial tree structures", "doi": null, "abstractUrl": "/proceedings-article/iscv/1995/71900259/12OmNvnfkcL", "parentPublication": { "id": "proceedings/iscv/1995/7190/0", "title": "Computer Vision, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/time/2015/9317/0/9317a069", "title": "Generalizing Allen's Theory of Time to Tree-Like Structures", "doi": null, "abstractUrl": "/proceedings-article/time/2015/9317a069/12OmNwfKj8g", "parentPublication": { "id": "proceedings/time/2015/9317/0", "title": "2015 22nd International Symposium on Temporal Representation and Reasoning (TIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000c906", "title": "Probabilistic Plant Modeling via Multi-view Image-to-Image Translation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000c906/17D45WK5AlX", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e521", "title": "Im2Struct: Recovering 3D Shape Structure from a Single RGB Image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e521/17D45Xcttm5", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a067", "title": "Scissor-Based 3D Deployable Contours", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a067/1ap5CQXwZws", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b578", "title": "Interpolated Convolutional Networks for 3D Point Cloud Understanding", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b578/1hVlRWjPuXC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j255", "title": "3D Instance Segmentation via Multi-Task Metric Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j255/1hVlUFvBONO", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800c937", "title": "OccuSeg: Occupancy-Aware 3D Instance Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800c937/1m3nqkeTsg8", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216538", "title": "A Visualization Framework for Multi-scale Coherent Structures in Taylor-Couette Turbulence", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216538/1nJsKpVdOUw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09258406", "title": "Efficient Representation and Optimization for TPMS-Based Porous Structures", "doi": null, "abstractUrl": "/journal/tg/2022/07/09258406/1oHi1OQbVOo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1h0JshnoWgE", "title": "2017 IEEE International Conference on Computational Photography (ICCP)", "acronym": "iccp", "groupId": "1800125", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "1h0JskzwX3G", "doi": "10.1109/ICCPHOT.2017.7951490", "title": "Turbulence-induced 2D correlated image distortion", "normalizedTitle": "Turbulence-induced 2D correlated image distortion", "abstract": "Due to atmospheric turbulence, light randomly refracts in three dimensions (3D), eventually entering a camera at a perturbed angle. Each viewed object point thus has a distorted projection in a two-dimensional (2D) image. Simulating 3D random refraction for all viewed points via complex simulated 3D random turbulence is computationally expensive. We derive an efficient way to render 2D image distortions, consistent with turbulence. Our approach bypasses 3D numerical calculations altogether We directly create 2D random physics-based distortion vector fields, where correlations are derived in closed form from turbulence theory. The correlations are nontrivial: they depend on the perturbation directions relative to the orientation of all object-pairs, simultaneously. Hence, we develop a theory characterizing and rendering such a distortion field. The theory is turned to a few simple 2D operations, which render images based on camera and atmospheric properties.", "abstracts": [ { "abstractType": "Regular", "content": "Due to atmospheric turbulence, light randomly refracts in three dimensions (3D), eventually entering a camera at a perturbed angle. Each viewed object point thus has a distorted projection in a two-dimensional (2D) image. Simulating 3D random refraction for all viewed points via complex simulated 3D random turbulence is computationally expensive. We derive an efficient way to render 2D image distortions, consistent with turbulence. Our approach bypasses 3D numerical calculations altogether We directly create 2D random physics-based distortion vector fields, where correlations are derived in closed form from turbulence theory. The correlations are nontrivial: they depend on the perturbation directions relative to the orientation of all object-pairs, simultaneously. Hence, we develop a theory characterizing and rendering such a distortion field. The theory is turned to a few simple 2D operations, which render images based on camera and atmospheric properties.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to atmospheric turbulence, light randomly refracts in three dimensions (3D), eventually entering a camera at a perturbed angle. Each viewed object point thus has a distorted projection in a two-dimensional (2D) image. Simulating 3D random refraction for all viewed points via complex simulated 3D random turbulence is computationally expensive. We derive an efficient way to render 2D image distortions, consistent with turbulence. Our approach bypasses 3D numerical calculations altogether We directly create 2D random physics-based distortion vector fields, where correlations are derived in closed form from turbulence theory. The correlations are nontrivial: they depend on the perturbation directions relative to the orientation of all object-pairs, simultaneously. Hence, we develop a theory characterizing and rendering such a distortion field. The theory is turned to a few simple 2D operations, which render images based on camera and atmospheric properties.", "fno": "07951490", "keywords": [ "Atmospheric Optics", "Atmospheric Turbulence", "Cameras", "Image Processing", "Light Refraction", "Ray Tracing", "Turbulence Induced 2 D Correlated Image Distortion", "Atmospheric Turbulence", "Light Refraction", "Camera", "Distorted Projection", "Two Dimensional Image", "3 D Random Refraction", "Complex Simulated 3 D Random Turbulence", "Distortion Vector Fields", "Distortion", "Two Dimensional Displays", "Three Dimensional Displays", "Correlation", "Rendering Computer Graphics", "Cameras", "Refractive Index" ], "authors": [ { "affiliation": "Div. Biostatistics, UC San Diego, La Jolla, CA, USA", "fullName": "Armin Schwartzman", "givenName": "Armin", "surname": "Schwartzman", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. Elect. Eng. & Comp. Sci., Northwestern University, Evanston, IL, USA", "fullName": "Marina Alterman", "givenName": "Marina", "surname": "Alterman", "__typename": "ArticleAuthorType" }, { "affiliation": "Viterbi Faculty of Electrical Eng., Technion - Israel Inst. Technology, Haifa, Israel", "fullName": "Rotem Zamir", "givenName": "Rotem", "surname": "Zamir", "__typename": "ArticleAuthorType" }, { "affiliation": "Viterbi Faculty of Electrical Eng., Technion - Israel Inst. Technology, Haifa, Israel", "fullName": "Yoav Y. Schechner", "givenName": "Yoav Y.", "surname": "Schechner", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2017-05-01T00:00:00", "pubType": "proceedings", "pages": "1-13", "year": "2017", "issn": "2472-7636", "isbn": "978-1-5090-5745-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07951477", "articleId": "1DIBJPwSIzC", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/032P1A32", "title": "Depth from optical turbulence", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/032P1A32/12OmNAmE5Zw", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504746", "title": "Anchoring 2D gesture annotations in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504746/12OmNBf94W7", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437a861", "title": "Embedded Vision System for Atmospheric Turbulence Mitigation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437a861/12OmNBqMDjb", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535b321", "title": "Equivalent Analysis Method of the Transmission Characteristic of a Laser in Atmosphere Turbulence", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535b321/12OmNCcbElj", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/5/3119e470", "title": "Mitigation of Turbulence-Induced Scintillation Noise in Free-Space Optical Communication Links Using Kalman Filter", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119e470/12OmNwoPtwv", "parentPublication": { "id": "proceedings/cisp/2008/3119/5", "title": "International Congress on Image and Signal Processing (CISP 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2015/7673/0/7673a068", "title": "Restoration Method Based on Low-Rank Decomposition for Video under Turbulence", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2015/7673a068/12OmNym2c4Z", "parentPublication": { "id": "proceedings/icvrv/2015/7673/0", "title": "2015 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a103", "title": "Complexity and Distortion Analysis on Methods for Unrolling 3D to 2D Fingerprints", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a103/12OmNzDNtrn", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209a883", "title": "Atmospheric Turbulence Mitigation Using Optical Flow", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a883/12OmNzZmZBW", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900a240", "title": "Augmentation of Atmospheric Turbulence Effects on Thermal Adapted Object Detection Models", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900a240/1G56TgFvHoI", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2020/5230/0/09105270", "title": "Simulating Anisoplanatic Turbulence by Sampling Correlated Zernike Coefficients", "doi": null, "abstractUrl": "/proceedings-article/iccp/2020/09105270/1kkJW7Fz9du", "parentPublication": { "id": "proceedings/iccp/2020/5230/0", "title": "2020 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuiru", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "acronym": "ifita", "groupId": "1002862", "volume": "2", "displayVolume": "2", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBfZSkm", "doi": "10.1109/IFITA.2010.54", "title": "Study of the Data Exchanging Safely and Quickly for Sudden Leakage of Dangerous Chemicals Emergency Decision System Based on VPN", "normalizedTitle": "Study of the Data Exchanging Safely and Quickly for Sudden Leakage of Dangerous Chemicals Emergency Decision System Based on VPN", "abstract": "The sudden leakage of dangerous chemicals emergency decision system can help the government, chemical accident emergency rescue center, fire fighting and the units of production, transportation, storage or use for dangerous chemicals generate maneuverable emergency rescue plan in the shortest time according to the geographical location and the specific situation of the accident. The system owns the national urban dangerous chemicals database and provides the target quantity and the distribution of the urban dangerous chemicals. Because the data of this system belong to the state public security secrets, the data transmission must be safe and fast absolutely. VPN is a safe, special and virtual network which is temporarily established in the Internet. The system realizes the transmission and maintenance of the dangerous sources data, ensures the data safety and enhances the efficiency of data transmission through VPN.", "abstracts": [ { "abstractType": "Regular", "content": "The sudden leakage of dangerous chemicals emergency decision system can help the government, chemical accident emergency rescue center, fire fighting and the units of production, transportation, storage or use for dangerous chemicals generate maneuverable emergency rescue plan in the shortest time according to the geographical location and the specific situation of the accident. The system owns the national urban dangerous chemicals database and provides the target quantity and the distribution of the urban dangerous chemicals. Because the data of this system belong to the state public security secrets, the data transmission must be safe and fast absolutely. VPN is a safe, special and virtual network which is temporarily established in the Internet. The system realizes the transmission and maintenance of the dangerous sources data, ensures the data safety and enhances the efficiency of data transmission through VPN.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The sudden leakage of dangerous chemicals emergency decision system can help the government, chemical accident emergency rescue center, fire fighting and the units of production, transportation, storage or use for dangerous chemicals generate maneuverable emergency rescue plan in the shortest time according to the geographical location and the specific situation of the accident. The system owns the national urban dangerous chemicals database and provides the target quantity and the distribution of the urban dangerous chemicals. Because the data of this system belong to the state public security secrets, the data transmission must be safe and fast absolutely. VPN is a safe, special and virtual network which is temporarily established in the Internet. The system realizes the transmission and maintenance of the dangerous sources data, ensures the data safety and enhances the efficiency of data transmission through VPN.", "fno": "05634929", "keywords": [ "Chemical Engineering Computing", "Database Management Systems", "Decision Support Systems", "Electronic Data Interchange", "Emergency Services", "Internet", "Virtual Private Networks", "Data Exchange", "Dangerous Chemicals Emergency Decision System", "Virtual Private Network", "Chemical Accident Emergency Rescue Center", "Fire Fighting", "National Urban Dangerous Chemicals Database", "State Public Security Secrets", "Data Transmission", "Internet", "Chemicals", "Virtual Private Networks", "Safety", "Accidents", "Data Communication", "Servers", "Logic Gates", "Emergency Decision", "VPN Technology", "Dangerous Chemicals", "Dangerous Sources" ], "authors": [ { "affiliation": null, "fullName": "Hu Yanju", "givenName": "Hu", "surname": "Yanju", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hu Yanling", "givenName": "Hu", "surname": "Yanling", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hu Yiwei", "givenName": "Hu", "surname": "Yiwei", "__typename": "ArticleAuthorType" } ], "idPrefix": "ifita", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "52-54", "year": "2010", "issn": null, "isbn": "978-1-4244-7621-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05634932", "articleId": "12OmNz6iOwz", "__typename": "AdjacentArticleType" }, "next": { "fno": "05634928", "articleId": "12OmNA14Abu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2013/5004/0/5004b376", "title": "The Research and Implementation of the VPN Gateway Based on SSL", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004b376/12OmNAlNiSV", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b865", "title": "Optimization on Handling and Temperature Control System of Product/Chemicals Carrier", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b865/12OmNAle6Vj", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/1/4132a032", "title": "Application of Data Mining in the Inquiry System of Dangerous Chemicals", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132a032/12OmNBp52AY", "parentPublication": { "id": "isme/2010/4132/1", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634932", "title": "Development of the Emergency Decision System for Dangerous Chemicals Burst Leaking Accident", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634932/12OmNz6iOwz", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2014/6636/0/6636a565", "title": "Research on Pressure Emergency Plugging Technology and Equipment", "doi": null, "abstractUrl": "/proceedings-article/icicta/2014/6636a565/12OmNzDNtnW", "parentPublication": { "id": "proceedings/icicta/2014/6636/0", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789b005", "title": "Research on Design and Application of Real-Time Video Monitoring System for Major Hazard Installations for Dangerous Chemicals", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789b005/12OmNzUPpf6", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400b514", "title": "Big Data in the Chemicals Sector", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400b514/183rAf23hJL", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669338", "title": "Analyzing Morphological Changes in Zebrafish Embryos Exposed to Toxic Chemicals", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669338/1A9VSq5hZqU", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2020/8832/0/09151540", "title": "Practice and discussion on the safety management of azardous chemicals in colleges and universities", "doi": null, "abstractUrl": "/proceedings-article/icuems/2020/09151540/1lRlWnnEaTS", "parentPublication": { "id": "proceedings/icuems/2020/8832/0", "title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2020/9820/0/982000a348", "title": "Safety Risks, Prevention and Control of Dangerous Chemicals Tank Farms in Ports", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2020/982000a348/1mLMcW0IZry", "parentPublication": { "id": "proceedings/icwcsg/2020/9820/0", "title": "2020 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgookBlwm4", "title": "Information Science and Management Engineering, International Conference of", "acronym": "isme", "groupId": "1800131", "volume": "1", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBp52AY", "doi": "10.1109/ISME.2010.125", "title": "Application of Data Mining in the Inquiry System of Dangerous Chemicals", "normalizedTitle": "Application of Data Mining in the Inquiry System of Dangerous Chemicals", "abstract": "The Inquiry System of Dangerous Chemicals was established to inquire the related information of dangerous chemicals fast and make right decisions promptly. It’s an important component of emergency decision-making system. Its primary mission is to implement the information inquiry of each kind of dangerous chemical promptly by use of the fuzzy inquiry technology. The paper gives a detailed introduction to the application of the fuzzy inquiry system.", "abstracts": [ { "abstractType": "Regular", "content": "The Inquiry System of Dangerous Chemicals was established to inquire the related information of dangerous chemicals fast and make right decisions promptly. It’s an important component of emergency decision-making system. Its primary mission is to implement the information inquiry of each kind of dangerous chemical promptly by use of the fuzzy inquiry technology. The paper gives a detailed introduction to the application of the fuzzy inquiry system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Inquiry System of Dangerous Chemicals was established to inquire the related information of dangerous chemicals fast and make right decisions promptly. It’s an important component of emergency decision-making system. Its primary mission is to implement the information inquiry of each kind of dangerous chemical promptly by use of the fuzzy inquiry technology. The paper gives a detailed introduction to the application of the fuzzy inquiry system.", "fno": "4132a032", "keywords": [ "Dangerous Chemicals", "Data Mining", "Inquiry System" ], "authors": [ { "affiliation": null, "fullName": "Li Xin", "givenName": "Li", "surname": "Xin", "__typename": "ArticleAuthorType" } ], "idPrefix": "isme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "32-34", "year": "2010", "issn": null, "isbn": "978-0-7695-4132-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4132a028", "articleId": "12OmNxTVTYk", "__typename": "AdjacentArticleType" }, "next": { "fno": "4132a035", "articleId": "12OmNy7QfmC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2009/3583/2/3583b865", "title": "Optimization on Handling and Temperature Control System of Product/Chemicals Carrier", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b865/12OmNAle6Vj", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634929", "title": "Study of the Data Exchanging Safely and Quickly for Sudden Leakage of Dangerous Chemicals Emergency Decision System Based on VPN", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634929/12OmNBfZSkm", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/4/3941d088", "title": "System Design of Number Inquiry Software Basing on J2ME", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941d088/12OmNvm6VJ2", "parentPublication": { "id": "proceedings/iccms/2010/3941/4", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634932", "title": "Development of the Emergency Decision System for Dangerous Chemicals Burst Leaking Accident", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634932/12OmNz6iOwz", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789b005", "title": "Research on Design and Application of Real-Time Video Monitoring System for Major Hazard Installations for Dangerous Chemicals", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789b005/12OmNzUPpf6", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoip/2010/4252/2/4252b600", "title": "The Research of Classification Method for Significant Risk of Hazardous Chemical Tanker which in Transit", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252b600/12OmNzXnNu7", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/1994/02/s2021", "title": "Inquiry-Based Requirements Analysis", "doi": null, "abstractUrl": "/magazine/so/1994/02/s2021/13rRUxC0SUi", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acie/2022/7973/0/797300a001", "title": "Research and Application of Hazardous Chemicals Monitoring Technology Based on Big Data and Patrol Robot", "doi": null, "abstractUrl": "/proceedings-article/acie/2022/797300a001/1Fiyeq2KeEE", "parentPublication": { "id": "proceedings/acie/2022/7973/0", "title": "2022 2nd Asia Conference on Information Engineering (ACIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2020/8832/0/09151540", "title": "Practice and discussion on the safety management of azardous chemicals in colleges and universities", "doi": null, "abstractUrl": "/proceedings-article/icuems/2020/09151540/1lRlWnnEaTS", "parentPublication": { "id": "proceedings/icuems/2020/8832/0", "title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2020/9820/0/982000a348", "title": "Safety Risks, Prevention and Control of Dangerous Chemicals Tank Farms in Ports", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2020/982000a348/1mLMcW0IZry", "parentPublication": { "id": "proceedings/icwcsg/2020/9820/0", "title": "2020 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Te", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "acronym": "icicta", "groupId": "1002487", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNvB9FA1", "doi": "10.1109/ICICTA.2015.191", "title": "Research on Rural Community Reform Planning Based on GIS", "normalizedTitle": "Research on Rural Community Reform Planning Based on GIS", "abstract": "Taking XiWanZi village community reform planning in Xing Long county Bei Ying Fang town as an Example, the article discusses the construction of rural community reform planning. According to specific project based on village development condition analysis, village scale prediction, village spatial control planning, village transportation system planning, village public service facilities and infrastructure planning, ecological and environmental protection planning, the article puts forward specific measures to the rural community landscape reform planning. In the reform planning, infrastructure planning, landscape planning, pollution control planning. And the article comments on some implementation measures.", "abstracts": [ { "abstractType": "Regular", "content": "Taking XiWanZi village community reform planning in Xing Long county Bei Ying Fang town as an Example, the article discusses the construction of rural community reform planning. According to specific project based on village development condition analysis, village scale prediction, village spatial control planning, village transportation system planning, village public service facilities and infrastructure planning, ecological and environmental protection planning, the article puts forward specific measures to the rural community landscape reform planning. In the reform planning, infrastructure planning, landscape planning, pollution control planning. And the article comments on some implementation measures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Taking XiWanZi village community reform planning in Xing Long county Bei Ying Fang town as an Example, the article discusses the construction of rural community reform planning. According to specific project based on village development condition analysis, village scale prediction, village spatial control planning, village transportation system planning, village public service facilities and infrastructure planning, ecological and environmental protection planning, the article puts forward specific measures to the rural community landscape reform planning. In the reform planning, infrastructure planning, landscape planning, pollution control planning. And the article comments on some implementation measures.", "fno": "7644a752", "keywords": [ "Planning", "Roads", "Green Products", "Cultural Differences", "Pipelines", "Wires", "Water Resources", "Xi Wan Zi Village", "Rural Community", "Reform", "Planning" ], "authors": [ { "affiliation": null, "fullName": "Zhong Yanfen", "givenName": "Zhong", "surname": "Yanfen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qi Huan", "givenName": "Qi", "surname": "Huan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-06-01T00:00:00", "pubType": "proceedings", "pages": "752-755", "year": "2015", "issn": null, "isbn": "978-1-4673-7644-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7644a747", "articleId": "12OmNwbLVqY", "__typename": "AdjacentArticleType" }, "next": { "fno": "7644a756", "articleId": "12OmNzcPAba", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdma/2010/4286/1/05701278", "title": "Groundwater Quality Evaluation in Yang Village by Fuzzy Mathematics Method", "doi": null, "abstractUrl": "/proceedings-article/icdma/2010/05701278/12OmNB9t6un", "parentPublication": { "id": "proceedings/icdma/2010/4286/1", "title": "2010 International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2014/6636/0/6636a796", "title": "The Greenway Planning Study of Beijing Pinggu District Was Based on GIS", "doi": null, "abstractUrl": "/proceedings-article/icicta/2014/6636a796/12OmNBhZ4n9", "parentPublication": { "id": "proceedings/icicta/2014/6636/0", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/geows/2009/3527/0/3527a054", "title": "Geo-information Services to Rural Extension Community for Rural Development Planning ", "doi": null, "abstractUrl": "/proceedings-article/geows/2009/3527a054/12OmNs0TKOG", "parentPublication": { "id": "proceedings/geows/2009/3527/0", "title": "Advanced Geographic Information Systems & Web Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2014/4261/0/4261a849", "title": "Research on Rural Drinking Water Safety Based on the Experimental Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/isdea/2014/4261a849/12OmNxdVgQJ", "parentPublication": { "id": "proceedings/isdea/2014/4261/0", "title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06455465", "title": "Supervision and Management Information System for Rural Drinking Water Project Construction", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06455465/12OmNyFU6X0", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2008/04/mic2008040022", "title": "Deploying Rural Community Wireless Mesh Networks", "doi": null, "abstractUrl": "/magazine/ic/2008/04/mic2008040022/13rRUwbaqQ3", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2017/4530/0/08487295", "title": "Design of a Hybrid Microgrid for a Rural Community in Pacific Island Countries_", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2017/08487295/17D45XoXP5d", "parentPublication": { "id": "proceedings/apwc-on-cse/2017/4530/0", "title": "2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctech/2022/9918/0/991800a083", "title": "Research and Application of BIM Technology in Rural Human Settlement Environment Planning", "doi": null, "abstractUrl": "/proceedings-article/icctech/2022/991800a083/1KYsW24Bxpm", "parentPublication": { "id": "proceedings/icctech/2022/9918/0", "title": "2022 International Conference on Computer Technologies (ICCTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2021/3263/0/326300a338", "title": "Research on Urban and Rural Planning System Based on Remote Sensing and GIS", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2021/326300a338/1vb9d7kuC0U", "parentPublication": { "id": "proceedings/icsgea/2021/3263/0", "title": "2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispcem/2020/1920/0/192000a149", "title": "Study on Rural Planning Strategy of Urban Fringe under the Background of Ecological Constraints", "doi": null, "abstractUrl": "/proceedings-article/ispcem/2020/192000a149/1vg7tZ9yGnC", "parentPublication": { "id": "proceedings/ispcem/2020/1920/0", "title": "2020 International Signal Processing, Communications and Engineering Management Conference (ISPCEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrYlmQE", "title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on", "acronym": "uic-atc", "groupId": "1002946", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyz5JYc", "doi": "10.1109/UIC-ATC.2009.91", "title": "A Situated Display for Local Community Participation: The Design and Use of Nnub", "normalizedTitle": "A Situated Display for Local Community Participation: The Design and Use of Nnub", "abstract": "This paper discusses the design and use of a digital community noticeboard (called Nnub) located at a suburban general store. The intention is to design Information and Communication Technology (ICT) such as Situated Displays and Internet Technologies to support local communications. We use a Reflective, Agile, and Iterative Design (RAID) framework to evolve the technology, aiming to engage local residents in creating an evolving collection of images, notices and scribbles by the community and for the community. A key contribution of this work is the understanding of the interaction requirements needed to support and engage the local community that were discovered through the iterative design and deployment method.", "abstracts": [ { "abstractType": "Regular", "content": "This paper discusses the design and use of a digital community noticeboard (called Nnub) located at a suburban general store. The intention is to design Information and Communication Technology (ICT) such as Situated Displays and Internet Technologies to support local communications. We use a Reflective, Agile, and Iterative Design (RAID) framework to evolve the technology, aiming to engage local residents in creating an evolving collection of images, notices and scribbles by the community and for the community. A key contribution of this work is the understanding of the interaction requirements needed to support and engage the local community that were discovered through the iterative design and deployment method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper discusses the design and use of a digital community noticeboard (called Nnub) located at a suburban general store. The intention is to design Information and Communication Technology (ICT) such as Situated Displays and Internet Technologies to support local communications. We use a Reflective, Agile, and Iterative Design (RAID) framework to evolve the technology, aiming to engage local residents in creating an evolving collection of images, notices and scribbles by the community and for the community. A key contribution of this work is the understanding of the interaction requirements needed to support and engage the local community that were discovered through the iterative design and deployment method.", "fno": "3737a102", "keywords": [ "Situated Display", "Urban Display", "Interaction Design", "Community Informatics" ], "authors": [ { "affiliation": null, "fullName": "Fiona Redhead", "givenName": "Fiona", "surname": "Redhead", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew Dekker", "givenName": "Andrew", "surname": "Dekker", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Margot Brereton", "givenName": "Margot", "surname": "Brereton", "__typename": "ArticleAuthorType" } ], "idPrefix": "uic-atc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "102-107", "year": "2009", "issn": null, "isbn": "978-0-7695-3737-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3737a088", "articleId": "12OmNCwlaiK", "__typename": "AdjacentArticleType" }, "next": { "fno": "3737a108", "articleId": "12OmNwDSdJo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2011/4401/0/4401a356", "title": "Finding Relational Community through Two Nodes", "doi": null, "abstractUrl": "/proceedings-article/icis/2011/4401a356/12OmNARRYuQ", "parentPublication": { "id": "proceedings/icis/2011/4401/0", "title": "Computer and Information Science, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2009/3613/0/3613a254", "title": "Fostering Participation in an Online Intellectual Community in a Graduate Educational Setting: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/iciw/2009/3613a254/12OmNBqMDvo", "parentPublication": { "id": "proceedings/iciw/2009/3613/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/adc/2005/2487/0/24870167", "title": "Early Community Building: A Critical Success Factor for XP Projects", "doi": null, "abstractUrl": "/proceedings-article/adc/2005/24870167/12OmNC0y5HX", "parentPublication": { "id": "proceedings/adc/2005/2487/0", "title": "Agile Development Conference (ADC'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a724", "title": "Community evolution and engagement through assortative mixing in online social networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a724/12OmNvFHfCt", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997b956", "title": "Support Newcomer's Learning in Community of Practice: In Terms of Legitimate Peripheral Participation", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997b956/12OmNvrdI3y", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673302", "title": "Work in progress-recruiting Hispanic students into computing through community service learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673302/12OmNwFicSJ", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2009/3689/0/3689a237", "title": "Local Community Identification in Social Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2009/3689a237/12OmNwp74CE", "parentPublication": { "id": "proceedings/asonam/2009/3689/0", "title": "2009 International Conference on Advances in Social Network Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialinformatics/2012/5015/0/5015a265", "title": "A Case Study of Community Privacy", "doi": null, "abstractUrl": "/proceedings-article/socialinformatics/2012/5015a265/12OmNz6iOkp", "parentPublication": { "id": "proceedings/socialinformatics/2012/5015/0", "title": "International Conference on Social Informatics (SocialInformatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2009/3595/0/3595a612", "title": "Towards the Development of Community Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a612/12OmNzICELC", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2012/05/mco2012050026", "title": "Supporting Community Awareness with Interactive Displays", "doi": null, "abstractUrl": "/magazine/co/2012/05/mco2012050026/13rRUwgQpm5", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "183rAcuejpS", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-smartcity-dss", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "183rAf23hJL", "doi": "10.1109/HPCC/SmartCity/DSS.2018.00249", "title": "Big Data in the Chemicals Sector", "normalizedTitle": "Big Data in the Chemicals Sector", "abstract": "Big Data is relatively new, started about a decade ago benefiting from the data explosion in different sectors, driven by the low-cost; hardware, storage, software tools, beside the massive proliferation of computing technology in everything we do, which led to generating huge amounts of data of all types. In the chemicals sector, there is also huge volumes of data accumulated over the years but a small percentage of it is being used. Big Data is at its infancy stage in the chemicals sector, though started to rise up in the past few years. In this paper we discuss the specific needs, features and challenges at this sector and how Big Data can help addressing some of these challenges. We also discuss Big Data in the entire context of automation and digitalisation at the chemicals sector. Benefits that can be obtained from applying Big Data in this sector are also reviewed.", "abstracts": [ { "abstractType": "Regular", "content": "Big Data is relatively new, started about a decade ago benefiting from the data explosion in different sectors, driven by the low-cost; hardware, storage, software tools, beside the massive proliferation of computing technology in everything we do, which led to generating huge amounts of data of all types. In the chemicals sector, there is also huge volumes of data accumulated over the years but a small percentage of it is being used. Big Data is at its infancy stage in the chemicals sector, though started to rise up in the past few years. In this paper we discuss the specific needs, features and challenges at this sector and how Big Data can help addressing some of these challenges. We also discuss Big Data in the entire context of automation and digitalisation at the chemicals sector. Benefits that can be obtained from applying Big Data in this sector are also reviewed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Big Data is relatively new, started about a decade ago benefiting from the data explosion in different sectors, driven by the low-cost; hardware, storage, software tools, beside the massive proliferation of computing technology in everything we do, which led to generating huge amounts of data of all types. In the chemicals sector, there is also huge volumes of data accumulated over the years but a small percentage of it is being used. Big Data is at its infancy stage in the chemicals sector, though started to rise up in the past few years. In this paper we discuss the specific needs, features and challenges at this sector and how Big Data can help addressing some of these challenges. We also discuss Big Data in the entire context of automation and digitalisation at the chemicals sector. Benefits that can be obtained from applying Big Data in this sector are also reviewed.", "fno": "661400b514", "keywords": [ "Big Data", "Chemical Engineering Computing", "Big Data", "Chemicals Sector", "Data Explosion", "Big Data", "Chemicals", "Maintenance Engineering", "Safety", "Real Time Systems", "Sensors", "Tools", "Big Data", "Automation", "Data", "Analytics", "Business Intelligence", "Chemicals", "Oil Gas" ], "authors": [ { "affiliation": null, "fullName": "Issam Wadi", "givenName": "Issam", "surname": "Wadi", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-smartcity-dss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "1514-1519", "year": "2018", "issn": null, "isbn": "978-1-5386-6614-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "661400b506", "articleId": "183rAcuejqc", "__typename": "AdjacentArticleType" }, "next": { "fno": "661400b520", "articleId": "183rAgiozDB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ifita/2010/7621/2/05634929", "title": "Study of the Data Exchanging Safely and Quickly for Sudden Leakage of Dangerous Chemicals Emergency Decision System Based on VPN", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634929/12OmNBfZSkm", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/1/4132a032", "title": "Application of Data Mining in the Inquiry System of Dangerous Chemicals", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132a032/12OmNBp52AY", "parentPublication": { "id": "isme/2010/4132/1", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2017/0604/0/0604a337", "title": "A Survey on Big Data in Financial Sector", "doi": null, "abstractUrl": "/proceedings-article/nana/2017/0604a337/12OmNvC0sXk", "parentPublication": { "id": "proceedings/nana/2017/0604/0", "title": "2017 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/7621/2/05634932", "title": "Development of the Emergency Decision System for Dangerous Chemicals Burst Leaking Accident", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/05634932/12OmNz6iOwz", "parentPublication": { "id": "proceedings/ifita/2010/7621/2", "title": "2010 International Forum on Information Technology and Applications (IFITA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2017/03/mit2017030008", "title": "Big Data and Big Money: The Role of Data in the Financial Sector", "doi": null, "abstractUrl": "/magazine/it/2017/03/mit2017030008/13rRUwhpBKw", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2017/1996/0/08029372", "title": "Ecosystem Design of Big Data through Previous Study Analysis in the World: Policy Design for Big Data as Public Goods", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2017/08029372/17D45XeKgow", "parentPublication": { "id": "proceedings/bigdata-congress/2017/1996/0", "title": "2017 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2022/9558/0/09806125", "title": "Big Data and public finance sector", "doi": null, "abstractUrl": "/proceedings-article/iscv/2022/09806125/1EBWsxshwyI", "parentPublication": { "id": "proceedings/iscv/2022/9558/0", "title": "2022 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2020/8832/0/09151540", "title": "Practice and discussion on the safety management of azardous chemicals in colleges and universities", "doi": null, "abstractUrl": "/proceedings-article/icuems/2020/09151540/1lRlWnnEaTS", "parentPublication": { "id": "proceedings/icuems/2020/8832/0", "title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2020/9820/0/982000a348", "title": "Safety Risks, Prevention and Control of Dangerous Chemicals Tank Farms in Ports", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2020/982000a348/1mLMcW0IZry", "parentPublication": { "id": "proceedings/icwcsg/2020/9820/0", "title": "2020 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09233460", "title": "Chemicals in the Creek: designing a situated data physicalization of open government data with the community", "doi": null, "abstractUrl": "/journal/tg/2021/02/09233460/1o53gztMlC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FiyaNmXbsA", "title": "2022 2nd Asia Conference on Information Engineering (ACIE)", "acronym": "acie", "groupId": "1840884", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Fiyeq2KeEE", "doi": "10.1109/ACIE55485.2022.00009", "title": "Research and Application of Hazardous Chemicals Monitoring Technology Based on Big Data and Patrol Robot", "normalizedTitle": "Research and Application of Hazardous Chemicals Monitoring Technology Based on Big Data and Patrol Robot", "abstract": "Aiming at the characteristics of small monitoring range and low alarm accuracy in the traditional fixed monitor of hazardous chemicals warehouse, a patrol robot of hazardous chemicals warehouse is studied. A multi-sensor data fusion method based on laida criterion to improve the fusion performance of BP neural network is adopted. By collecting the data such as the concentration of leaked hazardous chemicals, the ambient temperature and humidity in the warehouse, the data is denoised After normalization, BP neural network is used for fusion output. The prototype test results show that this method can effectively improve the grasp of the space environment of the patrol robot in the dangerous chemical warehouse, greatly improve the accuracy and reliability of the alarm, and have good sensor scalability.", "abstracts": [ { "abstractType": "Regular", "content": "Aiming at the characteristics of small monitoring range and low alarm accuracy in the traditional fixed monitor of hazardous chemicals warehouse, a patrol robot of hazardous chemicals warehouse is studied. A multi-sensor data fusion method based on laida criterion to improve the fusion performance of BP neural network is adopted. By collecting the data such as the concentration of leaked hazardous chemicals, the ambient temperature and humidity in the warehouse, the data is denoised After normalization, BP neural network is used for fusion output. The prototype test results show that this method can effectively improve the grasp of the space environment of the patrol robot in the dangerous chemical warehouse, greatly improve the accuracy and reliability of the alarm, and have good sensor scalability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aiming at the characteristics of small monitoring range and low alarm accuracy in the traditional fixed monitor of hazardous chemicals warehouse, a patrol robot of hazardous chemicals warehouse is studied. A multi-sensor data fusion method based on laida criterion to improve the fusion performance of BP neural network is adopted. By collecting the data such as the concentration of leaked hazardous chemicals, the ambient temperature and humidity in the warehouse, the data is denoised After normalization, BP neural network is used for fusion output. The prototype test results show that this method can effectively improve the grasp of the space environment of the patrol robot in the dangerous chemical warehouse, greatly improve the accuracy and reliability of the alarm, and have good sensor scalability.", "fno": "797300a001", "keywords": [ "Backpropagation", "Big Data", "Chemical Engineering Computing", "Chemical Industry", "Data Fusion", "Hazardous Materials", "Industrial Robots", "Mobile Robots", "Neural Nets", "Warehousing", "Hazardous Chemical Warehouse", "Patrol Robot", "Multisensor Data Fusion", "Fusion Performance", "BP Neural Network", "Big Data", "Data Collection", "Ambient Temperature", "Ambient Humidity", "Hazardous Chemical Monitoring Technology", "Temperature Sensors", "Temperature Measurement", "Couplings", "Temperature Distribution", "Neural Networks", "Data Integration", "Humidity", "Data Fusion", "Robot", "Neural Network", "Multisensor" ], "authors": [ { "affiliation": "School of Intelligent Construction, Wuchang University of Technology,Wuhan,China,430223", "fullName": "Qing An", "givenName": "Qing", "surname": "An", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Safety Science and Emergency Management, Wuhan University of Technology,Wuhan,China,430070", "fullName": "Xijiang Chen", "givenName": "Xijiang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Artificial Intelligence, Wuchang University of Technology,Wuhan,Hubei,China,430223", "fullName": "Fenggang Liu", "givenName": "Fenggang", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "acie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-01-01T00:00:00", "pubType": "proceedings", "pages": "5-9", "year": "2022", "issn": null, "isbn": "978-1-6654-7973-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "797300z011", "articleId": "1FiydaAww5a", "__typename": "AdjacentArticleType" }, "next": { "fno": "797300a006", "articleId": "1FiydPHeN0s", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcsn/2014/7091/0/7091a095", "title": "Heterogeneous Data Integration and Fusion System Based on Metadata Conflict Algorithms in USPIOT", "doi": null, "abstractUrl": "/proceedings-article/wcsn/2014/7091a095/12OmNB9t6rU", "parentPublication": { "id": "proceedings/wcsn/2014/7091/0", "title": "2014 International Conference on Wireless Communication and Sensor Network", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544914", "title": "Big data integration", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544914/12OmNyS6RCR", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456698", "title": "An Attribution Reduction Method for Weighted Approximation Representation Space", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456698/12OmNyuy9Qz", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latw/2013/0595/0/06562667", "title": "Local data fusion algorithm for fire detection through mobile robot", "doi": null, "abstractUrl": "/proceedings-article/latw/2013/06562667/12OmNzSh18y", "parentPublication": { "id": "proceedings/latw/2013/0595/0", "title": "2013 14th Latin American Test Workshop - LATW", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d294", "title": "Detecting Loaded Trajectories for Hazardous Chemicals Transportation", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d294/1FwFkbbk6ju", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b869", "title": "Study on temperature and humidity coupling control of plant factory based on ANFIS", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b869/1LSPI6yNiCI", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccc/2019/2600/0/260000a001", "title": "Cloud Based Temperature and Humidity Alert System to Prevent Food Poisoning", "doi": null, "abstractUrl": "/proceedings-article/ccc/2019/260000a001/1dPoD0rhU0U", "parentPublication": { "id": "proceedings/ccc/2019/2600/0", "title": "2019 Cybersecurity and Cyberforensics Conference (CCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2019/3024/0/302400a840", "title": "A Density-Based Decision-Making Data Fusion Method for Multiapplication Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2019/302400a840/1eEUxBZ5euY", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2019/3024/0", "title": "2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103785", "title": "Research on Meteorological Early Warning Technology of Helicopter Patrol in High Altitude Area", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103785/1kesDdxXWw0", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismii/2021/1290/0/129000a024", "title": "Remote infrared monitoring method for faults of indoor patrol robot in substation", "doi": null, "abstractUrl": "/proceedings-article/ismii/2021/129000a024/1sZ2PjFlvtS", "parentPublication": { "id": "proceedings/ismii/2021/1290/0", "title": "2021 7th International Symposium on Mechatronics and Industrial Informatics (ISMII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KBqPQkw71C", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "10029378", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KBr9K7qY5W", "doi": "10.1109/ICDMW58026.2022.00058", "title": "Deep Neural Networks and Data Accentuation for Standoff Detection of Dangerous Chemicals", "normalizedTitle": "Deep Neural Networks and Data Accentuation for Standoff Detection of Dangerous Chemicals", "abstract": "We are developing machine learning algorithms to identify chemicals of interest by their diffuse infrared reflectance signatures. The Infrared Backscatter Imaging Spectroscopy (IBIS) technology is used to capture these reflectance signatures through a mobile cart-based system. An infrared laser is directed toward the target surface from a standoff distance, and an MCT focal plane array collects the backscatter images from different wavelengths of laser into what is known as a hyperspectral image cube (hypercube for short). The hypercubes from our measurements are represented in a matrix of numbers. These hypercubes have a 128x128 front face representing the spatial dimensions (the physical image), and a depth of 153 representing the spectral dimension, which contains the IBIS measurements from various wavelengths of laser. These data are fed into a deep neural network machine learning algorithm for classification into specific chemicals (analytes). We propose a data accentuation technique to improve classification performance on IBIS data. Furthermore, we demonstrate the capability of machine learning algorithms to perform pixel-by-pixel discrimination of chemicals within a hypercube image, as well as the simultaneous detection of multiple different chemicals. We also demonstrate the capacity of machine learning algorithms to perform with high precision and recall under noisy conditions. The algorithm goes beyond simply identifying the presence of a chemical, in that it is also able to pinpoint the spatial location of each chemical within the field of view.", "abstracts": [ { "abstractType": "Regular", "content": "We are developing machine learning algorithms to identify chemicals of interest by their diffuse infrared reflectance signatures. The Infrared Backscatter Imaging Spectroscopy (IBIS) technology is used to capture these reflectance signatures through a mobile cart-based system. An infrared laser is directed toward the target surface from a standoff distance, and an MCT focal plane array collects the backscatter images from different wavelengths of laser into what is known as a hyperspectral image cube (hypercube for short). The hypercubes from our measurements are represented in a matrix of numbers. These hypercubes have a 128x128 front face representing the spatial dimensions (the physical image), and a depth of 153 representing the spectral dimension, which contains the IBIS measurements from various wavelengths of laser. These data are fed into a deep neural network machine learning algorithm for classification into specific chemicals (analytes). We propose a data accentuation technique to improve classification performance on IBIS data. Furthermore, we demonstrate the capability of machine learning algorithms to perform pixel-by-pixel discrimination of chemicals within a hypercube image, as well as the simultaneous detection of multiple different chemicals. We also demonstrate the capacity of machine learning algorithms to perform with high precision and recall under noisy conditions. The algorithm goes beyond simply identifying the presence of a chemical, in that it is also able to pinpoint the spatial location of each chemical within the field of view.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are developing machine learning algorithms to identify chemicals of interest by their diffuse infrared reflectance signatures. The Infrared Backscatter Imaging Spectroscopy (IBIS) technology is used to capture these reflectance signatures through a mobile cart-based system. An infrared laser is directed toward the target surface from a standoff distance, and an MCT focal plane array collects the backscatter images from different wavelengths of laser into what is known as a hyperspectral image cube (hypercube for short). The hypercubes from our measurements are represented in a matrix of numbers. These hypercubes have a 128x128 front face representing the spatial dimensions (the physical image), and a depth of 153 representing the spectral dimension, which contains the IBIS measurements from various wavelengths of laser. These data are fed into a deep neural network machine learning algorithm for classification into specific chemicals (analytes). We propose a data accentuation technique to improve classification performance on IBIS data. Furthermore, we demonstrate the capability of machine learning algorithms to perform pixel-by-pixel discrimination of chemicals within a hypercube image, as well as the simultaneous detection of multiple different chemicals. We also demonstrate the capacity of machine learning algorithms to perform with high precision and recall under noisy conditions. The algorithm goes beyond simply identifying the presence of a chemical, in that it is also able to pinpoint the spatial location of each chemical within the field of view.", "fno": "460900a388", "keywords": [ "Deep Learning Artificial Intelligence", "Focal Planes", "Geophysical Image Processing", "Hyperspectral Imaging", "Image Classification", "Learning Artificial Intelligence", "Pattern Classification", "Backscatter Images", "Classification Performance", "Dangerous Chemicals", "Data Accentuation Technique", "Deep Neural Network Machine", "Deep Neural Networks", "Diffuse Infrared Reflectance Signatures", "Hypercube For Short", "Hypercube Image", "Hypercubes", "Hyperspectral Image Cube", "IBIS Data", "IBIS Measurements", "Infrared Backscatter Imaging Spectroscopy Technology", "Infrared Laser", "MCT Focal Plane Array", "Mobile Cart Based System", "Multiple Different Chemicals", "Spatial Dimensions", "Specific Chemicals", "Spectral Dimension", "Standoff Detection", "Standoff Distance", "Target Surface", "The Physical Image", "Deep Learning", "Training", "Reflectivity", "Machine Learning Algorithms", "Wavelength Measurement", "Neural Networks", "Measurement By Laser Beam", "Standoff Detection", "Infrared", "Backscatter", "Diffuse Reflectance", "Hypercube", "Deep Neural Network", "Analyte" ], "authors": [ { "affiliation": "Winston Churchill High School,Potomac,MD,USA", "fullName": "Eric Yao", "givenName": "Eric", "surname": "Yao", "__typename": "ArticleAuthorType" }, { "affiliation": "U. S. Naval Research Laboratory,Washington,D.C.,USA", "fullName": "Christopher A. Kendziora", "givenName": "Christopher A.", "surname": "Kendziora", "__typename": "ArticleAuthorType" }, { "affiliation": "U. S. Naval Research Laboratory,Washington,D.C.,USA", "fullName": "Robert Furstenberg", "givenName": "Robert", "surname": "Furstenberg", "__typename": "ArticleAuthorType" }, { "affiliation": "U. S. Naval Research Laboratory,Washington,D.C.,USA", "fullName": "Christopher J. Breshike", "givenName": "Christopher J.", "surname": "Breshike", "__typename": "ArticleAuthorType" }, { "affiliation": "U. S. Naval Research Laboratory,Washington,D.C.,USA", "fullName": "Drew M. Finton", "givenName": "Drew M.", "surname": "Finton", "__typename": "ArticleAuthorType" }, { "affiliation": "U. S. Naval Research Laboratory,Washington,D.C.,USA", "fullName": "Drew C. Kendziora", "givenName": "Drew C.", "surname": "Kendziora", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "388-394", "year": "2022", "issn": null, "isbn": "979-8-3503-4609-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "460900a378", "articleId": "1KBqS0kjTZS", "__typename": "AdjacentArticleType" }, "next": { "fno": "460900a395", "articleId": "1KBqQG4UaeQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isdea/2013/4893/0/06455955", "title": "Research on Single Modulation of Continuous-Wave Laser Ranging Technology", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06455955/12OmNBrDqFF", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itc/2014/4722/0/07035329", "title": "IC laser trimming speed-up through wafer-level spatial correlation modeling", "doi": null, "abstractUrl": "/proceedings-article/itc/2014/07035329/12OmNwAt1Fq", "parentPublication": { "id": "proceedings/itc/2014/4722/0", "title": "2014 IEEE International Test Conference (ITC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456496", "title": "Design About Limber Information Collection System for Vibrator Motorcade", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456496/12OmNwnYFWE", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/2013/6067/0/06524639", "title": "A Fuzzy Human Detection for Security System Using Infrared Laser Camera", "doi": null, "abstractUrl": "/proceedings-article/ismvl/2013/06524639/12OmNxwENlQ", "parentPublication": { "id": "proceedings/ismvl/2013/6067/0", "title": "2013 IEEE 43rd International Symposium on Multiple-Valued Logic (ISMVL 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2014/4261/0/4261b122", "title": "Wavelength Tuning Technology Research of Fire Gas Detection System Based on Absorption Spectroscopy", "doi": null, "abstractUrl": "/proceedings-article/isdea/2014/4261b122/12OmNzRHOTn", "parentPublication": { "id": "proceedings/isdea/2014/4261/0", "title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d743", "title": "Multi-Echo LiDAR for 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d743/1BmFBHEQzG8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eiect/2022/9956/0/995600a355", "title": "Can Laser Speckle Contrast Imaging be a quantitative measurement using machine learning?", "doi": null, "abstractUrl": "/proceedings-article/eiect/2022/995600a355/1LHcvvAgv7O", "parentPublication": { "id": "proceedings/eiect/2022/9956/0", "title": "2022 2nd International Conference on Electronic Information Engineering and Computer Technology (EIECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2019/5045/0/504500a776", "title": "Deep Sea Laser Scanning System for Underwater In-Situ Measurement", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2019/504500a776/1hHLuCarUpa", "parentPublication": { "id": "proceedings/wcmeim/2019/5045/0", "title": "2019 2nd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2020/9820/0/982000a348", "title": "Safety Risks, Prevention and Control of Dangerous Chemicals Tank Farms in Ports", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2020/982000a348/1mLMcW0IZry", "parentPublication": { "id": "proceedings/icwcsg/2020/9820/0", "title": "2020 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a026", "title": "Design and Implementation of Optical Axis Parallelism Detection System for Laser Ranging Direct-sight Mirror", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a026/1t2nkN0adMs", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa6ff", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "acronym": "iiai-aai", "groupId": "1801921", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzu6S4", "doi": "10.1109/IIAI-AAI.2017.83", "title": "A Visualization Tool to Support Analyzing and Evaluating Scratch Projects", "normalizedTitle": "A Visualization Tool to Support Analyzing and Evaluating Scratch Projects", "abstract": "In this paper, we combined a visualization tool and Dr. Scratch website service to support instructors evaluating the Scratch projects on an online social networking forum: scratch.mit.edu. Scratch is a visual programming language used by youth to design programs like animation, game, or music. Their computational thinking skills take place around program decompositions, program patterns, and data representation in the shared Scratch programs (called projects). Through the exploratory work, we found that some cues, such as deep nested iteration, may be successfully used as indicators of users computational thinking skills. This suggests future directions for assessing youths computational thinking skills development and educational opportunities emerging from shared Scratch projects.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we combined a visualization tool and Dr. Scratch website service to support instructors evaluating the Scratch projects on an online social networking forum: scratch.mit.edu. Scratch is a visual programming language used by youth to design programs like animation, game, or music. Their computational thinking skills take place around program decompositions, program patterns, and data representation in the shared Scratch programs (called projects). Through the exploratory work, we found that some cues, such as deep nested iteration, may be successfully used as indicators of users computational thinking skills. This suggests future directions for assessing youths computational thinking skills development and educational opportunities emerging from shared Scratch projects.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we combined a visualization tool and Dr. Scratch website service to support instructors evaluating the Scratch projects on an online social networking forum: scratch.mit.edu. Scratch is a visual programming language used by youth to design programs like animation, game, or music. Their computational thinking skills take place around program decompositions, program patterns, and data representation in the shared Scratch programs (called projects). Through the exploratory work, we found that some cues, such as deep nested iteration, may be successfully used as indicators of users computational thinking skills. This suggests future directions for assessing youths computational thinking skills development and educational opportunities emerging from shared Scratch projects.", "fno": "0621a498", "keywords": [ "Computer Aided Instruction", "Computer Science Education", "Social Networking Online", "Visual Programming", "Evaluating Scratch Projects", "Visualization Tool", "Online Social Networking Forum", "Visual Programming Language", "Music", "Program Decompositions", "Program Patterns", "Shared Scratch Programs", "Youths Computational Thinking Skills Development", "Dr Scratch Website Service", "Visualization", "Programming Profession", "Computer Languages", "Computer Science Education", "Tools", "Games", "Visualization", "Dr Scratch", "Scratch", "Visual Programming Language", "Computational Thinking Skill" ], "authors": [ { "affiliation": null, "fullName": "Chih-Kai Chang", "givenName": "Chih-Kai", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu-Tzu Tsai", "givenName": "Yu-Tzu", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ya-Lun Chin", "givenName": "Ya-Lun", "surname": "Chin", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiai-aai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "498-502", "year": "2017", "issn": null, "isbn": "978-1-5386-0621-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0621a493", "articleId": "12OmNwEJ0N0", "__typename": "AdjacentArticleType" }, "next": { "fno": "0621a503", "articleId": "12OmNApcurr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwsc/2017/6595/0/07880506", "title": "Software clones in scratch projects: on the presence of copy-and-paste in computational thinking learning", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2017/07880506/12OmNBOll6F", "parentPublication": { "id": "proceedings/iwsc/2017/6595/0", "title": "2017 IEEE 11th International Workshop on Software Clones (IWSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044055", "title": "Automatic detection of bad programming habits in scratch: A preliminary study", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044055/12OmNBlFR2w", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsym/2016/3438/0/07858553", "title": "Experimental Functionality Development for Scratch Mathematical and Statistics Extensions", "doi": null, "abstractUrl": "/proceedings-article/compsym/2016/07858553/12OmNCuVaCs", "parentPublication": { "id": "proceedings/compsym/2016/3438/0", "title": "2016 International Computer Symposium (ICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2016/1428/0/07503706", "title": "Do code smells hamper novice programming? A controlled experiment on Scratch programs", "doi": null, "abstractUrl": "/proceedings-article/icpc/2016/07503706/12OmNqG0SR4", "parentPublication": { "id": "proceedings/icpc/2016/1428/0", "title": "2016 IEEE 24th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2016/0252/0/07739695", "title": "Ninja code village for scratch: Function samples/function analyser and automatic assessment of computational thinking concepts", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2016/07739695/12OmNyGtjl0", "parentPublication": { "id": "proceedings/vlhcc/2016/0252/0", "title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2017/1544/0/07962409", "title": "A Dataset of Scratch Programs: Scraped, Shaped and Scored", "doi": null, "abstractUrl": "/proceedings-article/msr/2017/07962409/12OmNzUPptD", "parentPublication": { "id": "proceedings/msr/2017/1544/0", "title": "2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2020/01/07999170", "title": "Towards Data-Driven Learning Paths to Develop Computational Thinking with Scratch", "doi": null, "abstractUrl": "/journal/ec/2020/01/07999170/13rRUxjQy8E", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/laclo/2018/0382/0/038200a492", "title": "Comparison between Pseudocode Usage and Visual Programming with Scratch in Programming Teaching", "doi": null, "abstractUrl": "/proceedings-article/laclo/2018/038200a492/1cdOikBZSfu", "parentPublication": { "id": "proceedings/laclo/2018/0382/0", "title": "2018 XIII Latin American Conference on Learning Technologies (LACLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/b&b/2019/4849/0/08941222", "title": "Position: IntelliBlox: A Toolkit for Integrating Block-Based Programming into Game-Based Learning Environments", "doi": null, "abstractUrl": "/proceedings-article/b&b/2019/08941222/1gjRlj6f5Qc", "parentPublication": { "id": "proceedings/b&b/2019/4849/0", "title": "2019 IEEE Blocks and Beyond Workshop (B&B)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09321708", "title": "DWES: A Dynamic Weighted Evaluation System for Scratch based on Computational Thinking", "doi": null, "abstractUrl": "/journal/ec/2022/02/09321708/1qmbtqNLZAY", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqdr6P", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNrIrPtC", "doi": "10.1109/VLHCC.2010.18", "title": "Young People's Descriptions of Computational Rules in Role-Playing Games: An Empirical Study", "normalizedTitle": "Young People's Descriptions of Computational Rules in Role-Playing Games: An Empirical Study", "abstract": "A study was carried out which examined the extent to which young people aged 11-12, with no prior instruction in programming, are able to write computational rules which govern play in a 3D computer role-playing game. Expressing these rules required the use of common computational structures such as conditionals, sets and loops. We analysed the rules written for their structure and style, and recorded the types of errors made. It was found that although young people were able to abstract away from the game play experience, very few of the rules were error-free. The most common errors were errors of omission (leaving elements out that should have been included) rather than errors of commission (including elements which should not be part of the rule). These findings have implications for the design of the Flip language, which aims to support young people as they begin to develop computational skills through game design.", "abstracts": [ { "abstractType": "Regular", "content": "A study was carried out which examined the extent to which young people aged 11-12, with no prior instruction in programming, are able to write computational rules which govern play in a 3D computer role-playing game. Expressing these rules required the use of common computational structures such as conditionals, sets and loops. We analysed the rules written for their structure and style, and recorded the types of errors made. It was found that although young people were able to abstract away from the game play experience, very few of the rules were error-free. The most common errors were errors of omission (leaving elements out that should have been included) rather than errors of commission (including elements which should not be part of the rule). These findings have implications for the design of the Flip language, which aims to support young people as they begin to develop computational skills through game design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A study was carried out which examined the extent to which young people aged 11-12, with no prior instruction in programming, are able to write computational rules which govern play in a 3D computer role-playing game. Expressing these rules required the use of common computational structures such as conditionals, sets and loops. We analysed the rules written for their structure and style, and recorded the types of errors made. It was found that although young people were able to abstract away from the game play experience, very few of the rules were error-free. The most common errors were errors of omission (leaving elements out that should have been included) rather than errors of commission (including elements which should not be part of the rule). These findings have implications for the design of the Flip language, which aims to support young people as they begin to develop computational skills through game design.", "fno": "05635194", "keywords": [ "Computer Games", "Young People Descriptions", "Computational Rules", "3 D Computer Role Playing Game", "Common Computational Structures", "Game Play Experience", "Flip Language", "Games", "Programming", "Context", "Educational Institutions", "Computers", "Syntactics", "Error Analysis", "Novice Programmers", "Computational Rules", "Empirical Studies" ], "authors": [ { "affiliation": null, "fullName": "Judith Good", "givenName": "Judith", "surname": "Good", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Katy Howland", "givenName": "Katy", "surname": "Howland", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Keiron Nicholson", "givenName": "Keiron", "surname": "Nicholson", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-09-01T00:00:00", "pubType": "proceedings", "pages": "67-74", "year": "2010", "issn": "1943-6092", "isbn": "978-1-4244-8485-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05635189", "articleId": "12OmNyQGShC", "__typename": "AdjacentArticleType" }, "next": { "fno": "05635193", "articleId": "12OmNzUgcWr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2016/2535/0/2535a308", "title": "Designing Brain Training Games and Evaluating the Usability between Young and Elderly", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a308/12OmNBPtJF0", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc/2012/4843/0/4843a822", "title": "Enhancing Traditional Games with Augmented Reality Technologies", "doi": null, "abstractUrl": "/proceedings-article/uic-atc/2012/4843a822/12OmNCmGNYK", "parentPublication": { "id": "proceedings/uic-atc/2012/4843/0", "title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881348", "title": "An Innovative Proposal for Young Students to Learn Computer Science and Technology through Pokemon Go", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881348/12OmNqJ8tne", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2012/4702/0/4702a218", "title": "Designing Educational Games by Combining Other Game Designs", "doi": null, "abstractUrl": "/proceedings-article/icalt/2012/4702a218/12OmNwHQB8q", "parentPublication": { "id": "proceedings/icalt/2012/4702/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2014/6572/0/6572a810", "title": "A Pendulum Effect of Expert Playing in Games", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a810/12OmNyxXlnf", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2006/2586/0/25860181", "title": "Script Cards: A Visual Programming Language for Games Authoring by Young People", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2006/25860181/12OmNzuZUDC", "parentPublication": { "id": "proceedings/vlhcc/2006/2586/0", "title": "IEEE Symposium on Visual Languages and Human-Centric Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2014/08/mco2014080084", "title": "Teaching Game Programming in Family Workshops", "doi": null, "abstractUrl": "/magazine/co/2014/08/mco2014080084/13rRUzp02jp", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658553", "title": "Designing for All: Exploring Gender Diversity and Engagement with Digital Educational Games by Young People", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658553/18j9lp60q2s", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028436", "title": "Encouraging Diversity in Computer Science among Young People: Using a Games Design Intervention based on an Integrated Pedagogical Framework", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028436/1iffqyW696U", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222251", "title": "Designing Narrative-Focused Role-Playing Games for Visualization Literacy in Young Children", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222251/1nTr15tWhvq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BzVV4Y4hbO", "title": "2021 XVI Latin American Conference on Learning Technologies (LACLO)", "acronym": "laclo", "groupId": "1816004", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BzW6dfp1F6", "doi": "10.1109/LACLO54177.2021.00094", "title": "NinjaMath: Role Playing Game for Learning Factoring", "normalizedTitle": "NinjaMath: Role Playing Game for Learning Factoring", "abstract": "Currently, one of the greatest challenges facing higher education is to reduce the high rates of loss and dropout that occur in subjects in Mathematics, for which it is necessary to work on the creation of new learning environments that allow to awaken the interest of students towards these disciplines. The digital game NinjaMath is a platform game that aims to provide a novel resource for learning factorization in students of the undergraduate programs of the Metropolitan Technological Institute of the city of Medellín in Colombia. The game is built considering three essential elements that, according to various investigations, contribute to developing cognitive skills in students: specific rules and mechanics of the game, narrative, and aesthetics. The tool used to build the game is the Unity version 5.0.0f4 game development engine, using the C# programming language with the MonoDeveloper editor.", "abstracts": [ { "abstractType": "Regular", "content": "Currently, one of the greatest challenges facing higher education is to reduce the high rates of loss and dropout that occur in subjects in Mathematics, for which it is necessary to work on the creation of new learning environments that allow to awaken the interest of students towards these disciplines. The digital game NinjaMath is a platform game that aims to provide a novel resource for learning factorization in students of the undergraduate programs of the Metropolitan Technological Institute of the city of Medellín in Colombia. The game is built considering three essential elements that, according to various investigations, contribute to developing cognitive skills in students: specific rules and mechanics of the game, narrative, and aesthetics. The tool used to build the game is the Unity version 5.0.0f4 game development engine, using the C# programming language with the MonoDeveloper editor.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Currently, one of the greatest challenges facing higher education is to reduce the high rates of loss and dropout that occur in subjects in Mathematics, for which it is necessary to work on the creation of new learning environments that allow to awaken the interest of students towards these disciplines. The digital game NinjaMath is a platform game that aims to provide a novel resource for learning factorization in students of the undergraduate programs of the Metropolitan Technological Institute of the city of Medellín in Colombia. The game is built considering three essential elements that, according to various investigations, contribute to developing cognitive skills in students: specific rules and mechanics of the game, narrative, and aesthetics. The tool used to build the game is the Unity version 5.0.0f4 game development engine, using the C# programming language with the MonoDeveloper editor.", "fno": "235800a522", "keywords": [ "C Language", "Computer Aided Instruction", "Educational Courses", "Educational Institutions", "Further Education", "Mathematics Computing", "Matrix Decomposition", "Serious Games Computing", "Role Playing Game", "Higher Education", "Digital Game", "Undergraduate Programs", "Metropolitan Technological Institute", "Medellin City", "Colombia", "Factorization Learning", "Ninja Math", "Cognitive Skill Development", "Unity Version 5 0 0 F 4 Game Development Engine", "C Programming Language", "Mono Developer Editor", "Mathematics", "Computer Languages", "Urban Areas", "Education", "Games", "Mathematics", "C Languages", "Engines", "Digital Game", "Factorization", "Rules", "Narrative", "Aesthetics" ], "authors": [ { "affiliation": "Instituto Tecnológico Metropolitano,Facultad de Ciencias Exactas y Aplicadas,Medellín,Colombia", "fullName": "Nelson David Zapata Osorio", "givenName": "Nelson David Zapata", "surname": "Osorio", "__typename": "ArticleAuthorType" }, { "affiliation": "Instituto Tecnológico Metropolitano,Facultad de Ciencias Exactas y Aplicadas,Medellín,Colombia", "fullName": "Alberto Alejandro Piedrahita Ospina", "givenName": "Alberto Alejandro Piedrahita", "surname": "Ospina", "__typename": "ArticleAuthorType" } ], "idPrefix": "laclo", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "522-525", "year": "2021", "issn": null, "isbn": "978-1-6654-2358-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "235800a518", "articleId": "1BzW2L6tnDq", "__typename": "AdjacentArticleType" }, "next": { "fno": "235800a526", "articleId": "1BzW1o8rUC4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2009/3711/0/3711a078", "title": "A Role-Playing Game-Based Learning Platform for Environmental Awareness", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a078/12OmNAYXWED", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/digitel/2010/3993/0/3993a103", "title": "Web-Based Multiplayer Online Role Playing Game (MORPG) for Assessing Students' Java Programming Knowledge and Skills", "doi": null, "abstractUrl": "/proceedings-article/digitel/2010/3993a103/12OmNwpGgId", "parentPublication": { "id": "proceedings/digitel/2010/3993/0", "title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a148", "title": "Teaching STEM through a Role-Playing Serious Game and Intelligent Pedagogical Agents", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a148/12OmNwpGgN1", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2017/6724/0/07926576", "title": "Playing Mastermind Game by Using Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/irc/2017/07926576/12OmNxFsmGq", "parentPublication": { "id": "proceedings/irc/2017/6724/0", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/digitel/2012/4663/0/4663a102", "title": "A Model for Role-Playing Game with Mobile Learning", "doi": null, "abstractUrl": "/proceedings-article/digitel/2012/4663a102/12OmNyQpgMY", "parentPublication": { "id": "proceedings/digitel/2012/4663/0", "title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/simsym/1990/2067/0/00717276", "title": "The Role Of Simulation In Developing Game Playing Strategies", "doi": null, "abstractUrl": "/proceedings-article/simsym/1990/00717276/12OmNyTwRfU", "parentPublication": { "id": "proceedings/simsym/1990/2067/0", "title": "1990 Eastern Multiconference. Record of Proceedings. The 23rd Annual Simulation Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiaiaai/2013/2134/0/06630338", "title": "Effects of Prior Knowledge on Cognitive Learning Outcomes within an English Learning Multiplayer Online Role-Playing Game", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2013/06630338/12OmNzcPApe", "parentPublication": { "id": "proceedings/iiaiaai/2013/2134/0", "title": "2013 IIAI International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2014/01/06687273", "title": "An Interactive Game Approach for Improving Students’ Learning Performance in Multi-Touch Game-Based Learning", "doi": null, "abstractUrl": "/journal/lt/2014/01/06687273/13rRUx0gekj", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcd/2022/6582/0/09900649", "title": "Factors Impacting the Intention to use Role-playing Games in Learning Communicative English of University Students in Da Nang City", "doi": null, "abstractUrl": "/proceedings-article/bcd/2022/09900649/1H44ec6CuGI", "parentPublication": { "id": "proceedings/bcd/2022/6582/0", "title": "2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icore/2022/3390/0/339000a208", "title": "D-Knights: A 3D Role-Playing Mobile Game for Students with Dyscalculia and Math Learning Disability", "doi": null, "abstractUrl": "/proceedings-article/icore/2022/339000a208/1LSOTTDVmO4", "parentPublication": { "id": "proceedings/icore/2022/3390/0", "title": "2022 2nd International Conference in Information and Computing Research (iCORE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cYi06q10li", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYi3HRJyG4", "doi": "10.1109/ICALT.2019.00030", "title": "uAdventure: Simplifying Narrative Serious Games Development", "normalizedTitle": "uAdventure: Simplifying Narrative Serious Games Development", "abstract": "Game engines and developer-friendly authoring tools have greatly simplified entertainment game development. However, this does not extend to serious games which, in particular, require involvement of non-developer stakeholders. We present the first evaluation of uAdventure, an easy-to-use game development environment for narrative point-and-click graphic adventure games. uAdventure is a re-implementation of the previously-validated eAdventure environment on top of the Unity game engine. The idea is to get most of the advantages of the Unity professional environment at a fraction of its complexity, and without requiring programming knowledge to use it. uAdventure include educational-oriented affordances, such as assessment and learning analytics; and has been formatively evaluated by heterogeneous users with different degrees of technical knowledge. The results of our evaluation show much simpler story creation for profiles that had no previous knowledge of the engine, and positive feedback from more technical profiles which would use the tool as a prototyping tool for complex projects.", "abstracts": [ { "abstractType": "Regular", "content": "Game engines and developer-friendly authoring tools have greatly simplified entertainment game development. However, this does not extend to serious games which, in particular, require involvement of non-developer stakeholders. We present the first evaluation of uAdventure, an easy-to-use game development environment for narrative point-and-click graphic adventure games. uAdventure is a re-implementation of the previously-validated eAdventure environment on top of the Unity game engine. The idea is to get most of the advantages of the Unity professional environment at a fraction of its complexity, and without requiring programming knowledge to use it. uAdventure include educational-oriented affordances, such as assessment and learning analytics; and has been formatively evaluated by heterogeneous users with different degrees of technical knowledge. The results of our evaluation show much simpler story creation for profiles that had no previous knowledge of the engine, and positive feedback from more technical profiles which would use the tool as a prototyping tool for complex projects.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Game engines and developer-friendly authoring tools have greatly simplified entertainment game development. However, this does not extend to serious games which, in particular, require involvement of non-developer stakeholders. We present the first evaluation of uAdventure, an easy-to-use game development environment for narrative point-and-click graphic adventure games. uAdventure is a re-implementation of the previously-validated eAdventure environment on top of the Unity game engine. The idea is to get most of the advantages of the Unity professional environment at a fraction of its complexity, and without requiring programming knowledge to use it. uAdventure include educational-oriented affordances, such as assessment and learning analytics; and has been formatively evaluated by heterogeneous users with different degrees of technical knowledge. The results of our evaluation show much simpler story creation for profiles that had no previous knowledge of the engine, and positive feedback from more technical profiles which would use the tool as a prototyping tool for complex projects.", "fno": "348500a119", "keywords": [ "Authoring Systems", "Computer Aided Instruction", "Serious Games Computing", "Game Engines", "Developer Friendly Authoring Tools", "Nondeveloper Stakeholders", "U Adventure", "Easy To Use Game Development Environment", "E Adventure Environment", "Unity Game Engine", "Unity Professional Environment", "Narrative Point And Click Graphic Adventure Game", "Simplified Entertainment Game Development", "Narrative Serious Games Development", "Prototyping Tool", "Complex Projects", "Heterogeneous Users", "Technical Knowledge", "Educational Oriented Affordances", "Learning Analytics", "Assessment Analytics", "Games", "Engines", "Authoring Systems", "Windows", "Tools", "Complexity Theory", "Microsoft Windows", "Serious Game Authoring System Narrative Games Learning Analytics" ], "authors": [ { "affiliation": "Universidad Complutense de Madrid", "fullName": "Víctor Manuel Pérez-Colado", "givenName": "Víctor Manuel", "surname": "Pérez-Colado", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Complutense de Madrid", "fullName": "Iván José Pérez-Colado", "givenName": "Iván José", "surname": "Pérez-Colado", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Complutense de Madrid", "fullName": "Manuel Freire-Morán", "givenName": "Manuel", "surname": "Freire-Morán", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Complutense de Madrid", "fullName": "Iván Martínez-Ortiz", "givenName": "Iván", "surname": "Martínez-Ortiz", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Complutense de Madrid", "fullName": "Baltasar Fernández-Manjón", "givenName": "Baltasar", "surname": "Fernández-Manjón", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "119-123", "year": "2019", "issn": null, "isbn": "978-1-7281-3485-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "348500a113", "articleId": "1cYi5GM2SC4", "__typename": "AdjacentArticleType" }, "next": { "fno": "348500a124", "articleId": "1cYi5nKVai4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vs-games/2016/2722/0/07590362", "title": "Serious Games - Creating an Ecosystem for Success", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2016/07590362/12OmNBbaH6R", "parentPublication": { "id": "proceedings/vs-games/2016/2722/0", "title": "2016 8th International Conference on Games and Virtual Worlds for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2011/4419/0/4419a172", "title": "Usability of Serious Games for Health", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2011/4419a172/12OmNCbU35Q", "parentPublication": { "id": "proceedings/vs-games/2011/4419/0", "title": "Games and Virtual Worlds for Serious Applications, Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a662", "title": "A Survey of Frameworks and Game Engines for Serious Game Development", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a662/12OmNxxNbRP", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a021", "title": "A Conceptual Framework for Serious Games", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a021/12OmNy5hRfe", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2010/6331/0/05460149", "title": "Validation of Serious Games Attributes Using the Technology Acceptance Model", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2010/05460149/12OmNzaQoK0", "parentPublication": { "id": "proceedings/vs-games/2010/6331/0", "title": "2010 2nd International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2009/04/05308333", "title": "Adaptive experience engine for serious games", "doi": null, "abstractUrl": "/journal/ci/2009/04/05308333/13rRUEgarDQ", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a376", "title": "Development and Exploration of Serious Games for Anti-bullying Education : ——The Experience of Developing the Software of Anti-bullying Serious Games", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a376/1KpBIXuCUq4", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aike/2019/1488/0/148800a148", "title": "An Ontology for Personalization in Serious Games for Assessment", "doi": null, "abstractUrl": "/proceedings-article/aike/2019/148800a148/1ckrBqXQJnG", "parentPublication": { "id": "proceedings/aike/2019/1488/0", "title": "2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2021/4106/0/410600a069", "title": "Creating Serious STEM Games by combining a Game Platform and Mathematical Software", "doi": null, "abstractUrl": "/proceedings-article/icalt/2021/410600a069/1vK03JL5oIg", "parentPublication": { "id": "proceedings/icalt/2021/4106/0", "title": "2021 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2021/0189/0/018900a069", "title": "Games by End-Users: Analyzing Development Environments", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2021/018900a069/1zusnjhkrAc", "parentPublication": { "id": "proceedings/sbgames/2021/0189/0", "title": "2021 20th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cYi06q10li", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYi5ZFvqqk", "doi": "10.1109/ICALT.2019.00035", "title": "Narrative for Gamification in Education: Why Should you Care?", "normalizedTitle": "Narrative for Gamification in Education: Why Should you Care?", "abstract": "Gamification applied to education studies are focusing to encourage students to perform specific tasks, however many of these studies are still inconclusive about how much gamification can influence engagement. Also, the frameworks used to apply gamification in those systems are mainly structural (e.g. scoring and ranking systems) rather than content frameworks (where the game elements are applied to the content). Therefore, this paper aims at creating a narrative definition exclusively for gamification purposes. First, we developed an empirical research starting with a literature review of the narrative concept in other medias, such as games. Then, we mapped these definitions into features and crossed the similarities and differences across them, to find a common ground that could be applied in gamification contexts. Our results show that the narrative element definition to use in gamification contexts best drifts from the games ones, however its definition is unique to the point it could be isolated and used in future frameworks. We also found that the characteristics of this concept resembles some of User Experience.", "abstracts": [ { "abstractType": "Regular", "content": "Gamification applied to education studies are focusing to encourage students to perform specific tasks, however many of these studies are still inconclusive about how much gamification can influence engagement. Also, the frameworks used to apply gamification in those systems are mainly structural (e.g. scoring and ranking systems) rather than content frameworks (where the game elements are applied to the content). Therefore, this paper aims at creating a narrative definition exclusively for gamification purposes. First, we developed an empirical research starting with a literature review of the narrative concept in other medias, such as games. Then, we mapped these definitions into features and crossed the similarities and differences across them, to find a common ground that could be applied in gamification contexts. Our results show that the narrative element definition to use in gamification contexts best drifts from the games ones, however its definition is unique to the point it could be isolated and used in future frameworks. We also found that the characteristics of this concept resembles some of User Experience.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gamification applied to education studies are focusing to encourage students to perform specific tasks, however many of these studies are still inconclusive about how much gamification can influence engagement. Also, the frameworks used to apply gamification in those systems are mainly structural (e.g. scoring and ranking systems) rather than content frameworks (where the game elements are applied to the content). Therefore, this paper aims at creating a narrative definition exclusively for gamification purposes. First, we developed an empirical research starting with a literature review of the narrative concept in other medias, such as games. Then, we mapped these definitions into features and crossed the similarities and differences across them, to find a common ground that could be applied in gamification contexts. Our results show that the narrative element definition to use in gamification contexts best drifts from the games ones, however its definition is unique to the point it could be isolated and used in future frameworks. We also found that the characteristics of this concept resembles some of User Experience.", "fno": "348500a097", "keywords": [ "Computer Aided Instruction", "Computer Games", "User Experience", "Ranking Systems", "Game Elements", "Narrative Definition", "Gamification Purposes", "Gamification Contexts", "Narrative Element Definition", "Scoring Systems", "User Experience", "Games", "User Experience", "Education", "Media", "Human Computer Interaction", "Face", "Gamification Narrative Games Framework Education" ], "authors": [ { "affiliation": "University of São Paulo", "fullName": "Paula Toledo Palomino", "givenName": "Paula", "surname": "Toledo Palomino", "__typename": "ArticleAuthorType" }, { "affiliation": "University of São Paulo and Durham University", "fullName": "Armando M Toda", "givenName": "Armando M", "surname": "Toda", "__typename": "ArticleAuthorType" }, { "affiliation": "University of São Paulo", "fullName": "Wilk Oliveira", "givenName": "Wilk", "surname": "Oliveira", "__typename": "ArticleAuthorType" }, { "affiliation": "Durham University", "fullName": "Alexandra I. Cristea", "givenName": "Alexandra I.", "surname": "Cristea", "__typename": "ArticleAuthorType" }, { "affiliation": "University of São Paulo", "fullName": "Seiji Isotani", "givenName": "Seiji", "surname": "Isotani", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "97-99", "year": "2019", "issn": null, "isbn": "978-1-7281-3485-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "348500a092", "articleId": "1cYi5b9ttcs", "__typename": "AdjacentArticleType" }, "next": { "fno": "348500a100", "articleId": "1cYi1VsCKYg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670b307", "title": "Introduction to Gamification: Motivations, Effects and Analytics Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b307/12OmNA1Vnw8", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a817", "title": "Introduction to the Serious Games, Gamification and Innovation Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a817/12OmNBoNrkY", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ast/2017/1548/0/07962323", "title": "Gamification of Software Testing", "doi": null, "abstractUrl": "/proceedings-article/ast/2017/07962323/12OmNxEjY68", "parentPublication": { "id": "proceedings/ast/2017/1548/0", "title": "2017 IEEE/ACM 12th International Workshop on Automation of Software Testing (AST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2018/6049/0/604901a408", "title": "Motivational Factors in Educational Gamification", "doi": null, "abstractUrl": "/proceedings-article/icalt/2018/604901a408/12OmNyeWdDI", "parentPublication": { "id": "proceedings/icalt/2018/6049/0", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460062", "title": "Supporting computational thinking through gamification", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460062/12OmNzvQI3S", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc/2013/5152/0/06809455", "title": "GaML - A Modeling Language for Gamification", "doi": null, "abstractUrl": "/proceedings-article/ucc/2013/06809455/12OmNzwZ6ut", "parentPublication": { "id": "proceedings/ucc/2013/5152/0", "title": "2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2017/05/mso2017050076", "title": "Gamification", "doi": null, "abstractUrl": "/magazine/so/2017/05/mso2017050076/13rRUwbs1YY", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2022/06/09928226", "title": "Unlock the Business Value of Gamification", "doi": null, "abstractUrl": "/magazine/so/2022/06/09928226/1HJuxefQYSI", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2019/3485/0/348500a089", "title": "Detailing Motivation in a Gamification Process", "doi": null, "abstractUrl": "/proceedings-article/icalt/2019/348500a089/1cYi0iJin6M", "parentPublication": { "id": "proceedings/icalt/2019/3485/2161-377X", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2021/1409/0/140900a105", "title": "Gamification in Software Engineering: A literature Review", "doi": null, "abstractUrl": "/proceedings-article/chase/2021/140900a105/1tB7tbdtzpu", "parentPublication": { "id": "proceedings/chase/2021/1409/0/", "title": "2021 IEEE/ACM 13th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAZfxDG", "doi": "10.1109/BIBM.2017.8217991", "title": "A network-based approach to mine temporal genes exhibiting significant expression variation in Caenorhabditis elegans", "normalizedTitle": "A network-based approach to mine temporal genes exhibiting significant expression variation in Caenorhabditis elegans", "abstract": "It is critical to be able to identify longitudinally changing genes in temporal data so that studies can be focused on how gene expression changes in a dynamic way. While biological networks continue to play a significant role in modeling and characterizing complex relationships in biological systems, most network modeling studies in biomedical research focus on snapshot or “static” network-based analysis to identify genes of interest. In this study, we use a temporal non-sampling network-based approach to identify and rank genes that exhibit significant co-expression variation over time. We use in the C. elegans gene correlation network obtained from mRNA expression profiles to illustrate the value of the proposed approach. We compare the results of this method to results obtained from traditional statistical analysis that focuses on identifying simple differentially expressed genes. We show that rank-based temporal network analysis can identify genes that contribute to changes in the network structure and consequently contribute to changes in the genetic regulatory machine.", "abstracts": [ { "abstractType": "Regular", "content": "It is critical to be able to identify longitudinally changing genes in temporal data so that studies can be focused on how gene expression changes in a dynamic way. While biological networks continue to play a significant role in modeling and characterizing complex relationships in biological systems, most network modeling studies in biomedical research focus on snapshot or “static” network-based analysis to identify genes of interest. In this study, we use a temporal non-sampling network-based approach to identify and rank genes that exhibit significant co-expression variation over time. We use in the C. elegans gene correlation network obtained from mRNA expression profiles to illustrate the value of the proposed approach. We compare the results of this method to results obtained from traditional statistical analysis that focuses on identifying simple differentially expressed genes. We show that rank-based temporal network analysis can identify genes that contribute to changes in the network structure and consequently contribute to changes in the genetic regulatory machine.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is critical to be able to identify longitudinally changing genes in temporal data so that studies can be focused on how gene expression changes in a dynamic way. While biological networks continue to play a significant role in modeling and characterizing complex relationships in biological systems, most network modeling studies in biomedical research focus on snapshot or “static” network-based analysis to identify genes of interest. In this study, we use a temporal non-sampling network-based approach to identify and rank genes that exhibit significant co-expression variation over time. We use in the C. elegans gene correlation network obtained from mRNA expression profiles to illustrate the value of the proposed approach. We compare the results of this method to results obtained from traditional statistical analysis that focuses on identifying simple differentially expressed genes. We show that rank-based temporal network analysis can identify genes that contribute to changes in the network structure and consequently contribute to changes in the genetic regulatory machine.", "fno": "08217991", "keywords": [ "Strain", "Correlation", "Gene Expression", "Bioinformatics", "Electronic Mail", "Information Science", "Temporal Network Analysis", "Gene Expression", "Co Expression Networks", "Bioinformatics Algorithms" ], "authors": [ { "affiliation": "College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE", "fullName": "Kathryn Cooper", "givenName": "Kathryn", "surname": "Cooper", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Biomedical Sciences, University of Missouri-Kansas City, School of Medicine, Kansas City, MO", "fullName": "Wail Hassan", "givenName": "Wail", "surname": "Hassan", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE", "fullName": "Hesham Ali", "givenName": "Hesham", "surname": "Ali", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "2151-2156", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217990", "articleId": "12OmNxw5BiS", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217992", "articleId": "12OmNykkB4D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisa/2013/0602/0/06579506", "title": "Bhattacharyya Distance for Identifying Differentially Expressed Genes in Colon Gene Experiments", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579506/12OmNBkfRmc", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2016/3834/0/3834a057", "title": "Finding Influential Genes Using Gene Expression Data and Boolean Models of Metabolic Networks", "doi": null, "abstractUrl": "/proceedings-article/bibe/2016/3834a057/12OmNrJ11zR", "parentPublication": { "id": "proceedings/bibe/2016/3834/0", "title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706578", "title": "Concurrent analysis of copy number variations and expression profiles to identify genes associated with tumorigenesis and survival outcome in lung adenocarcinoma", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706578/12OmNrJAdXI", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2009/3933/0/3933a079", "title": "Multi-agent System for Gene Expression Analysis to Identify Involved Genes in Cervical Cancer", "doi": null, "abstractUrl": "/proceedings-article/micai/2009/3933a079/12OmNs5rkPX", "parentPublication": { "id": "proceedings/micai/2009/3933/0", "title": "2009 Eighth Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a001", "title": "Identifying Significant Genes from DNA Microarray Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a001/12OmNwcCIJz", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822526", "title": "Just-in-time expression of influential genes in the cellular networks of the malaria parasite Plasmodium falciparum during the red blood cycle", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822526/12OmNz4SOsZ", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/01/07593332", "title": "GSEH: A Novel Approach to Select Prostate Cancer-Associated Genes Using Gene Expression Heterogeneity", "doi": null, "abstractUrl": "/journal/tb/2018/01/07593332/13rRUxN5eC9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07530893", "title": "Significance and Functional Similarity for Identification of Disease Genes", "doi": null, "abstractUrl": "/journal/tb/2017/06/07530893/13rRUxjQyfU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/03/08482286", "title": "Identifying Key Genes of Liver Cancer by Networking of Multiple Data Sets", "doi": null, "abstractUrl": "/journal/tb/2019/03/08482286/147pbPuzfpe", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09090280", "title": "Integrative Biological Network Analysis to Identify Shared Genes in Metabolic Disorders", "doi": null, "abstractUrl": "/journal/tb/2022/01/09090280/1jFb0Hx783K", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAfy7Gq", "title": "Proceedings. 2005 IEEE Computational Systems Bioinformatics Conference", "acronym": "csb", "groupId": "1002130", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNAhOUJs", "doi": "10.1109/CSB.2005.5", "title": "A Learned Comparative Expression Measure for Affymetrix GeneChip DNA Microarrays", "normalizedTitle": "A Learned Comparative Expression Measure for Affymetrix GeneChip DNA Microarrays", "abstract": "Perhaps the most common question that a microarray study can ask is, \"Between two given biological conditions, which genes exhibit changed expression levels?\" Existing methods for answering this question either generate a comparative measure based upon a static model, or take an indirect approach, first estimating absolute expression levels and then comparing the estimated levels to one another. We present a method for detecting changes in gene expression between two samples based on data from Affymetrix GeneChips. Using a library of over 200,000 known cases of differential expression, we create a learned comparative expression measure (LCEM) based on classification of probe-level data patterns as changed or unchanged. LCEM uses perfect match probe data only; mismatch probe values did not prove to be useful in this context. LCEM is particularly powerful in the case of small microarry studies, in which a regression-based method such as RMA cannot generalize, and in detecting small expression changes. At the levels of selectivity that are typical in microarray analysis, the LCEM shows a lower false discovery rate than either MAS5 or RMA trained from a single chip. When many chips are available to RMA, LCEM performs better on two out of the three data sets, and nearly as well on the third. Performance of the MAS5 log ratio statistic was notably bad on all datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Perhaps the most common question that a microarray study can ask is, \"Between two given biological conditions, which genes exhibit changed expression levels?\" Existing methods for answering this question either generate a comparative measure based upon a static model, or take an indirect approach, first estimating absolute expression levels and then comparing the estimated levels to one another. We present a method for detecting changes in gene expression between two samples based on data from Affymetrix GeneChips. Using a library of over 200,000 known cases of differential expression, we create a learned comparative expression measure (LCEM) based on classification of probe-level data patterns as changed or unchanged. LCEM uses perfect match probe data only; mismatch probe values did not prove to be useful in this context. LCEM is particularly powerful in the case of small microarry studies, in which a regression-based method such as RMA cannot generalize, and in detecting small expression changes. At the levels of selectivity that are typical in microarray analysis, the LCEM shows a lower false discovery rate than either MAS5 or RMA trained from a single chip. When many chips are available to RMA, LCEM performs better on two out of the three data sets, and nearly as well on the third. Performance of the MAS5 log ratio statistic was notably bad on all datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Perhaps the most common question that a microarray study can ask is, \"Between two given biological conditions, which genes exhibit changed expression levels?\" Existing methods for answering this question either generate a comparative measure based upon a static model, or take an indirect approach, first estimating absolute expression levels and then comparing the estimated levels to one another. We present a method for detecting changes in gene expression between two samples based on data from Affymetrix GeneChips. Using a library of over 200,000 known cases of differential expression, we create a learned comparative expression measure (LCEM) based on classification of probe-level data patterns as changed or unchanged. LCEM uses perfect match probe data only; mismatch probe values did not prove to be useful in this context. LCEM is particularly powerful in the case of small microarry studies, in which a regression-based method such as RMA cannot generalize, and in detecting small expression changes. At the levels of selectivity that are typical in microarray analysis, the LCEM shows a lower false discovery rate than either MAS5 or RMA trained from a single chip. When many chips are available to RMA, LCEM performs better on two out of the three data sets, and nearly as well on the third. Performance of the MAS5 log ratio statistic was notably bad on all datasets.", "fno": "23440144", "keywords": [ "Microarrays", "Gene Expression", "Support Vector Machine" ], "authors": [ { "affiliation": "University of Washington", "fullName": "Will Sheffler", "givenName": "Will", "surname": "Sheffler", "__typename": "ArticleAuthorType" }, { "affiliation": "Brown University", "fullName": "Eli Upfal", "givenName": "Eli", "surname": "Upfal", "__typename": "ArticleAuthorType" }, { "affiliation": "Brown University", "fullName": "John Sedivy", "givenName": "John", "surname": "Sedivy", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Washington", "fullName": "William Stafford Noble", "givenName": "William Stafford", "surname": "Noble", "__typename": "ArticleAuthorType" } ], "idPrefix": "csb", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-08-01T00:00:00", "pubType": "proceedings", "pages": "144-154", "year": "2005", "issn": null, "isbn": "0-7695-2344-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23440135", "articleId": "12OmNvonIMp", "__typename": "AdjacentArticleType" }, "next": { "fno": "23440157", "articleId": "12OmNxVV5Zs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2007/1509/0/04375552", "title": "PANP - a New Method of Gene Detection on Oligonucleotide Expression Arrays", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375552/12OmNB836PG", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2000/0862/0/08620200", "title": "Selecting Optimum DNA Oligos for Microarrays", "doi": null, "abstractUrl": "/proceedings-article/bibe/2000/08620200/12OmNBz101p", "parentPublication": { "id": "proceedings/bibe/2000/0862/0", "title": "13th IEEE International Conference on BioInformatics and BioEngineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375681", "title": "Ensemble of Kernel Based Classifiers to Improve the Human Cancer Prediction using DNA Microarrays", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375681/12OmNqIhG5k", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csnt/2011/4437/0/4437a646", "title": "A Novel Approach to Predict Cancer by Ensembling of Kernel Based Dimension Reduction and Classifier Using DNA Microarrays", "doi": null, "abstractUrl": "/proceedings-article/csnt/2011/4437a646/12OmNwFid1B", "parentPublication": { "id": "proceedings/csnt/2011/4437/0", "title": "Communication Systems and Network Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a001", "title": "Identifying Significant Genes from DNA Microarray Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a001/12OmNwcCIJz", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999142", "title": "RMA with quantile normalization mixes biological signals between different sample groups in microarray data analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999142/12OmNwekjxd", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375693", "title": "Sensitivity and Consistency of Affymetrix GeneChip Normalization Methods", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375693/12OmNx965yZ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392729", "title": "Systematic measurement of missmatch effect for designing inter-species microarray", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392729/12OmNxGAL2H", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isola/2006/3071/0/3071a146", "title": "Application of Bioinformatics in the Design of Gene Expression Microarrays", "doi": null, "abstractUrl": "/proceedings-article/isola/2006/3071a146/12OmNyQ7G33", "parentPublication": { "id": "proceedings/isola/2006/3071/0", "title": "2006 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406265", "title": "GELA: A Software Tool for the Analysis of Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406265/12OmNzYwbWD", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqqj", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "acronym": "isms", "groupId": "1003102", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBbHIG", "doi": "10.1109/ISMS.2010.39", "title": "A Three-Stage Method to Select Informative Genes from Gene Expression Data in Classifying Cancer Classes", "normalizedTitle": "A Three-Stage Method to Select Informative Genes from Gene Expression Data in Classifying Cancer Classes", "abstract": "The process of gene selection for the cancer classification faces with a major problem due to the properties of the data such as the small number of samples compared to the huge number of genes, irrelevant genes, and noisy data. Hence, this paper aims to select a near-optimal (small) subset of informative genes that is most relevant for the cancer classification. To achieve the aim, a three-stage method has been proposed. It has three stages: 1) pre-selecting genes using a filter method; 2) optimizing the gene subset using a multi-objective hybrid method; 3) analyzing the frequency of appearance of each gene. By performing experiments on three public gene expression data sets, classification accuracies and the number of selected genes of the proposed method are better than those of other experimented methods and previous works. A list of informative genes in the final gene subsets is also presented for biological usage.", "abstracts": [ { "abstractType": "Regular", "content": "The process of gene selection for the cancer classification faces with a major problem due to the properties of the data such as the small number of samples compared to the huge number of genes, irrelevant genes, and noisy data. Hence, this paper aims to select a near-optimal (small) subset of informative genes that is most relevant for the cancer classification. To achieve the aim, a three-stage method has been proposed. It has three stages: 1) pre-selecting genes using a filter method; 2) optimizing the gene subset using a multi-objective hybrid method; 3) analyzing the frequency of appearance of each gene. By performing experiments on three public gene expression data sets, classification accuracies and the number of selected genes of the proposed method are better than those of other experimented methods and previous works. A list of informative genes in the final gene subsets is also presented for biological usage.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The process of gene selection for the cancer classification faces with a major problem due to the properties of the data such as the small number of samples compared to the huge number of genes, irrelevant genes, and noisy data. Hence, this paper aims to select a near-optimal (small) subset of informative genes that is most relevant for the cancer classification. To achieve the aim, a three-stage method has been proposed. It has three stages: 1) pre-selecting genes using a filter method; 2) optimizing the gene subset using a multi-objective hybrid method; 3) analyzing the frequency of appearance of each gene. By performing experiments on three public gene expression data sets, classification accuracies and the number of selected genes of the proposed method are better than those of other experimented methods and previous works. A list of informative genes in the final gene subsets is also presented for biological usage.", "fno": "3973a158", "keywords": [ "Cancer Classification", "Genetic Algorithm", "Gene Selection", "Gene Expression Data", "Three Stage Method" ], "authors": [ { "affiliation": null, "fullName": "Mohd Saberi Mohamad", "givenName": "Mohd Saberi", "surname": "Mohamad", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sigeru Omatu", "givenName": "Sigeru", "surname": "Omatu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Safaai Deris", "givenName": "Safaai", "surname": "Deris", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michifumi Yoshioka", "givenName": "Michifumi", "surname": "Yoshioka", "__typename": "ArticleAuthorType" } ], "idPrefix": "isms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-01-01T00:00:00", "pubType": "proceedings", "pages": "158-163", "year": "2010", "issn": null, "isbn": "978-0-7695-3973-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3973a152", "articleId": "12OmNyRxFzg", "__typename": "AdjacentArticleType" }, "next": { "fno": "3973a164", "articleId": "12OmNyuy9RG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ams/2008/3136/0/3136a603", "title": "An Approach Using Hybrid Methods to Select Informative Genes from Microarray Data for Cancer Classification", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a603/12OmNAnditb", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling & Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2009/5121/0/05332127", "title": "Lasso based gene selection for linear classifiers", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332127/12OmNBNM96L", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706651", "title": "Selecting informative genes by Lasso and Dantzig selector for linear classifiers", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706651/12OmNBSjJ5U", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2013/0602/0/06579506", "title": "Bhattacharyya Distance for Identifying Differentially Expressed Genes in Colon Gene Experiments", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579506/12OmNBkfRmc", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999163", "title": "Ranking of cancer genes in Markov chain model through integration of heterogeneous sources of data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999163/12OmNCesr33", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706588", "title": "Global analysis of miRNA target genes in colon rectal cancer", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706588/12OmNCmpcOn", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a413", "title": "Data-driven Networking Reveals 5-Genes Signature for Early Detection of Lung Cancer", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a413/12OmNsdo6qf", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2010/3973/0/3973a015", "title": "Selecting Informative Genes from Microarray Data by Using a Cyclic GA-Based Method", "doi": null, "abstractUrl": "/proceedings-article/isms/2010/3973a015/12OmNzYwcb0", "parentPublication": { "id": "proceedings/isms/2010/3973/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/01/07593332", "title": "GSEH: A Novel Approach to Select Prostate Cancer-Associated Genes Using Gene Expression Heterogeneity", "doi": null, "abstractUrl": "/journal/tb/2018/01/07593332/13rRUxN5eC9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2010/02/ttb2010020263", "title": "Identification of Full and Partial Class Relevant Genes", "doi": null, "abstractUrl": "/journal/tb/2010/02/ttb2010020263/13rRUy3gn5T", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyRg4m8", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "acronym": "bibmw", "groupId": "1001585", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNrAMEOK", "doi": "10.1109/BIBMW.2010.5703806", "title": "Analyzing genetic factors involved in recombinant protein expression enhancement", "normalizedTitle": "Analyzing genetic factors involved in recombinant protein expression enhancement", "abstract": "Understanding the genetic factors that promote recombinant protein accumulation in transgenic plants will provide insightful strategies for protein biofactory efficiency. Through combining biological and bioinformatics analysis, our work is to determine genetic and biological factors affecting increased protein accumulation of a bacterial cellulase enzyme in transgenic maize. Microarray experiments were performed on maize near-isogenic lines that exhibit high and low accumulation of the enzyme expressed from a transgene in seeds. Through microarray data analysis, two thousand three hundred thirteen genes were identified which exhibited at least a 1.5-fold change in expression level. One hundred sixty-one genes from the data set are shown to be statistically valid. Of these, eighty-two genes are up-regulated while seventy-nine genes are down-regulated. Preliminary functional analysis of the genes was conducted and several pathways of biological importance were tentatively identified. These genes code for four categories of proteins: known proteins, zein proteins, putative proteins and unknown proteins. Further functional clustering and annotation analysis for these genes will help construct and define networks of interaction as well as predict important metabolic pathways to understand the controlling mechanisms that lead to the hyper-accumulation phenomenon.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding the genetic factors that promote recombinant protein accumulation in transgenic plants will provide insightful strategies for protein biofactory efficiency. Through combining biological and bioinformatics analysis, our work is to determine genetic and biological factors affecting increased protein accumulation of a bacterial cellulase enzyme in transgenic maize. Microarray experiments were performed on maize near-isogenic lines that exhibit high and low accumulation of the enzyme expressed from a transgene in seeds. Through microarray data analysis, two thousand three hundred thirteen genes were identified which exhibited at least a 1.5-fold change in expression level. One hundred sixty-one genes from the data set are shown to be statistically valid. Of these, eighty-two genes are up-regulated while seventy-nine genes are down-regulated. Preliminary functional analysis of the genes was conducted and several pathways of biological importance were tentatively identified. These genes code for four categories of proteins: known proteins, zein proteins, putative proteins and unknown proteins. Further functional clustering and annotation analysis for these genes will help construct and define networks of interaction as well as predict important metabolic pathways to understand the controlling mechanisms that lead to the hyper-accumulation phenomenon.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding the genetic factors that promote recombinant protein accumulation in transgenic plants will provide insightful strategies for protein biofactory efficiency. Through combining biological and bioinformatics analysis, our work is to determine genetic and biological factors affecting increased protein accumulation of a bacterial cellulase enzyme in transgenic maize. Microarray experiments were performed on maize near-isogenic lines that exhibit high and low accumulation of the enzyme expressed from a transgene in seeds. Through microarray data analysis, two thousand three hundred thirteen genes were identified which exhibited at least a 1.5-fold change in expression level. One hundred sixty-one genes from the data set are shown to be statistically valid. Of these, eighty-two genes are up-regulated while seventy-nine genes are down-regulated. Preliminary functional analysis of the genes was conducted and several pathways of biological importance were tentatively identified. These genes code for four categories of proteins: known proteins, zein proteins, putative proteins and unknown proteins. Further functional clustering and annotation analysis for these genes will help construct and define networks of interaction as well as predict important metabolic pathways to understand the controlling mechanisms that lead to the hyper-accumulation phenomenon.", "fno": "05703806", "keywords": [ "Bioinformatics", "Biological Techniques", "Botany", "Data Analysis", "Enzymes", "Genetics", "Molecular Biophysics", "Pattern Clustering", "Genetic Factor Analysis", "Recombinant Protein Expression Enhancement", "Recombinant Protein Accumulation", "Transgenic Plants", "Protein Biofactory Efficiency", "Biological Analysis", "Bioinformatics Analysis", "Bacterial Cellulase Enzyme", "Transgenic Maize", "Microarray Experiments", "Maize Near Isogenic Lines", "Microarray Data Analysis", "Functional Clustering Analysis", "Annotation Analysis", "Hyperaccumulation Phenomenon", "Proteins", "Protein Engineering", "Gene Expression", "Bioinformatics", "Embryo", "Gene Expression", "Microarray Data", "Recombinant Protein Accumulation" ], "authors": [ { "affiliation": "Arkansas State University, Jonesboro, 72467 U.S.A.", "fullName": "Daniel Johnson", "givenName": "Daniel", "surname": "Johnson", "__typename": "ArticleAuthorType" }, { "affiliation": "Arkansas State University, Jonesboro, 72467 U.S.A.", "fullName": "Keat Teoh", "givenName": "Keat", "surname": "Teoh", "__typename": "ArticleAuthorType" }, { "affiliation": "Arkansas State University, Jonesboro, 72467 U.S.A.", "fullName": "Cody Ashby", "givenName": "Cody", "surname": "Ashby", "__typename": "ArticleAuthorType" }, { "affiliation": "Arkansas State University, Jonesboro, 72467 U.S.A.", "fullName": "Elizabeth Hood", "givenName": "Elizabeth", "surname": "Hood", "__typename": "ArticleAuthorType" }, { "affiliation": "Arkansas State University, Jonesboro, 72467 U.S.A.", "fullName": "Xiuzhen Huang", "givenName": "Xiuzhen", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "240-245", "year": "2010", "issn": null, "isbn": "978-1-4244-8303-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05703805", "articleId": "12OmNwHhoY2", "__typename": "AdjacentArticleType" }, "next": { "fno": "05703807", "articleId": "12OmNyUWR4V", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcbs/2009/3739/0/3739a211", "title": "GO Semantic Similarity-Based False Positive Reduction of Protein-Protein Interactions", "doi": null, "abstractUrl": "/proceedings-article/ijcbs/2009/3739a211/12OmNBr4eJs", "parentPublication": { "id": "proceedings/ijcbs/2009/3739/0", "title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/2/3736b144", "title": "Feature-Based Causal Structure Discovery in Protein and Gene Expression Data with Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736b144/12OmNC943Lp", "parentPublication": { "id": "proceedings/icnc/2009/3736/2", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999204", "title": "Essential protein identification based on essential protein-protein interaction prediction by integrated edge weights", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999204/12OmNrY3Lxn", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822538", "title": "Network-based analysis of reverse phase protein array data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822538/12OmNxE2n0l", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217626", "title": "Co-expression networks between protein encoding mitochondrial genes and all the remaining genes in human tissues", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217626/12OmNyp9Mii", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2010/4080/1/05571711", "title": "Regulatory Module Network of Basic/Helix-loop-helix Transcription Factors During Bovine Preimplantation Development in vivo", "doi": null, "abstractUrl": "/proceedings-article/icie/2010/05571711/13bd1eTtWYq", "parentPublication": { "id": "proceedings/icie/2010/4080/1", "title": "Information Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/04/06744575", "title": "From Function to Interaction: A New Paradigm for Accurately Predicting Protein Complexes Based on Protein-to-Protein Interaction Networks", "doi": null, "abstractUrl": "/journal/tb/2014/04/06744575/13rRUxDItfM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08636252", "title": "Accurately Detecting Protein Complexes by Graph Embedding and Combining Functions with Interactions", "doi": null, "abstractUrl": "/journal/tb/2020/03/08636252/17D45WrVgcX", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10005261", "title": "Gene Expression Classification for Biomarker Identification in Maize Subjected to Various Biotic Stresses", "doi": null, "abstractUrl": "/journal/tb/5555/01/10005261/1JDoThER3XO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2019/5141/0/514100a127", "title": "Identification of Essential Proteins by Using Complexes and Biological Information on Dynamic PPI Network", "doi": null, "abstractUrl": "/proceedings-article/cbd/2019/514100a127/1fw1NlEyBEI", "parentPublication": { "id": "proceedings/cbd/2019/5141/0", "title": "2019 Seventh International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDSdOB", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJAdXI", "doi": "10.1109/BIBM.2010.5706578", "title": "Concurrent analysis of copy number variations and expression profiles to identify genes associated with tumorigenesis and survival outcome in lung adenocarcinoma", "normalizedTitle": "Concurrent analysis of copy number variations and expression profiles to identify genes associated with tumorigenesis and survival outcome in lung adenocarcinoma", "abstract": "Lung cancer has been one of the major causes of cancer-related death worldwide. To predict survival outcomes of lung cancer patients, many prognosis gene sets were identified by using gene expression microarrays. However, these gene sets were often inconsistent across independent cohorts. To identify genes with more consistency, we combined gene expression and copy number variations (CNVs). Affymetrix SNP 6.0 and u133plus2.0 microarrays were performed on 42 pairs of lung adenocarcinoma patients. The copy number varied regions (CNVR) existed in more than 30% samples were identified and 475 differentially expressed genes with concordant changes were selected for pathway analysis. Thirteen pathways were significantly enriched among the 475 CNV-associated genes, and survival analyses showed these pathways had generally consistent and significant prediction probabilities across three independent microarray studies. Therefore, integration between gene expression and copy number may help to lower false discovery rate and identify genes used to predict survival outcomes.", "abstracts": [ { "abstractType": "Regular", "content": "Lung cancer has been one of the major causes of cancer-related death worldwide. To predict survival outcomes of lung cancer patients, many prognosis gene sets were identified by using gene expression microarrays. However, these gene sets were often inconsistent across independent cohorts. To identify genes with more consistency, we combined gene expression and copy number variations (CNVs). Affymetrix SNP 6.0 and u133plus2.0 microarrays were performed on 42 pairs of lung adenocarcinoma patients. The copy number varied regions (CNVR) existed in more than 30% samples were identified and 475 differentially expressed genes with concordant changes were selected for pathway analysis. Thirteen pathways were significantly enriched among the 475 CNV-associated genes, and survival analyses showed these pathways had generally consistent and significant prediction probabilities across three independent microarray studies. Therefore, integration between gene expression and copy number may help to lower false discovery rate and identify genes used to predict survival outcomes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Lung cancer has been one of the major causes of cancer-related death worldwide. To predict survival outcomes of lung cancer patients, many prognosis gene sets were identified by using gene expression microarrays. However, these gene sets were often inconsistent across independent cohorts. To identify genes with more consistency, we combined gene expression and copy number variations (CNVs). Affymetrix SNP 6.0 and u133plus2.0 microarrays were performed on 42 pairs of lung adenocarcinoma patients. The copy number varied regions (CNVR) existed in more than 30% samples were identified and 475 differentially expressed genes with concordant changes were selected for pathway analysis. Thirteen pathways were significantly enriched among the 475 CNV-associated genes, and survival analyses showed these pathways had generally consistent and significant prediction probabilities across three independent microarray studies. Therefore, integration between gene expression and copy number may help to lower false discovery rate and identify genes used to predict survival outcomes.", "fno": "05706578", "keywords": [ "Bioinformatics", "Cancer", "Genetics", "Lung", "Molecular Biophysics", "Tumours", "Copy Number Variations", "Expression Profiles", "Tumorigenesis", "Survival Outcome", "Lung Adenocarcinoma", "Lung Cancer", "Prognosis Gene Sets", "Gene Expression Microarrays", "Affymetrix SNP 6 0", "U 133 Plus 2 0 Microarrays", "Lungs", "Gene Expression", "Cancer", "Bioinformatics", "Tumors", "Genomics" ], "authors": [ { "affiliation": "Graduate Institute of Biomedical, Electronics and Bioinformatics, National Taiwan University", "fullName": "Tzu-Pin Lu", "givenName": "Tzu-Pin", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate Institute of Physiology, National Taiwan University", "fullName": "Liang-Chuan Lai", "givenName": "Liang-Chuan", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Public Health, Institute of Epidemiology, National Taiwan University", "fullName": "K. Hsiao Chuhsing", "givenName": "K. Hsiao", "surname": "Chuhsing", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Statistics and Informatics Science, Providence University", "fullName": "Pei-Chun Chen", "givenName": "Pei-Chun", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Biotechnology, National Taiwan University", "fullName": "Mong-Hsun Tsai", "givenName": "Mong-Hsun", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate Institute of Biomedical, Electronics and Bioinformatics, National Taiwan University", "fullName": "Y Chuang Eric", "givenName": "Y Chuang", "surname": "Eric", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "284-289", "year": "2010", "issn": null, "isbn": "978-1-4244-8306-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05706577", "articleId": "12OmNyUnEBI", "__typename": "AdjacentArticleType" }, "next": { "fno": "05706579", "articleId": "12OmNxEBz04", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2017/3050/0/08217756", "title": "Comprehensive analysis of pulmonary adenocarcinoma in situ (AIS) revealed new insights into lung cancer progression", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217756/12OmNASILYQ", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a413", "title": "Data-driven Networking Reveals 5-Genes Signature for Early Detection of Lung Cancer", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a413/12OmNsdo6qf", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706613", "title": "Network-based identification of smoking-associated gene signature for lung cancer", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706613/12OmNx3HIaZ", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999301", "title": "Link-based identification of survival time-related biological pathways", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999301/12OmNxWcHjD", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706566", "title": "Utilizing Cox regression model to assess the relations between predefined gene sets and the survival outcome of lung adenocarcinoma", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706566/12OmNzV70vt", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2018/5892/0/08466448", "title": "SBC: A New Strategy for Multiclass Lung Cancer Classification Based on Tumour Structural Information and Microarray Data", "doi": null, "abstractUrl": "/proceedings-article/icis/2018/08466448/13Jkrbn4CUO", "parentPublication": { "id": "proceedings/icis/2018/5892/0", "title": "2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/01/07542557", "title": "A Graphical Model of Smoking-Induced Global Instability in Lung Cancer", "doi": null, "abstractUrl": "/journal/tb/2018/01/07542557/13rRUxASuzb", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08668541", "title": "Gene Expression Classification of Lung Adenocarcinoma into Molecular Subtypes", "doi": null, "abstractUrl": "/journal/tb/2020/04/08668541/1m4ytWax61i", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/03/09266088", "title": "aWCluster: A Novel Integrative Network-Based Clustering of Multiomics for Subtype Analysis of Cancer Data", "doi": null, "abstractUrl": "/journal/tb/2022/03/09266088/1oZxmArWIgg", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09580595", "title": "Fuzzy and Rough Set Theory Based Computational Framework for Mining Genetic Interaction Triplets From Gene Expression Profiles for Lung Adenocarcinoma", "doi": null, "abstractUrl": "/journal/tb/2022/06/09580595/1xPnYe4Peus", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAXxWQv", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNz4SOsZ", "doi": "10.1109/BIBM.2016.7822526", "title": "Just-in-time expression of influential genes in the cellular networks of the malaria parasite Plasmodium falciparum during the red blood cycle", "normalizedTitle": "Just-in-time expression of influential genes in the cellular networks of the malaria parasite Plasmodium falciparum during the red blood cycle", "abstract": "Malaria remains one of the most important public health concerns worldwide. It causes nearly half a million deaths every year, and about 40% of the world's population lives in the endemic regions of malaria. A major hurdle in antimalarial development is our limited understanding of the dynamic cellular networks in the malaria parasite. In this study, by coupling RNA-Seq analysis and network mining using a PageRank-based algorithm, we investigated the temporal-specific expression of parasite genes during the 48-hour red blood cycle, and identified genes that may play influential roles in parasite development and invasion. The just-in-time mechanism for gene expression may contribute to a dynamic yet effective adaptive strategy of the malaria parasite.", "abstracts": [ { "abstractType": "Regular", "content": "Malaria remains one of the most important public health concerns worldwide. It causes nearly half a million deaths every year, and about 40% of the world's population lives in the endemic regions of malaria. A major hurdle in antimalarial development is our limited understanding of the dynamic cellular networks in the malaria parasite. In this study, by coupling RNA-Seq analysis and network mining using a PageRank-based algorithm, we investigated the temporal-specific expression of parasite genes during the 48-hour red blood cycle, and identified genes that may play influential roles in parasite development and invasion. The just-in-time mechanism for gene expression may contribute to a dynamic yet effective adaptive strategy of the malaria parasite.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Malaria remains one of the most important public health concerns worldwide. It causes nearly half a million deaths every year, and about 40% of the world's population lives in the endemic regions of malaria. A major hurdle in antimalarial development is our limited understanding of the dynamic cellular networks in the malaria parasite. In this study, by coupling RNA-Seq analysis and network mining using a PageRank-based algorithm, we investigated the temporal-specific expression of parasite genes during the 48-hour red blood cycle, and identified genes that may play influential roles in parasite development and invasion. The just-in-time mechanism for gene expression may contribute to a dynamic yet effective adaptive strategy of the malaria parasite.", "fno": "07822526", "keywords": [ "Proteins", "Diseases", "DNA", "Bioinformatics", "Algorithm Design And Analysis", "Gene Expression", "Plasmodium Falciparum", "Malaria", "Development Cycle", "RNA Seq", "Page Rank", "Systems Biology" ], "authors": [ { "affiliation": "Department of Computer Science, University of Texas at San Antonio, 78249, USA", "fullName": "Xinran Yu", "givenName": "Xinran", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, University of Texas at San Antonio, 78249, USA", "fullName": "Hao Zhang", "givenName": "Hao", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Novozymes NA Inc., Durham, NC 27709, USA", "fullName": "Timothy G. Lilburn", "givenName": "Timothy G.", "surname": "Lilburn", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, University of Texas at San Antonio, 78249, USA", "fullName": "Hong Cai", "givenName": "Hong", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, College of Staten Island, City University of New York, 10314, USA", "fullName": "Jianying Gu", "givenName": "Jianying", "surname": "Gu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Texas at San Antonio, 78249, USA", "fullName": "Turgay Korkmaz", "givenName": "Turgay", "surname": "Korkmaz", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, University of Texas at San Antonio, 78249, USA", "fullName": "Yufeng Wang", "givenName": "Yufeng", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "248-253", "year": "2016", "issn": null, "isbn": "978-1-5090-1611-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07822525", "articleId": "12OmNyugz3d", "__typename": "AdjacentArticleType" }, "next": { "fno": "07822527", "articleId": "12OmNx7ov5m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcbs/2009/3739/0/3739a230", "title": "Putative Cell Cycle Related Genes in Plasmodium Falciparum", "doi": null, "abstractUrl": "/proceedings-article/ijcbs/2009/3739a230/12OmNApcuup", "parentPublication": { "id": "proceedings/ijcbs/2009/3739/0", "title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2017/4722/0/4722a001", "title": "Malaria Parasite Detection and Species Identification on Thin Blood Smears Using a Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/chase/2017/4722a001/12OmNBI6acv", "parentPublication": { "id": "proceedings/chase/2017/4722/0", "title": "2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732711", "title": "Network analysis reveals complex interactions in heat shock response in the malaria parasite", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732711/12OmNBW0vzH", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217986", "title": "Object detection technique for malaria parasite in thin blood smear images", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217986/12OmNvnfkbd", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217947", "title": "Metabolic pathway and graph identification of new potential drug targets for Plasmodium Falciparum", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217947/12OmNwpGgLn", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120453", "title": "Deconvolution of Microarray Data Predicts Transcriptionally Regulated Protein Kinases of Plasmodium falciparum", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120453/12OmNxuo0jo", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999189", "title": "An integrative network-driven pipeline for the prioritization of Alzheimer's disease genes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999189/12OmNyL0TNY", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999137", "title": "Heavy path mining reveals novel protein-protein associations in the malaria parasite plasmodium falciparum", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999137/12OmNzTH13j", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccs/2021/9445/0/944500a167", "title": "Stacked Ensemble Deep Learning Technique to Detect Malaria Parasite in Blood Smear", "doi": null, "abstractUrl": "/proceedings-article/iccs/2021/944500a167/1DSyDoaT9de", "parentPublication": { "id": "proceedings/iccs/2021/9445/0", "title": "2021 International Conference on Computing Sciences (ICCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09204826", "title": "Scalable Non-Linear Graph Fusion for Prioritizing Cancer-Causing Genes", "doi": null, "abstractUrl": "/journal/tb/2022/02/09204826/1nmdLbsdXoc", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVT", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNAle6nQ", "doi": "10.1109/CVPR.2014.35", "title": "Visual Persuasion: Inferring Communicative Intents of Images", "normalizedTitle": "Visual Persuasion: Inferring Communicative Intents of Images", "abstract": "In this paper we introduce the novel problem of understanding visual persuasion. Modern mass media make extensive use of images to persuade people to make commercial and political decisions. These effects and techniques are widely studied in the social sciences, but behavioral studies do not scale to massive datasets. Computer vision has made great strides in building syntactical representations of images, such as detection and identification of objects. However, the pervasive use of images for communicative purposes has been largely ignored. We extend the significant advances in syntactic analysis in computer vision to the higher-level challenge of understanding the underlying communicative intent implied in images. We begin by identifying nine dimensions of persuasive intent latent in images of politicians, such as \"socially dominant, \" \"energetic, \" and \"trustworthy, \" and propose a hierarchical model that builds on the layer of syntactical attributes, such as \"smile\" and \"waving hand, \" to predict the intents presented in the images. To facilitate progress, we introduce a new dataset of 1, 124 images of politicians labeled with ground-truth intents in the form of rankings. This study demonstrates that a systematic focus on visual persuasion opens up the field of computer vision to a new class of investigations around mediated images, intersecting with media analysis, psychology, and political communication.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we introduce the novel problem of understanding visual persuasion. Modern mass media make extensive use of images to persuade people to make commercial and political decisions. These effects and techniques are widely studied in the social sciences, but behavioral studies do not scale to massive datasets. Computer vision has made great strides in building syntactical representations of images, such as detection and identification of objects. However, the pervasive use of images for communicative purposes has been largely ignored. We extend the significant advances in syntactic analysis in computer vision to the higher-level challenge of understanding the underlying communicative intent implied in images. We begin by identifying nine dimensions of persuasive intent latent in images of politicians, such as \"socially dominant, \" \"energetic, \" and \"trustworthy, \" and propose a hierarchical model that builds on the layer of syntactical attributes, such as \"smile\" and \"waving hand, \" to predict the intents presented in the images. To facilitate progress, we introduce a new dataset of 1, 124 images of politicians labeled with ground-truth intents in the form of rankings. This study demonstrates that a systematic focus on visual persuasion opens up the field of computer vision to a new class of investigations around mediated images, intersecting with media analysis, psychology, and political communication.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we introduce the novel problem of understanding visual persuasion. Modern mass media make extensive use of images to persuade people to make commercial and political decisions. These effects and techniques are widely studied in the social sciences, but behavioral studies do not scale to massive datasets. Computer vision has made great strides in building syntactical representations of images, such as detection and identification of objects. However, the pervasive use of images for communicative purposes has been largely ignored. We extend the significant advances in syntactic analysis in computer vision to the higher-level challenge of understanding the underlying communicative intent implied in images. We begin by identifying nine dimensions of persuasive intent latent in images of politicians, such as \"socially dominant, \" \"energetic, \" and \"trustworthy, \" and propose a hierarchical model that builds on the layer of syntactical attributes, such as \"smile\" and \"waving hand, \" to predict the intents presented in the images. To facilitate progress, we introduce a new dataset of 1, 124 images of politicians labeled with ground-truth intents in the form of rankings. This study demonstrates that a systematic focus on visual persuasion opens up the field of computer vision to a new class of investigations around mediated images, intersecting with media analysis, psychology, and political communication.", "fno": "5118a216", "keywords": [ "Visualization", "Media", "Context", "Computer Vision", "Face", "Syntactics", "Correlation", "Media Application", "Visual Persuasion", "Communicative Intents", "Human Attributes", "Visual Sentiment Analysis" ], "authors": [ { "affiliation": null, "fullName": "Jungseock Joo", "givenName": "Jungseock", "surname": "Joo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Weixin Li", "givenName": "Weixin", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Francis F. Steen", "givenName": "Francis F.", "surname": "Steen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Song-Chun Zhu", "givenName": "Song-Chun", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "216-223", "year": "2014", "issn": "1063-6919", "isbn": "978-1-4799-5118-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5118a208", "articleId": "12OmNxT56C7", "__typename": "AdjacentArticleType" }, "next": { "fno": "5118a224", "articleId": "12OmNCcbEld", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2013/0015/0/06607537", "title": "Using emotional noise to uncloud audio-visual emotion perceptual evaluation", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607537/12OmNCuDzsI", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437a778", "title": "Inferring Visual Persuasion via Body Language, Setting, and Deep Features", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437a778/12OmNwErpQo", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c855", "title": "Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c855/12OmNwdbVaL", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113330", "title": "Persuasion and Social Contagion", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113330/12OmNxEjYa1", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2015/7079/0/07169801", "title": "Towards the verification of image integrity in online news", "doi": null, "abstractUrl": "/proceedings-article/icmew/2015/07169801/12OmNzfXatS", "parentPublication": { "id": "proceedings/icmew/2015/7079/0", "title": "2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2021/3176/0/09667020", "title": "Local Feature Enhancement Network for Set-based Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2021/09667020/1A6BsbdY8MM", "parentPublication": { "id": "proceedings/fg/2021/3176/0", "title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SVr", "title": "Groupware, International Workshop on", "acronym": "criwg", "groupId": "1000311", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNC2xhFT", "doi": "10.1109/CRIWG.2000.885173", "title": "Interaction in Networked Virtual Environments as Communicative Action: Social Theory and Multi-Player Games", "normalizedTitle": "Interaction in Networked Virtual Environments as Communicative Action: Social Theory and Multi-Player Games", "abstract": "The ambiguous and highly subjective meanings assigned to the word \"interaction\" makes it difficult for researchers and practitioners, who work in the area of virtual environments and applications, to communicate and join their research efforts. The aim of this work is to provide more understanding on the interaction occurring inside networked virtual environments (Net-VE) by analysing the communicative and social aspects of computer-mediated interaction in multi-player games. The work is conducted using conceptual analysis by applying communicative action theory as a scientific framework. The main contribution of this work is the proposed interaction taxonomy which is analysed in the light of social theory. The successful application of social theory framework as a tool to analyse interaction indicates the importance of joining the research effort of various disciplines in order to achieve better results in the area of Net-VE interactions.", "abstracts": [ { "abstractType": "Regular", "content": "The ambiguous and highly subjective meanings assigned to the word \"interaction\" makes it difficult for researchers and practitioners, who work in the area of virtual environments and applications, to communicate and join their research efforts. The aim of this work is to provide more understanding on the interaction occurring inside networked virtual environments (Net-VE) by analysing the communicative and social aspects of computer-mediated interaction in multi-player games. The work is conducted using conceptual analysis by applying communicative action theory as a scientific framework. The main contribution of this work is the proposed interaction taxonomy which is analysed in the light of social theory. The successful application of social theory framework as a tool to analyse interaction indicates the importance of joining the research effort of various disciplines in order to achieve better results in the area of Net-VE interactions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ambiguous and highly subjective meanings assigned to the word \"interaction\" makes it difficult for researchers and practitioners, who work in the area of virtual environments and applications, to communicate and join their research efforts. The aim of this work is to provide more understanding on the interaction occurring inside networked virtual environments (Net-VE) by analysing the communicative and social aspects of computer-mediated interaction in multi-player games. The work is conducted using conceptual analysis by applying communicative action theory as a scientific framework. The main contribution of this work is the proposed interaction taxonomy which is analysed in the light of social theory. The successful application of social theory framework as a tool to analyse interaction indicates the importance of joining the research effort of various disciplines in order to achieve better results in the area of Net-VE interactions.", "fno": "08280154", "keywords": [ "Virtual Reality Networked Virtual Environments Communicative Action Social Theory Multi Player Games Virtual Environments Computer Mediated Interaction Interaction Taxonomy" ], "authors": [ { "affiliation": "Dept. of Inf. Process. Sci., Oulu Univ., Finland", "fullName": "T. Manninen", "givenName": "T.", "surname": "Manninen", "__typename": "ArticleAuthorType" } ], "idPrefix": "criwg", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "154", "year": "2000", "issn": null, "isbn": "0-7695-0828-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08280150", "articleId": "12OmNzcPA8w", "__typename": "AdjacentArticleType" }, "next": { "fno": "08280158", "articleId": "12OmNxH9Xap", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiqx", "title": "2018 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "acronym": "icsme", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WcjjQx", "doi": "10.1109/ICSME.2018.00061", "title": "Communicative Intention in Code Review Questions", "normalizedTitle": "Communicative Intention in Code Review Questions", "abstract": "During code review, developers request clarifications, suggest improvements, or ask for explanations about the rationale behind the implementation choices. We envision the emergence of tools to support developers during code review based on the automatic analysis of the argumentation structure and communicative intentions conveyed by developers' comments. As a preliminary step towards this goal, we conducted an exploratory case study by manually classifying 499 questions extracted from 399 Android code reviews to understand the real communicative intentions they convey. We observed that the majority of questions actually serve information seeking goals. Still, they represent less than half of the annotated sample, with other questions being used to serve a wider variety of developers' communication goals, including suggestions, request for action, and criticism. Based on our findings we formulate hypotheses on communicative intentions in code reviews that should be confirmed or rejected by follow-up studies.", "abstracts": [ { "abstractType": "Regular", "content": "During code review, developers request clarifications, suggest improvements, or ask for explanations about the rationale behind the implementation choices. We envision the emergence of tools to support developers during code review based on the automatic analysis of the argumentation structure and communicative intentions conveyed by developers' comments. As a preliminary step towards this goal, we conducted an exploratory case study by manually classifying 499 questions extracted from 399 Android code reviews to understand the real communicative intentions they convey. We observed that the majority of questions actually serve information seeking goals. Still, they represent less than half of the annotated sample, with other questions being used to serve a wider variety of developers' communication goals, including suggestions, request for action, and criticism. Based on our findings we formulate hypotheses on communicative intentions in code reviews that should be confirmed or rejected by follow-up studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "During code review, developers request clarifications, suggest improvements, or ask for explanations about the rationale behind the implementation choices. We envision the emergence of tools to support developers during code review based on the automatic analysis of the argumentation structure and communicative intentions conveyed by developers' comments. As a preliminary step towards this goal, we conducted an exploratory case study by manually classifying 499 questions extracted from 399 Android code reviews to understand the real communicative intentions they convey. We observed that the majority of questions actually serve information seeking goals. Still, they represent less than half of the annotated sample, with other questions being used to serve a wider variety of developers' communication goals, including suggestions, request for action, and criticism. Based on our findings we formulate hypotheses on communicative intentions in code reviews that should be confirmed or rejected by follow-up studies.", "fno": "787000a519", "keywords": [ "Android Operating System", "Interactive Systems", "Internet", "Program Diagnostics", "Communicative Intention", "Code Review Questions", "Developers Request", "Android Code Reviews", "Labeling", "Manuals", "Software", "Tools", "Data Mining", "Guidelines", "Message Systems", "Questions Communicative Intention Code Reviews Exploratory Case Study Android" ], "authors": [ { "affiliation": null, "fullName": "Felipe Ebert", "givenName": "Felipe", "surname": "Ebert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fernando Castor", "givenName": "Fernando", "surname": "Castor", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nicole Novielli", "givenName": "Nicole", "surname": "Novielli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexander Serebrenik", "givenName": "Alexander", "surname": "Serebrenik", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-09-01T00:00:00", "pubType": "proceedings", "pages": "519-523", "year": "2018", "issn": null, "isbn": "978-1-5386-7870-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "787000a508", "articleId": "17D45WaTkbx", "__typename": "AdjacentArticleType" }, "next": { "fno": "787000a524", "articleId": "17D45XdBRRG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsecompanion/2007/2892/0/28920057", "title": "SCL: Static Enforcement and Exploration of Developer Intent in Source Code", "doi": null, "abstractUrl": "/proceedings-article/icsecompanion/2007/28920057/12OmNqGA55p", "parentPublication": { "id": "proceedings/icsecompanion/2007/2892/0", "title": "29th International Conference on Software Engineering (ICSE'07 Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/5725/0/572501a029", "title": "Code Review for Newcomers: Is It Different?", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/572501a029/13bd1rsER1f", "parentPublication": { "id": "proceedings/chase/2018/5725/0", "title": "2018 IEEE/ACM 11th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103453", "title": "Refactoring-aware code review", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103453/17D45XvMccN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsc/2019/1805/0/08665852", "title": "Mining Source Code Improvement Patterns from Similar Code Review Works", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2019/08665852/18qbZfRrIVG", "parentPublication": { "id": "proceedings/iwsc/2019/1805/0", "title": "2019 IEEE 13th International Workshop on Software Clones (IWSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2019/0869/0/086900a831", "title": "Intention-Based Integration of Software Variants", "doi": null, "abstractUrl": "/proceedings-article/icse/2019/086900a831/1cMFuYMZO6I", "parentPublication": { "id": "proceedings/icse/2019/0869/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2019/3412/0/341200a479", "title": "Can Issues Reported at Stack Overflow Questions be Reproduced? An Exploratory Study", "doi": null, "abstractUrl": "/proceedings-article/msr/2019/341200a479/1dx9zZsAMsU", "parentPublication": { "id": "proceedings/msr/2019/3412/0", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/secdev/2020/8388/0/838800a031", "title": "A Secure Code Review Retrospective", "doi": null, "abstractUrl": "/proceedings-article/secdev/2020/838800a031/1o6LpotTB6w", "parentPublication": { "id": "proceedings/secdev/2020/8388/0", "title": "2020 IEEE Secure Development (SecDev)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2020/9248/0/924800a043", "title": "Does code review really remove coding convention violations?", "doi": null, "abstractUrl": "/proceedings-article/scam/2020/924800a043/1oFGZ4NOD0A", "parentPublication": { "id": "proceedings/scam/2020/9248/0", "title": "2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600a163", "title": "Towards Automating Code Review Activities", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600a163/1sEXnD1saKA", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2021/4897/0/489700a153", "title": "What Do Developers Discuss about Code Comments?", "doi": null, "abstractUrl": "/proceedings-article/scam/2021/489700a153/1yNiLbGQRAk", "parentPublication": { "id": "proceedings/scam/2021/4897/0", "title": "2021 IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCfAPCc", "title": "2012 16th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvSKO2M", "doi": "10.1109/IV.2012.65", "title": "Data Visualization in Online Journalism and Its Implications for the Production Process", "normalizedTitle": "Data Visualization in Online Journalism and Its Implications for the Production Process", "abstract": "Data stories -- this buzzword links together two different disciplines: computer science and journalism. The new relationship is called data-driven journalism. The emerging product of this relationship: data-based visualization that reveals the story behind the data. However, who produces those \"data stories\"? A journalist, an information designer, a computer scientist, or a team? New formats often implicate new workflows and a new way of thinking. This paper sets data visualization in the context of online journalism by focusing on the production process. We interviewed 19 experts of German, Swiss, and American media companies: designers, programmers, and journalists. For the analysis of the interviews we used the grounded theory approach. The findings show: The crucial success factor in the production process of data-based visualization in journalism is the attitude that everyone in the team acts as a journalist -- no matter whether programmer, designer or statistician. A case study of the New York Times newsroom illustrates our findings.", "abstracts": [ { "abstractType": "Regular", "content": "Data stories -- this buzzword links together two different disciplines: computer science and journalism. The new relationship is called data-driven journalism. The emerging product of this relationship: data-based visualization that reveals the story behind the data. However, who produces those \"data stories\"? A journalist, an information designer, a computer scientist, or a team? New formats often implicate new workflows and a new way of thinking. This paper sets data visualization in the context of online journalism by focusing on the production process. We interviewed 19 experts of German, Swiss, and American media companies: designers, programmers, and journalists. For the analysis of the interviews we used the grounded theory approach. The findings show: The crucial success factor in the production process of data-based visualization in journalism is the attitude that everyone in the team acts as a journalist -- no matter whether programmer, designer or statistician. A case study of the New York Times newsroom illustrates our findings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data stories -- this buzzword links together two different disciplines: computer science and journalism. The new relationship is called data-driven journalism. The emerging product of this relationship: data-based visualization that reveals the story behind the data. However, who produces those \"data stories\"? A journalist, an information designer, a computer scientist, or a team? New formats often implicate new workflows and a new way of thinking. This paper sets data visualization in the context of online journalism by focusing on the production process. We interviewed 19 experts of German, Swiss, and American media companies: designers, programmers, and journalists. For the analysis of the interviews we used the grounded theory approach. The findings show: The crucial success factor in the production process of data-based visualization in journalism is the attitude that everyone in the team acts as a journalist -- no matter whether programmer, designer or statistician. A case study of the New York Times newsroom illustrates our findings.", "fno": "4771a349", "keywords": [ "Storyboard", "Data Visualization", "Interactive Information Graphic", "Data Driven Journalism", "Online Journalism", "Attitude", "Collaboration", "Sketching" ], "authors": [ { "affiliation": null, "fullName": "Wibke Weber", "givenName": "Wibke", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hannes Rall", "givenName": "Hannes", "surname": "Rall", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "349-356", "year": "2012", "issn": "1550-6037", "isbn": "978-1-4673-2260-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4771a343", "articleId": "12OmNyuya5h", "__typename": "AdjacentArticleType" }, "next": { "fno": "4771a357", "articleId": "12OmNz2C1lQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2010/06/ttg2010061139", "title": "Narrative Visualization: Telling Stories with Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061139/13rRUxAAST1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a401", "title": "Scrollytelling – An Analysis of Visual Storytelling in Online Journalism", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a401/17D45XfSETg", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a303", "title": "Feature Extraction of the Information Clues in the Data Journalism", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a303/1H2pqD3KR9u", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068697", "title": "MOGPlay: A Decentralized Crowd Journalism Application for Democratic News Production", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068697/1LKwZWJt1NS", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933773", "title": "Thumbnails for Data Stories: A Survey of Current Practices", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933773/1fTgFlSnH8s", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940357", "title": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940357/1gjRQ76uXNC", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09229515", "title": "Table Scraps: An Actionable Framework for Multi-Table Data Wrangling From An Artifact Study of Computational Journalism", "doi": null, "abstractUrl": "/journal/tg/2021/02/09229515/1o3nxS8lm7u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a723", "title": "Visual Storytelling by Novelette", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a723/1rSR8Q1xWFy", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552240", "title": "Kineticharts: Augmenting Affective Expressiveness of Charts in Data Stories with Animation Design", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552240/1xic12y0QJG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a186", "title": "Text Visualization and Close Reading for Journalism with Storifier", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a186/1yXu8QMz7iw", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisI", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "acronym": "iisa", "groupId": "1802852", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WaTkk3", "doi": "10.1109/IISA.2018.8633593", "title": "Creative Information Exploration in Journalism", "normalizedTitle": "Creative Information Exploration in Journalism", "abstract": "Existing digital tools used by journalists such as content management systems and search engines focus on helping journalists find relevant information and organize their creative work; they do not provide support for discovering creative angles to investigate. To meet this need in journalism, we have researched new creative search algorithms that manipulate the journalist's primary medium - written information - and developed an innovative creativity and productivity support tool deliberately for use by journalists. In this paper, we analyse the creative tasks journalists perform when developing new stories, we provide an overview of requirements, which have been addressed by the INJECT digital creativity support tool for journalists. Further, we explain the intended use of the system using a walkthrough scenario and present our early experiences from deploying the tool in journalist's working environments.", "abstracts": [ { "abstractType": "Regular", "content": "Existing digital tools used by journalists such as content management systems and search engines focus on helping journalists find relevant information and organize their creative work; they do not provide support for discovering creative angles to investigate. To meet this need in journalism, we have researched new creative search algorithms that manipulate the journalist's primary medium - written information - and developed an innovative creativity and productivity support tool deliberately for use by journalists. In this paper, we analyse the creative tasks journalists perform when developing new stories, we provide an overview of requirements, which have been addressed by the INJECT digital creativity support tool for journalists. Further, we explain the intended use of the system using a walkthrough scenario and present our early experiences from deploying the tool in journalist's working environments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Existing digital tools used by journalists such as content management systems and search engines focus on helping journalists find relevant information and organize their creative work; they do not provide support for discovering creative angles to investigate. To meet this need in journalism, we have researched new creative search algorithms that manipulate the journalist's primary medium - written information - and developed an innovative creativity and productivity support tool deliberately for use by journalists. In this paper, we analyse the creative tasks journalists perform when developing new stories, we provide an overview of requirements, which have been addressed by the INJECT digital creativity support tool for journalists. Further, we explain the intended use of the system using a walkthrough scenario and present our early experiences from deploying the tool in journalist's working environments.", "fno": "08633593", "keywords": [ "Content Management", "Journalism", "Search Engines", "Innovative Creativity", "Productivity Support Tool", "Creative Tasks Journalists", "INJECT Digital Creativity Support Tool", "Creative Information Exploration", "Content Management Systems", "Search Engines", "Creative Search Algorithms", "Journalists Primary Medium", "Creativity", "Tools", "Social Networking Online", "Productivity", "Google", "Task Analysis", "Data Visualization", "Creativity", "Journalism", "Creative Search" ], "authors": [ { "affiliation": "City, University of London, CASS Business School, UK", "fullName": "Konstantions Zachos", "givenName": "Konstantions", "surname": "Zachos", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Informatics, University of Piraeus, Piraeus, Greece", "fullName": "Dimitris Apostolou", "givenName": "Dimitris", "surname": "Apostolou", "__typename": "ArticleAuthorType" }, { "affiliation": "National Technical University of Athens (NTUA), Institute of Communication and Computer Systems (ICCS), Athens, Greece", "fullName": "Fotis Paraskevopoulos", "givenName": "Fotis", "surname": "Paraskevopoulos", "__typename": "ArticleAuthorType" }, { "affiliation": "National Technical University of Athens (NTUA), Institute of Communication and Computer Systems (ICCS), Athens, Greece", "fullName": "Stergios Ientsek", "givenName": "Stergios", "surname": "Ientsek", "__typename": "ArticleAuthorType" }, { "affiliation": "City, University of London, CASS Business School, UK", "fullName": "Neil Maiden", "givenName": "Neil", "surname": "Maiden", "__typename": "ArticleAuthorType" }, { "affiliation": "City, University of London, CASS Business School, UK", "fullName": "Amanda Brown", "givenName": "Amanda", "surname": "Brown", "__typename": "ArticleAuthorType" }, { "affiliation": "National Technical University of Athens (NTUA), Institute of Communication and Computer Systems (ICCS), Athens, Greece", "fullName": "Gregoris Mentzas", "givenName": "Gregoris", "surname": "Mentzas", "__typename": "ArticleAuthorType" } ], "idPrefix": "iisa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2018", "issn": null, "isbn": "978-1-5386-8161-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08633663", "articleId": "17D45VtKiu9", "__typename": "AdjacentArticleType" }, "next": { "fno": "08633680", "articleId": "17D45VsBU3J", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2006/2507/2/250720046c", "title": "Towards Creative Environments: Conclusions from Creative Space", "doi": null, "abstractUrl": "/proceedings-article/hicss/2006/250720046c/12OmNAXxXg2", "parentPublication": { "id": "proceedings/hicss/2006/2507/2", "title": "Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcgin/2011/4464/0/4464a079", "title": "Management Strategies of Creative Industries Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/bcgin/2011/4464a079/12OmNApcuw1", "parentPublication": { "id": "proceedings/bcgin/2011/4464/0", "title": "2011 International Conference on Business Computing and Global Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a166", "title": "Connectivism as a Framework for Creative Productivity in Instructional Technology", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a166/12OmNBInLmB", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a469", "title": "A Creative Computing Based Inspiration Assistant to Poem Generation", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a469/12OmNBWi6MX", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2008/3163/0/3163a283", "title": "Distributed Creative Problem Solving over the Web", "doi": null, "abstractUrl": "/proceedings-article/iciw/2008/3163a283/12OmNvwC5vY", "parentPublication": { "id": "proceedings/iciw/2008/3163/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2016/2253/0/2253a297", "title": "An Approach to Constructing a General Framework for Creative Computing: Incorporating Semantic Web", "doi": null, "abstractUrl": "/proceedings-article/sose/2016/2253a297/12OmNwHQBds", "parentPublication": { "id": "proceedings/sose/2016/2253/0", "title": "2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907529", "title": "Ontology to Represent the Knowledge Domain of a Creative Workshop", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907529/12OmNyOq4QV", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2002/1435/8/14350221b", "title": "Toward an Understanding of Creative Solution Generation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2002/14350221b/12OmNyuPLfX", "parentPublication": { "id": "proceedings/hicss/2002/1435/8", "title": "Proceedings of the 35th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgec/2010/4281/0/4281a138", "title": "Towards Creative Case Based Reasoning", "doi": null, "abstractUrl": "/proceedings-article/icgec/2010/4281a138/12OmNzb7ZiD", "parentPublication": { "id": "proceedings/icgec/2010/4281/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2021/6834/0/683400a628", "title": "Process-oriented Creative Thinking Education Model: the Perspective of Six-thinking-hats Based on T-test", "doi": null, "abstractUrl": "/proceedings-article/icekim/2021/683400a628/1vmLJJEozHG", "parentPublication": { "id": "proceedings/icekim/2021/6834/0", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir9", "title": "2018 22nd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XfSETg", "doi": "10.1109/iV.2018.00075", "title": "Scrollytelling – An Analysis of Visual Storytelling in Online Journalism", "normalizedTitle": "Scrollytelling – An Analysis of Visual Storytelling in Online Journalism", "abstract": "Scrollytelling - the long-form of articles used in journalism - uses long, narrative types of text (e.g., report, feature) to tell complex stories. Scrollytelling articles published online often use multimedia content, especially information graphics which is a powerful tool to communicate complex information. This study investigates which types of infographics are used for visualizing complex data in long-form journalism published online. The analysis focusses on the utilization of infographics in scrollytelling and how infographics are integrated in long-form articles.", "abstracts": [ { "abstractType": "Regular", "content": "Scrollytelling - the long-form of articles used in journalism - uses long, narrative types of text (e.g., report, feature) to tell complex stories. Scrollytelling articles published online often use multimedia content, especially information graphics which is a powerful tool to communicate complex information. This study investigates which types of infographics are used for visualizing complex data in long-form journalism published online. The analysis focusses on the utilization of infographics in scrollytelling and how infographics are integrated in long-form articles.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scrollytelling - the long-form of articles used in journalism - uses long, narrative types of text (e.g., report, feature) to tell complex stories. Scrollytelling articles published online often use multimedia content, especially information graphics which is a powerful tool to communicate complex information. This study investigates which types of infographics are used for visualizing complex data in long-form journalism published online. The analysis focusses on the utilization of infographics in scrollytelling and how infographics are integrated in long-form articles.", "fno": "720200a401", "keywords": [ "Data Visualisation", "Electronic Publishing", "Internet", "Journalism", "Multimedia Computing", "Narrative Types", "Scrollytelling Articles", "Multimedia Content", "Information Graphics", "Infographics", "Long Form Journalism", "Long Form Articles", "Visual Storytelling", "Online Journalism", "Complex Data Visualization", "Visualization", "Media", "Streaming Media", "Data Visualization", "Standards", "Navigation", "Scrollytelling Storytelling Infographics Information Visualization Online Journalism Online Newspaper" ], "authors": [ { "affiliation": null, "fullName": "Doris Seyser", "givenName": "Doris", "surname": "Seyser", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael Zeiller", "givenName": "Michael", "surname": "Zeiller", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "401-406", "year": "2018", "issn": null, "isbn": "978-1-5386-7202-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720200a396", "articleId": "17D45WUj8ZT", "__typename": "AdjacentArticleType" }, "next": { "fno": "720200a407", "articleId": "17D45WK5AlJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsme/2014/6146/0/6146a416", "title": "Visual Storytelling of Development Sessions", "doi": null, "abstractUrl": "/proceedings-article/icsme/2014/6146a416/12OmNBIFmvV", "parentPublication": { "id": "proceedings/icsme/2014/6146/0", "title": "2014 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a349", "title": "Data Visualization in Online Journalism and Its Implications for the Production Process", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a349/12OmNvSKO2M", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a176", "title": "Acceptance and Usability of Interactive Infographics in Online Newspapers", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a176/12OmNx8fihf", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b543", "title": "Tracing Emergent Structure in Self-Organized Citizen Journalism", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b543/12OmNyQ7FDt", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2017/11/07887755", "title": "Video Liveness for Citizen Journalism: Attacks and Defenses", "doi": null, "abstractUrl": "/journal/tm/2017/11/07887755/13rRUB7a11L", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2018/7616/0/761600a130", "title": "The Impacts of Subtitles on 360-Degree Video Journalism Watching", "doi": null, "abstractUrl": "/proceedings-article/icime/2018/761600a130/17D45VsBU1i", "parentPublication": { "id": "proceedings/icime/2018/7616/0", "title": "2018 International Joint Conference on Information, Media and Engineering (ICIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10054065", "title": "Attitudinal effects of data visualizations and illustrations in data stories", "doi": null, "abstractUrl": "/journal/tg/5555/01/10054065/1L6HPm1LYZO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a056", "title": "Automatic Infogram Generation for Online Journalism", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a056/1cMFaoRMwYE", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940357", "title": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940357/1gjRQ76uXNC", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a723", "title": "Visual Storytelling by Novelette", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a723/1rSR8Q1xWFy", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H2petWxAqI", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "acronym": "cost", "groupId": "1847867", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H2pqD3KR9u", "doi": "10.1109/CoST57098.2022.00069", "title": "Feature Extraction of the Information Clues in the Data Journalism", "normalizedTitle": "Feature Extraction of the Information Clues in the Data Journalism", "abstract": "Nowadays, data journalism was becoming more and more complex in the fields of visual presentation, and which design strategies should be adopted to improve users’ reading efficiency was of great importance for data journalism producer. The purpose of this research was to extract the features of information clues that have a direct impact on the users’ visual perception and information foraging behavior, and use these features to describe the impact of the information clues. First, respondents were interviewed on the basis of understanding of the research material, and then use thematic analysis method to encode, so as to extract the features of the information clues in the data journalism. The results showed that the information clues in the data journalism can be divided into “structural features” and “semantic features” and different types of information clues can affect users’ information foraging behavior at different levels as a whole. Our findings provide a new perspective for the pattern classification and recognition of the information clues in the data journalism and refine the explanation of users’ news reading behavior mechanism.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, data journalism was becoming more and more complex in the fields of visual presentation, and which design strategies should be adopted to improve users’ reading efficiency was of great importance for data journalism producer. The purpose of this research was to extract the features of information clues that have a direct impact on the users’ visual perception and information foraging behavior, and use these features to describe the impact of the information clues. First, respondents were interviewed on the basis of understanding of the research material, and then use thematic analysis method to encode, so as to extract the features of the information clues in the data journalism. The results showed that the information clues in the data journalism can be divided into “structural features” and “semantic features” and different types of information clues can affect users’ information foraging behavior at different levels as a whole. Our findings provide a new perspective for the pattern classification and recognition of the information clues in the data journalism and refine the explanation of users’ news reading behavior mechanism.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, data journalism was becoming more and more complex in the fields of visual presentation, and which design strategies should be adopted to improve users’ reading efficiency was of great importance for data journalism producer. The purpose of this research was to extract the features of information clues that have a direct impact on the users’ visual perception and information foraging behavior, and use these features to describe the impact of the information clues. First, respondents were interviewed on the basis of understanding of the research material, and then use thematic analysis method to encode, so as to extract the features of the information clues in the data journalism. The results showed that the information clues in the data journalism can be divided into “structural features” and “semantic features” and different types of information clues can affect users’ information foraging behavior at different levels as a whole. Our findings provide a new perspective for the pattern classification and recognition of the information clues in the data journalism and refine the explanation of users’ news reading behavior mechanism.", "fno": "624800a303", "keywords": [ "Feature Extraction", "Information Retrieval", "Internet", "Pattern Classification", "Information Clues", "Users", "Feature Extraction", "Data Journalism Producer", "Visualization", "Costs", "Semantics", "Pattern Classification", "Journalism", "Feature Extraction", "Behavioral Sciences", "Data Journalism", "Information Clues", "Thematic Analysis" ], "authors": [ { "affiliation": "Wuhan University,School of Journalism and Communicaiton,Wuhan,China,430072", "fullName": "Siheng Cao", "givenName": "Siheng", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University,School of Journalism and Communicaiton,Wuhan,China,430072", "fullName": "Liqun Liu", "givenName": "Liqun", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University,School of Journalism and Communicaiton,Wuhan,China,430072", "fullName": "Weihan Zhang", "givenName": "Weihan", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cost", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "303-307", "year": "2022", "issn": null, "isbn": "978-1-6654-6248-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "624800a298", "articleId": "1H2piLcGDII", "__typename": "AdjacentArticleType" }, "next": { "fno": "624800a308", "articleId": "1H2pjnL0K40", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2012/4771/0/4771a349", "title": "Data Visualization in Online Journalism and Its Implications for the Production Process", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a349/12OmNvSKO2M", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833123", "title": "Developers’ Foraging Behavior on Stack Overflow", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833123/1FUSLR5Aypq", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcc/2022/6285/0/628500a037", "title": "Improving scalability of multi-agent reinforcement learning with parameters sharing", "doi": null, "abstractUrl": "/proceedings-article/jcc/2022/628500a037/1GZjsUKw9eo", "parentPublication": { "id": "proceedings/jcc/2022/6285/0", "title": "2022 IEEE International Conference on Joint Cloud Computing (JCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcd/2022/6582/0/09900617", "title": "The Effect of Mother’s Parenting Behavior on Child’s Adjustment to School: The Mediating Effect of Child’s Self-esteem", "doi": null, "abstractUrl": "/proceedings-article/bcd/2022/09900617/1H44aR4vTFe", "parentPublication": { "id": "proceedings/bcd/2022/6582/0", "title": "2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09928014", "title": "Multi-axis Gating MLP with Bidirectional Feature Extraction for Sequence Recommendation", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09928014/1J4CH8G6caQ", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visap/2022/6365/0/636500a080", "title": "Wind of Bamboo: A Chinese Handwriting Mingling Interactive Installation Based on Human-Ai Collaborative Font Design", "doi": null, "abstractUrl": "/proceedings-article/visap/2022/636500a080/1J7WzfP5EqI", "parentPublication": { "id": "proceedings/visap/2022/6365/0", "title": "2022 IEEE VIS Arts Program (VISAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a596", "title": "An Abnormal Behavior Detection Method based on Feature Extraction", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a596/1KYsZB2L6ne", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/5555/01/10106105", "title": "Security Verification of the OpenTitan Hardware Root of Trust", "doi": null, "abstractUrl": "/magazine/sp/5555/01/10106105/1MuVlmqqSqc", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940357", "title": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940357/1gjRQ76uXNC", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a741", "title": "[DC] Immersive Journalism - The Future of the News", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a741/1tnWxjLz4Kk", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LKwWcGXok0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "10068562", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LKwZWJt1NS", "doi": "10.1109/ASONAM55673.2022.10068697", "title": "MOGPlay: A Decentralized Crowd Journalism Application for Democratic News Production", "normalizedTitle": "MOGPlay: A Decentralized Crowd Journalism Application for Democratic News Production", "abstract": "Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing democratic and trustworthy news relying on ordinary citizens arriving at breaking news locations and capturing relevant videos using their smartphones. The ARTICONF project [1] proposes a trustworthy, resilient, and globally sustainable toolset for developing decentralized applications (DApps). Leveraging the ARTICONF tools, we introduce a new DApp for crowd journalism called MOGPlay. MOGPlay collects and manages audio-visual content generated by citizens and provides a secure blockchain platform that rewards all stakeholders involved in professional news production. Besides live streaming, MOGPlay offers a marketplace for audio-visual content trading among citizens and free journalists with an internal token ecosystem. We discuss the functionality and implementation of the MOGPlay DApp and illustrate three pilot crowd journalism live scenarios that validate the prototype.", "abstracts": [ { "abstractType": "Regular", "content": "Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing democratic and trustworthy news relying on ordinary citizens arriving at breaking news locations and capturing relevant videos using their smartphones. The ARTICONF project [1] proposes a trustworthy, resilient, and globally sustainable toolset for developing decentralized applications (DApps). Leveraging the ARTICONF tools, we introduce a new DApp for crowd journalism called MOGPlay. MOGPlay collects and manages audio-visual content generated by citizens and provides a secure blockchain platform that rewards all stakeholders involved in professional news production. Besides live streaming, MOGPlay offers a marketplace for audio-visual content trading among citizens and free journalists with an internal token ecosystem. We discuss the functionality and implementation of the MOGPlay DApp and illustrate three pilot crowd journalism live scenarios that validate the prototype.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing democratic and trustworthy news relying on ordinary citizens arriving at breaking news locations and capturing relevant videos using their smartphones. The ARTICONF project [1] proposes a trustworthy, resilient, and globally sustainable toolset for developing decentralized applications (DApps). Leveraging the ARTICONF tools, we introduce a new DApp for crowd journalism called MOGPlay. MOGPlay collects and manages audio-visual content generated by citizens and provides a secure blockchain platform that rewards all stakeholders involved in professional news production. Besides live streaming, MOGPlay offers a marketplace for audio-visual content trading among citizens and free journalists with an internal token ecosystem. We discuss the functionality and implementation of the MOGPlay DApp and illustrate three pilot crowd journalism live scenarios that validate the prototype.", "fno": "10068697", "keywords": [ "Blockchains", "Internet", "Journalism", "Mobile Computing", "Smart Phones", "Social Networking Online", "Trusted Computing", "ARTICONF Project", "ARTICONF Tools", "Audio Visual Content Trading", "Blockchain Platform", "Consumption Behaviors", "Crowd Journalism", "Decentralized Applications", "Democratic News Production", "Media Production", "MOG Play D App", "Professional News Production", "Smartphones", "Technological Innovation", "Social Networking Online", "Ecosystems", "Collaboration", "Production", "Media", "Journalism", "Crowd Journalism", "Citizen Generated Content", "Decentralized App", "Social Media", "Marketplace" ], "authors": [ { "affiliation": "MOG Technologies,Portugal", "fullName": "Inês Rito Lima", "givenName": "Inês Rito", "surname": "Lima", "__typename": "ArticleAuthorType" }, { "affiliation": "MOG Technologies,Portugal", "fullName": "Claudia Marinho", "givenName": "Claudia", "surname": "Marinho", "__typename": "ArticleAuthorType" }, { "affiliation": "MOG Technologies,Portugal", "fullName": "Vasco Filipe", "givenName": "Vasco", "surname": "Filipe", "__typename": "ArticleAuthorType" }, { "affiliation": "MOG Technologies,Portugal", "fullName": "Alexandre Ulisses", "givenName": "Alexandre", "surname": "Ulisses", "__typename": "ArticleAuthorType" }, { "affiliation": "Utrecht University,Netherlands", "fullName": "Nishant Saurabh", "givenName": "Nishant", "surname": "Saurabh", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stavanger,Norway", "fullName": "Antorweep Chakravorty", "givenName": "Antorweep", "surname": "Chakravorty", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Amsterdam,Netherlands", "fullName": "Zhiming Zhao", "givenName": "Zhiming", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "University for Information Science and Technology,North Macedonia", "fullName": "Atanas Hristov", "givenName": "Atanas", "surname": "Hristov", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Klagenfurt,Austria", "fullName": "Radu Prodan", "givenName": "Radu", "surname": "Prodan", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "462-469", "year": "2022", "issn": null, "isbn": "978-1-6654-5661-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10068686", "articleId": "1LKx2S41yBa", "__typename": "AdjacentArticleType" }, "next": { "fno": "10068612", "articleId": "1LKx52S4lAQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2012/4771/0/4771a349", "title": "Data Visualization in Online Journalism and Its Implications for the Production Process", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a349/12OmNvSKO2M", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b543", "title": "Tracing Emergent Structure in Self-Organized Citizen Journalism", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b543/12OmNyQ7FDt", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671722", "title": "A Study of Cantonese Covid-19 Fake News Detection on Social Media", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671722/1A8hdIocCt2", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a303", "title": "Feature Extraction of the Information Clues in the Data Journalism", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a303/1H2pqD3KR9u", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fas*w/2019/2406/0/240600a265", "title": "Democratizing Data Analytics: Crowd-Sourcing Decentralized Collective Measurements", "doi": null, "abstractUrl": "/proceedings-article/fas*w/2019/240600a265/1ckrvDluVi0", "parentPublication": { "id": "proceedings/fas*w/2019/2406/0", "title": "2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2019/2519/0/251900b610", "title": "AI Blockchain Platform for Trusting News", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2019/251900b610/1ezRP8h2mGY", "parentPublication": { "id": "proceedings/icdcs/2019/2519/0", "title": "2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940357", "title": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940357/1gjRQ76uXNC", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09229515", "title": "Table Scraps: An Actionable Framework for Multi-Table Data Wrangling From An Artifact Study of Computational Journalism", "doi": null, "abstractUrl": "/journal/tg/2021/02/09229515/1o3nxS8lm7u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381424", "title": "Identifying and Characterizing Alternative News Media on Facebook", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381424/1semEfdslna", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a741", "title": "[DC] Immersive Journalism - The Future of the News", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a741/1tnWxjLz4Kk", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gjRKqf75Ha", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "acronym": "icis", "groupId": "1001200", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gjRQ76uXNC", "doi": "10.1109/ICIS46139.2019.8940357", "title": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "normalizedTitle": "Research on Interactive Journalism in the Background of Big Data, Virtual Reality Technology and Media Convergence", "abstract": "Nowadays, by using novel information techniques such as multiple interaction, data visualization, and scene immersion, they bring news users brand new experience of reading, viewing, and information using. The interaction way of interactive journalism is divided into three different types under the influence of big data technology, virtual reality technology and media convergence, namely data-controlled interaction, scene-controlled interaction and content-controlled interaction. The interaction features of these interactive journalism works depend on certain computers technology, and three ways of interaction modes create different interactive experiences for users through different technologies and serve for different news communication intention. However, for all the three kinds of interactive journalism are based on human-works interaction, compared with the imaginative design of interactive art, interactive journalism still appears to be relatively simple in performance. Further research on these issues may provide useful reference for the journalism works creators to develop and innovate the way to express.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, by using novel information techniques such as multiple interaction, data visualization, and scene immersion, they bring news users brand new experience of reading, viewing, and information using. The interaction way of interactive journalism is divided into three different types under the influence of big data technology, virtual reality technology and media convergence, namely data-controlled interaction, scene-controlled interaction and content-controlled interaction. The interaction features of these interactive journalism works depend on certain computers technology, and three ways of interaction modes create different interactive experiences for users through different technologies and serve for different news communication intention. However, for all the three kinds of interactive journalism are based on human-works interaction, compared with the imaginative design of interactive art, interactive journalism still appears to be relatively simple in performance. Further research on these issues may provide useful reference for the journalism works creators to develop and innovate the way to express.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, by using novel information techniques such as multiple interaction, data visualization, and scene immersion, they bring news users brand new experience of reading, viewing, and information using. The interaction way of interactive journalism is divided into three different types under the influence of big data technology, virtual reality technology and media convergence, namely data-controlled interaction, scene-controlled interaction and content-controlled interaction. The interaction features of these interactive journalism works depend on certain computers technology, and three ways of interaction modes create different interactive experiences for users through different technologies and serve for different news communication intention. However, for all the three kinds of interactive journalism are based on human-works interaction, compared with the imaginative design of interactive art, interactive journalism still appears to be relatively simple in performance. Further research on these issues may provide useful reference for the journalism works creators to develop and innovate the way to express.", "fno": "08940357", "keywords": [ "Art", "Big Data", "Data Visualisation", "Journalism", "Virtual Reality", "Interactive Journalism", "Human Works Interaction", "Interactive Art", "Virtual Reality Technology", "Media Convergence", "Big Data Technology", "Scene Controlled Interaction", "Content Controlled Interaction", "Journalism", "Media", "Data Visualization", "Virtual Reality", "Convergence", "Mood", "Production", "Interactive Journalism", "Data Journalism", "Immersive Journalism", "360 Degree Video", "Media Convergence" ], "authors": [ { "affiliation": "Ministry of Education School of Computer and Cybersecurity Communication University of China,Key Laboratory of Convergent Media and Intelligent Technology,Beijing,China", "fullName": "Yan Wang", "givenName": "Yan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Ministry of Education School of Computer and Cybersecurity Communication University of China,Key Laboratory of Convergent Media and Intelligent Technology,Beijing,China", "fullName": "Yizhen Cao", "givenName": "Yizhen", "surname": "Cao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "478-482", "year": "2019", "issn": null, "isbn": "978-1-7281-0801-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08940284", "articleId": "1gjRPOYrqI8", "__typename": "AdjacentArticleType" }, "next": { "fno": "08940177", "articleId": "1gjRNgwisTe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2006/0225/0/02250111", "title": "Interaction Techniques for Exploring Historic Sites through Situated Media", "doi": null, "abstractUrl": "/proceedings-article/3dui/2006/02250111/12OmNx6g6dA", "parentPublication": { "id": "proceedings/3dui/2006/0225/0", "title": "3D User Interfaces (3DUI'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612a903", "title": "An Exploration of Social Media in Public Opinion Convergence: Elaboration Likelihood and Semantic Networks on Political Events", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612a903/12OmNxxvAGu", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671722", "title": "A Study of Cantonese Covid-19 Fake News Detection on Social Media", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671722/1A8hdIocCt2", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2022/8152/0/815200a362", "title": "SpecTextor: End-to-End Attention-based Mechanism for Dense Text Generation in Sports Journalism", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2022/815200a362/1F0gxuZUxwI", "parentPublication": { "id": "proceedings/smartcomp/2022/8152/0", "title": "2022 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068697", "title": "MOGPlay: A Decentralized Crowd Journalism Application for Democratic News Production", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068697/1LKwZWJt1NS", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiotcs/2022/3410/0/341000a436", "title": "New Way of News Dissemination Based on Big Data Analysis and Visualization Technology", "doi": null, "abstractUrl": "/proceedings-article/aiotcs/2022/341000a436/1MuZI3RcG1a", "parentPublication": { "id": "proceedings/aiotcs/2022/3410/0", "title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940284", "title": "Research Status and the Development of Audio Downmix in Convergence Media", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940284/1gjRPOYrqI8", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09229515", "title": "Table Scraps: An Actionable Framework for Multi-Table Data Wrangling From An Artifact Study of Computational Journalism", "doi": null, "abstractUrl": "/journal/tg/2021/02/09229515/1o3nxS8lm7u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2020/8138/0/813800a095", "title": "Bibliometrics-Based Review of the Media Convergence Research Trend in China: 2008 –2018", "doi": null, "abstractUrl": "/proceedings-article/iccst/2020/813800a095/1p1gorOBJ72", "parentPublication": { "id": "proceedings/iccst/2020/8138/0", "title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a741", "title": "[DC] Immersive Journalism - The Future of the News", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a741/1tnWxjLz4Kk", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgop0Hn9ni", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "3", "displayVolume": "3", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAqkSIa", "doi": "10.1109/ICDAR.2017.292", "title": "An Overview of Comics Research in Computer Science", "normalizedTitle": "An Overview of Comics Research in Computer Science", "abstract": "A wide variety of research about comics has been proposed in the recent years. One of the main focuses of researchers in document image analysis is about comics content analysis and segmentation such as balloons, text or panels. Research about user interaction or content generation has also been proposed. However, as these parts have been covered by different research fields (document image analysis, multimedia, artificial intelligence, human computer interaction, etc.) with different sets of values. We propose in this paper an overview about the previous research about comics in computer science. We will state what have been done and which are the main outlooks of current research.", "abstracts": [ { "abstractType": "Regular", "content": "A wide variety of research about comics has been proposed in the recent years. One of the main focuses of researchers in document image analysis is about comics content analysis and segmentation such as balloons, text or panels. Research about user interaction or content generation has also been proposed. However, as these parts have been covered by different research fields (document image analysis, multimedia, artificial intelligence, human computer interaction, etc.) with different sets of values. We propose in this paper an overview about the previous research about comics in computer science. We will state what have been done and which are the main outlooks of current research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A wide variety of research about comics has been proposed in the recent years. One of the main focuses of researchers in document image analysis is about comics content analysis and segmentation such as balloons, text or panels. Research about user interaction or content generation has also been proposed. However, as these parts have been covered by different research fields (document image analysis, multimedia, artificial intelligence, human computer interaction, etc.) with different sets of values. We propose in this paper an overview about the previous research about comics in computer science. We will state what have been done and which are the main outlooks of current research.", "fno": "3586d054", "keywords": [ "Document Image Processing", "Image Segmentation", "Computer Science", "Document Image Analysis", "Comics Content Analysis", "Segmentation", "User Interaction", "Comics Research", "Text Analysis", "Layout", "Visualization", "Computer Science", "Image Analysis", "Image Segmentation", "Human Computer Interaction", "Comics", "Computer Science", "Document Image Analysis", "Interaction" ], "authors": [ { "affiliation": null, "fullName": "Olivier Augereau", "givenName": "Olivier", "surname": "Augereau", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Motoi Iwata", "givenName": "Motoi", "surname": "Iwata", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Koichi Kise", "givenName": "Koichi", "surname": "Kise", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "54-59", "year": "2017", "issn": "2379-2140", "isbn": "978-1-5386-3586-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3586d049", "articleId": "12OmNyOHG3E", "__typename": "AdjacentArticleType" }, "next": { "fno": "3586d060", "articleId": "12OmNrYCXT2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/3/3586d009", "title": "Accessible Comics for Visually Impaired People: Challenges and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d009/12OmNBv2CjM", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2014/3244/0/3244a267", "title": "Color Descriptor for Content-Based Drawing Retrieval", "doi": null, "abstractUrl": "/proceedings-article/das/2014/3244a267/12OmNqFrGLO", "parentPublication": { "id": "proceedings/das/2014/3244/0", "title": "2014 11th IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628812", "title": "An Active Contour Model for Speech Balloon Detection in Comics", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628812/12OmNwkzumt", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/3/3586d005", "title": "Introduction to Manga Box: Manga App Business and Engineering", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d005/12OmNwtEENf", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628793", "title": "eBDtheque: A Representative Database of Comics", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628793/12OmNx5Yvoh", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2016/1792/0/1792a120", "title": "Semi-automatic Text and Graphics Extraction of Manga Using Eye Tracking Information", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a120/12OmNxuo0ka", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/3/3586d078", "title": "Story Pattern Analysis Based on Scene Order Information in Four-Scene Comics", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d078/12OmNz2TCvR", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/1/505401a032", "title": "Understanding Multilingual Four-Scene Comics with Deep Learning Methods", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505401a032/1eLyigRXZBu", "parentPublication": { "id": "proceedings/icdarw/2019/5054/1", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/1/505401a050", "title": "Analysis Based on Distributed Representations of Various Parts Images in Four-Scene Comics Story Dataset", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505401a050/1eLyj6vg4z6", "parentPublication": { "id": "proceedings/icdarw/2019/5054/1", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222287", "title": "Data Comics for Reporting Controlled User Studies in Human-Computer Interaction", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222287/1nTq4rvK0g0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgop0Hn9ni", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "3", "displayVolume": "3", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBv2CjM", "doi": "10.1109/ICDAR.2017.285", "title": "Accessible Comics for Visually Impaired People: Challenges and Opportunities", "normalizedTitle": "Accessible Comics for Visually Impaired People: Challenges and Opportunities", "abstract": "Over the recent years, techniques from Document Images Analysis have brought new insights into the understanding of comics. This paper outlines the challenges and opportunities of conceiving accessible comics for visually impaired people. After an overview of the existing initiatives, we briefly highlight in what extent the Document community could help to achieve such a goal in a multidisciplinary way, by collaborating with fields such as Human-Computer Interactions, Cognitive Science and even Education Research.", "abstracts": [ { "abstractType": "Regular", "content": "Over the recent years, techniques from Document Images Analysis have brought new insights into the understanding of comics. This paper outlines the challenges and opportunities of conceiving accessible comics for visually impaired people. After an overview of the existing initiatives, we briefly highlight in what extent the Document community could help to achieve such a goal in a multidisciplinary way, by collaborating with fields such as Human-Computer Interactions, Cognitive Science and even Education Research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Over the recent years, techniques from Document Images Analysis have brought new insights into the understanding of comics. This paper outlines the challenges and opportunities of conceiving accessible comics for visually impaired people. After an overview of the existing initiatives, we briefly highlight in what extent the Document community could help to achieve such a goal in a multidisciplinary way, by collaborating with fields such as Human-Computer Interactions, Cognitive Science and even Education Research.", "fno": "3586d009", "keywords": [ "Document Image Processing", "Handicapped Aids", "Human Factors", "Accessible Comics", "Visually Impaired People", "Document Image Analysis", "Education", "Cognitive Science", "Visualization", "Art", "Text Analysis", "Image Analysis", "Human Computer Interaction", "Comics", "Accessibility", "Visually Impaired People", "Challenges", "Opportunities" ], "authors": [ { "affiliation": null, "fullName": "Frédéric Rayar", "givenName": "Frédéric", "surname": "Rayar", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "9-14", "year": "2017", "issn": "2379-2140", "isbn": "978-1-5386-3586-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3586d005", "articleId": "12OmNwtEENf", "__typename": "AdjacentArticleType" }, "next": { "fno": "3586d015", "articleId": "12OmNzZmZjy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/3/3586d054", "title": "An Overview of Comics Research in Computer Science", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d054/12OmNAqkSIa", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2014/8065/0/8065a165", "title": "Seeing the Movement through Sound: Giving Trajectory Information to Visually Impaired People", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2014/8065a165/12OmNvxsSWE", "parentPublication": { "id": "proceedings/sbgames/2014/8065/0", "title": "2014 Brazilian Symposium on Computer Games and Digital Entertainment (SBGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628812", "title": "An Active Contour Model for Speech Balloon Detection in Comics", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628812/12OmNwkzumt", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2010/7029/0/05543576", "title": "Toward real-time grocery detection for the visually impaired", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2010/05543576/12OmNx8Ouro", "parentPublication": { "id": "proceedings/cvprw/2010/7029/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccce/2016/2427/0/2427a115", "title": "Automated Bank Note Identification System for Visually Impaired Subjects in Malaysia", "doi": null, "abstractUrl": "/proceedings-article/iccce/2016/2427a115/12OmNy3Agtn", "parentPublication": { "id": "proceedings/iccce/2016/2427/0", "title": "2016 International Conference on Computer and Communication Engineering (ICCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/reconfig/2011/4551/0/4551a493", "title": "Digital Talking Book Player for the Visually Impaired Using FPGAs", "doi": null, "abstractUrl": "/proceedings-article/reconfig/2011/4551a493/12OmNzl3WYw", "parentPublication": { "id": "proceedings/reconfig/2011/4551/0", "title": "Reconfigurable Computing and FPGAs, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a901", "title": "Demonstration of Trajectory Presentation of Conducting Motions Using Tactile Sensation for Visually Impaired", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a901/1J7Wi3ec0us", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlde/2019/6119/0/611900a007", "title": "Implementation of Chinese Reader Aid for Visually-Impaired by Using Neural Network and Text Summarization Technologies", "doi": null, "abstractUrl": "/proceedings-article/icmlde/2019/611900a007/1hrMVTAPScU", "parentPublication": { "id": "proceedings/icmlde/2019/6119/0", "title": "2019 International Conference on Machine Learning and Data Engineering (iCMLDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300c593", "title": "Street Crossing Aid Using Light-Weight CNNs for the Visually Impaired", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300c593/1i5mRN4x96g", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/2020/5406/0/540600a094", "title": "3D Shape Understanding for the Visually Impaired by using Virtual Haptic Senses based on Fuzzy Logic", "doi": null, "abstractUrl": "/proceedings-article/ismvl/2020/540600a094/1qci9TF2Pug", "parentPublication": { "id": "proceedings/ismvl/2020/5406/0", "title": "2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aO", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNx5Yvoh", "doi": "10.1109/ICDAR.2013.232", "title": "eBDtheque: A Representative Database of Comics", "normalizedTitle": "eBDtheque: A Representative Database of Comics", "abstract": "We present eBDtheque, a database of various comic book images and their ground truth for panels, balloons and text lines plus semantic annotations. The database consists of a hundred pages of various comic book albums, Franco-Belgian, American comics and mangas. Additionally, we present the piece of software used to establish the ground truth and a tool to validate results against this ground truth. Everything is publicly available for scientific use on http://ebdtheque.univ-lr.fr.", "abstracts": [ { "abstractType": "Regular", "content": "We present eBDtheque, a database of various comic book images and their ground truth for panels, balloons and text lines plus semantic annotations. The database consists of a hundred pages of various comic book albums, Franco-Belgian, American comics and mangas. Additionally, we present the piece of software used to establish the ground truth and a tool to validate results against this ground truth. Everything is publicly available for scientific use on http://ebdtheque.univ-lr.fr.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present eBDtheque, a database of various comic book images and their ground truth for panels, balloons and text lines plus semantic annotations. The database consists of a hundred pages of various comic book albums, Franco-Belgian, American comics and mangas. Additionally, we present the piece of software used to establish the ground truth and a tool to validate results against this ground truth. Everything is publicly available for scientific use on http://ebdtheque.univ-lr.fr.", "fno": "06628793", "keywords": [ "Databases", "Semantics", "Image Segmentation", "Speech", "Protocols", "Shape", "Visualization", "Database", "Scientific Comics Collection", "Ground Truth", "Semantic Annotation", "Image" ], "authors": [ { "affiliation": null, "fullName": "Clement Guerin", "givenName": "Clement", "surname": "Guerin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christophe Rigaud", "givenName": "Christophe", "surname": "Rigaud", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antoine Mercier", "givenName": "Antoine", "surname": "Mercier", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Farid Ammar-Boudjelal", "givenName": "Farid", "surname": "Ammar-Boudjelal", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Karell Bertet", "givenName": "Karell", "surname": "Bertet", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alain Bouju", "givenName": "Alain", "surname": "Bouju", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jean-Christophe Burie", "givenName": "Jean-Christophe", "surname": "Burie", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Georges Louis", "givenName": "Georges", "surname": "Louis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jean-Marc Ogier", "givenName": "Jean-Marc", "surname": "Ogier", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Arnaud Revel", "givenName": "Arnaud", "surname": "Revel", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "1145-1149", "year": "2013", "issn": "1520-5363", "isbn": "978-0-7695-4999-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06628792", "articleId": "12OmNAkWvbg", "__typename": "AdjacentArticleType" }, "next": { "fno": "06628794", "articleId": "12OmNvDZETb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/3/3586d066", "title": "Histogram of Exclamation Marks and Its Application for Comics Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d066/12OmNAqkSEz", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2012/4976/0/06395047", "title": "Pomics: A Computer-Aided Storytelling System with Automatic Picture-to-Comics Composition", "doi": null, "abstractUrl": "/proceedings-article/taai/2012/06395047/12OmNrJ11wL", "parentPublication": { "id": "proceedings/taai/2012/4976/0", "title": "2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628812", "title": "An Active Contour Model for Speech Balloon Detection in Comics", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628812/12OmNwkzumt", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457g478", "title": "The Amazing Mysteries of the Gutter: Drawing Inferences Between Panels in Comic Book Narratives", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g478/12OmNx19k23", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmu/2015/2612/0/07061027", "title": "Development of avatar creation smartphone application reflecting expression of Japanese comics character", "doi": null, "abstractUrl": "/proceedings-article/icmu/2015/07061027/12OmNyvY9zW", "parentPublication": { "id": "proceedings/icmu/2015/2612/0", "title": "2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/3/3586d029", "title": "Segmentation-Free Speech Text Recognition for Comic Books", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586d029/12OmNznkK4z", "parentPublication": { "id": "icdar/2017/3586/3", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2018/9571/0/652800a181", "title": "What Makes the Difference in Visual Styles of Comics: From Classification to Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccia/2018/652800a181/1a3xgDVf2OA", "parentPublication": { "id": "proceedings/iccia/2018/9571/0", "title": "2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/1/505401a038", "title": "CNN Based Extraction of Panels/Characters from Bengali Comic Book Page Images", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505401a038/1eLyikxkGNa", "parentPublication": { "id": "proceedings/icdarw/2019/5054/1", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090458", "title": "Exploring Pupillometry as a Method to Evaluate Reading Comprehension in VR-based Educational Comics", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090458/1jIxiPxPIpG", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h186", "title": "OpenRooms: An Open Framework for Photorealistic Indoor Scene Datasets", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h186/1yeImiGYbbG", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisN", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WWzW4f", "doi": "10.1109/BELIV.2018.8634261", "title": "Towards Designing Unbiased Replication Studies in Information Visualization", "normalizedTitle": "Towards Designing Unbiased Replication Studies in Information Visualization", "abstract": "Experimenter bias and expectancy effects have been well studied in the social sciences and even in human-computer interaction. They refer to the nonideal study-design choices made by experimenters which can unfairly influence the outcomes of their studies. While these biases need to be considered when designing any empirical study, they can be particularly significant in the context of replication studies which can stray from the studies being replicated in only a few admissible ways. Although there are general guidelines for making valid, unbiased choices in each of the several steps in experimental design, making such choices when conducting replication studies has not been well explored. We reviewed 16 replication studies in information visualization published in four top venues between 2008 to present to characterize how the study designs of the replication studies differed from those of the studies they replicated. We present our characterization categories which include the prevalence of crowdsourcing, and the commonly-found replication types and study-design differences. We draw guidelines based on these categories towards helping researchers make meaningful and unbiased decisions when designing replication studies. Our paper presents the first steps in gaining a larger understanding of this topic and contributes to the ongoing efforts of encouraging researchers to conduct and publish more replication studies in information visualization.", "abstracts": [ { "abstractType": "Regular", "content": "Experimenter bias and expectancy effects have been well studied in the social sciences and even in human-computer interaction. They refer to the nonideal study-design choices made by experimenters which can unfairly influence the outcomes of their studies. While these biases need to be considered when designing any empirical study, they can be particularly significant in the context of replication studies which can stray from the studies being replicated in only a few admissible ways. Although there are general guidelines for making valid, unbiased choices in each of the several steps in experimental design, making such choices when conducting replication studies has not been well explored. We reviewed 16 replication studies in information visualization published in four top venues between 2008 to present to characterize how the study designs of the replication studies differed from those of the studies they replicated. We present our characterization categories which include the prevalence of crowdsourcing, and the commonly-found replication types and study-design differences. We draw guidelines based on these categories towards helping researchers make meaningful and unbiased decisions when designing replication studies. Our paper presents the first steps in gaining a larger understanding of this topic and contributes to the ongoing efforts of encouraging researchers to conduct and publish more replication studies in information visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Experimenter bias and expectancy effects have been well studied in the social sciences and even in human-computer interaction. They refer to the nonideal study-design choices made by experimenters which can unfairly influence the outcomes of their studies. While these biases need to be considered when designing any empirical study, they can be particularly significant in the context of replication studies which can stray from the studies being replicated in only a few admissible ways. Although there are general guidelines for making valid, unbiased choices in each of the several steps in experimental design, making such choices when conducting replication studies has not been well explored. We reviewed 16 replication studies in information visualization published in four top venues between 2008 to present to characterize how the study designs of the replication studies differed from those of the studies they replicated. We present our characterization categories which include the prevalence of crowdsourcing, and the commonly-found replication types and study-design differences. We draw guidelines based on these categories towards helping researchers make meaningful and unbiased decisions when designing replication studies. Our paper presents the first steps in gaining a larger understanding of this topic and contributes to the ongoing efforts of encouraging researchers to conduct and publish more replication studies in information visualization.", "fno": "08634261", "keywords": [ "Data Visualisation", "Decision Making", "Social Sciences", "Study Design Differences", "Information Visualization", "Nonideal Study Design Choices", "Experimenter Bias", "Social Sciences", "Human Computer Interaction", "Replication Studies", "Experimental Design", "Crowdsourcing", "Visualization", "Data Visualization", "Human Computer Interaction", "Guidelines", "Task Analysis", "Crowdsourcing", "Complexity Theory", "Human Centered Computing", "Visualization", "Empirical Studies In Visualization Human Centered Computing", "Visualization Design And Evaluation Methods Replication Information Visualization" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, University of Notre Dame", "fullName": "Poorna Talkad Sukumar", "givenName": "Poorna Talkad", "surname": "Sukumar", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, University of Notre Dame", "fullName": "Ronald Metoyer", "givenName": "Ronald", "surname": "Metoyer", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "
93
-
101
", "year": "2018", "issn": null, "isbn": "978-1-5386-6884-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08634297", "articleId": "17D45VTRozT", "__typename": "AdjacentArticleType" }, "next": { "fno": "08634392", "articleId": "17D45Wuc3a4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icse/2010/719/2/06062248", "title": "1st International Workshop on Replication in Empirical Software Engineering Research (RESER)", "doi": null, "abstractUrl": "/proceedings-article/icse/2010/06062248/12OmNAle6NT", "parentPublication": { "id": "proceedings/icse/2010/719/2", "title": "2010 32nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624050", "title": "Replicating mining studies with SOFAS", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624050/12OmNCmpcKA", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2005/2448/0/24480271", "title": "The GriddLeS Data Replication Service", "doi": null, "abstractUrl": "/proceedings-article/e-science/2005/24480271/12OmNvHY2H1", "parentPublication": { "id": "proceedings/e-science/2005/2448/0", "title": "First International Conference on e-Science and Grid Computing (e-Science'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2011/05/mcg2011050014", "title": "Integrating User Studies into Computer Graphics-Related Courses", "doi": null, "abstractUrl": "/magazine/cg/2011/05/mcg2011050014/13rRUx0xPOe", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2018/6884/0/08634150", "title": "Requirements for Reproducibility of Research in Situational and Spatio-Temporal Visualization : Position Paper", "doi": null, "abstractUrl": "/proceedings-article/beliv/2018/08634150/17D45W9KVHt", "parentPublication": { "id": "proceedings/beliv/2018/6884/0", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443125", "title": "Glanceable Visualization: Studies of Data Comparison Performance on Smartwatches", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443125/17D45XDIXRv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933762", "title": "Sociotechnical Considerations for Accessible Visualization Design", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933762/1fTgGk6sRfa", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222287", "title": "Data Comics for Reporting Controlled User Studies in Human-Computer Interaction", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222287/1nTq4rvK0g0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09492011", "title": "A Survey of Perception-Based Visualization Studies by Task", "doi": null, "abstractUrl": "/journal/tg/2022/12/09492011/1volPuHGMdW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09523770", "title": "A Survey on ML4VIS: Applying Machine Learning Advances to Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09523770/1wnLgd43B5K", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cdOZ3ClGUM", "title": "2018 XLIV Latin American Computer Conference (CLEI)", "acronym": "clei", "groupId": "1801981", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1cdP4hiaKNW", "doi": "10.1109/CLEI.2018.00099", "title": "HCI Education in Brazil in the Light of Curricula Guidelines", "normalizedTitle": "HCI Education in Brazil in the Light of Curricula Guidelines", "abstract": "Human-Computer Interaction (HCI) has been researched, practiced and taught around the world in diverse contexts. In this paper, we focus on Brazil and its particular context. We interviewed thirteen professors to investigate their approach in introductory HCI courses within computing undergraduate courses. This paper reports a portion of this analysis, focusing on the content being taught, and comparing it to national and international guidelines. Our results show that most professors use a project-centered approach in the course, balancing theory and practice. Semiotics and accessibility are strong influences in our context. No international guidelines mention any semiotic approach to HCI, although they are usually more detailed than national guidelines. International guidelines provide a list of topics together with a list of learning outcomes, while national guidelines are more focused on topics. We contribute to the HCI community by providing an analysis of the Brazilian context.", "abstracts": [ { "abstractType": "Regular", "content": "Human-Computer Interaction (HCI) has been researched, practiced and taught around the world in diverse contexts. In this paper, we focus on Brazil and its particular context. We interviewed thirteen professors to investigate their approach in introductory HCI courses within computing undergraduate courses. This paper reports a portion of this analysis, focusing on the content being taught, and comparing it to national and international guidelines. Our results show that most professors use a project-centered approach in the course, balancing theory and practice. Semiotics and accessibility are strong influences in our context. No international guidelines mention any semiotic approach to HCI, although they are usually more detailed than national guidelines. International guidelines provide a list of topics together with a list of learning outcomes, while national guidelines are more focused on topics. We contribute to the HCI community by providing an analysis of the Brazilian context.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human-Computer Interaction (HCI) has been researched, practiced and taught around the world in diverse contexts. In this paper, we focus on Brazil and its particular context. We interviewed thirteen professors to investigate their approach in introductory HCI courses within computing undergraduate courses. This paper reports a portion of this analysis, focusing on the content being taught, and comparing it to national and international guidelines. Our results show that most professors use a project-centered approach in the course, balancing theory and practice. Semiotics and accessibility are strong influences in our context. No international guidelines mention any semiotic approach to HCI, although they are usually more detailed than national guidelines. International guidelines provide a list of topics together with a list of learning outcomes, while national guidelines are more focused on topics. We contribute to the HCI community by providing an analysis of the Brazilian context.", "fno": "043700a784", "keywords": [ "Computer Aided Instruction", "Educational Courses", "Human Computer Interaction", "Project Centered Approach", "International Guidelines", "Semiotic Approach", "HCI Community", "Brazilian Context", "HCI Education", "Curricula Guidelines", "Undergraduate Courses", "Human Computer Interaction", "HCI Courses", "Human Computer Interaction", "Guidelines", "Education", "Semiotics", "Computer Science", "Information Systems", "Proposals", "HCI Education HCI In Brazil HCI Curricula Guidelines UDUM Underlying Discourse Unveiling Method" ], "authors": [ { "affiliation": "Universidade Federal de Minas Gerais - UFMG", "fullName": "Tatiane Gomes Guimarães", "givenName": "Tatiane", "surname": "Gomes Guimarães", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal de Minas Gerais - UFMG", "fullName": "Raquel Oliveira Prates", "givenName": "Raquel", "surname": "Oliveira Prates", "__typename": "ArticleAuthorType" } ], "idPrefix": "clei", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "784-793", "year": "2018", "issn": null, "isbn": "978-1-7281-0437-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "043700a769", "articleId": "1cdP4kFEINy", "__typename": "AdjacentArticleType" }, "next": { "fno": "043700a794", "articleId": "1cdP0L1uwA8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2008/3165/0/3165a114", "title": "Verification of Clinical Guidelines by Model Checking", "doi": null, "abstractUrl": "/proceedings-article/cbms/2008/3165a114/12OmNAolGLf", "parentPublication": { "id": "proceedings/cbms/2008/3165/0", "title": "2008 21st IEEE International Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iat/2006/2748/0/04052921", "title": "How am I? Guidelines for Animated Interface Agents Evaluation", "doi": null, "abstractUrl": "/proceedings-article/iat/2006/04052921/12OmNBOll2r", "parentPublication": { "id": "proceedings/iat/2006/2748/0", "title": "2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a255", "title": "Current Topics in the Design of HCI Courses with Computer Science Curricula", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a255/12OmNBOllcU", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/achi/2008/3086/0/3086a265", "title": "Usability Practice: The Appealing Way to HCI", "doi": null, "abstractUrl": "/proceedings-article/achi/2008/3086a265/12OmNBkfRgr", "parentPublication": { "id": "proceedings/achi/2008/3086/0", "title": "International Conference on Advances in Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408515", "title": "Incorporating HCI into the undergraduate curriculum: Bloom's taxonomy meets the CC'01 curricular guidelines", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408515/12OmNCm7BCB", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/4525a503", "title": "Introduction to Human-Computer Interaction (HCI) Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/4525a503/12OmNyuya1J", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/2/3322b059", "title": "A Holistic Understanding of HCI Perspectives on Smart Home", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322b059/12OmNzICEDc", "parentPublication": { "id": "proceedings/ncm/2008/3322/2", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2013/11/tts2013111582", "title": "Usability through Software Design", "doi": null, "abstractUrl": "/journal/ts/2013/11/tts2013111582/13rRUyfKIEV", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2019/02/08794686", "title": "Revolution or Evolution? Speech Interaction and HCI Design Guidelines", "doi": null, "abstractUrl": "/magazine/pc/2019/02/08794686/1cplXYDY06Y", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icict/2020/7283/0/728300a230", "title": "Hacking User in Human-Computer Interaction Design (HCI)", "doi": null, "abstractUrl": "/proceedings-article/icict/2020/728300a230/1jPb75H54Eo", "parentPublication": { "id": "proceedings/icict/2020/7283/0", "title": "2020 3rd International Conference on Information and Computer Technologies (ICICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wYlqB71SXm", "title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)", "acronym": "icsecs-icocsim", "groupId": "1843065", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wYltFbsF3O", "doi": "10.1109/ICSECS52883.2021.00127", "title": "A Conceptual Review on Integration of Cognitive Load Theory and Human-Computer Interaction", "normalizedTitle": "A Conceptual Review on Integration of Cognitive Load Theory and Human-Computer Interaction", "abstract": "During the era of technological advancement and usage of the e-learning environment, it is vital to examine the integration between the human-computer interaction (HCI) and the theory of cognitive load. A systematic review of the literature was conducted by searching studies associated with cognitive load theory and human-computer interaction concepts. Around 47 published papers were reviewed, and the analyses indicated that the cognitive load theory (CLT) is explicit in the context of HCI since the idea of relevant intellectual burden can be clarified and it minimizes the disadvantage of externalizing data on the interface and also supports to diminish memory load. Henceforth, it can be implied that cognitive load theory and human-computer integration approaches and ideas, enable users to learn the device based on the informative program and/or frameworks. Based on a review of the literature, a conceptual framework is proposed, which can be empirically tested in future studies. The researchers suggested that with the increase in an e-learning environment, there is a need for the study to understand and examine the integration between the HCI and CLT aspects, this will support the system developers to provide appropriate guidelines based on the user and task.", "abstracts": [ { "abstractType": "Regular", "content": "During the era of technological advancement and usage of the e-learning environment, it is vital to examine the integration between the human-computer interaction (HCI) and the theory of cognitive load. A systematic review of the literature was conducted by searching studies associated with cognitive load theory and human-computer interaction concepts. Around 47 published papers were reviewed, and the analyses indicated that the cognitive load theory (CLT) is explicit in the context of HCI since the idea of relevant intellectual burden can be clarified and it minimizes the disadvantage of externalizing data on the interface and also supports to diminish memory load. Henceforth, it can be implied that cognitive load theory and human-computer integration approaches and ideas, enable users to learn the device based on the informative program and/or frameworks. Based on a review of the literature, a conceptual framework is proposed, which can be empirically tested in future studies. The researchers suggested that with the increase in an e-learning environment, there is a need for the study to understand and examine the integration between the HCI and CLT aspects, this will support the system developers to provide appropriate guidelines based on the user and task.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "During the era of technological advancement and usage of the e-learning environment, it is vital to examine the integration between the human-computer interaction (HCI) and the theory of cognitive load. A systematic review of the literature was conducted by searching studies associated with cognitive load theory and human-computer interaction concepts. Around 47 published papers were reviewed, and the analyses indicated that the cognitive load theory (CLT) is explicit in the context of HCI since the idea of relevant intellectual burden can be clarified and it minimizes the disadvantage of externalizing data on the interface and also supports to diminish memory load. Henceforth, it can be implied that cognitive load theory and human-computer integration approaches and ideas, enable users to learn the device based on the informative program and/or frameworks. Based on a review of the literature, a conceptual framework is proposed, which can be empirically tested in future studies. The researchers suggested that with the increase in an e-learning environment, there is a need for the study to understand and examine the integration between the HCI and CLT aspects, this will support the system developers to provide appropriate guidelines based on the user and task.", "fno": "140700a667", "keywords": [ "Cognition", "Computer Aided Instruction", "Human Computer Interaction", "Cognitive Load Theory", "E Learning Environment", "HCI", "Memory Load", "Human Computer Integration Approaches", "Systematic Review", "Human Computer Interaction", "Visualization", "Electronic Learning", "Bibliographies", "Tools", "Software Systems", "User Experience", "Human Computer Interaction", "Cognitive Load Theory", "E Leaming", "Germane Load", "Intrinsic Load" ], "authors": [ { "affiliation": "Muscat College,Department of Business & Accounting,Muscat,Sultanate of Oman", "fullName": "Ruksana Banu. A", "givenName": "Ruksana Banu.", "surname": "A", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Business & Accounting, Muscat College", "fullName": "Wedad Salim Ali Al Siyabi", "givenName": "Wedad Salim Ali", "surname": "Al Siyabi", "__typename": "ArticleAuthorType" }, { "affiliation": "Muscat College,Language Center,Muscat,Sultanate of Oman", "fullName": "Yusra Al Minje", "givenName": "Yusra", "surname": "Al Minje", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsecs-icocsim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-08-01T00:00:00", "pubType": "proceedings", "pages": "667-672", "year": "2021", "issn": null, "isbn": "978-1-6654-1407-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "140700a661", "articleId": "1wYlCZMcVpe", "__typename": "AdjacentArticleType" }, "next": { "fno": "140700a673", "articleId": "1wYlufFLFK0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2017/4881/0/4881a572", "title": "Application of Cognitive Load Theory to the Design and Evaluation of Usability Study of mHealth Applications: Opportunities and Challenges", "doi": null, "abstractUrl": "/proceedings-article/ichi/2017/4881a572/12OmNAndiys", "parentPublication": { "id": "proceedings/ichi/2017/4881/0", "title": "2017 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2016/4571/0/4571a679", "title": "Multimedia in Cognitive-Intensive Practices: A Case with ATLAS.ti Supporting HCI Qualitative Research", "doi": null, "abstractUrl": "/proceedings-article/ism/2016/4571a679/12OmNApLGP6", "parentPublication": { "id": "proceedings/ism/2016/4571/0", "title": "2016 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2009/4715/0/05350517", "title": "Work in progress - quantifying intrinsic Cognitive Load in DC circuit problems", "doi": null, "abstractUrl": "/proceedings-article/fie/2009/05350517/12OmNCcKQLb", "parentPublication": { "id": "proceedings/fie/2009/4715/0", "title": "2009 39th IEEE Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684857", "title": "A teaching method for using metaphors in interaction design", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684857/12OmNxFJXzx", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ct/1997/8084/0/80840002", "title": "Putting the horse before the cart: formulating and exploring methods for studying cognitive technology", "doi": null, "abstractUrl": "/proceedings-article/ct/1997/80840002/12OmNzUPplb", "parentPublication": { "id": "proceedings/ct/1997/8084/0", "title": "Cognitive Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2011/03/tta2011030147", "title": "Experience-Driven Procedural Content Generation", "doi": null, "abstractUrl": "/journal/ta/2011/03/tta2011030147/13rRUytnsVi", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icict/2020/7283/0/728300a230", "title": "Hacking User in Human-Computer Interaction Design (HCI)", "doi": null, "abstractUrl": "/proceedings-article/icict/2020/728300a230/1jPb75H54Eo", "parentPublication": { "id": "proceedings/icict/2020/7283/0", "title": "2020 3rd International Conference on Information and Computer Technologies (ICICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2020/5882/0/09096845", "title": "Trends and Challenges of HCI in the New Paradigm of Cognitive Cities", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2020/09096845/1l6SCGrcSre", "parentPublication": { "id": "proceedings/icedeg/2020/5882/0", "title": "2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-nier/2020/7126/0/712600a041", "title": "CHASE: Checklist to Assess User Experience in IoT Environments", "doi": null, "abstractUrl": "/proceedings-article/icse-nier/2020/712600a041/1sDsWSSRtte", "parentPublication": { "id": "proceedings/icse-nier/2020/7126/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a101", "title": "Bibliometric analysis of the core thesis system of Interaction Design Research on Human-Computer Interaction", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a101/1tROBd3G0De", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCcbEdc", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "acronym": "iciev", "groupId": "1802578", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNARRYgA", "doi": "10.1109/ICIEV.2016.7760167", "title": "A belief rule-based expert system to assess mental disorder under uncertainty", "normalizedTitle": "A belief rule-based expert system to assess mental disorder under uncertainty", "abstract": "Mental disorder is a change of mental or behavioral pattern that causes sufferings and impairs the ability to function in ordinary life. In psychopathology, the assessment methods of mental disorder contain various types of uncertainties associated with signs and symptoms. This study identifies a method that addresses the issue of uncertainty in assessing mental disorder. The fuzzy logic knowledge representation schema can address uncertainty associated with linguistic terms including ambiguity, imprecision, and vagueness. However, fuzzy logic is incapable of addressing uncertainty due to ignorance, incompleteness, and randomness. So, a belief rule-based expert system (BRBES) has been designed and developed with the capability of handling the uncertainties mentioned. Evidential reasoning works as the inference engine and the belief rule base as the knowledge representation schema in this BRBES. The study shows that the results generated by BRBES are more reliable than that of Fuzzy Rule-based expert system and from a human expert.", "abstracts": [ { "abstractType": "Regular", "content": "Mental disorder is a change of mental or behavioral pattern that causes sufferings and impairs the ability to function in ordinary life. In psychopathology, the assessment methods of mental disorder contain various types of uncertainties associated with signs and symptoms. This study identifies a method that addresses the issue of uncertainty in assessing mental disorder. The fuzzy logic knowledge representation schema can address uncertainty associated with linguistic terms including ambiguity, imprecision, and vagueness. However, fuzzy logic is incapable of addressing uncertainty due to ignorance, incompleteness, and randomness. So, a belief rule-based expert system (BRBES) has been designed and developed with the capability of handling the uncertainties mentioned. Evidential reasoning works as the inference engine and the belief rule base as the knowledge representation schema in this BRBES. The study shows that the results generated by BRBES are more reliable than that of Fuzzy Rule-based expert system and from a human expert.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mental disorder is a change of mental or behavioral pattern that causes sufferings and impairs the ability to function in ordinary life. In psychopathology, the assessment methods of mental disorder contain various types of uncertainties associated with signs and symptoms. This study identifies a method that addresses the issue of uncertainty in assessing mental disorder. The fuzzy logic knowledge representation schema can address uncertainty associated with linguistic terms including ambiguity, imprecision, and vagueness. However, fuzzy logic is incapable of addressing uncertainty due to ignorance, incompleteness, and randomness. So, a belief rule-based expert system (BRBES) has been designed and developed with the capability of handling the uncertainties mentioned. Evidential reasoning works as the inference engine and the belief rule base as the knowledge representation schema in this BRBES. The study shows that the results generated by BRBES are more reliable than that of Fuzzy Rule-based expert system and from a human expert.", "fno": "07760167", "keywords": [ "Mental Disorders", "Uncertainty", "Expert Systems", "Cognition", "Fuzzy Logic", "Psychology", "Medical Services", "Inference", "Belief Rule Base", "Uncertainty", "Mental Disorder" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, University of Chittagong, Bangladesh", "fullName": "Mohammad Shahadat Hossain", "givenName": "Mohammad Shahadat", "surname": "Hossain", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, University of Chittagong, Bangladesh", "fullName": "Ahmed Afif Monrat", "givenName": "Ahmed Afif", "surname": "Monrat", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, University of Chittagong, Bangladesh", "fullName": "Mamun Hasan", "givenName": "Mamun", "surname": "Hasan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, University of Chittagong, Bangladesh", "fullName": "Razuan Karim", "givenName": "Razuan", "surname": "Karim", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Health Science and Technology, Aalborg University, Denmark", "fullName": "Tanveer Ahmed Bhuiyan", "givenName": "Tanveer Ahmed", "surname": "Bhuiyan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Learning and Philosophy, Aalborg University, Denmark", "fullName": "Md. Saifuddin Khalid", "givenName": "Md. Saifuddin", "surname": "Khalid", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciev", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "1089-1094", "year": "2016", "issn": null, "isbn": "978-1-5090-1269-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07760166", "articleId": "12OmNrAdswK", "__typename": "AdjacentArticleType" }, "next": { "fno": "07760168", "articleId": "12OmNx2QUJE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csci/2015/9795/0/9795a829", "title": "A Belief Rule Based Expert System to Assess Meditation", "doi": null, "abstractUrl": "/proceedings-article/csci/2015/9795a829/12OmNB9KHsp", "parentPublication": { "id": "proceedings/csci/2015/9795/0", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752261", "title": "Subconscious Crowdsourcing: A feasible data collection mechanism for mental disorder detection on social media", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752261/12OmNqJHFvU", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a164", "title": "Research Hotspots Analysis of Attention-Deficit/Hyperactivity Disorder by PubMed", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a164/12OmNwO5M0W", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicci/2010/4014/0/4014a113", "title": "A Study on the Mental Disorder and Prevalence Rate of Physiological Disease of College Students", "doi": null, "abstractUrl": "/proceedings-article/icicci/2010/4014a113/12OmNxwncAq", "parentPublication": { "id": "proceedings/icicci/2010/4014/0", "title": "Intelligent Computing and Cognitive Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/07/08239661", "title": "A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining", "doi": null, "abstractUrl": "/journal/tk/2018/07/08239661/13rRUyfKIIn", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn-workshops/2018/5097/0/08628607", "title": "A Belief Rule Based Flood Risk Assessment Expert System using Real Time Sensor Data Streaming", "doi": null, "abstractUrl": "/proceedings-article/lcn-workshops/2018/08628607/17D45WHONpP", "parentPublication": { "id": "proceedings/lcn-workshops/2018/5097/0", "title": "2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2022/04/09775663", "title": "Integrating Pervasive Technologies Into Mental Health Services: A Qualitative Study in Mexico", "doi": null, "abstractUrl": "/magazine/pc/2022/04/09775663/1DqgTFEp36E", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a708", "title": "Mobile Mental Health: A Review of Applications for Depression Assistance", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a708/1cdO2AVz2ak", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2019/4687/0/468700a013", "title": "Poster Abstract: A Wearable Diagnostic Assessment System for Attention Deficit Hyperactivity Disorder", "doi": null, "abstractUrl": "/proceedings-article/chase/2019/468700a013/1febW2HiMGQ", "parentPublication": { "id": "proceedings/chase/2019/4687/0", "title": "2019 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a222", "title": "Multimodal Deep Learning Framework for Mental Disorder Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a222/1kecI2YXH2M", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy314bv", "title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)", "acronym": "bracis", "groupId": "1803430", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBVrjly", "doi": "10.1109/BRACIS.2016.048", "title": "Reasoning about Trust and Belief in Possibilistic Answer Set Programming", "normalizedTitle": "Reasoning about Trust and Belief in Possibilistic Answer Set Programming", "abstract": "The Possibilistic Answer Set Framework was conceived to deal with not only non monotonic reasoning, but also with uncertainty by associating a certainty level to each piece of knowledge. Here we extend this formalism to a multiagent approach robust enough to manage both the uncertainty about autonomous agents expressed in terms of degrees of trust and the possibilistic uncertainty about their knowledge bases expressed as possibilistic answer set programs. As result, we have a decentralized system able to reason about trust and beliefs in an integrated way. Then we motivate its behavior on an example and highlight how our proposal can be employed to make decisions when the information is distributed, uncertain, potentially contradictory and not necessarily reliable.", "abstracts": [ { "abstractType": "Regular", "content": "The Possibilistic Answer Set Framework was conceived to deal with not only non monotonic reasoning, but also with uncertainty by associating a certainty level to each piece of knowledge. Here we extend this formalism to a multiagent approach robust enough to manage both the uncertainty about autonomous agents expressed in terms of degrees of trust and the possibilistic uncertainty about their knowledge bases expressed as possibilistic answer set programs. As result, we have a decentralized system able to reason about trust and beliefs in an integrated way. Then we motivate its behavior on an example and highlight how our proposal can be employed to make decisions when the information is distributed, uncertain, potentially contradictory and not necessarily reliable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Possibilistic Answer Set Framework was conceived to deal with not only non monotonic reasoning, but also with uncertainty by associating a certainty level to each piece of knowledge. Here we extend this formalism to a multiagent approach robust enough to manage both the uncertainty about autonomous agents expressed in terms of degrees of trust and the possibilistic uncertainty about their knowledge bases expressed as possibilistic answer set programs. As result, we have a decentralized system able to reason about trust and beliefs in an integrated way. Then we motivate its behavior on an example and highlight how our proposal can be employed to make decisions when the information is distributed, uncertain, potentially contradictory and not necessarily reliable.", "fno": "07839589", "keywords": [ "Decision Making", "Logic Programming", "Multi Agent Systems", "Nonmonotonic Reasoning", "Trusted Computing", "Possibilistic Answer Set Programming", "Nonmonotonic Reasoning", "Multiagent Approach", "Autonomous Agents", "Degrees Of Trust", "Possibilistic Uncertainty", "Decentralized System", "Decision Making", "Uncertainty", "Cost Accounting", "Cognition", "Programming", "Drugs", "Knowledge Based Systems", "Diseases", "Trust", "Possibilistic Reasoning", "Knowledge Representation", "Answer Set Programming" ], "authors": [ { "affiliation": null, "fullName": "Gabriel Maia", "givenName": "Gabriel", "surname": "Maia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "João Alcântara", "givenName": "João", "surname": "Alcântara", "__typename": "ArticleAuthorType" } ], "idPrefix": "bracis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "217-222", "year": "2016", "issn": null, "isbn": "978-1-5090-3566-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07839588", "articleId": "12OmNButq79", "__typename": "AdjacentArticleType" }, "next": { "fno": "07839590", "articleId": "12OmNBbJTlI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iiai-aai/2015/9957/0/07373871", "title": "Evidential Reasoning in Annotated Logics", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2015/07373871/12OmNBrV1N8", "parentPublication": { "id": "proceedings/iiai-aai/2015/9957/0", "title": "2015 IIAI 4th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2012/4745/0/4745b721", "title": "A Temporalised Belief Logic for Reasoning about Authentication Protocols", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2012/4745b721/12OmNxecRPS", "parentPublication": { "id": "proceedings/trustcom/2012/4745/0", "title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2014/5066/0/5066a857", "title": "Reasoning about Security Policies of Services Using Answer Set Programming", "doi": null, "abstractUrl": "/proceedings-article/scc/2014/5066a857/12OmNyFU6Xo", "parentPublication": { "id": "proceedings/scc/2014/5066/0", "title": "2014 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2012/0227/1/06495130", "title": "Possible and Necessary Answer Sets of Possibilistic Answer Set Programs", "doi": null, "abstractUrl": "/proceedings-article/ictai/2012/06495130/12OmNyS6RBZ", "parentPublication": { "id": "proceedings/ictai/2012/0227/1", "title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2015/0478/0/07507108", "title": "Belief Constraint Satisfaction Problems", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2015/07507108/12OmNzZmZtX", "parentPublication": { "id": "proceedings/aiccsa/2015/0478/0", "title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2012/05/mex2012050028", "title": "Analogical Reasoning for Answer Ranking in Social Question Answering", "doi": null, "abstractUrl": "/magazine/ex/2012/05/mex2012050028/13rRUxAATcM", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1994/01/k0064", "title": "Automated Reasoning Using Possibilistic Logic: Semantics, Belief Revision, and Variable Certainty Weights", "doi": null, "abstractUrl": "/journal/tk/1994/01/k0064/13rRUxjQyc7", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a787", "title": "Possibilistic Reasoning About Actions in Agent Systems", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a787/144U9b07hJQ", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a302", "title": "Legal Reasoning in Answer Set Programming", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a302/17D45WXIkEU", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10050733", "title": "Credal Valuation Networks for Machine Reasoning Under Uncertainty", "doi": null, "abstractUrl": "/journal/ai/5555/01/10050733/1L03j3rhFug", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8OunG", "title": "1992 Fourth International Conference on Computing and Information", "acronym": "icci", "groupId": "1000159", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNwfKjd8", "doi": "10.1109/ICCI.1992.227656", "title": "Nonnumeric belief structures", "normalizedTitle": "Nonnumeric belief structures", "abstract": "The nonnumeric belief, a counterpart of the belief function, is defined as the lower envelope of a family of incidence mappings (i.e., the nonnumeric counterpart of probability functions). Likewise, the nonnumeric conditional belief is defined as the lower envelope of a family of conditional incidence mappings. Such definitions are consistent with the corresponding definitions for belief functions. There exists a closed-form expression for the proposed conditional nonnumeric beliefs, which is useful in qualitative, nonmonotonic reasoning, and conditional logic.<>", "abstracts": [ { "abstractType": "Regular", "content": "The nonnumeric belief, a counterpart of the belief function, is defined as the lower envelope of a family of incidence mappings (i.e., the nonnumeric counterpart of probability functions). Likewise, the nonnumeric conditional belief is defined as the lower envelope of a family of conditional incidence mappings. Such definitions are consistent with the corresponding definitions for belief functions. There exists a closed-form expression for the proposed conditional nonnumeric beliefs, which is useful in qualitative, nonmonotonic reasoning, and conditional logic.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The nonnumeric belief, a counterpart of the belief function, is defined as the lower envelope of a family of incidence mappings (i.e., the nonnumeric counterpart of probability functions). Likewise, the nonnumeric conditional belief is defined as the lower envelope of a family of conditional incidence mappings. Such definitions are consistent with the corresponding definitions for belief functions. There exists a closed-form expression for the proposed conditional nonnumeric beliefs, which is useful in qualitative, nonmonotonic reasoning, and conditional logic.", "fno": "00227656", "keywords": [ "Belief Maintenance", "Inference Mechanisms", "Nonnumeric Belief Structures", "Qualitative Reasoning", "Lower Envelope", "Probability Functions", "Nonnumeric Conditional Belief", "Conditional Incidence Mappings", "Closed Form Expression", "Nonmonotonic Reasoning", "Conditional Logic", "Upper Bound", "Logic", "Uncertainty", "Computer Science", "Calculus", "Closed Form Solution" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Regina Univ., Sask., Canada", "fullName": "S.K.M. Wong", "givenName": "S.K.M.", "surname": "Wong", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Regina Univ., Sask., Canada", "fullName": "L.S. Wang", "givenName": "L.S.", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Regina Univ., Sask., Canada", "fullName": "Y.Y. Yao", "givenName": "Y.Y.", "surname": "Yao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "274,275,276,277", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00227655", "articleId": "12OmNz6iOPZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "00227657", "articleId": "12OmNwtWfLv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2010/7964/0/05576276", "title": "Belief Functions and Probability for General Spaces", "doi": null, "abstractUrl": "/proceedings-article/grc/2010/05576276/12OmNAsk4Ek", "parentPublication": { "id": "proceedings/grc/2010/7964/0", "title": "2010 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1993/4120/0/00342559", "title": "A linearly constrained minimization approach for time-frequency kernel design", "doi": null, "abstractUrl": "/proceedings-article/acssc/1993/00342559/12OmNBOCWdm", "parentPublication": { "id": "proceedings/acssc/1993/4120/0", "title": "Proceedings of 27th Asilomar Conference on Signals, Systems and Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1990/2107/0/00151324", "title": "Belief logic systems", "doi": null, "abstractUrl": "/proceedings-article/isuma/1990/00151324/12OmNCxL9QO", "parentPublication": { "id": "proceedings/isuma/1990/2107/0", "title": "Proceedings First International Symposium on Uncertainty Modeling and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2003/2038/0/20380510", "title": "Inference via Fuzzy Belief Petri Nets", "doi": null, "abstractUrl": "/proceedings-article/ictai/2003/20380510/12OmNxGSmaV", "parentPublication": { "id": "proceedings/ictai/2003/2038/0", "title": "Proceedings. 15th IEEE International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1995/7126/0/71260715", "title": "Belief updating", "doi": null, "abstractUrl": "/proceedings-article/isuma/1995/71260715/12OmNy2Jt6v", "parentPublication": { "id": "proceedings/isuma/1995/7126/0", "title": "Uncertainty Modeling and Analysis, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/6/3304f188", "title": "Pose Determination of 3D Object Based on Four Straight Lines", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304f188/12OmNzXnNB6", "parentPublication": { "id": "proceedings/icnc/2008/3304/6", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1994/01/k0072", "title": "Representation of Qualitative User Preference by Quantitative Belief Functions", "doi": null, "abstractUrl": "/journal/tk/1994/01/k0072/13rRUwInvfk", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/05/i0447", "title": "The Combination of Evidence in the Transferable Belief Model", "doi": null, "abstractUrl": "/journal/tp/1990/05/i0447/13rRUwhHcRE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1993/03/i0246", "title": "Approximating Probabilistic Inference in Bayesian Belief Networks", "doi": null, "abstractUrl": "/journal/tp/1993/03/i0246/13rRUwkxc6n", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tn/2018/04/08059782", "title": "Belief Dynamics in Social Networks: A Fluid-Based Analysis", "doi": null, "abstractUrl": "/journal/tn/2018/04/08059782/17D45Vw15wM", "parentPublication": { "id": "trans/tn", "title": "IEEE Transactions on Network Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAS9zx2", "title": "Uncertainty Modeling and Analysis, International Symposium on", "acronym": "isuma", "groupId": "1000301", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2Jt6v", "doi": "10.1109/ISUMA.1995.527782", "title": "Belief updating", "normalizedTitle": "Belief updating", "abstract": "Uncertainty is present in most tasks that require intelligent behaviour. Probability theory has by far the longest tradition in problems connected with uncertainty, but the Dempster-Shafer theory provides more general model. A central problem of this theory is conditioning. M. Spies's paper (1994) presents a new approach to a solution of this problem, by establishing a link between conditional events and discrete random sets. Conditional events were introduced as sets of equivalent events under conditioning. These sets are targets of a multivalued mapping and conditional belief functions were introduced. We study properties of these functions in the cases that belief functions were obtained by Bayesian conditioning from an unconditional belief function.", "abstracts": [ { "abstractType": "Regular", "content": "Uncertainty is present in most tasks that require intelligent behaviour. Probability theory has by far the longest tradition in problems connected with uncertainty, but the Dempster-Shafer theory provides more general model. A central problem of this theory is conditioning. M. Spies's paper (1994) presents a new approach to a solution of this problem, by establishing a link between conditional events and discrete random sets. Conditional events were introduced as sets of equivalent events under conditioning. These sets are targets of a multivalued mapping and conditional belief functions were introduced. We study properties of these functions in the cases that belief functions were obtained by Bayesian conditioning from an unconditional belief function.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Uncertainty is present in most tasks that require intelligent behaviour. Probability theory has by far the longest tradition in problems connected with uncertainty, but the Dempster-Shafer theory provides more general model. A central problem of this theory is conditioning. M. Spies's paper (1994) presents a new approach to a solution of this problem, by establishing a link between conditional events and discrete random sets. Conditional events were introduced as sets of equivalent events under conditioning. These sets are targets of a multivalued mapping and conditional belief functions were introduced. We study properties of these functions in the cases that belief functions were obtained by Bayesian conditioning from an unconditional belief function.", "fno": "71260715", "keywords": [ "Probability Belief Maintenance Uncertainty Handling Bayes Methods Belief Updating Uncertainty Intelligent Behaviour Probability Theory Dempster Shafer Theory Conditioning Discrete Random Sets Multivalued Mapping Conditional Belief Functions Belief Functions Bayesian Conditioning Unconditional Belief Function" ], "authors": [ { "affiliation": "Inst. of Control Theory & Robotics, Slovak Acad. of Sci., Bratislava, Slovakia", "fullName": "A. Slobodová", "givenName": "A.", "surname": "Slobodová", "__typename": "ArticleAuthorType" } ], "idPrefix": "isuma", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-03-01T00:00:00", "pubType": "proceedings", "pages": "715", "year": "1995", "issn": "1068-2228", "isbn": "0-8186-7126-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "71260711", "articleId": "12OmNCfAPJo", "__typename": "AdjacentArticleType" }, "next": { "fno": "71260720", "articleId": "12OmNyQ7G9o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H1j0az0WaY", "doi": "10.1109/CVPR52688.2022.01399", "title": "Multidimensional Belief Quantification for Label-Efficient Meta-Learning", "normalizedTitle": "Multidimensional Belief Quantification for Label-Efficient Meta-Learning", "abstract": "Optimization-based meta-learning offers a promising direction for few-shot learning that is essential for many real-world computer vision applications. However, learning from few samples introduces uncertainty, and quantifying model confidence for few-shot predictions is essential for many critical domains. Furthermore, few-shot tasks used in meta training are usually sampled randomly from a task distribution for an iterative model update, leading to high labeling costs and computational overhead in meta-training. We propose a novel uncertainty-aware task selection model for label efficient meta-learning. The proposed model formulates a multidimensional belief measure, which can quantify the known uncertainty and lower bound the unknown uncertainty of any given task. Our theoretical result establishes an important relationship between the conflicting belief and the incorrect belief The theoretical result allows us to estimate the total uncertainty of a task, which provides a principled criterion for task selection. A novel multi-query task formulation is further developed to improve both the computational and labeling efficiency of meta-learning. Experiments conducted over multiple real-world few-shot image classification tasks demonstrate the effectiveness of the proposed model.", "abstracts": [ { "abstractType": "Regular", "content": "Optimization-based meta-learning offers a promising direction for few-shot learning that is essential for many real-world computer vision applications. However, learning from few samples introduces uncertainty, and quantifying model confidence for few-shot predictions is essential for many critical domains. Furthermore, few-shot tasks used in meta training are usually sampled randomly from a task distribution for an iterative model update, leading to high labeling costs and computational overhead in meta-training. We propose a novel uncertainty-aware task selection model for label efficient meta-learning. The proposed model formulates a multidimensional belief measure, which can quantify the known uncertainty and lower bound the unknown uncertainty of any given task. Our theoretical result establishes an important relationship between the conflicting belief and the incorrect belief The theoretical result allows us to estimate the total uncertainty of a task, which provides a principled criterion for task selection. A novel multi-query task formulation is further developed to improve both the computational and labeling efficiency of meta-learning. Experiments conducted over multiple real-world few-shot image classification tasks demonstrate the effectiveness of the proposed model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Optimization-based meta-learning offers a promising direction for few-shot learning that is essential for many real-world computer vision applications. However, learning from few samples introduces uncertainty, and quantifying model confidence for few-shot predictions is essential for many critical domains. Furthermore, few-shot tasks used in meta training are usually sampled randomly from a task distribution for an iterative model update, leading to high labeling costs and computational overhead in meta-training. We propose a novel uncertainty-aware task selection model for label efficient meta-learning. The proposed model formulates a multidimensional belief measure, which can quantify the known uncertainty and lower bound the unknown uncertainty of any given task. Our theoretical result establishes an important relationship between the conflicting belief and the incorrect belief The theoretical result allows us to estimate the total uncertainty of a task, which provides a principled criterion for task selection. A novel multi-query task formulation is further developed to improve both the computational and labeling efficiency of meta-learning. Experiments conducted over multiple real-world few-shot image classification tasks demonstrate the effectiveness of the proposed model.", "fno": "694600o4371", "keywords": [ "Computer Vision", "Image Classification", "Iterative Methods", "Learning Artificial Intelligence", "Optimisation", "Multidimensional Belief Quantification", "Optimization Based Meta Learning", "Few Shot Learning", "Computer Vision", "Few Shot Predictions", "Iterative Model Update", "Meta Training", "Multidimensional Belief Measure", "Image Classification", "Label Efficiency Meta Learning", "Uncertainty Aware Task Selection", "Multiquery Task Formulation", "Training", "Computer Vision", "Uncertainty", "Computational Modeling", "Measurement Uncertainty", "Predictive Models", "Pattern Recognition" ], "authors": [ { "affiliation": "Rochester Institute of Technology", "fullName": "Deep Shankar Pandey", "givenName": "Deep Shankar", "surname": "Pandey", "__typename": "ArticleAuthorType" }, { "affiliation": "Rochester Institute of Technology", "fullName": "Qi Yu", "givenName": "Qi", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "14371-14380", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H1iZSeKEuI", "name": "pcvpr202269460-09880097s1-mm_694600o4371.zip", "size": "8.57 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09880097s1-mm_694600o4371.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600o4361", "articleId": "1H1hzLbISis", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600o4381", "articleId": "1H1jV5K3Vlu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2022/0915/0/091500b628", "title": "Meta-Meta Classification for One-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500b628/1B12XiU3wiY", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500a346", "title": "Meta-Learning for Multi-Label Few-Shot Classification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500a346/1B13vlRsGyc", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200j445", "title": "Meta-Learning with Task-Adaptive Loss Function for Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200j445/1BmFLsPDTe8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200a631", "title": "Shallow Bayesian Meta Learning for Real-World Few-Shot Recognition", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200a631/1BmH4dvnine", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200j042", "title": "Meta-Baseline: Exploring Simple Meta-Learning for Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200j042/1BmJSS6MRRS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4756", "title": "What Matters For Meta-Learning Vision Regression Tasks?", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4756/1H1lfFj2jPq", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c478", "title": "Contrastive Knowledge-Augmented Meta-Learning for Few-Shot Classification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c478/1KxVdryyg1i", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f294", "title": "Meta-OLE: Meta-learned Orthogonal Low-Rank Embedding", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f294/1L8qoymXXZ6", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1711", "title": "Task Agnostic Meta-Learning for Few-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1711/1gyrLVLoYw0", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412701", "title": "Task-based Focal Loss for Adversarially Robust Meta-Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412701/1tmk0HCDpo4", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ehBu4KFmLK", "title": "2019 IEEE/ACM 11th International Workshop on Modelling in Software Engineering (MiSE)", "acronym": "mise", "groupId": "1001864", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ehBvfsOEAo", "doi": "10.1109/MiSE.2019.00011", "title": "Belief Uncertainty in Software Models", "normalizedTitle": "Belief Uncertainty in Software Models", "abstract": "This paper discusses the representation of Belief Uncertainty in software models. This kind of uncertainty refers to the situation in which the modeler, or any other belief agent, is uncertain about the behavior of the system, or the statements that the model expresses about it. In this work, we propose to assign a degree of belief to model statements (let they be constraints, or any other model expression), which is expressed by a probability (called credence, in statistical terms) that represents a quantification of such a subjective degree of belief. We discuss how it can be represented using current modeling notations, and how to operate with it in order to make informed decisions.", "abstracts": [ { "abstractType": "Regular", "content": "This paper discusses the representation of Belief Uncertainty in software models. This kind of uncertainty refers to the situation in which the modeler, or any other belief agent, is uncertain about the behavior of the system, or the statements that the model expresses about it. In this work, we propose to assign a degree of belief to model statements (let they be constraints, or any other model expression), which is expressed by a probability (called credence, in statistical terms) that represents a quantification of such a subjective degree of belief. We discuss how it can be represented using current modeling notations, and how to operate with it in order to make informed decisions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper discusses the representation of Belief Uncertainty in software models. This kind of uncertainty refers to the situation in which the modeler, or any other belief agent, is uncertain about the behavior of the system, or the statements that the model expresses about it. In this work, we propose to assign a degree of belief to model statements (let they be constraints, or any other model expression), which is expressed by a probability (called credence, in statistical terms) that represents a quantification of such a subjective degree of belief. We discuss how it can be represented using current modeling notations, and how to operate with it in order to make informed decisions.", "fno": "223100a019", "keywords": [ "Belief Maintenance", "Probability", "Software Agents", "Uncertainty Handling", "Belief Uncertainty", "Software Models", "Belief Agent", "Model Statements", "Model Expression", "Modeling Notations", "Uncertainty", "Unified Modeling Language", "Temperature Sensors", "Temperature Measurement", "Measurement Uncertainty", "Software", "Software Models", "Uncertainty", "Degree Of Belief" ], "authors": [ { "affiliation": "Open University of Catalonia", "fullName": "Loli Burgueño", "givenName": "Loli", "surname": "Burgueño", "__typename": "ArticleAuthorType" }, { "affiliation": "Open University of Catalonia", "fullName": "Robert Clarisó", "givenName": "Robert", "surname": "Clarisó", "__typename": "ArticleAuthorType" }, { "affiliation": "Institució Catalana de Recerca i Estudis Avançats", "fullName": "Jordi Cabot", "givenName": "Jordi", "surname": "Cabot", "__typename": "ArticleAuthorType" }, { "affiliation": "Université Paris-Saclay", "fullName": "Sébastien Gérard", "givenName": "Sébastien", "surname": "Gérard", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de Málaga", "fullName": "Antonio Vallecillo", "givenName": "Antonio", "surname": "Vallecillo", "__typename": "ArticleAuthorType" } ], "idPrefix": "mise", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "19-26", "year": "2019", "issn": null, "isbn": "978-1-7281-2231-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "223100a015", "articleId": "1ehBuvhjepy", "__typename": "AdjacentArticleType" }, "next": { "fno": "223100a027", "articleId": "1ehBuenkcbm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/models/2017/3492/0/3492a093", "title": "Software Product Lines with Design Choices: Reasoning about Variability and Design Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/models/2017/3492a093/12OmNAXPy4s", "parentPublication": { "id": "proceedings/models/2017/3492/0", "title": "2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2016/3581/0/3581a015", "title": "Expressing Measurement Uncertainty in Software Models", "doi": null, "abstractUrl": "/proceedings-article/quatic/2016/3581a015/12OmNAZOK1b", "parentPublication": { "id": "proceedings/quatic/2016/3581/0", "title": "2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227159", "title": "Partial models: Towards modeling and reasoning with uncertainty", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227159/12OmNBgQFSA", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2015/7055/0/7055a007", "title": "Modularity for Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/mise/2015/7055a007/12OmNxG1yWW", "parentPublication": { "id": "proceedings/mise/2015/7055/0", "title": "2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2011/4568/0/4568a080", "title": "Uncertainty Propagation through Software Dependability Models", "doi": null, "abstractUrl": "/proceedings-article/issre/2011/4568a080/12OmNxZBSAT", "parentPublication": { "id": "proceedings/issre/2011/4568/0", "title": "2011 IEEE 22nd International Symposium on Software Reliability Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rose/2018/5760/0/576001a023", "title": "Using Physical Quantities in Robot Software Models", "doi": null, "abstractUrl": "/proceedings-article/rose/2018/576001a023/13bd1fKQxsk", "parentPublication": { "id": "proceedings/rose/2018/5760/0", "title": "2018 IEEE/ACM 1st International Workshop on Robotics Software Engineering (RoSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2001/03/k0416", "title": "A New Uncertainty Measure for Belief Networks with Applications to Optimal Evidential Inferencing", "doi": null, "abstractUrl": "/journal/tk/2001/03/k0416/13rRUwd9CGf", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4371", "title": "Multidimensional Belief Quantification for Label-Efficient Meta-Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4371/1H1j0az0WaY", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400a382", "title": "Discounted Belief Decision Tree for Uncertainty Data from Unreliable Source", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400a382/1jdDN375QPK", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09217952", "title": "A Bayesian cognition approach for belief updating of correlation judgement through uncertainty visualizations", "doi": null, "abstractUrl": "/journal/tg/2021/02/09217952/1nL7qhcUKPe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uHhezZYHrW", "title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "acronym": "wi-iat", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1uHhg069Nrq", "doi": "10.1109/WIIAT50758.2020.00032", "title": "Graded Belief Revision for Jason: A Rule-Based Approach", "normalizedTitle": "Graded Belief Revision for Jason: A Rule-Based Approach", "abstract": "Jason is a Java-based platform for the development of multi-agent systems, which is a particular implementation of AgentSpeak. While some theoretical proposals have been put forward to add to Jason both belief revision and the preference order on the agent's beliefs, the reasoning on the practical way to integrate such proposals as well as their implementation have not been considered. This paper aims to fill those gaps, by adding the concept of graded beliefs and making use of Jason customisation features to implement reasoning and belief revision capabilities. The resulting approach allows agents to reason about the belief's degree of certainty, track dependency between them, and revise the belief set accordingly. A running example will illustrate the presented work and highlight its added value.", "abstracts": [ { "abstractType": "Regular", "content": "Jason is a Java-based platform for the development of multi-agent systems, which is a particular implementation of AgentSpeak. While some theoretical proposals have been put forward to add to Jason both belief revision and the preference order on the agent's beliefs, the reasoning on the practical way to integrate such proposals as well as their implementation have not been considered. This paper aims to fill those gaps, by adding the concept of graded beliefs and making use of Jason customisation features to implement reasoning and belief revision capabilities. The resulting approach allows agents to reason about the belief's degree of certainty, track dependency between them, and revise the belief set accordingly. A running example will illustrate the presented work and highlight its added value.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Jason is a Java-based platform for the development of multi-agent systems, which is a particular implementation of AgentSpeak. While some theoretical proposals have been put forward to add to Jason both belief revision and the preference order on the agent's beliefs, the reasoning on the practical way to integrate such proposals as well as their implementation have not been considered. This paper aims to fill those gaps, by adding the concept of graded beliefs and making use of Jason customisation features to implement reasoning and belief revision capabilities. The resulting approach allows agents to reason about the belief's degree of certainty, track dependency between them, and revise the belief set accordingly. A running example will illustrate the presented work and highlight its added value.", "fno": "192400a211", "keywords": [ "Belief Maintenance", "Inference Mechanisms", "Java", "Knowledge Based Systems", "Multi Agent Systems", "Multiagent Systems", "Preference Order", "Reasoning", "Jason Customisation Features", "Belief Revision", "Rule Based Approach", "Java Based Platform", "Graded Belief Revision", "Agent Speak", "Agent Beliefs", "Belief Certainty Degree", "Track Dependency", "Belief Set", "Cognition", "Proposals", "Intelligent Agents", "Multi Agent Systems", "Belief Revision", "Graded Beliefs", "Rule Based Agents", "Jason" ], "authors": [ { "affiliation": "Université Côte d’Azur,CNRS, I3S, UMR 7271,France", "fullName": "Dima El Zein", "givenName": "Dima El", "surname": "Zein", "__typename": "ArticleAuthorType" }, { "affiliation": "Université Côte d’Azur,CNRS, I3S, UMR 7271,France", "fullName": "Célia da Costa Pereira", "givenName": "Célia da Costa", "surname": "Pereira", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "211-218", "year": "2020", "issn": null, "isbn": "978-1-6654-1924-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "192400a203", "articleId": "1uHhoqPTOTK", "__typename": "AdjacentArticleType" }, "next": { "fno": "192400a219", "articleId": "1uHhpbONrHO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/micai/2011/4605/0/4605a009", "title": "Applying Max-2SAT to Efficient Belief Revision", "doi": null, "abstractUrl": "/proceedings-article/micai/2011/4605a009/12OmNA14Ady", "parentPublication": { "id": "proceedings/micai/2011/4605/0", "title": "2011 10th Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1993/4200/0/00633934", "title": "The implementation of a first-order logic AGM belief revision system", "doi": null, "abstractUrl": "/proceedings-article/tai/1993/00633934/12OmNAndiwv", "parentPublication": { "id": "proceedings/tai/1993/4200/0", "title": "Proceedings of 1993 IEEE Conference on Tools with Al (TAI-93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/2/4513b058", "title": "Graded Reinstatement in Belief Revision", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513b058/12OmNqH9hpo", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/2", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1993/3840/0/00366661", "title": "A temporal approach to belief revision in knowledge bases", "doi": null, "abstractUrl": "/proceedings-article/caia/1993/00366661/12OmNs4S8z8", "parentPublication": { "id": "proceedings/caia/1993/3840/0", "title": "Proceedings of 9th IEEE Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1989/1913/3/00049173", "title": "A framework for comparative analysis of belief revision models in rule-based systems", "doi": null, "abstractUrl": "/proceedings-article/hicss/1989/00049173/12OmNwwMf0d", "parentPublication": { "id": "proceedings/hicss/1989/1913/3", "title": "Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume III: Decision Support and Knowledge Based Systems Track", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aamas/2004/2092/2/20920614", "title": "A Logical Approach for Describing (Dis)Belief Change and Message Processing", "doi": null, "abstractUrl": "/proceedings-article/aamas/2004/20920614/12OmNxecS3P", "parentPublication": { "id": "proceedings/aamas/2004/2092/2", "title": "Autonomous Agents and Multiagent Systems, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1994/6785/0/00346451", "title": "Distributed belief revision versus distributed truth maintenance", "doi": null, "abstractUrl": "/proceedings-article/tai/1994/00346451/12OmNyoSbfs", "parentPublication": { "id": "proceedings/tai/1994/6785/0", "title": "Proceedings Sixth International Conference on Tools with Artificial Intelligence. TAI 94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2015/9295/0/9295a027", "title": "Non-revision Reasoning without Redundancy in Predicate Logic", "doi": null, "abstractUrl": "/proceedings-article/fcst/2015/9295a027/12OmNyrqzk6", "parentPublication": { "id": "proceedings/fcst/2015/9295/0", "title": "2015 Ninth International Conference on Frontier of Computer Science and Technology (FCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iis/1997/8218/0/82180410", "title": "Belief revision as database update", "doi": null, "abstractUrl": "/proceedings-article/iis/1997/82180410/12OmNyuPLgy", "parentPublication": { "id": "proceedings/iis/1997/8218/0", "title": "Intelligent Information Systems, IASTED International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/27550061", "title": "Ontology Revision on the Semantic Web: Integration of belief revision theory", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/27550061/12OmNzG4gr5", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz2TCuX", "title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)", "acronym": "ictai", "groupId": "1000763", "volume": "1", "displayVolume": "1", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNqIhG2j", "doi": "10.1109/ICTAI.2012.175", "title": "Cognitive Maps for Knowledge Represenation and Reasoning", "normalizedTitle": "Cognitive Maps for Knowledge Represenation and Reasoning", "abstract": "Cognitive maps are powerful graphical models for knowledge representation. They offer an easy means to express individual's judgments, thinking or beliefs about a given problem. However, drawing inferences in cognitive maps, especially when the problem is complex, may not be an easy task. The main reason of this limitation in cognitive maps is that they do not model uncertainty with the variables. Our contribution in this paper is twofold : we firstly enrich the cognitive map formalism regarding the influence relation and then we propose to built a Bayesian causal map (BCM) from the constructed cognitive map in order to lead reasoning on the problem. A simple application on a real problem is given, it concerns fishing activities.", "abstracts": [ { "abstractType": "Regular", "content": "Cognitive maps are powerful graphical models for knowledge representation. They offer an easy means to express individual's judgments, thinking or beliefs about a given problem. However, drawing inferences in cognitive maps, especially when the problem is complex, may not be an easy task. The main reason of this limitation in cognitive maps is that they do not model uncertainty with the variables. Our contribution in this paper is twofold : we firstly enrich the cognitive map formalism regarding the influence relation and then we propose to built a Bayesian causal map (BCM) from the constructed cognitive map in order to lead reasoning on the problem. A simple application on a real problem is given, it concerns fishing activities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cognitive maps are powerful graphical models for knowledge representation. They offer an easy means to express individual's judgments, thinking or beliefs about a given problem. However, drawing inferences in cognitive maps, especially when the problem is complex, may not be an easy task. The main reason of this limitation in cognitive maps is that they do not model uncertainty with the variables. Our contribution in this paper is twofold : we firstly enrich the cognitive map formalism regarding the influence relation and then we propose to built a Bayesian causal map (BCM) from the constructed cognitive map in order to lead reasoning on the problem. A simple application on a real problem is given, it concerns fishing activities.", "fno": "06495162", "keywords": [ "Noise Measurement", "Bayes Methods", "Cognition", "Uncertainty", "Transforms", "Semantics", "Probabilistic Logic", "Bayesian Networks", "Cognitive Map" ], "authors": [ { "affiliation": "AGROCAMPUS OUEST, IRISA, Rennes, France", "fullName": "K. Sedki", "givenName": "K.", "surname": "Sedki", "__typename": "ArticleAuthorType" }, { "affiliation": "AGROCAMPUS OUEST, IRISA, Rennes, France", "fullName": "L. B. de Beaufort", "givenName": "L. B.", "surname": "de Beaufort", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "1035-1040", "year": "2012", "issn": "1082-3409", "isbn": "978-1-4799-0227-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06495161", "articleId": "12OmNxzuMQz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06495163", "articleId": "12OmNBa2iEI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbi/2014/5779/2/5779b149", "title": "A Fuzzy Cognitive Maps Approach for Analyzing the Integration of Two Organizations of the Same Corporation", "doi": null, "abstractUrl": "/proceedings-article/cbi/2014/5779b149/12OmNAL3B7G", "parentPublication": { "id": "proceedings/cbi/2014/5779/2", "title": "2014 IEEE 16th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2014/6572/0/6572a291", "title": "Synthesis of Cognitive Maps and Applications", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a291/12OmNBIFmsC", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa/2008/3471/0/3471a689", "title": "Incident Response Probabilistic Cognitive Maps", "doi": null, "abstractUrl": "/proceedings-article/ispa/2008/3471a689/12OmNwoghbt", "parentPublication": { "id": "proceedings/ispa/2008/3471/0", "title": "2008 IEEE International Symposium on Parallel and Distributed Processing with Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci/2006/0475/2/04216498", "title": "Decomposition and Hierarchical Process for Fuzzy Cognitive Maps of Complex Systems", "doi": null, "abstractUrl": "/proceedings-article/icci/2006/04216498/12OmNx6PiBg", "parentPublication": { "id": "proceedings/icci/2006/0475/2", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci-cc/2012/2795/0/06311138", "title": "An empirical study on pertinent aspects of sketch maps for navigation", "doi": null, "abstractUrl": "/proceedings-article/icci-cc/2012/06311138/12OmNxYtu36", "parentPublication": { "id": "proceedings/icci-cc/2012/2795/0", "title": "2012 11th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2005/2534/0/25340104", "title": "The Reasoning Mechanism of Fuzzy Cognitive Maps", "doi": null, "abstractUrl": "/proceedings-article/skg/2005/25340104/12OmNxzuMG1", "parentPublication": { "id": "proceedings/skg/2005/2534/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1995/7084/0/70840040", "title": "The use of sketch maps to measure cognitive maps of virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vrais/1995/70840040/12OmNy3RRHQ", "parentPublication": { "id": "proceedings/vrais/1995/7084/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2015/0163/0/0163a721", "title": "Constructing Weighted Argumentation Framework with Cognitive Maps", "doi": null, "abstractUrl": "/proceedings-article/ictai/2015/0163a721/12OmNyKrHmm", "parentPublication": { "id": "proceedings/ictai/2015/0163/0", "title": "2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/springsim/2020/370/0/09185473", "title": "Fuzzy Cognitive Maps in Agent Based Models: A Practicial Implementation Example", "doi": null, "abstractUrl": "/proceedings-article/springsim/2020/09185473/1mP5Z17ebSw", "parentPublication": { "id": "proceedings/springsim/2020/370/0", "title": "2020 Spring Simulation Conference (SpringSim)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09512424", "title": "CogKR: Cognitive Graph for Multi-Hop Knowledge Reasoning", "doi": null, "abstractUrl": "/journal/tk/2023/02/09512424/1w0wzCuvnA4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19wBcxEzXSU", "title": "2019 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)", "acronym": "ispass", "groupId": "1000547", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "19wBf9owV68", "doi": "10.1109/ISPASS.2019.00031", "title": "Demystifying Bayesian Inference Workloads", "normalizedTitle": "Demystifying Bayesian Inference Workloads", "abstract": "The recent surge of machine learning has motivated computer architects to focus intently on accelerating related workloads, especially in deep learning. Deep learning has been the pillar algorithm that has led the advancement of learning patterns from a vast amount of labeled data, or supervised learning. However, for unsupervised learning, Bayesian methods often work better than deep learning. Bayesian modeling and inference works well with unlabeled or limited data, can leverage informative priors, and has interpretable models. Despite being an important branch of machine learning, Bayesian inference generally has been overlooked by the architecture and systems communities. In this paper, we facilitate the study of Bayesian inference with the development of BayesSuite, a collection of seminal Bayesian inference workloads. We characterize the power and performance profiles of BayesSuite across a variety of current-generation processors and find significant diversity. Manually tuning and deploying Bayesian inference workloads requires deep understanding of the workload characteristics and hardware specifications. To address these challenges and provide high-performance, energy-efficient support for Bayesian inference, we introduce a scheduling and optimization mechanism that can be plugged into a system scheduler. We also propose a computation elision technique that further improves the performance and energy efficiency of the workloads by skipping computations that do not improve the quality of the inference. Our proposed techniques are able to increase Bayesian inference performance by 5.8 &#x00D7; on average over the naive assignment and execution of the workloads.", "abstracts": [ { "abstractType": "Regular", "content": "The recent surge of machine learning has motivated computer architects to focus intently on accelerating related workloads, especially in deep learning. Deep learning has been the pillar algorithm that has led the advancement of learning patterns from a vast amount of labeled data, or supervised learning. However, for unsupervised learning, Bayesian methods often work better than deep learning. Bayesian modeling and inference works well with unlabeled or limited data, can leverage informative priors, and has interpretable models. Despite being an important branch of machine learning, Bayesian inference generally has been overlooked by the architecture and systems communities. In this paper, we facilitate the study of Bayesian inference with the development of BayesSuite, a collection of seminal Bayesian inference workloads. We characterize the power and performance profiles of BayesSuite across a variety of current-generation processors and find significant diversity. Manually tuning and deploying Bayesian inference workloads requires deep understanding of the workload characteristics and hardware specifications. To address these challenges and provide high-performance, energy-efficient support for Bayesian inference, we introduce a scheduling and optimization mechanism that can be plugged into a system scheduler. We also propose a computation elision technique that further improves the performance and energy efficiency of the workloads by skipping computations that do not improve the quality of the inference. Our proposed techniques are able to increase Bayesian inference performance by 5.8 &#x00D7; on average over the naive assignment and execution of the workloads.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The recent surge of machine learning has motivated computer architects to focus intently on accelerating related workloads, especially in deep learning. Deep learning has been the pillar algorithm that has led the advancement of learning patterns from a vast amount of labeled data, or supervised learning. However, for unsupervised learning, Bayesian methods often work better than deep learning. Bayesian modeling and inference works well with unlabeled or limited data, can leverage informative priors, and has interpretable models. Despite being an important branch of machine learning, Bayesian inference generally has been overlooked by the architecture and systems communities. In this paper, we facilitate the study of Bayesian inference with the development of BayesSuite, a collection of seminal Bayesian inference workloads. We characterize the power and performance profiles of BayesSuite across a variety of current-generation processors and find significant diversity. Manually tuning and deploying Bayesian inference workloads requires deep understanding of the workload characteristics and hardware specifications. To address these challenges and provide high-performance, energy-efficient support for Bayesian inference, we introduce a scheduling and optimization mechanism that can be plugged into a system scheduler. We also propose a computation elision technique that further improves the performance and energy efficiency of the workloads by skipping computations that do not improve the quality of the inference. Our proposed techniques are able to increase Bayesian inference performance by 5.8 × on average over the naive assignment and execution of the workloads.", "fno": "08695637", "keywords": [ "Bayes Methods", "Inference Algorithms", "Data Models", "Computational Modeling", "Deep Learning", "Biological System Modeling", "Approximation Algorithms", "Machine Learning", "Bayesian Inference", "Workload Characterization" ], "authors": [ { "affiliation": "Harvard University, John A. Paulson School of Engineering and Applied Sciences", "fullName": "Yu Emma Wang", "givenName": "Yu", "surname": "Emma Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, University of Rochester", "fullName": "Yuhao Zhu", "givenName": "Yuhao", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Harvard University, John A. Paulson School of Engineering and Applied Sciences", "fullName": "Glenn G. Ko", "givenName": "Glenn G.", "surname": "Ko", "__typename": "ArticleAuthorType" }, { "affiliation": "Facebook", "fullName": "Brandon Reagen", "givenName": "Brandon", "surname": "Reagen", "__typename": "ArticleAuthorType" }, { "affiliation": "Harvard University, John A. Paulson School of Engineering and Applied Sciences", "fullName": "Gu-Yeon Wei", "givenName": "Gu-Yeon", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "Harvard University, John A. Paulson School of Engineering and Applied Sciences", "fullName": "David Brooks", "givenName": "David", "surname": "Brooks", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispass", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "177-189", "year": "2019", "issn": null, "isbn": "978-1-7281-0746-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08695654", "articleId": "19wBcUX6CPe", "__typename": "AdjacentArticleType" }, "next": { "fno": "08695670", "articleId": "19wBdqnKSM8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2018/4368/0/436801a034", "title": "A Parallel Algorithm for Bayesian Network Inference Using Arithmetic Circuits", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2018/436801a034/12OmNBfIhcG", "parentPublication": { "id": "proceedings/ipdps/2018/4368/0", "title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2018/4975/0/497501a666", "title": "Implementation of Bayesian Inference In Distributed Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a666/12OmNBh8gUF", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143a016", "title": "Neural Networks for Astronomical Data Analysis and Bayesian Inference", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143a016/12OmNCbU2Sl", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837851", "title": "Streaming Model Selection via Online Factorized Asymptotic Bayesian Inference", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837851/12OmNs0C9N5", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323816", "title": "Automated design of Bayesian perceptual inference networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323816/12OmNyaGeMF", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icciis/2010/4260/0/4260a113", "title": "Bayesian Statistical Inference in Machine Learning Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icciis/2010/4260a113/12OmNylKAKa", "parentPublication": { "id": "proceedings/icciis/2010/4260/0", "title": "Communications and Intelligence Information Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2019/02/07885532", "title": "Exact Inference Techniques for the Analysis of Bayesian Attack Graphs", "doi": null, "abstractUrl": "/journal/tq/2019/02/07885532/13rRUy3gn8T", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594893", "title": "Collapsed Variational Inference for Nonparametric Bayesian Group Factor Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594893/17D45WHONnn", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/07/08611362", "title": "An Empirical Study on Distributed Bayesian Approximation Inference of Piecewise Sparse Linear Models", "doi": null, "abstractUrl": "/journal/td/2019/07/08611362/17D45We0UEN", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2022/6016/2/601602a088", "title": "Community Embeddings with Bayesian Gaussian Mixture Model and Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/cbi/2022/601602a088/1Ik9hnbU3K0", "parentPublication": { "id": "proceedings/cbi/2022/6016/2", "title": "2022 IEEE 24th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6k6ngNoY", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "acronym": "icris", "groupId": "1816104", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cI6pv99wAw", "doi": "10.1109/ICRIS.2019.00125", "title": "Uncertainty Evaluation Method of Electric Field Probe Based on Bayesian Principle", "normalizedTitle": "Uncertainty Evaluation Method of Electric Field Probe Based on Bayesian Principle", "abstract": "In the calibration and detection of electric field strength, the importance of evaluating the uncertainty of the electric field probe to the reliability of the characterization results is self-evident. At present, the evaluation of the uncertainty of the electric field probe mainly adopts the method B of the Guide to the Expression of Uncertainty in Measurement (GUM), and no calibration or experimental data is used for this method, which results in waste of data and cannot satisfy different requirements. Uncertainty evaluation under conditions, based on Bayesian theory, proposes that the measurement results of the GTEM (Gigahertz Transverse Electromagnetic) cell have prior information and the evaluation method without uncertainty prior to the information to meet the different Needs under conditions. Comparing with GUM method, it is verified that Bayesian principle can be used to better evaluate the uncertainty of electric field probe under different conditions in GTEM cell, and has higher credibility.", "abstracts": [ { "abstractType": "Regular", "content": "In the calibration and detection of electric field strength, the importance of evaluating the uncertainty of the electric field probe to the reliability of the characterization results is self-evident. At present, the evaluation of the uncertainty of the electric field probe mainly adopts the method B of the Guide to the Expression of Uncertainty in Measurement (GUM), and no calibration or experimental data is used for this method, which results in waste of data and cannot satisfy different requirements. Uncertainty evaluation under conditions, based on Bayesian theory, proposes that the measurement results of the GTEM (Gigahertz Transverse Electromagnetic) cell have prior information and the evaluation method without uncertainty prior to the information to meet the different Needs under conditions. Comparing with GUM method, it is verified that Bayesian principle can be used to better evaluate the uncertainty of electric field probe under different conditions in GTEM cell, and has higher credibility.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the calibration and detection of electric field strength, the importance of evaluating the uncertainty of the electric field probe to the reliability of the characterization results is self-evident. At present, the evaluation of the uncertainty of the electric field probe mainly adopts the method B of the Guide to the Expression of Uncertainty in Measurement (GUM), and no calibration or experimental data is used for this method, which results in waste of data and cannot satisfy different requirements. Uncertainty evaluation under conditions, based on Bayesian theory, proposes that the measurement results of the GTEM (Gigahertz Transverse Electromagnetic) cell have prior information and the evaluation method without uncertainty prior to the information to meet the different Needs under conditions. Comparing with GUM method, it is verified that Bayesian principle can be used to better evaluate the uncertainty of electric field probe under different conditions in GTEM cell, and has higher credibility.", "fno": "263200a479", "keywords": [ "Bayes Methods", "Calibration", "Electric Field Measurement", "Electric Noise Measurement", "Measurement Uncertainty", "Probes", "TEM Cells", "Electric Field Probe", "Bayesian Principle", "Electric Field Strength", "Uncertainty Evaluation Method", "Guide To The Expression Of Uncertainty In Measurement", "GUM Method B", "Gigahertz Transverse Electromagnetic Cell", "GTEM Cell", "Electric Fields", "Uncertainty", "Measurement Uncertainty", "Probes", "Current Measurement", "Bayes Methods", "Uncertainty Bayesian Method With Without A Priori Information Electric Field Probe GTEM Cell" ], "authors": [ { "affiliation": "State Grid Anhui Electric Power Research Institute.", "fullName": "Jinfei Qin", "givenName": "Jinfei", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Anhui Electric Power Research Institute.", "fullName": "Qi Zhu", "givenName": "Qi", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "China Electric Power Research Institute", "fullName": "Wei Zhou", "givenName": "Wei", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Jingjiang Power Supply Branch of State Grid Jiangsu Electric Power Co., Ltd", "fullName": "Li Xue", "givenName": "Li", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electronic Information, Wuhan University", "fullName": "Bingbing Cai", "givenName": "Bingbing", "surname": "Cai", "__typename": "ArticleAuthorType" } ], "idPrefix": "icris", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "479-484", "year": "2019", "issn": null, "isbn": "978-1-7281-2632-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "263200a474", "articleId": "1cI6poWfsd2", "__typename": "AdjacentArticleType" }, "next": { "fno": "263200a485", "articleId": "1cI6nDstCMg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670c546", "title": "Electric Energy Storage Arbitrage in Electric Power Markets with Wind Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670c546/12OmNAYXWEa", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2009/4879/0/05255403", "title": "Hierarchical clustering of microarray data with probe-level uncertainty", "doi": null, "abstractUrl": "/proceedings-article/cbms/2009/05255403/12OmNC4eSvp", "parentPublication": { "id": "proceedings/cbms/2009/4879/0", "title": "2009 22nd IEEE International Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2012/2698/0/06417571", "title": "SG128 multi-probe spherical near-field antenna test range and novel antenna measurements", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2012/06417571/12OmNwFid1a", "parentPublication": { "id": "proceedings/chinacom/2012/2698/0", "title": "7th International Conference on Communications and Networking in China", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726646", "title": "Minimization of position uncertainty using 3-D stereo imaging technique for the real-time positioning of a handheld breast tissue anomaly detection probe", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726646/12OmNySosNP", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2014/5041/0/06962190", "title": "Environmental EMF monitoring in the SEMONT system using quad-band AMB 8057/03 sensor", "doi": null, "abstractUrl": "/proceedings-article/wimob/2014/06962190/12OmNzV70qg", "parentPublication": { "id": "proceedings/wimob/2014/5041/0", "title": "2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewdts/2018/5710/0/08524783", "title": "Reconstruction Algorithm of Electromagnetic Field in Case of Elliptic Polarization of Near-Field Probe", "doi": null, "abstractUrl": "/proceedings-article/ewdts/2018/08524783/17D45WIXbPp", "parentPublication": { "id": "proceedings/ewdts/2018/5710/0", "title": "2018 IEEE East-West Design & Test Symposium (EWDTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a474", "title": "Uncertainty Evaluation and Calibrationof Electric Field Probe Under GTEM Cell", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a474/1cI6poWfsd2", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctec/2017/5784/0/578400a994", "title": "Three-Dimensional Pulse Electric Field Test System with Optical Fiber", "doi": null, "abstractUrl": "/proceedings-article/icctec/2017/578400a994/1cks7vLuN1u", "parentPublication": { "id": "proceedings/icctec/2017/5784/0", "title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a085", "title": "A New Probe for Electromagnetic Compatibility and Electromagnetic Interference Detection", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a085/1tzziRKOctq", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aemcse/2021/1596/0/159600a773", "title": "Evaluation of Measurement Uncertainty of Non-contact 3D Measuring Machine", "doi": null, "abstractUrl": "/proceedings-article/aemcse/2021/159600a773/1wcdgSo6YBa", "parentPublication": { "id": "proceedings/aemcse/2021/1596/0", "title": "2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1i5mkDyiIUg", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1i5mK1qWcj6", "doi": "10.1109/ICCVW.2019.00102", "title": "Efficient Priors for Scalable Variational Inference in Bayesian Deep Neural Networks", "normalizedTitle": "Efficient Priors for Scalable Variational Inference in Bayesian Deep Neural Networks", "abstract": "Stochastic variational inference for Bayesian deep neural networks (DNNs) requires specifying priors and approximate posterior distributions for neural network weights. Specifying meaningful weight priors is a challenging problem, particularly for scaling variational inference to deeper architectures involving high dimensional weight space. Based on empirical Bayes approach, we propose Bayesian MOdel Priors Extracted from Deterministic DNN (MOPED) method to choose meaningful prior distributions over weight space using deterministic weights derived from the pretrained DNNs of equivalent architecture. We empirically evaluate the proposed approach on real-world applications including image classification, video activity recognition and audio classification tasks with varying complex neural network architectures. The proposed method enables scalable variational inference with faster training convergence and provides reliable uncertainty quantification.", "abstracts": [ { "abstractType": "Regular", "content": "Stochastic variational inference for Bayesian deep neural networks (DNNs) requires specifying priors and approximate posterior distributions for neural network weights. Specifying meaningful weight priors is a challenging problem, particularly for scaling variational inference to deeper architectures involving high dimensional weight space. Based on empirical Bayes approach, we propose Bayesian MOdel Priors Extracted from Deterministic DNN (MOPED) method to choose meaningful prior distributions over weight space using deterministic weights derived from the pretrained DNNs of equivalent architecture. We empirically evaluate the proposed approach on real-world applications including image classification, video activity recognition and audio classification tasks with varying complex neural network architectures. The proposed method enables scalable variational inference with faster training convergence and provides reliable uncertainty quantification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stochastic variational inference for Bayesian deep neural networks (DNNs) requires specifying priors and approximate posterior distributions for neural network weights. Specifying meaningful weight priors is a challenging problem, particularly for scaling variational inference to deeper architectures involving high dimensional weight space. Based on empirical Bayes approach, we propose Bayesian MOdel Priors Extracted from Deterministic DNN (MOPED) method to choose meaningful prior distributions over weight space using deterministic weights derived from the pretrained DNNs of equivalent architecture. We empirically evaluate the proposed approach on real-world applications including image classification, video activity recognition and audio classification tasks with varying complex neural network architectures. The proposed method enables scalable variational inference with faster training convergence and provides reliable uncertainty quantification.", "fno": "502300a773", "keywords": [ "Bayes Methods", "Neural Net Architecture", "Statistical Distributions", "Stochastic Processes", "Scalable Variational Inference", "Bayesian Deep Neural Networks", "Stochastic Variational Inference", "Approximate Posterior Distributions", "Neural Network Weights", "High Dimensional Weight Space", "Empirical Bayes Approach", "Bayesian Model Priors Extracted", "Deterministic DNN Method", "Deterministic Weights", "Complex Neural Network Architectures", "Bayes Methods", "Uncertainty", "Motorcycles", "Neural Networks", "Training", "Mathematical Model", "Convergence", "Bayesian Deep Neural Networks", "Variational Inference", "Uncertainty Estimates", "Bayesian Priors" ], "authors": [ { "affiliation": "Intel Corporation", "fullName": "Ranganath Krishnan", "givenName": "Ranganath", "surname": "Krishnan", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel Corporation", "fullName": "Mahesh Subedar", "givenName": "Mahesh", "surname": "Subedar", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel Corporation", "fullName": "Omesh Tickoo", "givenName": "Omesh", "surname": "Tickoo", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "773-777", "year": "2019", "issn": null, "isbn": "978-1-7281-5023-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "502300a768", "articleId": "1i5mFWZRAlO", "__typename": "AdjacentArticleType" }, "next": { "fno": "502300a778", "articleId": "1i5mD4Vpsas", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcnn/2009/3548/0/05179054", "title": "Adaptive fuzzy priors for Bayesian inference", "doi": null, "abstractUrl": "/proceedings-article/ijcnn/2009/05179054/12OmNBkP3Db", "parentPublication": { "id": "proceedings/ijcnn/2009/3548/0", "title": "Neural Networks, IEEE - INNS - ENNS International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796966", "title": "Informative Priors and Bayesian Computation", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796966/12OmNyUWR0I", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837836", "title": "Triply Stochastic Variational Inference for Non-linear Beta Process Factor Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837836/12OmNzZWbxd", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b566", "title": "Stochastic Variational Inference with Gradient Linearization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b566/17D45VsBTWN", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/08/08588399", "title": "Advances in Variational Inference", "doi": null, "abstractUrl": "/journal/tp/2019/08/08588399/17D45W2Wyy3", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2022/6016/2/601602a088", "title": "Community Embeddings with Bayesian Gaussian Mixture Model and Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/cbi/2022/601602a088/1Ik9hnbU3K0", "parentPublication": { "id": "proceedings/cbi/2022/6016/2", "title": "2022 IEEE 24th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j904", "title": "Robust Variational Bayesian Point Set Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j904/1hVlHrBgBrO", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g300", "title": "Uncertainty-Aware Audiovisual Activity Recognition Using Deep Bayesian Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g300/1hVlgMvYDMQ", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047425", "title": "Accelerated Stochastic Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047425/1iC6rO3XnfG", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800m2000", "title": "Scalable Uncertainty for Computer Vision With Functional Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800m2000/1m3o9KDbDwc", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbcPb76hO", "doi": "10.1109/WACV45572.2020.9093293", "title": "Deep Bayesian Network for Visual Question Generation", "normalizedTitle": "Deep Bayesian Network for Visual Question Generation", "abstract": "Generating natural questions from an image is a semantic task that requires using vision and language modalities to learn multimodal representations. Images can have multiple visual and language cues such as places, captions, and tags. In this paper, we propose a principled deep Bayesian learning framework that combines these cues to produce natural questions. We observe that with the addition of more cues and by minimizing uncertainty in the among cues, the Bayesian network becomes more confident. We propose a Minimizing Uncertainty of Mixture of Cues (MUMC), that minimizes uncertainty present in a mixture of cues experts for generating probabilistic questions. This is a Bayesian framework and the results show a remarkable similarity to natural questions as validated by a human study. We observe that with the addition of more cues and by minimizing uncertainty among the cues, the Bayesian framework becomes more confident. Ablation studies of our model indicate that a subset of cues is inferior at this task and hence the principled fusion of cues is preferred. Further, we observe that the proposed approach substantially improves over state-of-the-art benchmarks on the quantitative metrics (BLEU-n, METEOR, ROUGE, and CIDEr). Here we provide project link for Deep Bayesian VQG https: //delta-lab-iitk.github.io/BVQG/.", "abstracts": [ { "abstractType": "Regular", "content": "Generating natural questions from an image is a semantic task that requires using vision and language modalities to learn multimodal representations. Images can have multiple visual and language cues such as places, captions, and tags. In this paper, we propose a principled deep Bayesian learning framework that combines these cues to produce natural questions. We observe that with the addition of more cues and by minimizing uncertainty in the among cues, the Bayesian network becomes more confident. We propose a Minimizing Uncertainty of Mixture of Cues (MUMC), that minimizes uncertainty present in a mixture of cues experts for generating probabilistic questions. This is a Bayesian framework and the results show a remarkable similarity to natural questions as validated by a human study. We observe that with the addition of more cues and by minimizing uncertainty among the cues, the Bayesian framework becomes more confident. Ablation studies of our model indicate that a subset of cues is inferior at this task and hence the principled fusion of cues is preferred. Further, we observe that the proposed approach substantially improves over state-of-the-art benchmarks on the quantitative metrics (BLEU-n, METEOR, ROUGE, and CIDEr). Here we provide project link for Deep Bayesian VQG https: //delta-lab-iitk.github.io/BVQG/.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generating natural questions from an image is a semantic task that requires using vision and language modalities to learn multimodal representations. Images can have multiple visual and language cues such as places, captions, and tags. In this paper, we propose a principled deep Bayesian learning framework that combines these cues to produce natural questions. We observe that with the addition of more cues and by minimizing uncertainty in the among cues, the Bayesian network becomes more confident. We propose a Minimizing Uncertainty of Mixture of Cues (MUMC), that minimizes uncertainty present in a mixture of cues experts for generating probabilistic questions. This is a Bayesian framework and the results show a remarkable similarity to natural questions as validated by a human study. We observe that with the addition of more cues and by minimizing uncertainty among the cues, the Bayesian framework becomes more confident. Ablation studies of our model indicate that a subset of cues is inferior at this task and hence the principled fusion of cues is preferred. Further, we observe that the proposed approach substantially improves over state-of-the-art benchmarks on the quantitative metrics (BLEU-n, METEOR, ROUGE, and CIDEr). Here we provide project link for Deep Bayesian VQG https: //delta-lab-iitk.github.io/BVQG/.", "fno": "09093293", "keywords": [ "Bayes Methods", "Belief Networks", "Computer Vision", "Image Retrieval", "Learning Artificial Intelligence", "Language Modalities", "Vision Modalities", "MUMC", "Minimizing Uncertainty Of Mixture Of Cues", "Deep Bayesian Learning Framework", "Visual Question Generation", "Deep Bayesian Network", "Bayes Methods", "Task Analysis", "Visualization", "Uncertainty", "Decoding", "Probabilistic Logic", "Semantics" ], "authors": [ { "affiliation": "Indian Institute of Technology,Kanpur", "fullName": "Badri N. Patro", "givenName": "Badri N.", "surname": "Patro", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Technology,Kanpur", "fullName": "Vinod K. Kurmi", "givenName": "Vinod K.", "surname": "Kurmi", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Technology,Kanpur", "fullName": "Sandeep Kumar", "givenName": "Sandeep", "surname": "Kumar", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Technology,Kanpur", "fullName": "Vinay P. Namboodiri", "givenName": "Vinay P.", "surname": "Namboodiri", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "1555-1565", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093596", "articleId": "1jPbmNJkjUk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093295", "articleId": "1jPbDurL19m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851e976", "title": "Answer-Type Prediction for Visual Question Answering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851e976/12OmNzBOi8w", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/12/07562516", "title": "Towards Bayesian Deep Learning: A Framework and Some Existing Methods", "doi": null, "abstractUrl": "/journal/tk/2016/12/07562516/13rRUNvyaln", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a479", "title": "Uncertainty Evaluation Method of Electric Field Probe Based on Bayesian Principle", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a479/1cI6pv99wAw", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a270", "title": "An Efficient Bayesian Method for Advancing the Application of Deep Learning in Earth Science", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a270/1gAx177rzsQ", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g300", "title": "Uncertainty-Aware Audiovisual Activity Recognition Using Deep Bayesian Variational Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g300/1hVlgMvYDMQ", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a773", "title": "Efficient Priors for Scalable Variational Inference in Bayesian Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a773/1i5mK1qWcj6", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150658", "title": "Evaluating Scalable Bayesian Deep Learning Methods for Robust Computer Vision", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150658/1lPHjiK2I24", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216507", "title": "Bayesian-Assisted Inference from Visualized Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216507/1nJsGTrLDPO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412403", "title": "In Depth Bayesian Semantic Scene Completion", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412403/1tmjfzEHeEg", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2020/9986/0/998600a145", "title": "Fault Diagnosis Method of Power System Based on Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/aiam/2020/998600a145/1tweSO0GpDW", "parentPublication": { "id": "proceedings/aiam/2020/9986/0", "title": "2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1EmsKLtPkk0", "title": "2022 IEEE/ACM 10th International Conference on Formal Methods in Software Engineering (FormaliSE)", "acronym": "formalise", "groupId": "1802773", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1EmsM9O9EYw", "doi": "10.1145/3524482.3527651", "title": "Towards Automated Input Generation for Sketching Alloy Models", "normalizedTitle": "Towards Automated Input Generation for Sketching Alloy Models", "abstract": "Writing declarative models has numerous benefits, ranging from automated reasoning and correction of design-level properties before systems are built, to automated testing and debugging of their implementations after they are built. Alloy is a declarative modeling language that is well suited for verifying system designs. While Alloy comes deployed in the Analyzer, an automated scenario-finding tool set, writing correct models remains a difficult and error-prone task. ASketch is a synthesis framework that helps users build their Alloy models. ASketch takes as an input a partial Alloy models with holes and an A Unit test suite. As output, ASketch returns a completed model that passes all tests. ASketch&#x2019;s initial evaluation reveals ASketch to be a promising approach to synthesize Alloy models. In this paper, we present and explore SketchGen<sup>2</sup>, an approach that looks to broaden the adoption of ASketch by increasing the automation of the inputs needed for the sketching process. Experimental results show SketchGen<sup>2</sup> is effective at producing both expressions and test suites for synthesis.", "abstracts": [ { "abstractType": "Regular", "content": "Writing declarative models has numerous benefits, ranging from automated reasoning and correction of design-level properties before systems are built, to automated testing and debugging of their implementations after they are built. Alloy is a declarative modeling language that is well suited for verifying system designs. While Alloy comes deployed in the Analyzer, an automated scenario-finding tool set, writing correct models remains a difficult and error-prone task. ASketch is a synthesis framework that helps users build their Alloy models. ASketch takes as an input a partial Alloy models with holes and an A Unit test suite. As output, ASketch returns a completed model that passes all tests. ASketch&#x2019;s initial evaluation reveals ASketch to be a promising approach to synthesize Alloy models. In this paper, we present and explore SketchGen<sup>2</sup>, an approach that looks to broaden the adoption of ASketch by increasing the automation of the inputs needed for the sketching process. Experimental results show SketchGen<sup>2</sup> is effective at producing both expressions and test suites for synthesis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Writing declarative models has numerous benefits, ranging from automated reasoning and correction of design-level properties before systems are built, to automated testing and debugging of their implementations after they are built. Alloy is a declarative modeling language that is well suited for verifying system designs. While Alloy comes deployed in the Analyzer, an automated scenario-finding tool set, writing correct models remains a difficult and error-prone task. ASketch is a synthesis framework that helps users build their Alloy models. ASketch takes as an input a partial Alloy models with holes and an A Unit test suite. As output, ASketch returns a completed model that passes all tests. ASketch’s initial evaluation reveals ASketch to be a promising approach to synthesize Alloy models. In this paper, we present and explore SketchGen2, an approach that looks to broaden the adoption of ASketch by increasing the automation of the inputs needed for the sketching process. Experimental results show SketchGen2 is effective at producing both expressions and test suites for synthesis.", "fno": "928700a058", "keywords": [ "Program Debugging", "Program Testing", "Test Suites", "Declarative Models", "Automated Reasoning", "Design Level Properties", "Automated Testing", "Debugging", "Declarative Modeling Language", "Automated Scenario Finding Tool", "Partial Alloy Models", "A Unit Test Suite", "A Sketch", "Automated Input Generation", "Sketch Gen Approach", "Sketching Process", "Automation", "Metals", "Debugging", "Writing", "Software", "Distance Measurement", "Cognition" ], "authors": [ { "affiliation": "The University of Texas at Arlington,Arlington,TX,USA", "fullName": "Ana Jovanovic", "givenName": "Ana", "surname": "Jovanovic", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Texas at Arlington,Arlington,TX,USA", "fullName": "Allison Sullivan", "givenName": "Allison", "surname": "Sullivan", "__typename": "ArticleAuthorType" } ], "idPrefix": "formalise", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "58-68", "year": "2022", "issn": null, "isbn": "978-1-4503-9287-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928700a046", "articleId": "1EmsNerUQjC", "__typename": "AdjacentArticleType" }, "next": { "fno": "928700a069", "articleId": "1EmsM1lAWBi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/modelsward/2014/8066/0/07018487", "title": "Automated composition of sequence diagrams via alloy", "doi": null, "abstractUrl": "/proceedings-article/modelsward/2014/07018487/12OmNC4wtsl", "parentPublication": { "id": "proceedings/modelsward/2014/8066/0", "title": "2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2017/6031/0/6031a264", "title": "Automated Test Generation and Mutation Testing for Alloy", "doi": null, "abstractUrl": "/proceedings-article/icst/2017/6031a264/12OmNvlxJu1", "parentPublication": { "id": "proceedings/icst/2017/6031/0", "title": "2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a569", "title": "HawkEye: User-Guided Enumeration of Scenarios", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a569/1AUp3XYNj2w", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2021/0337/0/033700b213", "title": "BeAFix: An Automated Repair Tool for Faulty Alloy Models", "doi": null, "abstractUrl": "/proceedings-article/ase/2021/033700b213/1AjSYpiyADe", "parentPublication": { "id": "proceedings/ase/2021/0337/0", "title": "2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2022/5132/0/513200a229", "title": "REACH: Refining Alloy Scenarios by Size (Tools and Artifact Track)", "doi": null, "abstractUrl": "/proceedings-article/issre/2022/513200a229/1JhTKCKo2DC", "parentPublication": { "id": "proceedings/issre/2022/5132/0", "title": "2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a103", "title": "ARepair: A Repair Framework for Alloy", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a103/1cJ7n5gDKEM", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2018/5937/0/09000095", "title": "Automated Model Repair for Alloy", "doi": null, "abstractUrl": "/proceedings-article/ase/2018/09000095/1htBNVzwN5S", "parentPublication": { "id": "proceedings/ase/2018/5937/0", "title": "2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a844", "title": "Debugging Declarative Models in Alloy", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a844/1oqKM2xcyBi", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2021/1219/0/121900a209", "title": "Artifact of Bounded Exhaustive Search of Alloy Specification Repairs", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2021/121900a209/1sET70MsEsU", "parentPublication": { "id": "proceedings/icse-companion/2021/1219/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600b135", "title": "Bounded Exhaustive Search of Alloy Specification Repairs", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600b135/1sEXp3mG0Du", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1phRpGBKvFS", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1phRJBMoe1G", "doi": "10.1109/FIE44824.2020.9274157", "title": "Using Evidence Based Practices and Learning to Enhance Critical Thinking Skills in Students Through Data Visualization", "normalizedTitle": "Using Evidence Based Practices and Learning to Enhance Critical Thinking Skills in Students Through Data Visualization", "abstract": "This research-to-practice work in progress paper outlines the use of evidence-based practices and learning to enhance critical thinking skills in students through data visualization. Data visualization is a multi-stage process that enables the transformation of complex data into visual representations that inform without overwhelming its audience. The purpose of this study is to investigate how data visualization learning experiences enhances students' critical thinking skills. In this paper we identify the conceptualization of critical thinking in the data visualization process. A design-based research approach is used to empirically investigate the main research question: after participating in data visualization learning experiences, in what ways do students engage in design practices that enhance development of critical thinking skills? The working hypothesis is students experience greater learning gains when instructions include design challenges integrated with the data visualization process and mapped to critical thinking that requires them to exhibit higher-order-thinking skills. The first aim of the study is to identify critical thinking skills that are evident in the data visualization process. The second aim is to identify habits of the mind competencies that are evident in the data visualization process. The implications of this work will inform the implementation of the Paul-Elder critical thinking framework into the data visualization process with the goal of building essential intellectual traits in undergraduates. In this work, the data visualization process facilitates the logical structure of connected elements of higher-order thinking that relate to one another within the theoretical frameworks of critical thinking and habits of the mind. This research is significant because it informs the practice of engineering through a problem-solving activity and computing education by introducing data visualization as method for improving critical thinking skills; a requirement for STEM students, a desired skill for all students.", "abstracts": [ { "abstractType": "Regular", "content": "This research-to-practice work in progress paper outlines the use of evidence-based practices and learning to enhance critical thinking skills in students through data visualization. Data visualization is a multi-stage process that enables the transformation of complex data into visual representations that inform without overwhelming its audience. The purpose of this study is to investigate how data visualization learning experiences enhances students' critical thinking skills. In this paper we identify the conceptualization of critical thinking in the data visualization process. A design-based research approach is used to empirically investigate the main research question: after participating in data visualization learning experiences, in what ways do students engage in design practices that enhance development of critical thinking skills? The working hypothesis is students experience greater learning gains when instructions include design challenges integrated with the data visualization process and mapped to critical thinking that requires them to exhibit higher-order-thinking skills. The first aim of the study is to identify critical thinking skills that are evident in the data visualization process. The second aim is to identify habits of the mind competencies that are evident in the data visualization process. The implications of this work will inform the implementation of the Paul-Elder critical thinking framework into the data visualization process with the goal of building essential intellectual traits in undergraduates. In this work, the data visualization process facilitates the logical structure of connected elements of higher-order thinking that relate to one another within the theoretical frameworks of critical thinking and habits of the mind. This research is significant because it informs the practice of engineering through a problem-solving activity and computing education by introducing data visualization as method for improving critical thinking skills; a requirement for STEM students, a desired skill for all students.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This research-to-practice work in progress paper outlines the use of evidence-based practices and learning to enhance critical thinking skills in students through data visualization. Data visualization is a multi-stage process that enables the transformation of complex data into visual representations that inform without overwhelming its audience. The purpose of this study is to investigate how data visualization learning experiences enhances students' critical thinking skills. In this paper we identify the conceptualization of critical thinking in the data visualization process. A design-based research approach is used to empirically investigate the main research question: after participating in data visualization learning experiences, in what ways do students engage in design practices that enhance development of critical thinking skills? The working hypothesis is students experience greater learning gains when instructions include design challenges integrated with the data visualization process and mapped to critical thinking that requires them to exhibit higher-order-thinking skills. The first aim of the study is to identify critical thinking skills that are evident in the data visualization process. The second aim is to identify habits of the mind competencies that are evident in the data visualization process. The implications of this work will inform the implementation of the Paul-Elder critical thinking framework into the data visualization process with the goal of building essential intellectual traits in undergraduates. In this work, the data visualization process facilitates the logical structure of connected elements of higher-order thinking that relate to one another within the theoretical frameworks of critical thinking and habits of the mind. This research is significant because it informs the practice of engineering through a problem-solving activity and computing education by introducing data visualization as method for improving critical thinking skills; a requirement for STEM students, a desired skill for all students.", "fno": "09274157", "keywords": [ "Computer Aided Instruction", "Data Visualisation", "Further Education", "Enhance Critical Thinking Skills", "Evidence Based Practices", "Data Visualization Learning Experiences", "Higher Order Thinking Skills", "Paul Elder Critical Thinking Framework", "Undergraduates", "Data Visualization", "Problem Solving", "Cognition", "Task Analysis", "Standards", "Employment", "Decision Making", "Data Visualization", "Critical Thinking", "Evidence Based Practices" ], "authors": [ { "affiliation": "Purdue University,Computer Graphics Technology,West Lafayette,IN,USA", "fullName": "Vetria L. Byrd", "givenName": "Vetria L.", "surname": "Byrd", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue Univeristy,Technology Leadership & Innovation / Curriculum & Instruction,West Lafayette,IN,USA", "fullName": "Paul A. Asunda", "givenName": "Paul A.", "surname": "Asunda", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "1-9", "year": "2020", "issn": null, "isbn": "978-1-7281-8961-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09274132", "articleId": "1phRPhyMLqU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09274054", "articleId": "1phRuRXWxKo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a414", "title": "FATHOM: TEL Environment to Develop Divergent and Convergent Thinking Skills in Software Design", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a414/12OmNBTs7rk", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2017/0629/0/0629a254", "title": "Study on Teaching Methods for Developing Higher Order Thinking Skills for College Students in Flipping Classroom", "doi": null, "abstractUrl": "/proceedings-article/eitt/2017/0629a254/12OmNvStcR3", "parentPublication": { "id": "proceedings/eitt/2017/0629/0", "title": "2017 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01611971", "title": "Developing the Complex Thinking Skills Required in Today's Global Economy", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01611971/12OmNxvwoY2", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a419", "title": "A Vocal Assessment Approach to Measure Elementary School Students’ Critical Thinking Skills", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a419/12OmNzE54yF", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicm/2013/5133/0/5133a057", "title": "Authentic Learning Strategies to Engage Student's Creative and Critical Thinking", "doi": null, "abstractUrl": "/proceedings-article/icicm/2013/5133a057/12OmNzJbQXc", "parentPublication": { "id": "proceedings/icicm/2013/5133/0", "title": "2013 International Conference on Informatics and Creative Multimedia (ICICM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a054", "title": "Teaching and Learning of Divergent & Convergent Thinking Skills using DCT", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a054/12OmNzV70GB", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462475", "title": "Work in progress: Audio reflections provide evidence of metacognition during students' problem solving attempts", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462475/12OmNzmclYB", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a166", "title": "Technology Enhanced Learning (TEL) Environment to Develop Expansionist-Reductionist (ER) Thinking Skills through Software Design Problem Solving", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a166/17D45VTRosb", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a671", "title": "Discipline-Specific Critical Thinking Curriculum with A Problem Solving Life Cycle Framework", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a671/1gjRrTr4v2o", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2019/4752/0/09212993", "title": "A Collaborative Game-Based Learning Framework to Improve Computational Thinking Skills", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2019/09212993/1nHRUDZ2PjW", "parentPublication": { "id": "proceedings/icvrv/2019/4752/0", "title": "2019 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsk4yw", "title": "2008 38th Annual Frontiers in Education Conference", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwErpIx", "doi": "10.1109/FIE.2008.4720426", "title": "Analyzing large free-response qualitative data sets -- a novel quantitative-qualitative hybrid approach", "normalizedTitle": "Analyzing large free-response qualitative data sets -- a novel quantitative-qualitative hybrid approach", "abstract": "Qualitative analysis tends to be unwieldy for large data sets yet is an indispensable tool for understanding how and why phenomena occur. Consequently, the goal of this study was to develop a method that is credible yet economical for large, specific, qualitative data sets. The strength of our hybrid, qualitative-quantitative method comes from using automated text analysis techniques to focus resource-intensive coding efforts on a small, carefully selected subset of data. This paper details the hybrid method as applied to a previously analyzed set of free-response data and argues for the methodpsilas validity by comparing results from the hybrid analysis with the previous traditional qualitatively analyzed method. With this data set, the hybrid method yielded comparable results with substantially less manual coding and in less than a third of the time required for the original analysis method. This hybrid analysis provides a more economical alternative for a ldquocoarse-cutrdquo qualitative analysis and observation of long-term trends, providing insight to practitioners, assessors, and researchers ranging from individual course evaluations to large-scale studies. Short, focused, open-ended survey questions are good candidates for this type of analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Qualitative analysis tends to be unwieldy for large data sets yet is an indispensable tool for understanding how and why phenomena occur. Consequently, the goal of this study was to develop a method that is credible yet economical for large, specific, qualitative data sets. The strength of our hybrid, qualitative-quantitative method comes from using automated text analysis techniques to focus resource-intensive coding efforts on a small, carefully selected subset of data. This paper details the hybrid method as applied to a previously analyzed set of free-response data and argues for the methodpsilas validity by comparing results from the hybrid analysis with the previous traditional qualitatively analyzed method. With this data set, the hybrid method yielded comparable results with substantially less manual coding and in less than a third of the time required for the original analysis method. This hybrid analysis provides a more economical alternative for a ldquocoarse-cutrdquo qualitative analysis and observation of long-term trends, providing insight to practitioners, assessors, and researchers ranging from individual course evaluations to large-scale studies. Short, focused, open-ended survey questions are good candidates for this type of analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Qualitative analysis tends to be unwieldy for large data sets yet is an indispensable tool for understanding how and why phenomena occur. Consequently, the goal of this study was to develop a method that is credible yet economical for large, specific, qualitative data sets. The strength of our hybrid, qualitative-quantitative method comes from using automated text analysis techniques to focus resource-intensive coding efforts on a small, carefully selected subset of data. This paper details the hybrid method as applied to a previously analyzed set of free-response data and argues for the methodpsilas validity by comparing results from the hybrid analysis with the previous traditional qualitatively analyzed method. With this data set, the hybrid method yielded comparable results with substantially less manual coding and in less than a third of the time required for the original analysis method. This hybrid analysis provides a more economical alternative for a ldquocoarse-cutrdquo qualitative analysis and observation of long-term trends, providing insight to practitioners, assessors, and researchers ranging from individual course evaluations to large-scale studies. Short, focused, open-ended survey questions are good candidates for this type of analysis.", "fno": "04720426", "keywords": [ "Open Ended Survey Questions", "Free Response Qualitative Data Sets", "Qualitative Analysis", "Hybrid Qualitative Quantitative Method", "Automated Text Analysis", "Resource Intensive Coding", "Hybrid Analysis" ], "authors": [ { "affiliation": null, "fullName": "J. Light", "givenName": "J.", "surname": "Light", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Yasuhara", "givenName": "K.", "surname": "Yasuhara", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-10-01T00:00:00", "pubType": "proceedings", "pages": "F2B-21-F2B-25", "year": "2008", "issn": null, "isbn": "978-1-4244-1969-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04720425", "articleId": "12OmNyrIaKH", "__typename": "AdjacentArticleType" }, "next": { "fno": "04720427", "articleId": "12OmNyen1q0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icinis/2009/3852/0/3852a445", "title": "Qualitative Path Based on Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/icinis/2009/3852a445/12OmNAXPynq", "parentPublication": { "id": "proceedings/icinis/2009/3852/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbes/2009/3844/0/3844a227", "title": "Improving a Web Usability Inspection Technique Using Qualitative and Quantitative Data from an Observational Study", "doi": null, "abstractUrl": "/proceedings-article/sbes/2009/3844a227/12OmNAY79g9", "parentPublication": { "id": "proceedings/sbes/2009/3844/0", "title": "2009 XXIII Brazilian Symposium on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aswec/2009/3599/0/3599a345", "title": "Qualitative vs. Quantitative Software Process Simulation Modeling: Conversion and Comparison", "doi": null, "abstractUrl": "/proceedings-article/aswec/2009/3599a345/12OmNBrDqFj", "parentPublication": { "id": "proceedings/aswec/2009/3599/0", "title": "2009 Australian Software Engineering Conference (ASWEC 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/2/3865b068", "title": "Insurance Credit Evaluation Incorporated Qualitative and Quantitative Information", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865b068/12OmNwnYFXj", "parentPublication": { "id": "proceedings/iscid/2009/3865/2", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2008/3357/1/3357a665", "title": "Qualitative Simulation for the Global Performance of Conceptual Design", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357a665/12OmNxu6p8E", "parentPublication": { "id": "proceedings/icicta/2008/3357/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/qsic/2010/4131/0/4131a003", "title": "Automated Conformance Verification of Hybrid Systems", "doi": null, "abstractUrl": "/proceedings-article/qsic/2010/4131a003/12OmNz4Bdk9", "parentPublication": { "id": "proceedings/qsic/2010/4131/0", "title": "Quality Software, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/6/3736f414", "title": "Qualitative Motion Reasoning Based on Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f414/12OmNz5JC7V", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417947", "title": "Using interviews to Identify Student misconceptions in dynamics", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417947/12OmNzX6ckv", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/1/4513a404", "title": "Web Service Selection with Quantitative and Qualitative User Preferences", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513a404/12OmNzd7bv4", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1994/01/k0072", "title": "Representation of Qualitative User Preference by Quantitative Belief Functions", "doi": null, "abstractUrl": "/journal/tk/1994/01/k0072/13rRUwInvfk", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxzMnU0", "title": "2011 15th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxA3YVI", "doi": "10.1109/IV.2011.14", "title": "Knowledge Visualization in Qualitative Methods -- Or How Can I See What I Say?", "normalizedTitle": "Knowledge Visualization in Qualitative Methods -- Or How Can I See What I Say?", "abstract": "In several research fields, qualitative interviewing(i.e., face-to-face individual interviews and focus groups) is an essential approach to gather high-quality, and deep data about a wide range of subjective experiences. Although being a well-established research method, qualitative interviewing is fraught with various shortcomings such as difficulties in initiating the interview process, in eliciting tacit knowledge and in avoiding information redundancies. In this paper, we propose the use of visual tools (e.g., visualization software) as a support to facilitate the interview process and to gather sound qualitative data. Visual representations provide structure, context and explicitness, and thus foster knowledge elicitation and sharing in interviews. Our contribution is two-fold: First, we provide a methodological extension of qualitative interviewing. Second, we suggest a practical approach to use visuals in interviews, presenting concrete examples from the research field. We conclude our paper by discussing the limitations of our approach, and by suggesting directions for future research on visualization-based interviewing.", "abstracts": [ { "abstractType": "Regular", "content": "In several research fields, qualitative interviewing(i.e., face-to-face individual interviews and focus groups) is an essential approach to gather high-quality, and deep data about a wide range of subjective experiences. Although being a well-established research method, qualitative interviewing is fraught with various shortcomings such as difficulties in initiating the interview process, in eliciting tacit knowledge and in avoiding information redundancies. In this paper, we propose the use of visual tools (e.g., visualization software) as a support to facilitate the interview process and to gather sound qualitative data. Visual representations provide structure, context and explicitness, and thus foster knowledge elicitation and sharing in interviews. Our contribution is two-fold: First, we provide a methodological extension of qualitative interviewing. Second, we suggest a practical approach to use visuals in interviews, presenting concrete examples from the research field. We conclude our paper by discussing the limitations of our approach, and by suggesting directions for future research on visualization-based interviewing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In several research fields, qualitative interviewing(i.e., face-to-face individual interviews and focus groups) is an essential approach to gather high-quality, and deep data about a wide range of subjective experiences. Although being a well-established research method, qualitative interviewing is fraught with various shortcomings such as difficulties in initiating the interview process, in eliciting tacit knowledge and in avoiding information redundancies. In this paper, we propose the use of visual tools (e.g., visualization software) as a support to facilitate the interview process and to gather sound qualitative data. Visual representations provide structure, context and explicitness, and thus foster knowledge elicitation and sharing in interviews. Our contribution is two-fold: First, we provide a methodological extension of qualitative interviewing. Second, we suggest a practical approach to use visuals in interviews, presenting concrete examples from the research field. We conclude our paper by discussing the limitations of our approach, and by suggesting directions for future research on visualization-based interviewing.", "fno": "06004069", "keywords": [ "Data Structures", "Data Visualisation", "Knowledge Representation", "Peer To Peer Computing", "Knowledge Visualization", "Qualitative Interviewing", "Tacit Knowledge", "Information Redundancies", "Visual Tools", "Visual Representations", "Knowledge Elicitation", "Knowledge Sharing", "Visualization", "Interviews", "Software", "Data Visualization", "Filling", "Data Analysis", "Documentation", "Qualitative Interviewing", "One To One Interviews", "Focus Groups", "Projective Techniques", "Visual Aids", "Visual Facilitation" ], "authors": [ { "affiliation": null, "fullName": "Nicole Bischof", "givenName": "Nicole", "surname": "Bischof", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alice Comi", "givenName": "Alice", "surname": "Comi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Martin J. Eppler", "givenName": "Martin J.", "surname": "Eppler", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "371-376", "year": "2011", "issn": "1550-6037", "isbn": "978-1-4577-0868-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06004068", "articleId": "12OmNBbaH5H", "__typename": "AdjacentArticleType" }, "next": { "fno": "06004070", "articleId": "12OmNwEJ0RQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dexa/2002/1668/0/16680286", "title": "Business-to-Employee Cooperation Support through Online Job Interviews", "doi": null, "abstractUrl": "/proceedings-article/dexa/2002/16680286/12OmNCbCrKC", "parentPublication": { "id": "proceedings/dexa/2002/1668/0", "title": "Proceedings. 13th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2006/0256/0/04116955", "title": "Work in Progress: Using Mock Telephone Interviews with Alumni to Teach Job Search Communication", "doi": null, "abstractUrl": "/proceedings-article/fie/2006/04116955/12OmNy87Qys", "parentPublication": { "id": "proceedings/fie/2006/0256/0", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a390", "title": "Older People and the Use of Mobile Phones: An Interview Study", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a390/12OmNyv7mk3", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/securware/2010/4095/0/05633687", "title": "Socio-technical Security Assessment of a VoIP System", "doi": null, "abstractUrl": "/proceedings-article/securware/2010/05633687/13bd1hyoTxE", "parentPublication": { "id": "proceedings/securware/2010/4095/0", "title": "2010 Fourth International Conference on Emerging Security Information, Systems and Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962728", "title": "Qualitative Study of Professional Virtue Development in Engineering", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962728/1IHnMj12kiQ", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10034850", "title": "A Qualitative Interview Study of Distributed Tracing Visualisation: A Characterisation of Challenges and Opportunities", "doi": null, "abstractUrl": "/journal/tg/5555/01/10034850/1KpxdJPurhm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2019/0810/0/08818836", "title": "Hiring is Broken: What Do Developers Say About Technical Interviews?", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2019/08818836/1dsfTENgps4", "parentPublication": { "id": "proceedings/vl-hcc/2019/0810/0", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028639", "title": "Suggestions for Responsible Qualitative Research with Transgender Engineering Students Using an Auto-Ethnographic Approach", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028639/1iffjrGW2WY", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2020/7438/0/09218155", "title": "The Way it Makes you Feel Predicting Users&#x2019; Engagement during Interviews with Biofeedback and Supervised Learning", "doi": null, "abstractUrl": "/proceedings-article/re/2020/09218155/1nMQvkvFpfi", "parentPublication": { "id": "proceedings/re/2020/7438/0", "title": "2020 IEEE 28th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274267", "title": "Revealing teaching conceptions and methods through document elicitation of course syllabi and statements of teaching philosophy", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274267/1phRDwdkQ36", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "14dcDXj0I36", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "acronym": "icci*cc", "groupId": "1000097", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "14dcDYaWuLv", "doi": "10.1109/ICCI-CC.2018.8482021", "title": "Scene-Based Qualitative Analysis and Modeling Tool for Situated Cognition", "normalizedTitle": "Scene-Based Qualitative Analysis and Modeling Tool for Situated Cognition", "abstract": "This paper describes a qualitative cognitive analysis and modeling tool (QCAM) for biological data collected using sensors, such as a simple brain-wave sensor, while executing an actual task. However, this type of sensor is generally less accurate than devices designed for medical use. It may be influenced by noise or personal differences amongst subjects. A qualitative approach is considered very effective for such data, because we can understand essential features by focusing on qualitative changes, such as increasing, decreasing, and steady changes in the data, and not just on the quantity of data. Therefore, in addition to statistical analysis, QCAM provides qualitative analysis and modeling, and allows us to verify the model by using qualitative reasoning. This paper explains QCAM and describes experimental results obtained by using real driving data, which combines movie data from a camera, acceleration data from a smart phone, and brain-wave data from a simple brain-wave sensor, obtained while a person is driving a vehicle.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes a qualitative cognitive analysis and modeling tool (QCAM) for biological data collected using sensors, such as a simple brain-wave sensor, while executing an actual task. However, this type of sensor is generally less accurate than devices designed for medical use. It may be influenced by noise or personal differences amongst subjects. A qualitative approach is considered very effective for such data, because we can understand essential features by focusing on qualitative changes, such as increasing, decreasing, and steady changes in the data, and not just on the quantity of data. Therefore, in addition to statistical analysis, QCAM provides qualitative analysis and modeling, and allows us to verify the model by using qualitative reasoning. This paper explains QCAM and describes experimental results obtained by using real driving data, which combines movie data from a camera, acceleration data from a smart phone, and brain-wave data from a simple brain-wave sensor, obtained while a person is driving a vehicle.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes a qualitative cognitive analysis and modeling tool (QCAM) for biological data collected using sensors, such as a simple brain-wave sensor, while executing an actual task. However, this type of sensor is generally less accurate than devices designed for medical use. It may be influenced by noise or personal differences amongst subjects. A qualitative approach is considered very effective for such data, because we can understand essential features by focusing on qualitative changes, such as increasing, decreasing, and steady changes in the data, and not just on the quantity of data. Therefore, in addition to statistical analysis, QCAM provides qualitative analysis and modeling, and allows us to verify the model by using qualitative reasoning. This paper explains QCAM and describes experimental results obtained by using real driving data, which combines movie data from a camera, acceleration data from a smart phone, and brain-wave data from a simple brain-wave sensor, obtained while a person is driving a vehicle.", "fno": "08482021", "keywords": [ "Handheld Computers", "Cognition", "Brain Modeling", "Analytical Models", "Data Models", "Acceleration", "Cognitive Informatics", "Qualitative Analysis", "Qualitative Induction", "Qualitative Reasoning", "Cognitive Model", "Situated Cognition", "Cognitive Vehicle", "Acceleration Data", "Brain Wave Sensor" ], "authors": [ { "affiliation": "Faculty of Engineering, Ashikaga University Ashikaga, Tochigi, 326-8558, Japan", "fullName": "Hironori Hiraishi", "givenName": "Hironori", "surname": "Hiraishi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci*cc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "373-380", "year": "2018", "issn": null, "isbn": "978-1-5386-3360-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08482056", "articleId": "14dcDXWbm0g", "__typename": "AdjacentArticleType" }, "next": { "fno": "08482052", "articleId": "14dcDYK8KTx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icci/2002/1724/0/17240259", "title": "Cognitive Models of the Brain", "doi": null, "abstractUrl": "/proceedings-article/icci/2002/17240259/12OmNBp52IJ", "parentPublication": { "id": "proceedings/icci/2002/1724/0", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2017/0771/0/08109802", "title": "Cognitive foundations of knowledge science and deep knowledge learning by cognitive robots", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2017/08109802/12OmNxaNGik", "parentPublication": { "id": "proceedings/icci*cc/2017/0771/0", "title": "2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2011/05/mex2011050022", "title": "Using Brain Imaging to Interpret Student Problem Solving", "doi": null, "abstractUrl": "/magazine/ex/2011/05/mex2011050022/13rRUIJuxtb", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2011/05/mex2011050046", "title": "EEG-Based Cognitive Interfaces for Ubiquitous Applications: Developments and Challenges", "doi": null, "abstractUrl": "/magazine/ex/2011/05/mex2011050046/13rRUwj7crg", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/12/ttk2012122127", "title": "Constructing a New-Style Conceptual Model of Brain Data for Systematic Brain Informatics", "doi": null, "abstractUrl": "/journal/tk/2012/12/ttk2012122127/13rRUygT7fC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482039", "title": "Is the Mind Still a Mystery?", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482039/14dcDXDrPpQ", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482042", "title": "Study on Classification of Left-Right Hands Motor Imagery EEG Signals Based on CNN", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482042/14dcDYfu4Qw", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482006", "title": "The Future of the Human Brain", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482006/14dcEdLb3x6", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a478", "title": "DGCC: A Case for Integration of Brain Cognition and Intelligence Computation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a478/18jXClwbyH6", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2019/1419/0/09146043", "title": "Experience-based analysis and modeling for cognitive vehicle data", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2019/09146043/1lFJcaz9LcQ", "parentPublication": { "id": "proceedings/icci*cc/2019/1419/0", "title": "2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6hPo1RWa4", "title": "2022 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hRsejysE", "doi": "10.1109/BELIV57783.2022.00010", "title": "How Personality and Visual Channels Affect Insight Generation", "normalizedTitle": "How Personality and Visual Channels Affect Insight Generation", "abstract": "Gaining insight is considered one of the relevant purposes of visual data exploration, yet studies that categorize insights are rare. This paper reports on a study to understand if the categorization model used to describe insights and personality factors affect insight-based evaluations&#x2019; findings. Participants completed a set of tasks with three hierarchical visualizations and then reported what insights they could gather from them. Results show that the insight categorization taxonomies produce different descriptions of insights based on the same corpus of responses. In addition, our findings suggest that the openness to experience trait positively influences the number of reported insights. Both these factors may create obstacles to the design of insight-based evaluations and, consequently, should be controlled in the experimental design. We discuss the study implications, lessons learned, and future work opportunities.", "abstracts": [ { "abstractType": "Regular", "content": "Gaining insight is considered one of the relevant purposes of visual data exploration, yet studies that categorize insights are rare. This paper reports on a study to understand if the categorization model used to describe insights and personality factors affect insight-based evaluations&#x2019; findings. Participants completed a set of tasks with three hierarchical visualizations and then reported what insights they could gather from them. Results show that the insight categorization taxonomies produce different descriptions of insights based on the same corpus of responses. In addition, our findings suggest that the openness to experience trait positively influences the number of reported insights. Both these factors may create obstacles to the design of insight-based evaluations and, consequently, should be controlled in the experimental design. We discuss the study implications, lessons learned, and future work opportunities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gaining insight is considered one of the relevant purposes of visual data exploration, yet studies that categorize insights are rare. This paper reports on a study to understand if the categorization model used to describe insights and personality factors affect insight-based evaluations’ findings. Participants completed a set of tasks with three hierarchical visualizations and then reported what insights they could gather from them. Results show that the insight categorization taxonomies produce different descriptions of insights based on the same corpus of responses. In addition, our findings suggest that the openness to experience trait positively influences the number of reported insights. Both these factors may create obstacles to the design of insight-based evaluations and, consequently, should be controlled in the experimental design. We discuss the study implications, lessons learned, and future work opportunities.", "fno": "962900a047", "keywords": [ "Data Analysis", "Data Visualisation", "Human Factors", "Experience Trait", "Experimental Design", "Hierarchical Visualizations", "Insight Categorization Taxonomies", "Insight Generation", "Insight Based Evaluations", "Personality Factors", "Visual Channels", "Visual Data Exploration", "Visualization", "Taxonomy", "Data Visualization", "Process Control", "Task Analysis", "Human Centered Computing X 2014", "Visualization X 2014", "Visualization Theory", "Concepts And Paradigms Human Centered Computing X 2014", "Empirical Studies In Visualization" ], "authors": [ { "affiliation": "University of Lisbon,HUMAN Lab, Graphics and Interaction, INESC-ID, and Instituto Superior Técnico,Lisbon,Portugal", "fullName": "Tomás Alves", "givenName": "Tomás", "surname": "Alves", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Lisbon,HUMAN Lab, Graphics and Interaction, INESC-ID, and Instituto Superior Técnico,Lisbon,Portugal", "fullName": "Carlota Dias", "givenName": "Carlota", "surname": "Dias", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Lisbon,HUMAN Lab, Graphics and Interaction, INESC-ID, and Instituto Superior Técnico,Lisbon,Portugal", "fullName": "Daniel Gonçalves", "givenName": "Daniel", "surname": "Gonçalves", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Lisbon,HUMAN Lab, Graphics and Interaction, INESC-ID, and Instituto Superior Técnico,Lisbon,Portugal", "fullName": "Sandra Gama", "givenName": "Sandra", "surname": "Gama", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade de Lisboa,CICPSI, Faculdade de Psicologia,Lisboa,Portugal", "fullName": "Joana Henriques-Calado", "givenName": "Joana", "surname": "Henriques-Calado", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "47-55", "year": "2022", "issn": null, "isbn": "979-8-3503-9629-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J6hRp51wYg", "name": "pbeliv202296290-09978495s1-mm_962900a047.zip", "size": "162 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pbeliv202296290-09978495s1-mm_962900a047.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "962900a038", "articleId": "1J6hR9jr104", "__typename": "AdjacentArticleType" }, "next": { "fno": "962900a056", "articleId": "1J6hPzHH3QA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156366", "title": "Text visualization techniques: Taxonomy, visual survey, and community insights", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156366/12OmNqAU6t7", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a203", "title": "Promoting Insight: A Case Study of How to Incorporate Interaction in Existing Data Visualizations", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a203/12OmNx7G68T", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1511", "title": "An Insight-Based Longitudinal Study of Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1511/13rRUxBJhvl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040028", "title": "Characterizing Visualization Insights from Quantified Selfers' Personal Data Presentations", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040028/13rRUxCRFQl", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192662", "title": "A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192662/13rRUyuegha", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833097", "title": "The Role of Expertise on Insight Generation from Visualization Sequences", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833097/1FUSFyWN47C", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/08/09020101", "title": "Characterizing the Quality of Insight by Interactions: A Case Study", "doi": null, "abstractUrl": "/journal/tg/2021/08/09020101/1hS2LZ6csyQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a019", "title": "How to evaluate data visualizations across different levels of understanding", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a019/1q0FOQPpIic", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09511808", "title": "VisInReport: Complementing Visual Discourse Analytics Through Personalized Insight Reports", "doi": null, "abstractUrl": "/journal/tg/2022/12/09511808/1vYRHccYKDS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552876", "title": "Learning Objectives, Insights, and Assessments: How Specification Formats Impact Design", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552876/1xic1wsZtLi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkEU4f", "title": "2011 IEEE International Conference on Multimedia and Expo", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzwHvq1", "doi": "10.1109/ICME.2011.6012090", "title": "A handy calibrator for color vision of a human observer", "normalizedTitle": "A handy calibrator for color vision of a human observer", "abstract": "The variability among human observers is a challenge to the calibration of modern displays based on Light Emitting Diodes (LED) and lasers. The spectra of the displayed colors are so peaky that slight differences in the cone sensitivities in human color vision are sufficient to make two observers perceiving different colors on the same screen. Recently published results give evidence to the existence of a small number of classes of human observers. In this paper, we present first results on the development of a prototype for a lightweight, inexpensive, temporally stable and easy to calibrate and easy to use instrument that allows classification of an observer with normal color vision in a small number of categories. The instrument employs a set of LEDs having specific wavelengths and is controlled by a computer interface. The use of such an instrument will allow adapting displays and viewing conditions to individual observers in color-critical applications.", "abstracts": [ { "abstractType": "Regular", "content": "The variability among human observers is a challenge to the calibration of modern displays based on Light Emitting Diodes (LED) and lasers. The spectra of the displayed colors are so peaky that slight differences in the cone sensitivities in human color vision are sufficient to make two observers perceiving different colors on the same screen. Recently published results give evidence to the existence of a small number of classes of human observers. In this paper, we present first results on the development of a prototype for a lightweight, inexpensive, temporally stable and easy to calibrate and easy to use instrument that allows classification of an observer with normal color vision in a small number of categories. The instrument employs a set of LEDs having specific wavelengths and is controlled by a computer interface. The use of such an instrument will allow adapting displays and viewing conditions to individual observers in color-critical applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The variability among human observers is a challenge to the calibration of modern displays based on Light Emitting Diodes (LED) and lasers. The spectra of the displayed colors are so peaky that slight differences in the cone sensitivities in human color vision are sufficient to make two observers perceiving different colors on the same screen. Recently published results give evidence to the existence of a small number of classes of human observers. In this paper, we present first results on the development of a prototype for a lightweight, inexpensive, temporally stable and easy to calibrate and easy to use instrument that allows classification of an observer with normal color vision in a small number of categories. The instrument employs a set of LEDs having specific wavelengths and is controlled by a computer interface. The use of such an instrument will allow adapting displays and viewing conditions to individual observers in color-critical applications.", "fno": "06012090", "keywords": [ "Calibration", "Colour Displays", "Colour Vision", "Computerised Instrumentation", "LED Displays", "Visual Perception", "Handy Calibrator", "Human Observer", "Display Calibration", "Light Emitting Diode", "LED Display", "Laser Display", "Color Spectra", "Cone Sensitivity", "Human Color Vision", "Visual Perception", "Lightweight Instrument", "Observer Classification", "Computer Interface", "Observers", "Image Color Analysis", "Light Emitting Diodes", "Color", "Prototypes", "Humans", "Instruments", "Human Color Vision", "Color Reproduction", "Light Emitting Diodes", "Displays" ], "authors": [ { "affiliation": null, "fullName": "Patrick Morvan", "givenName": "Patrick", "surname": "Morvan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Abhijit Sarkar", "givenName": "Abhijit", "surname": "Sarkar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jurgen Stauder", "givenName": "Jurgen", "surname": "Stauder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Laurent Blondé", "givenName": "Laurent", "surname": "Blondé", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jonathan Kervec", "givenName": "Jonathan", "surname": "Kervec", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2011", "issn": "1945-7871", "isbn": "978-1-61284-348-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06012089", "articleId": "12OmNAQJzNA", "__typename": "AdjacentArticleType" }, "next": { "fno": "06012091", "articleId": "12OmNAZx8Td", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mobilesoft/2017/2669/0/07972715", "title": "Investigating Decreasing Energy Usage in Mobile Apps via Indistinguishable Color Changes", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2017/07972715/12OmNArKSho", "parentPublication": { "id": "proceedings/mobilesoft/2017/2669/0", "title": "2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/06963113", "title": "Color lock: 16 bit digital color based security system", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/06963113/12OmNBTawrp", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a075", "title": "Research on the Color Detection of LCD Instrument Panel Based on Machine Vision", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a075/12OmNCf1DgD", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmu/2017/31/0/08330079", "title": "CICS/PUI: Color-lighting and illuminance control system using paper UI", "doi": null, "abstractUrl": "/proceedings-article/icmu/2017/08330079/12OmNvrvje6", "parentPublication": { "id": "proceedings/icmu/2017/31/0", "title": "2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2015/8667/0/07168375", "title": "Single-Shot Reflectance Measurement from Polarized Color Gradient Illumination", "doi": null, "abstractUrl": "/proceedings-article/iccp/2015/07168375/12OmNxWLTsI", "parentPublication": { "id": "proceedings/iccp/2015/8667/0", "title": "2015 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2018/6909/0/690901a087", "title": "Lanterns Lighitng Up by Sound: Visualization of the Sound Space by Colors", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2018/690901a087/13bd1gFCjrP", "parentPublication": { "id": "proceedings/nicoint/2018/6909/0", "title": "2018 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mi/2018/04/mmi2018040020", "title": "Perceived-Color Approximation Transforms for Programs that Draw", "doi": null, "abstractUrl": "/magazine/mi/2018/04/mmi2018040020/13rRUyXKxNX", "parentPublication": { "id": "mags/mi", "title": "IEEE Micro", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snsp/2018/7413/0/741300a365", "title": "Performance Improvement of Symbol Decision for Visual-MIMO System in RGB LED Lighting", "doi": null, "abstractUrl": "/proceedings-article/snsp/2018/741300a365/17D45W1Oa3k", "parentPublication": { "id": "proceedings/snsp/2018/7413/0", "title": "2018 International Conference on Sensor Networks and Signal Processing (SNSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/07/08703073", "title": "High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation", "doi": null, "abstractUrl": "/journal/tm/2020/07/08703073/19Er4SxW63K", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09239918", "title": "Semantic Discriminability for Visual Communication", "doi": null, "abstractUrl": "/journal/tg/2021/02/09239918/1oeZWSkMqre", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwJPMYf", "title": "2015 12th Conference on Computer and Robot Vision (CRV)", "acronym": "crv", "groupId": "1001794", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx4Q6NG", "doi": "10.1109/CRV.2015.29", "title": "Image Sensor Modeling: Noise and Linear Transformation Impacts on the Color Gamut", "normalizedTitle": "Image Sensor Modeling: Noise and Linear Transformation Impacts on the Color Gamut", "abstract": "Linear transformations are widely used in the color science. Linear transformation can not ideally map the source and destination color matching functions and this issue induces some errors in the process of conversion. This error is usually deemed negligible for a noise-free system. However, in practice, imaging devices, displays, and printers employ linear transformations to move between color spaces and at the same time they are subject to noise which might magnify the linear transformation errors. The induced error by this phenomenon can bring about colorcasts and hampering the image quality. In this study, the effects of noise and linear transformation on the colorgamut are investigated. In this regard, a typical image sensor is modelled and employed for this study. A detailed model of noise is considered in the process of implementing the image sensor model to guarantee the precision of the results. Several experiments have been performed over the implemented framework and the results show that the imperfections of linear transformation combined with the image sensor noise shrinks the gamut area of output images.", "abstracts": [ { "abstractType": "Regular", "content": "Linear transformations are widely used in the color science. Linear transformation can not ideally map the source and destination color matching functions and this issue induces some errors in the process of conversion. This error is usually deemed negligible for a noise-free system. However, in practice, imaging devices, displays, and printers employ linear transformations to move between color spaces and at the same time they are subject to noise which might magnify the linear transformation errors. The induced error by this phenomenon can bring about colorcasts and hampering the image quality. In this study, the effects of noise and linear transformation on the colorgamut are investigated. In this regard, a typical image sensor is modelled and employed for this study. A detailed model of noise is considered in the process of implementing the image sensor model to guarantee the precision of the results. Several experiments have been performed over the implemented framework and the results show that the imperfections of linear transformation combined with the image sensor noise shrinks the gamut area of output images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Linear transformations are widely used in the color science. Linear transformation can not ideally map the source and destination color matching functions and this issue induces some errors in the process of conversion. This error is usually deemed negligible for a noise-free system. However, in practice, imaging devices, displays, and printers employ linear transformations to move between color spaces and at the same time they are subject to noise which might magnify the linear transformation errors. The induced error by this phenomenon can bring about colorcasts and hampering the image quality. In this study, the effects of noise and linear transformation on the colorgamut are investigated. In this regard, a typical image sensor is modelled and employed for this study. A detailed model of noise is considered in the process of implementing the image sensor model to guarantee the precision of the results. Several experiments have been performed over the implemented framework and the results show that the imperfections of linear transformation combined with the image sensor noise shrinks the gamut area of output images.", "fno": "1986a169", "keywords": [ "Image Color Analysis", "Colored Noise", "Image Sensors", "Noise Measurement", "Cameras", "Photonics", "Color Gamut I Introduction", "Linear Transformation", "Noise" ], "authors": [ { "affiliation": null, "fullName": "Mehdi Rezagholizadeh", "givenName": "Mehdi", "surname": "Rezagholizadeh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "James J. Clark", "givenName": "James J.", "surname": "Clark", "__typename": "ArticleAuthorType" } ], "idPrefix": "crv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-06-01T00:00:00", "pubType": "proceedings", "pages": "169-175", "year": "2015", "issn": null, "isbn": "978-1-4799-1986-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1986a161", "articleId": "12OmNyvoXbV", "__typename": "AdjacentArticleType" }, "next": { "fno": "1986a176", "articleId": "12OmNzzxusS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cicn/2014/6929/0/6929a193", "title": "Interpolation of CFA Color Images with Hybrid Image Denoising", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a193/12OmNCd2rCU", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2011/2135/0/06120998", "title": "A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2011/06120998/12OmNCga1SI", "parentPublication": { "id": "proceedings/trustcom/2011/2135/0", "title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiki/2014/8003/0/07064024", "title": "A Fuzzy Filter for Color Images Corrupted by Mixed Noise", "doi": null, "abstractUrl": "/proceedings-article/iiki/2014/07064024/12OmNx4Q6E5", "parentPublication": { "id": "proceedings/iiki/2014/8003/0", "title": "2014 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icct/2017/3030/0/08324025", "title": "Automated — Seeded average approach of color segmentation for still color image and video", "doi": null, "abstractUrl": "/proceedings-article/icct/2017/08324025/12OmNxUdv7a", "parentPublication": { "id": "proceedings/icct/2017/3030/0", "title": "2017 International Conference on Intelligent Communication and Computational Techniques (ICCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2014/4337/0/4337a283", "title": "Photon Detection and Color Perception at Low Light Levels", "doi": null, "abstractUrl": "/proceedings-article/crv/2014/4337a283/12OmNyRxFxW", "parentPublication": { "id": "proceedings/crv/2014/4337/0", "title": "2014 Canadian Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2014/5188/0/06831801", "title": "Rethinking color cameras", "doi": null, "abstractUrl": "/proceedings-article/iccp/2014/06831801/12OmNyywxFW", "parentPublication": { "id": "proceedings/iccp/2014/5188/0", "title": "2014 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1991/2163/0/00131569", "title": "On impulse noise removal in color images", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00131569/12OmNzBOin8", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2012/4711/0/4711a884", "title": "Combined Inter-frame and Inter-color Prediction for Color Video Denoising", "doi": null, "abstractUrl": "/proceedings-article/icme/2012/4711a884/12OmNzaQo9S", "parentPublication": { "id": "proceedings/icme/2012/4711/0", "title": "2012 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b105", "title": "Multi-channel Weighted Nuclear Norm Minimization for Real Color Image Denoising", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b105/12OmNzlD9dJ", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486558", "title": "Color Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486558/14jQfPGqOcw", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVr", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzayNAs", "doi": "10.1109/CVPR.2017.43", "title": "FC^4: Fully Convolutional Color Constancy with Confidence-Weighted Pooling", "normalizedTitle": "FC^4: Fully Convolutional Color Constancy with Confidence-Weighted Pooling", "abstract": "Improvements in color constancy have arisen from the use of convolutional neural networks (CNNs). However, the patch-based CNNs that exist for this problem are faced with the issue of estimation ambiguity, where a patch may contain insufficient information to establish a unique or even a limited possible range of illumination colors. Image patches with estimation ambiguity not only appear with great frequency in photographs, but also significantly degrade the quality of network training and inference. To overcome this problem, we present a fully convolutional network architecture in which patches throughout an image can carry different confidence weights according to the value they provide for color constancy estimation. These confidence weights are learned and applied within a novel pooling layer where the local estimates are merged into a global solution. With this formulation, the network is able to determine what to learn and how to pool automatically from color constancy datasets without additional supervision. The proposed network also allows for end-to-end training, and achieves higher efficiency and accuracy. On standard benchmarks, our network outperforms the previous state-of-the-art while achieving 120× greater efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Improvements in color constancy have arisen from the use of convolutional neural networks (CNNs). However, the patch-based CNNs that exist for this problem are faced with the issue of estimation ambiguity, where a patch may contain insufficient information to establish a unique or even a limited possible range of illumination colors. Image patches with estimation ambiguity not only appear with great frequency in photographs, but also significantly degrade the quality of network training and inference. To overcome this problem, we present a fully convolutional network architecture in which patches throughout an image can carry different confidence weights according to the value they provide for color constancy estimation. These confidence weights are learned and applied within a novel pooling layer where the local estimates are merged into a global solution. With this formulation, the network is able to determine what to learn and how to pool automatically from color constancy datasets without additional supervision. The proposed network also allows for end-to-end training, and achieves higher efficiency and accuracy. On standard benchmarks, our network outperforms the previous state-of-the-art while achieving 120× greater efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Improvements in color constancy have arisen from the use of convolutional neural networks (CNNs). However, the patch-based CNNs that exist for this problem are faced with the issue of estimation ambiguity, where a patch may contain insufficient information to establish a unique or even a limited possible range of illumination colors. Image patches with estimation ambiguity not only appear with great frequency in photographs, but also significantly degrade the quality of network training and inference. To overcome this problem, we present a fully convolutional network architecture in which patches throughout an image can carry different confidence weights according to the value they provide for color constancy estimation. These confidence weights are learned and applied within a novel pooling layer where the local estimates are merged into a global solution. With this formulation, the network is able to determine what to learn and how to pool automatically from color constancy datasets without additional supervision. The proposed network also allows for end-to-end training, and achieves higher efficiency and accuracy. On standard benchmarks, our network outperforms the previous state-of-the-art while achieving 120× greater efficiency.", "fno": "0457a330", "keywords": [ "Feedforward Neural Nets", "Image Classification", "Image Colour Analysis", "Image Enhancement", "Image Representation", "Learning Artificial Intelligence", "Neural Net Architecture", "Fully Convolutional Color Constancy", "Illumination Colors", "Image Patches", "Fully Convolutional Network Architecture", "Local Estimates", "Color Constancy Datasets", "CNN", "Confidence Weights", "Pooling Layer", "FC 4", "Image Color Analysis", "Lighting", "Estimation", "Semantics", "Training", "Colored Noise", "Noise Measurement" ], "authors": [ { "affiliation": null, "fullName": "Yuanming Hu", "givenName": "Yuanming", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Baoyuan Wang", "givenName": "Baoyuan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stephen Lin", "givenName": "Stephen", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "330-339", "year": "2017", "issn": "1063-6919", "isbn": "978-1-5386-0457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0457a321", "articleId": "12OmNrAdsFh", "__typename": "AdjacentArticleType" }, "next": { "fno": "0457a340", "articleId": "12OmNAYXWz9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032f459", "title": "Recurrent Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f459/12OmNBqdrg6", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459391", "title": "Color constancy using 3D scene geometry", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459391/12OmNC4wtse", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391a379", "title": "Convolutional Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a379/12OmNvjQ8Ej", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbrlarsrobocontrol/2014/6711/0/07024269", "title": "An Iterative Approach for Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/sbrlarsrobocontrol/2014/07024269/12OmNwNwzKw", "parentPublication": { "id": "proceedings/sbrlarsrobocontrol/2014/6711/0", "title": "2014 Joint Conference on Robotics: SBR-LARS Robotics Symposium and Robocontrol (SBR LARS Robocontrol)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2013/5053/0/06475015", "title": "What is the space of spectral sensitivity functions for digital color cameras?", "doi": null, "abstractUrl": "/proceedings-article/wacv/2013/06475015/12OmNx0RINx", "parentPublication": { "id": "proceedings/wacv/2013/5053/0", "title": "Applications of Computer Vision, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c715", "title": "Robust Text Detection in Natural Scene Images by Generalized Color-Enhanced Contrasting Extremal Region and Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c715/12OmNzsrwbR", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/09/07328340", "title": "Lightness Constancy in Surface Visualization", "doi": null, "abstractUrl": "/journal/tg/2016/09/07328340/13rRUwbs1Sx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b246", "title": "TDCC: Top-Down Semantic Aggregation for Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b246/1cdOHa7bpVS", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a243", "title": "What Else Can Fool Deep Learning? Addressing Color Constancy Errors on Deep Neural Network Performance", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a243/1hVl6zr6crC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b194", "title": "Generative Models for Multi-Illumination Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b194/1yNioSxeNTa", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "14jQfMYohco", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "14jQfPGqOcw", "doi": "10.1109/ICME.2018.8486558", "title": "Color Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling", "normalizedTitle": "Color Image Noise Covariance Estimation with Cross-Channel Image Noise Modeling", "abstract": "Noise estimation is crucial in many image processing tasks such as denoising. Most of the existing noise estimation methods are specially developed for grayscale images. For color images, these methods simply handle each color channel independently, without considering the correlation across channels. In this work, we propose a multivariate Gaussian approach to model the noise in color images, in which we explicitly consider the inter-dependence among color channels. We design a practical method for estimating the noise covariance matrix within the proposed model. Specifically, a patch selection scheme is first introduced to select weakly textured patches through thresholding the texture strength indicators. Noticing that the patch selection actually depends on the unknown noise covariance, we present an iterative noise covariance estimation algorithm, where the patch selection and the covariance estimation are conducted alternately. Experimental results show that our method can effectively estimate the noise covariance. The practical usage is demonstrated with color image denoising.", "abstracts": [ { "abstractType": "Regular", "content": "Noise estimation is crucial in many image processing tasks such as denoising. Most of the existing noise estimation methods are specially developed for grayscale images. For color images, these methods simply handle each color channel independently, without considering the correlation across channels. In this work, we propose a multivariate Gaussian approach to model the noise in color images, in which we explicitly consider the inter-dependence among color channels. We design a practical method for estimating the noise covariance matrix within the proposed model. Specifically, a patch selection scheme is first introduced to select weakly textured patches through thresholding the texture strength indicators. Noticing that the patch selection actually depends on the unknown noise covariance, we present an iterative noise covariance estimation algorithm, where the patch selection and the covariance estimation are conducted alternately. Experimental results show that our method can effectively estimate the noise covariance. The practical usage is demonstrated with color image denoising.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Noise estimation is crucial in many image processing tasks such as denoising. Most of the existing noise estimation methods are specially developed for grayscale images. For color images, these methods simply handle each color channel independently, without considering the correlation across channels. In this work, we propose a multivariate Gaussian approach to model the noise in color images, in which we explicitly consider the inter-dependence among color channels. We design a practical method for estimating the noise covariance matrix within the proposed model. Specifically, a patch selection scheme is first introduced to select weakly textured patches through thresholding the texture strength indicators. Noticing that the patch selection actually depends on the unknown noise covariance, we present an iterative noise covariance estimation algorithm, where the patch selection and the covariance estimation are conducted alternately. Experimental results show that our method can effectively estimate the noise covariance. The practical usage is demonstrated with color image denoising.", "fno": "08486558", "keywords": [ "Image Color Analysis", "Colored Noise", "Estimation", "Color", "Covariance Matrices", "Noise Measurement", "Gaussian Noise", "Noise Covariance Estimation", "Weakly Textured Patch", "Color Image Denoising" ], "authors": [ { "affiliation": "Department of Computer and Information Science, University of Macau, China", "fullName": "Li Dong", "givenName": "Li", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer and Information Science, University of Macau, China", "fullName": "Jiantao Zhou", "givenName": "Jiantao", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School at Shenzhen., Tsinghua University, Shenzhen, Guangdong, China", "fullName": "Tao Dai", "givenName": "Tao", "surname": "Dai", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2018", "issn": null, "isbn": "978-1-5386-1737-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08486583", "articleId": "14jQfPn85m9", "__typename": "AdjacentArticleType" }, "next": { "fno": "08486515", "articleId": "14jQfO9lbCZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851b683", "title": "A Holistic Approach to Cross-Channel Image Noise Modeling and Its Application to Image Denoising", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851b683/12OmNBhZ4iZ", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a193", "title": "Interpolation of CFA Color Images with Hybrid Image Denoising", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a193/12OmNCd2rCU", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1991/0003/0/00150200", "title": "Sources identification in unknown Gaussian coloured noise with composite HNL statistics", "doi": null, "abstractUrl": "/proceedings-article/icassp/1991/00150200/12OmNsbY6LQ", "parentPublication": { "id": "proceedings/icassp/1991/0003/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiki/2014/8003/0/07064024", "title": "A Fuzzy Filter for Color Images Corrupted by Mixed Noise", "doi": null, "abstractUrl": "/proceedings-article/iiki/2014/07064024/12OmNx4Q6E5", "parentPublication": { "id": "proceedings/iiki/2014/8003/0", "title": "2014 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2015/1986/0/1986a169", "title": "Image Sensor Modeling: Noise and Linear Transformation Impacts on the Color Gamut", "doi": null, "abstractUrl": "/proceedings-article/crv/2015/1986a169/12OmNx4Q6NG", "parentPublication": { "id": "proceedings/crv/2015/1986/0", "title": "2015 12th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c870", "title": "Using Projection Kurtosis Concentration of Natural Images for Blind Noise Covariance Matrix Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c870/12OmNyRPgxi", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391a477", "title": "An Efficient Statistical Method for Image Noise Level Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a477/12OmNybfqTE", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457a330", "title": "FC^4: Fully Convolutional Color Constancy with Confidence-Weighted Pooling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457a330/12OmNzayNAs", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500b433", "title": "Local Color Mapping Combined with Color Transfer for Underwater Image Enhancement", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500b433/18j8LCqGbHq", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/09/08705270", "title": "Hierarchical Gaussian Descriptors with Application to Person Re-Identification", "doi": null, "abstractUrl": "/journal/tp/2020/09/08705270/19JpVQ1sVb2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVF", "title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNyrIaKP", "doi": "10.1109/IV.1999.781541", "title": "Continuous Field Visualization with Multi-Resolution Textures", "normalizedTitle": "Continuous Field Visualization with Multi-Resolution Textures", "abstract": "A method of using a texture mapping approach to color scales is described, for the purpose of visualizing continuous field scalar quantities. The technique is most appropriate where high gradients are present in the data, or where geometric surfaces are projected to significant screen area. The use of texture mapping takes advantage of widely available 3D display systems for interactive visualization system design. The technique yields a significant reduction in visualization artifacts caused by color interpolation. Multiple resolution textures are shown to improve visualizations of high dynamic range data.", "abstracts": [ { "abstractType": "Regular", "content": "A method of using a texture mapping approach to color scales is described, for the purpose of visualizing continuous field scalar quantities. The technique is most appropriate where high gradients are present in the data, or where geometric surfaces are projected to significant screen area. The use of texture mapping takes advantage of widely available 3D display systems for interactive visualization system design. The technique yields a significant reduction in visualization artifacts caused by color interpolation. Multiple resolution textures are shown to improve visualizations of high dynamic range data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A method of using a texture mapping approach to color scales is described, for the purpose of visualizing continuous field scalar quantities. The technique is most appropriate where high gradients are present in the data, or where geometric surfaces are projected to significant screen area. The use of texture mapping takes advantage of widely available 3D display systems for interactive visualization system design. The technique yields a significant reduction in visualization artifacts caused by color interpolation. Multiple resolution textures are shown to improve visualizations of high dynamic range data.", "fno": "02100088", "keywords": [ "Interpolation", "Color", "Visualization", "Texture" ], "authors": [ { "affiliation": "Advanced Visual Systems Ltd.", "fullName": "Ian Curington", "givenName": "Ian", "surname": "Curington", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-07-01T00:00:00", "pubType": "proceedings", "pages": "88", "year": "1999", "issn": "1093-9547", "isbn": "0-7695-0210-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02100081", "articleId": "12OmNBDQbl5", "__typename": "AdjacentArticleType" }, "next": { "fno": "02100092", "articleId": "12OmNxveNMb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1Ay", "title": "2011 IEEE International Conference on Granular Computing", "acronym": "grc", "groupId": "1001626", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwwuE18", "doi": "10.1109/GRC.2011.6122649", "title": "A method to dynamically estimate emphasizing points and degree by using verbal and nonverbal information and physiological indices", "normalizedTitle": "A method to dynamically estimate emphasizing points and degree by using verbal and nonverbal information and physiological indices", "abstract": "The differences in the concepts of values which are the basis of human actions are important when we analyze intercultural communication. The purpose of this study is to estimate emphasizing points for decision-making, which is one of the concepts of values. For this purpose, we experimentally investigate how we could estimate discoveries new factors and increase degree of emphasis by using verbal information, nonverbal behavior and physiological indices. From the results of the investigation, we propose a method to dynamically estimate emphasizing points when two propositions were explained and a participant was asked what were his/her demands. We also conducted an experiment to evaluate our proposed method. As a result, we confirmed that the proposed method could accurately estimate the emphasizing points.", "abstracts": [ { "abstractType": "Regular", "content": "The differences in the concepts of values which are the basis of human actions are important when we analyze intercultural communication. The purpose of this study is to estimate emphasizing points for decision-making, which is one of the concepts of values. For this purpose, we experimentally investigate how we could estimate discoveries new factors and increase degree of emphasis by using verbal information, nonverbal behavior and physiological indices. From the results of the investigation, we propose a method to dynamically estimate emphasizing points when two propositions were explained and a participant was asked what were his/her demands. We also conducted an experiment to evaluate our proposed method. As a result, we confirmed that the proposed method could accurately estimate the emphasizing points.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The differences in the concepts of values which are the basis of human actions are important when we analyze intercultural communication. The purpose of this study is to estimate emphasizing points for decision-making, which is one of the concepts of values. For this purpose, we experimentally investigate how we could estimate discoveries new factors and increase degree of emphasis by using verbal information, nonverbal behavior and physiological indices. From the results of the investigation, we propose a method to dynamically estimate emphasizing points when two propositions were explained and a participant was asked what were his/her demands. We also conducted an experiment to evaluate our proposed method. As a result, we confirmed that the proposed method could accurately estimate the emphasizing points.", "fno": "06122649", "keywords": [ "Behavioural Sciences Computing", "Cultural Aspects", "Decision Making", "Human Computer Interaction", "Physiology", "Nonverbal Information", "Verbal Information", "Physiological Indices", "Human Actions", "Intercultural Communication", "Emphasizing Point Estimation", "Decision Making", "Physiology", "Thyristors", "Humans", "Proposals", "Estimation", "Particle Measurements", "Atmospheric Measurements", "Social Interaction", "Verbal And Nonverbal Behavior", "Physiological Indices" ], "authors": [ { "affiliation": "Graduate school of Infomatics, Kyoto University, Kyoto, Japan", "fullName": "Yoshimasa Ohmoto", "givenName": "Yoshimasa", "surname": "Ohmoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Engineering, Kyoto University, Kyoto, Japan", "fullName": "Misao Kataoka", "givenName": "Misao", "surname": "Kataoka", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate school of Infomatics, Kyoto University, Kyoto, Japan", "fullName": "Takashi Miyake", "givenName": "Takashi", "surname": "Miyake", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate school of Infomatics, Kyoto University, Kyoto, Japan", "fullName": "Toyoaki Nishida", "givenName": "Toyoaki", "surname": "Nishida", "__typename": "ArticleAuthorType" } ], "idPrefix": "grc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "508-514", "year": "2011", "issn": null, "isbn": "978-1-4577-0372-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06122648", "articleId": "12OmNAHmOub", "__typename": "AdjacentArticleType" }, "next": { "fno": "06122650", "articleId": "12OmNAg7jYT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670a396", "title": "Selecting Physiological Features for Predicting Bidding Behavior in Electronic Auctions", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a396/12OmNAkEU6t", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a429", "title": "Neuroticism, Extraversion and Stress: Physiological Correlates", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a429/12OmNC4wtJx", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2017/5812/0/08056587", "title": "The effect of cognitive load on physiological arousal in a decision-making serious game", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2017/08056587/12OmNqJHFDH", "parentPublication": { "id": "proceedings/vs-games/2017/5812/0", "title": "2017 9th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504a442", "title": "You Said What? Assessing the Impact of Collaboration Technologies and Message Characteristics Using Physiological Measures", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504a442/12OmNwNOaO6", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b344", "title": "Advertisement Effectiveness Estimation Based on Crowdsourced Multimodal Affective Responses", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b344/17D45Xtvp9d", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659209", "title": "Facilitating Intercultural Development: Preparing Future Engineers for Multidisciplinary Teams and Multicultural Environments", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659209/18j98GoGIog", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873958", "title": "Characterizing Physiological Responses to Fear, Frustration, and Insight in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873958/1GjwGGW9cSA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873978", "title": "Use Virtual Reality to Enhance Intercultural Sensitivity: A Randomised Parallel Longitudinal Study", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873978/1GjwOm9uWbe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09229513", "title": "Estimating Affective Taste Experience Using Combined Implicit Behavioral and Neurophysiological Measures", "doi": null, "abstractUrl": "/journal/ta/2023/01/09229513/1o3nfbzpzhe", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274181", "title": "Cultural Intelligence and Experiences in International Engineering Programs", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274181/1phRTdiP7nG", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAlvHKJ", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdoMK8", "doi": "10.1109/ICDM.2015.84", "title": "A Unified Gradient Regularization Family for Adversarial Examples", "normalizedTitle": "A Unified Gradient Regularization Family for Adversarial Examples", "abstract": "Adversarial examples are augmented data points generated by imperceptible perturbation of input samples. They have recently drawn much attention with the machine learning and data mining community. Being difficult to distinguish from real examples, such adversarial examples could change the prediction of many of the best learning models including the state-of-the-art deep learning models. Recent attempts have been made to build robust models that take into account adversarial examples. However, these methods can either lead to performance drops or lack mathematical motivations. In this paper, we propose a unified framework to build robust machine learning models against adversarial examples. More specifically, using the unified framework, we develop a family of gradient regularization methods that effectively penalize the gradient of loss function w.r.t. inputs. Our proposed framework is appealing in that it offers a unified view to deal with adversarial examples. It incorporates another recently-proposed perturbation based approach as a special case. In addition, we present some visual effects that reveals semantic meaning in those perturbations, and thus support our regularization method and provide another explanation for generalizability of adversarial examples. By applying this technique to Maxout networks, we conduct a series of experiments and achieve encouraging results on two benchmark datasets. In particular, we attain the best accuracy on MNIST data (without data augmentation) and competitive performance on CIFAR-10 data.", "abstracts": [ { "abstractType": "Regular", "content": "Adversarial examples are augmented data points generated by imperceptible perturbation of input samples. They have recently drawn much attention with the machine learning and data mining community. Being difficult to distinguish from real examples, such adversarial examples could change the prediction of many of the best learning models including the state-of-the-art deep learning models. Recent attempts have been made to build robust models that take into account adversarial examples. However, these methods can either lead to performance drops or lack mathematical motivations. In this paper, we propose a unified framework to build robust machine learning models against adversarial examples. More specifically, using the unified framework, we develop a family of gradient regularization methods that effectively penalize the gradient of loss function w.r.t. inputs. Our proposed framework is appealing in that it offers a unified view to deal with adversarial examples. It incorporates another recently-proposed perturbation based approach as a special case. In addition, we present some visual effects that reveals semantic meaning in those perturbations, and thus support our regularization method and provide another explanation for generalizability of adversarial examples. By applying this technique to Maxout networks, we conduct a series of experiments and achieve encouraging results on two benchmark datasets. In particular, we attain the best accuracy on MNIST data (without data augmentation) and competitive performance on CIFAR-10 data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Adversarial examples are augmented data points generated by imperceptible perturbation of input samples. They have recently drawn much attention with the machine learning and data mining community. Being difficult to distinguish from real examples, such adversarial examples could change the prediction of many of the best learning models including the state-of-the-art deep learning models. Recent attempts have been made to build robust models that take into account adversarial examples. However, these methods can either lead to performance drops or lack mathematical motivations. In this paper, we propose a unified framework to build robust machine learning models against adversarial examples. More specifically, using the unified framework, we develop a family of gradient regularization methods that effectively penalize the gradient of loss function w.r.t. inputs. Our proposed framework is appealing in that it offers a unified view to deal with adversarial examples. It incorporates another recently-proposed perturbation based approach as a special case. In addition, we present some visual effects that reveals semantic meaning in those perturbations, and thus support our regularization method and provide another explanation for generalizability of adversarial examples. By applying this technique to Maxout networks, we conduct a series of experiments and achieve encouraging results on two benchmark datasets. In particular, we attain the best accuracy on MNIST data (without data augmentation) and competitive performance on CIFAR-10 data.", "fno": "9504a301", "keywords": [ "Robustness", "Mathematical Model", "Predictive Models", "Approximation Methods", "Training", "Data Mining", "Optimization", "Robust Classification", "Adversarial Examples", "Deep Learning", "Regularization" ], "authors": [ { "affiliation": null, "fullName": "Chunchuan Lyu", "givenName": "Chunchuan", "surname": "Lyu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kaizhu Huang", "givenName": "Kaizhu", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hai-Ning Liang", "givenName": "Hai-Ning", "surname": "Liang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "301-309", "year": "2015", "issn": "1550-4786", "isbn": "978-1-4673-9504-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9504a291", "articleId": "12OmNzgwmNM", "__typename": "AdjacentArticleType" }, "next": { "fno": "9504a310", "articleId": "12OmNxvwoRM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200h476", "title": "Towards Robustness of Deep Neural Networks via Regularization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200h476/1BmIAJt1ieI", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2021/2186/0/218600a817", "title": "Generating Adversarial Examples for Robust Deception against Image Transfer and Reloading", "doi": null, "abstractUrl": "/proceedings-article/icaice/2021/218600a817/1Et4rmSAMoM", "parentPublication": { "id": "proceedings/icaice/2021/2186/0", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10061236", "title": "Crafting Transferable Adversarial Examples against Face Recognition via Gradient Eroding", "doi": null, "abstractUrl": "/journal/ai/5555/01/10061236/1LiKQGe6vJK", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10106490", "title": "ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction", "doi": null, "abstractUrl": "/journal/tq/5555/01/10106490/1MwAusfITiU", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2019/6660/0/666000a656", "title": "Certified Robustness to Adversarial Examples with Differential Privacy", "doi": null, "abstractUrl": "/proceedings-article/sp/2019/666000a656/1dlwlw6wEw0", "parentPublication": { "id": "proceedings/sp/2019/6660/0", "title": "2019 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pst/2019/3265/0/08949019", "title": "GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor", "doi": null, "abstractUrl": "/proceedings-article/pst/2019/08949019/1grMQyQTzhe", "parentPublication": { "id": "proceedings/pst/2019/3265/0", "title": "2019 17th International Conference on Privacy, Security and Trust (PST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g548", "title": "Adversarial Learning With Margin-Based Triplet Embedding Regularization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g548/1hQqvXg1tde", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn-w/2020/7263/0/09151460", "title": "On The Generation of Unrestricted Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/dsn-w/2020/09151460/1lRm1DTaWiY", "parentPublication": { "id": "proceedings/dsn-w/2020/7263/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b412", "title": "Generalizing Universal Adversarial Attacks Beyond Additive Perturbations", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b412/1r54IaN7xVm", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428316", "title": "Undetectable Adversarial Examples Based on Microscopical Regularization", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428316/1uilHXBjdKg", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmHdwJx5Xq", "doi": "10.1109/ICCV48922.2021.00741", "title": "AdvDrop: Adversarial Attack to DNNs by Dropping Information", "normalizedTitle": "AdvDrop: Adversarial Attack to DNNs by Dropping Information", "abstract": "Human can easily recognize visual objects with lost information: even losing most details with only contour reserved, e.g. cartoon. However, in terms of visual perception of Deep Neural Networks (DNNs), the ability for recognizing abstract objects (visual objects with lost information) is still a challenge. In this work, we investigate this issue from an adversarial viewpoint: will the performance of DNNs decrease even for the images only losing a little information? Towards this end, we propose a novel adversarial attack, named AdvDrop, which crafts adversarial examples by dropping existing information of images. Previously, most adversarial attacks add extra disturbing information on clean images explicitly. Opposite to previous works, our proposed work explores the adversarial robustness of DNN models in a novel perspective by dropping imperceptible de-tails to craft adversarial examples. We demonstrate the effectiveness of AdvDrop by extensive experiments, and show that this new type of adversarial examples is more difficult to be defended by current defense systems.", "abstracts": [ { "abstractType": "Regular", "content": "Human can easily recognize visual objects with lost information: even losing most details with only contour reserved, e.g. cartoon. However, in terms of visual perception of Deep Neural Networks (DNNs), the ability for recognizing abstract objects (visual objects with lost information) is still a challenge. In this work, we investigate this issue from an adversarial viewpoint: will the performance of DNNs decrease even for the images only losing a little information? Towards this end, we propose a novel adversarial attack, named AdvDrop, which crafts adversarial examples by dropping existing information of images. Previously, most adversarial attacks add extra disturbing information on clean images explicitly. Opposite to previous works, our proposed work explores the adversarial robustness of DNN models in a novel perspective by dropping imperceptible de-tails to craft adversarial examples. We demonstrate the effectiveness of AdvDrop by extensive experiments, and show that this new type of adversarial examples is more difficult to be defended by current defense systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human can easily recognize visual objects with lost information: even losing most details with only contour reserved, e.g. cartoon. However, in terms of visual perception of Deep Neural Networks (DNNs), the ability for recognizing abstract objects (visual objects with lost information) is still a challenge. In this work, we investigate this issue from an adversarial viewpoint: will the performance of DNNs decrease even for the images only losing a little information? Towards this end, we propose a novel adversarial attack, named AdvDrop, which crafts adversarial examples by dropping existing information of images. Previously, most adversarial attacks add extra disturbing information on clean images explicitly. Opposite to previous works, our proposed work explores the adversarial robustness of DNN models in a novel perspective by dropping imperceptible de-tails to craft adversarial examples. We demonstrate the effectiveness of AdvDrop by extensive experiments, and show that this new type of adversarial examples is more difficult to be defended by current defense systems.", "fno": "281200h486", "keywords": [ "Deep Learning", "Visualization", "Computer Vision", "Neural Networks", "Robustness", "Visual Perception" ], "authors": [ { "affiliation": "Swinburne University of Technology,Australia", "fullName": "Ranjie Duan", "givenName": "Ranjie", "surname": "Duan", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,China", "fullName": "Yuefeng Chen", "givenName": "Yuefeng", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Berkeley,USA", "fullName": "Dantong Niu", "givenName": "Dantong", "surname": "Niu", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology,Australia", "fullName": "Yun Yang", "givenName": "Yun", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology,Australia", "fullName": "A. K. Qin", "givenName": "A. K.", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,China", "fullName": "Yuan He", "givenName": "Yuan", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "7486-7495", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200h476", "articleId": "1BmIAJt1ieI", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200h496", "articleId": "1BmF47jNXwc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isvlsi/2018/7099/0/709901a476", "title": "MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2018/709901a476/12OmNxGSm7w", "parentPublication": { "id": "proceedings/isvlsi/2018/7099/0", "title": "2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a469", "title": "Black-Box Adversarial Attack by Evolution Strategy with Binary Search", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a469/1AUpDwNblMk", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5077", "title": "Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5077/1BmGWONjuZa", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09857594", "title": "Evolutionary Multi-Label Adversarial Examples: An Effective Black-Box Attack", "doi": null, "abstractUrl": "/journal/ai/5555/01/09857594/1FSYdnDly9y", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000a297", "title": "A Universal Adversarial Attack on Time-Series DNNs for Connected Autonomous Vehicles", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000a297/1JeEqtQ2eE8", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a996", "title": "RIA: A Reversible Network-based Imperceptible Adversarial Attack", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a996/1MrFReLnv5m", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a091", "title": "Dropping Pixels for Adversarial Robustness", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a091/1iTvtY7nyTK", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/09376658", "title": "FAWA: Fast Adversarial Watermark Attack", "doi": null, "abstractUrl": "/journal/tc/5555/01/09376658/1rSN3UJvqTK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900q6057", "title": "Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900q6057/1yeJaY2z6KY", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j020", "title": "Improving the Transferability of Adversarial Samples with Adversarial Transformations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j020/1yeJbXy7XhK", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1GU6OXhOl4k", "title": "2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI)", "acronym": "iiai-aai", "groupId": "1801921", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1GU74bfqASs", "doi": "10.1109/IIAIAAI55812.2022.00011", "title": "Adversarial Examples of Time Series Data based on Partial Perturbations", "normalizedTitle": "Adversarial Examples of Time Series Data based on Partial Perturbations", "abstract": "Recently, adversarial examples have become a significant threat, which intentionally misleads deep learning models by small perturbations beyond human recognition. Adversarial examples have been studied mainly in the field of image recognition, but recently they have been applied to other fields, including time series data. Perturbations are usually added to all regions of the data, but in the case of time series data, adding to the entire series would result in unnatural data. In this study, we show that it is possible to generate less unnatural adversarial examples for the time series data classification problem by partially using perturbations generated by existing attack methods. We also experiment with evaluating the performance and show that for some datasets, even if the range of the perturbations is 1/10, the attack is still possible with almost no degradation in attack performance.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, adversarial examples have become a significant threat, which intentionally misleads deep learning models by small perturbations beyond human recognition. Adversarial examples have been studied mainly in the field of image recognition, but recently they have been applied to other fields, including time series data. Perturbations are usually added to all regions of the data, but in the case of time series data, adding to the entire series would result in unnatural data. In this study, we show that it is possible to generate less unnatural adversarial examples for the time series data classification problem by partially using perturbations generated by existing attack methods. We also experiment with evaluating the performance and show that for some datasets, even if the range of the perturbations is 1/10, the attack is still possible with almost no degradation in attack performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, adversarial examples have become a significant threat, which intentionally misleads deep learning models by small perturbations beyond human recognition. Adversarial examples have been studied mainly in the field of image recognition, but recently they have been applied to other fields, including time series data. Perturbations are usually added to all regions of the data, but in the case of time series data, adding to the entire series would result in unnatural data. In this study, we show that it is possible to generate less unnatural adversarial examples for the time series data classification problem by partially using perturbations generated by existing attack methods. We also experiment with evaluating the performance and show that for some datasets, even if the range of the perturbations is 1/10, the attack is still possible with almost no degradation in attack performance.", "fno": "975500a001", "keywords": [ "Image Recognition", "Learning Artificial Intelligence", "Pattern Classification", "Time Series", "Unnatural Data", "Unnatural Adversarial Examples", "Time Series Data Classification Problem", "Partial Perturbations", "Entire Series", "Degradation", "Deep Learning", "Image Recognition", "Perturbation Methods", "Time Series Analysis", "Data Models", "Informatics", "Adversarial Examples", "Time Series Data", "Deep Learning", "Security" ], "authors": [ { "affiliation": "Hiroshima City University,Graduate School of Information Sciences,Hiroshima,Japan", "fullName": "Jun Teraoka", "givenName": "Jun", "surname": "Teraoka", "__typename": "ArticleAuthorType" }, { "affiliation": "Hiroshima City University,Graduate School of Information Sciences,Hiroshima,Japan", "fullName": "Keiichi Tamura", "givenName": "Keiichi", "surname": "Tamura", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiai-aai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": "2472-0070", "isbn": "978-1-6654-9755-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "975500z030", "articleId": "1GU6UetDkR2", "__typename": "AdjacentArticleType" }, "next": { "fno": "975500a007", "articleId": "1GU78vR4qfC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000e422", "title": "Generative Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e422/17D45VTRoCR", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594975", "title": "Multi-label Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594975/17D45XeKgsT", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859848", "title": "Attention Based Adversarial Attacks with Low Perturbations", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859848/1G9DUdnMkog", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a361", "title": "WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a361/1LFM3XR9l9m", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093429", "title": "SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093429/1jPbf92Csz6", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800o4509", "title": "Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800o4509/1m3olCJ2iD6", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2020/9346/0/934600a027", "title": "RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/spw/2020/934600a027/1pF6UX4XwmA", "parentPublication": { "id": "proceedings/spw/2020/9346/0", "title": "2020 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2020/8243/0/09425190", "title": "Adversarial Examples in Deep Learning for Multivariate Time Series Regression", "doi": null, "abstractUrl": "/proceedings-article/aipr/2020/09425190/1tuA5buWqDS", "parentPublication": { "id": "proceedings/aipr/2020/8243/0", "title": "2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2021/2616/0/261600a327", "title": "Robust Attack with Adaptive Compress Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/iccea/2021/261600a327/1y4oD9Rxmfu", "parentPublication": { "id": "proceedings/iccea/2021/2616/0", "title": "2021 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4661", "title": "Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4661/1yeLnLskUvu", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uiluGq0Oo8", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uilHXBjdKg", "doi": "10.1109/ICME51207.2021.9428316", "title": "Undetectable Adversarial Examples Based on Microscopical Regularization", "normalizedTitle": "Undetectable Adversarial Examples Based on Microscopical Regularization", "abstract": "Recent works have demonstrated that neural networks are vulnerable to adversarial examples. Although existing methods have achieved satisfactory attack success rates, most adversarial examples can be detected by statistical analysis and further removed. In previous methods, adversarial perturbations are added using adversarial loss and distance metrics, in which the positions of modified pixels are not considered. In this paper, we elaborate a microscopical regularization that introduces adversarial perturbations onto rich texture regions. The microscopical regularization is used to evaluate pixel-level differences between a normal image and its adversarial version. We further propose a novel optimization strategy of modification probability matrices to minimize the loss function that satisfies the restriction of L<inf>&#x221E;</inf>. Through extensive experiments, we show that our method can resist statistical analysis by a large margin and achieve better visual quality than others. The proposed microscopical regularization can also be combined with existing approaches to enhance the undetectability and robustness.", "abstracts": [ { "abstractType": "Regular", "content": "Recent works have demonstrated that neural networks are vulnerable to adversarial examples. Although existing methods have achieved satisfactory attack success rates, most adversarial examples can be detected by statistical analysis and further removed. In previous methods, adversarial perturbations are added using adversarial loss and distance metrics, in which the positions of modified pixels are not considered. In this paper, we elaborate a microscopical regularization that introduces adversarial perturbations onto rich texture regions. The microscopical regularization is used to evaluate pixel-level differences between a normal image and its adversarial version. We further propose a novel optimization strategy of modification probability matrices to minimize the loss function that satisfies the restriction of L<inf>&#x221E;</inf>. Through extensive experiments, we show that our method can resist statistical analysis by a large margin and achieve better visual quality than others. The proposed microscopical regularization can also be combined with existing approaches to enhance the undetectability and robustness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent works have demonstrated that neural networks are vulnerable to adversarial examples. Although existing methods have achieved satisfactory attack success rates, most adversarial examples can be detected by statistical analysis and further removed. In previous methods, adversarial perturbations are added using adversarial loss and distance metrics, in which the positions of modified pixels are not considered. In this paper, we elaborate a microscopical regularization that introduces adversarial perturbations onto rich texture regions. The microscopical regularization is used to evaluate pixel-level differences between a normal image and its adversarial version. We further propose a novel optimization strategy of modification probability matrices to minimize the loss function that satisfies the restriction of L∞. Through extensive experiments, we show that our method can resist statistical analysis by a large margin and achieve better visual quality than others. The proposed microscopical regularization can also be combined with existing approaches to enhance the undetectability and robustness.", "fno": "09428316", "keywords": [ "Image Enhancement", "Image Resolution", "Image Texture", "Matrix Algebra", "Neural Nets", "Optimisation", "Probability", "Statistical Analysis", "Pixel Level Differences", "Statistical Analysis", "Microscopical Regularization", "Undetectable Adversarial Examples", "Neural Networks", "Satisfactory Attack Success Rates", "Adversarial Perturbations", "Adversarial Loss", "Distance Metrics", "Modification Probability Matrices", "Measurement", "Visualization", "Statistical Analysis", "Microscopy", "Perturbation Methods", "Neural Networks", "Resists", "Adversarial Example", "Adversarial Detection" ], "authors": [ { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Nan Zhong", "givenName": "Nan", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Zhenxing Qian", "givenName": "Zhenxing", "surname": "Qian", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Xinpeng Zhang", "givenName": "Xinpeng", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-3864-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09428244", "articleId": "1uilLhaiA12", "__typename": "AdjacentArticleType" }, "next": { "fno": "09428185", "articleId": "1uimgkUrnag", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2015/9504/0/9504a301", "title": "A Unified Gradient Regularization Family for Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a301/12OmNzdoMK8", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b378", "title": "Adversarial Examples for Semantic Segmentation and Object Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b378/12OmNzvQHYZ", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b695", "title": "Semantic Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b695/17D45WYQJ9p", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900a138", "title": "Adversarial Robustness through the Lens of Convolutional Filters", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900a138/1G56GzZn66Y", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e670", "title": "Adversarial local distribution regularization for knowledge distillation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e670/1L8qABslwoU", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g548", "title": "Adversarial Learning With Margin-Based Triplet Embedding Regularization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g548/1hQqvXg1tde", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800b178", "title": "Efficient Adversarial Training With Transferable Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800b178/1m3nukgTX5m", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/06/09591317", "title": "Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks", "doi": null, "abstractUrl": "/journal/tq/2022/06/09591317/1y2FEYRs5qM", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h604", "title": "Adversarial Robustness Across Representation Spaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h604/1yeKqWMcS1a", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2021/4935/0/493500a173", "title": "Certifiably-Robust Federated Adversarial Learning via Randomized Smoothing", "doi": null, "abstractUrl": "/proceedings-article/mass/2021/493500a173/1ziOBrtnYgU", "parentPublication": { "id": "proceedings/mass/2021/4935/0", "title": "2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uqGdWlamUo", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uqGuHq6N6U", "doi": "10.1109/WACV48630.2021.00276", "title": "R-MNet: A Perceptual Adversarial Network for Image Inpainting", "normalizedTitle": "R-MNet: A Perceptual Adversarial Network for Image Inpainting", "abstract": "Facial image inpainting is a problem that is widely studied, and in recent years the introduction of Generative Adversarial Networks, has led to improvements in the field. Unfortunately some issues persists, in particular when blending the missing pixels with the visible ones. We address the problem by proposing a Wasserstein GAN combined with a new reverse mask operator, namely Reverse Masking Network (R-MNet), a perceptual adversarial network for image inpainting. The reverse mask operator transfers the reverse masked image to the end of the encoder-decoder network leaving only valid pixels to be inpainted. Additionally, we propose a new loss function computed in feature space to target only valid pixels combined with adversarial training. These then capture data distributions and generate images similar to those in the training data with achieved realism (realistic and coherent) on the output images. We evaluate our method on publicly available dataset, and compare with state-of-the-art methods. We show that our method is able to generalize to high-resolution inpainting task, and further show more realistic outputs that are plausible to the human visual system when compared with the state-of-the-art methods. https://github.com/Jireh-Jam/R-MNet-Inpainting-keras", "abstracts": [ { "abstractType": "Regular", "content": "Facial image inpainting is a problem that is widely studied, and in recent years the introduction of Generative Adversarial Networks, has led to improvements in the field. Unfortunately some issues persists, in particular when blending the missing pixels with the visible ones. We address the problem by proposing a Wasserstein GAN combined with a new reverse mask operator, namely Reverse Masking Network (R-MNet), a perceptual adversarial network for image inpainting. The reverse mask operator transfers the reverse masked image to the end of the encoder-decoder network leaving only valid pixels to be inpainted. Additionally, we propose a new loss function computed in feature space to target only valid pixels combined with adversarial training. These then capture data distributions and generate images similar to those in the training data with achieved realism (realistic and coherent) on the output images. We evaluate our method on publicly available dataset, and compare with state-of-the-art methods. We show that our method is able to generalize to high-resolution inpainting task, and further show more realistic outputs that are plausible to the human visual system when compared with the state-of-the-art methods. https://github.com/Jireh-Jam/R-MNet-Inpainting-keras", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Facial image inpainting is a problem that is widely studied, and in recent years the introduction of Generative Adversarial Networks, has led to improvements in the field. Unfortunately some issues persists, in particular when blending the missing pixels with the visible ones. We address the problem by proposing a Wasserstein GAN combined with a new reverse mask operator, namely Reverse Masking Network (R-MNet), a perceptual adversarial network for image inpainting. The reverse mask operator transfers the reverse masked image to the end of the encoder-decoder network leaving only valid pixels to be inpainted. Additionally, we propose a new loss function computed in feature space to target only valid pixels combined with adversarial training. These then capture data distributions and generate images similar to those in the training data with achieved realism (realistic and coherent) on the output images. We evaluate our method on publicly available dataset, and compare with state-of-the-art methods. We show that our method is able to generalize to high-resolution inpainting task, and further show more realistic outputs that are plausible to the human visual system when compared with the state-of-the-art methods. https://github.com/Jireh-Jam/R-MNet-Inpainting-keras", "fno": "047700c713", "keywords": [ "Decoding", "Face Recognition", "Feature Extraction", "Image Colour Analysis", "Image Representation", "Image Resolution", "Image Restoration", "Image Texture", "Learning Artificial Intelligence", "Medical Computing", "Neural Nets", "R M Net", "Perceptual Adversarial Network", "Facial Image Inpainting", "Generative Adversarial Networks", "Missing Pixels", "Reverse Mask Operator", "Reverse Masking Network", "Encoder Decoder Network", "Valid Pixels", "Adversarial Training", "High Resolution Inpainting Task", "Training", "Image Resolution", "Shape", "Computational Modeling", "Conferences", "Training Data", "Visual Systems" ], "authors": [ { "affiliation": "Manchester Metropolitan University,Manchester,UK", "fullName": "Jireh Jam", "givenName": "Jireh", "surname": "Jam", "__typename": "ArticleAuthorType" }, { "affiliation": "Manchester Metropolitan University,Manchester,UK", "fullName": "Connah Kendrick", "givenName": "Connah", "surname": "Kendrick", "__typename": "ArticleAuthorType" }, { "affiliation": "Image Metrics Ltd,Manchester,UK", "fullName": "Vincent Drouard", "givenName": "Vincent", "surname": "Drouard", "__typename": "ArticleAuthorType" }, { "affiliation": "Image Metrics Ltd,Manchester,UK", "fullName": "Kevin Walker", "givenName": "Kevin", "surname": "Walker", "__typename": "ArticleAuthorType" }, { "affiliation": "National Taiwan University of Science and Technology,Taipei,Taiwan", "fullName": "Gee-Sern Hsu", "givenName": "Gee-Sern", "surname": "Hsu", "__typename": "ArticleAuthorType" }, { "affiliation": "Manchester Metropolitan University,Manchester,UK", "fullName": "Moi Hoon Yap", "givenName": "Moi Hoon", "surname": "Yap", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "2713-2722", "year": "2021", "issn": null, "isbn": "978-1-6654-0477-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "047700c703", "articleId": "1uqGGZUEydO", "__typename": "AdjacentArticleType" }, "next": { "fno": "047700c723", "articleId": "1uqGqC6fB3a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acpr/2017/3354/0/3354a588", "title": "Image Inpainting: A Contextual Consistent and Deep Generative Adversarial Training Approach", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a588/17D45WgziOP", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900a977", "title": "Image Multi-Inpainting via Progressive Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900a977/1G56VVqeIco", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b300", "title": "GLaMa: Joint Spatial and Frequency Loss for General Image Inpainting", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b300/1G56q5kBPtS", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1451", "title": "RePaint: Inpainting using Denoising Diffusion Probabilistic Models", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1451/1H0L6YfOPhS", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i857", "title": "Image Inpainting With Learnable Bidirectional Attention Maps", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i857/1hQqrTkskH6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e470", "title": "Free-Form Image Inpainting With Gated Convolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e470/1hQqtcHWhJS", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0520", "title": "Boundless: Generative Adversarial Networks for Image Extension", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2020/7083/0/708300a259", "title": "Research on Image Inpainting Based on Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I", "parentPublication": { "id": "proceedings/iccnea/2020/7083/0", "title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2020/8138/0/813800a137", "title": "Research on Character Image Inpainting based on Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI", "parentPublication": { "id": "proceedings/iccst/2020/8138/0", "title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2020/9146/0/914600a276", "title": "Semantic image inpainting based on Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC", "parentPublication": { "id": "proceedings/icaice/2020/9146/0", "title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yXu6NL4pqw", "title": "2021 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yXujc7Nwqc", "doi": "10.1109/VIS49827.2021.9623273", "title": "Jurassic Mark: Inattentional Blindness for a Datasaurus Reveals that Visualizations are Explored, not Seen", "normalizedTitle": "Jurassic Mark: Inattentional Blindness for a Datasaurus Reveals that Visualizations are Explored, not Seen", "abstract": "Graphs effectively communicate data because they capitalize on the visual system&#x2019;s ability to rapidly extract patterns. Yet, this pattern extraction does not occur in a single glance. Instead, research on visual attention suggests that the visual system iteratively applies a sequence of filtering operations on an image, extracting patterns from subsets of visual information over time, while selectively inhibiting other information at each of these moments. To demonstrate that this powerful series of filtering operations also occurs during the perception of visualized data, we designed a task where participants made judgments from one class of marks on a scatterplot, presumably incentivizing them to relatively ignore other classes of marks. Participants consistently missed a conspicuous dinosaur in the ignored collection of marks (93&#x0025; for a 1s presentation, and 61&#x0025; for 2.5s), but not in a control condition where the incentive to ignore that collection was removed (25&#x0025; for a 1s presentation, and 11&#x0025; for 2.5s), revealing that data visualizations are not &#x201C;seen&#x201D; in a single glance, and instead require an active process of exploration.", "abstracts": [ { "abstractType": "Regular", "content": "Graphs effectively communicate data because they capitalize on the visual system&#x2019;s ability to rapidly extract patterns. Yet, this pattern extraction does not occur in a single glance. Instead, research on visual attention suggests that the visual system iteratively applies a sequence of filtering operations on an image, extracting patterns from subsets of visual information over time, while selectively inhibiting other information at each of these moments. To demonstrate that this powerful series of filtering operations also occurs during the perception of visualized data, we designed a task where participants made judgments from one class of marks on a scatterplot, presumably incentivizing them to relatively ignore other classes of marks. Participants consistently missed a conspicuous dinosaur in the ignored collection of marks (93&#x0025; for a 1s presentation, and 61&#x0025; for 2.5s), but not in a control condition where the incentive to ignore that collection was removed (25&#x0025; for a 1s presentation, and 11&#x0025; for 2.5s), revealing that data visualizations are not &#x201C;seen&#x201D; in a single glance, and instead require an active process of exploration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graphs effectively communicate data because they capitalize on the visual system’s ability to rapidly extract patterns. Yet, this pattern extraction does not occur in a single glance. Instead, research on visual attention suggests that the visual system iteratively applies a sequence of filtering operations on an image, extracting patterns from subsets of visual information over time, while selectively inhibiting other information at each of these moments. To demonstrate that this powerful series of filtering operations also occurs during the perception of visualized data, we designed a task where participants made judgments from one class of marks on a scatterplot, presumably incentivizing them to relatively ignore other classes of marks. Participants consistently missed a conspicuous dinosaur in the ignored collection of marks (93% for a 1s presentation, and 61% for 2.5s), but not in a control condition where the incentive to ignore that collection was removed (25% for a 1s presentation, and 11% for 2.5s), revealing that data visualizations are not “seen” in a single glance, and instead require an active process of exploration.", "fno": "333500a071", "keywords": [ "Data Visualisation", "Feature Extraction", "Image Processing", "Visual Perception", "Data Visualizations", "Jurassic Mark", "Inattentional Blindness", "Datasaurus", "Visual System", "Pattern Extraction", "Dinosaurs", "Visualization", "Filtration", "Data Visualization", "Process Control", "Blindness", "Visual Systems", "Perception Amp Cognition", "Attention", "Communcation Presentation" ], "authors": [ { "affiliation": "Yale University", "fullName": "Tal Boger", "givenName": "Tal", "surname": "Boger", "__typename": "ArticleAuthorType" }, { "affiliation": "UNSW Sydney", "fullName": "Steven B. Most", "givenName": "Steven B.", "surname": "Most", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Steven L. Franconeri", "givenName": "Steven L.", "surname": "Franconeri", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "71-75", "year": "2021", "issn": null, "isbn": "978-1-6654-3335-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "333500a066", "articleId": "1yXu9ashtdK", "__typename": "AdjacentArticleType" }, "next": { "fno": "333500a076", "articleId": "1yXuiT4GCbK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sitis/2015/9721/0/9721a089", "title": "Exploiting Change Blindness for Image Compression", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a089/12OmNAq3hFn", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2010/6237/0/05444790", "title": "Change blindness phenomena for stereoscopic projection systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2010/05444790/12OmNBTs7wG", "parentPublication": { "id": "proceedings/vr/2010/6237/0", "title": "2010 IEEE Virtual Reality Conference (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822638", "title": "Feature study of conversion blindness on functional network with aggregation of local key information", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822638/12OmNz3bdGK", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790081", "title": "Uncovering Clusters in Crowded Parallel Coordinates Visualizations", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790081/12OmNzR8CvT", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/11/ttg2013111808", "title": "Change Blindness Images", "doi": null, "abstractUrl": "/journal/tg/2013/11/ttg2013111808/13rRUwh80uz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08672601", "title": "Developing Virtual Reality Visualizations for Unsteady Flow Analysis of Dinosaur Track Formation using Scientific Sketching", "doi": null, "abstractUrl": "/journal/tg/2019/05/08672601/18A3bLyziyk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h875", "title": "Distinguishing Unseen from Seen for Generalized Zero-shot Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h875/1H0Okb0kCmk", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049723", "title": "A Study of Change Blindness in Immersive Environments", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049723/1KYovPd66oo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809832", "title": "Searching the Visual Style and Structure of D3 Visualizations", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809832/1cHEgg8WeNW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557878", "title": "Rethinking the Ranks of Visual Channels", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557878/1xquNQMVFCM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13rRUwfqpFe", "title": "2018 IEEE International Conference on Web Services (ICWS)", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13rRUx0xPQk", "doi": "10.1109/ICWS.2018.00062", "title": "Extinguishing the Backfire Effect: Using Emotions in Online Social Collaborative Argumentation for Fact Checking", "normalizedTitle": "Extinguishing the Backfire Effect: Using Emotions in Online Social Collaborative Argumentation for Fact Checking", "abstract": "Controversial or complex topics often exhibit the backfire effect, where users' opinions harden in the face of facts to the contrary. We present initial work towards developing an online social collaborative argumentation system to verify alternative facts and misinformation by also including users' emotional associations with those stances. Our goal is to help users more effectively explore and understand their possibly subconscious biases in an effort to overcome the backfire effect and formulate more varied insights into complex and controversial topics. In order to aid this process, we model their emotional profile on such topics and combine it with a proposition profile, based on the semantic and collaborative content of propositions. We develop an algorithm to generate sentiment-based models of claims and propositions which we can filter based on users' inferred beliefs and the strength of those beliefs.", "abstracts": [ { "abstractType": "Regular", "content": "Controversial or complex topics often exhibit the backfire effect, where users' opinions harden in the face of facts to the contrary. We present initial work towards developing an online social collaborative argumentation system to verify alternative facts and misinformation by also including users' emotional associations with those stances. Our goal is to help users more effectively explore and understand their possibly subconscious biases in an effort to overcome the backfire effect and formulate more varied insights into complex and controversial topics. In order to aid this process, we model their emotional profile on such topics and combine it with a proposition profile, based on the semantic and collaborative content of propositions. We develop an algorithm to generate sentiment-based models of claims and propositions which we can filter based on users' inferred beliefs and the strength of those beliefs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Controversial or complex topics often exhibit the backfire effect, where users' opinions harden in the face of facts to the contrary. We present initial work towards developing an online social collaborative argumentation system to verify alternative facts and misinformation by also including users' emotional associations with those stances. Our goal is to help users more effectively explore and understand their possibly subconscious biases in an effort to overcome the backfire effect and formulate more varied insights into complex and controversial topics. In order to aid this process, we model their emotional profile on such topics and combine it with a proposition profile, based on the semantic and collaborative content of propositions. We develop an algorithm to generate sentiment-based models of claims and propositions which we can filter based on users' inferred beliefs and the strength of those beliefs.", "fno": "724701a363", "keywords": [ "Groupware", "Information Resources", "Sentiment Analysis", "Social Networking Online", "Backfire Effect", "Online Social Collaborative Argumentation System", "Emotional Profile", "Fact Checking", "Users Emotional Associations", "Sentiment Based Models", "Cognition", "Collaboration", "Radar", "Semantics", "Tools", "Wheels", "Conferences", "Fact Checking", "Fake News", "Backfire Effect", "Misinformation", "Social Collaborative Argumentation" ], "authors": [ { "affiliation": null, "fullName": "Ricky Sethi", "givenName": "Ricky", "surname": "Sethi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Raghuram Rangaraju", "givenName": "Raghuram", "surname": "Rangaraju", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "363-366", "year": "2018", "issn": null, "isbn": "978-1-5386-7247-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "724701a359", "articleId": "13rRUx0xPQj", "__typename": "AdjacentArticleType" }, "next": { "fno": "724701a367", "articleId": "13rRUxASurE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2017/0752/0/0752a866", "title": "Spotting Fake News: A Social Argumentation Framework for Scrutinizing Alternative Facts", "doi": null, "abstractUrl": "/proceedings-article/icws/2017/0752a866/12OmNwl8GEU", "parentPublication": { "id": "proceedings/icws/2017/0752/0", "title": "2017 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a329", "title": "HiGIL: Hierarchical Graph Inference Learning for Fact Checking", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a329/1KpCoSx0Dte", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a231", "title": "Knowing what to look for: A Fact-Evidence Reasoning Framework for Decoding Communicative Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a231/1qROsJzNjnq", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qROXFywpVe", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "acronym": "wetice", "groupId": "1000265", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qRP02IGyZ2", "doi": "10.1109/WETICE49692.2020.00053", "title": "Web2Touch 2020&#x2013;21 : Semantic Technologies for Smart Information Sharing and Web Collaboration", "normalizedTitle": "Web2Touch 2020–21 : Semantic Technologies for Smart Information Sharing and Web Collaboration", "abstract": "This foreword introduces a summary of themes and papers of the Web2Touch (W2T) 2020-21 Track at the 29th IEEE WETICE Conference held as a virtual Conference, in October 2020. W2T 2020-21 includes six full papers and four short papers. They all address relevant issues in the field of information sharing for collaboration, including, big data analytics, knowledge engineering, linked open data, applications of smart Web technologies, and smart care. The papers address a portfolio of hot issues in research and applications of semantics, smart technologies (e.g., IoT, sensors, devices for tele-monitoring, and smart contents management) with crucial topics, such as big data analysis, knowledge representation, smart enterprise management, among the others. This track shows how cooperative technologies based on knowledge representation, intelligent tools, and enhanced Web engineering can enhance collaborative work through smart service design and delivery, so it contributes to radically change the role of the semantic Web and applications.", "abstracts": [ { "abstractType": "Regular", "content": "This foreword introduces a summary of themes and papers of the Web2Touch (W2T) 2020-21 Track at the 29th IEEE WETICE Conference held as a virtual Conference, in October 2020. W2T 2020-21 includes six full papers and four short papers. They all address relevant issues in the field of information sharing for collaboration, including, big data analytics, knowledge engineering, linked open data, applications of smart Web technologies, and smart care. The papers address a portfolio of hot issues in research and applications of semantics, smart technologies (e.g., IoT, sensors, devices for tele-monitoring, and smart contents management) with crucial topics, such as big data analysis, knowledge representation, smart enterprise management, among the others. This track shows how cooperative technologies based on knowledge representation, intelligent tools, and enhanced Web engineering can enhance collaborative work through smart service design and delivery, so it contributes to radically change the role of the semantic Web and applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This foreword introduces a summary of themes and papers of the Web2Touch (W2T) 2020-21 Track at the 29th IEEE WETICE Conference held as a virtual Conference, in October 2020. W2T 2020-21 includes six full papers and four short papers. They all address relevant issues in the field of information sharing for collaboration, including, big data analytics, knowledge engineering, linked open data, applications of smart Web technologies, and smart care. The papers address a portfolio of hot issues in research and applications of semantics, smart technologies (e.g., IoT, sensors, devices for tele-monitoring, and smart contents management) with crucial topics, such as big data analysis, knowledge representation, smart enterprise management, among the others. This track shows how cooperative technologies based on knowledge representation, intelligent tools, and enhanced Web engineering can enhance collaborative work through smart service design and delivery, so it contributes to radically change the role of the semantic Web and applications.", "fno": "697500a235", "keywords": [ "Big Data", "Content Management", "Data Analysis", "Groupware", "Internet Of Things", "Semantic Web", "Semantic Technologies", "Smart Information Sharing", "Web Collaboration", "W 2 T", "Virtual Conference", "Big Data Analytics", "Linked Open Data", "Smart Web Technologies", "Smart Care", "Smart Technologies", "Smart Contents Management", "Big Data Analysis", "Knowledge Representation", "Smart Enterprise Management", "Enhanced Web Engineering", "Smart Service Design", "Semantic Web", "IEEE WETICE Conference", "Web 2 Touch 2020 21 Track", "Semantic Web", "Conferences", "Semantics", "Collaboration", "Knowledge Representation", "Big Data", "Tools", "Semantic Web", "Knowledge Representation", "Collaborative Web", "Linked Data", "Ontology", "Security", "Smart Care", "Data Analytics" ], "authors": [ { "affiliation": "CTI Renato Archer and UNIFACCAMP,Campinas,SP Brazil", "fullName": "Rodrigo Bonacin", "givenName": "Rodrigo", "surname": "Bonacin", "__typename": "ArticleAuthorType" }, { "affiliation": "DEIB - Politecnico di Milano,Milano,Italy", "fullName": "Mariagrazia Fugini", "givenName": "Mariagrazia", "surname": "Fugini", "__typename": "ArticleAuthorType" }, { "affiliation": "FIM - Università di Modena e Reggio Emilia,Modena,Italy", "fullName": "Riccardo Martoglia", "givenName": "Riccardo", "surname": "Martoglia", "__typename": "ArticleAuthorType" }, { "affiliation": "CTI Renato Archer,Campinas,SP Brazil", "fullName": "Olga Nabuco", "givenName": "Olga", "surname": "Nabuco", "__typename": "ArticleAuthorType" }, { "affiliation": "CNRS and Paris Saclay University,LRI,Orsay,France", "fullName": "Fatiha Saïs", "givenName": "Fatiha", "surname": "Saïs", "__typename": "ArticleAuthorType" } ], "idPrefix": "wetice", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "235-238", "year": "2020", "issn": null, "isbn": "978-1-7281-6975-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "697500a231", "articleId": "1qROZfBNsGY", "__typename": "AdjacentArticleType" }, "next": { "fno": "697500a239", "articleId": "1qRP0qGEEUM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/colcom/2006/0428/0/04207505", "title": "Collaboration@work 2020: Ubiquitous Collaboration Research Perspectives", "doi": null, "abstractUrl": "/proceedings-article/colcom/2006/04207505/12OmNBCZnSf", "parentPublication": { "id": "proceedings/colcom/2006/0428/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2017/1759/0/1759a275", "title": "Web2Touch 2017: Semantic Technologies in Smart Information Sharing and Web Collaboration", "doi": null, "abstractUrl": "/proceedings-article/wetice/2017/1759a275/12OmNwF0BOM", "parentPublication": { "id": "proceedings/wetice/2017/1759/0", "title": "2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2018/6916/0/691601a251", "title": "Web2Touch 2018: Semantic Technologies in Smart Information Sharing and Web Collaboration", "doi": null, "abstractUrl": "/proceedings-article/wetice/2018/691601a251/17D45XfSEU0", "parentPublication": { "id": "proceedings/wetice/2018/6916/0", "title": "2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2021/2789/0/278900z025", "title": "Web2Touch 2021, Semantic Technologies for Smart Information Sharing and Web Collaboration", "doi": null, "abstractUrl": "/proceedings-article/wetice/2021/278900z025/1AqwLDRndhS", "parentPublication": { "id": "proceedings/wetice/2021/2789/0", "title": "2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2019/0676/0/067600a255", "title": "Web2Touch 2019: Semantic Technologies for Smart Information Sharing and Web Collaboration", "doi": null, "abstractUrl": "/proceedings-article/wetice/2019/067600a255/1cJ1rTWEN68", "parentPublication": { "id": "proceedings/wetice/2019/0676/0", "title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2020/6042/0/09178668", "title": "Preface: ICCIA 2020", "doi": null, "abstractUrl": "/proceedings-article/iccia/2020/09178668/1mDu48Sqy3K", "parentPublication": { "id": "proceedings/iccia/2020/6042/0", "title": "2020 5th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asiajcis/2020/9922/0/09194130", "title": "Message from the Program Co-Chairs: AsiaJCIS 2020", "doi": null, "abstractUrl": "/proceedings-article/asiajcis/2020/09194130/1n0Ip1hBZJu", "parentPublication": { "id": "proceedings/asiajcis/2020/9922/0", "title": "2020 15th Asia Joint Conference on Information Security (AsiaJCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&pw/2020/8597/0/859700a001", "title": "International Workshop on Cyber Range Technologies and Applications (CACOE 2020)", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2020/859700a001/1o8ql2lZ3zi", "parentPublication": { "id": "proceedings/euros&pw/2020/8597/0", "title": "2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smds/2020/8777/0/877700z001", "title": "2020 IEEE International Conference on Smart Data Services SMDS 2020", "doi": null, "abstractUrl": "/proceedings-article/smds/2020/877700z001/1pP3OA2m5wY", "parentPublication": { "id": "proceedings/smds/2020/8777/0", "title": "2020 IEEE International Conference on Smart Data Services (SMDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2020/6975/0/697500a001", "title": "Adaptive Computing (and Agents) for Enhanced Collaboration (ACEC 2020)", "doi": null, "abstractUrl": "/proceedings-article/wetice/2020/697500a001/1qROYon9McM", "parentPublication": { "id": "proceedings/wetice/2020/6975/0", "title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tB7s2Tdims", "title": "2021 IEEE/ACM 13th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "acronym": "chase", "groupId": null, "volume": "0", "displayVolume": null, "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tB7tcs7gwU", "doi": "10.1109/CHASE52884.2021.00021", "title": "Qualitatively Analyzing PR Rejection Reasons from Conversations in Open-Source Projects", "normalizedTitle": "Qualitatively Analyzing PR Rejection Reasons from Conversations in Open-Source Projects", "abstract": "Software developers have largely relied on pull requests as a mechanism of collaboration in their projects. Researchers have collected and analyzed pull request data in different ways for different reasons. In particular, we have qualitatively analyzed pull request conversation data to understand the main reasons for pull request rejection from a developer's perspective. In this paper, we report results from ongoing research on identifying and categorizing pull request rejection factors. Two software developers, co-authors of this paper, manually analyzed 605 rejected PRs from Hexo and ESLint. We found that the most frequent reasons for PR rejection may vary depending on the project size and popularity. Still, some common rejection factors include implementing unnecessary functionality, conflicting PRs, agreement to make PR reattempts, and inactivity. Code quality issues are not among the most frequent reasons.", "abstracts": [ { "abstractType": "Regular", "content": "Software developers have largely relied on pull requests as a mechanism of collaboration in their projects. Researchers have collected and analyzed pull request data in different ways for different reasons. In particular, we have qualitatively analyzed pull request conversation data to understand the main reasons for pull request rejection from a developer's perspective. In this paper, we report results from ongoing research on identifying and categorizing pull request rejection factors. Two software developers, co-authors of this paper, manually analyzed 605 rejected PRs from Hexo and ESLint. We found that the most frequent reasons for PR rejection may vary depending on the project size and popularity. Still, some common rejection factors include implementing unnecessary functionality, conflicting PRs, agreement to make PR reattempts, and inactivity. Code quality issues are not among the most frequent reasons.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Software developers have largely relied on pull requests as a mechanism of collaboration in their projects. Researchers have collected and analyzed pull request data in different ways for different reasons. In particular, we have qualitatively analyzed pull request conversation data to understand the main reasons for pull request rejection from a developer's perspective. In this paper, we report results from ongoing research on identifying and categorizing pull request rejection factors. Two software developers, co-authors of this paper, manually analyzed 605 rejected PRs from Hexo and ESLint. We found that the most frequent reasons for PR rejection may vary depending on the project size and popularity. Still, some common rejection factors include implementing unnecessary functionality, conflicting PRs, agreement to make PR reattempts, and inactivity. Code quality issues are not among the most frequent reasons.", "fno": "140900a109", "keywords": [ "Project Management", "Public Domain Software", "Software Development Management", "Software Quality", "Analyzing PR Rejection Reasons", "Open Source Projects", "Software Developers", "Pull Requests", "Pull Request Data", "Pull Request Conversation Data", "Developer", "Identifying Categorizing Pull Request Rejection Factors", "Frequent Reasons", "Project Size", "Common Rejection Factors", "PR Reattempts", "Conferences", "Collaboration", "Tools", "History", "Open Source Software", "Software Engineering", "Guidelines", "Pull Request", "Code Review", "Open Source Software", "Developer Communication", "Social Software Engineering" ], "authors": [ { "affiliation": "California Polytechnic State University,Department of Computer Science and Software Engineering,San Luis Obispo,CA,USA", "fullName": "Tanay Gottigundala", "givenName": "Tanay", "surname": "Gottigundala", "__typename": "ArticleAuthorType" }, { "affiliation": "California Polytechnic State University,Department of Computer Science and Software Engineering,San Luis Obispo,CA,USA", "fullName": "Siriwan Sereesathien", "givenName": "Siriwan", "surname": "Sereesathien", "__typename": "ArticleAuthorType" }, { "affiliation": "California Polytechnic State University,Department of Computer Science and Software Engineering,San Luis Obispo,CA,USA", "fullName": "Bruno da Silva", "givenName": "Bruno", "surname": "da Silva", "__typename": "ArticleAuthorType" } ], "idPrefix": "chase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-05-01T00:00:00", "pubType": "proceedings", "pages": "109-112", "year": "2021", "issn": null, "isbn": "978-1-6654-1409-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "140900a105", "articleId": "1tB7tbdtzpu", "__typename": "AdjacentArticleType" }, "next": { "fno": "140900a113", "articleId": "1tB7tdDlM5y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/semotion/2016/4169/0/4169a003", "title": "Affective Trust as a Predictor of Successful Collaboration in Distributed Software Projects", "doi": null, "abstractUrl": "/proceedings-article/semotion/2016/4169a003/12OmNyUWQQM", "parentPublication": { "id": "proceedings/semotion/2016/4169/0", "title": "2016 IEEE/ACM 1st International Workshop on Emotional Awareness in Software Engineering (SEmotion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2018/5638/0/563801a256", "title": "Almost There: A Study on Quasi-Contributors in Open-Source Software Projects", "doi": null, "abstractUrl": "/proceedings-article/icse/2018/563801a256/13l5NXW7OuS", "parentPublication": { "id": "proceedings/icse/2018/5638/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2022/3786/0/378600a001", "title": "PR-SZZ: How pull requests can support the tracing of defects in software repositories", "doi": null, "abstractUrl": "/proceedings-article/saner/2022/378600a001/1FbT2mY9AUE", "parentPublication": { "id": "proceedings/saner/2022/3786/0", "title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/semotion/2019/2280/0/228000a046", "title": "Empirical Analysis of Affect of Merged Issues on GitHub", "doi": null, "abstractUrl": "/proceedings-article/semotion/2019/228000a046/1d9UnvbJLJS", "parentPublication": { "id": "proceedings/semotion/2019/2280/0", "title": "2019 IEEE/ACM 4th International Workshop on Emotion Awareness in Software Engineering (SEmotion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2020/5143/0/09054842", "title": "C-3PR: A Bot for Fixing Static Analysis Violations via Pull Requests", "doi": null, "abstractUrl": "/proceedings-article/saner/2020/09054842/1iHVdDus7Be", "parentPublication": { "id": "proceedings/saner/2020/5143/0", "title": "2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a546", "title": "On the Impact of Multi-language Development in Machine Learning Frameworks", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a546/1oqKIBEkBlm", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2020/7122/0/712200a116", "title": "An empirical study of the first contributions of developers to open source projects on GitHub", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2020/712200a116/1pcSHSoZWes", "parentPublication": { "id": "proceedings/icse-companion/2020/7122/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2021/02/09290014", "title": "How Successful Are Open Source Contributions From Countries With Different Levels of Human Development?", "doi": null, "abstractUrl": "/magazine/so/2021/02/09290014/1prKKPlH8w8", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/06/09332267", "title": "Are You Still Working on This? An Empirical Study on Pull Request Abandonment", "doi": null, "abstractUrl": "/journal/ts/2022/06/09332267/1qzsTKPcdB6", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2021/8710/0/871000a254", "title": "On the Use of Dependabot Security Pull Requests", "doi": null, "abstractUrl": "/proceedings-article/msr/2021/871000a254/1tB7ju6sseI", "parentPublication": { "id": "proceedings/msr/2021/8710/0/", "title": "2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uiluGq0Oo8", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uilNgRqUk8", "doi": "10.1109/ICME51207.2021.9428164", "title": "Distance Restricted Transformer Encoder for Multi-Label Classification", "normalizedTitle": "Distance Restricted Transformer Encoder for Multi-Label Classification", "abstract": "Multi-label image classification is a fundamental but challenging task in Multimedia community. It aims to predict a set of labels presented in an image. Great progress has been made by exploring convolutional neural network with binary cross-entropy loss recently. However, conventional approaches are limited to highlight the key visual contents associated with target labels and pay little attention to confining the distances between visual and positive/negative label representations. To target these aspects, we firstly introduce a variant transformer encoder model for acquiring the underlying and crucial visual information related to ground truth labels. Specifically, a novel primal feature guided net is designed to maintain the original visual features during encoding process. Secondly, we exploit a distance restricted learning strategy in a common semantic space to shrink the distances of images with positive labels while expand with the negative ones during training stage. Extensive experiments are executed on MSCOCO and WIDER Attribute datasets and outstanding performance is achieved compared with other state-of-the-art models.", "abstracts": [ { "abstractType": "Regular", "content": "Multi-label image classification is a fundamental but challenging task in Multimedia community. It aims to predict a set of labels presented in an image. Great progress has been made by exploring convolutional neural network with binary cross-entropy loss recently. However, conventional approaches are limited to highlight the key visual contents associated with target labels and pay little attention to confining the distances between visual and positive/negative label representations. To target these aspects, we firstly introduce a variant transformer encoder model for acquiring the underlying and crucial visual information related to ground truth labels. Specifically, a novel primal feature guided net is designed to maintain the original visual features during encoding process. Secondly, we exploit a distance restricted learning strategy in a common semantic space to shrink the distances of images with positive labels while expand with the negative ones during training stage. Extensive experiments are executed on MSCOCO and WIDER Attribute datasets and outstanding performance is achieved compared with other state-of-the-art models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multi-label image classification is a fundamental but challenging task in Multimedia community. It aims to predict a set of labels presented in an image. Great progress has been made by exploring convolutional neural network with binary cross-entropy loss recently. However, conventional approaches are limited to highlight the key visual contents associated with target labels and pay little attention to confining the distances between visual and positive/negative label representations. To target these aspects, we firstly introduce a variant transformer encoder model for acquiring the underlying and crucial visual information related to ground truth labels. Specifically, a novel primal feature guided net is designed to maintain the original visual features during encoding process. Secondly, we exploit a distance restricted learning strategy in a common semantic space to shrink the distances of images with positive labels while expand with the negative ones during training stage. Extensive experiments are executed on MSCOCO and WIDER Attribute datasets and outstanding performance is achieved compared with other state-of-the-art models.", "fno": "09428164", "keywords": [ "Entropy", "Image Classification", "Image Retrieval", "Image Segmentation", "Learning Artificial Intelligence", "Natural Language Processing", "Neural Nets", "Pattern Classification", "Distance Restricted Transformer Encoder", "Multilabel Classification", "Image Classification", "Fundamental But Challenging Task", "Multimedia Community", "Convolutional Neural Network", "Binary Cross Entropy Loss", "Key Visual Contents", "Target Labels", "Variant Transformer Encoder Model", "Underlying Information", "Crucial Visual Information", "Truth Labels", "Novel Primal Feature", "Original Visual Features", "Encoding Process", "Distance Restricted Learning Strategy", "Positive Labels", "Negative Ones", "Training", "Learning Systems", "Visualization", "Conferences", "Semantics", "Encoding", "Convolutional Neural Networks", "Multi Label Classification", "Transformer", "Distance Restriction" ], "authors": [ { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Xiaomei Wang", "givenName": "Xiaomei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "OPPO Research Institute,Shanghai,China", "fullName": "Yaqian Li", "givenName": "Yaqian", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "OPPO Research Institute,Shanghai,China", "fullName": "Tong Luo", "givenName": "Tong", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "OPPO Research Institute,Shanghai,China", "fullName": "Yandong Guo", "givenName": "Yandong", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Data Science,Shanghai,China", "fullName": "Yanwei Fu", "givenName": "Yanwei", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Xiangyang Xue", "givenName": "Xiangyang", "surname": "Xue", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-3864-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09428296", "articleId": "1uilONcdFtu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09428274", "articleId": "1uilYOlnrQA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851c960", "title": "Learning Structured Inference Neural Networks with Label Relations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851c960/12OmNAQansZ", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126323", "title": "Multi-label visual classification with label exclusive context", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126323/12OmNC8uRva", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209b964", "title": "Multi-label Learning with Missing Labels", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209b964/12OmNrGb2hX", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/10/07964762", "title": "Disambiguation-Free Partial Label Learning", "doi": null, "abstractUrl": "/journal/tk/2017/10/07964762/13rRUIJcWlN", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2018/9125/0/912500a282", "title": "Generic Embedded Semantic Dictionary for Robust Multi-Label Classification", "doi": null, "abstractUrl": "/proceedings-article/icbk/2018/912500a282/17D45WZZ7C1", "parentPublication": { "id": "proceedings/icbk/2018/9125/0", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a926", "title": "Few-Shot Partial Multi-Label Learning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a926/1Aqx1YNNFU4", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09860016", "title": "MLTR: Multi-Label Classification with Transformer", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09860016/1G9E7Aj1IRi", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a797", "title": "Discovering Unknown Labels for Multi-Label Image Classification", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a797/1KBr2wN1Y4g", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2022/7172/0/717200a001", "title": "Complete Cross-triplet Loss in Label Space for Audio-visual Cross-modal Retrieval", "doi": null, "abstractUrl": "/proceedings-article/ism/2022/717200a001/1KaHG29c3x6", "parentPublication": { "id": "proceedings/ism/2022/7172/0", "title": "2022 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900q6473", "title": "General Multi-label Image Classification with Transformers", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900q6473/1yeIIAZdEqI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4itF", "title": "2017 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUPptg", "doi": "10.1109/VR.2017.7892288", "title": "The impact of transitions on user experience in virtual reality", "normalizedTitle": "The impact of transitions on user experience in virtual reality", "abstract": "In recent years, Virtual Reality (VR) applications have become widely available. An increase in popular interest raises questions about the use of the new medium for communication. While there is a wide variety of literature regarding scene transitions in films, novels and computer games, transitions in VR are not yet widely understood. As a medium that requires a high level of immersion [2], transitions are a desirable tool. This poster delineates an experiment studying the impact of transitions on user experience of presence in VR.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, Virtual Reality (VR) applications have become widely available. An increase in popular interest raises questions about the use of the new medium for communication. While there is a wide variety of literature regarding scene transitions in films, novels and computer games, transitions in VR are not yet widely understood. As a medium that requires a high level of immersion [2], transitions are a desirable tool. This poster delineates an experiment studying the impact of transitions on user experience of presence in VR.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, Virtual Reality (VR) applications have become widely available. An increase in popular interest raises questions about the use of the new medium for communication. While there is a wide variety of literature regarding scene transitions in films, novels and computer games, transitions in VR are not yet widely understood. As a medium that requires a high level of immersion [2], transitions are a desirable tool. This poster delineates an experiment studying the impact of transitions on user experience of presence in VR.", "fno": "07892288", "keywords": [ "Virtual Environments", "Portals", "Computers", "Atmospheric Measurements", "Particle Measurements", "Haptic Interfaces", "H 5 1 Information Interfaces And Presentation Multimedia Information Systems Artificial Augmented And Virtual Realities" ], "authors": [ { "affiliation": "Queen Mary University of London, London, U.K.", "fullName": "Liang Men", "givenName": "Liang", "surname": "Men", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary University of London, London, U.K.", "fullName": "Nick Bryan-Kinns", "givenName": "Nick", "surname": "Bryan-Kinns", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary University of London, London, U.K.", "fullName": "Amelia Shivani Hassard", "givenName": "Amelia Shivani", "surname": "Hassard", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary University of London, London, U.K.", "fullName": "Zixiang Ma", "givenName": "Zixiang", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-01-01T00:00:00", "pubType": "proceedings", "pages": "285-286", "year": "2017", "issn": "2375-5334", "isbn": "978-1-5090-6647-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07892287", "articleId": "12OmNwtEEvF", "__typename": "AdjacentArticleType" }, "next": { "fno": "07892289", "articleId": "12OmNzSQdoG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892315", "title": "The effect of geometric realism on presence in a virtual reality game", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892315/12OmNBTawwY", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wevr/2017/3881/0/07957712", "title": "Effects of tracking scale on user performance in virtual reality games", "doi": null, "abstractUrl": "/proceedings-article/wevr/2017/07957712/12OmNzh5z54", "parentPublication": { "id": "proceedings/wevr/2017/3881/0", "title": "2017 IEEE 3rd Workshop on Everyday Virtual Reality (WEVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446490", "title": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446490/13bd1fKQxqS", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446046", "title": "The Effect of Immersion on Emotional Responses to Film Viewing in a Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446046/13bd1gCd7Th", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09874769", "title": "Objects May Be Farther Than They Appear: Depth Compression Diminishes Over Time with Repeated Calibration in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/11/09874769/1GjwLV9sW7m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a538", "title": "CardsVR: A Two-Person VR Experience with Passive Haptic Feedback from a Deck of Playing Cards", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a538/1JrRaySJ7So", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797870", "title": "The Influence of Body Position on Presence When Playing a Virtual Reality Game", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797870/1cJ0RyhQnC0", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a065", "title": "A Preliminary Exploration of Montage Transitions in Cinematic Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a065/1gysiUQJzgY", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09143472", "title": "Do Multisensory Stimuli Benefit the Virtual Reality Experience? A Systematic Review", "doi": null, "abstractUrl": "/journal/tg/2022/02/09143472/1lxmwwX05lC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a437", "title": "Focus Group on Social Virtual Reality in Social Virtual Reality: Effects on Emotion and Self-Awareness", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a437/1yeQD8KNChO", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1fKQxqS", "doi": "10.1109/VR.2018.8446490", "title": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "normalizedTitle": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "abstract": "Underwater immersive virtual reality (VR) environments can reproduce unique VR experiences such as swimming in the sea with beautiful coral reefs and a cage surrounded by sharks. Underwater VR poses new technical challenges to creating user interactions because water and the surround-screen make existing methods for realizing user interaction irrelevant. In this research, we present a potential water flow measurement technology aimed at accessing human-computer interaction in underwater VR. Flow measurement can be realized by using tracer particles that are scattered in fluids. However, existing tracer particles are not suitable for underwater immersive VR because the particles stop users from viewing the content on the screen. Therefore, we propose transparent tracer particles that become invisible in water and polarization-based technologies that enable cameras to track the movement of particles. This technology enables virtual objects in VR to react with the actual movement of water and haptic feedback by creating water flow in the swimming pool. These additions would enhance the illusion of immersion in underwater VR.", "abstracts": [ { "abstractType": "Regular", "content": "Underwater immersive virtual reality (VR) environments can reproduce unique VR experiences such as swimming in the sea with beautiful coral reefs and a cage surrounded by sharks. Underwater VR poses new technical challenges to creating user interactions because water and the surround-screen make existing methods for realizing user interaction irrelevant. In this research, we present a potential water flow measurement technology aimed at accessing human-computer interaction in underwater VR. Flow measurement can be realized by using tracer particles that are scattered in fluids. However, existing tracer particles are not suitable for underwater immersive VR because the particles stop users from viewing the content on the screen. Therefore, we propose transparent tracer particles that become invisible in water and polarization-based technologies that enable cameras to track the movement of particles. This technology enables virtual objects in VR to react with the actual movement of water and haptic feedback by creating water flow in the swimming pool. These additions would enhance the illusion of immersion in underwater VR.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Underwater immersive virtual reality (VR) environments can reproduce unique VR experiences such as swimming in the sea with beautiful coral reefs and a cage surrounded by sharks. Underwater VR poses new technical challenges to creating user interactions because water and the surround-screen make existing methods for realizing user interaction irrelevant. In this research, we present a potential water flow measurement technology aimed at accessing human-computer interaction in underwater VR. Flow measurement can be realized by using tracer particles that are scattered in fluids. However, existing tracer particles are not suitable for underwater immersive VR because the particles stop users from viewing the content on the screen. Therefore, we propose transparent tracer particles that become invisible in water and polarization-based technologies that enable cameras to track the movement of particles. This technology enables virtual objects in VR to react with the actual movement of water and haptic feedback by creating water flow in the swimming pool. These additions would enhance the illusion of immersion in underwater VR.", "fno": "08446490", "keywords": [ "Computational Fluid Dynamics", "Flow Measurement", "Haptic Interfaces", "Human Computer Interaction", "User Interfaces", "Virtual Reality", "Underwater Immersive Virtual Reality Environment", "Unique VR Experiences", "Beautiful Coral Reefs", "Underwater VR", "User Interactions", "Surround Screen", "Human Computer Interaction", "Underwater Immersive VR", "Transparent Tracer Particles", "Polarization Based Technologies", "Virtual Objects", "Tracer Particles", "Water Flow Measurement Technology", "Haptic Feedback", "Swimming Pool", "Atmospheric Measurements", "Particle Measurements", "Cameras", "Tracking", "Virtual Reality", "Sea Measurements", "Human Centered Computing Interface Design Prototyping", "Human Centered Computing Virtual Reality" ], "authors": [ { "affiliation": "The University of Tokyo", "fullName": "Shogo Yamashita", "givenName": "Shogo", "surname": "Yamashita", "__typename": "ArticleAuthorType" }, { "affiliation": "Sony Computer Science Laboratories, The University of Tokyo", "fullName": "Shunichi Suwa", "givenName": "Shunichi", "surname": "Suwa", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tokyo", "fullName": "Takashi Miyaki", "givenName": "Takashi", "surname": "Miyaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Sony Computer Science Laboratories, The University of Tokyo", "fullName": "Jun Rekimoto", "givenName": "Jun", "surname": "Rekimoto", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "785-786", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08446263", "articleId": "13bd1gJ1v07", "__typename": "AdjacentArticleType" }, "next": { "fno": "08446516", "articleId": "13bd1fWcuDz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2016/0641/0/07477644", "title": "Underwater 3D capture using a low-cost commercial depth camera", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477644/12OmNAi6vVJ", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2015/8562/0/07439525", "title": "Accuracy verification of the image-based an underwater object position measurement", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439525/12OmNAlvHR3", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892281", "title": "Towards usable underwater virtual reality systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892281/12OmNBCHMNt", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ngmast/2016/0949/0/07801465", "title": "Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/ngmast/2016/07801465/12OmNrMZpyR", "parentPublication": { "id": "proceedings/ngmast/2016/0949/0", "title": "2016 10th International Conference on Next-Generation Mobile Applications, Security and Technologies (NGMAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2011/707/0/05753124", "title": "Spaceborne underwater imaging", "doi": null, "abstractUrl": "/proceedings-article/iccp/2011/05753124/12OmNxFsmGD", "parentPublication": { "id": "proceedings/iccp/2011/707/0", "title": "IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/289/1/05750679", "title": "A Novel Approach to Measurement Drift Phenomenon in Terrain Aided Navigation", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750679/12OmNzdoMQe", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a163", "title": "Attention Score: Objective Measure of Attentiveness in Immersive Omnidirectional Videos", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a163/1KmFfXI75Ly", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797858", "title": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797858/1cJ0JWkSE3m", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798052", "title": "SCUBA VR: Submersible-Type Virtual Underwater Experience System", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798052/1cJ0Kew3Lzy", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797805", "title": "Encouraging Rehabilitation Trials: The Potential of 360&#x00B0; Immersive Instruction Videos", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797805/1cJ13iaKgve", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirv", "title": "2018 IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good)", "acronym": "var4good", "groupId": "1829024", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRoxP", "doi": "10.1109/VAR4GOOD.2018.8576881", "title": "Transformative Experiences Become More Accessible Through Virtual Reality", "normalizedTitle": "Transformative Experiences Become More Accessible Through Virtual Reality", "abstract": "Virtual Reality (VR) has immersive powers that can teleport an im-mersant into a virtual world and provide them with an experience of being somewhere that they may not have been able to go to. These powers of VR are most often used for games and entertainment, creating a space for escapism and isolation that may have negative psychological and societal outcomes. In this paper, we argue for an opposing application of VR technology - for promoting wellness and feeling of connectedness with people and the world around us. Such feelings can be elicited as a result of a profound awe-inspiring experience, that expands one's mental model and consequently leads to a positive behavioral change. Such experiences are described as transformative, or in strong cases 'pivotal'. Unfortunately, these experiences are rare, only accessible by some people, and nearly unavailable for researchers interested in studying this phenomenon. The immersive powers of VR present a unique opportunity to reproduce such experiences in the lab or at home, thus making them accessible both to the public and to the researchers. Having real-time access to an experience of the immersant will allow the researchers to study the progression of the tranformative experiences and understand its effects and precursors. In this paper, we are proposing a framework through which transformative experiences can be studied in VR. Understanding this phenomenon will inform how VR experiences should be designed in order to create a positive impact on our society.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual Reality (VR) has immersive powers that can teleport an im-mersant into a virtual world and provide them with an experience of being somewhere that they may not have been able to go to. These powers of VR are most often used for games and entertainment, creating a space for escapism and isolation that may have negative psychological and societal outcomes. In this paper, we argue for an opposing application of VR technology - for promoting wellness and feeling of connectedness with people and the world around us. Such feelings can be elicited as a result of a profound awe-inspiring experience, that expands one's mental model and consequently leads to a positive behavioral change. Such experiences are described as transformative, or in strong cases 'pivotal'. Unfortunately, these experiences are rare, only accessible by some people, and nearly unavailable for researchers interested in studying this phenomenon. The immersive powers of VR present a unique opportunity to reproduce such experiences in the lab or at home, thus making them accessible both to the public and to the researchers. Having real-time access to an experience of the immersant will allow the researchers to study the progression of the tranformative experiences and understand its effects and precursors. In this paper, we are proposing a framework through which transformative experiences can be studied in VR. Understanding this phenomenon will inform how VR experiences should be designed in order to create a positive impact on our society.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual Reality (VR) has immersive powers that can teleport an im-mersant into a virtual world and provide them with an experience of being somewhere that they may not have been able to go to. These powers of VR are most often used for games and entertainment, creating a space for escapism and isolation that may have negative psychological and societal outcomes. In this paper, we argue for an opposing application of VR technology - for promoting wellness and feeling of connectedness with people and the world around us. Such feelings can be elicited as a result of a profound awe-inspiring experience, that expands one's mental model and consequently leads to a positive behavioral change. Such experiences are described as transformative, or in strong cases 'pivotal'. Unfortunately, these experiences are rare, only accessible by some people, and nearly unavailable for researchers interested in studying this phenomenon. The immersive powers of VR present a unique opportunity to reproduce such experiences in the lab or at home, thus making them accessible both to the public and to the researchers. Having real-time access to an experience of the immersant will allow the researchers to study the progression of the tranformative experiences and understand its effects and precursors. In this paper, we are proposing a framework through which transformative experiences can be studied in VR. Understanding this phenomenon will inform how VR experiences should be designed in order to create a positive impact on our society.", "fno": "08576881", "keywords": [ "Virtual Reality", "Transformative Experiences", "VR Experiences", "Immersive Powers", "Virtual World", "Games", "Entertainment", "Negative Psychological Outcomes", "VR Technology", "Positive Behavioral Change", "Real Time Access", "Virtual Reality", "Atmospheric Measurements", "Particle Measurements", "Psychology", "Extraterrestrial Measurements", "Physiology", "Time Measurement", "Virtual Reality", "Human Centered Computing", "Human Computer Interaction", "Interaction Paradigms", "Virtual Reality", "Applied Computing", "Life And Medical Sciences", "Consumer Health Applied Computing", "Education", "Interactive Learning Environments" ], "authors": [ { "affiliation": "Simon Fraser University", "fullName": "Ekaterina R. Stepanova", "givenName": "Ekaterina R.", "surname": "Stepanova", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Denise Quesnel", "givenName": "Denise", "surname": "Quesnel", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Bernhard Riecke", "givenName": "Bernhard", "surname": "Riecke", "__typename": "ArticleAuthorType" } ], "idPrefix": "var4good", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "1-3", "year": "2018", "issn": null, "isbn": "978-1-5386-5977-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08576883", "articleId": "17D45WB0qcg", "__typename": "AdjacentArticleType" }, "next": { "fno": "08576886", "articleId": "17D45XeKgxX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892317", "title": "A preliminary study of users' experiences of meditation in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892317/12OmNApcufx", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892315", "title": "The effect of geometric realism on presence in a virtual reality game", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892315/12OmNBTawwY", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446490", "title": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446490/13bd1fKQxqS", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2022/1647/0/09767281", "title": "An Exploratory Analysis of Interactive VR-Based Framework for Multi-Componential Analysis of Emotion", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2022/09767281/1Df82pGW23e", "parentPublication": { "id": "proceedings/percom-workshops/2022/1647/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873958", "title": "Characterizing Physiological Responses to Fear, Frustration, and Insight in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873958/1GjwGGW9cSA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/03/09311251", "title": "Exploring Individual Differences of Public Speaking Anxiety in Real-Life and Virtual Presentations", "doi": null, "abstractUrl": "/journal/ta/2022/03/09311251/1pYWAX0Po6A", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a474", "title": "A Neurophysiological Approach for Measuring Presence in Immersive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a474/1pysuR65ESQ", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09346017", "title": "UBFC-Phys: A Multimodal Database For Psychophysiological Studies of Social Stress", "doi": null, "abstractUrl": "/journal/ta/2023/01/09346017/1qV2oCT26dy", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/05/09386008", "title": "Floor-vibration VR: Mitigating Cybersickness Using Whole-body Tactile Stimuli in Highly Realistic Vehicle Driving Experiences", "doi": null, "abstractUrl": "/journal/tg/2021/05/09386008/1seiz94oUco", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a739", "title": "[DC] Psychophysical Effects of Augmented Reality Experiences", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a739/1tnWQJT7eWA", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0JWkSE3m", "doi": "10.1109/VR.2019.8797858", "title": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "normalizedTitle": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "abstract": "We investigate the feasibility of combining off-the-shelf virtual reality headsets and electroencephalography. EEG is a highly sensitive tool and subject to strong distortions when exerting physical force like mounting a VR headset on top of it that twists sensors and cables. Our study compares the signal quality of EEG in VR against immersive dome environments and traditional displays using an oddball paradigm experimental design. Furthermore, we compare the signal quality of EEG when combined with a commodity VR headset without modification against a modified version that reduces physical strain on the EEG headset. Our results indicate, that it is possible to combine EEG and VR even without modification under certain conditions. VR headset customisation improves signal quality results. Additionally, display latency of the different modalities is visible on a neurological level.", "abstracts": [ { "abstractType": "Regular", "content": "We investigate the feasibility of combining off-the-shelf virtual reality headsets and electroencephalography. EEG is a highly sensitive tool and subject to strong distortions when exerting physical force like mounting a VR headset on top of it that twists sensors and cables. Our study compares the signal quality of EEG in VR against immersive dome environments and traditional displays using an oddball paradigm experimental design. Furthermore, we compare the signal quality of EEG when combined with a commodity VR headset without modification against a modified version that reduces physical strain on the EEG headset. Our results indicate, that it is possible to combine EEG and VR even without modification under certain conditions. VR headset customisation improves signal quality results. Additionally, display latency of the different modalities is visible on a neurological level.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We investigate the feasibility of combining off-the-shelf virtual reality headsets and electroencephalography. EEG is a highly sensitive tool and subject to strong distortions when exerting physical force like mounting a VR headset on top of it that twists sensors and cables. Our study compares the signal quality of EEG in VR against immersive dome environments and traditional displays using an oddball paradigm experimental design. Furthermore, we compare the signal quality of EEG when combined with a commodity VR headset without modification against a modified version that reduces physical strain on the EEG headset. Our results indicate, that it is possible to combine EEG and VR even without modification under certain conditions. VR headset customisation improves signal quality results. Additionally, display latency of the different modalities is visible on a neurological level.", "fno": "08797858", "keywords": [ "Electroencephalography", "Medical Signal Processing", "Neurophysiology", "Virtual Reality", "Immersive EEG", "Electroencephalography", "Physical Force", "Twists Sensors", "Immersive Dome Environments", "Oddball Paradigm Experimental Design", "Physical Strain", "EEG Headset", "VR Headset Customisation", "Virtual Reality Headsets", "Signal Quality", "Neurological Level", "Twists Cables", "Electroencephalography", "Headphones", "Sensors", "Electrodes", "Virtual Reality", "Atmospheric Measurements", "Particle Measurements", "Human Centered Computing X 2014 Visualization X 2014 Visualization Techniques X 2014 Treemaps", "Human Centered Computing X 2014 Visualization X 2014 Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "TU Braunschweig", "fullName": "Jan-Philipp Tauscher", "givenName": "Jan-Philipp", "surname": "Tauscher", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Braunschweig", "fullName": "Fabian Wolf Schottky", "givenName": "Fabian Wolf", "surname": "Schottky", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Braunschweig", "fullName": "Steve Grogorick", "givenName": "Steve", "surname": "Grogorick", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Braunschweig", "fullName": "Paul Maximilian Bittner", "givenName": "Paul Maximilian", "surname": "Bittner", "__typename": "ArticleAuthorType" }, { "affiliation": "ITU Lahore", "fullName": "Maryam Mustafa", "givenName": "Maryam", "surname": "Mustafa", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Braunschweig", "fullName": "Marcus Magnor", "givenName": "Marcus", "surname": "Magnor", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1794-1800", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08797850", "articleId": "1cJ1fJHCcnu", "__typename": "AdjacentArticleType" }, "next": { "fno": "08798056", "articleId": "1cJ0Ld02sXS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icgciot/2015/7910/0/07380644", "title": "Epileptic seizure prediction and identification of epileptogenic region using EEG signal", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380644/12OmNAoDid4", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2012/2027/0/06266247", "title": "Virtual interactions: Can EEG Help Make the Difference with Real Interaction?", "doi": null, "abstractUrl": "/proceedings-article/icmew/2012/06266247/12OmNs4S8yX", "parentPublication": { "id": "proceedings/icmew/2012/2027/0", "title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2015/0481/0/07394404", "title": "Psychological stress measurement using low cost single channel EEG headset", "doi": null, "abstractUrl": "/proceedings-article/isspit/2015/07394404/12OmNxX3uBD", "parentPublication": { "id": "proceedings/isspit/2015/0481/0", "title": "2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a501", "title": "Yet Another Objective Approach for Measuring Cognitive Load Using EEG-Based Workload", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a501/12OmNyvoXhu", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2018/9269/0/926900a053", "title": "Evaluating Engagement of Virtual Reality Games Based on First and Third Person Perspective Using EEG and Subjective Metrics", "doi": null, "abstractUrl": "/proceedings-article/aivr/2018/926900a053/17D45WrVg5j", "parentPublication": { "id": "proceedings/aivr/2018/9269/0", "title": "2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2018/7516/3/08549949", "title": "Analysis of Brain Waves for Detecting Behaviors", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2018/08549949/17D45XcttmP", "parentPublication": { "id": "proceedings/iciibms/2018/7516/3", "title": "2018 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669361", "title": "Decoding Imagined Speech Using Wearable EEG Headset For a Single Subject", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669361/1A9WuTweJO0", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a094", "title": "An EEG-based Experiment on VR Sickness and Postural Instability While Walking in Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a094/1MNgWtYsR5S", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798369", "title": "Brain Activity in Virtual Reality: Assessing Signal Quality of High-Resolution EEG While Using Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798369/1cJ18Pncw9y", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a010", "title": "Attention Estimation in Virtual Reality with EEG based Image Regression", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a010/1qpzC0wPlGo", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iHV7cL99io", "title": "2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "acronym": "saner", "groupId": "1831544", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1iHVbfTk5bi", "doi": "10.1109/SANER48275.2020.9054802", "title": "How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments", "normalizedTitle": "How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments", "abstract": "When analyzing software systems, a large amount of data accumulates. In order to assist developers in the preparation, evaluation, and understanding of findings, different visualization techniques have been developed. Due to recent progress in immersive virtual reality, existing visualization tools were ported to this environment. However, three-dimensional and virtual reality environments have different advantages and disadvantages, and by transferring concepts, such as layout algorithms and user interaction mechanisms, more or less one-to-one, the characteristics of these environments are neglected. In order to develop techniques adapting to the circumstance of a particular environment, more research in this field is necessary. In previously conducted case studies, we compared EvoStreets deployed in three different environments: 2D, 2.5D, and virtual reality. We found evidence that movement patterns&#x2014;path length, average speed, and occupied volume&#x2014;differ significantly between the 2.5D and virtual reality environments for some of the tasks that had to be solved by 34 participants in a controlled experiment. In this paper, we analyze the results of this experiment in more details, to study if not only movement is affected by these environments, but also the way how EvoStreets are observed. Although we could not find enough evidence that the number of viewpoints and their duration differ significantly, we found indications that in virtual reality viewpoints are located closer to the EvoStreets and that the distance between viewpoints is shorter. Based on our previous results and the findings of this paper, we present visualization and user interaction concepts specific to the kind of environment.", "abstracts": [ { "abstractType": "Regular", "content": "When analyzing software systems, a large amount of data accumulates. In order to assist developers in the preparation, evaluation, and understanding of findings, different visualization techniques have been developed. Due to recent progress in immersive virtual reality, existing visualization tools were ported to this environment. However, three-dimensional and virtual reality environments have different advantages and disadvantages, and by transferring concepts, such as layout algorithms and user interaction mechanisms, more or less one-to-one, the characteristics of these environments are neglected. In order to develop techniques adapting to the circumstance of a particular environment, more research in this field is necessary. In previously conducted case studies, we compared EvoStreets deployed in three different environments: 2D, 2.5D, and virtual reality. We found evidence that movement patterns&#x2014;path length, average speed, and occupied volume&#x2014;differ significantly between the 2.5D and virtual reality environments for some of the tasks that had to be solved by 34 participants in a controlled experiment. In this paper, we analyze the results of this experiment in more details, to study if not only movement is affected by these environments, but also the way how EvoStreets are observed. Although we could not find enough evidence that the number of viewpoints and their duration differ significantly, we found indications that in virtual reality viewpoints are located closer to the EvoStreets and that the distance between viewpoints is shorter. Based on our previous results and the findings of this paper, we present visualization and user interaction concepts specific to the kind of environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When analyzing software systems, a large amount of data accumulates. In order to assist developers in the preparation, evaluation, and understanding of findings, different visualization techniques have been developed. Due to recent progress in immersive virtual reality, existing visualization tools were ported to this environment. However, three-dimensional and virtual reality environments have different advantages and disadvantages, and by transferring concepts, such as layout algorithms and user interaction mechanisms, more or less one-to-one, the characteristics of these environments are neglected. In order to develop techniques adapting to the circumstance of a particular environment, more research in this field is necessary. In previously conducted case studies, we compared EvoStreets deployed in three different environments: 2D, 2.5D, and virtual reality. We found evidence that movement patterns—path length, average speed, and occupied volume—differ significantly between the 2.5D and virtual reality environments for some of the tasks that had to be solved by 34 participants in a controlled experiment. In this paper, we analyze the results of this experiment in more details, to study if not only movement is affected by these environments, but also the way how EvoStreets are observed. Although we could not find enough evidence that the number of viewpoints and their duration differ significantly, we found indications that in virtual reality viewpoints are located closer to the EvoStreets and that the distance between viewpoints is shorter. Based on our previous results and the findings of this paper, we present visualization and user interaction concepts specific to the kind of environment.", "fno": "09054802", "keywords": [ "Program Visualisation", "Virtual Reality", "Movement Patterns", "Visualization Tools", "Virtual Reality Environments", "Three Dimensional Environments", "User Interaction", "Evo Streets", "Immersive Virtual Reality", "Visualization Techniques", "Three Dimensional Displays", "Atmospheric Measurements", "Navigation", "Layout", "Data Visualization", "Virtual Reality", "Particle Measurements" ], "authors": [ { "affiliation": "University of Bremen,Germany", "fullName": "Marcel Steinbeck", "givenName": "Marcel", "surname": "Steinbeck", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bremen,Germany", "fullName": "Rainer Koschke", "givenName": "Rainer", "surname": "Koschke", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bremen,Germany", "fullName": "Marc O. Rüdel", "givenName": "Marc O.", "surname": "Rüdel", "__typename": "ArticleAuthorType" } ], "idPrefix": "saner", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-02-01T00:00:00", "pubType": "proceedings", "pages": "332-343", "year": "2020", "issn": "1534-5351", "isbn": "978-1-7281-5143-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09054811", "articleId": "1iHVbtHHSBW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09054840", "articleId": "1iHV89FLr4A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2013/6097/0/06550191", "title": "Is the user trained? Assessing performance and cognitive resource demands in the Virtusphere", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550191/12OmNApLGAG", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446490", "title": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446490/13bd1fKQxqS", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797965", "title": "Danger from the Deep: A Gap Affordance Study in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797965/1cJ0G8LwhhK", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797858", "title": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797858/1cJ0JWkSE3m", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2019/1519/0/151900a231", "title": "Comparing the EvoStreets Visualization Technique in Two-and Three-Dimensional Environments A Controlled Experiment", "doi": null, "abstractUrl": "/proceedings-article/icpc/2019/151900a231/1dlxFBW9YiY", "parentPublication": { "id": "proceedings/icpc/2019/1519/0", "title": "2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2019/4937/0/493700a163", "title": "Movement Patterns and Trajectories in Three-Dimensional Software Visualization", "doi": null, "abstractUrl": "/proceedings-article/scam/2019/493700a163/1fJRO27m4Tu", "parentPublication": { "id": "proceedings/scam/2019/4937/0", "title": "2019 IEEE 19th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090416", "title": "Shooter Bias in Virtual Reality: The Effect of Avatar Race and Socioeconomic Status on Shooting Decisions", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090416/1jIxANOupNK", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/12/09206143", "title": "Spatial Presence, Performance, and Behavior between Real, Remote, and Virtual Immersive Environments", "doi": null, "abstractUrl": "/journal/tg/2020/12/09206143/1npxM6fDN7i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a209", "title": "A Virtual Reality Framework for Human-Virtual Crowd Interaction Studies", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a209/1qpzBFKHFpC", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a109", "title": "Measuring the Perceived Three-Dimensional Location of Virtual Objects in Optical See-Through Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a109/1yeCXFoKtEI", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qpzz6dhLLq", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "acronym": "aivr", "groupId": "1830004", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qpzDl7OBkk", "doi": "10.1109/AIVR50618.2020.00018", "title": "Exploring Visualisations for Financial Statements in Virtual Reality", "normalizedTitle": "Exploring Visualisations for Financial Statements in Virtual Reality", "abstract": "Recent developments in Virtual Reality (VR) provide vast opportunities for data visualization. Individuals must be motivated to understand the data presented concerning their personal financial statements, as with better understanding comes more efficient money management and a healthier future-minded focus on planning for their personal finances. This paper aims to investigate how a 3D in VR visualization scenario influences an immersed users' capability to understand and engage with personal financial statement data in comparison to a scenario where a user would be interacting with 2D personal financial statement data on paper. This was achieved by creating a 2D paper prototype data and utilizing the benefits of 3D in a VR prototype visualization. Both prototypes consisted of chart representations of personal financial statement data, which were tested in a user study. Also, participants (N=23) were given a set of tasks (such as &#x201D;Find the quarter in which the least amount of expenses was spent&#x201D;) to solve by using 2D or 3D financial statements. Results show that participants reported interaction is statistically significant more natural with 2D data on paper than interactions with 3D data in VR. Also, participants reported that they perceived statistically significant more considerable delay between outcome and their action with 3D data in VR. However, effectiveness, measured by the percentage of correctly solved tasks, in both versions enabled participants to answer almost all given tasks successfully. Those results are showing that VR as a medium could be used for analyzing financial statements. In future developments, several additional directions could be incorporated. Exploring data visualization is essential not only for the financial sector but also for other domains such as taxes or law reports.", "abstracts": [ { "abstractType": "Regular", "content": "Recent developments in Virtual Reality (VR) provide vast opportunities for data visualization. Individuals must be motivated to understand the data presented concerning their personal financial statements, as with better understanding comes more efficient money management and a healthier future-minded focus on planning for their personal finances. This paper aims to investigate how a 3D in VR visualization scenario influences an immersed users' capability to understand and engage with personal financial statement data in comparison to a scenario where a user would be interacting with 2D personal financial statement data on paper. This was achieved by creating a 2D paper prototype data and utilizing the benefits of 3D in a VR prototype visualization. Both prototypes consisted of chart representations of personal financial statement data, which were tested in a user study. Also, participants (N=23) were given a set of tasks (such as &#x201D;Find the quarter in which the least amount of expenses was spent&#x201D;) to solve by using 2D or 3D financial statements. Results show that participants reported interaction is statistically significant more natural with 2D data on paper than interactions with 3D data in VR. Also, participants reported that they perceived statistically significant more considerable delay between outcome and their action with 3D data in VR. However, effectiveness, measured by the percentage of correctly solved tasks, in both versions enabled participants to answer almost all given tasks successfully. Those results are showing that VR as a medium could be used for analyzing financial statements. In future developments, several additional directions could be incorporated. Exploring data visualization is essential not only for the financial sector but also for other domains such as taxes or law reports.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent developments in Virtual Reality (VR) provide vast opportunities for data visualization. Individuals must be motivated to understand the data presented concerning their personal financial statements, as with better understanding comes more efficient money management and a healthier future-minded focus on planning for their personal finances. This paper aims to investigate how a 3D in VR visualization scenario influences an immersed users' capability to understand and engage with personal financial statement data in comparison to a scenario where a user would be interacting with 2D personal financial statement data on paper. This was achieved by creating a 2D paper prototype data and utilizing the benefits of 3D in a VR prototype visualization. Both prototypes consisted of chart representations of personal financial statement data, which were tested in a user study. Also, participants (N=23) were given a set of tasks (such as ”Find the quarter in which the least amount of expenses was spent”) to solve by using 2D or 3D financial statements. Results show that participants reported interaction is statistically significant more natural with 2D data on paper than interactions with 3D data in VR. Also, participants reported that they perceived statistically significant more considerable delay between outcome and their action with 3D data in VR. However, effectiveness, measured by the percentage of correctly solved tasks, in both versions enabled participants to answer almost all given tasks successfully. Those results are showing that VR as a medium could be used for analyzing financial statements. In future developments, several additional directions could be incorporated. Exploring data visualization is essential not only for the financial sector but also for other domains such as taxes or law reports.", "fno": "746300a049", "keywords": [ "Data Visualisation", "Financial Data Processing", "Financial Management", "Virtual Reality", "Data Visualization", "Virtual Reality", "VR Visualization Scenario", "Personal Financial Statement Data", "VR Prototype Visualization", "2 D Paper Prototype Data", "3 D Financial Statements", "Three Dimensional Displays", "Data Visualization", "Two Dimensional Displays", "Task Analysis", "Delays", "Prototypes", "Particle Measurements", "Virtual Reality", "Financial Statements", "Quality Of Experience", "Data Visualisation" ], "authors": [ { "affiliation": "Quality and Usability Lab, TU,Berlin,Germany", "fullName": "Tanja Kojić", "givenName": "Tanja", "surname": "Kojić", "__typename": "ArticleAuthorType" }, { "affiliation": "Quality and Usability Lab, TU,Berlin,Germany", "fullName": "Sandra Ashipala", "givenName": "Sandra", "surname": "Ashipala", "__typename": "ArticleAuthorType" }, { "affiliation": "Quality and Usability Lab, TU,Berlin,Germany", "fullName": "Sebastian Möller", "givenName": "Sebastian", "surname": "Möller", "__typename": "ArticleAuthorType" }, { "affiliation": "Quality and Usability Lab, TU,Berlin,Germany", "fullName": "Jan-Niklas Voigt-Antons", "givenName": "Jan-Niklas", "surname": "Voigt-Antons", "__typename": "ArticleAuthorType" } ], "idPrefix": "aivr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "49-52", "year": "2020", "issn": null, "isbn": "978-1-7281-7463-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "746300a043", "articleId": "1qpzAneRTX2", "__typename": "AdjacentArticleType" }, "next": { "fno": "746300a053", "articleId": "1qpzAOJp82s", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2011/1246/0/06070424", "title": "A graph grammar model for syntaxes of financial statements", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070424/12OmNApu5Fw", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892286", "title": "Comparing VR and non-VR driving simulations: An experimental user study", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892286/12OmNxymobo", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534024", "title": "Tangible Braille Plot: Tangibly Exploring Geo-Temporal Data in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534024/17D45WgziPn", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a205", "title": "Building-Scale Virtual Reality: Another Way to Extend Real World", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a205/19wB1Moslq0", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a064", "title": "VRContour: Bringing Contour Delineations of Medical Structures Into Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a064/1JrRc4SdYgU", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089482", "title": "Think Twice: The Influence of Immersion on Decision Making during Gambling in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089482/1jIxeHgBEkg", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222313", "title": "ShuttleSpace: Exploring and Analyzing Movement Trajectory in Immersive Visualization", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222313/1nTr29xEpkk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374344", "title": "Integrating 3D and 2D Views of Medical Image Data in Virtual Reality for Efficient Navigation", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374344/1rUJ2FLVdEk", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2020/7397/0/739700a760", "title": "A Default Prediction Model In Installment Sales Using Non Financial Data", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2020/739700a760/1tGcwFqAqxW", "parentPublication": { "id": "proceedings/iiai-aai/2020/7397/0", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a629", "title": "Myopia in Head-Worn Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a629/1tnXbsPeHbG", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }