data
dict
{ "proceeding": { "id": "12OmNwt5sgJ", "title": "CVPR 2011", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNvBrgHa", "doi": "10.1109/CVPR.2011.5995710", "title": "On deep generative models with applications to recognition", "normalizedTitle": "On deep generative models with applications to recognition", "abstract": "The most popular way to use probabilistic models in vision is first to extract some descriptors of small image patches or object parts using well-engineered features, and then to use statistical learning tools to model the dependencies among these features and eventual labels. Learning probabilistic models directly on the raw pixel values has proved to be much more difficult and is typically only used for regularizing discriminative methods. In this work, we use one of the best, pixel-level, generative models of natural images-a gated MRF-as the lowest level of a deep belief network (DBN) that has several hidden layers. We show that the resulting DBN is very good at coping with occlusion when predicting expression categories from face images, and it can produce features that perform comparably to SIFT descriptors for discriminating different types of scene. The generative ability of the model also makes it easy to see what information is captured and what is lost at each level of representation.", "abstracts": [ { "abstractType": "Regular", "content": "The most popular way to use probabilistic models in vision is first to extract some descriptors of small image patches or object parts using well-engineered features, and then to use statistical learning tools to model the dependencies among these features and eventual labels. Learning probabilistic models directly on the raw pixel values has proved to be much more difficult and is typically only used for regularizing discriminative methods. In this work, we use one of the best, pixel-level, generative models of natural images-a gated MRF-as the lowest level of a deep belief network (DBN) that has several hidden layers. We show that the resulting DBN is very good at coping with occlusion when predicting expression categories from face images, and it can produce features that perform comparably to SIFT descriptors for discriminating different types of scene. The generative ability of the model also makes it easy to see what information is captured and what is lost at each level of representation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The most popular way to use probabilistic models in vision is first to extract some descriptors of small image patches or object parts using well-engineered features, and then to use statistical learning tools to model the dependencies among these features and eventual labels. Learning probabilistic models directly on the raw pixel values has proved to be much more difficult and is typically only used for regularizing discriminative methods. In this work, we use one of the best, pixel-level, generative models of natural images-a gated MRF-as the lowest level of a deep belief network (DBN) that has several hidden layers. We show that the resulting DBN is very good at coping with occlusion when predicting expression categories from face images, and it can produce features that perform comparably to SIFT descriptors for discriminating different types of scene. The generative ability of the model also makes it easy to see what information is captured and what is lost at each level of representation.", "fno": "05995710", "keywords": [ "SIFT Descriptor", "Deep Generative Model", "Image Patch", "Statistical Learning Tool", "Learning Probabilistic Model", "Natural Image", "Gated MRF", "Deep Belief Network", "Face Image" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Univ. of Toronto, Toronto, ON, Canada", "fullName": "M. Ranzato", "givenName": "M.", "surname": "Ranzato", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Neural Comput., Univ. of California, San Diego, CA, USA", "fullName": "J. Susskind", "givenName": "J.", "surname": "Susskind", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Univ. of Toronto, Toronto, ON, Canada", "fullName": "V. Mnih", "givenName": "V.", "surname": "Mnih", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Univ. of Toronto, Toronto, ON, Canada", "fullName": "G. Hinton", "givenName": "G.", "surname": "Hinton", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-06-01T00:00:00", "pubType": "proceedings", "pages": "2857-2864", "year": "2011", "issn": null, "isbn": "978-1-4577-0394-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05995709", "articleId": "12OmNwF0C87", "__typename": "AdjacentArticleType" }, "next": { "fno": "05995711", "articleId": "12OmNy68ECS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034a357", "title": "Set2Model Networks: Learning Discriminatively To Learn Generative Models", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a357/12OmNAlvHWo", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/1990/2073/0/00113740", "title": "Reactive, generative, and stratified models of probabilistic processes", "doi": null, "abstractUrl": "/proceedings-article/lics/1990/00113740/12OmNCeaPWm", "parentPublication": { "id": "proceedings/lics/1990/2073/0", "title": "Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwfhr/2004/2187/0/21870020", "title": "Generative Models and Bayesian Model Comparison for Shape Recognition", "doi": null, "abstractUrl": "/proceedings-article/iwfhr/2004/21870020/12OmNrIrPnn", "parentPublication": { "id": "proceedings/iwfhr/2004/2187/0", "title": "Proceedings. Ninth International Workshop on Frontiers in Handwriting Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2017/2939/0/08078521", "title": "Generative adversarial models for people attribute recognition in surveillance", "doi": null, "abstractUrl": "/proceedings-article/avss/2017/08078521/12OmNvkGVZC", "parentPublication": { "id": "proceedings/avss/2017/2939/0", "title": "2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204335", "title": "Generative hierarchical models for image analysis", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204335/12OmNxwENky", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457704", "title": "Non-linear generative embeddings for kernels on latent variable models", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457704/12OmNy6HQOS", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457g882", "title": "Semantic Image Inpainting with Deep Generative Models", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g882/12OmNzXnNvU", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2018/8276/0/634901a036", "title": "Adversarial Examples for Generative Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2018/634901a036/12UTFEaMbF6", "parentPublication": { "id": "proceedings/spw/2018/8276/0", "title": "2018 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2018/9497/0/949700a057", "title": "Sparse Representation-Based Face Object Generative via Deep Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icdh/2018/949700a057/17D45W1Oa34", "parentPublication": { "id": "proceedings/icdh/2018/9497/0", "title": "2018 7th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300d708", "title": "Sliced Wasserstein Generative Models", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300d708/1gyrc5jTFRK", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiry", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "acronym": "acpr", "groupId": "1800942", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45Xh13v0", "doi": "10.1109/ACPR.2017.99", "title": "Font Creation Using Class Discriminative Deep Convolutional Generative Adversarial Networks", "normalizedTitle": "Font Creation Using Class Discriminative Deep Convolutional Generative Adversarial Networks", "abstract": "In this research, we attempt to generate fonts automatically using a modification of a Deep Convolutional Generative Adversarial Network (DCGAN) by introducing class consideration. DCGANs are the application of generative adversarial networks (GAN) which make use of convolutional and deconvolutional layers to generate data through adversarial detection. The conventional GAN is comprised of two neural networks that work in series. Specifically, it approaches an unsupervised method of data generation with the use of a generative network whose output is fed into a second discriminative network. While DCGANs have been successful on natural images, we show its limited ability on font generation due to the high variation of fonts combined with the need of rigid structures of characters. We propose a class discriminative DCGAN which uses a classification network to work alongside the discriminative network to refine the generative network. This results of our experiment shows a dramatic improvement over the conventional DCGAN.", "abstracts": [ { "abstractType": "Regular", "content": "In this research, we attempt to generate fonts automatically using a modification of a Deep Convolutional Generative Adversarial Network (DCGAN) by introducing class consideration. DCGANs are the application of generative adversarial networks (GAN) which make use of convolutional and deconvolutional layers to generate data through adversarial detection. The conventional GAN is comprised of two neural networks that work in series. Specifically, it approaches an unsupervised method of data generation with the use of a generative network whose output is fed into a second discriminative network. While DCGANs have been successful on natural images, we show its limited ability on font generation due to the high variation of fonts combined with the need of rigid structures of characters. We propose a class discriminative DCGAN which uses a classification network to work alongside the discriminative network to refine the generative network. This results of our experiment shows a dramatic improvement over the conventional DCGAN.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this research, we attempt to generate fonts automatically using a modification of a Deep Convolutional Generative Adversarial Network (DCGAN) by introducing class consideration. DCGANs are the application of generative adversarial networks (GAN) which make use of convolutional and deconvolutional layers to generate data through adversarial detection. The conventional GAN is comprised of two neural networks that work in series. Specifically, it approaches an unsupervised method of data generation with the use of a generative network whose output is fed into a second discriminative network. While DCGANs have been successful on natural images, we show its limited ability on font generation due to the high variation of fonts combined with the need of rigid structures of characters. We propose a class discriminative DCGAN which uses a classification network to work alongside the discriminative network to refine the generative network. This results of our experiment shows a dramatic improvement over the conventional DCGAN.", "fno": "3354a232", "keywords": [ "Character Sets", "Convolutional Neural Nets", "Image Classification", "Font Creation", "Convolutional Layers", "Deconvolutional Layers", "Adversarial Detection", "Neural Networks", "Data Generation", "Font Generation", "Class Discriminative DCGAN", "Classification Network", "Natural Images", "Class Discriminative Deep Convolutional Generative Adversarial Networks", "Rigid Structures", "Training", "Generative Adversarial Networks", "Character Recognition", "Gallium Nitride", "Neural Networks", "Entropy", "Shape", "Generative Adversarial Network", "Font Generation", "Text Generation", "DCGAN", "Classification", "Generative Model" ], "authors": [ { "affiliation": null, "fullName": "Kotaro Abe", "givenName": "Kotaro", "surname": "Abe", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Kenji Iwana", "givenName": "Brian Kenji", "surname": "Iwana", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Viktor Gosta Holmér", "givenName": "Viktor Gosta", "surname": "Holmér", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Seiichi Uchida", "givenName": "Seiichi", "surname": "Uchida", "__typename": "ArticleAuthorType" } ], "idPrefix": "acpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "232-237", "year": "2017", "issn": null, "isbn": "978-1-5386-3354-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3354a226", "articleId": "17D45Vu1TxX", "__typename": "AdjacentArticleType" }, "next": { "fno": "3354a238", "articleId": "17D45WgziPG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aipr/2017/1235/0/08457952", "title": "Generative Adversarial Networks for Classification", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457952/13xI8AQ5AJ6", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546264", "title": "Wasserstein Generative Recurrent Adversarial Networks for Image Generating", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546264/17D45VsBU5M", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545701", "title": "Pyramid Embedded Generative Adversarial Network for Automated Font Generation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545701/17D45Wc1IJp", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a097", "title": "Adversarial Learning for Content-Based Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a097/19wB2Sv3anK", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbase/2021/2709/0/270900a601", "title": "The comparison between Conditional Generative Adversarial Nets and Deep Convolutional Generative Adversarial Network, and its GUI-related application", "doi": null, "abstractUrl": "/proceedings-article/icbase/2021/270900a601/1AH8fU796co", "parentPublication": { "id": "proceedings/icbase/2021/2709/0", "title": "2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2021/0403/0/09704964", "title": "A Co-Attention Method Based on Generative Adversarial Networks for Multi-view Images", "doi": null, "abstractUrl": "/proceedings-article/snpd/2021/09704964/1AUpjjaCbew", "parentPublication": { "id": "proceedings/snpd/2021/0403/0", "title": "2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2019/3591/0/08844913", "title": "Augmentation of Images through DCGANs", "doi": null, "abstractUrl": "/proceedings-article/ic3/2019/08844913/1dx8p29bv1e", "parentPublication": { "id": "proceedings/ic3/2019/3591/0", "title": "2019 Twelfth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a018", "title": "Structured Coupled Generative Adversarial Networks for Unsupervised Monocular Depth Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a018/1ezRC2U52Vi", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a905", "title": "SimpleGAN Stabilizing Generative Adversarial Networks with Simple Distributions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a905/1gAwTnkeY5G", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2020/9274/0/927400a001", "title": "Why are Generative Adversarial Networks so Fascinating and Annoying?", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2020/927400a001/1p2VAkdrCXC", "parentPublication": { "id": "proceedings/sibgrapi/2020/9274/0", "title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Mq0USOm6hq", "title": "2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)", "acronym": "iccmso", "groupId": "10097038", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Mq12OxyXKM", "doi": "10.1109/ICCMSO58359.2022.00071", "title": "Yoga Asanas Pose Detection using Feature Level Fusion with Deep Learning-Based Model", "normalizedTitle": "Yoga Asanas Pose Detection using Feature Level Fusion with Deep Learning-Based Model", "abstract": "Yoga is a healthful activity that started in India and has spread throughout the world, rejuvenating a man's physical, mental, and spiritual well-being. However, Yoga Image analysis is recent research based on Position identification. So Pose discovery procedures can recognize yoga postures and help people practise Yoga more precisely. But increasing dimensionality and segmentation problems lead to posture recognition is a complex problem. To resolve this, we propose a Deep learning algorithm that can be used to reliably identify numerous yoga asanas, as demonstrated in this paper. Since all the video data is raw, pre-processing is necessary before the model can be used. Objects are recognized using the YOLOv5 network in the pre-processed frames, and skeleton pose estimation is performed. Based on the identified objects, an algorithm makes a skeleton of a human in real-time. The skeletal position skeleton and objects detected by YOLOv5 are fused using feature-level fusion to derive the angles of the linkages in the human body. Based on Generative Adversarial Network (GAN) is implemented to predict the yoga postures, and these outputs are fed into the learning process. About 80% of the dataset was for training, while the residual 20% was used for testing purposes. The proposed system achieves high performance in identifying the Yoga Pose gestures accurately compared to other systems.", "abstracts": [ { "abstractType": "Regular", "content": "Yoga is a healthful activity that started in India and has spread throughout the world, rejuvenating a man's physical, mental, and spiritual well-being. However, Yoga Image analysis is recent research based on Position identification. So Pose discovery procedures can recognize yoga postures and help people practise Yoga more precisely. But increasing dimensionality and segmentation problems lead to posture recognition is a complex problem. To resolve this, we propose a Deep learning algorithm that can be used to reliably identify numerous yoga asanas, as demonstrated in this paper. Since all the video data is raw, pre-processing is necessary before the model can be used. Objects are recognized using the YOLOv5 network in the pre-processed frames, and skeleton pose estimation is performed. Based on the identified objects, an algorithm makes a skeleton of a human in real-time. The skeletal position skeleton and objects detected by YOLOv5 are fused using feature-level fusion to derive the angles of the linkages in the human body. Based on Generative Adversarial Network (GAN) is implemented to predict the yoga postures, and these outputs are fed into the learning process. About 80% of the dataset was for training, while the residual 20% was used for testing purposes. The proposed system achieves high performance in identifying the Yoga Pose gestures accurately compared to other systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Yoga is a healthful activity that started in India and has spread throughout the world, rejuvenating a man's physical, mental, and spiritual well-being. However, Yoga Image analysis is recent research based on Position identification. So Pose discovery procedures can recognize yoga postures and help people practise Yoga more precisely. But increasing dimensionality and segmentation problems lead to posture recognition is a complex problem. To resolve this, we propose a Deep learning algorithm that can be used to reliably identify numerous yoga asanas, as demonstrated in this paper. Since all the video data is raw, pre-processing is necessary before the model can be used. Objects are recognized using the YOLOv5 network in the pre-processed frames, and skeleton pose estimation is performed. Based on the identified objects, an algorithm makes a skeleton of a human in real-time. The skeletal position skeleton and objects detected by YOLOv5 are fused using feature-level fusion to derive the angles of the linkages in the human body. Based on Generative Adversarial Network (GAN) is implemented to predict the yoga postures, and these outputs are fed into the learning process. About 80% of the dataset was for training, while the residual 20% was used for testing purposes. The proposed system achieves high performance in identifying the Yoga Pose gestures accurately compared to other systems.", "fno": "328800a331", "keywords": [ "Convolutional Neural Nets", "Deep Learning Artificial Intelligence", "Feature Extraction", "Gesture Recognition", "Image Segmentation", "Learning Artificial Intelligence", "Object Detection", "Pose Estimation", "Video Signal Processing", "Complex Problem", "Deep Learning Algorithm", "Deep Learning Based Model", "Feature Level Fusion", "Healthful Activity", "Identified Objects", "Increasing Dimensionality", "Learning Process", "Numerous Yoga Asanas", "Pose Discovery Procedures", "Position Identification", "Posture Recognition", "Pre Processed Frames", "Raw Processing", "Segmentation Problems", "Skeletal Position Skeleton", "Yoga Asanas Pose Detection", "Yoga Image Analysis", "Yoga Pose Gestures", "Yoga Postures", "YOL Ov 5 Network", "Deep Learning", "Training", "Technological Innovation", "Computational Modeling", "Generative Adversarial Networks", "Feature Extraction", "Skeleton", "Deep Learning", "Generative Adversarial Network", "Feature Level Fusion", "Posture Recognition", "YOLO Network", "Yoga Asanas" ], "authors": [ { "affiliation": "Kristu Jayanti College(Autonomous),Dept. of Computer Science (PG),Bengaluru,Karnataka,India", "fullName": "Kumar R", "givenName": "Kumar", "surname": "R", "__typename": "ArticleAuthorType" }, { "affiliation": "Kristu Jayanti College(Autonomous),Dept. of Computer Science (PG),Bengaluru,Karnataka,India", "fullName": "Velmurugan R", "givenName": "Velmurugan", "surname": "R", "__typename": "ArticleAuthorType" }, { "affiliation": "Kristu Jayanti College(Autonomous),Dept. of Computer Science (PG),Bengaluru,Karnataka,India", "fullName": "Muruganantham A", "givenName": "Muruganantham", "surname": "A", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccmso", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "331-339", "year": "2022", "issn": null, "isbn": "979-8-3503-3288-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "328800a325", "articleId": "1Mq0VO1WNVK", "__typename": "AdjacentArticleType" }, "next": { "fno": "328800a340", "articleId": "1Mq0Y1AiUY8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2015/9711/0/5720a312", "title": "Skeleton-Free Body Pose Estimation from Depth Images for Movement Analysis", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a312/12OmNwFiddo", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a095", "title": "Multimodal Human Action Recognition Based on a Fusion of Dynamic Images Using CNN Descriptors", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a095/17D45WODas2", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/6.42E104", "title": "Pose Transferrable Person Re-identification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/6.42E104/17D45Wuc37k", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500b459", "title": "Unsupervised Feature Learning of Human Actions As Trajectories in Pose Embedding Manifold", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500b459/18j8Njg3yYE", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d226", "title": "Constructing a skeleton database and enriching it using a Generative Adversarial Network (GAN) simulator to assess human movement", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d226/1FwFxCQVwFq", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900c636", "title": "YOLO-Pose: Enhancing YOLO for Multi Person Pose Estimation Using Object Keypoint Similarity Loss", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900c636/1G5751yi8E0", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900d539", "title": "Pose Tutor: An Explainable System for Pose Correction in the Wild", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900d539/1G57kKE6IWQ", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956682", "title": "Scene Aware Person Image Generation through Global Contextual Conditioning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956682/1IHqfqrTCow", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151085", "title": "Yoga-82: A New Dataset for Fine-grained Classification of Human Poses", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151085/1lPHelnAqAM", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2020/4109/0/410900a103", "title": "RGBD-Based Real-Time 3D Human Pose Estimation for Fitness Assessment", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2020/410900a103/1t2mxNkHlQc", "parentPublication": { "id": "proceedings/wcmeim/2020/4109/0", "title": "2020 3rd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMGueDF0ti", "title": "2019 16th Conference on Computer and Robot Vision (CRV)", "acronym": "crv", "groupId": "1001794", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMGv40ulTa", "doi": "10.1109/CRV.2019.00018", "title": "Hierarchically-Fused Generative Adversarial Network for Text to Realistic Image Synthesis", "normalizedTitle": "Hierarchically-Fused Generative Adversarial Network for Text to Realistic Image Synthesis", "abstract": "In this paper, we present a novel Hierarchically-fused Generative Adversarial Network (HfGAN) for synthesizing realistic images from text descriptions. While existing approaches on this topic have achieved impressive success, to generate 256×256 images from captions, they commonly resort to coarse-to-fine scheme and associate multiple discriminators in different stages of the networks. Such a strategy is both inefficient and prone to artifacts. Motivated by the above findings, we propose an end-to-end network that can generate 256×256 photo-realistic images with only one discriminator. We fully exploit the hierarchical information from different layers and directly generate the fine-scale images by adaptively fusing features from multi-hierarchical layers. We quantitatively evaluate the synthesized images with Inception Score, Visual-semantic Similarity and average training time on the CUB birds, Oxford-102 flowers, and COCO datasets. The results show that our model is more efficient and noticeably outperforms the previous state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a novel Hierarchically-fused Generative Adversarial Network (HfGAN) for synthesizing realistic images from text descriptions. While existing approaches on this topic have achieved impressive success, to generate 256×256 images from captions, they commonly resort to coarse-to-fine scheme and associate multiple discriminators in different stages of the networks. Such a strategy is both inefficient and prone to artifacts. Motivated by the above findings, we propose an end-to-end network that can generate 256×256 photo-realistic images with only one discriminator. We fully exploit the hierarchical information from different layers and directly generate the fine-scale images by adaptively fusing features from multi-hierarchical layers. We quantitatively evaluate the synthesized images with Inception Score, Visual-semantic Similarity and average training time on the CUB birds, Oxford-102 flowers, and COCO datasets. The results show that our model is more efficient and noticeably outperforms the previous state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a novel Hierarchically-fused Generative Adversarial Network (HfGAN) for synthesizing realistic images from text descriptions. While existing approaches on this topic have achieved impressive success, to generate 256×256 images from captions, they commonly resort to coarse-to-fine scheme and associate multiple discriminators in different stages of the networks. Such a strategy is both inefficient and prone to artifacts. Motivated by the above findings, we propose an end-to-end network that can generate 256×256 photo-realistic images with only one discriminator. We fully exploit the hierarchical information from different layers and directly generate the fine-scale images by adaptively fusing features from multi-hierarchical layers. We quantitatively evaluate the synthesized images with Inception Score, Visual-semantic Similarity and average training time on the CUB birds, Oxford-102 flowers, and COCO datasets. The results show that our model is more efficient and noticeably outperforms the previous state-of-the-art methods.", "fno": "183800a073", "keywords": [ "Feature Extraction", "Neural Nets", "Text Analysis", "Text Descriptions", "Associate Multiple Discriminators", "End To End Network", "Hierarchical Information", "Fine Scale Images", "Multihierarchical Layers", "Synthesized Images", "Realistic Image Synthesis", "Photo Realistic Images", "Hierarchically Fused Generative Adversarial Network", "Generative Adversarial Networks", "Generators", "Feature Extraction", "Training", "Image Resolution", "Image Synthesis", "Birds", "Generative Adversarial Networks", "Text To Image Synthesis", "Hierarchical Features Fusion" ], "authors": [ { "affiliation": "Memorial University of Newfoundland", "fullName": "Xin Huang", "givenName": "Xin", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Memorial University of Newfoundland", "fullName": "Mingjie Wang", "givenName": "Mingjie", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Memorial University of Newfoundland", "fullName": "Minglun Gong", "givenName": "Minglun", "surname": "Gong", "__typename": "ArticleAuthorType" } ], "idPrefix": "crv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "73-80", "year": "2019", "issn": null, "isbn": "978-1-7281-1838-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "183800a065", "articleId": "1cMGukHLvOM", "__typename": "AdjacentArticleType" }, "next": { "fno": "183800a081", "articleId": "1cMGuyE64Te", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545383", "title": "Semantic Image Synthesis via Conditional Cycle-Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545383/17D45VtKius", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a281", "title": "Robust Iris Segmentation Based on Fully Convolutional Networks and Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a281/17D45XDIXVE", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2021/3176/0/09667004", "title": "Progressive Text-to-Face Synthesis with Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/fg/2021/09667004/1A6BqaAmrGo", "parentPublication": { "id": "proceedings/fg/2021/3176/0", "title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartiot/2022/7952/0/795200a154", "title": "Water Gauge Image Augmentation based on Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/smartiot/2022/795200a154/1Gvdl7AraY8", "parentPublication": { "id": "proceedings/smartiot/2022/7952/0", "title": "2022 IEEE International Conference on Smart Internet of Things (SmartIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2022/5478/0/547800a050", "title": "VCL-GAN: A Variational Contrastive Learning Generative Adversarial Network for Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/icdh/2022/547800a050/1JeDs4zZhqE", "parentPublication": { "id": "proceedings/icdh/2022/5478/0", "title": "2022 9th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1469", "title": "R²GAN: Cross-Modal Recipe Retrieval With Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1469/1gyriUTXkcM", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150661", "title": "Real-World Super-Resolution using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150661/1lPH66Ff2HS", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a569", "title": "Video-rate acquisition fluorescence microscopy via generative adversarial networks", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a569/1pBMo7sHayk", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a694", "title": "Realistic Style-Transfer Generative Adversarial Network With a Weight-Sharing Strategy", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a694/1pP3zTKL8xq", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412022", "title": "Attributes Aware Face Generation with Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412022/1tmimHQIteE", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gyr6w5YIIU", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gyrc5jTFRK", "doi": "10.1109/CVPR.2019.00383", "title": "Sliced Wasserstein Generative Models", "normalizedTitle": "Sliced Wasserstein Generative Models", "abstract": "In generative modeling, the Wasserstein distance (WD) has emerged as a useful metric to measure the discrepancy between generated and real data distributions. Unfortunately, it is challenging to approximate the WD of high-dimensional distributions. In contrast, the sliced Wasserstein distance (SWD) factorizes high-dimensional distributions into their multiple one-dimensional marginal distributions and is thus easier to approximate. In this paper, we introduce novel approximations of the primal and dual SWD. Instead of using a large number of random projections, as it is done by conventional SWD approximation methods, we propose to approximate SWDs with a small number of parameterized orthogonal projections in an end-to-end deep learning fashion. As concrete applications of our SWD approximations, we design two types of differentiable SWD blocks to equip modern generative frameworks---Auto-Encoders (AE) and Generative Adversarial Networks (GAN). In the experiments, we not only show the superiority of the proposed generative models on standard image synthesis benchmarks, but also demonstrate the state-of-the-art performance on challenging high resolution image and video generation in an unsupervised manner.", "abstracts": [ { "abstractType": "Regular", "content": "In generative modeling, the Wasserstein distance (WD) has emerged as a useful metric to measure the discrepancy between generated and real data distributions. Unfortunately, it is challenging to approximate the WD of high-dimensional distributions. In contrast, the sliced Wasserstein distance (SWD) factorizes high-dimensional distributions into their multiple one-dimensional marginal distributions and is thus easier to approximate. In this paper, we introduce novel approximations of the primal and dual SWD. Instead of using a large number of random projections, as it is done by conventional SWD approximation methods, we propose to approximate SWDs with a small number of parameterized orthogonal projections in an end-to-end deep learning fashion. As concrete applications of our SWD approximations, we design two types of differentiable SWD blocks to equip modern generative frameworks---Auto-Encoders (AE) and Generative Adversarial Networks (GAN). In the experiments, we not only show the superiority of the proposed generative models on standard image synthesis benchmarks, but also demonstrate the state-of-the-art performance on challenging high resolution image and video generation in an unsupervised manner.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In generative modeling, the Wasserstein distance (WD) has emerged as a useful metric to measure the discrepancy between generated and real data distributions. Unfortunately, it is challenging to approximate the WD of high-dimensional distributions. In contrast, the sliced Wasserstein distance (SWD) factorizes high-dimensional distributions into their multiple one-dimensional marginal distributions and is thus easier to approximate. In this paper, we introduce novel approximations of the primal and dual SWD. Instead of using a large number of random projections, as it is done by conventional SWD approximation methods, we propose to approximate SWDs with a small number of parameterized orthogonal projections in an end-to-end deep learning fashion. As concrete applications of our SWD approximations, we design two types of differentiable SWD blocks to equip modern generative frameworks---Auto-Encoders (AE) and Generative Adversarial Networks (GAN). In the experiments, we not only show the superiority of the proposed generative models on standard image synthesis benchmarks, but also demonstrate the state-of-the-art performance on challenging high resolution image and video generation in an unsupervised manner.", "fno": "329300d708", "keywords": [ "Learning Artificial Intelligence", "Neural Nets", "Statistical Distributions", "Data Distributions", "Sliced Wasserstein Distance", "One Dimensional Marginal Distributions", "Parameterized Orthogonal Projections", "End To End Deep Learning", "SWD Approximations", "Wasserstein Generative Adversarial Networks", "Autoencoders", "Sliced Wasserstein Generative Models", "Measurement", "Deep Learning", "Computer Vision", "Image Resolution", "Image Synthesis", "Computational Modeling", "Generative Adversarial Networks", "Image And Video Synthesis", "Deep Learning", "Optimization Methods" ], "authors": [ { "affiliation": "ETH Zurich", "fullName": "Jiqing Wu", "givenName": "Jiqing", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Zhiwu Huang", "givenName": "Zhiwu", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Dinesh Acharya", "givenName": "Dinesh", "surname": "Acharya", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Wen Li", "givenName": "Wen", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Janine Thoma", "givenName": "Janine", "surname": "Thoma", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich", "fullName": "Danda Pani Paudel", "givenName": "Danda Pani", "surname": "Paudel", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Luc Van Gool", "givenName": "Luc", "surname": "Van Gool", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "3708-3717", "year": "2019", "issn": null, "isbn": "978-1-7281-3293-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "329300d698", "articleId": "1gyrymB8ces", "__typename": "AdjacentArticleType" }, "next": { "fno": "329300d718", "articleId": "1gyrEiPH57y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08546264", "title": "Wasserstein Generative Recurrent Adversarial Networks for Image Generating", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546264/17D45VsBU5M", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d702", "title": "Wasserstein Introspective Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d702/17D45WODaoE", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d483", "title": "Generative Modeling Using the Sliced Wasserstein Distance", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d483/17D45Wuc33i", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09803876", "title": "Rectified Wasserstein Generative Adversarial Networks for Perceptual Image Restoration", "doi": null, "abstractUrl": "/journal/tp/2023/03/09803876/1EpGnEVH53W", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfeict/2022/5476/0/547600a599", "title": "Intrusion Detection Method Based on Wasserstein Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icfeict/2022/547600a599/1IFJVuUorZe", "parentPublication": { "id": "proceedings/icfeict/2022/5476/0", "title": "2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300k0277", "title": "Sliced Wasserstein Discrepancy for Unsupervised Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300k0277/1gyrYacs8nK", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150709", "title": "Illegible Text to Readable Text: An Image-to-Image Transformation using Conditional Sliced Wasserstein Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150709/1lPHoEnud7q", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09290435", "title": "Optimizing Latent Distributions for Non-Adversarial Generative Networks", "doi": null, "abstractUrl": "/journal/tp/2022/05/09290435/1prKHvxF2lW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374315", "title": "Biosignal Oversampling Using Wasserstein Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374315/1rUJ1atR09G", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b283", "title": "Spoken Keyword Detection Based on Wasserstein Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b283/1tzyV383zd6", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hVlLtjahSE", "doi": "10.1109/ICCV.2019.00788", "title": "View Independent Generative Adversarial Network for Novel View Synthesis", "normalizedTitle": "View Independent Generative Adversarial Network for Novel View Synthesis", "abstract": "Synthesizing novel views from a 2D image requires to infer 3D structure and project it back to 2D from a new viewpoint. In this paper, we propose an encoder-decoder based generative adversarial network VI-GAN to tackle this problem. Our method is to let the network, after seeing many images of objects belonging to the same category in different views, obtain essential knowledge of intrinsic properties of the objects. To this end, an encoder is designed to extract view-independent feature that characterizes intrinsic properties of the input image, which includes 3D structure, color, texture etc. We also make the decoder hallucinate the image of a novel view based on the extracted feature and an arbitrary user-specific camera pose. Extensive experiments demonstrate that our model can synthesize high-quality images in different views with continuous camera poses, and is general for various applications.", "abstracts": [ { "abstractType": "Regular", "content": "Synthesizing novel views from a 2D image requires to infer 3D structure and project it back to 2D from a new viewpoint. In this paper, we propose an encoder-decoder based generative adversarial network VI-GAN to tackle this problem. Our method is to let the network, after seeing many images of objects belonging to the same category in different views, obtain essential knowledge of intrinsic properties of the objects. To this end, an encoder is designed to extract view-independent feature that characterizes intrinsic properties of the input image, which includes 3D structure, color, texture etc. We also make the decoder hallucinate the image of a novel view based on the extracted feature and an arbitrary user-specific camera pose. Extensive experiments demonstrate that our model can synthesize high-quality images in different views with continuous camera poses, and is general for various applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Synthesizing novel views from a 2D image requires to infer 3D structure and project it back to 2D from a new viewpoint. In this paper, we propose an encoder-decoder based generative adversarial network VI-GAN to tackle this problem. Our method is to let the network, after seeing many images of objects belonging to the same category in different views, obtain essential knowledge of intrinsic properties of the objects. To this end, an encoder is designed to extract view-independent feature that characterizes intrinsic properties of the input image, which includes 3D structure, color, texture etc. We also make the decoder hallucinate the image of a novel view based on the extracted feature and an arbitrary user-specific camera pose. Extensive experiments demonstrate that our model can synthesize high-quality images in different views with continuous camera poses, and is general for various applications.", "fno": "480300h790", "keywords": [ "Cameras", "Computer Vision", "Convolutional Neural Nets", "Feature Extraction", "Image Matching", "Image Reconstruction", "Image Sequences", "Image Texture", "Solid Modelling", "View Independent Generative Adversarial Network", "Novel View Synthesis", "Encoder Decoder Based Generative Adversarial Network VI GAN", "View Independent Feature", "Extracted Feature", "High Quality Images", "Arbitrary User Specific Camera Pose", "Three Dimensional Displays", "Cameras", "Two Dimensional Displays", "Feature Extraction", "Decoding", "Solid Modeling", "Generative Adversarial Networks" ], "authors": [ { "affiliation": "The Chinese University of Hong Kong", "fullName": "Xiaogang Xu", "givenName": "Xiaogang", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese University of Hong Kong", "fullName": "Yingcong Chen", "givenName": "Yingcong", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese University of Hong Kong", "fullName": "Jiaya Jia", "givenName": "Jiaya", "surname": "Jia", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "7790-7799", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "480300h780", "articleId": "1hVlND6tJ84", "__typename": "AdjacentArticleType" }, "next": { "fno": "480300h800", "articleId": "1hVlr89nneE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032c317", "title": "Shape Inpainting Using 3D Generative Adversarial Network and Recurrent Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032c317/12OmNzWx01v", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a454", "title": "Generative Adversarial Frontal View to Bird View Synthesis", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a454/17D45VsBTUu", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545701", "title": "Pyramid Embedded Generative Adversarial Network for Automated Font Generation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545701/17D45Wc1IJp", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iseeie/2022/6874/0/687400a063", "title": "A Generative Adversarial Constraint Encoder-Decoder Model for the Text Summarization", "doi": null, "abstractUrl": "/proceedings-article/iseeie/2022/687400a063/1FWmOrgXtpS", "parentPublication": { "id": "proceedings/iseeie/2022/6874/0", "title": "2022 International Symposium on Electrical, Electronics and Information Engineering (ISEEIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/12/08453803", "title": "Dense 3D Object Reconstruction from a Single Depth View", "doi": null, "abstractUrl": "/journal/tp/2019/12/08453803/1eEQk7brg3e", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102904", "title": "Text to Image Synthesis With Bidirectional Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102904/1kwr76JKhoc", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102880", "title": "Light Field Image Coding Using Dual Discriminator Generative Adversarial Network And VVC Temporal Scalability", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102880/1kwrcx7Ppuw", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102794", "title": "Eigan: Enhanced Inpainting Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a040", "title": "Dynamic Graph Generative Adversarial Networks for Skeleton-Based Human Motion Prediction", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a040/1oRiVW6zXby", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a071", "title": "Improved Modeling of 3D Shapes with Multi-view Depth Maps", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a071/1qyxmgpJORW", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmj1Q2FPxu", "doi": "10.1109/ICPR48806.2021.9412523", "title": "Phase Retrieval Using Conditional Generative Adversarial Networks", "normalizedTitle": "Phase Retrieval Using Conditional Generative Adversarial Networks", "abstract": "In this paper, we propose the application of conditional generative adversarial networks to solve various phase retrieval problems. We show that including knowledge of the measurement process at training time leads to an optimization at test time that is more robust to initialization than existing approaches involving generative models. In addition, conditioning the generator network on the measurements enables us to achieve much more detailed results. We empirically demonstrate that these advantages provide meaningful solutions to the Fourier and the compressive phase retrieval problem and that our method outperforms well-established projection-based methods as well as existing methods that are based on neural networks. Like other deep learning methods, our approach is robust to noise and can therefore be useful for real-world applications.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose the application of conditional generative adversarial networks to solve various phase retrieval problems. We show that including knowledge of the measurement process at training time leads to an optimization at test time that is more robust to initialization than existing approaches involving generative models. In addition, conditioning the generator network on the measurements enables us to achieve much more detailed results. We empirically demonstrate that these advantages provide meaningful solutions to the Fourier and the compressive phase retrieval problem and that our method outperforms well-established projection-based methods as well as existing methods that are based on neural networks. Like other deep learning methods, our approach is robust to noise and can therefore be useful for real-world applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose the application of conditional generative adversarial networks to solve various phase retrieval problems. We show that including knowledge of the measurement process at training time leads to an optimization at test time that is more robust to initialization than existing approaches involving generative models. In addition, conditioning the generator network on the measurements enables us to achieve much more detailed results. We empirically demonstrate that these advantages provide meaningful solutions to the Fourier and the compressive phase retrieval problem and that our method outperforms well-established projection-based methods as well as existing methods that are based on neural networks. Like other deep learning methods, our approach is robust to noise and can therefore be useful for real-world applications.", "fno": "09412523", "keywords": [ "Compressed Sensing", "Deep Learning Artificial Intelligence", "Fourier Analysis", "Image Retrieval", "Conditional Generative Adversarial Networks", "Generator Network", "Neural Networks", "Deep Learning", "Fourier Analysis", "Compressive Phase Retrieval Problem Solving", "Training", "Deep Learning", "Computational Modeling", "Neural Networks", "Generative Adversarial Networks", "Time Measurement", "Generators" ], "authors": [ { "affiliation": "Heinrich-Heine-Universtität Düsseldorf,Department of Computer Science,Düsseldorf,Germany", "fullName": "Tobias Uelwer", "givenName": "Tobias", "surname": "Uelwer", "__typename": "ArticleAuthorType" }, { "affiliation": "Heinrich-Heine-Universtität Düsseldorf,Department of Computer Science,Düsseldorf,Germany", "fullName": "Alexander Oberstraß", "givenName": "Alexander", "surname": "Oberstraß", "__typename": "ArticleAuthorType" }, { "affiliation": "Heinrich-Heine-Universtität Düsseldorf,Department of Computer Science,Düsseldorf,Germany", "fullName": "Stefan Harmeling", "givenName": "Stefan", "surname": "Harmeling", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "731-738", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412875", "articleId": "1tmi9P6lf4Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412100", "articleId": "1tmhTeQqymQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545383", "title": "Semantic Image Synthesis via Conditional Cycle-Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545383/17D45VtKius", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545152", "title": "Generating Adversarial Examples With Conditional Generative Adversarial Net", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545152/17D45WHONi6", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i202", "title": "Single Image Dehazing via Conditional Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i202/17D45Xi9rWV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a097", "title": "Adversarial Learning for Content-Based Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a097/19wB2Sv3anK", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a729", "title": "PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a729/1AqwZulK7Ly", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956292", "title": "Label Geometry Aware Discriminator for Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956292/1IHqBHRVHNe", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0540", "title": "Attribute Manipulation Generative Adversarial Networks for Fashion Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0540/1hVloNEYY8w", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800f446", "title": "CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800f446/1m3orbD5kFq", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2020/4272/0/427200a314", "title": "Face Aging with Conditional Generative Adversarial Network Guided by Ranking-CNN", "doi": null, "abstractUrl": "/proceedings-article/mipr/2020/427200a314/1mAa24QPsEU", "parentPublication": { "id": "proceedings/mipr/2020/4272/0", "title": "2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b283", "title": "Spoken Keyword Detection Based on Wasserstein Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b283/1tzyV383zd6", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeIFQTwlXO", "doi": "10.1109/CVPR46437.2021.01340", "title": "Autoregressive Stylized Motion Synthesis with Generative Flow", "normalizedTitle": "Autoregressive Stylized Motion Synthesis with Generative Flow", "abstract": "Motion style transfer is an important problem in many computer graphics and computer vision applications, including human animation, games, and robotics. Most existing deep learning methods for this problem are supervised and trained by registered motion pairs. In addition, these methods are often limited to yielding a deterministic output, given a pair of style and content motions. In this paper, we propose an unsupervised approach for motion style transfer by synthesizing stylized motions autoregressively using a generative flow model Z_$\\mathcal{M}$_Z. Z_$\\mathcal{M}$_Z is trained to maximize the exact likelihood of a collection of unlabeled motions, based on an autoregressive context of poses in previous frames and a control signal representing the movement of a root joint. Thanks to invertible flow transformations, latent codes that encode deep properties of motion styles are efficiently inferred by Z_$\\mathcal{M}$_Z. By combining the latent codes (from an input style motion S) with the autoregressive context and control signal (from an input content motion C), Z_$\\mathcal{M}$_Z outputs a stylized motion which transfers style from S to C. Moreover, our model is probabilistic and is able to generate various plausible motions with a specific style. We evaluate the proposed model on motion capture datasets containing different human motion styles. Experiment results show that our model outperforms the state-of-the-art methods, despite not requiring manually labeled training data.", "abstracts": [ { "abstractType": "Regular", "content": "Motion style transfer is an important problem in many computer graphics and computer vision applications, including human animation, games, and robotics. Most existing deep learning methods for this problem are supervised and trained by registered motion pairs. In addition, these methods are often limited to yielding a deterministic output, given a pair of style and content motions. In this paper, we propose an unsupervised approach for motion style transfer by synthesizing stylized motions autoregressively using a generative flow model $\\mathcal{M}$. $\\mathcal{M}$ is trained to maximize the exact likelihood of a collection of unlabeled motions, based on an autoregressive context of poses in previous frames and a control signal representing the movement of a root joint. Thanks to invertible flow transformations, latent codes that encode deep properties of motion styles are efficiently inferred by $\\mathcal{M}$. By combining the latent codes (from an input style motion S) with the autoregressive context and control signal (from an input content motion C), $\\mathcal{M}$ outputs a stylized motion which transfers style from S to C. Moreover, our model is probabilistic and is able to generate various plausible motions with a specific style. We evaluate the proposed model on motion capture datasets containing different human motion styles. Experiment results show that our model outperforms the state-of-the-art methods, despite not requiring manually labeled training data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Motion style transfer is an important problem in many computer graphics and computer vision applications, including human animation, games, and robotics. Most existing deep learning methods for this problem are supervised and trained by registered motion pairs. In addition, these methods are often limited to yielding a deterministic output, given a pair of style and content motions. In this paper, we propose an unsupervised approach for motion style transfer by synthesizing stylized motions autoregressively using a generative flow model -. - is trained to maximize the exact likelihood of a collection of unlabeled motions, based on an autoregressive context of poses in previous frames and a control signal representing the movement of a root joint. Thanks to invertible flow transformations, latent codes that encode deep properties of motion styles are efficiently inferred by -. By combining the latent codes (from an input style motion S) with the autoregressive context and control signal (from an input content motion C), - outputs a stylized motion which transfers style from S to C. Moreover, our model is probabilistic and is able to generate various plausible motions with a specific style. We evaluate the proposed model on motion capture datasets containing different human motion styles. Experiment results show that our model outperforms the state-of-the-art methods, despite not requiring manually labeled training data.", "fno": "450900n3607", "keywords": [ "Autoregressive Processes", "Computer Animation", "Computer Vision", "Deep Learning Artificial Intelligence", "Image Motion Analysis", "Supervised Learning", "Autoregressive Stylized Motion Synthesis", "Motion Style Transfer", "Computer Graphics", "Computer Vision Applications", "Registered Motion Pairs", "Content Motions", "Generative Flow Model", "Unlabeled Motions", "Control Signal", "Invertible Flow Transformations", "Latent Codes", "Plausible Motions", "Motion Capture Datasets", "Input Style Motion", "Input Content Motion", "Human Motion Styles", "Training", "Deep Learning", "Computer Vision", "Codes", "Training Data", "Games", "Probabilistic Logic" ], "authors": [ { "affiliation": "Tsinghua University,BNRist,CS Dept", "fullName": "Yu-Hui Wen", "givenName": "Yu-Hui", "surname": "Wen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chinese Academy of Sciences", "fullName": "Zhipeng Yang", "givenName": "Zhipeng", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong,School of Creative Media", "fullName": "Hongbo Fu", "givenName": "Hongbo", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chinese Academy of Sciences", "fullName": "Lin Gao", "givenName": "Lin", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,BNRist,CS Dept", "fullName": "Yanan Sun", "givenName": "Yanan", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,BNRist,CS Dept", "fullName": "Yong-Jin Liu", "givenName": "Yong-Jin", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "13607-13607", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeIFIblHr2", "name": "pcvpr202145090-09578056s1-mm_450900n3607.zip", "size": "18.6 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578056s1-mm_450900n3607.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900n3595", "articleId": "1yeLXbluKJy", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900n3617", "articleId": "1yeJaoI4BZ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2013/0015/0/06607506", "title": "Motion synthesis for affective agents using piecewise principal component regression", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607506/12OmNyQYt2c", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2015/7673/0/7673a193", "title": "Synthesis and Editing of Human Motion with Generative Human Motion Model", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2015/7673a193/12OmNyYm2oB", "parentPublication": { "id": "proceedings/icvrv/2015/7673/0", "title": "2015 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/04/mcg2017040042", "title": "Fast Neural Style Transfer for Motion Data", "doi": null, "abstractUrl": "/magazine/cg/2017/04/mcg2017040042/13rRUxbCbsI", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859966", "title": "Self-Supervised Video Object Segmentation by Motion-Aware Mask Propagation", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859966/1G9DXglwb16", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859776", "title": "Unpaired Motion Style Transfer with Motion-Oriented Projection Flow Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859776/1G9E21CBr44", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g583", "title": "Style-ERD: Responsive and Coherent Online Motion Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g583/1H0NZuIQvyE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g417", "title": "MotionAug: Augmentation with Physical Correction for Human Motion Prediction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g417/1H0NgYQIp32", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09992151", "title": "Personalized Audio-Driven 3D Facial Animation Via Style-Content Disentanglement", "doi": null, "abstractUrl": "/journal/tg/5555/01/09992151/1JevBLSiUqA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2201", "title": "Scene-aware Generative Network for Human Motion Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2201/1yeLQoDYNd6", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b276", "title": "Self-supervised Motion Learning from Static Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b276/1yeLYOoH3Hy", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzJS", "title": "2008 20th IEEE International Conference on Tools with Artificial Intelligence", "acronym": "ictai", "groupId": "1000763", "volume": "2", "displayVolume": "2", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNylsZAM", "doi": "10.1109/ICTAI.2008.97", "title": "Exploiting Item Taxonomy for Solving Cold-Start Problem in Recommendation Making", "normalizedTitle": "Exploiting Item Taxonomy for Solving Cold-Start Problem in Recommendation Making", "abstract": "Recommender systems' performance can be easily affected when there are no sufficient item preferences data provided by previous users, and it is commonly referred to as cold-start problem. This paper suggests another information source, item taxonomies, in addition to item preference data for assisting recommendation making. Item taxonomy information has been popularly applied in diverse ecommerce domains for product or content classification, and therefore can be easily obtained and adapted by recommender systems. In this paper, we investigate the implicit relations between users' item preferences and taxonomic preferences, suggest and verify that users who share similar item preferences may also share similar taxonomic preferences. Under this assumption, a novel recommendation technique is proposed that combines the users' item preferences and the additional taxonomic preferences together to make better quality recommendations as well as alleviate the cold-start problem. Empirical evaluations to this approach are conducted and the results show that the proposed technique outperforms other existing techniques in both recommendation quality and computation efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Recommender systems' performance can be easily affected when there are no sufficient item preferences data provided by previous users, and it is commonly referred to as cold-start problem. This paper suggests another information source, item taxonomies, in addition to item preference data for assisting recommendation making. Item taxonomy information has been popularly applied in diverse ecommerce domains for product or content classification, and therefore can be easily obtained and adapted by recommender systems. In this paper, we investigate the implicit relations between users' item preferences and taxonomic preferences, suggest and verify that users who share similar item preferences may also share similar taxonomic preferences. Under this assumption, a novel recommendation technique is proposed that combines the users' item preferences and the additional taxonomic preferences together to make better quality recommendations as well as alleviate the cold-start problem. Empirical evaluations to this approach are conducted and the results show that the proposed technique outperforms other existing techniques in both recommendation quality and computation efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recommender systems' performance can be easily affected when there are no sufficient item preferences data provided by previous users, and it is commonly referred to as cold-start problem. This paper suggests another information source, item taxonomies, in addition to item preference data for assisting recommendation making. Item taxonomy information has been popularly applied in diverse ecommerce domains for product or content classification, and therefore can be easily obtained and adapted by recommender systems. In this paper, we investigate the implicit relations between users' item preferences and taxonomic preferences, suggest and verify that users who share similar item preferences may also share similar taxonomic preferences. Under this assumption, a novel recommendation technique is proposed that combines the users' item preferences and the additional taxonomic preferences together to make better quality recommendations as well as alleviate the cold-start problem. Empirical evaluations to this approach are conducted and the results show that the proposed technique outperforms other existing techniques in both recommendation quality and computation efficiency.", "fno": "3440b113", "keywords": [ "Taxonomy", "Recommender" ], "authors": [ { "affiliation": null, "fullName": "Li-Tung Weng", "givenName": "Li-Tung", "surname": "Weng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yue Xu", "givenName": "Yue", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuefeng Li", "givenName": "Yuefeng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Richi Nayak", "givenName": "Richi", "surname": "Nayak", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "113-120", "year": "2008", "issn": "1082-3409", "isbn": "978-0-7695-3440-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3440b105", "articleId": "12OmNrJAdTJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3440b123", "articleId": "12OmNvAS4rh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iatw/2007/3028/0/3028a133", "title": "Applying Cross-Level Association Rule Mining to Cold-Start Recommendations", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2007/3028a133/12OmNrkBwni", "parentPublication": { "id": "proceedings/wi-iatw/2007/3028/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccc/2017/2008/0/2008a072", "title": "A Method for Dealing with Data Sparsity and Cold-Start Limitations in Service Recommendation Using Personalized Preferences", "doi": null, "abstractUrl": "/proceedings-article/iccc/2017/2008a072/12OmNvSbBG3", "parentPublication": { "id": "proceedings/iccc/2017/2008/0", "title": "2017 IEEE International Conference on Cognitive Computing (ICCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2015/8002/0/8002a095", "title": "Towards Solving the Cold Start Transition Problem in Dynamic Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/icebe/2015/8002a095/12OmNyRPgHS", "parentPublication": { "id": "proceedings/icebe/2015/8002/0", "title": "2015 IEEE 12th International Conference on e-Business Engineering (ICEBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/04/08606103", "title": "Addressing the Item Cold-Start Problem by Attribute-Driven Active Learning", "doi": null, "abstractUrl": "/journal/tk/2020/04/08606103/17D45VsBU5z", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10005854", "title": "Contrastive Proxy Kernel Stein Path Alignment for Cross-Domain Cold-Start Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10005854/1JF3QJLStig", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/10018469", "title": "Cold-start Next-item Recommendation by User-Item Matching and Auto-encoders", "doi": null, "abstractUrl": "/journal/sc/5555/01/10018469/1K0DyYG8zaE", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2019/0676/0/067600a313", "title": "A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata", "doi": null, "abstractUrl": "/proceedings-article/wetice/2019/067600a313/1cJ1uyINNy8", "parentPublication": { "id": "proceedings/wetice/2019/0676/0", "title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2018/1390/0/139000a103", "title": "Practically Feasible Recommender Systems for Cold Start Problems", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2018/139000a103/1dPoMsQR2ww", "parentPublication": { "id": "proceedings/apwc-on-cse/2018/1390/0", "title": "2018 5th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09197722", "title": "Deep Pairwise Hashing for Cold-Start Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/07/09197722/1n8WCSbSdxe", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a912", "title": "Cold Item Recommendations via Hierarchical Item2vec", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a912/1r54vyiHUEE", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KmF7rVz6Y8", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "acronym": "aivr", "groupId": "1830004", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KmFaCkhwPK", "doi": "10.1109/AIVR56993.2022.00032", "title": "Touching the Explanations: Explaining Movie Recommendation Scores in Mobile Augmented Reality", "normalizedTitle": "Touching the Explanations: Explaining Movie Recommendation Scores in Mobile Augmented Reality", "abstract": "While most studies are devoted to improving movie recommendation scores with progressively accurate algorithms, many users still do not understand their recommendations entirely. Consequently, scholars have started to design explanations for movie recommendation systems. In this context, information visualization can offer adequate explanations to improve user experience. Additionally, augmented reality (AR) can broaden those visualizations, particularly in public spaces. This study provides an initial exploration of the design space of mobile AR explanations for movie recommendation scores. We first explored how movie streaming platform users portray mobile AR explanations. We later conducted a mixed-method prototype evaluation uncovering specific information visualization strategies to provide explanations that improved the usability and explainability of the system. Based on both iterations, we propose suggestions for designing AR explanations for movie recommendations and present MovieAdvisor: a mobile AR movie recommendation system that explains personalized movie recommendation scores.", "abstracts": [ { "abstractType": "Regular", "content": "While most studies are devoted to improving movie recommendation scores with progressively accurate algorithms, many users still do not understand their recommendations entirely. Consequently, scholars have started to design explanations for movie recommendation systems. In this context, information visualization can offer adequate explanations to improve user experience. Additionally, augmented reality (AR) can broaden those visualizations, particularly in public spaces. This study provides an initial exploration of the design space of mobile AR explanations for movie recommendation scores. We first explored how movie streaming platform users portray mobile AR explanations. We later conducted a mixed-method prototype evaluation uncovering specific information visualization strategies to provide explanations that improved the usability and explainability of the system. Based on both iterations, we propose suggestions for designing AR explanations for movie recommendations and present MovieAdvisor: a mobile AR movie recommendation system that explains personalized movie recommendation scores.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While most studies are devoted to improving movie recommendation scores with progressively accurate algorithms, many users still do not understand their recommendations entirely. Consequently, scholars have started to design explanations for movie recommendation systems. In this context, information visualization can offer adequate explanations to improve user experience. Additionally, augmented reality (AR) can broaden those visualizations, particularly in public spaces. This study provides an initial exploration of the design space of mobile AR explanations for movie recommendation scores. We first explored how movie streaming platform users portray mobile AR explanations. We later conducted a mixed-method prototype evaluation uncovering specific information visualization strategies to provide explanations that improved the usability and explainability of the system. Based on both iterations, we propose suggestions for designing AR explanations for movie recommendations and present MovieAdvisor: a mobile AR movie recommendation system that explains personalized movie recommendation scores.", "fno": "572500a157", "keywords": [ "Augmented Reality", "Data Visualisation", "Entertainment", "Mobile Computing", "Recommender Systems", "User Interfaces", "Adequate Explanations", "AR Explanations", "Mobile Augmented Reality", "Movie Recommendation Systems", "Movie Recommendations", "Personalized Movie Recommendation Scores", "Specific Information Visualization Strategies", "Visualization", "Prototypes", "Motion Pictures", "User Experience", "Usability", "Artificial Intelligence", "Recommender Systems", "Explainable Recommendation", "Recommender Systems", "Augmented Reality", "User Interfaces", "User Experience", "Interactive Systems" ], "authors": [ { "affiliation": "KU Leuven,Dept. of Electrical Engineering,Leuven,Belgium", "fullName": "Po-Kai Yang", "givenName": "Po-Kai", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Costa Rica,Dept. of Mass Media Communications,San José,Costa Rica", "fullName": "Oscar Luis Alvarado Rodriguez", "givenName": "Oscar Luis", "surname": "Alvarado Rodriguez", "__typename": "ArticleAuthorType" }, { "affiliation": "KU Leuven,Dept. of Computer Science,Leuven,Belgium", "fullName": "Francisco Gutiérrez", "givenName": "Francisco", "surname": "Gutiérrez", "__typename": "ArticleAuthorType" }, { "affiliation": "KU Leuven,Dept. of Computer Science,Leuven,Belgium", "fullName": "Katrien Verbert", "givenName": "Katrien", "surname": "Verbert", "__typename": "ArticleAuthorType" } ], "idPrefix": "aivr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "157-162", "year": "2022", "issn": null, "isbn": "978-1-6654-5725-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "572500a153", "articleId": "1KmFd2A2UH6", "__typename": "AdjacentArticleType" }, "next": { "fno": "572500a163", "articleId": "1KmFfXI75Ly", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2018/2659/0/265901a047", "title": "Movie Recommendations Using the Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/iri/2018/265901a047/12OmNCy2L0d", "parentPublication": { "id": "proceedings/iri/2018/2659/0", "title": "2018 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2014/6563/0/6563a280", "title": "A Hybrid Movie Recommendation Approach via Social Tags", "doi": null, "abstractUrl": "/proceedings-article/icebe/2014/6563a280/12OmNrnJ6Mg", "parentPublication": { "id": "proceedings/icebe/2014/6563/0", "title": "2014 IEEE 11th International Conference on e-Business Engineering (ICEBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiki/2015/8637/0/8637a074", "title": "User's Interests-Based Movie Recommendation in Heterogeneous Network", "doi": null, "abstractUrl": "/proceedings-article/iiki/2015/8637a074/12OmNwIHoC9", "parentPublication": { "id": "proceedings/iiki/2015/8637/0", "title": "2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752387", "title": "Movie review analysis: Emotion analysis of IMDb movie reviews", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752387/12OmNy7QftA", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2013/2240/0/06785887", "title": "Personality, movie preferences, and recommendations", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785887/12OmNyQYt8W", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2012/3027/0/06382910", "title": "Movie Recommendation System Based on Movie Swarm", "doi": null, "abstractUrl": "/proceedings-article/cgc/2012/06382910/12OmNzCWG5g", "parentPublication": { "id": "proceedings/cgc/2012/3027/0", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2014/02/mex2014020092", "title": "Implementing a Commercial-Strength Parallel Hybrid Movie Recommendation Engine", "doi": null, "abstractUrl": "/magazine/ex/2014/02/mex2014020092/13rRUyoyhKa", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2020/6042/0/09178711", "title": "Research on Movie Recommendation Model Based on LSTM and CNN", "doi": null, "abstractUrl": "/proceedings-article/iccia/2020/09178711/1mDu5LZ22Aw", "parentPublication": { "id": "proceedings/iccia/2020/6042/0", "title": "2020 5th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381349", "title": "Movie Recommendation using YouTube Movie Trailer Data as the Side Information", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381349/1semGghsJzy", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a539", "title": "Movie Big Data Intelligent Recommendation System Based on Knowledge Graph", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a539/1zxLjh3G57W", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pK4LJdu6Na", "title": "2020 IEEE World Congress on Services (SERVICES)", "acronym": "services", "groupId": "1800492", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pK4NhD8KZO", "doi": "10.1109/SERVICES48979.2020.00025", "title": "Context-Aware Restaurant Recommendation for Group of People", "normalizedTitle": "Context-Aware Restaurant Recommendation for Group of People", "abstract": "Group recommendation has been widely investigated in various fields. In contrast to other research directions on group recommendations, restaurant group recommendations are more sensitive to location. However, current research has not given adequate consideration to this characteristic, so it is difficult to achieve higher global satisfaction. In this paper, we propose a context-aware restaurant group recommendation method to improve global satisfaction. We take into account the importance of location in restaurant recommendations and employ distance pre-filtering and distance-based ranking adjustment to improve recommendation satisfaction. Comprehensive experimental results show that our method can outperform other methods in terms of both global satisfaction and distance satisfaction.", "abstracts": [ { "abstractType": "Regular", "content": "Group recommendation has been widely investigated in various fields. In contrast to other research directions on group recommendations, restaurant group recommendations are more sensitive to location. However, current research has not given adequate consideration to this characteristic, so it is difficult to achieve higher global satisfaction. In this paper, we propose a context-aware restaurant group recommendation method to improve global satisfaction. We take into account the importance of location in restaurant recommendations and employ distance pre-filtering and distance-based ranking adjustment to improve recommendation satisfaction. Comprehensive experimental results show that our method can outperform other methods in terms of both global satisfaction and distance satisfaction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Group recommendation has been widely investigated in various fields. In contrast to other research directions on group recommendations, restaurant group recommendations are more sensitive to location. However, current research has not given adequate consideration to this characteristic, so it is difficult to achieve higher global satisfaction. In this paper, we propose a context-aware restaurant group recommendation method to improve global satisfaction. We take into account the importance of location in restaurant recommendations and employ distance pre-filtering and distance-based ranking adjustment to improve recommendation satisfaction. Comprehensive experimental results show that our method can outperform other methods in terms of both global satisfaction and distance satisfaction.", "fno": "820300a051", "keywords": [ "Catering Industry", "Information Filtering", "Recommender Systems", "Ubiquitous Computing", "Distance Satisfaction", "Context Aware Restaurant Recommendation Method", "Group Recommendation", "Resturant Location", "Distance Based Ranking Adjustment", "Distance Pre Filtering Adjustment", "Global Recommendation Satisfaction", "Recommender Systems", "Measurement", "Context Modeling", "Optimization", "Estimation", "Computational Modeling", "Collaboration", "Group Recommendation", "Restaurant", "Context Aware", "Global Satisfaction", "Group Consensus Function" ], "authors": [ { "affiliation": "College of Information Engineering, North China University of Water Resource and Electric Power,Zhengzhou,China", "fullName": "Qiliang Zhu", "givenName": "Qiliang", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Information Engineering, Henan Technical Institute,Zhengzhou,China", "fullName": "Lei Wang", "givenName": "Lei", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "services", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "51-54", "year": "2020", "issn": null, "isbn": "978-1-7281-8203-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "820300a045", "articleId": "1pK4NBAaDQY", "__typename": "AdjacentArticleType" }, "next": { "fno": "820300a055", "articleId": "1pK4P5U3TLW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ficloud/2015/8103/0/8103a703", "title": "Using a Rich Context Model for People-to-People Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2015/8103a703/12OmNvjyxHV", "parentPublication": { "id": "proceedings/ficloud/2015/8103/0", "title": "2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380592", "title": "Restaurant recommender system based on psychographic and demographic factors in mobile environment", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380592/12OmNy5zsle", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiki/2014/8003/0/07064002", "title": "Enhancing Context-Aware Recommendation via a Unified Graph Model", "doi": null, "abstractUrl": "/proceedings-article/iiki/2014/07064002/12OmNyKrH9x", "parentPublication": { "id": "proceedings/iiki/2014/8003/0", "title": "2014 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2013/4973/2/4973b116", "title": "A Chinese Restaurant Recommendation System Based on Mobile Context-Aware Services", "doi": null, "abstractUrl": "/proceedings-article/mdm/2013/4973b116/12OmNyL0Tyz", "parentPublication": { "id": "proceedings/mdm/2013/4973/2", "title": "2013 IEEE 14th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ms/2015/7284/0/7284a233", "title": "A Latent Group Model for Group Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ms/2015/7284a233/12OmNzgwmRw", "parentPublication": { "id": "proceedings/ms/2015/7284/0", "title": "2015 IEEE International Conference on Mobile Services (MS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a324", "title": "Exploiting Multiple Recommenders to Improve Group Recommendation", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a324/17D45WGGoKI", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2018/9355/0/935500a194", "title": "Elective Learning Objects Group Recommendation Using Non-Cooperative Game Theory", "doi": null, "abstractUrl": "/proceedings-article/fit/2018/935500a194/17D45XdBRQg", "parentPublication": { "id": "proceedings/fit/2018/9355/0", "title": "2018 International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/07/08663390", "title": "CVTM: A Content-Venue-Aware Topic Model for Group Event Recommendation", "doi": null, "abstractUrl": "/journal/tk/2020/07/08663390/18exlkMYr4Y", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020553", "title": "FAGR: Fairness-aware Group Recommendation in Event-based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020553/1KfSh0HzmbC", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194544", "title": "Neural Restaurant-aware Dish Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194544/1n2nkT6BdwQ", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAF", "title": "2016 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNqHItvS", "doi": "10.1109/VR.2016.7504760", "title": "A simplified inverse kinematic approach for embodied VR applications", "normalizedTitle": "A simplified inverse kinematic approach for embodied VR applications", "abstract": "In this paper, we compare a full body marker set with a reduced rigid body marker set supported by inverse kinematics. We measured system latency, illusion of virtual body ownership, and task load in an applied scenario for inducing acrophobia. While not showing a significant change in body ownership or task performance, results do show that latency and task load are reduced when using the rigid body inverse kinematics solution. The approach therefore has the potential to improve virtual reality experiences.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we compare a full body marker set with a reduced rigid body marker set supported by inverse kinematics. We measured system latency, illusion of virtual body ownership, and task load in an applied scenario for inducing acrophobia. While not showing a significant change in body ownership or task performance, results do show that latency and task load are reduced when using the rigid body inverse kinematics solution. The approach therefore has the potential to improve virtual reality experiences.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we compare a full body marker set with a reduced rigid body marker set supported by inverse kinematics. We measured system latency, illusion of virtual body ownership, and task load in an applied scenario for inducing acrophobia. While not showing a significant change in body ownership or task performance, results do show that latency and task load are reduced when using the rigid body inverse kinematics solution. The approach therefore has the potential to improve virtual reality experiences.", "fno": "07504760", "keywords": [ "Kinematics", "Tracking", "Virtual Environments", "Electronic Mail", "Frequency Modulation", "Real Time Systems", "H 5 1 Information Systems Artificial Augmented And Virtual Realities" ], "authors": [ { "affiliation": "University of Würzburg, University of Cologne", "fullName": "Daniel Roth", "givenName": "Daniel", "surname": "Roth", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Würzburg", "fullName": "Jean-Luc Lugrin", "givenName": "Jean-Luc", "surname": "Lugrin", "__typename": "ArticleAuthorType" }, { "affiliation": "TH Köln", "fullName": "Julia Büser", "givenName": "Julia", "surname": "Büser", "__typename": "ArticleAuthorType" }, { "affiliation": "Michigan State University, University of Cologne", "fullName": "Gary Bente", "givenName": "Gary", "surname": "Bente", "__typename": "ArticleAuthorType" }, { "affiliation": "TH Köln", "fullName": "Arnulph Fuhrmann", "givenName": "Arnulph", "surname": "Fuhrmann", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Würzburg", "fullName": "Marc Erich Latoschik", "givenName": "Marc Erich", "surname": "Latoschik", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-03-01T00:00:00", "pubType": "proceedings", "pages": "275-276", "year": "2016", "issn": "2375-5334", "isbn": "978-1-5090-0836-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07504759", "articleId": "12OmNvD8Rz3", "__typename": "AdjacentArticleType" }, "next": { "fno": "07504761", "articleId": "12OmNzdoMvk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ism/2009/3890/0/3890a446", "title": "Introducing ", "doi": null, "abstractUrl": "/proceedings-article/ism/2009/3890a446/12OmNC3o509", "parentPublication": { "id": "proceedings/ism/2009/3890/0", "title": "2009 11th IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822505", "title": "Symmetrical rigid body parameterization for biomolecular structures", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822505/12OmNCxbXD1", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2010/7029/0/05543606", "title": "Automated pose estimation in 3D point clouds applying annealing particle filters and inverse kinematics on a GPU", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2010/05543606/12OmNqBbHFf", "parentPublication": { "id": "proceedings/cvprw/2010/7029/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/03/04909119", "title": "Full-Body Avatar Control with Environment Awareness", "doi": null, "abstractUrl": "/magazine/cg/2009/03/04909119/13rRUx0ge8p", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699215", "title": "VIRTOOAIR: Virtual Reality TOOlbox for Avatar Intelligent Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699215/19F1Ug56qB2", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2021/3734/0/373400a123", "title": "Inverse kinematics for full-body self representation in VR-based cognitive rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/ism/2021/373400a123/1A3j8qqoU8g", "parentPublication": { "id": "proceedings/ism/2021/3734/0", "title": "2021 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a666", "title": "Investigating User Embodiment of Inverse-Kinematic Avatars in Smartphone Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a666/1JrR5i5jDhe", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a061", "title": "Kinematic Motion Analysis with Volumetric Motion Capture", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a061/1KaH0mB5jwc", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09444887", "title": "UNOC: Understanding Occlusion for Embodied Presence in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09444887/1u51yNn52s8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2021/1413/0/141300a064", "title": "Mobile Manipulation in Unknown Environments with Differential Inverse Kinematics Control", "doi": null, "abstractUrl": "/proceedings-article/crv/2021/141300a064/1uZxlz1oeS4", "parentPublication": { "id": "proceedings/crv/2021/1413/0", "title": "2021 18th Conference on Robots and Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC8dgad", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities (ISMAR-AMH)", "acronym": "ismar-amh", "groupId": "1002953", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwkR5xb", "doi": "10.1109/ISMAR-AMH.2012.6484003", "title": "Design requirements for using embodied learning and whole-body metaphors in a mixed reality simulation game", "normalizedTitle": "Design requirements for using embodied learning and whole-body metaphors in a mixed reality simulation game", "abstract": "This paper describes the development of a mixed reality (MR) environment that can be used in teaching STEM (Science, Technology, Engineering, and Mathematics) topics. Specifically we seek to create a space for facilitating whole-body metaphors, where learners use the physical movement and positioning of their entire bodies to enact their understanding of complex concepts. A technical approach is presented that fulfills the requirements of this type of embodied learning environment. Multi-projector blending is used to create a large, seamless, and shadow-minimizing projection on the floor that affords a human-scale interaction environment. A hybrid sensor solution using a Kinect and a laser scanner is developed that tracks users' physical movements. Requiring no pre-training or props, this tracking setup is adaptable and shows high performance over a wide range of users, from children to adults. To illustrate the application of the MR system to a real-world learning scenario, an example implementation that was designed to teach physics concepts to middle school kids is described.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the development of a mixed reality (MR) environment that can be used in teaching STEM (Science, Technology, Engineering, and Mathematics) topics. Specifically we seek to create a space for facilitating whole-body metaphors, where learners use the physical movement and positioning of their entire bodies to enact their understanding of complex concepts. A technical approach is presented that fulfills the requirements of this type of embodied learning environment. Multi-projector blending is used to create a large, seamless, and shadow-minimizing projection on the floor that affords a human-scale interaction environment. A hybrid sensor solution using a Kinect and a laser scanner is developed that tracks users' physical movements. Requiring no pre-training or props, this tracking setup is adaptable and shows high performance over a wide range of users, from children to adults. To illustrate the application of the MR system to a real-world learning scenario, an example implementation that was designed to teach physics concepts to middle school kids is described.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the development of a mixed reality (MR) environment that can be used in teaching STEM (Science, Technology, Engineering, and Mathematics) topics. Specifically we seek to create a space for facilitating whole-body metaphors, where learners use the physical movement and positioning of their entire bodies to enact their understanding of complex concepts. A technical approach is presented that fulfills the requirements of this type of embodied learning environment. Multi-projector blending is used to create a large, seamless, and shadow-minimizing projection on the floor that affords a human-scale interaction environment. A hybrid sensor solution using a Kinect and a laser scanner is developed that tracks users' physical movements. Requiring no pre-training or props, this tracking setup is adaptable and shows high performance over a wide range of users, from children to adults. To illustrate the application of the MR system to a real-world learning scenario, an example implementation that was designed to teach physics concepts to middle school kids is described.", "fno": "06484003", "keywords": [ "Virtual Reality", "Educational Institutions", "Games", "Tracking", "Laser Applications", "Computers" ], "authors": [ { "affiliation": "University of Central Florida, Synthetic Reality Lab, USA", "fullName": "Remo Pillat", "givenName": "Remo", "surname": "Pillat", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida, Institute of Simulation and Training, USA", "fullName": "Arjun Nagendran", "givenName": "Arjun", "surname": "Nagendran", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida, Media & Learning Lab, USA", "fullName": "Robb Lindgren", "givenName": "Robb", "surname": "Lindgren", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-amh", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "105-106", "year": "2012", "issn": null, "isbn": "978-1-4673-4663-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06483981", "articleId": "12OmNvStcG4", "__typename": "AdjacentArticleType" }, "next": { "fno": "06483966", "articleId": "12OmNx8wTpj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2018/6049/0/604901a367", "title": "Mixed Reality in Education: Recent Developments and Future Trends", "doi": null, "abstractUrl": "/proceedings-article/icalt/2018/604901a367/12OmNwcl7GC", "parentPublication": { "id": "proceedings/icalt/2018/6049/0", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isar/2001/1375/0/13750169", "title": "MR2 (MR Square): A Mixed-Reality Meeting Room", "doi": null, "abstractUrl": "/proceedings-article/isar/2001/13750169/12OmNzyYibC", "parentPublication": { "id": "proceedings/isar/2001/1375/0", "title": "Proceedings IEEE and ACM International Symposium on Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a566", "title": "A cup of coffee in Mixed Reality: analysis of movements' smoothness from real to virtual", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a566/1J7Waw7xSy4", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a657", "title": "Mixed Reality for Engineering Design Review Using Finite Element Analysis", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a657/1J7WwCL6CCQ", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797684", "title": "Body-Prop Interaction: Evaluation of Augmented Open Discs and Egocentric Body-Based Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797684/1cJ0PpHt2HC", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a353", "title": "Perceptual MR Space: Interactive Toolkit for Efficient Environment Reconstruction in Mobile Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a353/1gysi7jaaKQ", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/12/09199575", "title": "Eyes-free Target Acquisition During Walking in Immersive Mixed Reality", "doi": null, "abstractUrl": "/journal/tg/2020/12/09199575/1ncgpmtzdn2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09274022", "title": "Development of an Educational Mixed Reality Game on Water Desalination Plants", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09274022/1phRsBe1Cb6", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2021/4106/0/410600a409", "title": "Investigating the Factors that Influence Technology Acceptance of an Educational Game Integrating Mixed Reality and Concept Maps", "doi": null, "abstractUrl": "/proceedings-article/icalt/2021/410600a409/1vK01lKpsAw", "parentPublication": { "id": "proceedings/icalt/2021/4106/0", "title": "2021 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a274", "title": "A Mixed-Reality System to Promote Child Engagement in Remote Intergenerational Storytelling", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a274/1yeQMxSyLp6", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz2TCu6", "title": "Computer Graphics International Conference", "acronym": "cgi", "groupId": "1000132", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNwwd2S9", "doi": "10.1109/CGI.2003.1214480", "title": "An inverse kinematics method for 3D figures with motion data", "normalizedTitle": "An inverse kinematics method for 3D figures with motion data", "abstract": "This paper presents a new inverse kinematics method that utilizes the motion data for realtime control and editing. The key idea is to extract parameters necessary for inverse kinematics from the motion data. These parameters are the weight matrix, which determines the motion of the redundant joints, and the transformation functions that define the motion of the end effectors. User can control the motion by dragging a body segment using a mouse, and the method calculates the new motion using the pre-computed parameters. The method enables interactive editing, warping, and retargeting character motions.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a new inverse kinematics method that utilizes the motion data for realtime control and editing. The key idea is to extract parameters necessary for inverse kinematics from the motion data. These parameters are the weight matrix, which determines the motion of the redundant joints, and the transformation functions that define the motion of the end effectors. User can control the motion by dragging a body segment using a mouse, and the method calculates the new motion using the pre-computed parameters. The method enables interactive editing, warping, and retargeting character motions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a new inverse kinematics method that utilizes the motion data for realtime control and editing. The key idea is to extract parameters necessary for inverse kinematics from the motion data. These parameters are the weight matrix, which determines the motion of the redundant joints, and the transformation functions that define the motion of the end effectors. User can control the motion by dragging a body segment using a mouse, and the method calculates the new motion using the pre-computed parameters. The method enables interactive editing, warping, and retargeting character motions.", "fno": "19460266", "keywords": [ "Inverse Kinematics", "Motion Capture", "Human Animation" ], "authors": [ { "affiliation": "City Univercity of Hong Kong", "fullName": "Taku Komura", "givenName": "Taku", "surname": "Komura", "__typename": "ArticleAuthorType" }, { "affiliation": "GSport Inc", "fullName": "Atsushi Kuroda", "givenName": "Atsushi", "surname": "Kuroda", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tokyo", "fullName": "Shunsuke Kudoh", "givenName": "Shunsuke", "surname": "Kudoh", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science & Technology", "fullName": "Tai Chiew Lan", "givenName": "Tai Chiew", "surname": "Lan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Urbanna Champaign", "fullName": "Yoshihisa Shinagawa", "givenName": "Yoshihisa", "surname": "Shinagawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-07-01T00:00:00", "pubType": "proceedings", "pages": "266", "year": "2003", "issn": "1530-1052", "isbn": "0-7695-1946-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "19460262", "articleId": "12OmNqAU6zX", "__typename": "AdjacentArticleType" }, "next": { "fno": "19460272", "articleId": "12OmNqOwQIB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icii/2001/7010/4/00983851", "title": "An inverse kinematics solution for manipulators based on fuzzy logic", "doi": null, "abstractUrl": "/proceedings-article/icii/2001/00983851/12OmNBSSV9B", "parentPublication": { "id": "icii/2001/7010/4", "title": "2001 International Conferences on Info-tech and Info-net. Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbrn/2000/0856/0/08560150", "title": "Fuzzy Systems to Solve Inverse Kinematics Problem in Robots Control: Application to an Hexapod Robots' Leg", "doi": null, "abstractUrl": "/proceedings-article/sbrn/2000/08560150/12OmNvSbBNb", "parentPublication": { "id": "proceedings/sbrn/2000/0856/0", "title": "Neural Networks, Brazilian Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2014/4261/0/4261a020", "title": "Animation of Articulated Figures Controlled by Inverse Kinematics with Style", "doi": null, "abstractUrl": "/proceedings-article/svr/2014/4261a020/12OmNwGIcy1", "parentPublication": { "id": "proceedings/svr/2014/4261/0", "title": "2014 XVI Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2012/4687/0/4687a741", "title": "An Avatar Motion Generation Method Based on Inverse Kinematics and Interactive Evolutionary Computation", "doi": null, "abstractUrl": "/proceedings-article/cisis/2012/4687a741/12OmNwO5LZL", "parentPublication": { "id": "proceedings/cisis/2012/4687/0", "title": "2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/6/3304f662", "title": "Inverse Kinematics Solution of Manipulator Based on Information Entropy and Artificial Immune Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304f662/12OmNwoxScv", "parentPublication": { "id": "proceedings/icnc/2008/3304/6", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/humo/2000/0939/0/09390149", "title": "Real-time human motion analysis and IK-based human figure control", "doi": null, "abstractUrl": "/proceedings-article/humo/2000/09390149/12OmNxRF6Yo", "parentPublication": { "id": "proceedings/humo/2000/0939/0", "title": "Human Motion, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/4/3304d390", "title": "Inverse Kinematics of Compliant Manipulator Based on the Immune Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304d390/12OmNxeutbn", "parentPublication": { "id": "proceedings/icnc/2008/3304/4", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c053", "title": "A New Method for Solving Inverse Kinematics of an Industrial Robot", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c053/12OmNzJbQSg", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/03/v0352", "title": "Natural Motion Animation through Constraining and Deconstraining at Will", "doi": null, "abstractUrl": "/journal/tg/2003/03/v0352/13rRUxASuhp", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2022/6495/0/649500a639", "title": "Modeling and Inverse Kinematics of Kuka Manipulator", "doi": null, "abstractUrl": "/proceedings-article/sitis/2022/649500a639/1MeoGY1hhSw", "parentPublication": { "id": "proceedings/sitis/2022/6495/0", "title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy2agR7", "title": "2010 43rd Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNx6g6qg", "doi": "10.1109/HICSS.2010.179", "title": "Embodied Social Presence Theory", "normalizedTitle": "Embodied Social Presence Theory", "abstract": "We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We propose Embodied Social Presence (ESP) Theory, a theoretical framework that focuses on the embodied virtual representation (i.e., the avatar) as the nexus of activity in social interaction within virtual worlds. We review the literature on place and space, presence and embodiment and draw on theories of embodiment, feminism, and Activity Theory to frame our model. We propose that a social actor in a virtual environment derives meaning during interactions with his or her environment through actions, context, and tools and that the virtual body is a tool for mediating communication.", "abstracts": [ { "abstractType": "Regular", "content": "We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We propose Embodied Social Presence (ESP) Theory, a theoretical framework that focuses on the embodied virtual representation (i.e., the avatar) as the nexus of activity in social interaction within virtual worlds. We review the literature on place and space, presence and embodiment and draw on theories of embodiment, feminism, and Activity Theory to frame our model. We propose that a social actor in a virtual environment derives meaning during interactions with his or her environment through actions, context, and tools and that the virtual body is a tool for mediating communication.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We propose Embodied Social Presence (ESP) Theory, a theoretical framework that focuses on the embodied virtual representation (i.e., the avatar) as the nexus of activity in social interaction within virtual worlds. We review the literature on place and space, presence and embodiment and draw on theories of embodiment, feminism, and Activity Theory to frame our model. We propose that a social actor in a virtual environment derives meaning during interactions with his or her environment through actions, context, and tools and that the virtual body is a tool for mediating communication.", "fno": "07-07-01", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Brian E. Mennecke", "givenName": "Brian E.", "surname": "Mennecke", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Janea L. Triplett", "givenName": "Janea L.", "surname": "Triplett", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lesya M. Hassall", "givenName": "Lesya M.", "surname": "Hassall", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zayira Jordan Conde", "givenName": "Zayira Jordan", "surname": "Conde", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2010", "issn": null, "isbn": "978-0-7695-3869-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07-06-07", "articleId": "12OmNvjyxya", "__typename": "AdjacentArticleType" }, "next": { "fno": "07-07-02", "articleId": "12OmNwcl7Fn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcss/2011/4421/0/4421a110", "title": "The Influence of Social Presence on Continual Participation in Online Communities: The Relational View Based on Social Identity Theory", "doi": null, "abstractUrl": "/proceedings-article/ijcss/2011/4421a110/12OmNBSSVdg", "parentPublication": { "id": "proceedings/ijcss/2011/4421/0", "title": "Service Sciences, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2014/2871/0/06802076", "title": "Social presence in mixed agency interactions", "doi": null, "abstractUrl": "/proceedings-article/vr/2014/06802076/12OmNvrdI6z", "parentPublication": { "id": "proceedings/vr/2014/2871/0", "title": "2014 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406356", "title": "Social and Emotional Turn Taking for Embodied Conversational Agents", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406356/12OmNx5pj2h", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2003/1922/0/19220128", "title": "Disappearing Computers, Social Actors and Embodied Agents", "doi": null, "abstractUrl": "/proceedings-article/cw/2003/19220128/12OmNxWcHjq", "parentPublication": { "id": "proceedings/cw/2003/1922/0", "title": "Proceedings. 2003 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2012/1247/0/06180871", "title": "Increasing agent physicality to raise social presence and elicit realistic behavior", "doi": null, "abstractUrl": "/proceedings-article/vr/2012/06180871/12OmNy1SFIE", "parentPublication": { "id": "proceedings/vr/2012/1247/0", "title": "Virtual Reality Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223399", "title": "Social presence with virtual glass", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223399/12OmNzaQoq2", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08643417", "title": "Not Alone Here?! Scalability and User Experience of Embodied Ambient Crowds in Distributed Social Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2019/05/08643417/18K0qdWS7xm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049676", "title": "The Impact of Avatar and Environment Congruence on Plausibility, Embodiment, Presence, and the Proteus Effect in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049676/1KYosbnM8q4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089596", "title": "Reducing Task Load with an Embodied Intelligent Virtual Assistant for Improved Performance in Collaborative Decision Making", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089596/1jIx7ELvYVa", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09444887", "title": "UNOC: Understanding Occlusion for Embodied Presence in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09444887/1u51yNn52s8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAndiiX", "title": "2015 IEEE 1st Workshop on Everyday Virtual Reality (WEVR)", "acronym": "wevr", "groupId": "1807824", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzGDsMi", "doi": "10.1109/WEVR.2015.7151686", "title": "Portable virtual reality: Inertial measurements and biomechanics", "normalizedTitle": "Portable virtual reality: Inertial measurements and biomechanics", "abstract": "This paper presents a portable virtual reality (VR) system that affords full-body tracking by using inertial measurement units (IMUs) and several aspects of human biomechanics. The current implementation uses a commercial IMU-based full-body tracking system that only reports the orientations of body segments. We have developed an anthropometry-based method that uses this orientation data to derive accurate body-segment positions. In turn, we use kinematics and heel-based translations to provide a theoretically infinite tracking space. A head-mounted display (HMD) is used to provide visual feedback of the user’s full-body avatar and to convey physical locomotion through the virtual environment. We discuss key challenges to making this system usable in everyday environments, including calibration, ergonomics, drift, and collision avoidance.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a portable virtual reality (VR) system that affords full-body tracking by using inertial measurement units (IMUs) and several aspects of human biomechanics. The current implementation uses a commercial IMU-based full-body tracking system that only reports the orientations of body segments. We have developed an anthropometry-based method that uses this orientation data to derive accurate body-segment positions. In turn, we use kinematics and heel-based translations to provide a theoretically infinite tracking space. A head-mounted display (HMD) is used to provide visual feedback of the user’s full-body avatar and to convey physical locomotion through the virtual environment. We discuss key challenges to making this system usable in everyday environments, including calibration, ergonomics, drift, and collision avoidance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a portable virtual reality (VR) system that affords full-body tracking by using inertial measurement units (IMUs) and several aspects of human biomechanics. The current implementation uses a commercial IMU-based full-body tracking system that only reports the orientations of body segments. We have developed an anthropometry-based method that uses this orientation data to derive accurate body-segment positions. In turn, we use kinematics and heel-based translations to provide a theoretically infinite tracking space. A head-mounted display (HMD) is used to provide visual feedback of the user’s full-body avatar and to convey physical locomotion through the virtual environment. We discuss key challenges to making this system usable in everyday environments, including calibration, ergonomics, drift, and collision avoidance.", "fno": "07151686", "keywords": [ "Tracking", "Skeleton", "Virtual Reality", "Biomechanics", "Calibration", "Sensor Systems", "Body Tracking", "Portable Virtual Reality", "Biomechanics" ], "authors": [ { "affiliation": "University of Texas at Dallas", "fullName": "James Coleman Eubanks", "givenName": "James Coleman", "surname": "Eubanks", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas at Dallas", "fullName": "Chengyuan Lai", "givenName": "Chengyuan", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas at Dallas", "fullName": "Ryan P. Mcmahan", "givenName": "Ryan P.", "surname": "Mcmahan", "__typename": "ArticleAuthorType" } ], "idPrefix": "wevr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2015", "issn": null, "isbn": "978-1-4799-1725-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07151685", "articleId": "12OmNA0dMSs", "__typename": "AdjacentArticleType" }, "next": { "fno": "07151687", "articleId": "12OmNs0C9Ln", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bsn/2010/4065/0/4065a207", "title": "EcoIMU: A Dual Triaxial-Accelerometer Inertial Measurement Unit for Wearable Applications", "doi": null, "abstractUrl": "/proceedings-article/bsn/2010/4065a207/12OmNrAdsCX", "parentPublication": { "id": "proceedings/bsn/2010/4065/0", "title": "Wearable and Implantable Body Sensor Networks, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460034", "title": "Full-body tracking using a sensor array system and laser-based sweeps", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460034/12OmNvlg8qq", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2017/2610/0/261001a449", "title": "Real-Time Full-Body Motion Capture from Video and IMUs", "doi": null, "abstractUrl": "/proceedings-article/3dv/2017/261001a449/12OmNyKa6fl", "parentPublication": { "id": "proceedings/3dv/2017/2610/0", "title": "2017 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/searis/2016/4275/0/07551585", "title": "A full-body motion calibration and retargeting for intuitive object manipulation in immersive virtual environments", "doi": null, "abstractUrl": "/proceedings-article/searis/2016/07551585/12OmNyRxFCX", "parentPublication": { "id": "proceedings/searis/2016/4275/0", "title": "2016 IEEE 9th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699215", "title": "VIRTOOAIR: Virtual Reality TOOlbox for Avatar Intelligent Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699215/19F1Ug56qB2", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a666", "title": "Investigating User Embodiment of Inverse-Kinematic Avatars in Smartphone Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a666/1JrR5i5jDhe", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a384", "title": "Utilizing Multiple Calibrated IMUs for Enhanced Mixed Reality Tracking", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a384/1gysog0WnXG", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a588", "title": "Kinematic Tracking of Rehabilitation Patients With Markerless Pose Estimation Fused with Wearable Inertial Sensors", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a588/1kecIJHALKM", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/searis/2018/6272/0/09180232", "title": "Composite Body-Tracking: Device Abstraction Layer with Data Fusion For Virtual Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/searis/2018/09180232/1mK7jaAIrvO", "parentPublication": { "id": "proceedings/searis/2018/6272/0", "title": "2018 IEEE 11th Workshop on Software Engineering and Architectures for Real-time Interactive Systems (SEARIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09440766", "title": "Did I Hit the Door? Effects of Self-Avatars and Calibration in a Person-Plus-Virtual-Object System on Perceived Frontal Passability in VR", "doi": null, "abstractUrl": "/journal/tg/2022/12/09440766/1tTpcuKN5jW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FJ5az6QCgE", "title": "2022 5th International Conference on Information and Computer Technologies (ICICT)", "acronym": "icict", "groupId": "1825584", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1FJ5bdmciJO", "doi": "10.1109/ICICT55905.2022.00034", "title": "Mixed reality (MR) Enabled Proprio and Teleoperation of a Humanoid Robot for Paraplegic Patients", "normalizedTitle": "Mixed reality (MR) Enabled Proprio and Teleoperation of a Humanoid Robot for Paraplegic Patients", "abstract": "Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.", "abstracts": [ { "abstractType": "Regular", "content": "Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Paraplegia is a disability caused by impairment in motor or sensory functions of the lower limbs. Most paraplegic subjects use mechanical or motorised wheelchairs for their movement, however, this may limit the capability of patients to independently perform common activities of daily living (ADL). In this paper, a novel mixed reality (MR) enabled proprio and teleoperation framework for a humanoid robot is presented. The framework can be operated by a paraplegic person by using inputs from an MR headset. The framework enables varied and unscripted manipulation tasks in a realistic environment, combining navigation, perception, manipulation, and grasping. The impaired operator can make use of a wide range of interaction methods and tools, from direct teleoperation of the robot's full-body kinematics to performing grasping tasks or controlling the robot's mobile base. The adopted humanoid robot is the EVEr3 Humanoid Research Robot from Halodi Robotics, while the Oculus Rift S is chosen as MR headset. To demonstrate the potential of the proposed framework, a human subject study is presented. In this study, a home/workplace environment is rendered with MR by combining physical shelves and everyday objects, such as goods to be grasped, with simulated elements, such as the robot avatar and the control interface. A paraplegic subject is involved in the study. Results suggest that the proposed MR-enabled system improves the patient engagement and illusion of presence.", "fno": "696000a153", "keywords": [ "Augmented Reality", "Avatars", "Control Engineering Computing", "Handicapped Aids", "Haptic Interfaces", "Humanoid Robots", "Human Robot Interaction", "Mobile Robots", "Motion Control", "Neuromuscular Stimulation", "Rendering Computer Graphics", "Robot Kinematics", "Robot Vision", "Telerobotics", "Wheelchairs", "Paraplegic Patients", "MR Headset", "Unscripted Manipulation Tasks", "Direct Teleoperation", "Grasping Tasks", "EV Er 3 Humanoid Research Robot", "Halodi Robotics", "Robot Avatar", "Mixed Reality Enabled Proprio", "Paraplegia", "Motor Function", "Sensory Function", "Mechanical Wheelchair", "Motorised Wheelchair", "Activities Of Daily Living", "ADL", "Robot Full Body Kinematics", "Oculus Rift S", "Home Workplace Environment Rendering", "Headphones", "Navigation", "Wheelchairs", "Humanoid Robots", "Mixed Reality", "Grasping", "Kinematics", "Augmented Reality", "Humanoid Robot", "Para Plegia" ], "authors": [ { "affiliation": "University of Agder (UiA),Dept. of Engineering Sciences,Grimstad,Norway,4879", "fullName": "Filippo Sanfilippo", "givenName": "Filippo", "surname": "Sanfilippo", "__typename": "ArticleAuthorType" }, { "affiliation": "Halodi Robotics AS,Moss,Norway,1599", "fullName": "Jesper Smith", "givenName": "Jesper", "surname": "Smith", "__typename": "ArticleAuthorType" }, { "affiliation": "Florida Inst. for Human and Machine Cognition (IHMC),Pensacola,FL,USA,32502", "fullName": "Sylvain Bertrand", "givenName": "Sylvain", "surname": "Bertrand", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Agder (UiA),Dept. of Inf. and Comm. Tech.,Grimstad,Norway,4879", "fullName": "Tor Halvard Skarberg Svendsen", "givenName": "Tor Halvard", "surname": "Skarberg Svendsen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icict", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "153-158", "year": "2022", "issn": null, "isbn": "978-1-6654-6960-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "696000a148", "articleId": "1FJ5h7ubHNe", "__typename": "AdjacentArticleType" }, "next": { "fno": "696000a159", "articleId": "1FJ5eU5tXb2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2008/3357/1/3357a732", "title": "Study on Simulation for Humanoid Robot", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357a732/12OmNBE7MoS", "parentPublication": { "id": "proceedings/icicta/2008/3357/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itag/2016/3738/0/3738a007", "title": "A Comparison of Humanoid and Non-humanoid Robots in Supporting the Learning of Pupils with Severe Intellectual Disabilities", "doi": null, "abstractUrl": "/proceedings-article/itag/2016/3738a007/12OmNBK5m8w", "parentPublication": { "id": "proceedings/itag/2016/3738/0", "title": "2016 International Conference on Interactive Technologies and Games (iTAG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2008/3381/0/3381a561", "title": "Virtual-RE: A Humanoid Robotic Soccer Simulator", "doi": null, "abstractUrl": "/proceedings-article/cw/2008/3381a561/12OmNBtl1Hn", "parentPublication": { "id": "proceedings/cw/2008/3381/0", "title": "2008 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgec/2011/4449/0/4449a021", "title": "A Humanoid Robot as a Teaching Assistant for Primary Education", "doi": null, "abstractUrl": "/proceedings-article/icgec/2011/4449a021/12OmNC943My", "parentPublication": { "id": "proceedings/icgec/2011/4449/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344592", "title": "Affective handshake with a humanoid robot: How do participants perceive and combine its facial and haptic expressions?", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344592/12OmNCdTeNJ", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031c490", "title": "Underactuated Posture Control of Humanoid Robot", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031c490/12OmNviZlkt", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2010/8333/2/05743532", "title": "Voice Based Control for Humanoid Teleoperation", "doi": null, "abstractUrl": "/proceedings-article/isdea/2010/05743532/12OmNwlqhLl", "parentPublication": { "id": "proceedings/isdea/2010/8333/2", "title": "2010 International Conference on Intelligent System Design and Engineering Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2009/3859/1/3859a692", "title": "Real-Time Path Planning for Humanoid Robot", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859a692/12OmNz5s0SE", "parentPublication": { "id": "proceedings/iita/2009/3859/1", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icia/2006/0528/0/04097744", "title": "A Simulation and Monitoring System for the Humanoid Robot BHR-02 Teleoperation", "doi": null, "abstractUrl": "/proceedings-article/icia/2006/04097744/12OmNzvhvMH", "parentPublication": { "id": "proceedings/icia/2006/0528/0", "title": "2006 International Conference on Information Acquisition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2018/9574/0/957400a088", "title": "Teleoperation and Control of a Humanoid Robot NAO through Body Gestures", "doi": null, "abstractUrl": "/proceedings-article/micai/2018/957400a088/1iC7aFEY7Xq", "parentPublication": { "id": "proceedings/micai/2018/9574/0", "title": "2018 Seventeenth Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0TJmlU9q", "doi": "10.1109/VR.2019.8797884", "title": "Distributed, Collaborative Virtual Reality Application for Product Development with Simple Avatar Calibration Method", "normalizedTitle": "Distributed, Collaborative Virtual Reality Application for Product Development with Simple Avatar Calibration Method", "abstract": "In this work we present a collaborative virtual reality application for distributed engineering tasks, including a simple avatar calibration method. Use cases for the application include CAD review, ergonomics analyses or virtual training. Full-body avatars with approximately natural motion characteristics are used to improve collaboration in terms of co-presence and embodiment. Through a calibration process, scaled avatars based on body measurements can be generated by users from within the VR application. For motion tracking, only the tracking capabilities of the VR devices used (head mounted display and hand controllers) are required, in order to achieve a low initialization effort for usage of the application. We demonstrate a simple, yet effective method for measuring the human body which requires these VR devices only. Tracking only the user's head and hands, we require inverse kinematics (IK) for avatar motion reconstruction. On the other hand, this requires a calibrated avatar, otherwise body postures and gestures will be misrepresented. In the first step of the demo, two users can create their calibrated avatar at the same time and then carry out a collaborative CAD review in the second step.", "abstracts": [ { "abstractType": "Regular", "content": "In this work we present a collaborative virtual reality application for distributed engineering tasks, including a simple avatar calibration method. Use cases for the application include CAD review, ergonomics analyses or virtual training. Full-body avatars with approximately natural motion characteristics are used to improve collaboration in terms of co-presence and embodiment. Through a calibration process, scaled avatars based on body measurements can be generated by users from within the VR application. For motion tracking, only the tracking capabilities of the VR devices used (head mounted display and hand controllers) are required, in order to achieve a low initialization effort for usage of the application. We demonstrate a simple, yet effective method for measuring the human body which requires these VR devices only. Tracking only the user's head and hands, we require inverse kinematics (IK) for avatar motion reconstruction. On the other hand, this requires a calibrated avatar, otherwise body postures and gestures will be misrepresented. In the first step of the demo, two users can create their calibrated avatar at the same time and then carry out a collaborative CAD review in the second step.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work we present a collaborative virtual reality application for distributed engineering tasks, including a simple avatar calibration method. Use cases for the application include CAD review, ergonomics analyses or virtual training. Full-body avatars with approximately natural motion characteristics are used to improve collaboration in terms of co-presence and embodiment. Through a calibration process, scaled avatars based on body measurements can be generated by users from within the VR application. For motion tracking, only the tracking capabilities of the VR devices used (head mounted display and hand controllers) are required, in order to achieve a low initialization effort for usage of the application. We demonstrate a simple, yet effective method for measuring the human body which requires these VR devices only. Tracking only the user's head and hands, we require inverse kinematics (IK) for avatar motion reconstruction. On the other hand, this requires a calibrated avatar, otherwise body postures and gestures will be misrepresented. In the first step of the demo, two users can create their calibrated avatar at the same time and then carry out a collaborative CAD review in the second step.", "fno": "08797884", "keywords": [ "Avatars", "CAD", "Calibration", "Groupware", "Production Engineering Computing", "Virtual Reality", "Distributed Engineering Tasks", "Virtual Training", "Motion Tracking", "VR Devices", "Avatar Motion Reconstruction", "Collaborative CAD Review", "Collaborative Virtual Reality Application", "Product Development", "Avatar Calibration Method", "Avatars", "Collaboration", "Tracking", "Kinematics", "Three Dimensional Displays", "Human Centered Computing", "Human Computer Interaction", "Interaction Paradigms", "Virtual Reality" ], "authors": [ { "affiliation": "Graduate School of Excellence advanced Manufacturing Engineering, University of Stuttgart, Germany", "fullName": "Manuel Dixken", "givenName": "Manuel", "surname": "Dixken", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer Institute for Industrial Engineering IAO, Stuttgart, Germany", "fullName": "Daniel Diers", "givenName": "Daniel", "surname": "Diers", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer Institute for Industrial Engineering IAO, Stuttgart, Germany", "fullName": "Benjamin Wingert", "givenName": "Benjamin", "surname": "Wingert", "__typename": "ArticleAuthorType" }, { "affiliation": "Max Planck Institute for Biological Cybernetics, Tuebingen, Germany", "fullName": "Adamantini Hatzipanayioti", "givenName": "Adamantini", "surname": "Hatzipanayioti", "__typename": "ArticleAuthorType" }, { "affiliation": "Amazon Research, Tuebingen, Germany", "fullName": "Betty J Mohler", "givenName": "Betty J", "surname": "Mohler", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer Institute for Industrial Engineering IAO, Stuttgart, Germany", "fullName": "Oliver Riedel", "givenName": "Oliver", "surname": "Riedel", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer Institute for Industrial Engineering IAO, Stuttgart, Germany", "fullName": "Matthias Bues", "givenName": "Matthias", "surname": "Bues", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1299-1300", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08797796", "articleId": "1cJ1cj63M3u", "__typename": "AdjacentArticleType" }, "next": { "fno": "08797985", "articleId": "1cJ173PsiTS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504735", "title": "FaceBo: Real-time face and body tracking for faithful avatar synthesis", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504735/12OmNBRbkpf", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892275", "title": "Socially immersive avatar-based communication", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892275/12OmNwEJ0VR", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699215", "title": "VIRTOOAIR: Virtual Reality TOOlbox for Avatar Intelligent Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699215/19F1Ug56qB2", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a057", "title": "Visual Fidelity Effects on Expressive Self-avatar in Virtual Reality: First Impressions Matter", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a057/1CJc41zMnFC", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a350", "title": "Exploring Presence, Avatar Embodiment, and Body Perception with a Holographic Augmented Reality Mirror", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a350/1CJcn3q3J5K", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a666", "title": "Investigating User Embodiment of Inverse-Kinematic Avatars in Smartphone Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a666/1JrR5i5jDhe", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797719", "title": "The Effect of Avatar Appearance on Social Presence in an Augmented Reality Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797719/1cJ1dVsXQDS", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090630", "title": "Embodied Realistic Avatar System with Body Motions and Facial Expressions for Communication in Virtual Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090630/1jIxtbZL30Y", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090683", "title": "The Effects of Avatar Visibility on Behavioral Response with or without Mirror-Visual Feedback in Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090683/1jIxzZ4gw4E", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a050", "title": "The Effects of Virtual Avatar Visibility on Pointing Interpretation by Observers in 3D Environments", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a050/1yeDa4aaGY0", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1z0yukWaGoU", "title": "2021 International Conference on Big Data Engineering and Education (BDEE)", "acronym": "bdee", "groupId": "1844244", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1z0yuCGnUyY", "doi": "10.1109/BDEE52938.2021.00029", "title": "Construction and Implementation of Embodied Mixed-Reality Learning Environments", "normalizedTitle": "Construction and Implementation of Embodied Mixed-Reality Learning Environments", "abstract": "As the research paradigm of cognitive science changes from disembodied to embodied, people realize that the body and its interaction with the environment have an important effect on learning activities more and more intensely. Focus on obtaining physical experience, embodied learning encourages the participation of the body’s sensor-motor system and the multimodal interaction between the body and the environment, and it puts forward some new requirements for the design and construction of learning environments. At the same time, the development of artificial intelligence, mixed reality, human-computer interaction and other technologies in recent years has provided a good support for the construction and application of embodied learning environments, especially the functions of virtual-real fusion, natural interaction and dynamic generation of the mixed reality. For this reason, we proposed to design embedded mixed -reality learning environments (EMRLE) for supporting and promoting embodied activities by using these technologies and the embodied cognitive theory. Through combing the origin and background of EMRLE, on the one hand, we can analyze the construction goals, basic characteristics, construction models and realization methods of EMRLE from two dimensions of theory and technology; on the other hand, combined with the existing relevant research and application status in the world, the main forms of EMRLE in education and teaching practice and its teaching activity design cases can be summarized to further demonstrate and analyze the necessity, rationality and technical feasibility of EMRLE construction. For this reason, embodied learning activities designed on the basis of building EMRLE also provide new ideas for promoting the innovation of teaching and learning forms.", "abstracts": [ { "abstractType": "Regular", "content": "As the research paradigm of cognitive science changes from disembodied to embodied, people realize that the body and its interaction with the environment have an important effect on learning activities more and more intensely. Focus on obtaining physical experience, embodied learning encourages the participation of the body’s sensor-motor system and the multimodal interaction between the body and the environment, and it puts forward some new requirements for the design and construction of learning environments. At the same time, the development of artificial intelligence, mixed reality, human-computer interaction and other technologies in recent years has provided a good support for the construction and application of embodied learning environments, especially the functions of virtual-real fusion, natural interaction and dynamic generation of the mixed reality. For this reason, we proposed to design embedded mixed -reality learning environments (EMRLE) for supporting and promoting embodied activities by using these technologies and the embodied cognitive theory. Through combing the origin and background of EMRLE, on the one hand, we can analyze the construction goals, basic characteristics, construction models and realization methods of EMRLE from two dimensions of theory and technology; on the other hand, combined with the existing relevant research and application status in the world, the main forms of EMRLE in education and teaching practice and its teaching activity design cases can be summarized to further demonstrate and analyze the necessity, rationality and technical feasibility of EMRLE construction. For this reason, embodied learning activities designed on the basis of building EMRLE also provide new ideas for promoting the innovation of teaching and learning forms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As the research paradigm of cognitive science changes from disembodied to embodied, people realize that the body and its interaction with the environment have an important effect on learning activities more and more intensely. Focus on obtaining physical experience, embodied learning encourages the participation of the body’s sensor-motor system and the multimodal interaction between the body and the environment, and it puts forward some new requirements for the design and construction of learning environments. At the same time, the development of artificial intelligence, mixed reality, human-computer interaction and other technologies in recent years has provided a good support for the construction and application of embodied learning environments, especially the functions of virtual-real fusion, natural interaction and dynamic generation of the mixed reality. For this reason, we proposed to design embedded mixed -reality learning environments (EMRLE) for supporting and promoting embodied activities by using these technologies and the embodied cognitive theory. Through combing the origin and background of EMRLE, on the one hand, we can analyze the construction goals, basic characteristics, construction models and realization methods of EMRLE from two dimensions of theory and technology; on the other hand, combined with the existing relevant research and application status in the world, the main forms of EMRLE in education and teaching practice and its teaching activity design cases can be summarized to further demonstrate and analyze the necessity, rationality and technical feasibility of EMRLE construction. For this reason, embodied learning activities designed on the basis of building EMRLE also provide new ideas for promoting the innovation of teaching and learning forms.", "fno": "395700a126", "keywords": [ "Artificial Intelligence", "Cognition", "Cognitive Systems", "Computer Aided Instruction", "Teaching", "Virtual Reality", "Embodied Mixed Reality Learning Environments", "Research Paradigm", "Cognitive Science Changes", "Sensor Motor System", "Multimodal Interaction", "Mixed Reality", "Human Computer Interaction", "Embodied Learning Environments", "Natural Interaction", "Supporting Promoting Embodied Activities", "Embodied Cognitive Theory", "Construction Goals", "Construction Models", "Application Status", "Teaching Activity Design Cases", "EMRLE Construction", "Learning Forms", "Human Computer Interaction", "Technological Innovation", "Solid Modeling", "Cloud Computing", "Education", "Ecosystems", "Mixed Reality", "Embodied Cognition", "Learning Environments", "Mixed Reality", "Virtual Real Fusion", "Immersive Learning" ], "authors": [ { "affiliation": "Huangshan University,School of Mechanical and Electrical Eng,Huangshan,China", "fullName": "Liu Shuguang", "givenName": "Liu", "surname": "Shuguang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong Polytechnic University,Faculty of Business,Hong Kong,China", "fullName": "Ba Lin", "givenName": "Ba", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdee", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-08-01T00:00:00", "pubType": "proceedings", "pages": "126-131", "year": "2021", "issn": null, "isbn": "978-1-6654-3957-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "395700a120", "articleId": "1z0yuSPfxcs", "__typename": "AdjacentArticleType" }, "next": { "fno": "395700a132", "articleId": "1z0yv0AnCFO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2011/4467/0/4467a264", "title": "Post-Biological Hypersurfacing: Embodied Mixed Reality Data Transfer", "doi": null, "abstractUrl": "/proceedings-article/cw/2011/4467a264/12OmNAlvHsp", "parentPublication": { "id": "proceedings/cw/2011/4467/0", "title": "2011 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2002/1781/0/17810059", "title": "Interactive Theatre Experience in Embodied + Wearable Mixed Reality Space", "doi": null, "abstractUrl": "/proceedings-article/ismar/2002/17810059/12OmNs5rl02", "parentPublication": { "id": "proceedings/ismar/2002/1781/0", "title": "Proceedings. International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuc/2008/3433/0/3433a225", "title": "Analysis by Synthesis of Embodied Communication via VirtualActor with a Nodding Response Model", "doi": null, "abstractUrl": "/proceedings-article/isuc/2008/3433a225/12OmNwCsdNk", "parentPublication": { "id": "proceedings/isuc/2008/3433/0", "title": "2008 Second International Symposium on Universal Communication", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223467", "title": "Can living in virtual environments alter reality?", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223467/12OmNx0RIYM", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004106", "title": "Mediation of Knowledge Construction of Historic Sites through Embodied Interaction", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004106/12OmNzSyCg0", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/02/08700489", "title": "Embodied Robot Models for Interdisciplinary Emotion Research", "doi": null, "abstractUrl": "/journal/ta/2021/02/08700489/19xNibj044E", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b365", "title": "YouRefIt: Embodied Reference Understanding with Language and Gesture", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b365/1BmIVzIJKkU", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcime/2019/5586/0/558600a383", "title": "The Influence of Embodied Interactive Action Games on Second Language Vocabulary Acquisition", "doi": null, "abstractUrl": "/proceedings-article/ijcime/2019/558600a383/1j9wAx1TVRe", "parentPublication": { "id": "proceedings/ijcime/2019/5586/0", "title": "2019 International Joint Conference on Information, Media and Engineering (IJCIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090482", "title": "Immersive VR and Embodied Learning: The Role of Embodied Affordances in The Long-term Retention of Semantic Knowledge", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090482/1jIxrm4VUxG", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a015", "title": "A Mixed Reality Simulation Platform for Middle School Experiments", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a015/1vg7AYeTAKA", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G55WEFExd6", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G573zUaCGI", "doi": "10.1109/CVPRW56347.2022.00242", "title": "Neural Image Recolorization for Creative Domains", "normalizedTitle": "Neural Image Recolorization for Creative Domains", "abstract": "We present a self-supervised approach to recolorization of images from design-oriented domains. Our approach can recolor images based on image exemplars or target color palettes provided by a user. In contrast with previous approaches, our method can reproduce color palettes with luminance distributions that differ significantly from input, and our method is the first palette-based approach to distinguish between recolorings that match reflectance and those that match illumination, making it particularly well-suited to visualizing different aesthetic decisions in design applications. The key to our approach is first to learn latent representations for texture and color in a setting where self-supervision is especially straightforward, and then to learn a mapping to our color representation from input color palettes and scene illumination, which offers a more intuitive space for controlling and exploring recolorization.", "abstracts": [ { "abstractType": "Regular", "content": "We present a self-supervised approach to recolorization of images from design-oriented domains. Our approach can recolor images based on image exemplars or target color palettes provided by a user. In contrast with previous approaches, our method can reproduce color palettes with luminance distributions that differ significantly from input, and our method is the first palette-based approach to distinguish between recolorings that match reflectance and those that match illumination, making it particularly well-suited to visualizing different aesthetic decisions in design applications. The key to our approach is first to learn latent representations for texture and color in a setting where self-supervision is especially straightforward, and then to learn a mapping to our color representation from input color palettes and scene illumination, which offers a more intuitive space for controlling and exploring recolorization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a self-supervised approach to recolorization of images from design-oriented domains. Our approach can recolor images based on image exemplars or target color palettes provided by a user. In contrast with previous approaches, our method can reproduce color palettes with luminance distributions that differ significantly from input, and our method is the first palette-based approach to distinguish between recolorings that match reflectance and those that match illumination, making it particularly well-suited to visualizing different aesthetic decisions in design applications. The key to our approach is first to learn latent representations for texture and color in a setting where self-supervision is especially straightforward, and then to learn a mapping to our color representation from input color palettes and scene illumination, which offers a more intuitive space for controlling and exploring recolorization.", "fno": "873900c225", "keywords": [ "Data Visualisation", "Image Colour Analysis", "Learning Artificial Intelligence", "Neural Image Recolorization", "Creative Domain", "Self Supervised Approach", "Design Oriented Domains", "Image Exemplars", "Luminance Distributions", "Palette Based Approach", "Recolorings", "Aesthetic Decisions", "Design Applications", "Texture", "Self Supervision", "Color Representation", "Input Color Palettes", "Reflectivity", "Deep Learning", "Visualization", "Computer Vision", "Image Color Analysis", "Conferences", "Lighting" ], "authors": [ { "affiliation": "Cornell University", "fullName": "Boyi Li", "givenName": "Boyi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Copenhagen", "fullName": "Serge Belongie", "givenName": "Serge", "surname": "Belongie", "__typename": "ArticleAuthorType" }, { "affiliation": "Meta AI", "fullName": "Ser-nam Lim", "givenName": "Ser-nam", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University", "fullName": "Abe Davis", "givenName": "Abe", "surname": "Davis", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "2225-2229", "year": "2022", "issn": null, "isbn": "978-1-6654-8739-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1G573wvgF2M", "name": "pcvprw202287390-09857129s1-mm_873900c225.zip", "size": "1.92 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvprw202287390-09857129s1-mm_873900c225.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "873900c219", "articleId": "1G57cIgb6lG", "__typename": "AdjacentArticleType" }, "next": { "fno": "873900c230", "articleId": "1G56G2vyxTa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/1992/2855/0/00223194", "title": "Controlling illumination color to enhance object discriminability", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223194/12OmNAZfxNG", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576263", "title": "Online color camera calibration", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576263/12OmNBLdKIw", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1993/3560/0/00522809", "title": "A neural network for image background detection", "doi": null, "abstractUrl": "/proceedings-article/ssst/1993/00522809/12OmNBRsVC9", "parentPublication": { "id": "proceedings/ssst/1993/3560/0", "title": "1993 (25th) Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmip/2017/5954/0/5954a286", "title": "Removal of Uneven Illumination in Panorama Using Illumination Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmip/2017/5954a286/12OmNCw3zan", "parentPublication": { "id": "proceedings/icmip/2017/5954/0", "title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2015/7082/0/07177443", "title": "Creative design of color palettes for product packaging", "doi": null, "abstractUrl": "/proceedings-article/icme/2015/07177443/12OmNqH9hqW", "parentPublication": { "id": "proceedings/icme/2015/7082/0", "title": "2015 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139557", "title": "An approach to color constancy using multiple images", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139557/12OmNyoAAaW", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9758", "title": "PIE-Net: Photometric Invariant Edge Guided Network for Intrinsic Image Decomposition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9758/1H0N3uaU7mM", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600b889", "title": "Deep Color Consistent Network for Low-Light Image Enhancement", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600b889/1H1iQEYJMwE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a883", "title": "Low-light Image Enhancement based on Joint Decomposition and Denoising U-Net Network", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a883/1ua4K2YWruw", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a566", "title": "NTIRE 2021 Depth Guided Image Relighting Challenge", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a566/1yJYloUY5W0", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBgQFLU", "title": "2006 International Conference on Information Acquisition", "acronym": "icia", "groupId": "1002411", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNApu5t2", "doi": "10.1109/ICIA.2006.305885", "title": "Ant Colony Optimization for the Stochastic Loader Problem", "normalizedTitle": "Ant Colony Optimization for the Stochastic Loader Problem", "abstract": "In 2004, Tang proposed a new NP-hard combinational optimization problem that frequently arises in practice - the loader problem (a transportation model). Two special cases of the problem (the restricted loader problem and the equal loader problem) and optimal solution strategy have been considered. In this paper, we extend Tang's model by proposing the stochastic quantity of load and unload at each station that make the model more applicable in practice. An ant colony optimization (ACO) algorithm is designed for solving the .stochastic loader problem. Two numerical examples are presented to illustrate the application of the developed model.", "abstracts": [ { "abstractType": "Regular", "content": "In 2004, Tang proposed a new NP-hard combinational optimization problem that frequently arises in practice - the loader problem (a transportation model). Two special cases of the problem (the restricted loader problem and the equal loader problem) and optimal solution strategy have been considered. In this paper, we extend Tang's model by proposing the stochastic quantity of load and unload at each station that make the model more applicable in practice. An ant colony optimization (ACO) algorithm is designed for solving the .stochastic loader problem. Two numerical examples are presented to illustrate the application of the developed model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In 2004, Tang proposed a new NP-hard combinational optimization problem that frequently arises in practice - the loader problem (a transportation model). Two special cases of the problem (the restricted loader problem and the equal loader problem) and optimal solution strategy have been considered. In this paper, we extend Tang's model by proposing the stochastic quantity of load and unload at each station that make the model more applicable in practice. An ant colony optimization (ACO) algorithm is designed for solving the .stochastic loader problem. Two numerical examples are presented to illustrate the application of the developed model.", "fno": "04097818", "keywords": [ "Combinatorial Mathematics", "Computational Complexity", "Optimisation", "Stochastic Processes", "Transportation", "Ant Colony Optimization", "Stochastic Loader Problem", "NP Hard", "Combinational Optimization", "Stochastic Quantity", "Ant Colony Optimization", "Stochastic Processes", "Remuneration", "Linear Programming", "Conference Management", "Educational Institutions", "Transportation", "Embryo", "Mathematics", "Logistics", "Ant Colony Optimization", "Loader Problem", "Stochastic" ], "authors": [ { "affiliation": "School of Management, Shandong University, Jinan, Shandong Province, China, pxzhao@126.com", "fullName": "Peixin Zhao", "givenName": "Peixin", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Finance, Shandong Institute of Light Industry, Jinan, Shandong Province, China, jmjj55@126.com", "fullName": "Hong Wang", "givenName": "Hong", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-08-01T00:00:00", "pubType": "proceedings", "pages": "1052-1056", "year": "2006", "issn": null, "isbn": "1-4244-0528-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04097802", "articleId": "12OmNBSSVeF", "__typename": "AdjacentArticleType" }, "next": { "fno": "04097803", "articleId": "12OmNynJMN7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/snpd/2007/2909/1/290910582", "title": "A New Hybrid Genetic Algorithm for the Stochastic Loader Problem", "doi": null, "abstractUrl": "/proceedings-article/snpd/2007/290910582/12OmNAPSMnu", "parentPublication": { "id": "proceedings/snpd/2007/2909/1", "title": "Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2007/2875/4/28750292", "title": "An Improved Hybrid Genetic Algorithm for the Stochastic Loader Problem", "doi": null, "abstractUrl": "/proceedings-article/icnc/2007/28750292/12OmNAWpywr", "parentPublication": { "id": "proceedings/icnc/2007/2875/4", "title": "Third International Conference on Natural Computation (ICNC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a065", "title": "Solving Coalition Structure Generation Problem with Double-Layered Ant Colony Optimization", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a065/12OmNB8kHWC", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2006/2567/0/25670473", "title": "Diagnosis of Complex Systems Using Ant Colony Decision Petri Nets", "doi": null, "abstractUrl": "/proceedings-article/ares/2006/25670473/12OmNBKmXiq", "parentPublication": { "id": "proceedings/ares/2006/2567/0", "title": "First International Conference on Availability, Reliability and Security (ARES'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/3/3682c325", "title": "Automatic Image Classification Using the Classification Ant-Colony Algorithm", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682c325/12OmNqHqSzQ", "parentPublication": { "id": "proceedings/esiat/2009/3682/3", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/1/3557a292", "title": "An Ant Colony Optimization Algorithm for Knight's Tour Problem on the Chessboard with Holes", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557a292/12OmNx1qV2D", "parentPublication": { "id": "proceedings/etcs/2009/3557/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a168", "title": "Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a168/12OmNyRg4dV", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mediacom/2010/4136/0/4136a116", "title": "Parallel Ant Colony Algorithm for the Logistics Scheduling Problem", "doi": null, "abstractUrl": "/proceedings-article/mediacom/2010/4136a116/12OmNya72wr", "parentPublication": { "id": "proceedings/mediacom/2010/4136/0", "title": "2010 International Conference on Multimedia Communications (Mediacom 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csnt/2012/4692/0/4692a759", "title": "Solving the Single Processor Scheduling Problem by Using Ant Colony Optimization Technique", "doi": null, "abstractUrl": "/proceedings-article/csnt/2012/4692a759/12OmNyv7mb3", "parentPublication": { "id": "proceedings/csnt/2012/4692/0", "title": "Communication Systems and Network Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2008/3278/0/3278b450", "title": "On Ant Colony Algorithm for Solving Continuous Optimization Problem", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2008/3278b450/12OmNz2kqiK", "parentPublication": { "id": "proceedings/iih-msp/2008/3278/0", "title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZJL", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "acronym": "fskd", "groupId": "1001615", "volume": "3", "displayVolume": "3", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3XhlC", "doi": "10.1109/FSKD.2007.154", "title": "An Equivalent Vector Optimization Problem for Nonsmooth Multiobjective Programming Problem", "normalizedTitle": "An Equivalent Vector Optimization Problem for Nonsmooth Multiobjective Programming Problem", "abstract": "for a solution of a invex nonsmooth program- ming problem is introduced. An equivalent -approximated vector optimization problem is constructed by a modification of the objec- tive and the constraint functions in the orig- inal multiobjective programming problem and its equivalent -approximated vector optimiza- tion problem is proved. In this way, optimal- ity conditions for nonsmooth constrained multi- objective programming problems having gener- alized invex objective and constraint functions (with respect to the same function )are ob- tained. Key word: invex nonsmooth multiobjective programming ; -approximated vector opti- mization; (weak)efficient solution", "abstracts": [ { "abstractType": "Regular", "content": "for a solution of a invex nonsmooth program- ming problem is introduced. An equivalent -approximated vector optimization problem is constructed by a modification of the objec- tive and the constraint functions in the orig- inal multiobjective programming problem and its equivalent -approximated vector optimiza- tion problem is proved. In this way, optimal- ity conditions for nonsmooth constrained multi- objective programming problems having gener- alized invex objective and constraint functions (with respect to the same function )are ob- tained. Key word: invex nonsmooth multiobjective programming ; -approximated vector opti- mization; (weak)efficient solution", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "for a solution of a invex nonsmooth program- ming problem is introduced. An equivalent -approximated vector optimization problem is constructed by a modification of the objec- tive and the constraint functions in the orig- inal multiobjective programming problem and its equivalent -approximated vector optimiza- tion problem is proved. In this way, optimal- ity conditions for nonsmooth constrained multi- objective programming problems having gener- alized invex objective and constraint functions (with respect to the same function )are ob- tained. Key word: invex nonsmooth multiobjective programming ; -approximated vector opti- mization; (weak)efficient solution", "fno": "28740514", "keywords": [], "authors": [ { "affiliation": "Wuhan University of Science and Technology", "fullName": "Shu-li Xu", "givenName": "Shu-li", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University of Science and Technology", "fullName": "Jun Jiang", "givenName": "Jun", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University of Science and Technology", "fullName": "Qiu-ting Wang", "givenName": "Qiu-ting", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "fskd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-08-01T00:00:00", "pubType": "proceedings", "pages": "514-517", "year": "2007", "issn": null, "isbn": "0-7695-2874-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28740509", "articleId": "12OmNxdDFAt", "__typename": "AdjacentArticleType" }, "next": { "fno": "28740518", "articleId": "12OmNzC5TdR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/skg/2017/2558/0/255801a019", "title": "An Improved Decomposition Multiobjective Optimization Algorithm with Weight Vector Adaptation Strategy", "doi": null, "abstractUrl": "/proceedings-article/skg/2017/255801a019/12OmNBVIUs8", "parentPublication": { "id": "proceedings/skg/2017/2558/0", "title": "2017 13th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcci/2002/7282/1/01007052", "title": "Rank-density based multiobjective genetic algorithm", "doi": null, "abstractUrl": "/proceedings-article/wcci/2002/01007052/12OmNCgrD7B", "parentPublication": { "id": "proceedings/wcci/2002/7282/1", "title": "Computational Intelligence, Proceedings of the World on Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/06909922", "title": "Generalized Nonconvex Nonsmooth Low-Rank Minimization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/06909922/12OmNvSbBO9", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2010/4225/3/4225c382", "title": "Optimality and Saddle Point for Vector Optimization Under Semilocally B-preinvex", "doi": null, "abstractUrl": "/proceedings-article/aici/2010/4225c382/12OmNwfKjd0", "parentPublication": { "id": "proceedings/aici/2010/4225/3", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2009/3902/0/3902a374", "title": "Nonsmooth Bilevel Programming for Hyperparameter Selection", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2009/3902a374/12OmNxwENmO", "parentPublication": { "id": "proceedings/icdmw/2009/3902/0", "title": "2009 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcci/2002/7282/2/01004489", "title": "Dynamic population size in multiobjective evolutionary algorithms", "doi": null, "abstractUrl": "/proceedings-article/wcci/2002/01004489/12OmNyKJir5", "parentPublication": { "id": "proceedings/wcci/2002/7282/2", "title": "Computational Intelligence, Proceedings of the World on Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2010/4030/2/4030b016", "title": "Sufficiency and Duality in Nonsmooth Multiobjective Programming with Generalized Dini Convextiy", "doi": null, "abstractUrl": "/proceedings-article/cso/2010/4030b016/12OmNyen1yq", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icndc/2010/8382/0/05645438", "title": "Several Optimality Sufficient Conditions of Composite Multiobjective Programming", "doi": null, "abstractUrl": "/proceedings-article/icndc/2010/05645438/12OmNyuPLic", "parentPublication": { "id": "proceedings/icndc/2010/8382/0", "title": "2010 First International Conference on Networking and Distributed Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/12/i2135", "title": "Nonsmooth Optimization Techniques for Semisupervised Classification", "doi": null, "abstractUrl": "/journal/tp/2007/12/i2135/13rRUxASuqu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a845", "title": "Quantum GEP for Dynamic Multiobjective Optimization", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a845/1KYtcFq7sUU", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzayN6t", "title": "2013 8th EUROSIM Congress on Modelling and Simulation (EUROSIM)", "acronym": "eurosim", "groupId": "1803000", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNqJZgFy", "doi": "10.1109/EUROSIM.2013.55", "title": "A Methodology Combining Optimization and Simulation for Real Applications of the Stochastic Aircraft Recovery Problem", "normalizedTitle": "A Methodology Combining Optimization and Simulation for Real Applications of the Stochastic Aircraft Recovery Problem", "abstract": "The Aircraft Recovery Problem appears when external events cause disruptions in a flight schedule. Thus in order to minimize the losses caused by the externalities, aircrafts must be reallocated (rescheduled) in the best possible way. The aim of this paper is to develop a suitable methodology that combines optimization techniques with a simulation approach to tackle the so-called Stochastic Aircraft Recovery Problem. The approach solves the problem through the rescheduling of the flight plan using delays, swaps, and cancellations. The main objective of the optimization model is to restore as much as possible the original flight schedule, minimizing the total delay and the number of cancelled flights. By applying simulation techniques, the robustness of the given solution is assessed. The proposed methodology is applied on a medium-sized scenario based on real data provided by a commercial airline. The obtained results show that the methodology described in the paper is capable of producing a feasible and robust solution for this problem.", "abstracts": [ { "abstractType": "Regular", "content": "The Aircraft Recovery Problem appears when external events cause disruptions in a flight schedule. Thus in order to minimize the losses caused by the externalities, aircrafts must be reallocated (rescheduled) in the best possible way. The aim of this paper is to develop a suitable methodology that combines optimization techniques with a simulation approach to tackle the so-called Stochastic Aircraft Recovery Problem. The approach solves the problem through the rescheduling of the flight plan using delays, swaps, and cancellations. The main objective of the optimization model is to restore as much as possible the original flight schedule, minimizing the total delay and the number of cancelled flights. By applying simulation techniques, the robustness of the given solution is assessed. The proposed methodology is applied on a medium-sized scenario based on real data provided by a commercial airline. The obtained results show that the methodology described in the paper is capable of producing a feasible and robust solution for this problem.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Aircraft Recovery Problem appears when external events cause disruptions in a flight schedule. Thus in order to minimize the losses caused by the externalities, aircrafts must be reallocated (rescheduled) in the best possible way. The aim of this paper is to develop a suitable methodology that combines optimization techniques with a simulation approach to tackle the so-called Stochastic Aircraft Recovery Problem. The approach solves the problem through the rescheduling of the flight plan using delays, swaps, and cancellations. The main objective of the optimization model is to restore as much as possible the original flight schedule, minimizing the total delay and the number of cancelled flights. By applying simulation techniques, the robustness of the given solution is assessed. The proposed methodology is applied on a medium-sized scenario based on real data provided by a commercial airline. The obtained results show that the methodology described in the paper is capable of producing a feasible and robust solution for this problem.", "fno": "5073a265", "keywords": [ "Delays", "Robustness", "Schedules", "Atmospheric Modeling", "Aircraft", "Optimization", "Stochastic Processes", "Aircraft Recovery Problem", "Constraint Programming", "Flight Schedule", "Disruption", "Simulation", "Robustness", "Optimization" ], "authors": [ { "affiliation": null, "fullName": "Pol Arias", "givenName": "Pol", "surname": "Arias", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Miguel Mujica Mota", "givenName": "Miguel Mujica", "surname": "Mota", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Daniel Guimarans", "givenName": "Daniel", "surname": "Guimarans", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Geert Boosten", "givenName": "Geert", "surname": "Boosten", "__typename": "ArticleAuthorType" } ], "idPrefix": "eurosim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "265-270", "year": "2013", "issn": null, "isbn": "978-0-7695-5073-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5073a259", "articleId": "12OmNBSBkg4", "__typename": "AdjacentArticleType" }, "next": { "fno": "5073a271", "articleId": "12OmNqHqSr1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/med/2006/1/0/04124921", "title": "Fault Detection and Isolation in Aircraft Systems Using Stochastic Nonlinear Modelling of Flight Data Dependencies", "doi": null, "abstractUrl": "/proceedings-article/med/2006/04124921/12OmNvjgWYf", "parentPublication": { "id": "proceedings/med/2006/1/0", "title": "Proceedings of the 14th Mediterranean Conference on Control and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a814", "title": "Aircraft Rerouting Decision-Making Model under Severe Weather", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a814/12OmNvrdHYW", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/med/2006/1/0/04124936", "title": "3-Aircraft Formation Flight Experiment", "doi": null, "abstractUrl": "/proceedings-article/med/2006/04124936/12OmNxTVTYo", "parentPublication": { "id": "proceedings/med/2006/1/0", "title": "Proceedings of the 14th Mediterranean Conference on Control and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b004", "title": "Intelligent Decision Support for Aircraft Logistics at Commercial Airports", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b004/12OmNyRg4mP", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2009/3605/1/3605b008", "title": "An Aircraft Sequencing Approach Based on Fuzzy Petri-net", "doi": null, "abstractUrl": "/proceedings-article/cso/2009/3605b008/12OmNyen1p0", "parentPublication": { "id": "cso/2009/3605/1", "title": "2009 International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2017/2628/0/2628a053", "title": "Review of Vertical Take-Off and Landing Aircraft", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2017/2628a053/12OmNzEmFEA", "parentPublication": { "id": "proceedings/icmcce/2017/2628/0", "title": "2017 Second International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeas/2022/6305/0/630500a263", "title": "Planning of Flight Simulator Data Package Flight Test for Civil Aircraft", "doi": null, "abstractUrl": "/proceedings-article/icmeas/2022/630500a263/1I8wCIvut6o", "parentPublication": { "id": "proceedings/icmeas/2022/6305/0", "title": "2022 8th International Conference on Mechanical Engineering and Automation Science (ICMEAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a456", "title": "Study on 4D Track Prediction and Optimization of Aircraft Climbing Phase", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a456/1cI5Xvu0HNS", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedme/2020/8145/0/09122083", "title": "The influence of the navigation direction of the dual stealth aircraft formation on the performance of monopulse radar", "doi": null, "abstractUrl": "/proceedings-article/icedme/2020/09122083/1kRSyRyFww8", "parentPublication": { "id": "proceedings/icedme/2020/8145/0", "title": "2020 3rd International Conference on Electron Device and Mechanical Engineering (ICEDME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103817", "title": "Application of PID Simulation Control Mode in Quadrotor Aircraft", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103817/1kesClNOMAE", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBNM93o", "title": "Fifth International Conference on High Performance Computing", "acronym": "hipc", "groupId": "1000322", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNviZlL5", "doi": "10.1109/HIPC.1998.737974", "title": "Computation of Penetration Measures for Convex Polygons and Polyhedra for Graphics Applications", "normalizedTitle": "Computation of Penetration Measures for Convex Polygons and Polyhedra for Graphics Applications", "abstract": "Algorithms to compute measures of penetration between convex polygonal objects in the plane and convex polyhedral objects in 3D are presented. The algorithms are analyzed for their asymptotic complexity. Details of implementation on a single processor machine are given. Parallelization of the algorithms is discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Algorithms to compute measures of penetration between convex polygonal objects in the plane and convex polyhedral objects in 3D are presented. The algorithms are analyzed for their asymptotic complexity. Details of implementation on a single processor machine are given. Parallelization of the algorithms is discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Algorithms to compute measures of penetration between convex polygonal objects in the plane and convex polyhedral objects in 3D are presented. The algorithms are analyzed for their asymptotic complexity. Details of implementation on a single processor machine are given. Parallelization of the algorithms is discussed.", "fno": "91940081", "keywords": [], "authors": [ { "affiliation": "IIT-Guwahati", "fullName": "K. Sridharan", "givenName": "K.", "surname": "Sridharan", "__typename": "ArticleAuthorType" } ], "idPrefix": "hipc", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-12-01T00:00:00", "pubType": "proceedings", "pages": "81", "year": "1998", "issn": "1094-7256", "isbn": "0-8186-9194-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "91940073", "articleId": "12OmNvk7K5j", "__typename": "AdjacentArticleType" }, "next": { "fno": "91940088", "articleId": "12OmNrJAdSs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqpN", "title": "2009 29th IEEE International Conference on Distributed Computing Systems", "acronym": "icdcs", "groupId": "1000213", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyYDDyn", "doi": "10.1109/ICDCS.2009.29", "title": "Stochastic Multicast with Network Coding", "normalizedTitle": "Stochastic Multicast with Network Coding", "abstract": "The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource usage exceeding the limits specified in the SLA incurs the content provider additional charges, usually at a higher cost. Hence, the content provider's goal is to provision adequate resources in the SLA based on forecasts of future demand. We study capacity purchasing strategies in this setting when the content provider employs network coded multicast as the data delivery mechanism. We model this problem as a two-stage stochastic optimization problem with recourse, and we design two approximation algorithms to solve such problems. The first is a heuristic that exploits properties unique to network coding. It performs well in general scenarios, but may be unbounded with respect to the optimal solution in the worst case. This motivates our second approach, a sampling algorithm partly inspired from the work of Gupta et al. [Gupta et al., ACM STOC 2004]. We employ techniques from duality theory in linear optimization to prove that sampling provides a 3-approximate solution to the stochastic multicast problem. We conduct simulations to illustrate the efficacy of both algorithms, and show that the performance of both is usually within 10% of the optimal solution in practice.", "abstracts": [ { "abstractType": "Regular", "content": "The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource usage exceeding the limits specified in the SLA incurs the content provider additional charges, usually at a higher cost. Hence, the content provider's goal is to provision adequate resources in the SLA based on forecasts of future demand. We study capacity purchasing strategies in this setting when the content provider employs network coded multicast as the data delivery mechanism. We model this problem as a two-stage stochastic optimization problem with recourse, and we design two approximation algorithms to solve such problems. The first is a heuristic that exploits properties unique to network coding. It performs well in general scenarios, but may be unbounded with respect to the optimal solution in the worst case. This motivates our second approach, a sampling algorithm partly inspired from the work of Gupta et al. [Gupta et al., ACM STOC 2004]. We employ techniques from duality theory in linear optimization to prove that sampling provides a 3-approximate solution to the stochastic multicast problem. We conduct simulations to illustrate the efficacy of both algorithms, and show that the performance of both is usually within 10% of the optimal solution in practice.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The usage of network resources by content providers is commonly governed by Service Level Agreements (SLA) between the content provider and the network service provider. Resource usage exceeding the limits specified in the SLA incurs the content provider additional charges, usually at a higher cost. Hence, the content provider's goal is to provision adequate resources in the SLA based on forecasts of future demand. We study capacity purchasing strategies in this setting when the content provider employs network coded multicast as the data delivery mechanism. We model this problem as a two-stage stochastic optimization problem with recourse, and we design two approximation algorithms to solve such problems. The first is a heuristic that exploits properties unique to network coding. It performs well in general scenarios, but may be unbounded with respect to the optimal solution in the worst case. This motivates our second approach, a sampling algorithm partly inspired from the work of Gupta et al. [Gupta et al., ACM STOC 2004]. We employ techniques from duality theory in linear optimization to prove that sampling provides a 3-approximate solution to the stochastic multicast problem. We conduct simulations to illustrate the efficacy of both algorithms, and show that the performance of both is usually within 10% of the optimal solution in practice.", "fno": "3659a500", "keywords": [ "Multicast", "Stochastic Optimization", "Network Coding", "Linear Programming", "Network Optimization" ], "authors": [ { "affiliation": null, "fullName": "Ajay Gopinathan", "givenName": "Ajay", "surname": "Gopinathan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zongpeng Li", "givenName": "Zongpeng", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdcs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "500-509", "year": "2009", "issn": "1063-6927", "isbn": "978-0-7695-3659-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3659a490", "articleId": "12OmNBQ2W11", "__typename": "AdjacentArticleType" }, "next": { "fno": "3659a510", "articleId": "12OmNwwMf0a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icppw/2010/4157/0/4157a581", "title": "Multiple Trees with Network Coding for Efficient and Reliable Multicast in MANETs", "doi": null, "abstractUrl": "/proceedings-article/icppw/2010/4157a581/12OmNAXxXey", "parentPublication": { "id": "proceedings/icppw/2010/4157/0", "title": "2010 39th International Conference on Parallel Processing Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2011/4610/0/4610a470", "title": "Minimum-Energy Multicast Using Random Linear Network Coding", "doi": null, "abstractUrl": "/proceedings-article/msn/2011/4610a470/12OmNqJHFtp", "parentPublication": { "id": "proceedings/msn/2011/4610/0", "title": "2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/2/4647b368", "title": "The Research of Network Coding Algorithm in P2P Content Distribution System", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b368/12OmNrNh0Cx", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/3/3557f060", "title": "Generation and Extension of Linear Network Coding at Different Multicast Rates", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557f060/12OmNwD1pRw", "parentPublication": { "id": "proceedings/etcs/2009/3557/3", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icppw/2007/2934/0/29340044", "title": "Network Coding Based Multicast in Internet", "doi": null, "abstractUrl": "/proceedings-article/icppw/2007/29340044/12OmNxymob4", "parentPublication": { "id": "proceedings/icppw/2007/2934/0", "title": "2007 International Conference on Parallel Processing Workshops (ICPPW 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nca/2008/3192/0/3192a177", "title": "A Linear Inter-Session Network Coding Scheme for Multicast", "doi": null, "abstractUrl": "/proceedings-article/nca/2008/3192a177/12OmNy2agWo", "parentPublication": { "id": "proceedings/nca/2008/3192/0", "title": "2008 Seventh IEEE International Symposium on Network Computing and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmc/2010/3989/2/3989b086", "title": "Delay Modeling for Wireless Network Coding Multicast", "doi": null, "abstractUrl": "/proceedings-article/cmc/2010/3989b086/12OmNzd7bw9", "parentPublication": { "id": "proceedings/cmc/2010/3989/2", "title": "Communications and Mobile Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2010/07/ttd2010070968", "title": "A Hypergraph Approach to Linear Network Coding in Multicast Networks", "doi": null, "abstractUrl": "/journal/td/2010/07/ttd2010070968/13rRUy0qnLl", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2013/04/06397574", "title": "Multirate Multicasting With Intralayer Network Coding", "doi": null, "abstractUrl": "/journal/nt/2013/04/06397574/13rRUytnsTW", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2011/07/ttd2011071238", "title": "Performance of Acyclic Stochastic Networks with Network Coding", "doi": null, "abstractUrl": "/journal/td/2011/07/ttd2011071238/13rRUyueggN", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1zK", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "17D45X0yjT3", "doi": "10.1109/HICSS.2007.500", "title": "Stochastic Model for Power Grid Dynamics", "normalizedTitle": "Stochastic Model for Power Grid Dynamics", "abstract": "We introduce a stochastic model that describes the quasi-static dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random removing of system components from service, random repair times for the failed components, and random response times to implement optimal system corrections for removing line overloads in a damaged or stressed transmission network. We use a linear approximation to the network flow equations and apply linear programming techniques that optimize the dispatching of generators and loads in order to eliminate the network overloads associated with a damaged system. We also provide a simple model for the operator's response to various contingency events that is not always optimal due to either failure of the state estimation system or due to the incorrect subjective assessment of the severity associated with these events. This further allows us to use a game theoretic framework for casting the optimization of the operator's response into the choice of the optimal strategy which minimizes the operating cost. We use a simple strategy space which is the degree of tolerance to line overloads and which is an automatic control (optimization) parameter that can be adjusted to trade off automatic load shed without propagating cascades versus reduced load shed and an increased risk of propagating cascades. The tolerance parameter is chosen to describes a smooth transition from a risk averse to a risk taken strategy. We present numerical results comparing the responses of two power grid systems to optimization approaches with different factors of risk and select the best blackout controlling parameter", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a stochastic model that describes the quasi-static dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random removing of system components from service, random repair times for the failed components, and random response times to implement optimal system corrections for removing line overloads in a damaged or stressed transmission network. We use a linear approximation to the network flow equations and apply linear programming techniques that optimize the dispatching of generators and loads in order to eliminate the network overloads associated with a damaged system. We also provide a simple model for the operator's response to various contingency events that is not always optimal due to either failure of the state estimation system or due to the incorrect subjective assessment of the severity associated with these events. This further allows us to use a game theoretic framework for casting the optimization of the operator's response into the choice of the optimal strategy which minimizes the operating cost. We use a simple strategy space which is the degree of tolerance to line overloads and which is an automatic control (optimization) parameter that can be adjusted to trade off automatic load shed without propagating cascades versus reduced load shed and an increased risk of propagating cascades. The tolerance parameter is chosen to describes a smooth transition from a risk averse to a risk taken strategy. We present numerical results comparing the responses of two power grid systems to optimization approaches with different factors of risk and select the best blackout controlling parameter", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a stochastic model that describes the quasi-static dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random removing of system components from service, random repair times for the failed components, and random response times to implement optimal system corrections for removing line overloads in a damaged or stressed transmission network. We use a linear approximation to the network flow equations and apply linear programming techniques that optimize the dispatching of generators and loads in order to eliminate the network overloads associated with a damaged system. We also provide a simple model for the operator's response to various contingency events that is not always optimal due to either failure of the state estimation system or due to the incorrect subjective assessment of the severity associated with these events. This further allows us to use a game theoretic framework for casting the optimization of the operator's response into the choice of the optimal strategy which minimizes the operating cost. We use a simple strategy space which is the degree of tolerance to line overloads and which is an automatic control (optimization) parameter that can be adjusted to trade off automatic load shed without propagating cascades versus reduced load shed and an increased risk of propagating cascades. The tolerance parameter is chosen to describes a smooth transition from a risk averse to a risk taken strategy. We present numerical results comparing the responses of two power grid systems to optimization approaches with different factors of risk and select the best blackout controlling parameter", "fno": "04076598", "keywords": [ "Linear Programming", "Load Dispatching", "Load Shedding", "Power Grids", "Power Transmission Faults", "Stochastic Games", "Transmission Network Calculations", "Stochastic Model", "Power Grid Dynamics", "Quasi Static Dynamics", "Electric Transmission Network", "Random Load Fluctuations", "Random Repair Times", "Random Response Times", "Network Flow Equations", "Line Overloads", "Linear Approximation", "Linear Programming", "Load Dispatching", "State Estimation System", "Game Theoretic Framework", "Optimization", "Load Shed", "Tolerance Parameter", "Power Grid Blackout", "Stochastic Processes", "Power Grids", "Power System Dynamics", "Power System Modeling", "Stochastic Systems", "Fluctuations", "Delay", "Linear Approximation", "Equations", "Linear Programming" ], "authors": [ { "affiliation": "Los Alamos National Laboratory", "fullName": "Marian Anghel", "givenName": "Marian", "surname": "Anghel", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "Kenneth A. Werley", "givenName": "Kenneth A.", "surname": "Werley", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Adilson E. Motter", "givenName": "Adilson E.", "surname": "Motter", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-01-01T00:00:00", "pubType": "proceedings", "pages": "113", "year": "2007", "issn": "1530-1605", "isbn": "0-7695-2755-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27550112c", "articleId": "12OmNx4yvru", "__typename": "AdjacentArticleType" }, "next": { "fno": "27550114", "articleId": "12OmNCcKQxv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/date/2008/3/0/04484668", "title": "A Framework of Stochastic Power Management Using Hidden Markov Model", "doi": null, "abstractUrl": "/proceedings-article/date/2008/04484668/12OmNvlg8rk", "parentPublication": { "id": "proceedings/date/2008/3/0", "title": "Design, Automation & Test in Europe. DATE'08", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367c729", "title": "Lambda-Gaga: Toward a New Metric for the Complex System State of the Electrical Grid", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367c729/12OmNwKoZgy", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718523", "title": "The Impact of Distributed Generation on Power Transmission Grid Dynamics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718523/12OmNxWLTkR", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a794", "title": "A Small Isolated Power System SCUC Model with State-Controllable Wind Power", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a794/12OmNyKJiBM", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwcfta/2011/4560/0/4560a032", "title": "Dynamics Analysis of the Stochastic Lorenz System", "doi": null, "abstractUrl": "/proceedings-article/iwcfta/2011/4560a032/12OmNzlD9FE", "parentPublication": { "id": "proceedings/iwcfta/2011/4560/0", "title": "Chaos-Fractals Theories and Applications, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2011/01/05545461", "title": "Stochastic Model and Connectivity Dynamics for VANETs in Signalized Road Systems", "doi": null, "abstractUrl": "/journal/nt/2011/01/05545461/13rRUxD9h23", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2015/05/06783802", "title": "A Stochastic Model for Estimating the Power Consumption of a Processor", "doi": null, "abstractUrl": "/journal/tc/2015/05/06783802/13rRUxYIN3p", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a528", "title": "Research on Key Technologies of dynamic risk assessment in whole process of mega city power grid", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a528/1tzzfdQF3i0", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsmt/2020/8668/0/866800a169", "title": "Network Risk Assessment Based on Stochastic Forest Model", "doi": null, "abstractUrl": "/proceedings-article/iccsmt/2020/866800a169/1u8pCBJ5yLe", "parentPublication": { "id": "proceedings/iccsmt/2020/8668/0", "title": "2020 International Conference on Computer Science and Management Technology (ICCSMT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icscde/2021/0142/0/014200a303", "title": "Stochastic Volatility Analysis Model of regional financial market based on S-type membership function", "doi": null, "abstractUrl": "/proceedings-article/icscde/2021/014200a303/1xtSGJSSDo4", "parentPublication": { "id": "proceedings/icscde/2021/0142/0", "title": "2021 International Conference of Social Computing and Digital Economy (ICSCDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4vD", "title": "Winter Simulation Conference", "acronym": "wsc", "groupId": "1000674", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "1D89kv9bh3G", "doi": "10.1145/256562.256698", "title": "Discrete stochastic optimization via a modification of the stochastic ruler method", "normalizedTitle": "Discrete stochastic optimization via a modification of the stochastic ruler method", "abstract": "In this paper, we present a modification of the stochastic ruler method for solving discrete stochastic optimization problems. Our method generates a stationary Markov chain sequence taking values in the feasible set of the underlying discrete optimization problem. The number of visits to every state by this Markov chain is used to estimate the optimal solution. Unlike the original stochastic ruler method, our method is guaranteed to converge almost surely to a global optimal solution. We present empirical results that illustrate the performance of our method, and we show that these results compare favorably with empirical results obtained using the original stochastic ruler method.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a modification of the stochastic ruler method for solving discrete stochastic optimization problems. Our method generates a stationary Markov chain sequence taking values in the feasible set of the underlying discrete optimization problem. The number of visits to every state by this Markov chain is used to estimate the optimal solution. Unlike the original stochastic ruler method, our method is guaranteed to converge almost surely to a global optimal solution. We present empirical results that illustrate the performance of our method, and we show that these results compare favorably with empirical results obtained using the original stochastic ruler method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a modification of the stochastic ruler method for solving discrete stochastic optimization problems. Our method generates a stationary Markov chain sequence taking values in the feasible set of the underlying discrete optimization problem. The number of visits to every state by this Markov chain is used to estimate the optimal solution. Unlike the original stochastic ruler method, our method is guaranteed to converge almost surely to a global optimal solution. We present empirical results that illustrate the performance of our method, and we show that these results compare favorably with empirical results obtained using the original stochastic ruler method.", "fno": "00873308", "keywords": [ "Stochastic Processes", "Optimization Methods", "Random Variables", "Modeling", "Simulated Annealing", "State Estimation", "Stochastic Systems", "Stochastic Resonance", "Industrial Engineering", "Logistics" ], "authors": [ { "affiliation": "University of Wisconsin", "fullName": "M.H. Alrefaei", "givenName": "M.H.", "surname": "Alrefaei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "S. Andradottir", "givenName": "S.", "surname": "Andradottir", "__typename": "ArticleAuthorType" } ], "idPrefix": "wsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-01-01T00:00:00", "pubType": "proceedings", "pages": "406-411", "year": "1996", "issn": null, "isbn": "0-7803-3383-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3383287", "articleId": "12OmNAHmOsC", "__typename": "AdjacentArticleType" }, "next": { "fno": "3383295", "articleId": "12OmNApcucm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isai/2016/1585/0/1585a576", "title": "An Annealing Stochastic Ranking Mechanism for Constrained Evolutionary Optimization", "doi": null, "abstractUrl": "/proceedings-article/isai/2016/1585a576/12OmNqJq4ye", "parentPublication": { "id": "proceedings/isai/2016/1585/0", "title": "2016 International Conference on Information System and Artificial Intelligence (ISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icca/2003/7777/0/01595039", "title": "Optimal control for a class of hybrid systems via a stochastic method", "doi": null, "abstractUrl": "/proceedings-article/icca/2003/01595039/12OmNvzJGei", "parentPublication": { "id": "proceedings/icca/2003/7777/0", "title": "4th International Conference on Control and Automation. Final Program and Book of Abstracts", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206504", "title": "Markov Chain Monte Carlo combined with deterministic methods for Markov random field optimization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206504/12OmNxUdv9c", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saintw/2005/2263/0/01620024", "title": "A Matrix Pattern Compliant Strong Stochastic Bound", "doi": null, "abstractUrl": "/proceedings-article/saintw/2005/01620024/12OmNyS6RFR", "parentPublication": { "id": "proceedings/saintw/2005/2263/0", "title": "2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117776", "title": "Application of Stochastic Optimization Method for an Urban Corridor", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117776/12OmNylKAOj", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/2/81832859", "title": "A stochastic dynamical system for image segmentation", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81832859/12OmNywfKDG", "parentPublication": { "id": "proceedings/icip/1997/8183/2", "title": "Proceedings of International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2014/5372/0/5372a275", "title": "A Stochastic Optimization Model for Freight Empty Cars Allocation in Railway Networks", "doi": null, "abstractUrl": "/proceedings-article/cso/2014/5372a275/12OmNzBOhCG", "parentPublication": { "id": "proceedings/cso/2014/5372/0", "title": "2014 Seventh International Joint Conference on Computational Sciences and Optimization (CSO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/qest/2011/4491/0/4491a223", "title": "Compositional Abstractions for Long-Run Properties of Stochastic Systems", "doi": null, "abstractUrl": "/proceedings-article/qest/2011/4491a223/12OmNzYwbUX", "parentPublication": { "id": "proceedings/qest/2011/4491/0", "title": "Quantitative Evaluation of Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1996/3383/0/3383406", "title": "Discrete stochastic optimization via a modification of the stochastic ruler method", "doi": null, "abstractUrl": "/proceedings-article/wsc/1996/3383406/12OmNzayNoE", "parentPublication": { "id": "proceedings/wsc/1996/3383/0", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1994/07/e0506", "title": "A Characterization of the Stochastic Process Underlying a Stochastic Petri Net", "doi": null, "abstractUrl": "/journal/ts/1994/07/e0506/13rRUyfKIJI", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1EOEbNrpskM", "title": "2022 3rd International Conference on Computing, Networks and Internet of Things (CNIOT)", "acronym": "cniot", "groupId": "1847067", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1EOEc536IAU", "doi": "10.1109/CNIOT55862.2022.00016", "title": "Stochastic-Network-Calculus-Theory-Based Road Side Unit Location Optimization at an Intersection", "normalizedTitle": "Stochastic-Network-Calculus-Theory-Based Road Side Unit Location Optimization at an Intersection", "abstract": "This paper deals with the problem of stochastic network calculus-based road side unit (RSU) location optimization at an intersection. Considering the stochasticity of data arrival rate at RSUs and RSU service capacity, the upper bound of vehicle-to-RSU (V2R) communication delay is derived using stochastic network calculus. Further, to hedge against the impact of the randomness of the traffic density on RSU location optimization, the problem is formulated as a two-stage nonlinear mixed-integer stochastic program. The objective function of this program is to minimize the investment cost of RSU location and the expectation of the penalty cost of the V2R communication delay upper bound. In the first stage of the program, the number and location of RSUs are optimized when the traffic density at the intersection is uncertain. In the second stage, when the traffic density is realized, the subareas of the intersection are assigned to the located RSUs to minimize the penalty cost. To find a global optimal solution to the problem, a Benders decomposition algorithm is proposed. The experiment results show that the proposed model is able to achieve 19.4 ms/per cost lower V2R communication delay, compared with the average-communication-delay-based model.", "abstracts": [ { "abstractType": "Regular", "content": "This paper deals with the problem of stochastic network calculus-based road side unit (RSU) location optimization at an intersection. Considering the stochasticity of data arrival rate at RSUs and RSU service capacity, the upper bound of vehicle-to-RSU (V2R) communication delay is derived using stochastic network calculus. Further, to hedge against the impact of the randomness of the traffic density on RSU location optimization, the problem is formulated as a two-stage nonlinear mixed-integer stochastic program. The objective function of this program is to minimize the investment cost of RSU location and the expectation of the penalty cost of the V2R communication delay upper bound. In the first stage of the program, the number and location of RSUs are optimized when the traffic density at the intersection is uncertain. In the second stage, when the traffic density is realized, the subareas of the intersection are assigned to the located RSUs to minimize the penalty cost. To find a global optimal solution to the problem, a Benders decomposition algorithm is proposed. The experiment results show that the proposed model is able to achieve 19.4 ms/per cost lower V2R communication delay, compared with the average-communication-delay-based model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper deals with the problem of stochastic network calculus-based road side unit (RSU) location optimization at an intersection. Considering the stochasticity of data arrival rate at RSUs and RSU service capacity, the upper bound of vehicle-to-RSU (V2R) communication delay is derived using stochastic network calculus. Further, to hedge against the impact of the randomness of the traffic density on RSU location optimization, the problem is formulated as a two-stage nonlinear mixed-integer stochastic program. The objective function of this program is to minimize the investment cost of RSU location and the expectation of the penalty cost of the V2R communication delay upper bound. In the first stage of the program, the number and location of RSUs are optimized when the traffic density at the intersection is uncertain. In the second stage, when the traffic density is realized, the subareas of the intersection are assigned to the located RSUs to minimize the penalty cost. To find a global optimal solution to the problem, a Benders decomposition algorithm is proposed. The experiment results show that the proposed model is able to achieve 19.4 ms/per cost lower V2R communication delay, compared with the average-communication-delay-based model.", "fno": "691000a041", "keywords": [ "Costs", "Upper Bound", "Road Side Unit", "Computational Modeling", "Stochastic Processes", "Linear Programming", "Calculus", "Road Side Unit Location", "Communication Delay Bound", "Network Calculus Theory", "Connected Vehicle", "Intersection Control" ], "authors": [ { "affiliation": "Nebula Explore(Shanghai), Technology Co., Ltd.,Shanghai,China", "fullName": "Yinsong Wang", "givenName": "Yinsong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Transportation Engineering,Changsha,China", "fullName": "Yunyi Liang", "givenName": "Yunyi", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Tongji University,Key Laboratory of Road and Traffic Engineering of the Ministry of Education,Shanghai,China", "fullName": "Zhizhou Wu", "givenName": "Zhizhou", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Building Materials Academy of Science Research,Beijing,China", "fullName": "Yuyin Guan", "givenName": "Yuyin", "surname": "Guan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cniot", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "41-49", "year": "2022", "issn": null, "isbn": "978-1-6654-6910-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "691000a034", "articleId": "1EOEfc4lasU", "__typename": "AdjacentArticleType" }, "next": { "fno": "691000a050", "articleId": "1EOEcTT0AVi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waina/2013/4952/0/4952a007", "title": "On Scheduling Real-Time Multi-item Queries in Multi-RSU Vehicular Ad Hoc Networks (VANETs)", "doi": null, "abstractUrl": "/proceedings-article/waina/2013/4952a007/12OmNAnMuKM", "parentPublication": { "id": "proceedings/waina/2013/4952/0", "title": "2013 27th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2016/2461/0/2461a262", "title": "RPA: Road-Side Units Placement Algorithm for Multihop Data Delivery in Vehicular Networks", "doi": null, "abstractUrl": "/proceedings-article/waina/2016/2461a262/12OmNwwMf0t", "parentPublication": { "id": "proceedings/waina/2016/2461/0", "title": "2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2016/8796/0/07425920", "title": "Traffic flow-based roadside unit allocation strategy for VANET", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2016/07425920/12OmNxX3uFx", "parentPublication": { "id": "proceedings/bigcomp/2016/8796/0", "title": "2016 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2012/4652/0/4652a569", "title": "Data Scheduling for Multi-item Requests in Vehicle-Roadside Data Access with Motion Prediction Based Workload Transfer", "doi": null, "abstractUrl": "/proceedings-article/waina/2012/4652a569/12OmNywfKDP", "parentPublication": { "id": "proceedings/waina/2012/4652/0", "title": "2012 26th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit/2018/0385/0/08672687", "title": "Towards the Optimization of Road Side Unit Placement Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/acit/2018/08672687/18IpkQwVsXe", "parentPublication": { "id": "proceedings/acit/2018/0385/0", "title": "2018 International Arab Conference on Information Technology (ACIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a651", "title": "The Time-Extended V2V2I path Prediction Method for Multi-RSU VANET Data Offloading based on the Multi-Access Edge Computing (MEC) Architecture", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a651/1BLnBo4e6ys", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itnac/2022/7103/0/09998406", "title": "Enabling Road Side Units with Optical Access Networks: Planning and Techno-Economic Analysis", "doi": null, "abstractUrl": "/proceedings-article/itnac/2022/09998406/1JGZRW7CYX6", "parentPublication": { "id": "proceedings/itnac/2022/7103/0", "title": "2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2022/9425/0/942500a036", "title": "TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2022/942500a036/1LFLXXoj64E", "parentPublication": { "id": "proceedings/trustcom/2022/9425/0", "title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2019/2999/0/08969669", "title": "Social-aware Mobile Road Side Unit for Content Distribution in Vehicular Social Networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2019/08969669/1h0K1mpkjSM", "parentPublication": { "id": "proceedings/iscc/2019/2999/0", "title": "2019 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2021/4131/0/09651941", "title": "Cooperative Connected Smart Road Infrastructure and Autonomous Vehicles for Safe Driving", "doi": null, "abstractUrl": "/proceedings-article/icnp/2021/09651941/1zHIX3z0vsI", "parentPublication": { "id": "proceedings/icnp/2021/4131/0", "title": "2021 IEEE 29th International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1j9wjOuMtYA", "title": "2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)", "acronym": "msn", "groupId": "1002549", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1j9wn1bHW0w", "doi": "10.1109/MSN48538.2019.00036", "title": "Non-Cooperative Aerial Base Station Placement via Stochastic Optimization", "normalizedTitle": "Non-Cooperative Aerial Base Station Placement via Stochastic Optimization", "abstract": "Autonomous unmanned aerial vehicles (UAVs) with on-board base station equipment can potentially provide connectivity in areas where the terrestrial infrastructure is overloaded, damaged, or absent. Use cases comprise emergency response, wildfire suppression, surveillance, and cellular communications in crowded events to name a few. A central problem to enable this technology is to place such aerial base stations (AirBSs) in locations that approximately optimize the relevant communication metrics. To alleviate the limitations of existing algorithms, which require intensive and reliable communications among AirBSs or between the AirBSs and a central controller, this paper leverages stochastic optimization and machine learning techniques to put forth an adaptive and decentralized algorithm for AirBS placement without inter-AirBS cooperation or communication. The approach relies on a smart design of the network utility function and on a stochastic gradient ascent iteration that can be evaluated with information available in practical scenarios. To complement the theoretical convergence properties, a simulation study corroborates the effectiveness of the proposed scheme.", "abstracts": [ { "abstractType": "Regular", "content": "Autonomous unmanned aerial vehicles (UAVs) with on-board base station equipment can potentially provide connectivity in areas where the terrestrial infrastructure is overloaded, damaged, or absent. Use cases comprise emergency response, wildfire suppression, surveillance, and cellular communications in crowded events to name a few. A central problem to enable this technology is to place such aerial base stations (AirBSs) in locations that approximately optimize the relevant communication metrics. To alleviate the limitations of existing algorithms, which require intensive and reliable communications among AirBSs or between the AirBSs and a central controller, this paper leverages stochastic optimization and machine learning techniques to put forth an adaptive and decentralized algorithm for AirBS placement without inter-AirBS cooperation or communication. The approach relies on a smart design of the network utility function and on a stochastic gradient ascent iteration that can be evaluated with information available in practical scenarios. To complement the theoretical convergence properties, a simulation study corroborates the effectiveness of the proposed scheme.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Autonomous unmanned aerial vehicles (UAVs) with on-board base station equipment can potentially provide connectivity in areas where the terrestrial infrastructure is overloaded, damaged, or absent. Use cases comprise emergency response, wildfire suppression, surveillance, and cellular communications in crowded events to name a few. A central problem to enable this technology is to place such aerial base stations (AirBSs) in locations that approximately optimize the relevant communication metrics. To alleviate the limitations of existing algorithms, which require intensive and reliable communications among AirBSs or between the AirBSs and a central controller, this paper leverages stochastic optimization and machine learning techniques to put forth an adaptive and decentralized algorithm for AirBS placement without inter-AirBS cooperation or communication. The approach relies on a smart design of the network utility function and on a stochastic gradient ascent iteration that can be evaluated with information available in practical scenarios. To complement the theoretical convergence properties, a simulation study corroborates the effectiveness of the proposed scheme.", "fno": "521200a131", "keywords": [ "Autonomous Aerial Vehicles", "Gradient Methods", "Learning Artificial Intelligence", "Mobile Robots", "Multi Robot Systems", "Optimisation", "Stochastic Processes", "Noncooperative Aerial Base Station Placement", "Autonomous Unmanned Aerial Vehicles", "On Board Base Station Equipment", "Terrestrial Infrastructure", "Emergency Response", "Wildfire Suppression", "Cellular Communications", "Crowded Events", "Aerial Base Stations", "Air B Ss", "Relevant Communication Metrics", "Intensive Communications", "Central Controller", "Stochastic Optimization", "Adaptive Algorithm", "Decentralized Algorithm", "Air BS Placement", "Stochastic Gradient Ascent Iteration", "Optimization", "Base Stations", "Atmospheric Modeling", "Quality Of Service", "Stochastic Processes", "Real Time Systems", "Measurement", "Aerial Communications", "Unmanned Aerial Vehicles", "Aerial Base Stations", "Stochastic Optimization", "Stochastic Gradient", "Autonomous Aerial Vehicles" ], "authors": [ { "affiliation": "University of Agder, Norway", "fullName": "Daniel Romero", "givenName": "Daniel", "surname": "Romero", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Delft, The Netherlands", "fullName": "Geert Leus", "givenName": "Geert", "surname": "Leus", "__typename": "ArticleAuthorType" } ], "idPrefix": "msn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "131-136", "year": "2019", "issn": null, "isbn": "978-1-7281-5212-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "521200a125", "articleId": "1j9wlasDNvO", "__typename": "AdjacentArticleType" }, "next": { "fno": "521200a137", "articleId": "1j9wk4ojLAA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icvisp/2017/0612/0/0612a103", "title": "Aerial Base Stations for Enabling Cellular Communications during Emergency Situation", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2017/0612a103/12OmNqJ8tvK", "parentPublication": { "id": "proceedings/icvisp/2017/0612/0", "title": "2017 International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2012/06/06156771", "title": "Spatial SINR Games of Base Station Placement and Mobile Association", "doi": null, "abstractUrl": "/journal/nt/2012/06/06156771/13rRUwInvce", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2014/05/06637095", "title": "A Unified Stochastic Model of Handover Measurement in Mobile Networks", "doi": null, "abstractUrl": "/journal/nt/2014/05/06637095/13rRUytF46I", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2019/9223/0/08685518", "title": "Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework", "doi": null, "abstractUrl": "/proceedings-article/icnc/2019/08685518/19RRQslvLc4", "parentPublication": { "id": "proceedings/icnc/2019/9223/0", "title": "2019 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2019/9223/0/08685498", "title": "Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry", "doi": null, "abstractUrl": "/proceedings-article/icnc/2019/08685498/19RRT6frnNK", "parentPublication": { "id": "proceedings/icnc/2019/9223/0", "title": "2019 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2019/1246/0/124600a708", "title": "mmWave Wireless Backhaul Scheduling of Stochastic Packet Arrivals", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2019/124600a708/1cYhOXgbgTC", "parentPublication": { "id": "proceedings/ipdps/2019/1246/0", "title": "2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/netsys/2019/0568/0/08854490", "title": "Efficiency vs. Accuracy of Aerial Base Station Placement", "doi": null, "abstractUrl": "/proceedings-article/netsys/2019/08854490/1dPoJJ89fAQ", "parentPublication": { "id": "proceedings/netsys/2019/0568/0", "title": "2019 International Conference on Networked Systems (NetSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2019/2519/0/251900a431", "title": "Non-stationary Stochastic Network Optimization with Imperfect Estimations", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2019/251900a431/1ezRLfetlug", "parentPublication": { "id": "proceedings/icdcs/2019/2519/0", "title": "2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2019/2629/0/262900a075", "title": "Service Stochastic Optimization with Energy Constraint Over UAV-Assisted Network", "doi": null, "abstractUrl": "/proceedings-article/nana/2019/262900a075/1i2o7Dt3lcI", "parentPublication": { "id": "proceedings/nana/2019/2629/0", "title": "2019 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wowmom/2020/7374/0/737400a329", "title": "SkyCell: A Prototyping Platform for 5G Aerial Base Stations", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2020/737400a329/1nMQAVB76ko", "parentPublication": { "id": "proceedings/wowmom/2020/7374/0", "title": "2020 IEEE 21st International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs0C9QC", "title": "2016 International Symposium on Computer, Consumer and Control (IS3C)", "acronym": "is3c", "groupId": "1801670", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAnuTpA", "doi": "10.1109/IS3C.2016.219", "title": "Salience Feature Detection for Polygonal Meshes Based on Maximum Normal Variation", "normalizedTitle": "Salience Feature Detection for Polygonal Meshes Based on Maximum Normal Variation", "abstract": "Feature detection or extraction for polygon mesh is one of the most fundamental and extensively used techniques. Applications such as mesh simplification, smoothing, parameterization, segmentation, morphing, and shape matching, etc. requires feature detection. A common technique is to identify the edge features through the dihedral angles of the two neighbouring faces adjacent to the edge. In this paper, we propose a variation of such technique that identifies feature vertices by considering the maximum normal variation of the neighbouring faces in the 1-ring neighbourhood of a vertex. By clustering and labelling the feature vertices, we may successfully identify the features of a given object as disjoint cluster of feature vertices. By means of Shortest Path or Spanning Tree with proper weighting scheme, we may further process each cluster as a feature curve that potentially enables a cut to the mesh.", "abstracts": [ { "abstractType": "Regular", "content": "Feature detection or extraction for polygon mesh is one of the most fundamental and extensively used techniques. Applications such as mesh simplification, smoothing, parameterization, segmentation, morphing, and shape matching, etc. requires feature detection. A common technique is to identify the edge features through the dihedral angles of the two neighbouring faces adjacent to the edge. In this paper, we propose a variation of such technique that identifies feature vertices by considering the maximum normal variation of the neighbouring faces in the 1-ring neighbourhood of a vertex. By clustering and labelling the feature vertices, we may successfully identify the features of a given object as disjoint cluster of feature vertices. By means of Shortest Path or Spanning Tree with proper weighting scheme, we may further process each cluster as a feature curve that potentially enables a cut to the mesh.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Feature detection or extraction for polygon mesh is one of the most fundamental and extensively used techniques. Applications such as mesh simplification, smoothing, parameterization, segmentation, morphing, and shape matching, etc. requires feature detection. A common technique is to identify the edge features through the dihedral angles of the two neighbouring faces adjacent to the edge. In this paper, we propose a variation of such technique that identifies feature vertices by considering the maximum normal variation of the neighbouring faces in the 1-ring neighbourhood of a vertex. By clustering and labelling the feature vertices, we may successfully identify the features of a given object as disjoint cluster of feature vertices. By means of Shortest Path or Spanning Tree with proper weighting scheme, we may further process each cluster as a feature curve that potentially enables a cut to the mesh.", "fno": "3071a862", "keywords": [ "Feature Extraction", "Three Dimensional Displays", "Clustering Algorithms", "Image Edge Detection", "Design Automation", "Computers", "Geometry", "Mesh Cut", "Feature Detection", "Feature Extraction", "Dihedral Angle" ], "authors": [ { "affiliation": null, "fullName": "Hung-Kuang Chen", "givenName": "Hung-Kuang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying-Chuan Chen", "givenName": "Ying-Chuan", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "is3c", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "862-865", "year": "2016", "issn": null, "isbn": "978-1-5090-3071-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3071a858", "articleId": "12OmNxxdZMr", "__typename": "AdjacentArticleType" }, "next": { "fno": "3071a866", "articleId": "12OmNBghtrL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgi/2004/2171/0/21710018", "title": "Consistent Normal Orientation for Polygonal Meshes", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710018/12OmNC4eSER", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1999/5897/0/58970012", "title": "Efficient Compression of Non-Manifold Polygonal Meshes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1999/58970012/12OmNvlg8mc", "parentPublication": { "id": "proceedings/ieee-vis/1999/5897/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/2000/0683/0/06830154", "title": "Accurate Collision Response on Polygonal Meshes", "doi": null, "abstractUrl": "/proceedings-article/ca/2000/06830154/12OmNxE2mZO", "parentPublication": { "id": "proceedings/ca/2000/0683/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2004/2234/0/22340087", "title": "Snaking Across 3D Meshes", "doi": null, "abstractUrl": "/proceedings-article/pg/2004/22340087/12OmNz5JCgx", "parentPublication": { "id": "proceedings/pg/2004/2234/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2001/7200/0/7200ho", "title": "Compressing Large Polygonal Models", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2001/7200ho/12OmNz5s0IG", "parentPublication": { "id": "proceedings/ieee-vis/2001/7200/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2006/2754/0/27540355", "title": "Subdivision Interpolating Polygonization of Implicit Surfaces with Normal Meshes", "doi": null, "abstractUrl": "/proceedings-article/icat/2006/27540355/12OmNzBwGxn", "parentPublication": { "id": "proceedings/icat/2006/2754/0", "title": "16th International Conference on Artificial Reality and Telexistence--Workshops (ICAT'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smi/2001/0853/0/08530216", "title": "Modeling Subdivision Control Meshes for Creating Cartoon Faces", "doi": null, "abstractUrl": "/proceedings-article/smi/2001/08530216/12OmNzSyCf1", "parentPublication": { "id": "proceedings/smi/2001/0853/0", "title": "Shape Modeling and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2003/7965/3/7965105", "title": "3D polygonal meshes watermarking using normal vector distributions", "doi": null, "abstractUrl": "/proceedings-article/icme/2003/7965105/12OmNzuZUtX", "parentPublication": { "id": "proceedings/icme/2003/7965/2", "title": "2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/01/ttg2013010045", "title": "Linear Correlations between Spatial and Normal Noise in Triangle Meshes", "doi": null, "abstractUrl": "/journal/tg/2013/01/ttg2013010045/13rRUxASuGj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/03/08851293", "title": "Graph-Based Feature-Preserving Mesh Normal Filtering", "doi": null, "abstractUrl": "/journal/tg/2021/03/08851293/1dFoE6WFT2g", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzSh1aC", "title": "2012 Third International Conference on Digital Manufacturing & Automation", "acronym": "icdma", "groupId": "1800272", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNB836JO", "doi": "10.1109/ICDMA.2012.238", "title": "Virtual-Joints-Based Error Compensating Algorithms for the Manipulator of Tunnel Rock-Drilling Robot", "normalizedTitle": "Virtual-Joints-Based Error Compensating Algorithms for the Manipulator of Tunnel Rock-Drilling Robot", "abstract": "Tests showed that large position and pose errors would generate during the boring orientation of Rock-drilling robot, due to kinematic pairs clearances, flexibility, sensor errors, control errors and other algorithmic errors. As it's difficult to predict and compensate orientation errors by Denavit-Hartenberg method, the concept of virtual joints is introduced in this paper. The position and pose error is virtualized to be a rigid joint transformation, which make it simplified to formulate the transformation matrix, and the satisfactory results have been obtained.", "abstracts": [ { "abstractType": "Regular", "content": "Tests showed that large position and pose errors would generate during the boring orientation of Rock-drilling robot, due to kinematic pairs clearances, flexibility, sensor errors, control errors and other algorithmic errors. As it's difficult to predict and compensate orientation errors by Denavit-Hartenberg method, the concept of virtual joints is introduced in this paper. The position and pose error is virtualized to be a rigid joint transformation, which make it simplified to formulate the transformation matrix, and the satisfactory results have been obtained.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tests showed that large position and pose errors would generate during the boring orientation of Rock-drilling robot, due to kinematic pairs clearances, flexibility, sensor errors, control errors and other algorithmic errors. As it's difficult to predict and compensate orientation errors by Denavit-Hartenberg method, the concept of virtual joints is introduced in this paper. The position and pose error is virtualized to be a rigid joint transformation, which make it simplified to formulate the transformation matrix, and the satisfactory results have been obtained.", "fno": "4772b018", "keywords": [ "Manipulators", "Joints", "Robot Kinematics", "Error Compensation", "Robot Sensing Systems", "Kinematics", "Error Compensation", "Tunnel Rock Drilling Robot", "Manipulator", "Virtual Joints" ], "authors": [ { "affiliation": null, "fullName": "Xie Xihua", "givenName": "Xie", "surname": "Xihua", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhou Liang", "givenName": "Zhou", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "He Qinghua", "givenName": "He", "surname": "Qinghua", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "1018-1020", "year": "2012", "issn": null, "isbn": "978-1-4673-2217-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4772b014", "articleId": "12OmNvDZEVy", "__typename": "AdjacentArticleType" }, "next": { "fno": "4772b021", "articleId": "12OmNzT7OpJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crc/2017/0677/0/0677a012", "title": "Kinematic Analysis and Trajectory Planning for Serial Robot in Hazardous Biochemical Treatment", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a012/12OmNxGAL6D", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2012/0701/0/06237747", "title": "Hexapod robot locomotion over typical obstacles", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2012/06237747/12OmNxxNbOD", "parentPublication": { "id": "proceedings/aqtr/2012/0701/0", "title": "International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rvsp/2011/4581/0/4581a065", "title": "4-Axis Robot Design and Simulation Based on SimulationX", "doi": null, "abstractUrl": "/proceedings-article/rvsp/2011/4581a065/12OmNyuPL2v", "parentPublication": { "id": "proceedings/rvsp/2011/4581/0", "title": "International Conference on Robot, Vision and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2011/4455/0/4455a681", "title": "Kinematics Modeling and Real-Time Seam Tracking for Welding Mobile Robot", "doi": null, "abstractUrl": "/proceedings-article/icdma/2011/4455a681/12OmNywfKEV", "parentPublication": { "id": "proceedings/icdma/2011/4455/0", "title": "2011 Second International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a157", "title": "Robotic Arm Motion for Verifying Signatures", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a157/17D45VW8bqy", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a134", "title": "A Model Conversion Algorithm from URDF to DH for Camera Robot", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a134/1H2pflxjZ3W", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a518", "title": "Inverse Kinematics Solution of Programmable Universal Machine for Assembly (PUMA) Robot", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a518/1j9xDfh6Ip2", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiea/2020/8288/0/828800a221", "title": "A New Calibration Method and Experimental Study for Kinematic Parameters of Industrial Robot", "doi": null, "abstractUrl": "/proceedings-article/aiea/2020/828800a221/1nTujuSYAsE", "parentPublication": { "id": "proceedings/aiea/2020/8288/0", "title": "2020 International Conference on Artificial Intelligence and Electromechanical Automation (AIEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isctt/2020/8575/0/857500a331", "title": "The Kinematics Algorithm of a Ship Gun Large-load Redundant Magazine Robot", "doi": null, "abstractUrl": "/proceedings-article/isctt/2020/857500a331/1rHeQkHiPn2", "parentPublication": { "id": "proceedings/isctt/2020/8575/0", "title": "2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeas/2021/9768/0/976800a165", "title": "Mechanical Design of a Novel 4DOF Serial Manipulator", "doi": null, "abstractUrl": "/proceedings-article/icmeas/2021/976800a165/1zuuS7JLRxS", "parentPublication": { "id": "proceedings/icmeas/2021/9768/0", "title": "2021 7th International Conference on Mechanical Engineering and Automation Science (ICMEAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzV70Jl", "title": "Proceedings of IEEE Workshop on Biomedical Image Analysis", "acronym": "bia", "groupId": "1000079", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNrYCY1g", "doi": "10.1109/BIA.1994.315871", "title": "The extremal mesh and the understanding of 3D surfaces", "normalizedTitle": "The extremal mesh and the understanding of 3D surfaces", "abstract": "Describes a new concept for the description of 3D smooth surfaces: the extremal mesh. In previous works, the author has shown how to extract the extremal lines from 3D images, which are the lines where one of the two principal surface curvatures is locally extremal. He has also shown how to extract the extremal points, which are specific points where the two principal curvatures are both extremal. The extremal mesh is the graph of the surface whose vertices are the extremal points and whose edges are the extremal lines: it is invariant with respect to rigid transforms. The good topological properties of this graph are ensured with a new local geometric invariant of 3D surfaces, that the author calls the Gaussian extremality, and which allows to overcome orientation problems encountered with previous definitions of the extremal lines and points. The author also presents an algorithm to extract the extremal mesh from 3D images, and experiments with synthetic and real 3D medical images showing that this graph can be extremely precise and stable. The extremal mesh and the Gaussian extremality are new insights into the geometrical nature of 3D surfaces, with many promising consequences, some of which are listed here.<>", "abstracts": [ { "abstractType": "Regular", "content": "Describes a new concept for the description of 3D smooth surfaces: the extremal mesh. In previous works, the author has shown how to extract the extremal lines from 3D images, which are the lines where one of the two principal surface curvatures is locally extremal. He has also shown how to extract the extremal points, which are specific points where the two principal curvatures are both extremal. The extremal mesh is the graph of the surface whose vertices are the extremal points and whose edges are the extremal lines: it is invariant with respect to rigid transforms. The good topological properties of this graph are ensured with a new local geometric invariant of 3D surfaces, that the author calls the Gaussian extremality, and which allows to overcome orientation problems encountered with previous definitions of the extremal lines and points. The author also presents an algorithm to extract the extremal mesh from 3D images, and experiments with synthetic and real 3D medical images showing that this graph can be extremely precise and stable. The extremal mesh and the Gaussian extremality are new insights into the geometrical nature of 3D surfaces, with many promising consequences, some of which are listed here.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Describes a new concept for the description of 3D smooth surfaces: the extremal mesh. In previous works, the author has shown how to extract the extremal lines from 3D images, which are the lines where one of the two principal surface curvatures is locally extremal. He has also shown how to extract the extremal points, which are specific points where the two principal curvatures are both extremal. The extremal mesh is the graph of the surface whose vertices are the extremal points and whose edges are the extremal lines: it is invariant with respect to rigid transforms. The good topological properties of this graph are ensured with a new local geometric invariant of 3D surfaces, that the author calls the Gaussian extremality, and which allows to overcome orientation problems encountered with previous definitions of the extremal lines and points. The author also presents an algorithm to extract the extremal mesh from 3D images, and experiments with synthetic and real 3D medical images showing that this graph can be extremely precise and stable. The extremal mesh and the Gaussian extremality are new insights into the geometrical nature of 3D surfaces, with many promising consequences, some of which are listed here.", "fno": "00315871", "keywords": [ "Medical Image Processing", "Surface Topography", "Extremal Mesh", "3 D Surfaces Understanding", "3 D Smooth Surfaces", "Principal Surface Curvatures", "Extremal Points Extraction", "Rigid Transforms", "Gaussian Extremality", "Orientation Problems", "Algorithm", "Surface Geometry", "Medical Image Analysis", "Topology", "Geometry", "Polynomials", "Piecewise Linear Techniques", "Face Detection", "Data Mining", "Biomedical Imaging", "Computer Graphics", "Computer Vision", "Spline" ], "authors": [ { "affiliation": "Inst. National de Recherche d'Informatique et d'Auto, Sophia Antipolis, France", "fullName": "J.-P. Thirion", "givenName": "J.-P.", "surname": "Thirion", "__typename": "ArticleAuthorType" } ], "idPrefix": "bia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "3,4,5,6,7,8,9,10,11,12", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00315870", "articleId": "12OmNAoDibx", "__typename": "AdjacentArticleType" }, "next": { "fno": "00315872", "articleId": "12OmNqJ8tp5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1998/9176/0/91760095", "title": "Extremal Feature Extraction from 3-D Vector and Noisy Scalar Fields", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760095/12OmNAhxjBS", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2010/4222/0/4222a110", "title": "A Visually Enhanced Approach to Watermarking 3D Models", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2010/4222a110/12OmNAlvHQz", "parentPublication": { "id": "proceedings/iih-msp/2010/4222/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a119", "title": "The Spherical Images of Triangular Mesh Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323795", "title": "Extremal points: definition and application to 3D image registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323795/12OmNy3iFw6", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2003/1900/2/190020027", "title": "Perception-based 3D Triangle Mesh Segmentation Using Fast Marching Watersheds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2003/190020027/12OmNyL0Tjh", "parentPublication": { "id": "proceedings/cvpr/2003/1900/2", "title": "2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2007/1630/0/04409163", "title": "Type-Constrained Robust Fitting of Quadrics with Application to the 3D Morphological Characterization of Saddle-Shaped Articular Surfaces", "doi": null, "abstractUrl": "/proceedings-article/iccv/2007/04409163/12OmNzahc5h", "parentPublication": { "id": "proceedings/iccv/2007/1630/0", "title": "2007 11th IEEE International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2011/707/0/05753118", "title": "The video mesh: A data structure for image-based three-dimensional video editing", "doi": null, "abstractUrl": "/proceedings-article/iccp/2011/05753118/12OmNzzP5CW", "parentPublication": { "id": "proceedings/iccp/2011/707/0", "title": "IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2006/05/c5081", "title": "Water Wave Animation on Mesh Surfaces", "doi": null, "abstractUrl": "/magazine/cs/2006/05/c5081/13rRUwkfAUs", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d907", "title": "Neural 3D Mesh Renderer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d907/17D45WHONlu", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c950", "title": "Understanding Deep Networks via Extremal Perturbations and Smooth Masks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c950/1hVlyRMVCbC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBgQFLV", "title": "2008 8th IEEE International Symposium on Signal Processing and Information Technology. ISSPIT 2008", "acronym": "isspit", "groupId": "1001026", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNviHKdA", "doi": "10.1109/ISSPIT.2008.4775699", "title": "Triangular Mesh Geometry Coding with Multiresolution Decomposition Based on Structuring of Surrounding Vertices", "normalizedTitle": "Triangular Mesh Geometry Coding with Multiresolution Decomposition Based on Structuring of Surrounding Vertices", "abstract": "In this paper, we propose a new polygonal mesh geometry coding scheme based on a process of structuring by acquiring surrounding vertices of the polygonal mesh one layer at a time. The structuring process begins by selecting the start vertex and proceeding by acquiring surrounding vertices of the polygonal mesh. As a result, we obtain a 2-D structured vertex table. Structured geometry data are generated according to the structured vertices and encoded by a multiresolution decomposition and space frequency quantization coding method. In our proposed scheme, the multiresolution decomposition uses the connectivity of the polygonal mesh. In addition, with a space frequency quantization coding scheme, we can reduce redundancies of decomposed coefficients at similar positions in different components of decomposition level. Experimental results show that the proposed scheme gives better coding performance at lower bit-rates than the usual schemes.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a new polygonal mesh geometry coding scheme based on a process of structuring by acquiring surrounding vertices of the polygonal mesh one layer at a time. The structuring process begins by selecting the start vertex and proceeding by acquiring surrounding vertices of the polygonal mesh. As a result, we obtain a 2-D structured vertex table. Structured geometry data are generated according to the structured vertices and encoded by a multiresolution decomposition and space frequency quantization coding method. In our proposed scheme, the multiresolution decomposition uses the connectivity of the polygonal mesh. In addition, with a space frequency quantization coding scheme, we can reduce redundancies of decomposed coefficients at similar positions in different components of decomposition level. Experimental results show that the proposed scheme gives better coding performance at lower bit-rates than the usual schemes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a new polygonal mesh geometry coding scheme based on a process of structuring by acquiring surrounding vertices of the polygonal mesh one layer at a time. The structuring process begins by selecting the start vertex and proceeding by acquiring surrounding vertices of the polygonal mesh. As a result, we obtain a 2-D structured vertex table. Structured geometry data are generated according to the structured vertices and encoded by a multiresolution decomposition and space frequency quantization coding method. In our proposed scheme, the multiresolution decomposition uses the connectivity of the polygonal mesh. In addition, with a space frequency quantization coding scheme, we can reduce redundancies of decomposed coefficients at similar positions in different components of decomposition level. Experimental results show that the proposed scheme gives better coding performance at lower bit-rates than the usual schemes.", "fno": "04775699", "keywords": [ "Computational Geometry", "Mesh Generation", "Quantisation Signal", "Polygonal Mesh Geometry Coding Scheme", "Triangular Mesh Geometry Coding", "Multiresolution Decomposition", "Surrounding Vertex Structuring", "2 D Structured Vertex Table", "Structured Geometry Data", "Space Frequency Quantization Coding Method", "Geometry", "Space Technology", "Frequency", "Quantization", "Mesh Generation", "Redundancy", "Predictive Coding", "Approximation Error", "Transform Coding", "Application Software", "Polygonal Mesh", "Multiresolution Decomposition", "Encoding Of Geometry Data", "Structuring Of Surrounding Vertices" ], "authors": [ { "affiliation": "Department of Electrical and Electronics Engineering, Faculty of Science and Technology, Sophia University 7-1, Kioicho, Chiyoda-ku, Tokyo 102-8554, Japan", "fullName": "Shuji Watanabe", "givenName": "Shuji", "surname": "Watanabe", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Electronics Engineering, Faculty of Science and Technology, Sophia University 7-1, Kioicho, Chiyoda-ku, Tokyo 102-8554, Japan", "fullName": "Akira Kawanaka", "givenName": "Akira", "surname": "Kawanaka", "__typename": "ArticleAuthorType" } ], "idPrefix": "isspit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "2162-7843", "isbn": "978-1-4244-3554-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04775698", "articleId": "12OmNvTjZZX", "__typename": "AdjacentArticleType" }, "next": { "fno": "04775700", "articleId": "12OmNCeK2gS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isspit/2005/9313/0/01577109", "title": "Permuting and lifting wavelet coding for arbitrarily-shaped data with expanded nodes", "doi": null, "abstractUrl": "/proceedings-article/isspit/2005/01577109/12OmNAXxX1B", "parentPublication": { "id": "proceedings/isspit/2005/9313/0", "title": "2005 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2004/2051/1/205110549", "title": "A Mesh-based Multiple Description Coding Method for Network Video", "doi": null, "abstractUrl": "/proceedings-article/aina/2004/205110549/12OmNBRbksE", "parentPublication": { "id": "proceedings/aina/2004/2051/1", "title": "18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2012/5606/0/06621263", "title": "Compression of structured 3-D model geometry with multiresolution decomposition by decoded coefficient prediction", "doi": null, "abstractUrl": "/proceedings-article/isspit/2012/06621263/12OmNqHqSBe", "parentPublication": { "id": "proceedings/isspit/2012/5606/0", "title": "2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498isenburg", "title": "Compressing Polygon Mesh Geometry with Parallelogram Prediction", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498isenburg/12OmNroijmR", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1999/5897/0/58970012", "title": "Efficient Compression of Non-Manifold Polygonal Meshes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1999/58970012/12OmNvlg8mc", "parentPublication": { "id": "proceedings/ieee-vis/1999/5897/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780057", "title": "Geometric Compression for Interactive Transmission", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780057/12OmNwMFMki", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2000/0868/0/08680235", "title": "Efficient Coding of Non-Triangular Mesh Connectivity", "doi": null, "abstractUrl": "/proceedings-article/pg/2000/08680235/12OmNwdtwaQ", "parentPublication": { "id": "proceedings/pg/2000/0868/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1999/0096/0/00960247", "title": "Single Resolution Compression of Arbitrary Triangular Meshes with Properties", "doi": null, "abstractUrl": "/proceedings-article/dcc/1999/00960247/12OmNxV4iAw", "parentPublication": { "id": "proceedings/dcc/1999/0096/0", "title": "Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmp/2004/2078/0/20780153", "title": "Triangular/Quadrilateral Remeshing of an Arbitrary Polygonal Surface via Packing Bubbles", "doi": null, "abstractUrl": "/proceedings-article/gmp/2004/20780153/12OmNzyGH6F", "parentPublication": { "id": "proceedings/gmp/2004/2078/0", "title": "Geometric Modeling and Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2000/02/mcg2000020062", "title": "Metamorphosis of Arbitrary Triangular Meshes", "doi": null, "abstractUrl": "/magazine/cg/2000/02/mcg2000020062/13rRUNvyanl", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBk6z", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "acronym": "icccnt", "groupId": "1802177", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyvY9C1", "doi": "10.1109/ICCCNT.2014.6963013", "title": "Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map", "normalizedTitle": "Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map", "abstract": "In this paper, we implement human activity tracking and recognition system utilizing body joints features using depth maps. During HAR settings, depth maps are processed to track human silhouettes by considering temporal continuity constraints of human motion information and compute centroids for each activity based on contour generation. In body joints features, depth silhouettes are computed first through geodesic distance to identify anatomical landmarks which produce joint points information from specific body parts. Then, body joints are processed to produce centroid distance features and key joints distance features. Finally, Self-Organized Map (SOM) is employed to train and recognize different human activities from the features. Experimental results show that body joints features achieved high recognition rate over the conventional features. The proposed system should be applicable as e-healthcare systems for monitoring elderly people, surveillance systems for observing pedestrian traffic areas and indoor environment systems which recognize activities of multiple users.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we implement human activity tracking and recognition system utilizing body joints features using depth maps. During HAR settings, depth maps are processed to track human silhouettes by considering temporal continuity constraints of human motion information and compute centroids for each activity based on contour generation. In body joints features, depth silhouettes are computed first through geodesic distance to identify anatomical landmarks which produce joint points information from specific body parts. Then, body joints are processed to produce centroid distance features and key joints distance features. Finally, Self-Organized Map (SOM) is employed to train and recognize different human activities from the features. Experimental results show that body joints features achieved high recognition rate over the conventional features. The proposed system should be applicable as e-healthcare systems for monitoring elderly people, surveillance systems for observing pedestrian traffic areas and indoor environment systems which recognize activities of multiple users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we implement human activity tracking and recognition system utilizing body joints features using depth maps. During HAR settings, depth maps are processed to track human silhouettes by considering temporal continuity constraints of human motion information and compute centroids for each activity based on contour generation. In body joints features, depth silhouettes are computed first through geodesic distance to identify anatomical landmarks which produce joint points information from specific body parts. Then, body joints are processed to produce centroid distance features and key joints distance features. Finally, Self-Organized Map (SOM) is employed to train and recognize different human activities from the features. Experimental results show that body joints features achieved high recognition rate over the conventional features. The proposed system should be applicable as e-healthcare systems for monitoring elderly people, surveillance systems for observing pedestrian traffic areas and indoor environment systems which recognize activities of multiple users.", "fno": "06963013", "keywords": [ "Joints", "Feature Extraction", "Conferences", "Training", "Smart Homes", "Legged Locomotion", "Human Activity Recognition HAR", "Human Tracking", "Depth Maps", "Body Joints Features", "Computer Vision" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea", "fullName": "Ahmad Jalal", "givenName": "Ahmad", "surname": "Jalal", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electronics and Radio Engineering, Kyung Hee University, Gyeonggi-do, Republic of Korea", "fullName": "S. Kamal", "givenName": "S.", "surname": "Kamal", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, POSTECH, Gyengbuk, Republic of Korea", "fullName": "Daijin Kim", "givenName": "Daijin", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "icccnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2014", "issn": null, "isbn": "978-1-4799-2696-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06963012", "articleId": "12OmNyr8YbR", "__typename": "AdjacentArticleType" }, "next": { "fno": "06963014", "articleId": "12OmNyQph9H", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciev/2015/6902/0/07334030", "title": "Human daily activity recognition with joints plus body features representation using Kinect sensor", "doi": null, "abstractUrl": "/proceedings-article/iciev/2015/07334030/12OmNAYGlD7", "parentPublication": { "id": "proceedings/iciev/2015/6902/0", "title": "2015 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2014/4677/0/4677a285", "title": "Human Identification Using Sensors Data Based on 3D Gait Area", "doi": null, "abstractUrl": "/proceedings-article/cw/2014/4677a285/12OmNAZOK1U", "parentPublication": { "id": "proceedings/cw/2014/4677/0", "title": "2014 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2006/0366/0/04036780", "title": "Tracking of Human Body Joints using Anthropometry", "doi": null, "abstractUrl": "/proceedings-article/icme/2006/04036780/12OmNBJeyL7", "parentPublication": { "id": "proceedings/icme/2006/0366/0", "title": "2006 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2014/7434/0/7434a185", "title": "Action Recognition Using Local Joints Structure and Histograms of 3D Joints", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a185/12OmNviZlMW", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2014/4435/0/4435a221", "title": "Capturing Human Body Dynamics Using RNN Based on Persistent Excitation Data Generator", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a221/12OmNvzJG5f", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2014/4871/0/06918647", "title": "Real-time life logging via a depth silhouette-based human activity recognition system for smart home services", "doi": null, "abstractUrl": "/proceedings-article/avss/2014/06918647/12OmNzICED1", "parentPublication": { "id": "proceedings/avss/2014/4871/0", "title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/06963015", "title": "Ridge body parts features for human pose estimation and recognition from RGB-D video data", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/06963015/12OmNzsrwqP", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2018/5889/0/08441030", "title": "Human Body Model using Multiple Depth Camera for Gait Analysis", "doi": null, "abstractUrl": "/proceedings-article/snpd/2018/08441030/13bd1eSlytO", "parentPublication": { "id": "proceedings/snpd/2018/5889/0", "title": "2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/12/ttp2013122821", "title": "Efficient Human Pose Estimation from Single Depth Images", "doi": null, "abstractUrl": "/journal/tp/2013/12/ttp2013122821/13rRUwbs229", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a909", "title": "Gait Recognition Using 3-D Human Body Shape Inference", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a909/1L6Lyjdm396", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZf", "title": "Computer Vision, IEEE International Conference on", "acronym": "iccv", "groupId": "1000149", "volume": "1", "displayVolume": "1", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNAWYKHh", "doi": "10.1109/ICCV.2005.51", "title": "BRDF Invariant Stereo Using Light Transport Constancy", "normalizedTitle": "BRDF Invariant Stereo Using Light Transport Constancy", "abstract": "Nearly all existing methods for stereo reconstruction assume that scene reflectance is Lambertian, and make use of color constancy as a matching invariant. We introduce a new invariant for stereo reconstruction called Light Transport Constancy, which allows completely arbitrary scene reflectance (BRDFs). This invariant can be used to formulate a rank constraint on multiview stereo matching when the scene is observed in several lighting configurations. In addition, we show that this multiview constraint can be used with as few as two cameras and two lighting configurations. Unlikely previous methods for BRDF invariant stereo, Light Transport Constancy does not require precisely configured or calibrated light sources, nor calibration objects in the scene. Importantly, the new constraint can be used to provide BRDF invariance to any existing stereo method, whenever appropriate lighting variation is available.", "abstracts": [ { "abstractType": "Regular", "content": "Nearly all existing methods for stereo reconstruction assume that scene reflectance is Lambertian, and make use of color constancy as a matching invariant. We introduce a new invariant for stereo reconstruction called Light Transport Constancy, which allows completely arbitrary scene reflectance (BRDFs). This invariant can be used to formulate a rank constraint on multiview stereo matching when the scene is observed in several lighting configurations. In addition, we show that this multiview constraint can be used with as few as two cameras and two lighting configurations. Unlikely previous methods for BRDF invariant stereo, Light Transport Constancy does not require precisely configured or calibrated light sources, nor calibration objects in the scene. Importantly, the new constraint can be used to provide BRDF invariance to any existing stereo method, whenever appropriate lighting variation is available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nearly all existing methods for stereo reconstruction assume that scene reflectance is Lambertian, and make use of color constancy as a matching invariant. We introduce a new invariant for stereo reconstruction called Light Transport Constancy, which allows completely arbitrary scene reflectance (BRDFs). This invariant can be used to formulate a rank constraint on multiview stereo matching when the scene is observed in several lighting configurations. In addition, we show that this multiview constraint can be used with as few as two cameras and two lighting configurations. Unlikely previous methods for BRDF invariant stereo, Light Transport Constancy does not require precisely configured or calibrated light sources, nor calibration objects in the scene. Importantly, the new constraint can be used to provide BRDF invariance to any existing stereo method, whenever appropriate lighting variation is available.", "fno": "23340436", "keywords": [], "authors": [ { "affiliation": "University of California at Santa Cruz", "fullName": "James E. Davis", "givenName": "James E.", "surname": "Davis", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kentucky", "fullName": "Ruigang Yang", "givenName": "Ruigang", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kentucky", "fullName": "Liang Wang", "givenName": "Liang", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-10-01T00:00:00", "pubType": "proceedings", "pages": "436-443", "year": "2005", "issn": "1550-5499", "isbn": "0-7695-2334-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23340428", "articleId": "12OmNAk5HQ3", "__typename": "AdjacentArticleType" }, "next": { "fno": "23340446", "articleId": "12OmNy68EAx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dicta/2010/4271/0/4271a441", "title": "Color Constancy-Based Visibility Enhancement in Low-Light Conditions", "doi": null, "abstractUrl": "/proceedings-article/dicta/2010/4271a441/12OmNrMHOb8", "parentPublication": { "id": "proceedings/dicta/2010/4271/0", "title": "2010 International Conference on Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420480", "title": "Recognizing 3D objects using photometric invariant", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420480/12OmNvDZF1L", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/00937524", "title": "Color constancy using KL-divergence", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/00937524/12OmNxTmHMN", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457a578", "title": "Robust Energy Minimization for BRDF-Invariant Shape from Light Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457a578/12OmNxdDFFd", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/114310239", "title": "Color Constancy Using KL-Divergence", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/114310239/12OmNyU63sJ", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2013/4989/0/4989c523", "title": "What Object Motion Reveals about Shape with Unknown BRDF and Lighting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2013/4989c523/12OmNyVes24", "parentPublication": { "id": "proceedings/cvpr/2013/4989/0", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2008/2242/0/04587697", "title": "Illumination and camera invariant stereo matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2008/04587697/12OmNykkB8T", "parentPublication": { "id": "proceedings/cvpr/2008/2242/0", "title": "2008 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/09/i1616", "title": "BRDF Invariant Stereo Using Light Transport Constancy", "doi": null, "abstractUrl": "/journal/tp/2007/09/i1616/13rRUyYSWm5", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000c811", "title": "Learning for Disparity Estimation Through Feature Constancy", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000c811/17D45Xh13wh", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpbd&is/2020/6512/0/09130582", "title": "Color Constancy Using VGG Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/hpbd&is/2020/09130582/1l6SRu5wpIA", "parentPublication": { "id": "proceedings/hpbd&is/2020/6512/0", "title": "2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz2TCuR", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNyVes24", "doi": "10.1109/CVPR.2013.326", "title": "What Object Motion Reveals about Shape with Unknown BRDF and Lighting", "normalizedTitle": "What Object Motion Reveals about Shape with Unknown BRDF and Lighting", "abstract": "We present a theory that addresses the problem of determining shape from the (small or differential) motion of an object with unknown isotropic reflectance, under arbitrary unknown distant illumination, for both orthographic and perpsective projection. Our theory imposes fundamental limits on the hardness of surface reconstruction, independent of the method involved. Under orthographic projection, we prove that three differential motions suffice to yield an invariant that relates shape to image derivatives, regardless of BRDF and illumination. Under perspective projection, we show that four differential motions suffice to yield depth and a linear constraint on the surface gradient, with unknown BRDF and lighting. Further, we delineate the topological classes up to which reconstruction may be achieved using the invariants. Finally, we derive a general stratification that relates hardness of shape recovery to scene complexity. Qualitatively, our invariants are homogeneous partial differential equations for simple lighting and inhomogeneous for complex illumination. Quantitatively, our framework shows that the minimal number of motions required to resolve shape is greater for more complex scenes. Prior works that assume brightness constancy, Lambertian BRDF or a known directional light source follow as special cases of our stratification. We illustrate with synthetic and real data how potential reconstruction methods may exploit our framework.", "abstracts": [ { "abstractType": "Regular", "content": "We present a theory that addresses the problem of determining shape from the (small or differential) motion of an object with unknown isotropic reflectance, under arbitrary unknown distant illumination, for both orthographic and perpsective projection. Our theory imposes fundamental limits on the hardness of surface reconstruction, independent of the method involved. Under orthographic projection, we prove that three differential motions suffice to yield an invariant that relates shape to image derivatives, regardless of BRDF and illumination. Under perspective projection, we show that four differential motions suffice to yield depth and a linear constraint on the surface gradient, with unknown BRDF and lighting. Further, we delineate the topological classes up to which reconstruction may be achieved using the invariants. Finally, we derive a general stratification that relates hardness of shape recovery to scene complexity. Qualitatively, our invariants are homogeneous partial differential equations for simple lighting and inhomogeneous for complex illumination. Quantitatively, our framework shows that the minimal number of motions required to resolve shape is greater for more complex scenes. Prior works that assume brightness constancy, Lambertian BRDF or a known directional light source follow as special cases of our stratification. We illustrate with synthetic and real data how potential reconstruction methods may exploit our framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a theory that addresses the problem of determining shape from the (small or differential) motion of an object with unknown isotropic reflectance, under arbitrary unknown distant illumination, for both orthographic and perpsective projection. Our theory imposes fundamental limits on the hardness of surface reconstruction, independent of the method involved. Under orthographic projection, we prove that three differential motions suffice to yield an invariant that relates shape to image derivatives, regardless of BRDF and illumination. Under perspective projection, we show that four differential motions suffice to yield depth and a linear constraint on the surface gradient, with unknown BRDF and lighting. Further, we delineate the topological classes up to which reconstruction may be achieved using the invariants. Finally, we derive a general stratification that relates hardness of shape recovery to scene complexity. Qualitatively, our invariants are homogeneous partial differential equations for simple lighting and inhomogeneous for complex illumination. Quantitatively, our framework shows that the minimal number of motions required to resolve shape is greater for more complex scenes. Prior works that assume brightness constancy, Lambertian BRDF or a known directional light source follow as special cases of our stratification. We illustrate with synthetic and real data how potential reconstruction methods may exploit our framework.", "fno": "4989c523", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Manmohan Chandraker", "givenName": "Manmohan", "surname": "Chandraker", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dikpal Reddy", "givenName": "Dikpal", "surname": "Reddy", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yizhou Wang", "givenName": "Yizhou", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ravi Ramamoorthi", "givenName": "Ravi", "surname": "Ramamoorthi", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-06-01T00:00:00", "pubType": "proceedings", "pages": "2523-2530", "year": "2013", "issn": "1063-6919", "isbn": "978-0-7695-4989-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4989c515", "articleId": "12OmNvAiSDF", "__typename": "AdjacentArticleType" }, "next": { "fno": "4989c531", "articleId": "12OmNzVGcCH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wmsvm/2010/7077/0/05558360", "title": "Modeling and Editing Isotropic BRDF", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558360/12OmNARiM3T", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c179", "title": "What Camera Motion Reveals about Shape with Unknown BRDF", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c179/12OmNBqMDzR", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c047", "title": "Effective Acquisition of Dense Anisotropic BRDF", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c047/12OmNqNXEsZ", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2005/2392/0/23920310", "title": "BRDF Recovering and Scene Re-Lighting Using an Environment Map", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2005/23920310/12OmNs5rl2u", "parentPublication": { "id": "proceedings/cgiv/2005/2392/0", "title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457a578", "title": "Robust Energy Minimization for BRDF-Invariant Shape from Light Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457a578/12OmNxdDFFd", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126354", "title": "What an image reveals about material reflectance", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126354/12OmNxwWoS6", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851c452", "title": "Simultaneous Estimation of Near IR BRDF and Fine-Scale Surface Geometry", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851c452/12OmNy6qfI1", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733b726", "title": "Full BRDF Reconstruction Using CNNs from Partial Photometric Stereo-Light Field Data", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b726/12OmNzGlRzw", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/07/07274730", "title": "The Information Available to a Moving Observer on Shape with Unknown, Isotropic BRDFs", "doi": null, "abstractUrl": "/journal/tp/2016/07/07274730/13rRUB6Sq1G", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09444888", "title": "Estimating Homogeneous Data-Driven BRDF Parameters From a Reflectance Map Under Known Natural Lighting", "doi": null, "abstractUrl": "/journal/tg/2022/12/09444888/1u51y8PQCMU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4r3R2", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzl3X1Q", "doi": "10.1109/CVPR.2009.5206558", "title": "Material classification using BRDF slices", "normalizedTitle": "Material classification using BRDF slices", "abstract": "Segmenting images into distinct material types is a very useful capability. Most work in image segmentation addresses the case where only a single image is available. Some methods improve on this by collecting HDR or multispectral images. However, it is also possible to use the reflectance properties of the materials to obtain better results. By acquiring many images of an object under different lighting conditions we have more samples of the surfaces bidirectional reflectance distribution function (BRDF). We show that this additional information enlarges the class of material types that can be well separated by segmentation, and that properly treating the information as samples of the BRDF further increases accuracy without requiring an explicit estimation of the material BRDF.", "abstracts": [ { "abstractType": "Regular", "content": "Segmenting images into distinct material types is a very useful capability. Most work in image segmentation addresses the case where only a single image is available. Some methods improve on this by collecting HDR or multispectral images. However, it is also possible to use the reflectance properties of the materials to obtain better results. By acquiring many images of an object under different lighting conditions we have more samples of the surfaces bidirectional reflectance distribution function (BRDF). We show that this additional information enlarges the class of material types that can be well separated by segmentation, and that properly treating the information as samples of the BRDF further increases accuracy without requiring an explicit estimation of the material BRDF.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Segmenting images into distinct material types is a very useful capability. Most work in image segmentation addresses the case where only a single image is available. Some methods improve on this by collecting HDR or multispectral images. However, it is also possible to use the reflectance properties of the materials to obtain better results. By acquiring many images of an object under different lighting conditions we have more samples of the surfaces bidirectional reflectance distribution function (BRDF). We show that this additional information enlarges the class of material types that can be well separated by segmentation, and that properly treating the information as samples of the BRDF further increases accuracy without requiring an explicit estimation of the material BRDF.", "fno": "05206558", "keywords": [ "Image Classification", "Image Colour Analysis", "Image Segmentation", "Spectral Analysis", "Material Classification", "BRDF Slices", "Image Segmentation", "HDR Image", "Multispectral Image", "Reflectance Property", "Lighting Condition", "Bidirectional Reflectance Distribution Function", "Reflectivity", "Cameras", "Image Segmentation", "Brightness", "Hyperspectral Imaging", "Surface Treatment", "Bidirectional Control", "Distribution Functions", "Optical Reflection", "Optical Polarization" ], "authors": [ { "affiliation": "University of California, Santa Cruz, USA", "fullName": "Oliver Wang", "givenName": "Oliver", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Santa Cruz, USA", "fullName": "Prabath Gunawardane", "givenName": "Prabath", "surname": "Gunawardane", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Santa Cruz, USA", "fullName": "Steve Scher", "givenName": "Steve", "surname": "Scher", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Santa Cruz, USA", "fullName": "James Davis", "givenName": "James", "surname": "Davis", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "2805-2811", "year": "2009", "issn": "1063-6919", "isbn": "978-1-4244-3992-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05206557", "articleId": "12OmNviZlws", "__typename": "AdjacentArticleType" }, "next": { "fno": "05206559", "articleId": "12OmNzwpUgP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wmsvm/2010/7077/0/05558360", "title": "Modeling and Editing Isotropic BRDF", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558360/12OmNARiM3T", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204321", "title": "Transparent watermarking using bidirectional imaging", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204321/12OmNApcuF1", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c275", "title": "A New Perspective on Material Classification and Ink Identification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c275/12OmNyxXlwX", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d559", "title": "A Gaussian Process Latent Variable Model for BRDF Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d559/12OmNzVoBvI", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2013/4989/0/4989b468", "title": "BRDF Slices: Accurate Adaptive Anisotropic Appearance Acquisition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2013/4989b468/12OmNzlD9Fw", "parentPublication": { "id": "proceedings/cvpr/2013/4989/0", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/11/i1059", "title": "Polarization-Based Material Classification from Specular Reflection", "doi": null, "abstractUrl": "/journal/tp/1990/11/i1059/13rRUIJuxqv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/02/mcg2012020024", "title": "Modeling and Verifying the Polarizing Reflectance of Real-World Metallic Surfaces", "doi": null, "abstractUrl": "/magazine/cg/2012/02/mcg2012020024/13rRUxbCblc", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/09/i1616", "title": "BRDF Invariant Stereo Using Light Transport Constancy", "doi": null, "abstractUrl": "/journal/tp/2007/09/i1616/13rRUyYSWm5", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/01/mcg2006010030", "title": "BRDF-Shop: Creating Physically Correct Bidirectional Reflectance Distribution Functions", "doi": null, "abstractUrl": "/magazine/cg/2006/01/mcg2006010030/13rRUyhaIj5", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09623493", "title": "Invertible Neural BRDF for Object Inverse Rendering", "doi": null, "abstractUrl": "/journal/tp/2022/12/09623493/1yJT7tLzbi0", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWva5", "title": "2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06)", "acronym": "cvpr", "groupId": "1000147", "volume": "1", "displayVolume": "1", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNscOUbU", "doi": "10.1109/CVPR.2006.122", "title": "Fully Automatic Registration of 3D Point Clouds", "normalizedTitle": "Fully Automatic Registration of 3D Point Clouds", "abstract": "We propose a novel technique for the registration of 3D point clouds which makes very few assumptions: we avoid any manual rough alignment or the use of landmarks, displacement can be arbitrarily large, and the two point sets can have very little overlap. Crude alignment is achieved by estimation of the 3D-rotation from two Extended Gaussian Images even when the data sets inducing them have partial overlap. The technique is based on the correlation of the two EGIs in the Fourier domain and makes use of the spherical and rotational harmonic transforms. For pairs with low overlap which fail a critical verification step, the rotational alignment can be obtained by the alignment of constellation images generated from the EGIs. Rotationally aligned sets are matched by correlation using the Fourier transform of volumetric functions. A fine alignment is acquired in the final step by running Iterative Closest Points with just few iterations.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel technique for the registration of 3D point clouds which makes very few assumptions: we avoid any manual rough alignment or the use of landmarks, displacement can be arbitrarily large, and the two point sets can have very little overlap. Crude alignment is achieved by estimation of the 3D-rotation from two Extended Gaussian Images even when the data sets inducing them have partial overlap. The technique is based on the correlation of the two EGIs in the Fourier domain and makes use of the spherical and rotational harmonic transforms. For pairs with low overlap which fail a critical verification step, the rotational alignment can be obtained by the alignment of constellation images generated from the EGIs. Rotationally aligned sets are matched by correlation using the Fourier transform of volumetric functions. A fine alignment is acquired in the final step by running Iterative Closest Points with just few iterations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel technique for the registration of 3D point clouds which makes very few assumptions: we avoid any manual rough alignment or the use of landmarks, displacement can be arbitrarily large, and the two point sets can have very little overlap. Crude alignment is achieved by estimation of the 3D-rotation from two Extended Gaussian Images even when the data sets inducing them have partial overlap. The technique is based on the correlation of the two EGIs in the Fourier domain and makes use of the spherical and rotational harmonic transforms. For pairs with low overlap which fail a critical verification step, the rotational alignment can be obtained by the alignment of constellation images generated from the EGIs. Rotationally aligned sets are matched by correlation using the Fourier transform of volumetric functions. A fine alignment is acquired in the final step by running Iterative Closest Points with just few iterations.", "fno": "01640899", "keywords": [ "Fourier Transforms", "Layout", "Iterative Algorithms", "Iterative Closest Point Algorithm", "Computer Vision", "Three Dimensional Displays", "Information Science", "Image Generation" ], "authors": [ { "affiliation": "University of Pennsylvania", "fullName": "A. Makadia", "givenName": "A.", "surname": "Makadia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "A. Patterson", "givenName": "A.", "surname": "Patterson", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Daniilidis", "givenName": "K.", "surname": "Daniilidis", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-01-01T00:00:00", "pubType": "proceedings", "pages": "1297-1304", "year": "2006", "issn": "1063-6919", "isbn": "0-7695-2597-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "259711214", "articleId": "12OmNx3HI2K", "__typename": "AdjacentArticleType" }, "next": { "fno": "259711222", "articleId": "12OmNC8uRjN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crv/2015/1986/0/1986a031", "title": "Registration of Noisy Point Clouds Using Virtual Interest Points", "doi": null, "abstractUrl": "/proceedings-article/crv/2015/1986a031/12OmNApLGDA", "parentPublication": { "id": "proceedings/crv/2015/1986/0", "title": "2015 12th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2015/8332/0/8332a232", "title": "Efficient Large-Scale Point Cloud Registration Using Loop Closures", "doi": null, "abstractUrl": "/proceedings-article/3dv/2015/8332a232/12OmNxA3YSC", "parentPublication": { "id": "proceedings/3dv/2015/8332/0", "title": "2015 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034c495", "title": "KPPF: Keypoint-Based Point-Pair-Feature for Scalable Automatic Global Registration of Large RGB-D Scans", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034c495/12OmNyXMQo9", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a102", "title": "Registration of Point Clouds Based on the Ratio of Bidirectional Distances", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a102/12OmNyoSbey", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2016/0811/0/0811a045", "title": "On Performance Evaluation of Registration Algorithms for 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2016/0811a045/12OmNzC5Tgw", "parentPublication": { "id": "proceedings/cgiv/2016/0811/0", "title": "2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/05/08352814", "title": "Efficient Registration of High-Resolution Feature Enhanced Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2019/05/08352814/13rRUB7a1hb", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546214", "title": "Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546214/17D45WcjjPY", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a756", "title": "NRGA: Gravitational Approach for Non-rigid Point Set Registration", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a756/17D45XwUAHp", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3249", "title": "Provably Approximated Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3249/1BmHRpR72Cc", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h597", "title": "Quasi-Newton Solver for Robust Non-Rigid Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h597/1m3nl6D2MbS", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmEUXGjNra", "doi": "10.1109/ICCV48922.2021.01298", "title": "PCAM: Product of Cross-Attention Matrices for Rigid Registration of Point Clouds", "normalizedTitle": "PCAM: Product of Cross-Attention Matrices for Rigid Registration of Point Clouds", "abstract": "Rigid registration of point clouds with partial overlaps is a longstanding problem usually solved in two steps: (a) finding correspondences between the point clouds; (b) filtering these correspondences to keep only the most reliable ones to estimate the transformation. Recently, several deep nets have been proposed to solve these steps jointly. We built upon these works and propose PCAM: a neural network whose key element is a pointwise product of crossattention matrices that permits to mix both low-level geometric and high-level contextual information to find point correspondences. These cross-attention matrices also permits the exchange of context information between the point clouds, at each layer, allowing the network construct better matching features within the overlapping regions. The experiments show that PCAM achieves state-of-the-art results among methods which, like us, solve steps (a) and (b) jointly via deepnets.", "abstracts": [ { "abstractType": "Regular", "content": "Rigid registration of point clouds with partial overlaps is a longstanding problem usually solved in two steps: (a) finding correspondences between the point clouds; (b) filtering these correspondences to keep only the most reliable ones to estimate the transformation. Recently, several deep nets have been proposed to solve these steps jointly. We built upon these works and propose PCAM: a neural network whose key element is a pointwise product of crossattention matrices that permits to mix both low-level geometric and high-level contextual information to find point correspondences. These cross-attention matrices also permits the exchange of context information between the point clouds, at each layer, allowing the network construct better matching features within the overlapping regions. The experiments show that PCAM achieves state-of-the-art results among methods which, like us, solve steps (a) and (b) jointly via deepnets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Rigid registration of point clouds with partial overlaps is a longstanding problem usually solved in two steps: (a) finding correspondences between the point clouds; (b) filtering these correspondences to keep only the most reliable ones to estimate the transformation. Recently, several deep nets have been proposed to solve these steps jointly. We built upon these works and propose PCAM: a neural network whose key element is a pointwise product of crossattention matrices that permits to mix both low-level geometric and high-level contextual information to find point correspondences. These cross-attention matrices also permits the exchange of context information between the point clouds, at each layer, allowing the network construct better matching features within the overlapping regions. The experiments show that PCAM achieves state-of-the-art results among methods which, like us, solve steps (a) and (b) jointly via deepnets.", "fno": "281200n3209", "keywords": [ "Point Cloud Compression", "Knowledge Engineering", "Computer Vision", "Filtering", "Computer Network Reliability", "Neural Networks", "Computer Architecture", "Motion And Tracking", "Vision For Robotics And Autonomous Vehicles" ], "authors": [ { "affiliation": "Inria (Inria, Mines ParisTech, PSL Research University.),Paris,France", "fullName": "Anh-Quan Cao", "givenName": "Anh-Quan", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Valeo.ai,Paris,France", "fullName": "Gilles Puy", "givenName": "Gilles", "surname": "Puy", "__typename": "ArticleAuthorType" }, { "affiliation": "Valeo.ai,Paris,France", "fullName": "Alexandre Boulch", "givenName": "Alexandre", "surname": "Boulch", "__typename": "ArticleAuthorType" }, { "affiliation": "Valeo.ai,Paris,France", "fullName": "Renaud Marlet", "givenName": "Renaud", "surname": "Marlet", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "13209-13218", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200n3199", "articleId": "1BmF3zyoheo", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200n3219", "articleId": "1BmI18LoUMg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crv/2015/1986/0/1986a031", "title": "Registration of Noisy Point Clouds Using Virtual Interest Points", "doi": null, "abstractUrl": "/proceedings-article/crv/2015/1986a031/12OmNApLGDA", "parentPublication": { "id": "proceedings/crv/2015/1986/0", "title": "2015 12th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5974", "title": "Deep Hough Voting for Robust Global Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5974/1BmFKwLxovS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09749887", "title": "Multiway Non-Rigid Point Cloud Registration via Learned Functional Map Synchronization", "doi": null, "abstractUrl": "/journal/tp/2023/02/09749887/1CkdS0qna3S", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09878213", "title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching", "doi": null, "abstractUrl": "/journal/tp/2023/05/09878213/1GrP5OekHDy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600k0966", "title": "ZZ-Net: A Universal Rotation Equivariant Architecture for 2D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600k0966/1H1hOilSSbu", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a572", "title": "SGPCR: Spherical Gaussian Point Cloud Representation and its Application to Object Registration and Retrieval", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a572/1L8qEq48PHa", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10097640", "title": "Sparse-to-Dense Matching Network for Large-scale LiDAR Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/5555/01/10097640/1M9lILSRgL6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1959", "title": "LBS Autoencoder: Self-Supervised Fitting of Articulated Meshes to Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1959/1gyrapLInSw", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09445585", "title": "Consistent Two-Flow Network for Tele-Registration of Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09445585/1u8lzpSvnxu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmGoTRdyCY", "doi": "10.1109/ICCV48922.2021.00563", "title": "DeepPRO: Deep Partial Point Cloud Registration of Objects", "normalizedTitle": "DeepPRO: Deep Partial Point Cloud Registration of Objects", "abstract": "We consider the problem of online and real-time registration of partial point clouds obtained from an unseen real-world rigid object without knowing its 3D model. The point cloud is partial as it is obtained by a depth sensor capturing only the visible part of the object from a certain viewpoint. It introduces two main challenges: 1) two partial point clouds do not fully overlap and 2) keypoints tend to be less reliable when the visible part of the object does not have salient local structures. To address these issues, we propose DeepPRO, a keypoint-free and an end-to-end trainable deep neural network. Its core idea is inspired by how humans align two point clouds: we can imagine how two point clouds will look like after the registration based on their shape. To realize the idea, DeepPRO has inputs of two partial point clouds and directly predicts the point-wise location of the aligned point cloud. By preserving the ordering of points during the prediction, we enjoy dense correspondences between input and predicted point clouds when inferring rigid transform parameters. We conduct extensive experiments on the real-world Linemod and synthetic ModelNet40 datasets. In addition, we collect and evaluate on the PRO1k dataset, a large-scale version of Linemod meant to test generalization to real-world scans. Results show that DeepPRO achieves the best accuracy against thirteen strong baseline methods, e.g., 2.2mm ADD on the Linemod dataset, while running 50 fps on mobile devices.", "abstracts": [ { "abstractType": "Regular", "content": "We consider the problem of online and real-time registration of partial point clouds obtained from an unseen real-world rigid object without knowing its 3D model. The point cloud is partial as it is obtained by a depth sensor capturing only the visible part of the object from a certain viewpoint. It introduces two main challenges: 1) two partial point clouds do not fully overlap and 2) keypoints tend to be less reliable when the visible part of the object does not have salient local structures. To address these issues, we propose DeepPRO, a keypoint-free and an end-to-end trainable deep neural network. Its core idea is inspired by how humans align two point clouds: we can imagine how two point clouds will look like after the registration based on their shape. To realize the idea, DeepPRO has inputs of two partial point clouds and directly predicts the point-wise location of the aligned point cloud. By preserving the ordering of points during the prediction, we enjoy dense correspondences between input and predicted point clouds when inferring rigid transform parameters. We conduct extensive experiments on the real-world Linemod and synthetic ModelNet40 datasets. In addition, we collect and evaluate on the PRO1k dataset, a large-scale version of Linemod meant to test generalization to real-world scans. Results show that DeepPRO achieves the best accuracy against thirteen strong baseline methods, e.g., 2.2mm ADD on the Linemod dataset, while running 50 fps on mobile devices.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider the problem of online and real-time registration of partial point clouds obtained from an unseen real-world rigid object without knowing its 3D model. The point cloud is partial as it is obtained by a depth sensor capturing only the visible part of the object from a certain viewpoint. It introduces two main challenges: 1) two partial point clouds do not fully overlap and 2) keypoints tend to be less reliable when the visible part of the object does not have salient local structures. To address these issues, we propose DeepPRO, a keypoint-free and an end-to-end trainable deep neural network. Its core idea is inspired by how humans align two point clouds: we can imagine how two point clouds will look like after the registration based on their shape. To realize the idea, DeepPRO has inputs of two partial point clouds and directly predicts the point-wise location of the aligned point cloud. By preserving the ordering of points during the prediction, we enjoy dense correspondences between input and predicted point clouds when inferring rigid transform parameters. We conduct extensive experiments on the real-world Linemod and synthetic ModelNet40 datasets. In addition, we collect and evaluate on the PRO1k dataset, a large-scale version of Linemod meant to test generalization to real-world scans. Results show that DeepPRO achieves the best accuracy against thirteen strong baseline methods, e.g., 2.2mm ADD on the Linemod dataset, while running 50 fps on mobile devices.", "fno": "281200f663", "keywords": [ "Point Cloud Compression", "Solid Modeling", "Three Dimensional Displays", "Shape", "Databases", "Transforms", "Real Time Systems", "Stereo", "3 D From Multiview And Other Sensors", "3 D From A Single Image And Shape From X", "Vision Applications And Systems" ], "authors": [ { "affiliation": "Apple", "fullName": "Donghoon Lee", "givenName": "Donghoon", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Apple", "fullName": "Onur C. Hamsici", "givenName": "Onur C.", "surname": "Hamsici", "__typename": "ArticleAuthorType" }, { "affiliation": "Apple", "fullName": "Steven Feng", "givenName": "Steven", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Apple", "fullName": "Prachee Sharma", "givenName": "Prachee", "surname": "Sharma", "__typename": "ArticleAuthorType" }, { "affiliation": "Apple", "fullName": "Thorsten Gernoth", "givenName": "Thorsten", "surname": "Gernoth", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "5663-5672", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200f651", "articleId": "1BmFL2YrszK", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200f673", "articleId": "1BmLo43uFBC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g108", "title": "Sampling Network Guided Cross-Entropy Method for Unsupervised Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g108/1BmGp36SSvm", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d112", "title": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d112/1BmH817i3jq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09729524", "title": "Unsupervised Category-Specific Partial Point Set Registration via Joint Shape Completion and Registration", "doi": null, "abstractUrl": "/journal/tg/5555/01/09729524/1Bya8dlokw0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09866792", "title": "Partial Point Cloud Registration with Deep Local Feature", "doi": null, "abstractUrl": "/journal/ai/5555/01/09866792/1G7UlGeNaiA", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f533", "title": "Learning a Structured Latent Space for Unsupervised Point Cloud Completion", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f533/1H0KOsU2FZC", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a572", "title": "SGPCR: Spherical Gaussian Point Cloud Representation and its Application to Object Registration and Retrieval", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a572/1L8qEq48PHa", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e500", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10106495", "title": "Variational Relational Point Completion Network for Robust 3D Classification", "doi": null, "abstractUrl": "/journal/tp/5555/01/10106495/1MwAn9y4Ozu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a342", "title": "DeepBBS: Deep Best Buddies for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a342/1zWE3qPVGLe", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CHwKTum3O8", "title": "2021 International Conference on Networking Systems of AI (INSAI)", "acronym": "insai", "groupId": "1846228", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1CHwMbhCNQA", "doi": "10.1109/INSAI54028.2021.00034", "title": "Registration of Point Clouds: A Survey", "normalizedTitle": "Registration of Point Clouds: A Survey", "abstract": "The registration of point cloud is essentially to obtain a relatively accurate coordinate transformation matrix through operation, and unify the point cloud data from multiview into the particular coordinate system through rigid transformations such as rotation and translation. Generally speaking, the registration is to discover the position conversion matrix of the overlap between clouds, which have an important effect in the domain of robot and computer vision. The purpose of this article is to comprehensively summarize the current progress of point cloud registration from two dimensions: algorithm optimization methods and deep learning methods. This paper first points out the possible application fields and development direction of point cloud registration in the future, then makes a comparison between different algorithms, and finally makes a proper analysis of the advantages and disadvantages of each algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "The registration of point cloud is essentially to obtain a relatively accurate coordinate transformation matrix through operation, and unify the point cloud data from multiview into the particular coordinate system through rigid transformations such as rotation and translation. Generally speaking, the registration is to discover the position conversion matrix of the overlap between clouds, which have an important effect in the domain of robot and computer vision. The purpose of this article is to comprehensively summarize the current progress of point cloud registration from two dimensions: algorithm optimization methods and deep learning methods. This paper first points out the possible application fields and development direction of point cloud registration in the future, then makes a comparison between different algorithms, and finally makes a proper analysis of the advantages and disadvantages of each algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The registration of point cloud is essentially to obtain a relatively accurate coordinate transformation matrix through operation, and unify the point cloud data from multiview into the particular coordinate system through rigid transformations such as rotation and translation. Generally speaking, the registration is to discover the position conversion matrix of the overlap between clouds, which have an important effect in the domain of robot and computer vision. The purpose of this article is to comprehensively summarize the current progress of point cloud registration from two dimensions: algorithm optimization methods and deep learning methods. This paper first points out the possible application fields and development direction of point cloud registration in the future, then makes a comparison between different algorithms, and finally makes a proper analysis of the advantages and disadvantages of each algorithm.", "fno": "085900a136", "keywords": [ "Computer Vision", "Deep Learning Artificial Intelligence", "Image Registration", "Matrix Algebra", "Optimisation", "Point Cloud Registration", "Point Cloud Data", "Rigid Transformations", "Position Conversion Matrix", "Coordinate Transformation Matrix", "Algorithm Optimization", "Deep Learning", "Computer Vision", "Robot", "Point Cloud Compression", "Deep Learning", "Training", "Robot Kinematics", "Optimization Methods", "Training Data", "Input Devices", "Registration", "Point Clouds", "Survey", "Traditional Methods", "Deep Learning" ], "authors": [ { "affiliation": "Fudan University,Academy for Eng. & Tech.,Shanghai,China", "fullName": "Dongfang Xie", "givenName": "Dongfang", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,Academy for Eng. & Tech.,Shanghai,China", "fullName": "Wei Zhu", "givenName": "Wei", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,Academy for Eng. & Tech.,Shanghai,China", "fullName": "Fengxiang Rong", "givenName": "Fengxiang", "surname": "Rong", "__typename": "ArticleAuthorType" }, { "affiliation": "China Telecom Research Institute,Mobile Communication Research Dept.,Beijing,China", "fullName": "Xu Xia", "givenName": "Xu", "surname": "Xia", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,Academy for Eng. & Tech.,Shanghai,China", "fullName": "Huiliang Shang", "givenName": "Huiliang", "surname": "Shang", "__typename": "ArticleAuthorType" } ], "idPrefix": "insai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "136-142", "year": "2021", "issn": null, "isbn": "978-1-6654-0859-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "085900a129", "articleId": "1CHx04T0WM8", "__typename": "AdjacentArticleType" }, "next": { "fno": "085900a143", "articleId": "1CHwWIi78oE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2010/4270/0/4270a565", "title": "An Improved ICP Algorithm for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a565/12OmNx5YvkB", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/07/ttg2013071199", "title": "Registration of 3D Point Clouds and Meshes: A Survey from Rigid to Nonrigid", "doi": null, "abstractUrl": "/journal/tg/2013/07/ttg2013071199/13rRUwI5U2E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2021/2172/0/217200a237", "title": "Research on three-stage point cloud registration mode optimized by simulated annealing algorithm", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2021/217200a237/1ANLCHhoo6Y", "parentPublication": { "id": "proceedings/wcmeim/2021/2172/0", "title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g108", "title": "Sampling Network Guided Cross-Entropy Method for Unsupervised Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g108/1BmGp36SSvm", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/citce/2021/2184/0/218400a001", "title": "Improved Iterative Closest Point (ICP) Point Cloud Registration Algorithm based on Matching Point Pair Quadratic Filtering", "doi": null, "abstractUrl": "/proceedings-article/citce/2021/218400a001/1BtfTK26ZHO", "parentPublication": { "id": "proceedings/citce/2021/2184/0", "title": "2021 International Conference on Computer, Internet of Things and Control Engineering (CITCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2021/1732/0/173200a407", "title": "An Improved ICP Point Cloud Registration Algorithm Based on Three-Points Congruent Sets", "doi": null, "abstractUrl": "/proceedings-article/aiam/2021/173200a407/1BzTJDeh3Ms", "parentPublication": { "id": "proceedings/aiam/2021/1732/0", "title": "2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09764639", "title": "Rank-PointRetrieval: Reranking Point Cloud Retrieval via a Visually Consistent Registration Evaluation", "doi": null, "abstractUrl": "/journal/tg/5555/01/09764639/1CUJRA8AsVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ishc/2021/6743/0/674300a163", "title": "DXICP: A Fast Registration Algorithm for Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/ishc/2021/674300a163/1EBmWMTUq5O", "parentPublication": { "id": "proceedings/ishc/2021/6743/0", "title": "2021 3rd International Symposium on Smart and Healthy Cities (ISHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300h156", "title": "PointNetLK: Robust &amp; Efficient Point Cloud Registration Using PointNet", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300h156/1gyrIF6WuYg", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G9DtzCwrjW", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G9EOBjuiYg", "doi": "10.1109/ICME52920.2022.9859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "normalizedTitle": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "abstract": "Establishing reliable correspondences between a pair of point clouds is essential for registration with partial overlaps. However, existing correspondence estimation works usually struggle to distinguish the points in overlap and non-overlap regions. This paper thus proposes an Overlap-guided Coarse-to-Fine Network, named OCFNet, which first establishes correspondences at a coarse level and then refines them at a point level. Specifically, at the coarse level, our model first aggregates two point clouds into smaller sets of super-points with associated features and overlap scores, followed by establishing coarse-level correspondences between the two sets of super-points under the guidance of overlap scores. On the fine stage, a decoder recovers the raw points while jointly learning the associated features and overlap scores. Coarse-level proposals are then expanded to patches, and point-level correspondences are sequentially refined from the corresponding patches. We conducted comprehensive experiments on 3DMatch, 3DLoMatch, and KITTI benchmarks to show the effectiveness of the proposed method. [code]", "abstracts": [ { "abstractType": "Regular", "content": "Establishing reliable correspondences between a pair of point clouds is essential for registration with partial overlaps. However, existing correspondence estimation works usually struggle to distinguish the points in overlap and non-overlap regions. This paper thus proposes an Overlap-guided Coarse-to-Fine Network, named OCFNet, which first establishes correspondences at a coarse level and then refines them at a point level. Specifically, at the coarse level, our model first aggregates two point clouds into smaller sets of super-points with associated features and overlap scores, followed by establishing coarse-level correspondences between the two sets of super-points under the guidance of overlap scores. On the fine stage, a decoder recovers the raw points while jointly learning the associated features and overlap scores. Coarse-level proposals are then expanded to patches, and point-level correspondences are sequentially refined from the corresponding patches. We conducted comprehensive experiments on 3DMatch, 3DLoMatch, and KITTI benchmarks to show the effectiveness of the proposed method. [code]", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Establishing reliable correspondences between a pair of point clouds is essential for registration with partial overlaps. However, existing correspondence estimation works usually struggle to distinguish the points in overlap and non-overlap regions. This paper thus proposes an Overlap-guided Coarse-to-Fine Network, named OCFNet, which first establishes correspondences at a coarse level and then refines them at a point level. Specifically, at the coarse level, our model first aggregates two point clouds into smaller sets of super-points with associated features and overlap scores, followed by establishing coarse-level correspondences between the two sets of super-points under the guidance of overlap scores. On the fine stage, a decoder recovers the raw points while jointly learning the associated features and overlap scores. Coarse-level proposals are then expanded to patches, and point-level correspondences are sequentially refined from the corresponding patches. We conducted comprehensive experiments on 3DMatch, 3DLoMatch, and KITTI benchmarks to show the effectiveness of the proposed method. [code]", "fno": "09859814", "keywords": [ "Feature Extraction", "Image Matching", "Image Registration", "Learning Artificial Intelligence", "Overlap Guided Coarse To Fine Correspondence Prediction", "Point Cloud Registration", "Reliable Correspondences", "Point Clouds", "Partial Overlaps", "Existing Correspondence Estimation", "Nonoverlap Regions", "Overlap Guided Coarse To Fine Network", "Coarse Level", "Point Level", "Super Points", "Associated Features", "Overlap Scores", "Coarse Level Correspondences", "Fine Stage", "Raw Points", "Coarse Level Proposals", "Point Level Correspondences", "Corresponding Patches", "Point Cloud Compression", "Codes", "Aggregates", "Estimation", "Benchmark Testing", "Prediction Algorithms", "Decoding", "Registration", "Partial Overlaps", "Overlap Score", "Correspondence Estimation", "Coarse To Fine" ], "authors": [ { "affiliation": "University of Technology Sydney,Sydney,Australia", "fullName": "Guofeng Mei", "givenName": "Guofeng", "surname": "Mei", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai AI Laboratory,Shanghai,China", "fullName": "Xiaoshui Huang", "givenName": "Xiaoshui", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Technology Sydney,Sydney,Australia", "fullName": "Jian Zhang", "givenName": "Jian", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Technology Sydney,Sydney,Australia", "fullName": "Qiang Wu", "givenName": "Qiang", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": null, "isbn": "978-1-6654-8563-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09859635", "articleId": "1G9EpsrT8d2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09859617", "articleId": "1G9ElsKBlSw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dv/2017/2610/0/261001a686", "title": "Fuzzy Correspondences for Robust Shape Registration", "doi": null, "abstractUrl": "/proceedings-article/3dv/2017/261001a686/12OmNBLdKMa", "parentPublication": { "id": "proceedings/3dv/2017/2610/0", "title": "2017 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a318", "title": "Robust Correspondence Detection by L2E Estimator for Retinal Image Registration", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a318/12OmNzwHvdz", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a180", "title": "Iterative Global Similarity Points: A Robust Coarse-to-Fine Integration Solution for Pairwise 3D Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a180/17D45VTRoAb", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09878213", "title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching", "doi": null, "abstractUrl": "/journal/tp/2023/05/09878213/1GrP5OekHDy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g657", "title": "Multi-instance Point Cloud Registration by Efficient Correspondence Clustering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g657/1H0NiTg027C", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1133", "title": "Geometric Transformer for Fast and Robust Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991525", "title": "An Adaptive Overlap-based ICP Algorithm for Multi-LiDAR Calibration in Low-overlap Situations", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991525/1JwPU729UaY", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e500", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10076895", "title": "GeoTransformer: Fast and Robust Point Cloud Registration With Geometric Transformer", "doi": null, "abstractUrl": "/journal/tp/5555/01/10076895/1LFQ0GcHene", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H0NxQCVYxW", "doi": "10.1109/CVPR52688.2022.01086", "title": "Geometric Transformer for Fast and Robust Point Cloud Registration", "normalizedTitle": "Geometric Transformer for Fast and Robust Point Cloud Registration", "abstract": "We study the problem of extracting accurate correspondences for point cloud registration. Recent keypoint-free methods bypass the detection of repeatable keypoints which is difficult in low-overlap scenarios, showing great potential in registration. They seek correspondences over down-sampled superpoints, which are then propagated to dense points. Superpoints are matched based on whether their neighboring patches overlap. Such sparse and loose matching requires contextual features capturing the geometric structure of the point clouds. We propose Geometric Transformer to learn geometric feature for robust superpoint matching. It encodes pair-wise distances and triplet-wise angles, making it robust in low-overlap cases and invariant to rigid transformation. The simplistic design attains surprisingly high matching accuracy such that no RANSAC is required in the estimation of alignment transformation, leading to 100 times acceleration. Our method improves the inlier ratio by 17&#x223C;30 percentage points and the registration recall by over 7 points on the challenging 3DLoMatch benchmark. Our code and models are available at https://github.com/qinzheng93/GeoTransformer.", "abstracts": [ { "abstractType": "Regular", "content": "We study the problem of extracting accurate correspondences for point cloud registration. Recent keypoint-free methods bypass the detection of repeatable keypoints which is difficult in low-overlap scenarios, showing great potential in registration. They seek correspondences over down-sampled superpoints, which are then propagated to dense points. Superpoints are matched based on whether their neighboring patches overlap. Such sparse and loose matching requires contextual features capturing the geometric structure of the point clouds. We propose Geometric Transformer to learn geometric feature for robust superpoint matching. It encodes pair-wise distances and triplet-wise angles, making it robust in low-overlap cases and invariant to rigid transformation. The simplistic design attains surprisingly high matching accuracy such that no RANSAC is required in the estimation of alignment transformation, leading to 100 times acceleration. Our method improves the inlier ratio by 17&#x223C;30 percentage points and the registration recall by over 7 points on the challenging 3DLoMatch benchmark. Our code and models are available at https://github.com/qinzheng93/GeoTransformer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We study the problem of extracting accurate correspondences for point cloud registration. Recent keypoint-free methods bypass the detection of repeatable keypoints which is difficult in low-overlap scenarios, showing great potential in registration. They seek correspondences over down-sampled superpoints, which are then propagated to dense points. Superpoints are matched based on whether their neighboring patches overlap. Such sparse and loose matching requires contextual features capturing the geometric structure of the point clouds. We propose Geometric Transformer to learn geometric feature for robust superpoint matching. It encodes pair-wise distances and triplet-wise angles, making it robust in low-overlap cases and invariant to rigid transformation. The simplistic design attains surprisingly high matching accuracy such that no RANSAC is required in the estimation of alignment transformation, leading to 100 times acceleration. Our method improves the inlier ratio by 17∼30 percentage points and the registration recall by over 7 points on the challenging 3DLoMatch benchmark. Our code and models are available at https://github.com/qinzheng93/GeoTransformer.", "fno": "694600l1133", "keywords": [ "Feature Extraction", "Image Matching", "Image Registration", "Learning Artificial Intelligence", "Geometric Transformer", "Robust Point Cloud Registration", "Accurate Correspondences", "Keypoint Free Methods", "Repeatable Keypoints", "Low Overlap Scenarios", "Down Sampled Superpoints", "Dense Points", "Neighboring Patches", "Sparse Matching", "Loose Matching", "Contextual Features", "Geometric Structure", "Point Clouds", "Geometric Feature", "Robust Superpoint Matching", "Pair Wise Distances", "Triplet Wise Angles", "Low Overlap Cases", "Invariant", "Rigid Transformation", "Simplistic Design Attains Surprisingly High Matching Accuracy", "Alignment Transformation", "17 30 Percentage Points", "Registration Recall", "Point Cloud Compression", "Computer Vision", "Codes", "Estimation", "Benchmark Testing", "Transformers", "Encoding" ], "authors": [ { "affiliation": "National University of Defense Technology", "fullName": "Zheng Qin", "givenName": "Zheng", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Munich", "fullName": "Hao Yu", "givenName": "Hao", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology", "fullName": "Changiian Wang", "givenName": "Changiian", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology", "fullName": "Yulan Guo", "givenName": "Yulan", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology", "fullName": "Yuxing Peng", "givenName": "Yuxing", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology", "fullName": "Kai Xu", "givenName": "Kai", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "11133-11142", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H0NxNe20U0", "name": "pcvpr202269460-09879611s1-mm_694600l1133.zip", "size": "4.95 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09879611s1-mm_694600l1133.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600l1122", "articleId": "1H0LgFdbA2s", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600l1143", "articleId": "1H0KE3IndBK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f490", "title": "Superpoint Network for Point Cloud Oversegmentation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f490/1BmENeiWGTS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3209", "title": "PCAM: Product of Cross-Attention Matrices for Rigid Registration of Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3209/1BmEUXGjNra", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/05/09878213", "title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching", "doi": null, "abstractUrl": "/journal/tp/2023/05/09878213/1GrP5OekHDy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e500", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10076895", "title": "GeoTransformer: Fast and Robust Point Cloud Registration With Geometric Transformer", "doi": null, "abstractUrl": "/journal/tp/5555/01/10076895/1LFQ0GcHene", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10097640", "title": "Sparse-to-Dense Matching Network for Large-scale LiDAR Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/5555/01/10097640/1M9lILSRgL6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a616", "title": "RITNet: A Rotation Invariant Transformer based Network for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a616/1MrFMu2m6E8", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i889", "title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i889/1yeJnETcRR6", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KxUhhFgzlK", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2023", "__typename": "ProceedingType" }, "article": { "id": "1L8qlfO8Lcs", "doi": "10.1109/WACV56688.2023.00449", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "normalizedTitle": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "abstract": "Probabilistic 3D point cloud registration methods have shown competitive performance in overcoming noise, outliers, and density variations. However, registering point cloud pairs in the case of partial overlap is still a challenge. This paper proposes a novel overlap-guided probabilistic registration approach that computes the optimal transformation from matched Gaussian Mixture Model (GMM) parameters. We reformulate the registration problem as the problem of aligning two Gaussian mixtures such that a statistical discrepancy measure between the two corresponding mixtures is minimized. We introduce a Transformer-based detection module to detect overlapping regions, and represent the input point clouds using GMMs by guiding their alignment through overlap scores computed by this detection module. Experiments show that our method achieves superior registration accuracy and efficiency than state-of-the-art methods when handling point clouds with partial overlap and different densities on synthetic and real-world datasets. https://github.com/gfmei/ogmm", "abstracts": [ { "abstractType": "Regular", "content": "Probabilistic 3D point cloud registration methods have shown competitive performance in overcoming noise, outliers, and density variations. However, registering point cloud pairs in the case of partial overlap is still a challenge. This paper proposes a novel overlap-guided probabilistic registration approach that computes the optimal transformation from matched Gaussian Mixture Model (GMM) parameters. We reformulate the registration problem as the problem of aligning two Gaussian mixtures such that a statistical discrepancy measure between the two corresponding mixtures is minimized. We introduce a Transformer-based detection module to detect overlapping regions, and represent the input point clouds using GMMs by guiding their alignment through overlap scores computed by this detection module. Experiments show that our method achieves superior registration accuracy and efficiency than state-of-the-art methods when handling point clouds with partial overlap and different densities on synthetic and real-world datasets. https://github.com/gfmei/ogmm", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Probabilistic 3D point cloud registration methods have shown competitive performance in overcoming noise, outliers, and density variations. However, registering point cloud pairs in the case of partial overlap is still a challenge. This paper proposes a novel overlap-guided probabilistic registration approach that computes the optimal transformation from matched Gaussian Mixture Model (GMM) parameters. We reformulate the registration problem as the problem of aligning two Gaussian mixtures such that a statistical discrepancy measure between the two corresponding mixtures is minimized. We introduce a Transformer-based detection module to detect overlapping regions, and represent the input point clouds using GMMs by guiding their alignment through overlap scores computed by this detection module. Experiments show that our method achieves superior registration accuracy and efficiency than state-of-the-art methods when handling point clouds with partial overlap and different densities on synthetic and real-world datasets. https://github.com/gfmei/ogmm", "fno": "934600e500", "keywords": [ "Gaussian Processes", "Image Registration", "Mixture Models", "GMM", "Optimal Transformation", "Overlap Guided Gaussian Mixture Models", "Overlap Guided Probabilistic Registration Approach", "Probabilistic 3 D Point Cloud Registration Methods", "Transformer Based Detection Module", "Point Cloud Compression", "Computer Vision", "Three Dimensional Displays", "Neural Networks", "Probabilistic Logic", "Transformers", "Minimization" ], "authors": [ { "affiliation": "University of Technology Sydney,Sydney,Australia", "fullName": "Guofeng Mei", "givenName": "Guofeng", "surname": "Mei", "__typename": "ArticleAuthorType" }, { "affiliation": "Fondazione Bruno Kessler,Trento,Italy", "fullName": "Fabio Poiesi", "givenName": "Fabio", "surname": "Poiesi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Trento,Trento,Italy", "fullName": "Cristiano Saltori", "givenName": "Cristiano", "surname": "Saltori", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Technology Sydney,Sydney,Australia", "fullName": "Jian Zhang", "givenName": "Jian", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Trento & FBK,Trento,Italy", "fullName": "Elisa Ricci", "givenName": "Elisa", "surname": "Ricci", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Trento,Trento,Italy", "fullName": "Nicu Sebe", "givenName": "Nicu", "surname": "Sebe", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2023-01-01T00:00:00", "pubType": "proceedings", "pages": "4500-4509", "year": "2023", "issn": null, "isbn": "978-1-6654-9346-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "934600e490", "articleId": "1L8qpLfWIAo", "__typename": "AdjacentArticleType" }, "next": { "fno": "934600e510", "articleId": "1KxUpg9V9o4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/2011/08/ttp2011081633", "title": "Robust Point Set Registration Using Gaussian Mixture Models", "doi": null, "abstractUrl": "/journal/tp/2011/08/ttp2011081633/13rRUxjQycY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/insai/2021/0859/0/085900a136", "title": "Registration of Point Clouds: A Survey", "doi": null, "abstractUrl": "/proceedings-article/insai/2021/085900a136/1CHwMbhCNQA", "parentPublication": { "id": "proceedings/insai/2021/0859/0", "title": "2021 International Conference on Networking Systems of AI (INSAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1133", "title": "Geometric Transformer for Fast and Robust Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991525", "title": "An Adaptive Overlap-based ICP Algorithm for Multi-LiDAR Calibration in Low-overlap Situations", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991525/1JwPU729UaY", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a572", "title": "SGPCR: Spherical Gaussian Point Cloud Representation and its Application to Object Registration and Retrieval", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a572/1L8qEq48PHa", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10076895", "title": "GeoTransformer: Fast and Robust Point Cloud Registration With Geometric Transformer", "doi": null, "abstractUrl": "/journal/tp/5555/01/10076895/1LFQ0GcHene", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09445585", "title": "Consistent Two-Flow Network for Tele-Registration of Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09445585/1u8lzpSvnxu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E270", "title": "PREDATOR: Registration of 3D Point Clouds with Low Overlap", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E270/1yeIk4YXHJ6", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeIk4YXHJ6", "doi": "10.1109/CVPR46437.2021.00425", "title": "PREDATOR: Registration of 3D Point Clouds with Low Overlap", "normalizedTitle": "PREDATOR: Registration of 3D Point Clouds with Low Overlap", "abstract": "We introduce PREDATOR, a model for pairwise point-cloud registration with deep attention to the overlap region. Different from previous work, our model is specifically designed to handle (also) point-cloud pairs with low overlap. Its key novelty is an overlap-attention block for early information exchange between the latent encodings of the two point clouds. In this way the subsequent decoding of the latent representations into per-point features is conditioned on the respective other point cloud, and thus can predict which points are not only salient, but also lie in the overlap region between the two point clouds. The ability to focus on points that are relevant for matching greatly improves performance: PREDATOR raises the rate of successful registrations by more than 20% in the low-overlap scenario, and also sets a new state of the art for the 3DMatch benchmark with 89% registration recall. [Code release]", "abstracts": [ { "abstractType": "Regular", "content": "We introduce PREDATOR, a model for pairwise point-cloud registration with deep attention to the overlap region. Different from previous work, our model is specifically designed to handle (also) point-cloud pairs with low overlap. Its key novelty is an overlap-attention block for early information exchange between the latent encodings of the two point clouds. In this way the subsequent decoding of the latent representations into per-point features is conditioned on the respective other point cloud, and thus can predict which points are not only salient, but also lie in the overlap region between the two point clouds. The ability to focus on points that are relevant for matching greatly improves performance: PREDATOR raises the rate of successful registrations by more than 20% in the low-overlap scenario, and also sets a new state of the art for the 3DMatch benchmark with 89% registration recall. [Code release]", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce PREDATOR, a model for pairwise point-cloud registration with deep attention to the overlap region. Different from previous work, our model is specifically designed to handle (also) point-cloud pairs with low overlap. Its key novelty is an overlap-attention block for early information exchange between the latent encodings of the two point clouds. In this way the subsequent decoding of the latent representations into per-point features is conditioned on the respective other point cloud, and thus can predict which points are not only salient, but also lie in the overlap region between the two point clouds. The ability to focus on points that are relevant for matching greatly improves performance: PREDATOR raises the rate of successful registrations by more than 20% in the low-overlap scenario, and also sets a new state of the art for the 3DMatch benchmark with 89% registration recall. [Code release]", "fno": "4.509E270", "keywords": [ "Image Coding", "Image Matching", "Image Registration", "Stereo Image Processing", "Low Overlap Scenario", "Point Cloud Pairs", "Overlap Attention Block", "Per Point Features", "PREDATOR", "Pairwise Point Cloud Registration With Deep Attention To The Overlap Region", "Information Exchange", "Latent Representations", "Latent Encodings", "Subsequent Decoding", "3 D Match Benchmark", "Convolutional Codes", "Solid Modeling", "Computer Vision", "Three Dimensional Displays", "Image Matching", "Computer Architecture", "Encoding" ], "authors": [ { "affiliation": "ETH Zurich", "fullName": "Shengyu Huang", "givenName": "Shengyu", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Zan Gojcic", "givenName": "Zan", "surname": "Gojcic", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Mikhail Usvyatsov", "givenName": "Mikhail", "surname": "Usvyatsov", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Andreas Wieser", "givenName": "Andreas", "surname": "Wieser", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Konrad Schindler", "givenName": "Konrad", "surname": "Schindler", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "4265-4274", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeIk0lZfdS", "name": "pcvpr202145090-09577334s1-mm_450900e265.zip", "size": "5.61 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09577334s1-mm_450900e265.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "4.509E260", "articleId": "1yeI8wB6bzW", "__typename": "AdjacentArticleType" }, "next": { "fno": "4.509E280", "articleId": "1yeMhSdjwbu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciibms/2015/8562/0/07439538", "title": "Evaluation of pattern based point clouds for patient registration — A phantom study", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439538/12OmNrJROX1", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2006/2597/1/01640899", "title": "Fully Automatic Registration of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2006/01640899/12OmNscOUbU", "parentPublication": { "id": "proceedings/cvpr/2006/2597/2", "title": "2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a747", "title": "EOE: Expected Overlap Estimation over Unstructured Point Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a747/17D45VN31gv", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/01/09705149", "title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/insai/2021/0859/0/085900a136", "title": "Registration of Point Clouds: A Survey", "doi": null, "abstractUrl": "/proceedings-article/insai/2021/085900a136/1CHwMbhCNQA", "parentPublication": { "id": "proceedings/insai/2021/0859/0", "title": "2021 International Conference on Networking Systems of AI (INSAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859814", "title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1133", "title": "Geometric Transformer for Fast and Robust Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e500", "title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09445585", "title": "Consistent Two-Flow Network for Tele-Registration of Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09445585/1u8lzpSvnxu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900l1748", "title": "SpinNet: Learning a General Surface Descriptor for 3D Point Cloud Registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900l1748/1yeMfLYgNS8", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBwGlN", "title": "Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings.", "acronym": "fg", "groupId": "1000065", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNAWYKLa", "doi": "10.1109/AFGR.2004.1301610", "title": "Parametric Tracking of Human Contour by Exploiting Intelligent Edge", "normalizedTitle": "Parametric Tracking of Human Contour by Exploiting Intelligent Edge", "abstract": "In this paper, we adapt the idea of Intelligent Scissors for contour tracking in dynamic image sequence. Tracking contour of human can therefore be converted to tracking seed points in images by making use of the properties of the optimal path (Intelligent Edge). The main advantage of the approach is that it can handle correctly occlusions that occur frequently when human is moving. Non-Uniform Rational B-Spline (NURBS) are used to represent parametrically the contour that we want to track. In order to track robustly the contour in images, similarity and compatibility measurements of the edge are computed as the weighting functions of optimal estimator. To reduce dramatically the computational load, an efficient method for extracting the region that we are interested in is proposed. Experiments show that our approach works robustly with sequences with frequent occlusions.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we adapt the idea of Intelligent Scissors for contour tracking in dynamic image sequence. Tracking contour of human can therefore be converted to tracking seed points in images by making use of the properties of the optimal path (Intelligent Edge). The main advantage of the approach is that it can handle correctly occlusions that occur frequently when human is moving. Non-Uniform Rational B-Spline (NURBS) are used to represent parametrically the contour that we want to track. In order to track robustly the contour in images, similarity and compatibility measurements of the edge are computed as the weighting functions of optimal estimator. To reduce dramatically the computational load, an efficient method for extracting the region that we are interested in is proposed. Experiments show that our approach works robustly with sequences with frequent occlusions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we adapt the idea of Intelligent Scissors for contour tracking in dynamic image sequence. Tracking contour of human can therefore be converted to tracking seed points in images by making use of the properties of the optimal path (Intelligent Edge). The main advantage of the approach is that it can handle correctly occlusions that occur frequently when human is moving. Non-Uniform Rational B-Spline (NURBS) are used to represent parametrically the contour that we want to track. In order to track robustly the contour in images, similarity and compatibility measurements of the edge are computed as the weighting functions of optimal estimator. To reduce dramatically the computational load, an efficient method for extracting the region that we are interested in is proposed. Experiments show that our approach works robustly with sequences with frequent occlusions.", "fno": "21220663", "keywords": [], "authors": [ { "affiliation": "Chinese Academy of Sciences, P. R. China", "fullName": "Chunhong Pan", "givenName": "Chunhong", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences, P. R. China", "fullName": "Songde Ma", "givenName": "Songde", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "fg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-05-01T00:00:00", "pubType": "proceedings", "pages": "663", "year": "2004", "issn": null, "isbn": "0-7695-2122-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21220657", "articleId": "12OmNzSh18Z", "__typename": "AdjacentArticleType" }, "next": { "fno": "21220669", "articleId": "12OmNy3Agpw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmi/2002/1834/0/18340281", "title": "A Probabilistic Dynamic Contour Model for Accurate and Robust Lip Tracking", "doi": null, "abstractUrl": "/proceedings-article/icmi/2002/18340281/12OmNCdBDXc", "parentPublication": { "id": "proceedings/icmi/2002/1834/0", "title": "Proceedings Fourth IEEE International Conference on Multimodal Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2008/3328/0/3328a778", "title": "Occlusion Processing Method Using Improved Object Contour Extraction Algorithm by Neighboring Edge Search and MER in Simulation", "doi": null, "abstractUrl": "/proceedings-article/ichit/2008/3328a778/12OmNCfjeqr", "parentPublication": { "id": "proceedings/ichit/2008/3328/0", "title": "2008 International Conference on Convergence and Hybrid Information Technology (ICHIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ratfg-rts/2001/1074/0/10740055", "title": "Real-Time Stereo Tracking of Multiple Moving Heads", "doi": null, "abstractUrl": "/proceedings-article/ratfg-rts/2001/10740055/12OmNxFJXHC", "parentPublication": { "id": "proceedings/ratfg-rts/2001/1074/0", "title": "Recognition, Analysis, &amp; Tracking of Faces &amp; Gestures in Real -Time Systems, IEEE ICCV Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2004/2128/4/212840755", "title": "Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene", "doi": null, "abstractUrl": "/proceedings-article/icpr/2004/212840755/12OmNxTmHJB", "parentPublication": { "id": "proceedings/icpr/2004/2128/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06012040", "title": "Tracking pedestrians with incremental learned intensity and contour templates for PTZ camera visual surveillance", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06012040/12OmNzRHOMh", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2003/1900/1/190010295", "title": "Switching Observation Models for Contour Tracking in Clutter", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2003/190010295/12OmNzV70P4", "parentPublication": { "id": "proceedings/cvpr/2003/1900/1", "title": "2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2012/4899/0/4899a018", "title": "A New Intelligent Contour Tracking Algorithm in Binary Image", "doi": null, "abstractUrl": "/proceedings-article/icdh/2012/4899a018/12OmNzayN6J", "parentPublication": { "id": "proceedings/icdh/2012/4899/0", "title": "4th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09445817", "title": "Pixel-Wise Weighted Region-Based 3D Object Tracking Using Contour Constraints", "doi": null, "abstractUrl": "/journal/tg/2022/12/09445817/1u8lzby2Upy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVn", "title": "2015 International Conference on Virtual Reality and Visualization (ICVRV)", "acronym": "icvrv", "groupId": "1800579", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOllrq", "doi": "10.1109/ICVRV.2015.32", "title": "Gesture Recognition Based on Pixel Classification and Contour Extraction", "normalizedTitle": "Gesture Recognition Based on Pixel Classification and Contour Extraction", "abstract": "Most of the existing gesture recognition methods are based on the detecting of fingertips and palm points. Thus we address the techniques of gesture recognition by combining the features of fingertips, wrist and arm. In our method, firstly, rough hand region is segmented from depth image, and then precise hand region is refined by Bayesian skin color model. Secondly, finger and fingertip region is extracted in the segmented precise hand region by the pixel classification. Finally, fingertip points are accurately obtained by the method of ellipse fitting. Contour is drawn at the precise hand region, wrist point is detected by the minimum inscribed rectangle and arm point is detected through inscribed circle of the contour. Compared with other algorithms, the algorithms proposed in this paper can exactly detect feature points for gesture recognition.", "abstracts": [ { "abstractType": "Regular", "content": "Most of the existing gesture recognition methods are based on the detecting of fingertips and palm points. Thus we address the techniques of gesture recognition by combining the features of fingertips, wrist and arm. In our method, firstly, rough hand region is segmented from depth image, and then precise hand region is refined by Bayesian skin color model. Secondly, finger and fingertip region is extracted in the segmented precise hand region by the pixel classification. Finally, fingertip points are accurately obtained by the method of ellipse fitting. Contour is drawn at the precise hand region, wrist point is detected by the minimum inscribed rectangle and arm point is detected through inscribed circle of the contour. Compared with other algorithms, the algorithms proposed in this paper can exactly detect feature points for gesture recognition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most of the existing gesture recognition methods are based on the detecting of fingertips and palm points. Thus we address the techniques of gesture recognition by combining the features of fingertips, wrist and arm. In our method, firstly, rough hand region is segmented from depth image, and then precise hand region is refined by Bayesian skin color model. Secondly, finger and fingertip region is extracted in the segmented precise hand region by the pixel classification. Finally, fingertip points are accurately obtained by the method of ellipse fitting. Contour is drawn at the precise hand region, wrist point is detected by the minimum inscribed rectangle and arm point is detected through inscribed circle of the contour. Compared with other algorithms, the algorithms proposed in this paper can exactly detect feature points for gesture recognition.", "fno": "7673a093", "keywords": [ "Thumb", "Wrist", "Gesture Recognition", "Feature Extraction", "Image Color Analysis", "Skin", "Depth Image", "Gesture Recognition", "HCI", "Ellipse Fitting", "Contour" ], "authors": [ { "affiliation": null, "fullName": "Shuangshuang Guo", "givenName": "Shuangshuang", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mingmin Zhang", "givenName": "Mingmin", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhigeng Pan", "givenName": "Zhigeng", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Minghui Sun", "givenName": "Minghui", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvrv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "93-100", "year": "2015", "issn": null, "isbn": "978-1-4673-7673-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7673a089", "articleId": "12OmNAQJzKx", "__typename": "AdjacentArticleType" }, "next": { "fno": "7673a101", "articleId": "12OmNyoiZfx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isms/2012/4668/0/4668a262", "title": "Hidden Markov Model-Based Gesture Recognition with Overlapping Hand-Head/Hand-Hand Estimated Using Kalman Filter", "doi": null, "abstractUrl": "/proceedings-article/isms/2012/4668a262/12OmNA0vnNL", "parentPublication": { "id": "proceedings/isms/2012/4668/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2017/2937/0/2937a459", "title": "Hand Gesture Recognition Based on Wavelet Invariant Moments", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a459/12OmNBO3KkX", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2015/7947/0/07346669", "title": "Background and skin colour independent hand region extraction and static gesture recognition", "doi": null, "abstractUrl": "/proceedings-article/ic3/2015/07346669/12OmNqFJhUZ", "parentPublication": { "id": "proceedings/ic3/2015/7947/0", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726505", "title": "Hand gesture to speech conversion using Matlab", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726505/12OmNqGA57o", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit-csi/2016/4871/0/07916962", "title": "Integration of Hand Gesture and Multi Touch Gesture with Glove Type Device", "doi": null, "abstractUrl": "/proceedings-article/acit-csi/2016/07916962/12OmNrGsDoo", "parentPublication": { "id": "proceedings/acit-csi/2016/4871/0", "title": "2016 4th Intl. Conf. on Applied Computing and Information Technology (ACIT), 3rd Intl. Conf. on Computational Science/Intelligence and Applied Informatics (CSII), and 1st Intl. Conf. on Big Data, Cloud Computing, Data Science & Engineering (BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314284", "title": "A Close-Range Gesture Interaction with Kinect", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314284/12OmNvkpkW1", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icesssymposia/2008/3288/0/3288a386", "title": "Adaptive Motion Gesture Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icesssymposia/2008/3288a386/12OmNwudQSG", "parentPublication": { "id": "proceedings/icesssymposia/2008/3288/0", "title": "Embedded Software and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciss/2015/8611/0/07370994", "title": "Detecting Fingertip Robust Scale-Invariant and Rotation Invariant with Stereo Camera", "doi": null, "abstractUrl": "/proceedings-article/iciss/2015/07370994/12OmNx8Our8", "parentPublication": { "id": "proceedings/iciss/2015/8611/0", "title": "2015 2nd International Conference on Information Science and Security (ICISS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2014/7981/0/7981b096", "title": "A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points", "doi": null, "abstractUrl": "/proceedings-article/cse/2014/7981b096/12OmNxxvAHv", "parentPublication": { "id": "proceedings/cse/2014/7981/0", "title": "2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmip/2017/5954/0/5954a098", "title": "Dynamic Gesture Recognition Based on the Trend of Key Points", "doi": null, "abstractUrl": "/proceedings-article/icmip/2017/5954a098/12OmNymjN1M", "parentPublication": { "id": "proceedings/icmip/2017/5954/0", "title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvlxJwU", "title": "Proceedings of 12th International Conference on Pattern Recognition", "acronym": "icpr", "groupId": "1000545", "volume": "1", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNClQ0z8", "doi": "10.1109/ICPR.1994.576296", "title": "On the relation between region and contour representation", "normalizedTitle": "On the relation between region and contour representation", "abstract": "Fourier descriptor and geometric moments are respectively the contour and region representations of objects in a binary image. In this paper, the authors reveal the relation between these two representations. The authors first generalize the Fourier descriptor to make it suitable for objects with more complex form. Then it is shown that the two representations are related by a simple linear transformation.", "abstracts": [ { "abstractType": "Regular", "content": "Fourier descriptor and geometric moments are respectively the contour and region representations of objects in a binary image. In this paper, the authors reveal the relation between these two representations. The authors first generalize the Fourier descriptor to make it suitable for objects with more complex form. Then it is shown that the two representations are related by a simple linear transformation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fourier descriptor and geometric moments are respectively the contour and region representations of objects in a binary image. In this paper, the authors reveal the relation between these two representations. The authors first generalize the Fourier descriptor to make it suitable for objects with more complex form. Then it is shown that the two representations are related by a simple linear transformation.", "fno": "00576296", "keywords": [ "Image Segmentation", "Contour Representation", "Region Representation", "Fourier Descriptor", "Geometric Moments", "Binary Image", "Linear Transformation", "Pattern Recognition", "Laboratories", "Automation", "Inverse Problems", "Vectors" ], "authors": [ { "affiliation": "Inst. of Autom., Acad. Sinica, Beijing, China", "fullName": "Bingcheng Li", "givenName": null, "surname": "Bingcheng Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Song De Ma", "givenName": null, "surname": "Song De Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "352,353,354,355", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00576294", "articleId": "12OmNxETagp", "__typename": "AdjacentArticleType" }, "next": { "fno": "00576297", "articleId": "12OmNz6iORh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mines/2010/4258/0/4258a035", "title": "Fast Texture Segmentation Based on Semi-local Region Descriptor and Active Contour Driven by the Bhattacharyya Distance", "doi": null, "abstractUrl": "/proceedings-article/mines/2010/4258a035/12OmNAndimG", "parentPublication": { "id": "proceedings/mines/2010/4258/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2015/6759/0/07301273", "title": "Object level deep feature pooling for compact image representation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2015/07301273/12OmNqGRGeq", "parentPublication": { "id": "proceedings/cvprw/2015/6759/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/3/01259766", "title": "Spatio-temporal representation for multi-dimensional occlusion relation", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259766/12OmNrIrPqd", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1990/2032/0/00089200", "title": "Representation of models for solving real-world physics problems", "doi": null, "abstractUrl": "/proceedings-article/caia/1990/00089200/12OmNxd4tu9", "parentPublication": { "id": "proceedings/caia/1990/2032/0", "title": "Sixth Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78220615", "title": "Representation Of Objects In A Volumetric Frequency Domain With Application To Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78220615/12OmNyoSb94", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icds/2008/3087/0/3087a146", "title": "Multi-source Illumination Approach for Buried Objects Exploration", "doi": null, "abstractUrl": "/proceedings-article/icds/2008/3087a146/12OmNzBOhLL", "parentPublication": { "id": "proceedings/icds/2008/3087/0", "title": "International Conference on the Digital Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457509", "title": "Fast computation of 3D spherical Fourier harmonic descriptors - a complete orthonormal basis for a rotational invariant representation of three-dimensional objects", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457509/12OmNzvz6GL", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1998/05/i0449", "title": "A Volumetric/Iconic Frequency Domain Representation for Objects With Application for Pose Invariant Face Recognition", "doi": null, "abstractUrl": "/journal/tp/1998/05/i0449/13rRUILLkwi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2019/9245/0/924500a167", "title": "CHIME: An Adaptive Hierarchical Representation for Continuous Intrinsically Motivated Exploration", "doi": null, "abstractUrl": "/proceedings-article/irc/2019/924500a167/18M7gwxqrbG", "parentPublication": { "id": "proceedings/irc/2019/9245/0", "title": "2019 Third IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900f047", "title": "Unstructured Object Matching using Co-Salient Region Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900f047/1G56hhfMKUE", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMe", "title": "Computer Vision, IEEE International Conference on", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNwudQOQ", "doi": "10.1109/ICCV.1995.466925", "title": "Region tracking through image sequences", "normalizedTitle": "Region tracking through image sequences", "abstract": "The paper describes an approach to the tracking of complex shapes through image sequences, that combines deformable region models and deformable contours. A deformable region model is presented: its optimisation is based on texture correlation and is constrained by the use of a motion model, such as rigid, affine or homographic. The use of texture information (versus edge information) noticeably improves the tracking performances of deformable models in the presence of texture. Then the region contour is refined using an edge based deformable model in order to better deal with specularities, non planar objects and occlusions. The method is illustrated and validated by experimental results on real images.", "abstracts": [ { "abstractType": "Regular", "content": "The paper describes an approach to the tracking of complex shapes through image sequences, that combines deformable region models and deformable contours. A deformable region model is presented: its optimisation is based on texture correlation and is constrained by the use of a motion model, such as rigid, affine or homographic. The use of texture information (versus edge information) noticeably improves the tracking performances of deformable models in the presence of texture. Then the region contour is refined using an edge based deformable model in order to better deal with specularities, non planar objects and occlusions. The method is illustrated and validated by experimental results on real images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The paper describes an approach to the tracking of complex shapes through image sequences, that combines deformable region models and deformable contours. A deformable region model is presented: its optimisation is based on texture correlation and is constrained by the use of a motion model, such as rigid, affine or homographic. The use of texture information (versus edge information) noticeably improves the tracking performances of deformable models in the presence of texture. Then the region contour is refined using an edge based deformable model in order to better deal with specularities, non planar objects and occlusions. The method is illustrated and validated by experimental results on real images.", "fno": "70420302", "keywords": [ "Image Segmentation Image Sequences Image Texture Tracking Edge Detection Motion Estimation Region Tracking Image Sequences Complex Shapes Deformable Region Models Deformable Contours Texture Correlation Motion Model Edge Information Tracking Performances Edge Based Deformable Model Non Planar Objects Occlusions Specularities Real Images" ], "authors": [ { "affiliation": "Dept. of Eng. Sci., Oxford Univ., UK", "fullName": "B. Bascle", "givenName": "B.", "surname": "Bascle", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Eng. Sci., Oxford Univ., UK", "fullName": "R. Deriche", "givenName": "R.", "surname": "Deriche", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-06-01T00:00:00", "pubType": "proceedings", "pages": "302", "year": "1995", "issn": null, "isbn": "0-8186-7042-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "70420296", "articleId": "12OmNxGSm5M", "__typename": "AdjacentArticleType" }, "next": { "fno": "70420308", "articleId": "12OmNzahcld", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa7U", "title": "2012 Fourth International Symposium on Information Science and Engineering (ISISE 2012)", "acronym": "isise", "groupId": "1002561", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNx7ouIs", "doi": "10.1109/ISISE.2012.58", "title": "Local Covariant Region Detection Based on Image Contour Corner", "normalizedTitle": "Local Covariant Region Detection Based on Image Contour Corner", "abstract": "In this paper, a local covariant region detection algorithm is proposed based on image contour corners. We define the corner response function as the DoB (Difference of B-spline) norm of the evolution difference of the image contour. A new feature region detection algorithm is designed combining corner points from the DoB algorithm and the scale invariance of the contour direction in the corner neighborhood. Finally, the feature covariant regions in multiple groups of interfered image are matched using the repetition rate criterion. The experimental results illustrate that the proposed algorithm has the properties such as simple calculation, easy realization and better robustness.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, a local covariant region detection algorithm is proposed based on image contour corners. We define the corner response function as the DoB (Difference of B-spline) norm of the evolution difference of the image contour. A new feature region detection algorithm is designed combining corner points from the DoB algorithm and the scale invariance of the contour direction in the corner neighborhood. Finally, the feature covariant regions in multiple groups of interfered image are matched using the repetition rate criterion. The experimental results illustrate that the proposed algorithm has the properties such as simple calculation, easy realization and better robustness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, a local covariant region detection algorithm is proposed based on image contour corners. We define the corner response function as the DoB (Difference of B-spline) norm of the evolution difference of the image contour. A new feature region detection algorithm is designed combining corner points from the DoB algorithm and the scale invariance of the contour direction in the corner neighborhood. Finally, the feature covariant regions in multiple groups of interfered image are matched using the repetition rate criterion. The experimental results illustrate that the proposed algorithm has the properties such as simple calculation, easy realization and better robustness.", "fno": "06495334", "keywords": [ "Feature Extraction", "Object Detection", "Splines Mathematics", "Local Covariant Region Detection", "Image Contour Corner", "Corner Response Function", "Do B", "Difference Of B Spline", "Evolution Difference", "Feature Region Detection Algorithm", "Scale Invariance", "Feature Covariant Region", "Repetition Rate Criterion", "Image Contours", "Local Features", "Corner Detection", "Covariant Regions" ], "authors": [ { "affiliation": null, "fullName": "Ling Xu", "givenName": "Ling", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mengning Yang", "givenName": "Mengning", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hongxing Wang", "givenName": "Hongxing", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaoze Lin", "givenName": "Xiaoze", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "isise", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "232-235", "year": "2012", "issn": "2160-1283", "isbn": "978-1-4673-5680-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06495333", "articleId": "12OmNyqRneA", "__typename": "AdjacentArticleType" }, "next": { "fno": "06495335", "articleId": "12OmNzFdt3B", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/5/3735e316", "title": "A New Contour Corner Detector Based on Curvature Scale Space", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735e316/12OmNAtK4q9", "parentPublication": { "id": "proceedings/fskd/2009/3735/5", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgec/2011/4449/0/4449a345", "title": "Symmetry Auto-detection Based on Contour and Corner Models", "doi": null, "abstractUrl": "/proceedings-article/icgec/2011/4449a345/12OmNBTs7CQ", "parentPublication": { "id": "proceedings/icgec/2011/4449/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visapp/2014/8133/1/07294818", "title": "Polygonal approximation of an object contour by detecting edge dominant corners using Iterative Corner Suppression", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07294818/12OmNCbU39g", "parentPublication": { "id": "proceedings/visapp/2014/8133/1", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2009/3789/0/3789a193", "title": "A Novel Corner Detector Approach using Sliding Ellipses", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a193/12OmNrAdsBQ", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2010/4271/0/4271a092", "title": "A Comparative Study on Contour-Based Corner Detectors", "doi": null, "abstractUrl": "/proceedings-article/dicta/2010/4271a092/12OmNrkBwx6", "parentPublication": { "id": "proceedings/dicta/2010/4271/0", "title": "2010 International Conference on Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1991/2148/0/00139783", "title": "Early jump-out corner detectors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1991/00139783/12OmNywfKyV", "parentPublication": { "id": "proceedings/cvpr/1991/2148/0", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457e923", "title": "Learning Discriminative and Transformation Covariant Local Feature Detectors", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457e923/12OmNzVoBzH", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284942", "title": "A Robust Corner Matching Technique", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284942/12OmNzmtWFl", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1993/08/i0823", "title": "Early Jump-Out Corner Detectors", "doi": null, "abstractUrl": "/journal/tp/1993/08/i0823/13rRUy3xY8W", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/09/i0913", "title": "Contour Tracking and Corner Detection in a Logic Programming Environment", "doi": null, "abstractUrl": "/journal/tp/1990/09/i0913/13rRUygT79V", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqyUUIn", "title": "Image and Graphics, International Conference on", "acronym": "icig", "groupId": "1001790", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxVDuRr", "doi": "10.1109/ICIG.2009.78", "title": "Contour Tracking Based on Online Feature Selection and Dynamic Neighbor Region Fast Level Set", "normalizedTitle": "Contour Tracking Based on Online Feature Selection and Dynamic Neighbor Region Fast Level Set", "abstract": "A novel contour tracking algorithm is proposed in this paper. The algorithm first coverts the input image into sixteen different color feature spaces and adopts Fisher discriminating rule to adaptively select the top-ranked three discriminative feature spaces who can discriminate the target region and its neighbor background region best, then adopts the nearest neighbor decision method to construct the velocity expression of fast level set only in target region and its neighbor background region but not the whole image plane, finally, contour tracking is realized by evolving the zero level set curve using dynamic neighbor region fast level set algorithm which is proposed in this paper. Experiments show that this algorithm can track target contour under conditions of moving background, illumination variation, partial occlusion and the scale and shape change of target.", "abstracts": [ { "abstractType": "Regular", "content": "A novel contour tracking algorithm is proposed in this paper. The algorithm first coverts the input image into sixteen different color feature spaces and adopts Fisher discriminating rule to adaptively select the top-ranked three discriminative feature spaces who can discriminate the target region and its neighbor background region best, then adopts the nearest neighbor decision method to construct the velocity expression of fast level set only in target region and its neighbor background region but not the whole image plane, finally, contour tracking is realized by evolving the zero level set curve using dynamic neighbor region fast level set algorithm which is proposed in this paper. Experiments show that this algorithm can track target contour under conditions of moving background, illumination variation, partial occlusion and the scale and shape change of target.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A novel contour tracking algorithm is proposed in this paper. The algorithm first coverts the input image into sixteen different color feature spaces and adopts Fisher discriminating rule to adaptively select the top-ranked three discriminative feature spaces who can discriminate the target region and its neighbor background region best, then adopts the nearest neighbor decision method to construct the velocity expression of fast level set only in target region and its neighbor background region but not the whole image plane, finally, contour tracking is realized by evolving the zero level set curve using dynamic neighbor region fast level set algorithm which is proposed in this paper. Experiments show that this algorithm can track target contour under conditions of moving background, illumination variation, partial occlusion and the scale and shape change of target.", "fno": "3883a238", "keywords": [ "Contour Tracking", "Fisher Discriminating Rule", "Online Feature Selection", "Fast Level Set" ], "authors": [ { "affiliation": null, "fullName": "Zifu Wei", "givenName": "Zifu", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Duyan Bi", "givenName": "Duyan", "surname": "Bi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shan Gao", "givenName": "Shan", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianjun Xu", "givenName": "Jianjun", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icig", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "238-243", "year": "2009", "issn": null, "isbn": "978-0-7695-3883-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3883a232", "articleId": "12OmNwtEEHY", "__typename": "AdjacentArticleType" }, "next": { "fno": "3883a244", "articleId": "12OmNARiM8t", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/4132/2/4132b130", "title": "A Novel Robust Contour Tracking Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b130/12OmNwwd2NE", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2010/4249/0/4249a012", "title": "An Effective Method for Calculating the Area of Enclosed Region", "doi": null, "abstractUrl": "/proceedings-article/icinis/2010/4249a012/12OmNxV4izn", "parentPublication": { "id": "proceedings/icinis/2010/4249/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/2/81832049", "title": "Rate-distortion optimal contour prediction for a region-based coder", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81832049/12OmNxy4N35", "parentPublication": { "id": "proceedings/icip/1997/8183/2", "title": "Proceedings of International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainaw/2008/3096/0/3096b163", "title": "Hybrid Content-Based Trademark Retrieval Using Region and Contour Features", "doi": null, "abstractUrl": "/proceedings-article/ainaw/2008/3096b163/12OmNyen1x0", "parentPublication": { "id": "proceedings/ainaw/2008/3096/0", "title": "2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2005/2432/0/24320608", "title": "Human Contour Extraction Using Level Set", "doi": null, "abstractUrl": "/proceedings-article/cit/2005/24320608/12OmNywOWNj", "parentPublication": { "id": "proceedings/cit/2005/2432/0", "title": "The Fifth International Conference on Computer and Information Technology CIT 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/2/3804b066", "title": "Initial Contour Automatic Selection of Geometric Active Contour Model", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804b066/12OmNyz5JS4", "parentPublication": { "id": "proceedings/icicta/2009/3804/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2010/3987/1/3987a113", "title": "Motion Detection and Target Contour Extraction Based on Monitor System", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987a113/12OmNz61dGO", "parentPublication": { "id": "proceedings/etcs/2010/3987/1", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2012/4899/0/4899a335", "title": "Salient Object Contour Detection Based on Boundary Similar Region", "doi": null, "abstractUrl": "/proceedings-article/icdh/2012/4899a335/12OmNzBwGJU", "parentPublication": { "id": "proceedings/icdh/2012/4899/0", "title": "4th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwcs/2010/4003/0/4003a090", "title": "Research on Motion Detection and Target Contour Extraction in Wearable Video System", "doi": null, "abstractUrl": "/proceedings-article/apwcs/2010/4003a090/12OmNzRZq0E", "parentPublication": { "id": "proceedings/apwcs/2010/4003/0", "title": "Wearable Computing Systems, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109e332", "title": "A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109e332/12OmNzXnNDr", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzYeB3H", "title": "11th IAPR International Conference on Pattern Recognition. Vol. III. Conference C: Image, Speech and Signal Analysis,", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUPpbQ", "doi": "10.1109/ICPR.1992.201992", "title": "Image segmentation by region-contour cooperation for image coding", "normalizedTitle": "Image segmentation by region-contour cooperation for image coding", "abstract": "Describes a method of image segmentation for image coding based on contour detection and region-growing procedures. Contour detection allows one to find the most evident frontiers of homogeneous regions. The region-growing procedure serves to close contours and to obtain more precise segmentation. The original idea of the method is the choice of growing centres which are placed on the skeleton of non-closed regions and used in split-and-merge procedure of region growing. The method allows one to obtain staircase closure of original contours which is easy to code.<>", "abstracts": [ { "abstractType": "Regular", "content": "Describes a method of image segmentation for image coding based on contour detection and region-growing procedures. Contour detection allows one to find the most evident frontiers of homogeneous regions. The region-growing procedure serves to close contours and to obtain more precise segmentation. The original idea of the method is the choice of growing centres which are placed on the skeleton of non-closed regions and used in split-and-merge procedure of region growing. The method allows one to obtain staircase closure of original contours which is easy to code.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Describes a method of image segmentation for image coding based on contour detection and region-growing procedures. Contour detection allows one to find the most evident frontiers of homogeneous regions. The region-growing procedure serves to close contours and to obtain more precise segmentation. The original idea of the method is the choice of growing centres which are placed on the skeleton of non-closed regions and used in split-and-merge procedure of region growing. The method allows one to obtain staircase closure of original contours which is easy to code.", "fno": "00201992", "keywords": [ "Image Coding", "Image Segmentation", "Region Contour Cooperation", "Image Coding", "Image Segmentation", "Contour Detection", "Region Growing", "Split And Merge Procedure", "Staircase Closure", "Image Segmentation", "Image Coding", "Joining Processes", "Skeleton", "Nonlinear Filters", "Cleaning" ], "authors": [ { "affiliation": "IRESTE/LATI, Nantes, France", "fullName": "J. Benois", "givenName": "J.", "surname": "Benois", "__typename": "ArticleAuthorType" }, { "affiliation": "IRESTE/LATI, Nantes, France", "fullName": "D. Barba", "givenName": "D.", "surname": "Barba", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "331-334", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00201991", "articleId": "12OmNClQ0Ch", "__typename": "AdjacentArticleType" }, "next": { "fno": "00201993", "articleId": "12OmNBhHt6T", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dcc/1995/7012/0/70120478", "title": "Generalized region based transform coding for video compression", "doi": null, "abstractUrl": "/proceedings-article/dcc/1995/70120478/12OmNAnMuEH", "parentPublication": { "id": "proceedings/dcc/1995/7012/0", "title": "Proceedings DCC '95 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457f863", "title": "Contour-Constrained Superpixels for Image and Video Processing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f863/12OmNqBtiT0", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126468", "title": "Active geodesics: Region-based active contour segmentation with a global edge-based constraint", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126468/12OmNwIHoqm", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/1/73100546", "title": "Image sequence coding using a contour-based method", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73100546/12OmNwcl7A2", "parentPublication": { "id": "proceedings/icip/1995/7310/1", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420302", "title": "Region tracking through image sequences", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420302/12OmNwudQOQ", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wbia/1998/8460/0/84600093", "title": "Maximum a posteriori Segmentation for Medical Visualization", "doi": null, "abstractUrl": "/proceedings-article/wbia/1998/84600093/12OmNyKa5Wj", "parentPublication": { "id": "proceedings/wbia/1998/8460/0", "title": "Biomedical Image Analysis, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2012/4899/0/4899a018", "title": "A New Intelligent Contour Tracking Algorithm in Binary Image", "doi": null, "abstractUrl": "/proceedings-article/icdh/2012/4899a018/12OmNzayN6J", "parentPublication": { "id": "proceedings/icdh/2012/4899/0", "title": "4th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1992/3160/0/00269283", "title": "Contour-based multisensor image registration", "doi": null, "abstractUrl": "/proceedings-article/acssc/1992/00269283/12OmNzcPAdW", "parentPublication": { "id": "proceedings/acssc/1992/3160/0", "title": "Conference Record of the Twenty-Sixth Asilomar Conference on Signals, Systems & Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2000/0662/1/06621064", "title": "A Region Extraction Method Using Multiple Active Contour Models", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2000/06621064/12OmNzsJ7ol", "parentPublication": { "id": "proceedings/cvpr/2000/0662/1", "title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2021/2186/0/218600a763", "title": "Active Contour Driven by Region Fitting and Laplacian for Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icaice/2021/218600a763/1Et4yY7QhVu", "parentPublication": { "id": "proceedings/icaice/2021/2186/0", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKq", "title": "Image Analysis for Multimedia Interactive Services, International Workshop on", "acronym": "wiamis", "groupId": "1001817", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "17D45XH89nO", "doi": "10.1109/WIAMIS.2007.82", "title": "Tracking based on local motion estimation of spatio-temporally weighted salient points", "normalizedTitle": "Tracking based on local motion estimation of spatio-temporally weighted salient points", "abstract": "The extraction of a video object contour, called \"rotoscoping\" in cinematographic post-production, is usually performed manually and frame by frame. Semi-automatic algorithms have been proposed to reduce the load of this task. However, they classically use region information and are usually based on a notion of homogeneity of the object. This homogeneity description might be difficult to establish and, consequently, the tracking may be not precise enough. The proposed method relies on the analysis of some temporal trajectories of salient points, or keypoints, called tracks. The main contribution of this paper is the local estimation, both spatially and temporally, of the contour motion from these tracks. The proposed method seems accurate, robust to outliers, and allows local deformation. Moreover, it can deal with partial occlusions.", "abstracts": [ { "abstractType": "Regular", "content": "The extraction of a video object contour, called \"rotoscoping\" in cinematographic post-production, is usually performed manually and frame by frame. Semi-automatic algorithms have been proposed to reduce the load of this task. However, they classically use region information and are usually based on a notion of homogeneity of the object. This homogeneity description might be difficult to establish and, consequently, the tracking may be not precise enough. The proposed method relies on the analysis of some temporal trajectories of salient points, or keypoints, called tracks. The main contribution of this paper is the local estimation, both spatially and temporally, of the contour motion from these tracks. The proposed method seems accurate, robust to outliers, and allows local deformation. Moreover, it can deal with partial occlusions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The extraction of a video object contour, called \"rotoscoping\" in cinematographic post-production, is usually performed manually and frame by frame. Semi-automatic algorithms have been proposed to reduce the load of this task. However, they classically use region information and are usually based on a notion of homogeneity of the object. This homogeneity description might be difficult to establish and, consequently, the tracking may be not precise enough. The proposed method relies on the analysis of some temporal trajectories of salient points, or keypoints, called tracks. The main contribution of this paper is the local estimation, both spatially and temporally, of the contour motion from these tracks. The proposed method seems accurate, robust to outliers, and allows local deformation. Moreover, it can deal with partial occlusions.", "fno": "04279145", "keywords": [ "Edge Detection", "Hidden Feature Removal", "Motion Estimation", "Object Detection", "Spatiotemporal Phenomena", "Tracking", "Video Signal Processing", "Local Motion Estimation", "Spatio Temporal Weighted Salient Point Tracking", "Rotoscoping Video Object Contour Extraction", "Cinematographic Post Production", "Partial Occlusion", "Tracking", "Motion Estimation", "Robustness", "Trajectory", "Image Segmentation", "Data Mining", "Cinematography", "Visual Effects", "Animation", "Tellurium" ], "authors": [ { "affiliation": "Universite de Nice - Sophia Antipolis, France", "fullName": "Vincent Garcia", "givenName": "Vincent", "surname": "Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": "Universite de Nice - Sophia Antipolis, France", "fullName": "Eric Debreuve", "givenName": "Eric", "surname": "Debreuve", "__typename": "ArticleAuthorType" }, { "affiliation": "Universite de Nice - Sophia Antipolis, France", "fullName": "Michel Barlaud", "givenName": "Michel", "surname": "Barlaud", "__typename": "ArticleAuthorType" } ], "idPrefix": "wiamis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "37", "year": "2007", "issn": null, "isbn": "0-7695-2818-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28180036", "articleId": "12OmNx3Zjah", "__typename": "AdjacentArticleType" }, "next": { "fno": "28180038", "articleId": "12OmNzayNEY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2004/8696/0/86960027", "title": "Effect Lines for Specifying Animation Effects", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2004/86960027/12OmNxE2mTv", "parentPublication": { "id": "proceedings/vlhcc/2004/8696/0", "title": "Proceedings. 2004 IEEE Symposium on Visual Languages and Human Centric Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Et4qebUc4E", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "acronym": "icaice", "groupId": "1840544", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1Et4yY7QhVu", "doi": "10.1109/ICAICE54393.2021.00149", "title": "Active Contour Driven by Region Fitting and Laplacian for Image Segmentation", "normalizedTitle": "Active Contour Driven by Region Fitting and Laplacian for Image Segmentation", "abstract": "The region-based active contour models can easily get stuck in local minimums and the image has intensity inhomogeneity. To solve this problem, we proposed an active contour model driven by region fitting and Laplacian. Firstly, a improved local fitting image is defined by adjusting the local average intensity weight, which can effectively avoid local minimums. Then, a region fitting term is defined by using both global and improved local fitting images. Moreover, local and global signed pressure force functions are introduced in the solution of the energy function to stabilize the gradient descent flow. Finally, a Laplacian energy term is introduced in the energy function, which can smooth the homogeneous regions and enhance edge information. Experimental results with different types of images are used for quantitative and qualitative compared with region-based active contour models show that the proposed model has a higher segmentation accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "The region-based active contour models can easily get stuck in local minimums and the image has intensity inhomogeneity. To solve this problem, we proposed an active contour model driven by region fitting and Laplacian. Firstly, a improved local fitting image is defined by adjusting the local average intensity weight, which can effectively avoid local minimums. Then, a region fitting term is defined by using both global and improved local fitting images. Moreover, local and global signed pressure force functions are introduced in the solution of the energy function to stabilize the gradient descent flow. Finally, a Laplacian energy term is introduced in the energy function, which can smooth the homogeneous regions and enhance edge information. Experimental results with different types of images are used for quantitative and qualitative compared with region-based active contour models show that the proposed model has a higher segmentation accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The region-based active contour models can easily get stuck in local minimums and the image has intensity inhomogeneity. To solve this problem, we proposed an active contour model driven by region fitting and Laplacian. Firstly, a improved local fitting image is defined by adjusting the local average intensity weight, which can effectively avoid local minimums. Then, a region fitting term is defined by using both global and improved local fitting images. Moreover, local and global signed pressure force functions are introduced in the solution of the energy function to stabilize the gradient descent flow. Finally, a Laplacian energy term is introduced in the energy function, which can smooth the homogeneous regions and enhance edge information. Experimental results with different types of images are used for quantitative and qualitative compared with region-based active contour models show that the proposed model has a higher segmentation accuracy.", "fno": "218600a763", "keywords": [ "Edge Detection", "Gradient Methods", "Image Segmentation", "Medical Image Processing", "Region Based Active Contour Models", "Local Minimums", "Active Contour Model", "Improved Local Fitting Image", "Local Average Intensity Weight", "Region Fitting Term", "Global Images", "Improved Local Fitting Images", "Local Pressure Force Functions", "Global Signed Pressure Force Functions", "Energy Function", "Laplacian Energy Term", "Homogeneous Regions", "Active Contour Driven", "Image Segmentation", "Analytical Models", "Laplace Equations", "Statistical Analysis", "Image Edge Detection", "Computational Modeling", "Fitting", "Image Segmentation", "Active Contour Model", "Region Fitting Term", "Laplacian Energy Term" ], "authors": [ { "affiliation": "School of Data Science and Information Engineering Guizhou Minzu University,Guiyang,Guizhou", "fullName": "Run Feng", "givenName": "Run", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Guizhou Minzu University,Engineering Training Center,Guiyang,Guizhou", "fullName": "Chengquan Huang", "givenName": "Chengquan", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Data Science and Information Engineering Guizhou Minzu University,Guiyang,Guizhou", "fullName": "Xue Hu", "givenName": "Xue", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Data Science and Information Engineering Guizhou Minzu University,Guiyang,Guizhou", "fullName": "Lihua Zhou", "givenName": "Lihua", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Data Science and Information Engineering Guizhou Minzu University,Guiyang,Guizhou", "fullName": "Lan Zheng", "givenName": "Lan", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icaice", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "763-766", "year": "2021", "issn": null, "isbn": "978-1-6654-2186-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "218600a759", "articleId": "1Et4C2PrHYQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "218600a767", "articleId": "1Et4JPnOqMU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2011/4520/0/4520a718", "title": "A Contour-Based Method for Logo Detection", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a718/12OmNAoDi7u", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c537", "title": "Object Segmentation Based on Contour-Skeleton Duality", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c537/12OmNBQC8e0", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2017/3581/0/3581a717", "title": "Adaptive Region Based Active Contour Model for Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2017/3581a717/12OmNqN6R7M", "parentPublication": { "id": "proceedings/aiccsa/2017/3581/0", "title": "2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270039", "title": "Implicit Active Contours Driven by Local Binary Fitting Energy", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270039/12OmNrAv3JS", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2013/5053/0/06475029", "title": "A lip extraction algorithm using region-based ACM with automatic contour initialization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2013/06475029/12OmNvAAtlb", "parentPublication": { "id": "proceedings/wacv/2013/5053/0", "title": "Applications of Computer Vision, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2016/3251/0/07880227", "title": "Automatic imaging method for optic disc segmentation using morphological techniques and active contour fitting", "doi": null, "abstractUrl": "/proceedings-article/ic3/2016/07880227/12OmNvjyxxU", "parentPublication": { "id": "proceedings/ic3/2016/3251/0", "title": "2016 Ninth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2015/1843/0/1843a376", "title": "Hybrid Active Contour Method Combining Local and Differential Image Information for Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2015/1843a376/12OmNvwTGAO", "parentPublication": { "id": "proceedings/icnisc/2015/1843/0", "title": "2015 International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126468", "title": "Active geodesics: Region-based active contour segmentation with a global edge-based constraint", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126468/12OmNwIHoqm", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arace/2022/5153/0/515300a013", "title": "Active Contour Model for Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/arace/2022/515300a013/1Ip7ISO7Zqo", "parentPublication": { "id": "proceedings/arace/2022/5153/0", "title": "2022 Asia Conference on Advanced Robotics, Automation, and Control Engineering (ARACE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoias/2019/2662/0/266200a042", "title": "An Ellipse Fitting with PSO for Automatic Reading Recognition of Pointer Instruments", "doi": null, "abstractUrl": "/proceedings-article/icoias/2019/266200a042/1c8PaYL9qXC", "parentPublication": { "id": "proceedings/icoias/2019/2662/0", "title": "2019 2nd International Conference on Intelligent Autonomous Systems (ICoIAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KmF7rVz6Y8", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "acronym": "aivr", "groupId": "1830004", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KmFgOCBg1a", "doi": "10.1109/AIVR56993.2022.00057", "title": "Table Tennis Skill Learning in VR with Step by Step Guides using Forehand Drive as a Case Study", "normalizedTitle": "Table Tennis Skill Learning in VR with Step by Step Guides using Forehand Drive as a Case Study", "abstract": "Recently sports training in Virtual Reality (VR) like table tennis is getting more popular. In our paper, we want to investigate and develop an intuitive, immersive training environment for table tennis beginners to learn forehand drive at home due to an increase in the popularity of home training systems. Therefore in our paper, we conducted a pilot study and discovered that it is important to have a stable posture, provide immediate feedback for inaccurate posture, visualize the overall posture and feedback on the most incorrect parts to the user and have a clear step-by-step learning guide. Based on the study, we created a website where coaches can create a step-by-step guide for trainees to train in VR with an RGB camera to predict 3D human pose. We use table tennis forehand drive as a case study to demonstrate its effectiveness. Even though the number of successful returns is insignificant, our qualitative results show that users find our system helpful.", "abstracts": [ { "abstractType": "Regular", "content": "Recently sports training in Virtual Reality (VR) like table tennis is getting more popular. In our paper, we want to investigate and develop an intuitive, immersive training environment for table tennis beginners to learn forehand drive at home due to an increase in the popularity of home training systems. Therefore in our paper, we conducted a pilot study and discovered that it is important to have a stable posture, provide immediate feedback for inaccurate posture, visualize the overall posture and feedback on the most incorrect parts to the user and have a clear step-by-step learning guide. Based on the study, we created a website where coaches can create a step-by-step guide for trainees to train in VR with an RGB camera to predict 3D human pose. We use table tennis forehand drive as a case study to demonstrate its effectiveness. Even though the number of successful returns is insignificant, our qualitative results show that users find our system helpful.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently sports training in Virtual Reality (VR) like table tennis is getting more popular. In our paper, we want to investigate and develop an intuitive, immersive training environment for table tennis beginners to learn forehand drive at home due to an increase in the popularity of home training systems. Therefore in our paper, we conducted a pilot study and discovered that it is important to have a stable posture, provide immediate feedback for inaccurate posture, visualize the overall posture and feedback on the most incorrect parts to the user and have a clear step-by-step learning guide. Based on the study, we created a website where coaches can create a step-by-step guide for trainees to train in VR with an RGB camera to predict 3D human pose. We use table tennis forehand drive as a case study to demonstrate its effectiveness. Even though the number of successful returns is insignificant, our qualitative results show that users find our system helpful.", "fno": "572500a275", "keywords": [ "Biomechanics", "Computer Based Training", "Feedback", "Image Motion Analysis", "Learning Artificial Intelligence", "Pose Estimation", "Sport", "Virtual Reality", "Clear Step By Step Learning Guide", "Home Training Systems", "Immediate Feedback", "Immersive Training Environment", "Inaccurate Posture", "Intuitive Training Environment", "Recently Sports Training", "Stable Posture", "Step Guides", "Step By Step Guide", "Table Tennis Forehand Drive", "Table Tennis Skill", "Virtual Reality", "Vr", "VR", "Training", "Learning Systems", "Visualization", "Three Dimensional Displays", "Virtual Reality", "Cameras", "Trajectory" ], "authors": [ { "affiliation": "National Tsing Hua University,Dept. of Computer Science,Hsinchu,Taiwan", "fullName": "Calvin Ku", "givenName": "Calvin", "surname": "Ku", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Institute of Service Science,Hsinchu,Taiwan", "fullName": "Jian-Jia Weng", "givenName": "Jian-Jia", "surname": "Weng", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Institute of Service Science,Hsinchu,Taiwan", "fullName": "Yu-Hsin Wang", "givenName": "Yu-Hsin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Computer Science,Hsinchu,Taiwan", "fullName": "Dong-Xian Wu", "givenName": "Dong-Xian", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Computer Science,Hsinchu,Taiwan", "fullName": "Yi-Min Lau", "givenName": "Yi-Min", "surname": "Lau", "__typename": "ArticleAuthorType" }, { "affiliation": "National Cheng Kung University,Dept. of CSIE,Tainan,Taiwan", "fullName": "Wan-Lun Tsai", "givenName": "Wan-Lun", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Physical Education,Hsinchu,Taiwan", "fullName": "Te-Cheng Wu", "givenName": "Te-Cheng", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Computer Science,Hsinchu,Taiwan", "fullName": "Hung-Kuo Chu", "givenName": "Hung-Kuo", "surname": "Chu", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Dept. of Computer Science,Hsinchu,Taiwan", "fullName": "Min-Chun Hu", "givenName": "Min-Chun", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "aivr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "275-282", "year": "2022", "issn": null, "isbn": "978-1-6654-5725-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "572500a266", "articleId": "1KmFcKkTpm0", "__typename": "AdjacentArticleType" }, "next": { "fno": "572500a283", "articleId": "1KmFe3X8va8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2015/9711/0/5720a718", "title": "Tennis Player Segmentation for Semantic Behavior Analysis", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a718/12OmNx1qV4e", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iros/1995/7108/1/71080111", "title": "Development of a virtual sports machine using a wire drive system-a trial of virtual tennis", "doi": null, "abstractUrl": "/proceedings-article/iros/1995/71080111/12OmNxI0KwB", "parentPublication": { "id": "proceedings/iros/1995/7108/1", "title": "Intelligent Robots and Systems, IEEE/RSJ International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042396", "title": "A vision system with multiple cameras designed for humanoid robots to play table tennis", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042396/12OmNzuZUD6", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/01/v0015", "title": "Real-Time Interaction with a Humanoid Avatar in an Immersive Table Tennis Simulation", "doi": null, "abstractUrl": "/journal/tg/2007/01/v0015/13rRUxOdD2y", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/04/mcg2006040010", "title": "V-Pong: An Immersive Table Tennis Simulation", "doi": null, "abstractUrl": "/magazine/cg/2006/04/mcg2006040010/13rRUxZ0o3V", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a804", "title": "Assist Home Training Table Tennis Skill Acquisition via Immersive Learning and Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a804/1CJd0JOwO9a", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiars/2022/5457/0/545700a082", "title": "Tennis Trajectory Target Tracking System Based on Combinatorial Optimization Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aiars/2022/545700a082/1J2XSb8GFiM", "parentPublication": { "id": "proceedings/aiars/2022/5457/0", "title": "2022 International Conference on Artificial Intelligence and Autonomous Robot Systems (AIARS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a845", "title": "Virtual Reality Sonification Training System Can Improve a Novice&#x0027;s Forehand Return of Serve in Tennis", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a845/1J7Wlv8mvKM", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09446582", "title": "Performance Improvement and Skill Transfer in Table Tennis Through Training in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09446582/1u8lz4qWghi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tcs/2021/2910/0/291000a533", "title": "A Study of Liu Shiwen&#x2019;s Table Tennis Techniques and Tactics Based on Computer-aided Video", "doi": null, "abstractUrl": "/proceedings-article/tcs/2021/291000a533/1wRIl8gP8xW", "parentPublication": { "id": "proceedings/tcs/2021/2910/0", "title": "2021 International Conference on Information Technology and Contemporary Sports (TCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dUo07mzDNu", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "acronym": "icnisc", "groupId": "1807445", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1dUo2B83mqk", "doi": "10.1109/ICNISC.2018.00072", "title": "Experimental Research on Applying Imagery Training Method in Teenager Table Tennis Training Classes", "normalizedTitle": "Experimental Research on Applying Imagery Training Method in Teenager Table Tennis Training Classes", "abstract": "In this paper, the experimental research was done to 30 teenager table tennis players at Haidian District Amateur Sports School by the method of imagery training. The training effects of the imagery training method and the traditional training method were compared. The experimental results show that the athletes who adopt the imagery training method have significantly higher standard performance results and technical evaluation results than those who use the routine training methods. The results of SPSS 22.0 test show that they reach the significant level and can effectively improve the athletes' technical level and training effect.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, the experimental research was done to 30 teenager table tennis players at Haidian District Amateur Sports School by the method of imagery training. The training effects of the imagery training method and the traditional training method were compared. The experimental results show that the athletes who adopt the imagery training method have significantly higher standard performance results and technical evaluation results than those who use the routine training methods. The results of SPSS 22.0 test show that they reach the significant level and can effectively improve the athletes' technical level and training effect.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, the experimental research was done to 30 teenager table tennis players at Haidian District Amateur Sports School by the method of imagery training. The training effects of the imagery training method and the traditional training method were compared. The experimental results show that the athletes who adopt the imagery training method have significantly higher standard performance results and technical evaluation results than those who use the routine training methods. The results of SPSS 22.0 test show that they reach the significant level and can effectively improve the athletes' technical level and training effect.", "fno": "695600a325", "keywords": [ "Computer Based Training", "Sport", "Teenager Table Tennis Training Classes", "Haidian District Amateur Sports School", "Routine Training Methods", "Imagery Training Method", "SPSS 22 0 Test", "Training", "Sports", "Standards", "Power Systems", "Process Control", "Psychology", "Teenager", "Table Tennis Training Class", "Presentation Training Method", "Experimental Research" ], "authors": [ { "affiliation": "North China Electric Power University", "fullName": "Xu Shu-Ping", "givenName": "Xu", "surname": "Shu-Ping", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Electric Power University", "fullName": "Wang Long", "givenName": "Wang", "surname": "Long", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Electric Power University", "fullName": "Qi Xiao-Hong", "givenName": "Qi", "surname": "Xiao-Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Electric Power University", "fullName": "Liang Li-Xin", "givenName": "Liang", "surname": "Li-Xin", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing College of Politics and Law", "fullName": "Ji Cheng-Bin", "givenName": "Ji", "surname": "Cheng-Bin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnisc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "325-328", "year": "2018", "issn": null, "isbn": "978-1-5386-6956-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "695600a321", "articleId": "1dUo4SNARoI", "__typename": "AdjacentArticleType" }, "next": { "fno": "695600a329", "articleId": "1dUo2xR6aqc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pdcat/2009/3914/0/3914a488", "title": "Performance Acceleration for Video Synthesizing Software Targeted to Sports Training Using Multicore Processor", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2009/3914a488/12OmNwE9OG0", "parentPublication": { "id": "proceedings/pdcat/2009/3914/0", "title": "2009 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a303", "title": "Automated Athlete Haptic Training System for Soccer Sprinting", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a303/19wB3VmXAnS", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hbdss/2021/2188/0/218800a287", "title": "Study on the influence of elastic Belt resistance training on the speed of young 400 meters athletes", "doi": null, "abstractUrl": "/proceedings-article/hbdss/2021/218800a287/1AqwP94cvkI", "parentPublication": { "id": "proceedings/hbdss/2021/2188/0", "title": "2021 International Conference on Health Big Data and Smart Sports (HBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a804", "title": "Assist Home Training Table Tennis Skill Acquisition via Immersive Learning and Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a804/1CJd0JOwO9a", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a642", "title": "Feasibility of Training Elite Athletes for Improving their Mental Imagery Ability Using Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a642/1CJf84U99M4", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/08/09303392", "title": "Feasibility Study on Virtual Reality Based Basketball Tactic Training", "doi": null, "abstractUrl": "/journal/tg/2022/08/09303392/1pLFQxpKDIY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/respect/2020/7172/1/09272420", "title": "Tackling the Underreprentation of Women in Computing and Finding Novel Help in Athletics", "doi": null, "abstractUrl": "/proceedings-article/respect/2020/09272420/1phRYCqhms8", "parentPublication": { "id": "proceedings/respect/2020/7172/1", "title": "2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/05/09382892", "title": "SPinPong - Virtual Reality Table Tennis Skill Acquisition using Visual, Haptic and Temporal Cues", "doi": null, "abstractUrl": "/journal/tg/2021/05/09382892/1saZrRoiA3C", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412391", "title": "Extraction and analysis of 3D kinematic parameters of Table Tennis ball from a single camera", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412391/1tmi56Q22Ck", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09446582", "title": "Performance Improvement and Skill Transfer in Table Tennis Through Training in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09446582/1u8lz4qWghi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oZBEsWgyCA", "title": "2020 International Conference on Artificial Intelligence and Education (ICAIE)", "acronym": "icaie", "groupId": "1800165", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oZBL0WTJK0", "doi": "10.1109/ICAIE50891.2020.00100", "title": "Research on the Evaluation Index System of Table Tennis Classroom Teaching based on Core Literacy", "normalizedTitle": "Research on the Evaluation Index System of Table Tennis Classroom Teaching based on Core Literacy", "abstract": "This paper investigates the combination of the core literacy and table tennis teaching by involving the three key components including sports ability, sports morality and health behavior, on the basis the meaning and connotation of table tennis core accomplishments. The literature method is applied to drive the research. By constructing the evaluation index system of table tennis classroom teaching, the formation of students' core literacy can be realized. The effectiveness of the proposed index system is verified by the computer simulation with the factor analysis method.", "abstracts": [ { "abstractType": "Regular", "content": "This paper investigates the combination of the core literacy and table tennis teaching by involving the three key components including sports ability, sports morality and health behavior, on the basis the meaning and connotation of table tennis core accomplishments. The literature method is applied to drive the research. By constructing the evaluation index system of table tennis classroom teaching, the formation of students' core literacy can be realized. The effectiveness of the proposed index system is verified by the computer simulation with the factor analysis method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper investigates the combination of the core literacy and table tennis teaching by involving the three key components including sports ability, sports morality and health behavior, on the basis the meaning and connotation of table tennis core accomplishments. The literature method is applied to drive the research. By constructing the evaluation index system of table tennis classroom teaching, the formation of students' core literacy can be realized. The effectiveness of the proposed index system is verified by the computer simulation with the factor analysis method.", "fno": "665900a406", "keywords": [ "Computer Aided Instruction", "Multimedia Computing", "Sport", "Teaching", "Evaluation Index System", "Table Tennis Classroom Teaching", "Table Tennis Teaching", "Sports Ability", "Sports Morality", "Table Tennis Core Accomplishments", "Student Core Literacy", "Factor Analysis Method", "Indexes", "Education", "Sports", "Radio Frequency", "Conferences", "Artificial Intelligence", "Table Tennis Teaching", "Core Literacy", "Classroom Evaluation", "Index System", "Literature Method" ], "authors": [ { "affiliation": "Northwestern Polytechnical University,Xi’an,China", "fullName": "Tiantian Yin", "givenName": "Tiantian", "surname": "Yin", "__typename": "ArticleAuthorType" }, { "affiliation": "Dongyuanlu School,Xi’an,China", "fullName": "Yue Liang", "givenName": "Yue", "surname": "Liang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icaie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "406-409", "year": "2020", "issn": null, "isbn": "978-1-7281-6659-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "665900a402", "articleId": "1oZBJ1LQ58c", "__typename": "AdjacentArticleType" }, "next": { "fno": "665900a410", "articleId": "1oZBGzuBZMk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2015/6850/0/6850a712", "title": "Discussion on Psychological Perception Representation and Knowledge Acquisition of Table Tennis Players", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a712/12OmNyL0Tq5", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/04/mcg2006040010", "title": "V-Pong: An Immersive Table Tennis Simulation", "doi": null, "abstractUrl": "/magazine/cg/2006/04/mcg2006040010/13rRUxZ0o3V", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017600", "title": "iTTVis: Interactive Visualization of Table Tennis Data", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017600/13rRUyY28YD", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900b210", "title": "Application of Micro-lecture in Table Tennis Teaching for Children", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900b210/1C8GamvUKGI", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a804", "title": "Assist Home Training Table Tennis Skill Acquisition via Immersive Learning and Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a804/1CJd0JOwO9a", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiars/2022/5457/0/545700a135", "title": "Intelligent Repair System of Table Tennis Server Based on Data Analysis Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aiars/2022/545700a135/1J2XPikx7b2", "parentPublication": { "id": "proceedings/aiars/2022/5457/0", "title": "2022 International Conference on Artificial Intelligence and Autonomous Robot Systems (AIARS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807264", "title": "Tac-Simur: Tactic-based Simulative Visual Analytics of Table Tennis", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807264/1cG6vo24hRC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a325", "title": "Experimental Research on Applying Imagery Training Method in Teenager Table Tennis Training Classes", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a325/1dUo2B83mqk", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a632", "title": "Tactical Decision System of Table Tennis Match based on C4.5 Decision Tree", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a632/1t2nmIZ5RBe", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09446582", "title": "Performance Improvement and Skill Transfer in Table Tennis Through Training in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09446582/1u8lz4qWghi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwogh4w", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAR1aTj", "doi": "10.1109/JCDL.2017.7991554", "title": "Archival Crawlers and JavaScript: Discover More Stuff but Crawl More Slowly", "normalizedTitle": "Archival Crawlers and JavaScript: Discover More Stuff but Crawl More Slowly", "abstract": "The web is today's primary publication medium, making web archiving an important activity for historical and analytical purposes. Web pages are increasingly interactive, resulting in pages that are correspondingly difficult to archive. JavaScript enables interactions that can potentially change the client-side state of a representation. We refer to representations that load embedded resources via JavaScript as deferred representations. It is difficult to discover and crawl all of the resources in deferred representations and the result of archiving deferred representations is archived web pages that are either incomplete or erroneously load embedded resources from the live web. We propose a method of discovering and archiving deferred representations and their descendants (representation states) that are only reachable through client- side events. Our approach identified an average of 38.5 descendants per seed URI crawled, 70.9% of which are reached through an onclick event. This approach also added 15.6 times more embedded resources than Heritrix to the crawl frontier, but at a crawl rate that was 38.9 times slower than simply using Heritrix. If our method was applied to the July 2015 Common Crawl dataset, a web-scale archival crawler will discover an additional 7.17 PB (5.12 times more) of information per year. This illustrates the significant increase in resources necessary for more thorough archival crawls.", "abstracts": [ { "abstractType": "Regular", "content": "The web is today's primary publication medium, making web archiving an important activity for historical and analytical purposes. Web pages are increasingly interactive, resulting in pages that are correspondingly difficult to archive. JavaScript enables interactions that can potentially change the client-side state of a representation. We refer to representations that load embedded resources via JavaScript as deferred representations. It is difficult to discover and crawl all of the resources in deferred representations and the result of archiving deferred representations is archived web pages that are either incomplete or erroneously load embedded resources from the live web. We propose a method of discovering and archiving deferred representations and their descendants (representation states) that are only reachable through client- side events. Our approach identified an average of 38.5 descendants per seed URI crawled, 70.9% of which are reached through an onclick event. This approach also added 15.6 times more embedded resources than Heritrix to the crawl frontier, but at a crawl rate that was 38.9 times slower than simply using Heritrix. If our method was applied to the July 2015 Common Crawl dataset, a web-scale archival crawler will discover an additional 7.17 PB (5.12 times more) of information per year. This illustrates the significant increase in resources necessary for more thorough archival crawls.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The web is today's primary publication medium, making web archiving an important activity for historical and analytical purposes. Web pages are increasingly interactive, resulting in pages that are correspondingly difficult to archive. JavaScript enables interactions that can potentially change the client-side state of a representation. We refer to representations that load embedded resources via JavaScript as deferred representations. It is difficult to discover and crawl all of the resources in deferred representations and the result of archiving deferred representations is archived web pages that are either incomplete or erroneously load embedded resources from the live web. We propose a method of discovering and archiving deferred representations and their descendants (representation states) that are only reachable through client- side events. Our approach identified an average of 38.5 descendants per seed URI crawled, 70.9% of which are reached through an onclick event. This approach also added 15.6 times more embedded resources than Heritrix to the crawl frontier, but at a crawl rate that was 38.9 times slower than simply using Heritrix. If our method was applied to the July 2015 Common Crawl dataset, a web-scale archival crawler will discover an additional 7.17 PB (5.12 times more) of information per year. This illustrates the significant increase in resources necessary for more thorough archival crawls.", "fno": "07991554", "keywords": [ "Crawlers", "Internet", "Hypercubes", "Social Network Services", "Encyclopedias", "Electronic Publishing" ], "authors": [ { "affiliation": null, "fullName": "Justin F. Brunelle", "givenName": "Justin F.", "surname": "Brunelle", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michele C. Weigle", "givenName": "Michele C.", "surname": "Weigle", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael L. Nelson", "givenName": "Michael L.", "surname": "Nelson", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-06-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2017", "issn": null, "isbn": "978-1-5386-3861-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07990633", "articleId": "12OmNzdGnsE", "__typename": "AdjacentArticleType" }, "next": { "fno": "07991555", "articleId": "12OmNyQpgS4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2012/4859/0/4859a030", "title": "Detecting Opinionated Claims in Online Discussions", "doi": null, "abstractUrl": "/proceedings-article/icsc/2012/4859a030/12OmNCmpcUF", "parentPublication": { "id": "proceedings/icsc/2012/4859/0", "title": "2012 IEEE Sixth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2015/6656/0/6656a582", "title": "Link Analysis of Wikipedia Documents Using MapReduce", "doi": null, "abstractUrl": "/proceedings-article/iri/2015/6656a582/12OmNqAU6C3", "parentPublication": { "id": "proceedings/iri/2015/6656/0", "title": "2015 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a310", "title": "Are All Social Networks Structurally Similar?", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a310/12OmNwdbV6T", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612a808", "title": "Partial Social Network Disclosure and Crawlers", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612a808/12OmNylKAOo", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2016/04/mic2016040074", "title": "Semantic Filtering for Social Data", "doi": null, "abstractUrl": "/magazine/ic/2016/04/mic2016040074/13rRUxbCbnh", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a067", "title": "Inference of Researchers' Area of Expertise", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a067/17D45VsBTVh", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNy5zssl", "doi": "10.1109/VAST.2014.7042513", "title": "Linea: Tailoring timelines by visual exploration of temporal text", "normalizedTitle": "Linea: Tailoring timelines by visual exploration of temporal text", "abstract": "Timelines are often used to summarize complex, time-evolving, sequences of events. In this poster, we present the preliminary results of Linea, a tool designed to help users build timelines that summarize content from Wikipedia. We combine Natural Language Processing and the PageRank algorithm to automatically build default timelines of any Wikipedia article, giving users a starting point for tailoring them. Then, users can interact with the event matrix — a collection of histograms of events — by exploring each matrix cell in search for peaks, i.e., proxies of important periods of time. By selecting a peak, the tool shows all events in that period so users are able to add or remove events, thus customizing timelines.", "abstracts": [ { "abstractType": "Regular", "content": "Timelines are often used to summarize complex, time-evolving, sequences of events. In this poster, we present the preliminary results of Linea, a tool designed to help users build timelines that summarize content from Wikipedia. We combine Natural Language Processing and the PageRank algorithm to automatically build default timelines of any Wikipedia article, giving users a starting point for tailoring them. Then, users can interact with the event matrix — a collection of histograms of events — by exploring each matrix cell in search for peaks, i.e., proxies of important periods of time. By selecting a peak, the tool shows all events in that period so users are able to add or remove events, thus customizing timelines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Timelines are often used to summarize complex, time-evolving, sequences of events. In this poster, we present the preliminary results of Linea, a tool designed to help users build timelines that summarize content from Wikipedia. We combine Natural Language Processing and the PageRank algorithm to automatically build default timelines of any Wikipedia article, giving users a starting point for tailoring them. Then, users can interact with the event matrix — a collection of histograms of events — by exploring each matrix cell in search for peaks, i.e., proxies of important periods of time. By selecting a peak, the tool shows all events in that period so users are able to add or remove events, thus customizing timelines.", "fno": "07042513", "keywords": [ "Histograms", "Encyclopedias", "Electronic Publishing", "Internet", "Tag Clouds", "Educational Institutions", "Histogram", "Timeline", "Text Summary", "Event Matrix" ], "authors": [ { "affiliation": "Modelo Inc.", "fullName": "Tiago Etiene", "givenName": "Tiago", "surname": "Etiene", "__typename": "ArticleAuthorType" }, { "affiliation": "UFMS", "fullName": "Paulo Pagliosa", "givenName": "Paulo", "surname": "Pagliosa", "__typename": "ArticleAuthorType" }, { "affiliation": "University of São Paulo", "fullName": "Luis Gustavo Nonato", "givenName": "Luis Gustavo", "surname": "Nonato", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "247-248", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042512", "articleId": "12OmNwcl7DF", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042514", "articleId": "12OmNxzMnNA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ism/2015/0379/0/0379a221", "title": "ExploratoryVideoSearch: A Music Video Search System Based on Coordinate Terms and Diversification", "doi": null, "abstractUrl": "/proceedings-article/ism/2015/0379a221/12OmNs0TKM6", "parentPublication": { "id": "proceedings/ism/2015/0379/0", "title": "2015 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/04061340", "title": "Temporal Analysis of the Wikigraph", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/04061340/12OmNvFYQJX", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2015/7962/0/7962a234", "title": "Linea: Building Timelines from Unstructured Text", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2015/7962a234/12OmNxHryln", "parentPublication": { "id": "proceedings/sibgrapi/2015/7962/0", "title": "2015 28th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815007", "title": "Visitpedia: Wiki Article Visit Log Visualization for Event Exploration", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815007/12OmNy314iw", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2013/5047/0/5047a192", "title": "Extraction of Linked Data Triples from Japanese Wikipedia Text of Ukiyo-e Painters", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2013/5047a192/12OmNyNQSLG", "parentPublication": { "id": "proceedings/culture-computing/2013/5047/0", "title": "2013 International Conference on Culture and Computing (Culture Computing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a479", "title": "Wikipedia Editing History in DBpedia: Extracting and Publishing the Encyclopedia Editing Activity as Linked Data", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a479/12OmNzA6GIW", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2011/0982/0/06059862", "title": "Mining Text Patterns for Synonyms Extraction", "doi": null, "abstractUrl": "/proceedings-article/dexa/2011/06059862/12OmNzRHOVI", "parentPublication": { "id": "proceedings/dexa/2011/0982/0", "title": "2011 22nd International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970189", "title": "What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970189/12OmNzlUKJR", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192669", "title": "TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured Text", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192669/13rRUxjQyvn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2019/1337/0/133700a123", "title": "Enhancing Software Requirements Cluster Labeling Using Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/iri/2019/133700a123/1dUng4wLJjG", "parentPublication": { "id": "proceedings/iri/2019/1337/0", "title": "2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrAMEOd", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "acronym": "csci", "groupId": "1803739", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyoiZ4v", "doi": "10.1109/CSCI.2016.0086", "title": "CPERS: Contextual and Personalized Event Recommender System", "normalizedTitle": "CPERS: Contextual and Personalized Event Recommender System", "abstract": "This paper proposes CPERS, a contextual and personalized event recommender system that exploits overall user preference and context influences to produce recommendations in event-based social networks (EBSNs). Diversely from items in traditional recommendation scenarios (e.g. movies, songs), events in EBSNs are only valid for a short period of time, having no explicit feedback. Therefore the event recommendation problem is essentially cold-start. To overcome this limitation, CPERS combines content preferences and context influences derived from users' historical events. In particular, besides content preference based on events' description, CPERS exploits temporal impact from users' time preference, spatial constraints based upon geographical preference, cost consideration derived from expenditure history and social influence from social relationship between hosts and users. Furthermore, CPERS integrates the above factors to rank events for personalized recommendation. We collect a real-world dataset from a popular EBSNs called \"Douban Events\", and the experimental results on the dataset demonstrate that CPERS improves recommendation performance.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes CPERS, a contextual and personalized event recommender system that exploits overall user preference and context influences to produce recommendations in event-based social networks (EBSNs). Diversely from items in traditional recommendation scenarios (e.g. movies, songs), events in EBSNs are only valid for a short period of time, having no explicit feedback. Therefore the event recommendation problem is essentially cold-start. To overcome this limitation, CPERS combines content preferences and context influences derived from users' historical events. In particular, besides content preference based on events' description, CPERS exploits temporal impact from users' time preference, spatial constraints based upon geographical preference, cost consideration derived from expenditure history and social influence from social relationship between hosts and users. Furthermore, CPERS integrates the above factors to rank events for personalized recommendation. We collect a real-world dataset from a popular EBSNs called \"Douban Events\", and the experimental results on the dataset demonstrate that CPERS improves recommendation performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes CPERS, a contextual and personalized event recommender system that exploits overall user preference and context influences to produce recommendations in event-based social networks (EBSNs). Diversely from items in traditional recommendation scenarios (e.g. movies, songs), events in EBSNs are only valid for a short period of time, having no explicit feedback. Therefore the event recommendation problem is essentially cold-start. To overcome this limitation, CPERS combines content preferences and context influences derived from users' historical events. In particular, besides content preference based on events' description, CPERS exploits temporal impact from users' time preference, spatial constraints based upon geographical preference, cost consideration derived from expenditure history and social influence from social relationship between hosts and users. Furthermore, CPERS integrates the above factors to rank events for personalized recommendation. We collect a real-world dataset from a popular EBSNs called \"Douban Events\", and the experimental results on the dataset demonstrate that CPERS improves recommendation performance.", "fno": "07881379", "keywords": [ "Recommender Systems", "Social Networking Online", "CPERS System", "Contextual And Personalized Event Recommender System", "Event Based Social Networks", "EBSN", "Recommendation Scenario", "User Time Preference", "Spatial Constraints", "Geographical Preference", "Cost Consideration", "Douban Events", "Context", "Mathematical Model", "Recommender Systems", "Social Network Services", "History", "Feature Extraction", "Computational Modeling", "Event Based Social Networks", "Content Preferences", "Context Influences", "Event Recommendation" ], "authors": [ { "affiliation": null, "fullName": "Min Wei", "givenName": "Min", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dong Wang", "givenName": "Dong", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "csci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "421-426", "year": "2016", "issn": null, "isbn": "978-1-5090-5510-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07881378", "articleId": "12OmNqBKUd3", "__typename": "AdjacentArticleType" }, "next": { "fno": "07881380", "articleId": "12OmNAKcNKf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi/2016/4470/0/4470a248", "title": "Context Aware Matrix Factorization for Event Recommendation in Event-Based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a248/12OmNxGSmlW", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a038", "title": "SoCaST: Exploiting Social, Categorical and Spatio-Temporal Preferences for Personalized Event Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a038/12OmNybfr70", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752268", "title": "Exploring influence among participants for event recommendation", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752268/12OmNzT7OrX", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2017/6517/0/07947006", "title": "EventRec: Personalized Event Recommendations for Smart Event-Based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2017/07947006/12OmNzUgd2I", "parentPublication": { "id": "proceedings/smartcomp/2017/6517/0", "title": "2017 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000a929", "title": "Joint Event-Partner Recommendation in Event-Based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000a929/14Fq0VGY4GB", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/04/08613823", "title": "GERF: A Group Event Recommendation Framework Based on Learning-to-Rank", "doi": null, "abstractUrl": "/journal/tk/2020/04/08613823/17D45VsBU7f", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300b525", "title": "Platform-Oriented Event Time Allocation(Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300b525/1FwBF8cpapi", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09305253", "title": "Preference and Constraint Factor Model for Event Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/10/09305253/1pNkjmfiJJ6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09528056", "title": "Platform-Oriented Event Time Allocation", "doi": null, "abstractUrl": "/journal/tk/2023/03/09528056/1wznIT5i8XS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09563222", "title": "Efficient Retrieval of the Top-<italic>k</italic> Most Relevant Event-Partner Pairs", "doi": null, "abstractUrl": "/journal/tk/2023/03/09563222/1xvtfEgKoQU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAlvHKQ", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzA6GIW", "doi": "10.1109/WI.2016.0079", "title": "Wikipedia Editing History in DBpedia: Extracting and Publishing the Encyclopedia Editing Activity as Linked Data", "normalizedTitle": "Wikipedia Editing History in DBpedia: Extracting and Publishing the Encyclopedia Editing Activity as Linked Data", "abstract": "DBpedia is a huge dataset essentially extracted from the content and structure of Wikipedia. We present a new extraction producing a linked data representation of the editing history of Wikipedia pages. This supports custom querying and combining with other data providing new indicators and insights. We explain the architecture, representation and an immediate application to monitoring events.", "abstracts": [ { "abstractType": "Regular", "content": "DBpedia is a huge dataset essentially extracted from the content and structure of Wikipedia. We present a new extraction producing a linked data representation of the editing history of Wikipedia pages. This supports custom querying and combining with other data providing new indicators and insights. We explain the architecture, representation and an immediate application to monitoring events.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "DBpedia is a huge dataset essentially extracted from the content and structure of Wikipedia. We present a new extraction producing a linked data representation of the editing history of Wikipedia pages. This supports custom querying and combining with other data providing new indicators and insights. We explain the architecture, representation and an immediate application to monitoring events.", "fno": "4470a479", "keywords": [ "Encyclopedias", "History", "Electronic Publishing", "Internet", "Data Mining", "Monitoring", "Linked Data", "D Bpedia", "Editing Activity" ], "authors": [ { "affiliation": null, "fullName": "Fabien Gandon", "givenName": "Fabien", "surname": "Gandon", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Raphael Boyer", "givenName": "Raphael", "surname": "Boyer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Olivier Corby", "givenName": "Olivier", "surname": "Corby", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexandre Monnin", "givenName": "Alexandre", "surname": "Monnin", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "479-482", "year": "2016", "issn": null, "isbn": "978-1-5090-4470-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4470a473", "articleId": "12OmNrFBQ19", "__typename": "AdjacentArticleType" }, "next": { "fno": "4470a483", "articleId": "12OmNCdBDQ0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wetice/2014/4249/0/4249a441", "title": "Ranking DBpedia Properties", "doi": null, "abstractUrl": "/proceedings-article/wetice/2014/4249a441/12OmNARiM29", "parentPublication": { "id": "proceedings/wetice/2014/4249/0", "title": "2014 IEEE 23rd International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprise (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a254", "title": "Assessing the Quality of Domain Concepts Descriptions in DBpedia", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a254/12OmNAqCtPS", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2014/5057/0/06906806", "title": "Predicting Wikipedia Editor's Editing Interest Based on Factor Graph Model", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2014/06906806/12OmNB1eJDV", "parentPublication": { "id": "proceedings/bigdata-congress/2014/5057/0", "title": "2014 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2015/8232/0/8232a113", "title": "An Examination of the Culture of Impartiality in Wikipedia, A Case Study of the Islamic World Representation in the English and Persian Versions of the Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2015/8232a113/12OmNrY3Lp0", "parentPublication": { "id": "proceedings/culture-computing/2015/8232/0", "title": "2015 International Conference on Culture and Computing (Culture Computing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2016/4607/0/4607a266", "title": "Measuring Quality of Collaboratively Edited Documents: The Case of Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/cic/2016/4607a266/12OmNvDqsB2", "parentPublication": { "id": "proceedings/cic/2016/4607/0", "title": "2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a712", "title": "WC3: Wikipedia Category Consistency Checker Based on DBPedia", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a712/12OmNvrvj7A", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113205", "title": "Edit Wars in Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113205/12OmNwEJ0D0", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559559", "title": "Digital history meets Wikipedia: Analyzing historical persons in Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559559/12OmNy6Zs3K", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2013/5047/0/5047a192", "title": "Extraction of Linked Data Triples from Japanese Wikipedia Text of Ukiyo-e Painters", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2013/5047a192/12OmNyNQSLG", "parentPublication": { "id": "proceedings/culture-computing/2013/5047/0", "title": "2013 International Conference on Culture and Computing (Culture Computing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2018/9125/0/912500a017", "title": "DBkWik: A Consolidated Knowledge Graph from Thousands of Wikis", "doi": null, "abstractUrl": "/proceedings-article/icbk/2018/912500a017/17D45Wt3Ew7", "parentPublication": { "id": "proceedings/icbk/2018/9125/0", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirU", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "acronym": "t4e", "groupId": "1002941", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VtKiwR", "doi": "10.1109/T4E.2018.00019", "title": "PoP: Panorama of the Past &#x2013; A Visual Summary of High School History", "normalizedTitle": "PoP: Panorama of the Past – A Visual Summary of High School History", "abstract": "In this paper, we present an application of analytics, natural language processing and visualization to facilitate learning of History at the High School level. In particular, we demonstrate the use of a timeline with a summary of facts presented in CBSE textbooks on History for Classes 8, 9 and 10. This research focuses on providing a succinct summary of the voluminous chapters for easy and quick reference for reviews before a test. In particular, we present an automated framework that processes the textual content in history texts to create a timeline of all important historical events and a visual map showing all events that have taken place in relation to present day regions, with an appropriate legend carrying the year and event associated with a place. These facilitate the automated creation of pop quizzes raise questions pertaining to time, places and events, contributing to active learning, rather than a passive review of the material. Thus, the framework presented here envisages a better organization of the copious syllabus to make the process of studying history an interesting and engaging experience for the student.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present an application of analytics, natural language processing and visualization to facilitate learning of History at the High School level. In particular, we demonstrate the use of a timeline with a summary of facts presented in CBSE textbooks on History for Classes 8, 9 and 10. This research focuses on providing a succinct summary of the voluminous chapters for easy and quick reference for reviews before a test. In particular, we present an automated framework that processes the textual content in history texts to create a timeline of all important historical events and a visual map showing all events that have taken place in relation to present day regions, with an appropriate legend carrying the year and event associated with a place. These facilitate the automated creation of pop quizzes raise questions pertaining to time, places and events, contributing to active learning, rather than a passive review of the material. Thus, the framework presented here envisages a better organization of the copious syllabus to make the process of studying history an interesting and engaging experience for the student.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present an application of analytics, natural language processing and visualization to facilitate learning of History at the High School level. In particular, we demonstrate the use of a timeline with a summary of facts presented in CBSE textbooks on History for Classes 8, 9 and 10. This research focuses on providing a succinct summary of the voluminous chapters for easy and quick reference for reviews before a test. In particular, we present an automated framework that processes the textual content in history texts to create a timeline of all important historical events and a visual map showing all events that have taken place in relation to present day regions, with an appropriate legend carrying the year and event associated with a place. These facilitate the automated creation of pop quizzes raise questions pertaining to time, places and events, contributing to active learning, rather than a passive review of the material. Thus, the framework presented here envisages a better organization of the copious syllabus to make the process of studying history an interesting and engaging experience for the student.", "fno": "114300a061", "keywords": [ "Computer Aided Instruction", "Data Visualisation", "History", "Natural Language Processing", "Text Analysis", "Visual Map", "Active Learning", "Visual Summary", "Natural Language Processing", "Visualization", "CBSE Textbooks", "Textual Content", "History Texts", "High School Level", "High School History", "Panorama Of The Past", "History", "Visualization", "Games", "Natural Language Processing", "Software", "Testing", "Pattern Recognition", "History Summarization Timelines Visual Map Natural Language Processing" ], "authors": [ { "affiliation": "PES Centre for Pattern Recognition,Dept of Comp Sc, PESIT Bangalore South CampusHosur Road, Electronic City, Bangalore", "fullName": "Shushmita M.S.", "givenName": "Shushmita", "surname": "M.S.", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp Sc, PES Centre for Pattern Recognition, Bangalore, India", "fullName": "Gowri Srinivasa", "givenName": "Gowri", "surname": "Srinivasa", "__typename": "ArticleAuthorType" } ], "idPrefix": "t4e", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "61-64", "year": "2018", "issn": null, "isbn": "978-1-7281-1143-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "114300a053", "articleId": "17D45Xbl4OJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "114300a065", "articleId": "17D45XDIXSS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdh/2016/4400/0/4400a104", "title": "Automatic Matching Release Notes and Source Code by Generating Summary for Software Change", "doi": null, "abstractUrl": "/proceedings-article/icdh/2016/4400a104/12OmNrIrPqB", "parentPublication": { "id": "proceedings/icdh/2016/4400/0", "title": "2016 6th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wkdd/2010/5397/0/05432617", "title": "Cross-Document Coreference Resolution Based on Automatic Text Summary", "doi": null, "abstractUrl": "/proceedings-article/wkdd/2010/05432617/12OmNvjgWTc", "parentPublication": { "id": "proceedings/wkdd/2010/5397/0", "title": "2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/4/3305d129", "title": "A Biased Summary System and Its Implementation Technology", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305d129/12OmNvo67Dx", "parentPublication": { "id": "proceedings/fskd/2008/3305/4", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a082", "title": "Generating Abstractive Summaries of Sports Games from Japanese Tweets", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a082/12OmNwBBqbD", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571279", "title": "Oncology Lifeline - A Timeline Tool for the Interdisciplinary Management of Breast Cancer Patients in a Surgical Clinic", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571279/12OmNxGSmcm", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024526", "title": "A novel system for the automatic extraction of a patient problem summary", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024526/12OmNxjjElv", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2013/5765/0/06636721", "title": "A history of the international requirements engineering conference (RE)RE@21", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636721/12OmNyL0TMP", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2011/4376/0/4376a099", "title": "Fictional Simulation, Automatic Extraction of Key Scenes from Novels", "doi": null, "abstractUrl": "/proceedings-article/uksim/2011/4376a099/12OmNzzP5DW", "parentPublication": { "id": "proceedings/uksim/2011/4376/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192669", "title": "TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured Text", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192669/13rRUxjQyvn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2019/7789/0/08679105", "title": "Detection of Bursty and Significant Keyphrases from Wikipedia edit history", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2019/08679105/18XkjsWdUru", "parentPublication": { "id": "proceedings/bigcomp/2019/7789/0", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisl", "title": "2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONrn", "doi": "10.1109/WI.2018.00-37", "title": "Multi-Label Classification for Past Events", "normalizedTitle": "Multi-Label Classification for Past Events", "abstract": "Study and analysis of past events can provide numerous benefits. While event categorization has been previously studied, it was usually assigned only one event category to an event. In this work we focus on multi-label classification for past events that is a more general and challenging problem than the previous studies. We categorize them into 13 event categories using a range of diverse features and report micro-average F1 score is improved approximately by 10% compared with the state-of-the-art algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Study and analysis of past events can provide numerous benefits. While event categorization has been previously studied, it was usually assigned only one event category to an event. In this work we focus on multi-label classification for past events that is a more general and challenging problem than the previous studies. We categorize them into 13 event categories using a range of diverse features and report micro-average F1 score is improved approximately by 10% compared with the state-of-the-art algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Study and analysis of past events can provide numerous benefits. While event categorization has been previously studied, it was usually assigned only one event category to an event. In this work we focus on multi-label classification for past events that is a more general and challenging problem than the previous studies. We categorize them into 13 event categories using a range of diverse features and report micro-average F1 score is improved approximately by 10% compared with the state-of-the-art algorithm.", "fno": "732500a562", "keywords": [ "Data Analysis", "Pattern Classification", "Text Analysis", "Multilabel Classification", "Event Categorization", "Events Analysis", "Clustering Algorithms", "Encyclopedias", "Heuristic Algorithms", "Electronic Publishing", "Internet", "History", "Multi Label Classification Document Classification History Event" ], "authors": [ { "affiliation": "Univ. Educ. Center, Tokyo, Japan", "fullName": "Yasunobu Sumikawa", "givenName": "Yasunobu", "surname": "Sumikawa", "__typename": "ArticleAuthorType" }, { "affiliation": "Interfaculty Initiative in Inf. Studies, Univ. of Tokyo, Tokyo, Japan", "fullName": "Ryohei Ikejiri", "givenName": "Ryohei", "surname": "Ikejiri", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "562-567", "year": "2018", "issn": null, "isbn": "978-1-5386-7325-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "732500a554", "articleId": "17D45WrVgbV", "__typename": "AdjacentArticleType" }, "next": { "fno": "732500a568", "articleId": "17D45WK5AmK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2014/4103/0/4103a157", "title": "Animated Geo-temporal Clusters for Exploratory Search in Event Data Document Collections", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a157/12OmNwkzulU", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2018/4408/0/440801a219", "title": "Predicting the Occurrence of Life Events from User's Tweet History", "doi": null, "abstractUrl": "/proceedings-article/icsc/2018/440801a219/12OmNx8Oupf", "parentPublication": { "id": "proceedings/icsc/2018/4408/0", "title": "2018 IEEE 12th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitcs/2014/6541/0/07021808", "title": "Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines", "doi": null, "abstractUrl": "/proceedings-article/icitcs/2014/07021808/12OmNy68EOP", "parentPublication": { "id": "proceedings/icitcs/2014/6541/0", "title": "2014 International Conference on IT Convergence and Security (ICITCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2017/3349/0/3349a313", "title": "A Scheduling Algorithm of Events with Uncertain Timestamps for CPS", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2017/3349a313/12OmNyQYt2A", "parentPublication": { "id": "proceedings/bigcom/2017/3349/0", "title": "2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970189", "title": "What triggers human remembering of events? A large-scale analysis of catalysts for collective memory in Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970189/12OmNzlUKJR", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192676", "title": "VAiRoma: A Visual Analytics System for Making Sense of Places, Times, and Events in Roman History", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192676/13rRUxDqS8l", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/11/07124472", "title": "Indexing Evolving Events from Tweet Streams", "doi": null, "abstractUrl": "/journal/tk/2015/11/07124472/13rRUxNW1ZK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2002/02/09814708", "title": "Events and Sightings", "doi": null, "abstractUrl": "/magazine/an/2002/02/09814708/1EJBiWMMzSw", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2019/2542/0/254200a151", "title": "A User Influence Rank Algorithm Based on Interaction Behaviors in Cyber Group Events", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2019/254200a151/1gjS0yVnLYA", "parentPublication": { "id": "proceedings/cyberc/2019/2542/0", "title": "2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09447222", "title": "HisVA: A Visual Analytics System for Studying History", "doi": null, "abstractUrl": "/journal/tg/2022/12/09447222/1ua0ob5v97O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwGIcBY", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBSjJ44", "doi": "10.1109/ICDMW.2017.80", "title": "A Novel Method for Fast and Accurate Similarity Measure in Time Series Field", "normalizedTitle": "A Novel Method for Fast and Accurate Similarity Measure in Time Series Field", "abstract": "Similarity measure is a central problem in time series data mining. Although most approaches to this problem have been developed, with the rapid growth of the amount of data, we believe there is a challenging demand for supporting similarity measure in a fast and accurate way. In this paper, we propose a new time series representation model and a corresponding similarity measure, which is able to capture the main trends of time series and fulfill fast similarity detection. We compare the new method with state-of-the-art time series similarity methods and dimension-reduction techniques to indicate its superiority. Experiment results demonstrate the new method is able to support both fast and accurate similarity measure.", "abstracts": [ { "abstractType": "Regular", "content": "Similarity measure is a central problem in time series data mining. Although most approaches to this problem have been developed, with the rapid growth of the amount of data, we believe there is a challenging demand for supporting similarity measure in a fast and accurate way. In this paper, we propose a new time series representation model and a corresponding similarity measure, which is able to capture the main trends of time series and fulfill fast similarity detection. We compare the new method with state-of-the-art time series similarity methods and dimension-reduction techniques to indicate its superiority. Experiment results demonstrate the new method is able to support both fast and accurate similarity measure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Similarity measure is a central problem in time series data mining. Although most approaches to this problem have been developed, with the rapid growth of the amount of data, we believe there is a challenging demand for supporting similarity measure in a fast and accurate way. In this paper, we propose a new time series representation model and a corresponding similarity measure, which is able to capture the main trends of time series and fulfill fast similarity detection. We compare the new method with state-of-the-art time series similarity methods and dimension-reduction techniques to indicate its superiority. Experiment results demonstrate the new method is able to support both fast and accurate similarity measure.", "fno": "3800a569", "keywords": [ "Data Mining", "Data Structures", "Time Series", "Time Series Data Mining", "Time Series Representation Model", "Time Series Field", "Similarity Measure", "Similarity Detection", "Time Series Analysis", "Time Measurement", "Extraterrestrial Measurements", "Biomedical Measurement", "Market Research", "Estimation", "Data Mining", "Similarity Measure", "Time Series Data Mining", "Time Series Representation" ], "authors": [ { "affiliation": "College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu", "fullName": "Miaomiao Zhang", "givenName": "Miaomiao", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu", "fullName": "Dechang Pi", "givenName": "Dechang", "surname": "Pi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "569-576", "year": "2017", "issn": "2375-9259", "isbn": "978-1-5386-3800-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3800a561", "articleId": "12OmNCmpcWj", "__typename": "AdjacentArticleType" }, "next": { "fno": "3800a577", "articleId": "12OmNxTmHJz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csse/2008/3336/4/3336g399", "title": "Similarity Match in Time Series Streams under Dynamic Time Warping Distance", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336g399/12OmNCdk2Is", "parentPublication": { "id": "csse/2008/3336/4", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nswctc/2010/4011/1/4011a505", "title": "A Novel Similarity Measure Framework on Financial Data Mining", "doi": null, "abstractUrl": "/proceedings-article/nswctc/2010/4011a505/12OmNqBbHX2", "parentPublication": { "id": "proceedings/nswctc/2010/4011/1", "title": "Networks Security, Wireless Communications and Trusted Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013a104", "title": "A Shape Based Similarity Measure for Time Series Classification with Weighted Dynamic Time Warping Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013a104/12OmNwpXRSO", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a584", "title": "Multiple Radar Time Series Similarity Matching Algorithm", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a584/12OmNzWx03S", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/4115/1/4115a121", "title": "A Study on Meta Pattern Similarity of Time Series", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/4115a121/12OmNzZWbNv", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2015/6593/0/6593a435", "title": "A Similarity Model Based on Trend for Time Series", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2015/6593a435/12OmNzlUKn7", "parentPublication": { "id": "proceedings/dcabes/2015/6593/0", "title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/01/07172543", "title": "Similarity Measure Selection for Clustering Time Series Databases", "doi": null, "abstractUrl": "/journal/tk/2016/01/07172543/13rRUxD9gYc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/03/ttp2013030740", "title": "Time Series Analysis Using Geometric Template Matching", "doi": null, "abstractUrl": "/journal/tp/2013/03/ttp2013030740/13rRUyYjK3T", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09306921", "title": "A Linear Time Approach to Computing Time Series Similarity Based on Deep Metric Learning", "doi": null, "abstractUrl": "/journal/tk/2022/10/09306921/1pOZizY2K88", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2021/3483/0/348300a190", "title": "A Similarity Measurement for Multivariate Time Series Based on Variable Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2021/348300a190/1xNNqRvqFbO", "parentPublication": { "id": "proceedings/bigdataservice/2021/3483/0", "title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugz58", "title": "2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBvkdla", "doi": "10.1109/CGiV.2016.22", "title": "An Improvable Structure for Similarity Searching in Metric Spaces: Application on Image Databases", "normalizedTitle": "An Improvable Structure for Similarity Searching in Metric Spaces: Application on Image Databases", "abstract": "In last decades, the similarity search is very required in various fields such as pattern recognition, security, and multimedia databases. Although the metric approach usefulness for speeding similarity search in complex databases, the searching cost optimization still an open problem. In this paper we propose an improvable pivot-based method which can improve its research efficiency based on the past users' queries. Because images are the most data type which are concerned by the similarity search, the proposed method is tested on a real images database. The experiments show that the proposed method can significantly improve its searching efficiency relying on queries resolution.", "abstracts": [ { "abstractType": "Regular", "content": "In last decades, the similarity search is very required in various fields such as pattern recognition, security, and multimedia databases. Although the metric approach usefulness for speeding similarity search in complex databases, the searching cost optimization still an open problem. In this paper we propose an improvable pivot-based method which can improve its research efficiency based on the past users' queries. Because images are the most data type which are concerned by the similarity search, the proposed method is tested on a real images database. The experiments show that the proposed method can significantly improve its searching efficiency relying on queries resolution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In last decades, the similarity search is very required in various fields such as pattern recognition, security, and multimedia databases. Although the metric approach usefulness for speeding similarity search in complex databases, the searching cost optimization still an open problem. In this paper we propose an improvable pivot-based method which can improve its research efficiency based on the past users' queries. Because images are the most data type which are concerned by the similarity search, the proposed method is tested on a real images database. The experiments show that the proposed method can significantly improve its searching efficiency relying on queries resolution.", "fno": "0811a067", "keywords": [ "Search Problems", "Image Databases", "Complexity Theory", "Training", "Extraterrestrial Measurements", "Metric Access Methods", "Similarity Search", "Image Databases", "Data Indexing", "Content Based Image Retrieval" ], "authors": [ { "affiliation": null, "fullName": "Y. Hanyf", "givenName": "Y.", "surname": "Hanyf", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H. Silkan", "givenName": "H.", "surname": "Silkan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H. Labani", "givenName": "H.", "surname": "Labani", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-03-01T00:00:00", "pubType": "proceedings", "pages": "67-72", "year": "2016", "issn": null, "isbn": "978-1-5090-0811-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0811a062", "articleId": "12OmNxy4N4E", "__typename": "AdjacentArticleType" }, "next": { "fno": "0811a073", "articleId": "12OmNqyUUKH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdt/2008/3188/0/3188a047", "title": "An Efficient Similarity Searching Scheme in Massive Databases", "doi": null, "abstractUrl": "/proceedings-article/icdt/2008/3188a047/12OmNCdk2QR", "parentPublication": { "id": "proceedings/icdt/2008/3188/0", "title": "2008 The Third International Conference on Digital Telecommunications (icdt 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498318", "title": "Indexing multi-metric data", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498318/12OmNvDI3PU", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836729", "title": "Designing Sketches for Similarity Filtering", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836729/12OmNx4Q6zp", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2016/8796/0/07425915", "title": "An eigenvalue-based pivot selection strategy for improving search efficiency in metric spaces", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2016/07425915/12OmNx4gUlZ", "parentPublication": { "id": "proceedings/bigcomp/2016/8796/0", "title": "2016 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113317", "title": "Efficient metric indexing for similarity search", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113317/12OmNx6g6n9", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2014/3845/0/3845a215", "title": "Speed Up Distance-Based Similarity Query Using Multiple Threads", "doi": null, "abstractUrl": "/proceedings-article/paap/2014/3845a215/12OmNyFCvTf", "parentPublication": { "id": "proceedings/paap/2014/3845/0", "title": "2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/03/07349200", "title": "Efficient Metric Indexing for Similarity Search and Similarity Joins", "doi": null, "abstractUrl": "/journal/tk/2017/03/07349200/13rRUIM2VHy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/07/06786998", "title": "Authenticated Subgraph Similarity Searchin Outsourced Graph Databases", "doi": null, "abstractUrl": "/journal/tk/2015/07/06786998/13rRUx0geAl", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09891778", "title": "A Learned Index for Exact Similarity Search in Metric Spaces", "doi": null, "abstractUrl": "/journal/tk/5555/01/09891778/1GF6i7X5DpK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a242", "title": "Dynamic Similarity Search on Integer Sketches", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a242/1r54IevTqFO", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4ity", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzcvCl", "doi": "10.1109/ICSC.2016.11", "title": "Semantic Word Error Rate for Sentence Similarity", "normalizedTitle": "Semantic Word Error Rate for Sentence Similarity", "abstract": "Sentence similarity measures have applications in several tasks, including: Machine Translation, Paraphrase Identification, Speech Recognition, Question-answering and Text Summarization. However, measures designed for these tasks are aimed at assessing equivalence rather than resemblance, partly departing from human cognition of similarity. While this is reasonable for these activities, it hinders the applicability of sentence similarity measures to other tasks. We therefore propose a new sentence similarity measure specifically designed for resemblance evaluation, in order to cover these fields better. Experimental results are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Sentence similarity measures have applications in several tasks, including: Machine Translation, Paraphrase Identification, Speech Recognition, Question-answering and Text Summarization. However, measures designed for these tasks are aimed at assessing equivalence rather than resemblance, partly departing from human cognition of similarity. While this is reasonable for these activities, it hinders the applicability of sentence similarity measures to other tasks. We therefore propose a new sentence similarity measure specifically designed for resemblance evaluation, in order to cover these fields better. Experimental results are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Sentence similarity measures have applications in several tasks, including: Machine Translation, Paraphrase Identification, Speech Recognition, Question-answering and Text Summarization. However, measures designed for these tasks are aimed at assessing equivalence rather than resemblance, partly departing from human cognition of similarity. While this is reasonable for these activities, it hinders the applicability of sentence similarity measures to other tasks. We therefore propose a new sentence similarity measure specifically designed for resemblance evaluation, in order to cover these fields better. Experimental results are discussed.", "fno": "0662a266", "keywords": [ "Extraterrestrial Measurements", "Semantics", "Current Measurement", "Measurement Uncertainty", "Error Analysis", "Atmospheric Measurements", "Particle Measurements", "WER", "Semantic Word Error Rate", "SWER", "Sentence Similarity Measure", "Sentence Resemblance", "Word Relatedness", "Latent Semantic Analysis", "LSA", "Word Error Rate" ], "authors": [ { "affiliation": null, "fullName": "Carmelo Spiccia", "givenName": "Carmelo", "surname": "Spiccia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Agnese Augello", "givenName": "Agnese", "surname": "Augello", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Giovanni Pilato", "givenName": "Giovanni", "surname": "Pilato", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Giorgio Vassallo", "givenName": "Giorgio", "surname": "Vassallo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-02-01T00:00:00", "pubType": "proceedings", "pages": "266-269", "year": "2016", "issn": null, "isbn": "978-1-5090-0662-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0662a262", "articleId": "12OmNwekjzW", "__typename": "AdjacentArticleType" }, "next": { "fno": "0662a270", "articleId": "12OmNvA1h3t", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2014/5880/0/07051946", "title": "Sense decomposition from E-HowNet for word similarity measurement", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051946/12OmNAR1aU5", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2017/2407/0/2407a342", "title": "Statistical and Semantic Features to Measure Sentence Similarity in Portuguese", "doi": null, "abstractUrl": "/proceedings-article/bracis/2017/2407a342/12OmNBNM8TW", "parentPublication": { "id": "proceedings/bracis/2017/2407/0", "title": "2017 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2016/2251/0/2251a142", "title": "A Hybrid Geometric Approach for Measuring Similarity Level Among Documents and Document Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2016/2251a142/12OmNweBUID", "parentPublication": { "id": "proceedings/bigdataservice/2016/2251/0", "title": "2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/1/4143a110", "title": "A New Sentence Similarity Method Based on a Three-Layer Sentence Representation", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143a110/12OmNyPQ4vl", "parentPublication": { "id": "wi-iat/2014/4143/1", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2014/4171/0/4171a499", "title": "Sentence Similarity Based on Semantic Vector Model", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2014/4171a499/12OmNz61ddv", "parentPublication": { "id": "proceedings/3pgcic/2014/4171/0", "title": "2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a690", "title": "Nowhere to Hide: Finding Plagiarized Documents Based on Sentence Similarity", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a690/12OmNzvhvv8", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/01/ttk2013010062", "title": "Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm", "doi": null, "abstractUrl": "/journal/tk/2013/01/ttk2013010062/13rRUwInuWU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/12/ttk2013122823", "title": "Measuring Similarity Based on Link Information: A Comparative Study", "doi": null, "abstractUrl": "/journal/tk/2013/12/ttk2013122823/13rRUwbs21k", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit/2018/0385/0/08672665", "title": "Arabic Semantic Similarity Approaches - Review", "doi": null, "abstractUrl": "/proceedings-article/acit/2018/08672665/18IpjTacTiE", "parentPublication": { "id": "proceedings/acit/2018/0385/0", "title": "2018 International Arab Conference on Information Technology (ACIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09448469", "title": "A Topological Similarity Measure Between Multi-Resolution Reeb Spaces", "doi": null, "abstractUrl": "/journal/tg/2022/12/09448469/1ugE7gaINC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyjLoRq", "title": "2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT 2012)", "acronym": "icccnt", "groupId": "1802177", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvDI3RU", "doi": "10.1109/ICCCNT.2012.6395975", "title": "A holistic Knowledge Management framework for Higher Education Institutions", "normalizedTitle": "A holistic Knowledge Management framework for Higher Education Institutions", "abstract": "Knowledge Management (KM) is the latest buzzword that is becoming a growing field of interest. There is a strong belief that Higher Education Institutions (HEI) would have a tremendous value when they develop initiatives to create and share knowledge to achieve their objectives. KM typically focuses on institutions' objectives such as improved performance, competitive advantage, innovation, the sharing of knowledge, best practices and lessons learned, and continuous improvement of the institution. It includes a range of activities to create, capture, process, distribute and store the knowledge. It is imperative to understand the latest theories of KM frameworks at this time, as there is a huge indication for the need to adopt KM methodologies in the educational sector. In an attempt to address this issue, this paper explores the higher education domain in terms of KM and discusses on views of the importance of well-defined framework and also proposes a conceptual framework.", "abstracts": [ { "abstractType": "Regular", "content": "Knowledge Management (KM) is the latest buzzword that is becoming a growing field of interest. There is a strong belief that Higher Education Institutions (HEI) would have a tremendous value when they develop initiatives to create and share knowledge to achieve their objectives. KM typically focuses on institutions' objectives such as improved performance, competitive advantage, innovation, the sharing of knowledge, best practices and lessons learned, and continuous improvement of the institution. It includes a range of activities to create, capture, process, distribute and store the knowledge. It is imperative to understand the latest theories of KM frameworks at this time, as there is a huge indication for the need to adopt KM methodologies in the educational sector. In an attempt to address this issue, this paper explores the higher education domain in terms of KM and discusses on views of the importance of well-defined framework and also proposes a conceptual framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Knowledge Management (KM) is the latest buzzword that is becoming a growing field of interest. There is a strong belief that Higher Education Institutions (HEI) would have a tremendous value when they develop initiatives to create and share knowledge to achieve their objectives. KM typically focuses on institutions' objectives such as improved performance, competitive advantage, innovation, the sharing of knowledge, best practices and lessons learned, and continuous improvement of the institution. It includes a range of activities to create, capture, process, distribute and store the knowledge. It is imperative to understand the latest theories of KM frameworks at this time, as there is a huge indication for the need to adopt KM methodologies in the educational sector. In an attempt to address this issue, this paper explores the higher education domain in terms of KM and discusses on views of the importance of well-defined framework and also proposes a conceptual framework.", "fno": "06395975", "keywords": [ "Educational Institutions", "Further Education", "Knowledge Management", "Holistic Knowledge Management Framework", "Higher Education Institutions", "KM", "HEI", "Educational Sector", "Current Measurement", "Extraterrestrial Measurements", "Knowledge Management", "Framework" ], "authors": [ { "affiliation": "Rajalakshmi Engineering College, Chennai, India", "fullName": "R Kumar", "givenName": "R", "surname": "Kumar", "__typename": "ArticleAuthorType" }, { "affiliation": "Hindustan Institute of Technology and Science, Chennai, India", "fullName": "K Sarukesi", "givenName": "K", "surname": "Sarukesi", "__typename": "ArticleAuthorType" }, { "affiliation": "Anna University, Chennai, India", "fullName": "G V Uma", "givenName": "G V", "surname": "Uma", "__typename": "ArticleAuthorType" } ], "idPrefix": "icccnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2012", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06395974", "articleId": "12OmNzX6ctQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06395976", "articleId": "12OmNBlofUl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2012/4525/0/06149375", "title": "Conceptualizing knowledge use: A theoretical framework and empirical study", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/06149375/12OmNAndiuX", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718756", "title": "Measuring Value of Knowledge-Based Initiatives - Evaluation of Existing Models and Development of a New Measurement Framework", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718756/12OmNB9bviN", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2004/2181/0/21810370", "title": "Knowledge Management in Software Engineering Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2004/21810370/12OmNqHItut", "parentPublication": { "id": "proceedings/icalt/2004/2181/0", "title": "Proceedings. IEEE International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a097", "title": "Knowledge Sharing System Model for Higher Learning Institutions: Case Study", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a097/12OmNx3ZjfW", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2010/4279/1/4279a352", "title": "Study on the Undergraduate Education Satisfaction of the Higher Education Institutions", "doi": null, "abstractUrl": "/proceedings-article/iciii/2010/4279a352/12OmNyv7mmP", "parentPublication": { "id": "proceedings/iciii/2010/4279/1", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550811", "title": "IT management status in public higher education institutions in Thailand", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550811/12OmNzcxZti", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2014/3592/0/3592a247", "title": "The Implementation of Pneumatic Training Instrument in Higher Learning Institutions: Analysis of Two Institutions", "doi": null, "abstractUrl": "/proceedings-article/latice/2014/3592a247/12OmNzxgHEW", "parentPublication": { "id": "proceedings/latice/2014/3592/0", "title": "2014 International Conference on Teaching and Learning in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2022/06/10017411", "title": "The Metaverse and Higher Education Institutions", "doi": null, "abstractUrl": "/magazine/it/2022/06/10017411/1JYZE6WWG3e", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300a455", "title": "Applying a Gamification Approach to Knowledge Management in Higher Education Institutions", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300a455/1nkDlCYhJte", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637131", "title": "Time as a Challenge for Higher Education Institutions and Employers", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637131/1zuweRezFba", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQ7FQN", "title": "2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService)", "acronym": "bigdataservice", "groupId": "1808984", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNweBUID", "doi": "10.1109/BigDataService.2016.14", "title": "A Hybrid Geometric Approach for Measuring Similarity Level Among Documents and Document Clustering", "normalizedTitle": "A Hybrid Geometric Approach for Measuring Similarity Level Among Documents and Document Clustering", "abstract": "The increasing numbers of textual documents from diverse sources such as different websites (e.g. social networks, news, magazines, blogs and medical recommendation websites), publications and articles and medical prescriptions leads to massive amounts of daily complex data. This phenomenon has caused many researchers to focus on analysing the content and measuring the similarities among the documents and texts to cluster them. One popular method to measure the similarity between documents is to represent the documents as vectors and measure the similarity among them based on the angle or Euclidean distance between each pair. By only considering these two criteria for similarity measurement, we may miss important underlying similarities in this area. We propose a new method, TS-SS, to measure the similarity level among documents, in such a way that one hopes to better understand which documents are more (or less) similar. This similarity level can be used as a handy measure for clustering and recommendation systems for documents. It also can be used to show top n similar documents to a particular document or a search query. Our study gives insights on the drawbacks of geometrical and non-geometrical similarity measures and provides a novel method to combine the other geometric criteria into a method to measure the similarity level among documents from new prospective. We apply Euclidean distance, Cosine similarity and our new method on four labelled datasets. Finally we report how these three geometrical similarity measures perform in terms of similarity level and clustering purity using four evaluation techniques. The evaluations' results show that our new model outperforms the other measures.", "abstracts": [ { "abstractType": "Regular", "content": "The increasing numbers of textual documents from diverse sources such as different websites (e.g. social networks, news, magazines, blogs and medical recommendation websites), publications and articles and medical prescriptions leads to massive amounts of daily complex data. This phenomenon has caused many researchers to focus on analysing the content and measuring the similarities among the documents and texts to cluster them. One popular method to measure the similarity between documents is to represent the documents as vectors and measure the similarity among them based on the angle or Euclidean distance between each pair. By only considering these two criteria for similarity measurement, we may miss important underlying similarities in this area. We propose a new method, TS-SS, to measure the similarity level among documents, in such a way that one hopes to better understand which documents are more (or less) similar. This similarity level can be used as a handy measure for clustering and recommendation systems for documents. It also can be used to show top n similar documents to a particular document or a search query. Our study gives insights on the drawbacks of geometrical and non-geometrical similarity measures and provides a novel method to combine the other geometric criteria into a method to measure the similarity level among documents from new prospective. We apply Euclidean distance, Cosine similarity and our new method on four labelled datasets. Finally we report how these three geometrical similarity measures perform in terms of similarity level and clustering purity using four evaluation techniques. The evaluations' results show that our new model outperforms the other measures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The increasing numbers of textual documents from diverse sources such as different websites (e.g. social networks, news, magazines, blogs and medical recommendation websites), publications and articles and medical prescriptions leads to massive amounts of daily complex data. This phenomenon has caused many researchers to focus on analysing the content and measuring the similarities among the documents and texts to cluster them. One popular method to measure the similarity between documents is to represent the documents as vectors and measure the similarity among them based on the angle or Euclidean distance between each pair. By only considering these two criteria for similarity measurement, we may miss important underlying similarities in this area. We propose a new method, TS-SS, to measure the similarity level among documents, in such a way that one hopes to better understand which documents are more (or less) similar. This similarity level can be used as a handy measure for clustering and recommendation systems for documents. It also can be used to show top n similar documents to a particular document or a search query. Our study gives insights on the drawbacks of geometrical and non-geometrical similarity measures and provides a novel method to combine the other geometric criteria into a method to measure the similarity level among documents from new prospective. We apply Euclidean distance, Cosine similarity and our new method on four labelled datasets. Finally we report how these three geometrical similarity measures perform in terms of similarity level and clustering purity using four evaluation techniques. The evaluations' results show that our new model outperforms the other measures.", "fno": "2251a142", "keywords": [ "Euclidean Distance", "Semantics", "Computational Modeling", "Current Measurement", "Frequency Measurement", "Extraterrestrial Measurements", "Correlation", "VSM", "Document Clustering", "Similarity Level", "Document Similarity", "Geometric Similarity" ], "authors": [ { "affiliation": null, "fullName": "Arash Heidarian", "givenName": "Arash", "surname": "Heidarian", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael J. Dinneen", "givenName": "Michael J.", "surname": "Dinneen", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigdataservice", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-03-01T00:00:00", "pubType": "proceedings", "pages": "142-151", "year": "2016", "issn": null, "isbn": "978-1-5090-2251-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2251a131", "articleId": "12OmNyqRn67", "__typename": "AdjacentArticleType" }, "next": { "fno": "2251a152", "articleId": "12OmNylKB13", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2014/4143/2/4143b442", "title": "Text Document Latent Subspace Clustering by PLSA Factors", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143b442/12OmNrHB1WB", "parentPublication": { "id": "wi-iat/2014/4143/2", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1993/3880/0/00340986", "title": "Distance metric between 3D models and 2D images for recognition and classification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1993/00340986/12OmNxwENGI", "parentPublication": { "id": "proceedings/cvpr/1993/3880/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2016/0811/0/0811a295", "title": "Evaluation of Semantic Similarity Using Vector Space Model Based on Textual Corpus", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2016/0811a295/12OmNya72pe", "parentPublication": { "id": "proceedings/cgiv/2016/0811/0", "title": "2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2016/8796/0/07425976", "title": "Implemetation of retrieval system for Prior Art Candidate search", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2016/07425976/12OmNyqRndR", "parentPublication": { "id": "proceedings/bigcomp/2016/8796/0", "title": "2016 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/7669/2/05573903", "title": "Research on Forepart Evaluation for Support Concept of the Winged Missile Based on Vague Sets", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573903/12OmNz3bdJw", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/12/ttk2013122823", "title": "Measuring Similarity Based on Link Information: A Comparative Study", "doi": null, "abstractUrl": "/journal/tk/2013/12/ttk2013122823/13rRUwbs21k", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/06/ttk2012061002", "title": "Document Clustering in Correlation Similarity Measure Space", "doi": null, "abstractUrl": "/journal/tk/2012/06/ttk2012061002/13rRUxcbnHF", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/07/06420834", "title": "A Similarity Measure for Text Classification and Clustering", "doi": null, "abstractUrl": "/journal/tk/2014/07/06420834/13rRUy3xY8x", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/05/08735757", "title": "Tackling Similarity Search for Soccer Match Analysis: Multimodal Distance Measure and Interactive Query Definition", "doi": null, "abstractUrl": "/magazine/cg/2019/05/08735757/1aNOsqnK0Gk", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09448469", "title": "A Topological Similarity Measure Between Multi-Resolution Reeb Spaces", "doi": null, "abstractUrl": "/journal/tg/2022/12/09448469/1ugE7gaINC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlUKpE", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "acronym": "isme", "groupId": "1800131", "volume": "2", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzahcfJ", "doi": "10.1109/ISME.2010.102", "title": "Q-convergence Theory of Nets of Fuzzy Sets in Fuzzy Topological Spaces", "normalizedTitle": "Q-convergence Theory of Nets of Fuzzy Sets in Fuzzy Topological Spaces", "abstract": "The convergence theory is a basic theory of fuzzy topology and fuzzy analysis. In this paper we introduce the notions of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets. We also study the properties of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets.", "abstracts": [ { "abstractType": "Regular", "content": "The convergence theory is a basic theory of fuzzy topology and fuzzy analysis. In this paper we introduce the notions of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets. We also study the properties of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The convergence theory is a basic theory of fuzzy topology and fuzzy analysis. In this paper we introduce the notions of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets. We also study the properties of fuzzy Q-upper limit, fuzzy Q-lower limit and the fuzzy Q-convergent nets of fuzzy sets.", "fno": "05573833", "keywords": [ "Convergence", "Fuzzy Set Theory", "Topology", "Fuzzy Set", "Fuzzy Topological Spaces", "Fuzzy Analysis", "Fuzzy Q Upper Limit", "Fuzzy Q Lower Limit", "Fuzzy Q Convergent Nets", "Fuzzy Sets", "Convergence", "Topology", "Cybernetics", "Machine Learning", "Extraterrestrial Measurements", "Lattices", "Fuzzy Q Upper Limit", "Fuzzy Q Lower Limit", "Fuzzy Q Convergent Nets Of Fuzzy Sets" ], "authors": [ { "affiliation": null, "fullName": "Houshan Teng", "givenName": "Houshan", "surname": "Teng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bin Chen", "givenName": "Bin", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "isme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "265-268", "year": "2010", "issn": null, "isbn": "978-1-4244-7669-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05573832", "articleId": "12OmNwcCIVe", "__typename": "AdjacentArticleType" }, "next": { "fno": "05573830", "articleId": "12OmNy7Qftu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/6/3735f008", "title": "Beta-convergence Theory of L-fuzzy Nets and its Applications", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735f008/12OmNAWH9Dv", "parentPublication": { "id": "proceedings/fskd/2009/3735/6", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/4/01259945", "title": "Fuzzy fixed point theorems for fuzzy mappings", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259945/12OmNAXxWSE", "parentPublication": { "id": "proceedings/icmlc/2003/7865/4", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b265", "title": "Q-convergence Theory of Nets of Fuzzy Sets in Fuzzy Topological Spaces", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b265/12OmNAoDhXV", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/3/01259744", "title": "Fuzzy accumulation points and convergence of molecular net", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259744/12OmNBa2iD7", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/7669/2/05573853", "title": "GF-Convergence Theory of L-fuzzy Nets and its Applications", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573853/12OmNBv2Chv", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/4/01259941", "title": "Fuzzy continuous function and its application to fuzzy neural nets (I)", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259941/12OmNCy2L1N", "parentPublication": { "id": "proceedings/icmlc/2003/7865/4", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/7/05359951", "title": "Pyramid Fuzzy Numbers", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/05359951/12OmNvSKNPD", "parentPublication": { "id": "proceedings/fskd/2009/3735/7", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/7/05359947", "title": "Near Semicompactness in L-fuzzy Topological Spaces", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/05359947/12OmNwDACd2", "parentPublication": { "id": "proceedings/fskd/2009/3735/7", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccairo/2018/9576/0/08698421", "title": "Some New Fuzzy Fixed Point Theorems for Fuzzy Contractive Mappings in Hausdorff Fuzzy Metric Spaces", "doi": null, "abstractUrl": "/proceedings-article/iccairo/2018/08698421/19wAXnqRZlu", "parentPublication": { "id": "proceedings/iccairo/2018/9576/0", "title": "2018 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccairo/2019/3572/0/357200a042", "title": "Filters in Mich&#x00E1;lek's Fuzzy Topological Spaces", "doi": null, "abstractUrl": "/proceedings-article/iccairo/2019/357200a042/1iQ327ItAPu", "parentPublication": { "id": "proceedings/iccairo/2019/3572/0", "title": "2019 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18rqu7pdOPm", "doi": "10.1109/ICDMW.2018.00153", "title": "Multimapper: Data Density Sensitive Topological Visualization", "normalizedTitle": "Multimapper: Data Density Sensitive Topological Visualization", "abstract": "Mapper is an algorithm that summarizes the topological information contained in a dataset and provides an insightful visualization. It takes as input a point cloud which is possibly high-dimensional, a filter function on it and an open cover on the range of the function. It returns the nerve simplicial complex of the pullback of the cover. Mapper can be considered a discrete approximation of the topological construct called Reeb space, as analysed in the 1-dimensional case by [Carri et al.,]. Despite its success in obtaining insights in various fields such as in [Kamruzzaman et al., 2016], Mapper is an ad hoc technique requiring lots of parameter tuning. There is also no measure to quantify goodness of the resulting visualization, which often deviates from the Reeb space in practice. In this paper, we introduce a new cover selection scheme for data that reduces the obscuration of topological information at both the computation and visualisation steps. To achieve this, we replace global scale selection of cover with a scale selection scheme sensitive to local density of data points. We also propose a method to detect some deviations in Mapper from Reeb space via computation of persistence features on the Mapper graph.", "abstracts": [ { "abstractType": "Regular", "content": "Mapper is an algorithm that summarizes the topological information contained in a dataset and provides an insightful visualization. It takes as input a point cloud which is possibly high-dimensional, a filter function on it and an open cover on the range of the function. It returns the nerve simplicial complex of the pullback of the cover. Mapper can be considered a discrete approximation of the topological construct called Reeb space, as analysed in the 1-dimensional case by [Carri et al.,]. Despite its success in obtaining insights in various fields such as in [Kamruzzaman et al., 2016], Mapper is an ad hoc technique requiring lots of parameter tuning. There is also no measure to quantify goodness of the resulting visualization, which often deviates from the Reeb space in practice. In this paper, we introduce a new cover selection scheme for data that reduces the obscuration of topological information at both the computation and visualisation steps. To achieve this, we replace global scale selection of cover with a scale selection scheme sensitive to local density of data points. We also propose a method to detect some deviations in Mapper from Reeb space via computation of persistence features on the Mapper graph.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mapper is an algorithm that summarizes the topological information contained in a dataset and provides an insightful visualization. It takes as input a point cloud which is possibly high-dimensional, a filter function on it and an open cover on the range of the function. It returns the nerve simplicial complex of the pullback of the cover. Mapper can be considered a discrete approximation of the topological construct called Reeb space, as analysed in the 1-dimensional case by [Carri et al.,]. Despite its success in obtaining insights in various fields such as in [Kamruzzaman et al., 2016], Mapper is an ad hoc technique requiring lots of parameter tuning. There is also no measure to quantify goodness of the resulting visualization, which often deviates from the Reeb space in practice. In this paper, we introduce a new cover selection scheme for data that reduces the obscuration of topological information at both the computation and visualisation steps. To achieve this, we replace global scale selection of cover with a scale selection scheme sensitive to local density of data points. We also propose a method to detect some deviations in Mapper from Reeb space via computation of persistence features on the Mapper graph.", "fno": "928800b054", "keywords": [ "Computational Geometry", "Data Visualisation", "Filtering Theory", "Graph Theory", "Telecommunication Network Topology", "Topological Discrete Approximation", "Data Density Sensitive Topological Visualization", "Multimapper", "Mapper Graph", "Data Points", "Local Density", "Scale Selection Scheme", "Global Scale Selection", "Topological Information", "Cover Selection Scheme", "Parameter Tuning", "Ad Hoc Technique", "1 Dimensional Case", "Reeb Space", "Nerve Simplicial Complex", "Open Cover", "Filter Function", "Point Cloud", "Insightful Visualization", "Poles And Towers", "Lenses", "Data Visualization", "Three Dimensional Displays", "Clustering Algorithms", "Extraterrestrial Measurements", "Conferences", "Data Visualization", "Topology", "Mapper" ], "authors": [ { "affiliation": null, "fullName": "Bishal Deb", "givenName": "Bishal", "surname": "Deb", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ankita Sarkar", "givenName": "Ankita", "surname": "Sarkar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nupur Kumari", "givenName": "Nupur", "surname": "Kumari", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Akash Rupela", "givenName": "Akash", "surname": "Rupela", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Piyush Gupta", "givenName": "Piyush", "surname": "Gupta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Balaji Krishnamurthy", "givenName": "Balaji", "surname": "Krishnamurthy", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1054-1061", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800b050", "articleId": "18jXE9FJ85y", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800b062", "articleId": "18jXA8K5fLG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2017/3800/0/3800a296", "title": "Quantifying Seasonal Patterns in Disparate Environmental Variables Using the PolarMetrics R Package", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a296/12OmNybx22d", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2018/5114/0/511401a362", "title": "Point Sets and Periodic Shadowing Property of Topological G-Conjugacy on Metric G-Space", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2018/511401a362/12OmNzA6GKY", "parentPublication": { "id": "proceedings/icmtma/2018/5114/0", "title": "2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2014/5618/0/5618a360", "title": "Data Clustering Using Topological Features", "doi": null, "abstractUrl": "/proceedings-article/bracis/2014/5618a360/12OmNzV70A5", "parentPublication": { "id": "proceedings/bracis/2014/5618/0", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1496", "title": "Topological Visualization of Brain Diffusion MRI Data", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1496/13rRUyfbwqA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982282", "title": "Summary of Topological Study of Chaotic CBC Mode of Operation", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982282/17D45WK5Amc", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/2016/4391/0/08576446", "title": "A constructive function-theoretic approach to topological compactness", "doi": null, "abstractUrl": "/proceedings-article/lics/2016/08576446/17D45WrVg9T", "parentPublication": { "id": "proceedings/lics/2016/4391/0", "title": "2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222093", "title": "Localized Topological Simplification of Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222093/1nTrExzmT5e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a150", "title": "Exploration of Topological Data Analysis In 3D Printing", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a150/1oRiWPcsMtW", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2021/8924/0/892400a210", "title": "Topological Data Analysis for Classification of Heart Disease Data", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2021/892400a210/1rRccPTmLN6", "parentPublication": { "id": "proceedings/bigcomp/2021/8924/0", "title": "2021 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09448469", "title": "A Topological Similarity Measure Between Multi-Resolution Reeb Spaces", "doi": null, "abstractUrl": "/journal/tg/2022/12/09448469/1ugE7gaINC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kaMxDONP0Y", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kaMMip5AKA", "doi": "10.1109/ICDE48307.2020.00212", "title": "HowSim: A General and Effective Similarity Measure on Heterogeneous Information Networks", "normalizedTitle": "HowSim: A General and Effective Similarity Measure on Heterogeneous Information Networks", "abstract": "Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. Measuring the similarity among objects is an important task in data mining applications. Currently, several similarity measures are defined for HIN. Most of these measures are based on meta-paths, which show sequences of node classes and edge types along the paths between two nodes. However, meta-paths, which are often designed by domain experts, are hard to enumerate and choose w.r.t. the quality of the similarity scores. This makes the existing similarity measures difficult to use in real applications. To address this problem, we extend SimRank, a well-known similarity measure for homogeneous graphs, to HINs, by introducing the concept of decay graph. The newly proposed relevance measure is called HowSim, which has the property of being meta-path free, and capturing the structural and semantic similarity simultaneously. The generality and effectiveness of HowSim, are demonstrated by extensive experiments.", "abstracts": [ { "abstractType": "Regular", "content": "Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. Measuring the similarity among objects is an important task in data mining applications. Currently, several similarity measures are defined for HIN. Most of these measures are based on meta-paths, which show sequences of node classes and edge types along the paths between two nodes. However, meta-paths, which are often designed by domain experts, are hard to enumerate and choose w.r.t. the quality of the similarity scores. This makes the existing similarity measures difficult to use in real applications. To address this problem, we extend SimRank, a well-known similarity measure for homogeneous graphs, to HINs, by introducing the concept of decay graph. The newly proposed relevance measure is called HowSim, which has the property of being meta-path free, and capturing the structural and semantic similarity simultaneously. The generality and effectiveness of HowSim, are demonstrated by extensive experiments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. Measuring the similarity among objects is an important task in data mining applications. Currently, several similarity measures are defined for HIN. Most of these measures are based on meta-paths, which show sequences of node classes and edge types along the paths between two nodes. However, meta-paths, which are often designed by domain experts, are hard to enumerate and choose w.r.t. the quality of the similarity scores. This makes the existing similarity measures difficult to use in real applications. To address this problem, we extend SimRank, a well-known similarity measure for homogeneous graphs, to HINs, by introducing the concept of decay graph. The newly proposed relevance measure is called HowSim, which has the property of being meta-path free, and capturing the structural and semantic similarity simultaneously. The generality and effectiveness of HowSim, are demonstrated by extensive experiments.", "fno": "09101566", "keywords": [ "Data Mining", "Graph Theory", "Information Networks", "Information Systems", "Heterogeneous Information Networks", "HIN", "Information Systems", "Multitype Objects", "Data Mining Applications", "Effective Similarity Measure", "Meta Paths", "Edge Types", "How Sim", "Structural Similarity", "Semantic Similarity", "Node Classes Sequences", "Similarity Score Quality", "Homogeneous Graphs", "Decay Graph", "Meta Path Free", "Sim Rank", "Semantics", "Current Measurement", "Data Mining", "Aggregates", "Probabilistic Logic", "Task Analysis", "Writing", "Heterogeneous Information Networks", "Similarity Measure", "Data Mining", "Sim Rank" ], "authors": [ { "affiliation": "Shenzhen Univ,Shenzhen Institute of Computing Sciences", "fullName": "Yue Wang", "givenName": "Yue", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "HKUST,CSE Dept", "fullName": "Zhe Wang", "givenName": "Zhe", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Tencent,Wechat Group", "fullName": "Ziyuan Zhao", "givenName": "Ziyuan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "HKUST,CSE Dept", "fullName": "Zijian Li", "givenName": "Zijian", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "HKUST,CSE Dept", "fullName": "Xun Jian", "givenName": "Xun", "surname": "Jian", "__typename": "ArticleAuthorType" }, { "affiliation": "HKUST,CSE Dept", "fullName": "Lei Chen", "givenName": "Lei", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Tencent,Wechat Group", "fullName": "Jianchun Song", "givenName": "Jianchun", "surname": "Song", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "1954-1957", "year": "2020", "issn": null, "isbn": "978-1-7281-2903-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09101469", "articleId": "1kaMJtNNpa8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09101687", "articleId": "1kaMJYf8j16", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2016/5473/0/07837998", "title": "Multi-type Co-clustering of General Heterogeneous Information Networks via Nonnegative Matrix Tri-Factorization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837998/12OmNBrV1UG", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504b015", "title": "KnowSim: A Document Similarity Measure on Structured Heterogeneous Information Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504b015/12OmNz2C1of", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscbi/2014/7551/0/07119540", "title": "A Novel Approach to Find Semantic Similarity Measure between Words", "doi": null, "abstractUrl": "/proceedings-article/iscbi/2014/07119540/12OmNzaQoni", "parentPublication": { "id": "proceedings/iscbi/2014/7551/0", "title": "2014 2nd International Symposium on Computational and Business Intelligence (ISCBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/06/06963491", "title": "Top-k Similarity Join in Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2015/06/06963491/13rRUxDIthG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2022/9633/0/963300a051", "title": "Attention based Collaborator Recommendation in Heterogeneous Academic Networks", "doi": null, "abstractUrl": "/proceedings-article/cse/2022/963300a051/1Lz23RT9Mcg", "parentPublication": { "id": "proceedings/cse/2022/9633/0", "title": "2022 IEEE 25th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10111040", "title": "GSim: A Graph Neural Network Based Relevance Measure for Heterogeneous Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10111040/1MIcyOwRgOc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09178475", "title": "Effective Similarity Search on Heterogeneous Networks: A Meta-Path Free Approach", "doi": null, "abstractUrl": "/journal/tk/2022/07/09178475/1mCjmY59NIc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09201301", "title": "mSHINE: A Multiple-Meta-Paths Simultaneous Learning Framework for Heterogeneous Information Network Embedding", "doi": null, "abstractUrl": "/journal/tk/2022/07/09201301/1niU9FkPNHa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a799", "title": "WMPEClus: Clustering via Weighted Meta-Path Embedding for Heterogeneous Information Networks", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a799/1pP3D7bFBDO", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09508875", "title": "Interpretable and Efficient Heterogeneous Graph Convolutional Network", "doi": null, "abstractUrl": "/journal/tk/2023/02/09508875/1vQzgK4tFdu", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF2p", "title": "Computer Graphics International Conference", "acronym": "cgi", "groupId": "1000132", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNCmGNUU", "doi": "10.1109/CGI.1999.777917", "title": "Efficient Occlusion Culling for Z-Buffer Systems", "normalizedTitle": "Efficient Occlusion Culling for Z-Buffer Systems", "abstract": "In recent years the performance of z-buffer hardware has improved rapidly, enabling inexpensive accelerators to smoothly animate relatively simple scenes such as game environments. Although faster processors, buses, and rasterization hardware will gradually enable animation of increasingly complex scenes, it will be many years before very deeply occluded scenes can be rendered in real time with traditional z-buffer hardware.One approach to accelerating the rendering of complex scenes is occlusion culling, which refers to culling of occluded geometry early in the graphics pipeline in order to reduce the workload on transformation, rasterization, and shading hardware. In this talk I will discuss the general problem of occlusion culling, review my work on applying hierarchical methods to the problem, and then describe how these methods can be applied to accelerate hardware pipelines.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years the performance of z-buffer hardware has improved rapidly, enabling inexpensive accelerators to smoothly animate relatively simple scenes such as game environments. Although faster processors, buses, and rasterization hardware will gradually enable animation of increasingly complex scenes, it will be many years before very deeply occluded scenes can be rendered in real time with traditional z-buffer hardware.One approach to accelerating the rendering of complex scenes is occlusion culling, which refers to culling of occluded geometry early in the graphics pipeline in order to reduce the workload on transformation, rasterization, and shading hardware. In this talk I will discuss the general problem of occlusion culling, review my work on applying hierarchical methods to the problem, and then describe how these methods can be applied to accelerate hardware pipelines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years the performance of z-buffer hardware has improved rapidly, enabling inexpensive accelerators to smoothly animate relatively simple scenes such as game environments. Although faster processors, buses, and rasterization hardware will gradually enable animation of increasingly complex scenes, it will be many years before very deeply occluded scenes can be rendered in real time with traditional z-buffer hardware.One approach to accelerating the rendering of complex scenes is occlusion culling, which refers to culling of occluded geometry early in the graphics pipeline in order to reduce the workload on transformation, rasterization, and shading hardware. In this talk I will discuss the general problem of occlusion culling, review my work on applying hierarchical methods to the problem, and then describe how these methods can be applied to accelerate hardware pipelines.", "fno": "01850078", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Ned Greene", "givenName": "Ned", "surname": "Greene", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-06-01T00:00:00", "pubType": "proceedings", "pages": "78", "year": "1999", "issn": "1530-1052", "isbn": "0-7695-0185-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00777960", "articleId": "12OmNqIzh9Z", "__typename": "AdjacentArticleType" }, "next": { "fno": "01850080", "articleId": "12OmNx3q6XQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC17hVD", "title": "European Design and Test Conference", "acronym": "edtc", "groupId": "1000280", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNCmpcWw", "doi": "10.1109/EDTC.1995.470426", "title": "Eliminating the Z-Buffer bottleneck", "normalizedTitle": "Eliminating the Z-Buffer bottleneck", "abstract": "We present a solution to one of the fundamental problems in computer graphics, the hidden surface removal. In most 3D-graphics systems the hidden surface removal is done using the Z-Buffer algorithm. This method, however, requires one to perform a read-modify-write memory access for each visible pixel, which represents a severe performance limit. We introduce a novel SRAM cell, which incorporates the needed logical units to perform the Z-Buffer algorithm on its own. Placed into the page register of conventional DRAMs, almost any pixel rate can be achieved.", "abstracts": [ { "abstractType": "Regular", "content": "We present a solution to one of the fundamental problems in computer graphics, the hidden surface removal. In most 3D-graphics systems the hidden surface removal is done using the Z-Buffer algorithm. This method, however, requires one to perform a read-modify-write memory access for each visible pixel, which represents a severe performance limit. We introduce a novel SRAM cell, which incorporates the needed logical units to perform the Z-Buffer algorithm on its own. Placed into the page register of conventional DRAMs, almost any pixel rate can be achieved.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a solution to one of the fundamental problems in computer graphics, the hidden surface removal. In most 3D-graphics systems the hidden surface removal is done using the Z-Buffer algorithm. This method, however, requires one to perform a read-modify-write memory access for each visible pixel, which represents a severe performance limit. We introduce a novel SRAM cell, which incorporates the needed logical units to perform the Z-Buffer algorithm on its own. Placed into the page register of conventional DRAMs, almost any pixel rate can be achieved.", "fno": "70390012", "keywords": [ "Buffer Storage Hidden Feature Removal Computer Graphics SRAM Chips Memory Architecture Z Buffer Bottleneck Computer Graphics Hidden Surface Removal SRAM Cell Logical Units Page Register Pixel Rate" ], "authors": [ { "affiliation": "WSI/GRIS, Tubingen Univ., Germany", "fullName": "G. Knittel", "givenName": "G.", "surname": "Knittel", "__typename": "ArticleAuthorType" }, { "affiliation": "WSI/GRIS, Tubingen Univ., Germany", "fullName": "A. Schilling", "givenName": "A.", "surname": "Schilling", "__typename": "ArticleAuthorType" } ], "idPrefix": "edtc", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-03-01T00:00:00", "pubType": "proceedings", "pages": "12", "year": "1995", "issn": "1066-1409", "isbn": "0-8186-7039-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "70390007", "articleId": "12OmNxG1yKU", "__typename": "AdjacentArticleType" }, "next": { "fno": "70390018", "articleId": "12OmNzlUKGV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4Eo", "title": "Computer and Computational Sciences, International Multi-Symposiums on", "acronym": "imsccs", "groupId": "1001647", "volume": "1", "displayVolume": "1", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNvnfkaa", "doi": "10.1109/IMSCCS.2006.44", "title": "CoarseZ Buffer Bandwidth Model in 3D Rendering Pipeline", "normalizedTitle": "CoarseZ Buffer Bandwidth Model in 3D Rendering Pipeline", "abstract": "Depth traffic occupies a major portion of 3D graphics memory bandwidth. In order to reduce depth reading, we propose employing a low-resolution depth buffer, namely CoarseZ buffer, for tile-level depth culling before perpixel test. The maximum depth of a tile is stored in the corresponding entry of CoarseZ buffer. Simulation results show that a small CoarseZ buffer can achieve remarkably high culling rate and significantly reduce z-reading bandwidth. We build a model that quantifies the influence of the CoarseZ design parameters on its efficiency and bandwidth. Test results of industrial benchmarks show that CoarseZ with tile size of 4 and bit depth of 16 can be a best selection to reduce memory bandwidth.", "abstracts": [ { "abstractType": "Regular", "content": "Depth traffic occupies a major portion of 3D graphics memory bandwidth. In order to reduce depth reading, we propose employing a low-resolution depth buffer, namely CoarseZ buffer, for tile-level depth culling before perpixel test. The maximum depth of a tile is stored in the corresponding entry of CoarseZ buffer. Simulation results show that a small CoarseZ buffer can achieve remarkably high culling rate and significantly reduce z-reading bandwidth. We build a model that quantifies the influence of the CoarseZ design parameters on its efficiency and bandwidth. Test results of industrial benchmarks show that CoarseZ with tile size of 4 and bit depth of 16 can be a best selection to reduce memory bandwidth.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Depth traffic occupies a major portion of 3D graphics memory bandwidth. In order to reduce depth reading, we propose employing a low-resolution depth buffer, namely CoarseZ buffer, for tile-level depth culling before perpixel test. The maximum depth of a tile is stored in the corresponding entry of CoarseZ buffer. Simulation results show that a small CoarseZ buffer can achieve remarkably high culling rate and significantly reduce z-reading bandwidth. We build a model that quantifies the influence of the CoarseZ design parameters on its efficiency and bandwidth. Test results of industrial benchmarks show that CoarseZ with tile size of 4 and bit depth of 16 can be a best selection to reduce memory bandwidth.", "fno": "25810737", "keywords": [], "authors": [ { "affiliation": "Zhejiang University, China", "fullName": "Ke Yang", "givenName": "Ke", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University, China", "fullName": "Ke Gao", "givenName": "Ke", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University, China", "fullName": "Jiaoying Shi", "givenName": "Jiaoying", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University, China", "fullName": "Xiaohong Jiang", "givenName": "Xiaohong", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University, China", "fullName": "Hua Xiong", "givenName": "Hua", "surname": "Xiong", "__typename": "ArticleAuthorType" } ], "idPrefix": "imsccs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-06-01T00:00:00", "pubType": "proceedings", "pages": "737-742", "year": "2006", "issn": null, "isbn": "0-7695-2581-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "25810732", "articleId": "12OmNwekjvl", "__typename": "AdjacentArticleType" }, "next": { "fno": "25810743", "articleId": "12OmNyuya5Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgi/1999/0185/0/01850078", "title": "Efficient Occlusion Culling for Z-Buffer Systems", "doi": null, "abstractUrl": "/proceedings-article/cgi/1999/01850078/12OmNCmGNUU", "parentPublication": { "id": "proceedings/cgi/1999/0185/0", "title": "Computer Graphics International Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mue/2008/3134/0/3134a470", "title": "Reconfigurable Depth Buffer Compression Design for 3D Graphics System", "doi": null, "abstractUrl": "/proceedings-article/mue/2008/3134a470/12OmNrJROVJ", "parentPublication": { "id": "proceedings/mue/2008/3134/0", "title": "Multimedia and Ubiquitous Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2002/1712/0/17120173", "title": "A Mid-Texturing Pixel Rasterization Pipeline Architecture for 3D Rendering Processors", "doi": null, "abstractUrl": "/proceedings-article/asap/2002/17120173/12OmNxRnvUu", "parentPublication": { "id": "proceedings/asap/2002/1712/0", "title": "Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607553", "title": "Design of multi-mode depth buffer compression for 3D graphics system", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607553/12OmNxWcHhY", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hoti/2014/5860/0/5860a033", "title": "The Buffer Size vs Link Bandwidth Tradeoff in Lossless Networks", "doi": null, "abstractUrl": "/proceedings-article/hoti/2014/5860a033/12OmNy314eV", "parentPublication": { "id": "proceedings/hoti/2014/5860/0", "title": "2014 IEEE 22nd Annual Symposium on High-Performance Interconnects (HOTI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06814970", "title": "Time and Space Coherent Occlusion Culling for Tileable Extended 3D Worlds", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06814970/12OmNzuIjnk", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2000/03/00851983", "title": "Equilibrium bandwidth and buffer allocations for elastic traffics", "doi": null, "abstractUrl": "/journal/nt/2000/03/00851983/13rRUNvgz0V", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/06/07070744", "title": "Z_$k^+$_Z -buffer: An Efficient, Memory-Friendly and Dynamic Z_$k$_Z -buffer Framework", "doi": null, "abstractUrl": "/journal/tg/2015/06/07070744/13rRUwdrdSB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2019/1444/0/144400a623", "title": "Rendering Elimination: Early Discard of Redundant Tiles in the Graphics Pipeline", "doi": null, "abstractUrl": "/proceedings-article/hpca/2019/144400a623/18M7PSwaQkE", "parentPublication": { "id": "proceedings/hpca/2019/1444/0", "title": "2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCeaPZB", "title": "Proceedings of 1st International Conference on Image Processing", "acronym": "icip", "groupId": "1000349", "volume": "1", "displayVolume": "1", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNvzJGek", "doi": "10.1109/ICIP.1994.413396", "title": "An efficient hidden-line removal method based on Z-buffer algorithm", "normalizedTitle": "An efficient hidden-line removal method based on Z-buffer algorithm", "abstract": "We describe an efficient hidden-line removal method which is based on the general Z-buffer hidden-surface removal algorithm. This method can be used for effective visualization of three-dimensional wire-frame modelled objects, especially on computers where the Z-buffer algorithm is provided at either hardware or software level. This algorithm has been applied successfully to our human face modelling system.<>", "abstracts": [ { "abstractType": "Regular", "content": "We describe an efficient hidden-line removal method which is based on the general Z-buffer hidden-surface removal algorithm. This method can be used for effective visualization of three-dimensional wire-frame modelled objects, especially on computers where the Z-buffer algorithm is provided at either hardware or software level. This algorithm has been applied successfully to our human face modelling system.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We describe an efficient hidden-line removal method which is based on the general Z-buffer hidden-surface removal algorithm. This method can be used for effective visualization of three-dimensional wire-frame modelled objects, especially on computers where the Z-buffer algorithm is provided at either hardware or software level. This algorithm has been applied successfully to our human face modelling system.", "fno": "00413396", "keywords": [ "Data Visualisation", "Hidden Feature Removal", "Feature Extraction", "Buffer Storage", "Z Buffer Algorithm", "Hidden Line Removal Method", "Visualization", "Three Dimensional Wire Frame Modelled Objects", "Software", "Human Face Modelling System", "Software Algorithms", "Hardware", "Graphics", "Visualization", "Humans", "Face", "Topology", "Costs", "Microprogramming", "Rendering Computer Graphics" ], "authors": [ { "affiliation": "Beckman Inst. for Adv. Sci. & Technol., Illinois Univ., Urbana, IL, USA", "fullName": "Li-An Tang", "givenName": null, "surname": "Li-An Tang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beckman Inst. for Adv. Sci. & Technol., Illinois Univ., Urbana, IL, USA", "fullName": "T.S. Huang", "givenName": "T.S.", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icip", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "657,658,659,660", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00413395", "articleId": "12OmNwDACxl", "__typename": "AdjacentArticleType" }, "next": { "fno": "00413397", "articleId": "12OmNrYCXEQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcit/1990/2078/0/00128349", "title": "Experience using a dynamic adaptive hidden-surface removal algorithm for volume rendering within a MIMD architecture", "doi": null, "abstractUrl": "/proceedings-article/jcit/1990/00128349/12OmNB9KHww", "parentPublication": { "id": "proceedings/jcit/1990/2078/0", "title": "Proceedings of the 5th Jerusalem Conference on Information Technology 'Next Decade in Information Technology'", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/1999/0185/0/01850078", "title": "Efficient Occlusion Culling for Z-Buffer Systems", "doi": null, "abstractUrl": "/proceedings-article/cgi/1999/01850078/12OmNCmGNUU", "parentPublication": { "id": "proceedings/cgi/1999/0185/0", "title": "Computer Graphics International Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edtc/1995/7039/0/70390012", "title": "Eliminating the Z-Buffer bottleneck", "doi": null, "abstractUrl": "/proceedings-article/edtc/1995/70390012/12OmNCmpcWw", "parentPublication": { "id": "proceedings/edtc/1995/7039/0", "title": "European Design and Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbmsys/1990/9040/0/00109377", "title": "Dynamic detection of hidden-surfaces using a MIMD multiprocessor", "doi": null, "abstractUrl": "/proceedings-article/cbmsys/1990/00109377/12OmNvjgWpA", "parentPublication": { "id": "proceedings/cbmsys/1990/9040/0", "title": "1990 Proceedings Third Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1989/1964/0/00065167", "title": "A volume sorting hidden-surface algorithm", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1989/00065167/12OmNwKoZil", "parentPublication": { "id": "proceedings/cmpsac/1989/1964/0", "title": "Proceedings of the Thirteenth Annual International Computer Software & Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1989/1982/0/063541", "title": "Output-sensitive hidden surface removal", "doi": null, "abstractUrl": "/proceedings-article/focs/1989/063541/12OmNy1SFJ3", "parentPublication": { "id": "proceedings/focs/1989/1982/0", "title": "30th Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftdcs/1992/2755/0/00217465", "title": "A loosely-coupled parallel graphics architecture based on a conflict-free multiport frame buffer", "doi": null, "abstractUrl": "/proceedings-article/ftdcs/1992/00217465/12OmNzXFoLI", "parentPublication": { "id": "proceedings/ftdcs/1992/2755/0", "title": "The Third Workshop on Future Trends of Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2001/1007/0/10070193", "title": "Using A-Buffer in Radiosity", "doi": null, "abstractUrl": "/proceedings-article/cgi/2001/10070193/12OmNzxPTHC", "parentPublication": { "id": "proceedings/cgi/2001/1007/0", "title": "Proceedings. Computer Graphics International 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1986/11/mcg1986110031", "title": "Hardware Assistance for Z-Buffer Visible Surface Algorithms", "doi": null, "abstractUrl": "/magazine/cg/1986/11/mcg1986110031/13rRUxCRFQ4", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/09/ttg2011091286", "title": "A Memory-Efficient Unified Early Z-Test", "doi": null, "abstractUrl": "/journal/tg/2011/09/ttg2011091286/13rRUxbTMyN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrAdsuf", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "acronym": "ismar", "groupId": "1000465", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwqx4aS", "doi": "10.1109/ISMAR.2015.13", "title": "Tiled Frustum Culling for Differential Rendering on Mobile Devices", "normalizedTitle": "Tiled Frustum Culling for Differential Rendering on Mobile Devices", "abstract": "Mobile devices are part of our everyday life and allow augmented reality (AR) with their integrated camera image. Recent research has shown that even photorealistic augmentations with consistent illumination are possible. A method, achieving this first, distributed lighting computations and the extraction of the important light sources. To reach real-time frame rates on a mobile device, the number of these extracted light sources must be low, limiting the scope of possible illumination scenarios and the quality of shadows. In this paper, we show how to reduce the computational cost per light using a combination of tile-based rendering and frustum culling techniques tailored for AR applications. Our approach runs entirely on the GPU and does not require any precomputation. Without reducing the displayed image quality, we achieve up to 2.2× speedup for typical AR scenarios.", "abstracts": [ { "abstractType": "Regular", "content": "Mobile devices are part of our everyday life and allow augmented reality (AR) with their integrated camera image. Recent research has shown that even photorealistic augmentations with consistent illumination are possible. A method, achieving this first, distributed lighting computations and the extraction of the important light sources. To reach real-time frame rates on a mobile device, the number of these extracted light sources must be low, limiting the scope of possible illumination scenarios and the quality of shadows. In this paper, we show how to reduce the computational cost per light using a combination of tile-based rendering and frustum culling techniques tailored for AR applications. Our approach runs entirely on the GPU and does not require any precomputation. Without reducing the displayed image quality, we achieve up to 2.2× speedup for typical AR scenarios.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mobile devices are part of our everyday life and allow augmented reality (AR) with their integrated camera image. Recent research has shown that even photorealistic augmentations with consistent illumination are possible. A method, achieving this first, distributed lighting computations and the extraction of the important light sources. To reach real-time frame rates on a mobile device, the number of these extracted light sources must be low, limiting the scope of possible illumination scenarios and the quality of shadows. In this paper, we show how to reduce the computational cost per light using a combination of tile-based rendering and frustum culling techniques tailored for AR applications. Our approach runs entirely on the GPU and does not require any precomputation. Without reducing the displayed image quality, we achieve up to 2.2× speedup for typical AR scenarios.", "fno": "7660a037", "keywords": [ "Rendering Computer Graphics", "Lighting", "Light Sources", "Cameras", "Face", "Radiation Detectors", "Timing", "Light Management", "Mixed Augmented Reality", "Mobile", "Real Time Global Illumination", "Differential Rendering", "Culling" ], "authors": [ { "affiliation": null, "fullName": "Kai Rohmer", "givenName": "Kai", "surname": "Rohmer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thorsten Grosch", "givenName": "Thorsten", "surname": "Grosch", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "37-42", "year": "2015", "issn": null, "isbn": "978-1-4673-7660-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7660a031", "articleId": "12OmNwF0BUp", "__typename": "AdjacentArticleType" }, "next": { "fno": "7660a043", "articleId": "12OmNC1oT64", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisa/2013/0602/0/06579377", "title": "Mobile AR Rendering Method Using Environmental Light Source Information", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579377/12OmNqOwQIc", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbmcv/1995/7021/0/00514673", "title": "A ray-based computational model of light sources and illumination", "doi": null, "abstractUrl": "/proceedings-article/pbmcv/1995/00514673/12OmNrAMEYe", "parentPublication": { "id": "proceedings/pbmcv/1995/7021/0", "title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2017/2089/0/2089a056", "title": "Voxel-Based Interactive Rendering of Translucent Materials under Area Lights Using Sparse Samples", "doi": null, "abstractUrl": "/proceedings-article/cw/2017/2089a056/12OmNvDqsQf", "parentPublication": { "id": "proceedings/cw/2017/2089/0", "title": "2017 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836506", "title": "Reflectance and Illumination Estimation for Realistic Augmentations of Real Scenes", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836506/12OmNx5GTXK", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a192", "title": "[POSTER] Illumination Estimation Using Cast Shadows for Realistic Augmented Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a192/12OmNxX3uLh", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biovis/2012/4729/0/06378589", "title": "Towards real-time visualization of detailed neural tissue models: View frustum culling for parallel rendering", "doi": null, "abstractUrl": "/proceedings-article/biovis/2012/06378589/12OmNyRg4u5", "parentPublication": { "id": "proceedings/biovis/2012/4729/0", "title": "2012 IEEE Symposium on Biological Data Visualization (BioVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122946", "title": "Lighting Design for Globally Illuminated Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122946/13rRUwvBy8U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/05/07867077", "title": "Sequential Monte Carlo Instant Radiosity", "doi": null, "abstractUrl": "/journal/tg/2017/05/07867077/13rRUwwJWFT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/05/ttg2013050749", "title": "Interactive Rendering of Acquired Materials on Dynamic Geometry Using Frequency Analysis", "doi": null, "abstractUrl": "/journal/tg/2013/05/ttg2013050749/13rRUyp7tWW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09887904", "title": "Fast and Accurate Illumination Estimation Using LDR Panoramic Images for Realistic Rendering", "doi": null, "abstractUrl": "/journal/tg/5555/01/09887904/1GBRnHyZ1bW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwbukgF", "title": "2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS)", "acronym": "codes-isss", "groupId": "1000314", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdGnsm", "doi": "", "title": "Rank based dynamic voltage and frequency scaling for tiled graphics processors", "normalizedTitle": "Rank based dynamic voltage and frequency scaling for tiled graphics processors", "abstract": "With increasing interest in sophisticated graphics capabilities in mobile systems, energy consumption of graphics hardware is becoming a major design concern in addition to the traditional performance enhancement criteria. Our study of various modern games substantiates the observation that the workload of games varies significantly with time and hence can benefit from dynamic voltage and frequency scaling (DVFS). Since visual quality of graphics applications is highly dependent on the rate at which frames are processed, it is important to devise a DVFS scheme that minimizes deadline misses due to inaccuracies in workload prediction. In this paper, we demonstrate that tiled-graphics renderers exhibit substantial advantages over immediate-mode renderers in obtaining access to frame parameters that help in enhancing the workload estimation accuracy. We also show that, operating at a finer granularity of “tiles” as opposed to “frames” allows early detection and corrective action in case of a mis-prediction. We propose an accurate workload estimation technique and two DVFS schemes: (i) tile-history based DVFS and (ii) tile-rank based DVFS for tiled-rendering architectures. The proposed schemes are demonstrated to be more efficient in terms of power and performance than the frame level DVFS schemes proposed in recent literature. With a system with 8 DVFS levels, our tile-history based DVFS scheme results in 60% improvement in quality (deadline misses) over the frame history based DVFS schemes and gives 58% saving in energy. The more sophisticated tile-rank based scheme achieves 75% improvement in quality over the frame history based DVFS scheme and results in 58% saving in energy. We have also compared the efficiency of the proposed tile-level DVFS schemes with frame-level schemes for different number of DVFS levels, and found that while the frame-level schemes suffer from increasing deadline misses as the frequency levels increase, the impact on tile-level schemes is negligible. The Energy per Frame-rate for our scheme is the minimum, indicating that it delivers the best performance-energy results.", "abstracts": [ { "abstractType": "Regular", "content": "With increasing interest in sophisticated graphics capabilities in mobile systems, energy consumption of graphics hardware is becoming a major design concern in addition to the traditional performance enhancement criteria. Our study of various modern games substantiates the observation that the workload of games varies significantly with time and hence can benefit from dynamic voltage and frequency scaling (DVFS). Since visual quality of graphics applications is highly dependent on the rate at which frames are processed, it is important to devise a DVFS scheme that minimizes deadline misses due to inaccuracies in workload prediction. In this paper, we demonstrate that tiled-graphics renderers exhibit substantial advantages over immediate-mode renderers in obtaining access to frame parameters that help in enhancing the workload estimation accuracy. We also show that, operating at a finer granularity of “tiles” as opposed to “frames” allows early detection and corrective action in case of a mis-prediction. We propose an accurate workload estimation technique and two DVFS schemes: (i) tile-history based DVFS and (ii) tile-rank based DVFS for tiled-rendering architectures. The proposed schemes are demonstrated to be more efficient in terms of power and performance than the frame level DVFS schemes proposed in recent literature. With a system with 8 DVFS levels, our tile-history based DVFS scheme results in 60% improvement in quality (deadline misses) over the frame history based DVFS schemes and gives 58% saving in energy. The more sophisticated tile-rank based scheme achieves 75% improvement in quality over the frame history based DVFS scheme and results in 58% saving in energy. We have also compared the efficiency of the proposed tile-level DVFS schemes with frame-level schemes for different number of DVFS levels, and found that while the frame-level schemes suffer from increasing deadline misses as the frequency levels increase, the impact on tile-level schemes is negligible. The Energy per Frame-rate for our scheme is the minimum, indicating that it delivers the best performance-energy results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With increasing interest in sophisticated graphics capabilities in mobile systems, energy consumption of graphics hardware is becoming a major design concern in addition to the traditional performance enhancement criteria. Our study of various modern games substantiates the observation that the workload of games varies significantly with time and hence can benefit from dynamic voltage and frequency scaling (DVFS). Since visual quality of graphics applications is highly dependent on the rate at which frames are processed, it is important to devise a DVFS scheme that minimizes deadline misses due to inaccuracies in workload prediction. In this paper, we demonstrate that tiled-graphics renderers exhibit substantial advantages over immediate-mode renderers in obtaining access to frame parameters that help in enhancing the workload estimation accuracy. We also show that, operating at a finer granularity of “tiles” as opposed to “frames” allows early detection and corrective action in case of a mis-prediction. We propose an accurate workload estimation technique and two DVFS schemes: (i) tile-history based DVFS and (ii) tile-rank based DVFS for tiled-rendering architectures. The proposed schemes are demonstrated to be more efficient in terms of power and performance than the frame level DVFS schemes proposed in recent literature. With a system with 8 DVFS levels, our tile-history based DVFS scheme results in 60% improvement in quality (deadline misses) over the frame history based DVFS schemes and gives 58% saving in energy. The more sophisticated tile-rank based scheme achieves 75% improvement in quality over the frame history based DVFS scheme and results in 58% saving in energy. We have also compared the efficiency of the proposed tile-level DVFS schemes with frame-level schemes for different number of DVFS levels, and found that while the frame-level schemes suffer from increasing deadline misses as the frequency levels increase, the impact on tile-level schemes is negligible. The Energy per Frame-rate for our scheme is the minimum, indicating that it delivers the best performance-energy results.", "fno": "05751521", "keywords": [ "Computer Graphic Equipment", "Coprocessors", "Power Aware Computing", "Rendering Computer Graphics", "Rank Based Dynamic Voltage Scaling", "Rank Based Dynamic Frequency Scaling", "Tiled Graphics Processors", "Workload Prediction", "Workload Estimation Technique", "DVFS Schemes", "Tile History Based DVFS", "Tile Rank Based DVFS", "Tiled Rendering Architectures", "Energy Per Frame Rate", "Graphics", "Equations", "Lead", "Computer Architecture", "Graphics Processing Unit", "Graphics Processor", "Dynamic Voltage And Frequency Scaling", "Low Power", "Workload Prediction" ], "authors": [ { "affiliation": "Dept. of CSE, IIT Delhi, New Delhi, India", "fullName": "B.V.N. Silpa", "givenName": "B.V.N.", "surname": "Silpa", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of CSE, IIT Delhi, New Delhi, India", "fullName": "Gummidipudi Krishnaiah", "givenName": "Gummidipudi", "surname": "Krishnaiah", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of CSE, IIT Delhi, New Delhi, India", "fullName": "Preeti Ranjan Panda", "givenName": "Preeti Ranjan", "surname": "Panda", "__typename": "ArticleAuthorType" } ], "idPrefix": "codes-isss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "3-12", "year": "2010", "issn": null, "isbn": "978-1-6055-8905-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05751502", "articleId": "12OmNBUS75d", "__typename": "AdjacentArticleType" }, "next": { "fno": "05751493", "articleId": "12OmNAoUTaS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccd/2017/2254/0/2254a513", "title": "Quality of Service-Aware Dynamic Voltage and Frequency Scaling for Mobile 3D Graphics Applications", "doi": null, "abstractUrl": "/proceedings-article/iccd/2017/2254a513/12OmNBhpS1Y", "parentPublication": { "id": "proceedings/iccd/2017/2254/0", "title": "2017 IEEE 35th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167613", "title": "Frame-based dynamic voltage and frequency scaling for a MPEG decoder", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167613/12OmNrJROYo", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/islped/2009/8684/0/86840207", "title": "Integrating dynamic voltage/frequency scaling and adaptive body biasing using test-time voltage selection", "doi": null, "abstractUrl": "/proceedings-article/islped/2009/86840207/12OmNwdL7qk", "parentPublication": { "id": "proceedings/islped/2009/8684/0", "title": "Low Power Electronics and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2009/2932/0/04798265", "title": "Variation-aware dynamic voltage/frequency scaling", "doi": null, "abstractUrl": "/proceedings-article/hpca/2009/04798265/12OmNx4gUjS", "parentPublication": { "id": "proceedings/hpca/2009/2932/0", "title": "2009 IEEE 15th International Symposium on High Performance Computer Architecture", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2004/2501/0/25010544", "title": "Off-Chip Latency-Driven Dynamic Voltage and Frequency Scaling for an MPEG Decoding", "doi": null, "abstractUrl": "/proceedings-article/dac/2004/25010544/12OmNxGSlZC", "parentPublication": { "id": "proceedings/dac/2004/2501/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2006/1/1/01656933", "title": "Power Analysis of Mobile 3D Graphics", "doi": null, "abstractUrl": "/proceedings-article/date/2006/01656933/12OmNxGja3q", "parentPublication": { "id": "proceedings/date/2006/1/1", "title": "2006 Design, Automation and Test in Europe", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2013/5117/0/5117a826", "title": "Effects of Dynamic Voltage and Frequency Scaling on a K20 GPU", "doi": null, "abstractUrl": "/proceedings-article/icpp/2013/5117a826/12OmNyFU74p", "parentPublication": { "id": "proceedings/icpp/2013/5117/0", "title": "2013 42nd International Conference on Parallel Processing (ICPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2015/01/06808482", "title": "Quality of Service-Aware Dynamic Voltage and Frequency Scaling for Embedded GPUs", "doi": null, "abstractUrl": "/journal/ca/2015/01/06808482/13rRUwbJCYN", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2012/09/ttc2012091256", "title": "Application-Support Particle Filter for Dynamic Voltage Scaling of Multimedia Applications", "doi": null, "abstractUrl": "/journal/tc/2012/09/ttc2012091256/13rRUxYrbTS", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09449973", "title": "Omega-Test: A Predictive Early-Z Culling to Improve the Graphics Pipeline Energy-Efficiency", "doi": null, "abstractUrl": "/journal/tg/2022/12/09449973/1uiiQsEsi6A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aT", "title": "2014 IEEE 22nd International Requirements Engineering Conference (RE)", "acronym": "re", "groupId": "1000630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzICEVd", "doi": "10.1109/RE.2014.6912245", "title": "Supporting early decision-making in the presence of uncertainty", "normalizedTitle": "Supporting early decision-making in the presence of uncertainty", "abstract": "Requirements Engineering (RE) involves eliciting, understanding, and capturing system requirements, which naturally involves much uncertainty. During RE, analysts choose among alternative requirements, gradually narrowing down the system scope, and it is unlikely that all requirements uncertainties can be resolved before such decisions are made. There is a need for methods to support early requirements decision-making in the presence of uncertainty. We address this need by describing a novel technique for early decision-making and tradeoff analysis using goal models with uncertainty. The technique analyzes goal satisfaction over sets of models that can result from resolving uncertainty. Users make choices over possible analysis results, allowing our tool to find critical uncertainty reductions which must be resolved. An iterative methodology guides the resolution of uncertainties necessary to achieve desired levels of goal satisfaction, supporting trade-off analysis in the presence of uncertainty.", "abstracts": [ { "abstractType": "Regular", "content": "Requirements Engineering (RE) involves eliciting, understanding, and capturing system requirements, which naturally involves much uncertainty. During RE, analysts choose among alternative requirements, gradually narrowing down the system scope, and it is unlikely that all requirements uncertainties can be resolved before such decisions are made. There is a need for methods to support early requirements decision-making in the presence of uncertainty. We address this need by describing a novel technique for early decision-making and tradeoff analysis using goal models with uncertainty. The technique analyzes goal satisfaction over sets of models that can result from resolving uncertainty. Users make choices over possible analysis results, allowing our tool to find critical uncertainty reductions which must be resolved. An iterative methodology guides the resolution of uncertainties necessary to achieve desired levels of goal satisfaction, supporting trade-off analysis in the presence of uncertainty.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Requirements Engineering (RE) involves eliciting, understanding, and capturing system requirements, which naturally involves much uncertainty. During RE, analysts choose among alternative requirements, gradually narrowing down the system scope, and it is unlikely that all requirements uncertainties can be resolved before such decisions are made. There is a need for methods to support early requirements decision-making in the presence of uncertainty. We address this need by describing a novel technique for early decision-making and tradeoff analysis using goal models with uncertainty. The technique analyzes goal satisfaction over sets of models that can result from resolving uncertainty. Users make choices over possible analysis results, allowing our tool to find critical uncertainty reductions which must be resolved. An iterative methodology guides the resolution of uncertainties necessary to achieve desired levels of goal satisfaction, supporting trade-off analysis in the presence of uncertainty.", "fno": "06912245", "keywords": [ "Uncertainty", "Analytical Models", "Decision Making", "Schedules", "Cognition", "Concrete", "Computer Science" ], "authors": [ { "affiliation": "Department of Information Engineering and Computer Science, University of Trento, Italy", "fullName": "Jennifer Horkoff", "givenName": "Jennifer", "surname": "Horkoff", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Toronto, Canada", "fullName": "Rick Salay", "givenName": "Rick", "surname": "Salay", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Toronto, Canada", "fullName": "Marsha Chechik", "givenName": "Marsha", "surname": "Chechik", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Toronto, Canada", "fullName": "Alessio Di Sandro", "givenName": "Alessio", "surname": "Di Sandro", "__typename": "ArticleAuthorType" } ], "idPrefix": "re", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "33-42", "year": "2014", "issn": null, "isbn": "978-1-4799-3031-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06912244", "articleId": "12OmNviHKnc", "__typename": "AdjacentArticleType" }, "next": { "fno": "06912246", "articleId": "12OmNC3Xhzr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2014/5880/0/07051884", "title": "Uncertainty reasoning for the \"big data\" semantic web", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051884/12OmNBp52DY", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a244", "title": "Dynamic SPL and Derivative Development with Uncertainty Management for DevOps", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a244/12OmNrJRP5t", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2008/3435/1/3435a195", "title": "A Research to Uncertainty in Reverse Logistics Decision Making", "doi": null, "abstractUrl": "/proceedings-article/iciii/2008/3435a195/12OmNvA1heN", "parentPublication": { "id": "proceedings/iciii/2008/3435/1", "title": "2008 International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2015/7055/0/7055a007", "title": "Modularity for Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/mise/2015/7055a007/12OmNxG1yWW", "parentPublication": { "id": "proceedings/mise/2015/7055/0", "title": "2015 IEEE/ACM 7th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1990/2107/0/00151325", "title": "Information, uncertainty and intelligence (hard logic to soft (fuzzy) logic)", "doi": null, "abstractUrl": "/proceedings-article/isuma/1990/00151325/12OmNyGKUmC", "parentPublication": { "id": "proceedings/isuma/1990/2107/0", "title": "Proceedings First International Symposium on Uncertainty Modeling and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2017/3191/0/3191a538", "title": "Towards an Adaptive Framework for Goal-Oriented Strategic Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/re/2017/3191a538/12OmNymjMYe", "parentPublication": { "id": "proceedings/re/2017/3191/0", "title": "2017 IEEE 25th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2018/7447/0/744701a098", "title": "A Process of Uncertainty Handling Method to Smart Mobility Application Development", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2018/744701a098/19m3CRDFmh2", "parentPublication": { "id": "proceedings/iiai-aai/2018/7447/0", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a886", "title": "Fair Decision-making Under Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a886/1AqxlJEDx4s", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cogmi/2020/4144/0/414400a109", "title": "Causality and Uncertainty of Information for Content Understanding", "doi": null, "abstractUrl": "/proceedings-article/cogmi/2020/414400a109/1qyxR7c0BEs", "parentPublication": { "id": "proceedings/cogmi/2020/4144/0", "title": "2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a450", "title": "Pri-AwaRE: Tool Support for priority-aware decision-making under uncertainty", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a450/1yDjO0fAyf6", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrY3LnR", "title": "COMPCON Spring '91", "acronym": "cmpcon", "groupId": "1000109", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqdr8S", "doi": "10.1109/CMPCON.1991.128832", "title": "JPEG/sup ++/: selective compression for high quality color desktop publishing", "normalizedTitle": "JPEG/sup ++/: selective compression for high quality color desktop publishing", "abstract": "The JPEG (Joint Photographic Experts Group) algorithm is the international standard for still image compression and has already been implemented in some video display systems and color scanners. An extension to JPEG, known as JPEG/sup ++/, allows a far greater range of compression and quality options for graphics users. To complete the implementation of compression in the graphics production chain, JPEG will be implemented in color printers. The authors provide an overview of the JPEG compression standard and the JPEG/sup ++/ extension and discuss their application to high-quality color desktop publishing.<>", "abstracts": [ { "abstractType": "Regular", "content": "The JPEG (Joint Photographic Experts Group) algorithm is the international standard for still image compression and has already been implemented in some video display systems and color scanners. An extension to JPEG, known as JPEG/sup ++/, allows a far greater range of compression and quality options for graphics users. To complete the implementation of compression in the graphics production chain, JPEG will be implemented in color printers. The authors provide an overview of the JPEG compression standard and the JPEG/sup ++/ extension and discuss their application to high-quality color desktop publishing.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The JPEG (Joint Photographic Experts Group) algorithm is the international standard for still image compression and has already been implemented in some video display systems and color scanners. An extension to JPEG, known as JPEG/sup ++/, allows a far greater range of compression and quality options for graphics users. To complete the implementation of compression in the graphics production chain, JPEG will be implemented in color printers. The authors provide an overview of the JPEG compression standard and the JPEG/sup ++/ extension and discuss their application to high-quality color desktop publishing.", "fno": "00128832", "keywords": [ "Computerised Picture Processing", "Data Compression", "Desktop Publishing", "Multimedia Systems", "Standards", "JPEG Sup", "Selective Compression", "High Quality Color Desktop Publishing", "Joint Photographic Experts Group", "International Standard", "Still Image Compression", "Video Display Systems", "Graphics Users", "Color Printers", "Transform Coding", "Desktop Publishing", "Image Coding", "Printers", "Workstations", "Production", "Graphics", "Image Quality", "Data Compression", "Color" ], "authors": [ { "affiliation": "Storm Technol. Inc., Palo Alto, CA, USA", "fullName": "A. Ligtenberg", "givenName": "A.", "surname": "Ligtenberg", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmpcon", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "349,350,351,352,353", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00128831", "articleId": "12OmNB7tUrG", "__typename": "AdjacentArticleType" }, "next": { "fno": "00128833", "articleId": "12OmNzWfp7l", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cmpcon/1991/2134/0/00128824", "title": "The C-cube CL550-JPEG image compression processor", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1991/00128824/12OmNvqEvKO", "parentPublication": { "id": "proceedings/cmpcon/1991/2134/0", "title": "COMPCON Spring '91", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a129", "title": "An Approach for Color Image Compression of JPEG and PNG Images Using DCT and DWT", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a129/12OmNx76TRB", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2013/0602/0/06579333", "title": "Fast JPEG Color Space Conversion on Shared Memory", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579333/12OmNxIzWNt", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmcs/1994/5530/0/00292506", "title": "Variable compression using JPEG", "doi": null, "abstractUrl": "/proceedings-article/mmcs/1994/00292506/12OmNzdoMEw", "parentPublication": { "id": "proceedings/mmcs/1994/5530/0", "title": "Proceedings of IEEE International Conference on Multimedia Computing and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2018/03/man2018030003", "title": "Desktop Publishing: Laying the Foundation", "doi": null, "abstractUrl": "/magazine/an/2018/03/man2018030003/14Fq0WHpPiO", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2018/04/08506443", "title": "Publishing a Computer Graphics Book With Prototype Desktop Publishing Tools", "doi": null, "abstractUrl": "/magazine/an/2018/04/08506443/17D45Xh13tX", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200o4499", "title": "Embedding Novel Views in a Single JPEG Image", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200o4499/1BmEXbEvpjq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2020/01/09031988", "title": "Desktop Publishing, Part 3", "doi": null, "abstractUrl": "/magazine/an/2020/01/09031988/1i6VjiDJ53G", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2020/6547/0/654700a106", "title": "A Fast JPEG Image Compression Algorithm Based on DCT", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2020/654700a106/1p6f4jWKG8o", "parentPublication": { "id": "proceedings/smartcloud/2020/6547/0", "title": "2020 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvoWV1b", "title": "Proceedings of IEEE Data Compression Conference (DCC'94)", "acronym": "dcc", "groupId": "1000177", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNCdBDZy", "doi": "10.1109/DCC.1994.305923", "title": "Customized JPEG compression for grayscale printing", "normalizedTitle": "Customized JPEG compression for grayscale printing", "abstract": "Describes a procedure by which JPEG compression may be customized for grayscale images that are to be compressed, halftoned, and printed. The technique maintains 100% compatibility with the JPEG standard, and is applicable with any halftoning algorithm. The JPEG quantization table is designed using frequency-domain characteristics of the halftoning patterns and the human visual system, and the Huffman tables are optimized for low-rate coding. The authors present experimental results demonstrating that the customized JPEG encoder offers a significant performance advantage over a coder that uses the default quantization and Huffman tables. The results also show that the customized encoder typically achieves rates in the range 0.13-0.25 bits per pixel (image dependent) with practically no visible compression artifacts in the printed images.<>", "abstracts": [ { "abstractType": "Regular", "content": "Describes a procedure by which JPEG compression may be customized for grayscale images that are to be compressed, halftoned, and printed. The technique maintains 100% compatibility with the JPEG standard, and is applicable with any halftoning algorithm. The JPEG quantization table is designed using frequency-domain characteristics of the halftoning patterns and the human visual system, and the Huffman tables are optimized for low-rate coding. The authors present experimental results demonstrating that the customized JPEG encoder offers a significant performance advantage over a coder that uses the default quantization and Huffman tables. The results also show that the customized encoder typically achieves rates in the range 0.13-0.25 bits per pixel (image dependent) with practically no visible compression artifacts in the printed images.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Describes a procedure by which JPEG compression may be customized for grayscale images that are to be compressed, halftoned, and printed. The technique maintains 100% compatibility with the JPEG standard, and is applicable with any halftoning algorithm. The JPEG quantization table is designed using frequency-domain characteristics of the halftoning patterns and the human visual system, and the Huffman tables are optimized for low-rate coding. The authors present experimental results demonstrating that the customized JPEG encoder offers a significant performance advantage over a coder that uses the default quantization and Huffman tables. The results also show that the customized encoder typically achieves rates in the range 0.13-0.25 bits per pixel (image dependent) with practically no visible compression artifacts in the printed images.", "fno": "00305923", "keywords": [ "Data Compression", "Image Coding", "Printing", "Customized JPEG Compression", "Grayscale Printing", "Grayscale Images", "JPEG Standard", "Halftoning Algorithm", "JPEG Quantization Table", "Frequency Domain Characteristics", "Human Visual System", "Huffman Tables", "Halftoning Patterns", "Low Rate Coding", "Performance", "Encoder", "Compression Artifacts", "Printed Images", "Transform Coding", "Gray Scale", "Printing", "Image Coding", "Quantization", "Humans", "Frequency", "Visual System", "Pixel", "Clustering Algorithms" ], "authors": [ { "affiliation": "Hewlett-Packard Co., Palo Alto, CA, USA", "fullName": "R.A. Vander Kam", "givenName": "R.A.", "surname": "Vander Kam", "__typename": "ArticleAuthorType" }, { "affiliation": "Hewlett-Packard Co., Palo Alto, CA, USA", "fullName": "P.W. Wong", "givenName": "P.W.", "surname": "Wong", "__typename": "ArticleAuthorType" } ], "idPrefix": "dcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "156,157,158,159,160,161,162,163,164,165", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00305922", "articleId": "12OmNxXl5BI", "__typename": "AdjacentArticleType" }, "next": { "fno": "00305924", "articleId": "12OmNvT2pf5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icip/1995/7310/2/73102331", "title": "Screen design for printing", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73102331/12OmNBh8gSC", "parentPublication": { "id": "proceedings/icip/1995/7310/2", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1992/2717/0/00227464", "title": "On the JPEG model for lossless image compression", "doi": null, "abstractUrl": "/proceedings-article/dcc/1992/00227464/12OmNvIxeZM", "parentPublication": { "id": "proceedings/dcc/1992/2717/0", "title": "1992 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1991/2134/0/00128824", "title": "The C-cube CL550-JPEG image compression processor", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1991/00128824/12OmNvqEvKO", "parentPublication": { "id": "proceedings/cmpcon/1991/2134/0", "title": "COMPCON Spring '91", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvisp/2017/0612/0/0612a022", "title": "Fast Compressed Domain JPEG Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2017/0612a022/12OmNxGAKX5", "parentPublication": { "id": "proceedings/icvisp/2017/0612/0", "title": "2017 International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1995/7012/0/00515600", "title": "Making the Best of JPEG at Very High Compression Ratios: Rectangular Pixel Averaging for Mars PathFinder", "doi": null, "abstractUrl": "/proceedings-article/dcc/1995/00515600/12OmNyUFfM8", "parentPublication": { "id": "proceedings/dcc/1995/7012/0", "title": "Proceedings DCC '95 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1991/9202/0/00213331", "title": "Effect of coefficient coding on JPEG baseline image compression", "doi": null, "abstractUrl": "/proceedings-article/dcc/1991/00213331/12OmNynJMVM", "parentPublication": { "id": "proceedings/dcc/1991/9202/0", "title": "1991 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/act/2009/3915/0/05376830", "title": "M-ary QIM Data Hiding for Error Concealment of Digital Image in JPEG Pipeline", "doi": null, "abstractUrl": "/proceedings-article/act/2009/05376830/13bd1gQYgEb", "parentPublication": { "id": "proceedings/act/2009/3915/0", "title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2020/5803/0/09114817", "title": "High-Throughput Convolutional Neural Network on an FPGA by Customized JPEG Compression", "doi": null, "abstractUrl": "/proceedings-article/fccm/2020/09114817/1kzGc6uwE9i", "parentPublication": { "id": "proceedings/fccm/2020/5803/0", "title": "2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2020/6547/0/654700a106", "title": "A Fast JPEG Image Compression Algorithm Based on DCT", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2020/654700a106/1p6f4jWKG8o", "parentPublication": { "id": "proceedings/smartcloud/2020/6547/0", "title": "2020 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrY3LnR", "title": "COMPCON Spring '91", "acronym": "cmpcon", "groupId": "1000109", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNvqEvKO", "doi": "10.1109/CMPCON.1991.128824", "title": "The C-cube CL550-JPEG image compression processor", "normalizedTitle": "The C-cube CL550-JPEG image compression processor", "abstract": "The CL550 provides a single-chip real-time solution for image compression and decompression applications. It implements the baseline ISO/CCITT Joint Photographic Experts Group (JPEG) proposed international standard for image compression and decompression. The CL550 is designed for applications that manipulate high-quality digital pictures and motion sequences. The CL550 can encode and decode gray-scale and color images at video rates. The compression ratio is controlled by on-chip quantization tables. Images can be compressed from 8:1 to 100:1 depending on the quality, storage, and bandwidth requirements of each application.<>", "abstracts": [ { "abstractType": "Regular", "content": "The CL550 provides a single-chip real-time solution for image compression and decompression applications. It implements the baseline ISO/CCITT Joint Photographic Experts Group (JPEG) proposed international standard for image compression and decompression. The CL550 is designed for applications that manipulate high-quality digital pictures and motion sequences. The CL550 can encode and decode gray-scale and color images at video rates. The compression ratio is controlled by on-chip quantization tables. Images can be compressed from 8:1 to 100:1 depending on the quality, storage, and bandwidth requirements of each application.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The CL550 provides a single-chip real-time solution for image compression and decompression applications. It implements the baseline ISO/CCITT Joint Photographic Experts Group (JPEG) proposed international standard for image compression and decompression. The CL550 is designed for applications that manipulate high-quality digital pictures and motion sequences. The CL550 can encode and decode gray-scale and color images at video rates. The compression ratio is controlled by on-chip quantization tables. Images can be compressed from 8:1 to 100:1 depending on the quality, storage, and bandwidth requirements of each application.", "fno": "00128824", "keywords": [ "Computerised Picture Processing", "Data Compression", "Decoding", "Digital Signal Processing Chips", "Encoding", "Standards", "C Cube CL 550", "JPEG Image Compression Processor", "Single Chip Real Time Solution", "Decompression", "ISO CCITT Joint Photographic Experts Group", "Standard", "Encode", "Decode Gray Scale", "Video Rates", "On Chip Quantization Tables", "Image Coding", "ISO Standards", "Image Storage", "Transform Coding", "Decoding", "Gray Scale", "Color", "Video Compression", "Quantization", "Bandwidth" ], "authors": [ { "affiliation": null, "fullName": "S.C. Purcell", "givenName": "S.C.", "surname": "Purcell", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmpcon", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "318,319,320,321,322,323", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00128823", "articleId": "12OmNyUFfUR", "__typename": "AdjacentArticleType" }, "next": { "fno": "00128825", "articleId": "12OmNzUPpxE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cmpcon/1991/2134/0/00128832", "title": "JPEG/sup ++/: selective compression for high quality color desktop publishing", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1991/00128832/12OmNBqdr8S", "parentPublication": { "id": "proceedings/cmpcon/1991/2134/0", "title": "COMPCON Spring '91", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1994/5637/0/00305923", "title": "Customized JPEG compression for grayscale printing", "doi": null, "abstractUrl": "/proceedings-article/dcc/1994/00305923/12OmNCdBDZy", "parentPublication": { "id": "proceedings/dcc/1994/5637/0", "title": "Proceedings of IEEE Data Compression Conference (DCC'94)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcmc/1993/3540/0/00302155", "title": "A multichip module design for portable video compression systems", "doi": null, "abstractUrl": "/proceedings-article/mcmc/1993/00302155/12OmNwcUjTa", "parentPublication": { "id": "proceedings/mcmc/1993/3540/0", "title": "Proceedings of IEEE Multi-Chip Module Conference (MCMC-93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/2/00778678", "title": "JPEG 2000, the next millennium compression standard for still images", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/00778678/12OmNwx3QbT", "parentPublication": { "id": "proceedings/icmcs/1999/0253/2", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a129", "title": "An Approach for Color Image Compression of JPEG and PNG Images Using DCT and DWT", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a129/12OmNx76TRB", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1991/2134/0/00128826", "title": "A flexible chip set for intra frame video compression", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1991/00128826/12OmNxaeu2Q", "parentPublication": { "id": "proceedings/cmpcon/1991/2134/0", "title": "COMPCON Spring '91", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1991/9202/0/00213331", "title": "Effect of coefficient coding on JPEG baseline image compression", "doi": null, "abstractUrl": "/proceedings-article/dcc/1991/00213331/12OmNynJMVM", "parentPublication": { "id": "proceedings/dcc/1991/9202/0", "title": "1991 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmcs/1994/5530/0/00292506", "title": "Variable compression using JPEG", "doi": null, "abstractUrl": "/proceedings-article/mmcs/1994/00292506/12OmNzdoMEw", "parentPublication": { "id": "proceedings/mmcs/1994/5530/0", "title": "Proceedings of IEEE International Conference on Multimedia Computing and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/act/2009/3915/0/05375918", "title": "JPEG Image Compression and Transmission over Wireless Channel", "doi": null, "abstractUrl": "/proceedings-article/act/2009/05375918/13bd1sv5Ny4", "parentPublication": { "id": "proceedings/act/2009/3915/0", "title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msst/2019/3920/0/392000a065", "title": "Accelerating Relative-error Bounded Lossy Compression for HPC datasets with Precomputation-Based Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/msst/2019/392000a065/1eEUKLdkoV2", "parentPublication": { "id": "proceedings/msst/2019/3920/0", "title": "2019 35th Symposium on Mass Storage Systems and Technologies (MSST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqzcvOA", "title": "2013 International Conference on Information Science and Applications (ICISA)", "acronym": "icisa", "groupId": "1800053", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxIzWNt", "doi": "10.1109/ICISA.2013.6579333", "title": "Fast JPEG Color Space Conversion on Shared Memory", "normalizedTitle": "Fast JPEG Color Space Conversion on Shared Memory", "abstract": "With the increasing popularity of multimedia devices and applications, JPEG (Joint Photographic Experts Group) images have been being used in almost all kinds of digital devices. In JPEG compression, color space conversion has become a very important role in the image acquisition, display and the transmission of the color information. This paper experiments the performance of JPEG color space conversion on shared memory; for this purpose, we utilize OpenMP shared programming language and a RGB image is transformed into a luminance-chrominance color space such as YCbCr. The implementation results show 2 times of performance improvements on the processing speed compared with the serial implementation.", "abstracts": [ { "abstractType": "Regular", "content": "With the increasing popularity of multimedia devices and applications, JPEG (Joint Photographic Experts Group) images have been being used in almost all kinds of digital devices. In JPEG compression, color space conversion has become a very important role in the image acquisition, display and the transmission of the color information. This paper experiments the performance of JPEG color space conversion on shared memory; for this purpose, we utilize OpenMP shared programming language and a RGB image is transformed into a luminance-chrominance color space such as YCbCr. The implementation results show 2 times of performance improvements on the processing speed compared with the serial implementation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the increasing popularity of multimedia devices and applications, JPEG (Joint Photographic Experts Group) images have been being used in almost all kinds of digital devices. In JPEG compression, color space conversion has become a very important role in the image acquisition, display and the transmission of the color information. This paper experiments the performance of JPEG color space conversion on shared memory; for this purpose, we utilize OpenMP shared programming language and a RGB image is transformed into a luminance-chrominance color space such as YCbCr. The implementation results show 2 times of performance improvements on the processing speed compared with the serial implementation.", "fno": "06579333", "keywords": [ "Image Color Analysis", "Transform Coding", "Image Coding", "Instruction Sets", "Multimedia Communication", "Parallel Programming", "Performance Evaluation" ], "authors": [ { "affiliation": null, "fullName": "Cheong Ghil Kim", "givenName": "Cheong Ghil", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bong Jin Beak", "givenName": "Bong Jin", "surname": "Beak", "__typename": "ArticleAuthorType" } ], "idPrefix": "icisa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-06-01T00:00:00", "pubType": "proceedings", "pages": "1-3", "year": "2013", "issn": null, "isbn": "978-1-4799-0602-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06579329", "articleId": "12OmNArthaX", "__typename": "AdjacentArticleType" }, "next": { "fno": "06579337", "articleId": "12OmNy5zsrW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/apcc/2004/8601/2/01391792", "title": "A blind watermarking algorithm based on DWT for color image", "doi": null, "abstractUrl": "/proceedings-article/apcc/2004/01391792/12OmNAnMutf", "parentPublication": { "id": "proceedings/apcc/2004/8601/1", "title": "APCC/MDMC '04. The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceeding", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2013/3211/0/3211a026", "title": "Fast JPEG Image Retrieval Based on AC Huffman Tables", "doi": null, "abstractUrl": "/proceedings-article/sitis/2013/3211a026/12OmNBp52zc", "parentPublication": { "id": "proceedings/sitis/2013/3211/0", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1991/2134/0/00128832", "title": "JPEG/sup ++/: selective compression for high quality color desktop publishing", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1991/00128832/12OmNBqdr8S", "parentPublication": { "id": "proceedings/cmpcon/1991/2134/0", "title": "COMPCON Spring '91", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2006/2746/0/04061149", "title": "Accelerating Color Space Conversion Using Extended Subwords and the Matrix Register File", "doi": null, "abstractUrl": "/proceedings-article/ism/2006/04061149/12OmNwDACvQ", "parentPublication": { "id": "proceedings/ism/2006/2746/0", "title": "Eighth IEEE International Symposium on Multimedia (ISM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a129", "title": "An Approach for Color Image Compression of JPEG and PNG Images Using DCT and DWT", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a129/12OmNx76TRB", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2009/4830/0/05255123", "title": "Color space conversion model from CMYK to LAB based on prism", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255123/12OmNyrIax7", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2018/6568/0/08470306", "title": "REVERSIBLE COLOR-TO-GRAY MAPPING WITH RESISTANCE TO JPEG ENCODING", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2018/08470306/13WBGNAGnEB", "parentPublication": { "id": "proceedings/ssiai/2018/6568/0", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2017/02/mmu2017020096", "title": "JPEG at 25: Still Going Strong", "doi": null, "abstractUrl": "/magazine/mu/2017/02/mmu2017020096/13rRUwI5TZI", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2016/03/mmu2016030080", "title": "JPEG XT: A New Family of JPEG Backward-Compatible Standards", "doi": null, "abstractUrl": "/magazine/mu/2016/03/mmu2016030080/13rRUxASuCH", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1Bc", "title": "2015 XVII Symposium on Virtual and Augmented Reality (SVR)", "acronym": "svr", "groupId": "1800426", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxj23dM", "doi": "10.1109/SVR.2015.8", "title": "A Comparative Study of Grayscale Conversion Techniques Applied to Descriptor Based Tracking", "normalizedTitle": "A Comparative Study of Grayscale Conversion Techniques Applied to Descriptor Based Tracking", "abstract": "In computer vision, gradient-based tracking is usually performed from monochromatic inputs. However, few researches consider the influence of the chosen colorto- grayscale conversion technique. This paper evaluates the impact of these conversion algorithms on tracking and homography calculation results, both being fundamental steps of augmented reality applications. Eighteen color-togreyscale algorithms were investigated. These observations allowed to conclude that the methods can cause significant discrepancy in the overall performance. As a related finding, experiments also showed that pure color channels (R, G, B) yielded more stability and precision when compared to other approaches.", "abstracts": [ { "abstractType": "Regular", "content": "In computer vision, gradient-based tracking is usually performed from monochromatic inputs. However, few researches consider the influence of the chosen colorto- grayscale conversion technique. This paper evaluates the impact of these conversion algorithms on tracking and homography calculation results, both being fundamental steps of augmented reality applications. Eighteen color-togreyscale algorithms were investigated. These observations allowed to conclude that the methods can cause significant discrepancy in the overall performance. As a related finding, experiments also showed that pure color channels (R, G, B) yielded more stability and precision when compared to other approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In computer vision, gradient-based tracking is usually performed from monochromatic inputs. However, few researches consider the influence of the chosen colorto- grayscale conversion technique. This paper evaluates the impact of these conversion algorithms on tracking and homography calculation results, both being fundamental steps of augmented reality applications. Eighteen color-togreyscale algorithms were investigated. These observations allowed to conclude that the methods can cause significant discrepancy in the overall performance. As a related finding, experiments also showed that pure color channels (R, G, B) yielded more stability and precision when compared to other approaches.", "fno": "7204a001", "keywords": [ "Gray Scale", "Art", "Image Color Analysis", "Transform Coding", "Feature Extraction", "Cameras", "Color", "Descriptors", "Computer Vision", "Tracking", "Color To Grayscale Conversion" ], "authors": [ { "affiliation": null, "fullName": "Samuel Macedo", "givenName": "Samuel", "surname": "Macedo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Givanio Melo", "givenName": "Givanio", "surname": "Melo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Judith Kelner", "givenName": "Judith", "surname": "Kelner", "__typename": "ArticleAuthorType" } ], "idPrefix": "svr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-05-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2015", "issn": null, "isbn": "978-1-4673-7204-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7204z012", "articleId": "12OmNz61dtE", "__typename": "AdjacentArticleType" }, "next": { "fno": "7204a007", "articleId": "12OmNxwWos8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csse/2008/3336/4/3336g174", "title": "Applications of Tetrahedral Interpolation in Color Conversion Model", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336g174/12OmNAH5dmz", "parentPublication": { "id": "csse/2008/3336/4", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/3/4296e087", "title": "Research on Technology of Color Space Conversion Based on DSP48E", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296e087/12OmNAWH9ug", "parentPublication": { "id": "proceedings/icmtma/2011/4296/3", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2013/0431/0/06684096", "title": "A compact color descriptor for image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icat/2013/06684096/12OmNAYoKr2", "parentPublication": { "id": "proceedings/icat/2013/0431/0", "title": "2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2006/2746/0/04061149", "title": "Accelerating Color Space Conversion Using Extended Subwords and the Matrix Register File", "doi": null, "abstractUrl": "/proceedings-article/ism/2006/04061149/12OmNwDACvQ", "parentPublication": { "id": "proceedings/ism/2006/2746/0", "title": "Eighth IEEE International Symposium on Multimedia (ISM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2013/0602/0/06579333", "title": "Fast JPEG Color Space Conversion on Shared Memory", "doi": null, "abstractUrl": "/proceedings-article/icisa/2013/06579333/12OmNxIzWNt", "parentPublication": { "id": "proceedings/icisa/2013/0602/0", "title": "2013 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/3982/2/3982b196", "title": "Color Image to Grayscale Image Conversion", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/3982b196/12OmNzV70CO", "parentPublication": { "id": "proceedings/iccea/2010/3982/2", "title": "Computer Engineering and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204297", "title": "On conversion from color to gray-scale images for face detection", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204297/12OmNzaQo7k", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486525", "title": "Grayscale-Based Block Scrambling Image Encryption for Social Networking Services", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486525/14jQfSnkWGu", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428464", "title": "Invertible Color-to-Grayscale Conversion by Using Clustering and Reversible Watermarking", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428464/1uilC8yGacw", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBDyAb7", "title": "Proceedings International Conference on Information Technology: Coding and Computing", "acronym": "itcc", "groupId": "1000366", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNxxdZAc", "doi": "10.1109/ITCC.2001.918795", "title": "Invertible Authentication Watermark for JPEG Images", "normalizedTitle": "Invertible Authentication Watermark for JPEG Images", "abstract": "Abstract: In this paper, we present two new invertible watermarking methods for authentication of digital images in the JPEG format. While virtually all previous authentication watermarking schemes introduced some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be completely removed to obtain the original image data. The first technique is based on lossless compression of biased bit-streams derived from the quantized JPEG coefficients. The second technique modifies the quantization matrix to enable lossless embedding of one bit per DCT coefficient. Both techniques are fast and can be used for general distortion-free (invertible) data embedding. The new methods provide new information assurance tools for integrity protection of sensitive imagery, such as medical images or high-importance military images viewed under non-standard conditions when usual criteria for visibility do not apply.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: In this paper, we present two new invertible watermarking methods for authentication of digital images in the JPEG format. While virtually all previous authentication watermarking schemes introduced some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be completely removed to obtain the original image data. The first technique is based on lossless compression of biased bit-streams derived from the quantized JPEG coefficients. The second technique modifies the quantization matrix to enable lossless embedding of one bit per DCT coefficient. Both techniques are fast and can be used for general distortion-free (invertible) data embedding. The new methods provide new information assurance tools for integrity protection of sensitive imagery, such as medical images or high-importance military images viewed under non-standard conditions when usual criteria for visibility do not apply.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: In this paper, we present two new invertible watermarking methods for authentication of digital images in the JPEG format. While virtually all previous authentication watermarking schemes introduced some small amount of non-invertible distortion in the image, the new methods are invertible in the sense that, if the image is deemed authentic, the distortion due to authentication can be completely removed to obtain the original image data. The first technique is based on lossless compression of biased bit-streams derived from the quantized JPEG coefficients. The second technique modifies the quantization matrix to enable lossless embedding of one bit per DCT coefficient. Both techniques are fast and can be used for general distortion-free (invertible) data embedding. The new methods provide new information assurance tools for integrity protection of sensitive imagery, such as medical images or high-importance military images viewed under non-standard conditions when usual criteria for visibility do not apply.", "fno": "10620223", "keywords": [], "authors": [ { "affiliation": "SUNY Binghamton", "fullName": "Jiri Fridrich", "givenName": "Jiri", "surname": "Fridrich", "__typename": "ArticleAuthorType" }, { "affiliation": "SUNY Binghamton", "fullName": "Miroslav Goljan", "givenName": "Miroslav", "surname": "Goljan", "__typename": "ArticleAuthorType" }, { "affiliation": "SUNY Binghamton", "fullName": "Rui Du", "givenName": "Rui", "surname": "Du", "__typename": "ArticleAuthorType" } ], "idPrefix": "itcc", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-04-01T00:00:00", "pubType": "proceedings", "pages": "0223", "year": "2001", "issn": null, "isbn": "0-7695-1062-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10620216", "articleId": "12OmNAXPxZH", "__typename": "AdjacentArticleType" }, "next": { "fno": "10620228", "articleId": "12OmNBNM92k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "13WBGLOPCjN", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "acronym": "ssiai", "groupId": "1000345", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13WBGNAGnEB", "doi": "10.1109/SSIAI.2018.8470306", "title": "REVERSIBLE COLOR-TO-GRAY MAPPING WITH RESISTANCE TO JPEG ENCODING", "normalizedTitle": "REVERSIBLE COLOR-TO-GRAY MAPPING WITH RESISTANCE TO JPEG ENCODING", "abstract": "The use of a reversible color-to-gray algorithm is an effective technique in practical applications, in terms of running cost, data quantity, security, etc. Most conventional image processing approaches cannot apply image encoding to color- embedded gray images. In this study, we propose a reversible color-to-gray method with resistance to JPEG encoding. To embed color information, the discrete cosine transformation (DCT) is employed, with good affinity to JPEG encoding. In the proposed method, first an input color image is converted to the YCbCr color space, and the DCT coefficients of the Cb and Cr components are embedded into the DCT coefficients of the Y component. Then using the JPEG quantization table, an appropriate embedding position is determined. Experiments were performed on standard color images, and the color recovery error after JPEG coding was compared and verified with conventional methods using PSNR and CIEDE2000.", "abstracts": [ { "abstractType": "Regular", "content": "The use of a reversible color-to-gray algorithm is an effective technique in practical applications, in terms of running cost, data quantity, security, etc. Most conventional image processing approaches cannot apply image encoding to color- embedded gray images. In this study, we propose a reversible color-to-gray method with resistance to JPEG encoding. To embed color information, the discrete cosine transformation (DCT) is employed, with good affinity to JPEG encoding. In the proposed method, first an input color image is converted to the YCbCr color space, and the DCT coefficients of the Cb and Cr components are embedded into the DCT coefficients of the Y component. Then using the JPEG quantization table, an appropriate embedding position is determined. Experiments were performed on standard color images, and the color recovery error after JPEG coding was compared and verified with conventional methods using PSNR and CIEDE2000.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of a reversible color-to-gray algorithm is an effective technique in practical applications, in terms of running cost, data quantity, security, etc. Most conventional image processing approaches cannot apply image encoding to color- embedded gray images. In this study, we propose a reversible color-to-gray method with resistance to JPEG encoding. To embed color information, the discrete cosine transformation (DCT) is employed, with good affinity to JPEG encoding. In the proposed method, first an input color image is converted to the YCbCr color space, and the DCT coefficients of the Cb and Cr components are embedded into the DCT coefficients of the Y component. Then using the JPEG quantization table, an appropriate embedding position is determined. Experiments were performed on standard color images, and the color recovery error after JPEG coding was compared and verified with conventional methods using PSNR and CIEDE2000.", "fno": "08470306", "keywords": [ "Image Color Analysis", "Transform Coding", "Image Coding", "Color", "Discrete Cosine Transforms", "Spectral Analysis", "Resistance", "Color To Gray Mapping", "Image Coding", "Color Recovery", "Information Embedding" ], "authors": [ { "affiliation": "Graduate School of Engineering, Chiba University, Japan", "fullName": "Takahiko Horiuchi", "givenName": "Takahiko", "surname": "Horiuchi", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School of Engineering, Chiba University, Japan", "fullName": "Xu Wen", "givenName": "Xu", "surname": "Wen", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School of Engineering, Chiba University, Japan", "fullName": "Keita Hirai", "givenName": "Keita", "surname": "Hirai", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssiai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "13-16", "year": "2018", "issn": "2473-3598", "isbn": "978-1-5386-6568-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08470343", "articleId": "13WBGNypAG9", "__typename": "AdjacentArticleType" }, "next": { "fno": "08470336", "articleId": "13WBGNgwRq1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acssc/1997/8316/1/00680170", "title": "Computation-distortion characteristics of JPEG encoding and decoding", "doi": null, "abstractUrl": "/proceedings-article/acssc/1997/00680170/12OmNAle6x0", "parentPublication": { "id": "proceedings/acssc/1997/8316/1", "title": "Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36163)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsip/2014/5100/0/5100a131", "title": "Digital Forensic of JPEG Images", "doi": null, "abstractUrl": "/proceedings-article/icsip/2014/5100a131/12OmNAtaRX6", "parentPublication": { "id": "proceedings/icsip/2014/5100/0", "title": "2014 Fifth International Conference on Signal and Image Processing (ICSIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460842", "title": "Fast JPEG image retrieval using optimised Huffman tables", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460842/12OmNBOUxsN", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a129", "title": "An Approach for Color Image Compression of JPEG and PNG Images Using DCT and DWT", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a129/12OmNx76TRB", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/2/81832326", "title": "Text and image sharpening of scanned images in the JPEG domain", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81832326/12OmNyugyWC", "parentPublication": { "id": "proceedings/icip/1997/8183/2", "title": "Proceedings of International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a240", "title": "Based on the Characteristics of the JPEG Image Retrieval System Research", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a240/12OmNyvGykP", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a126", "title": "Effective Reversible Information Hiding Based on Block Priority of JPEG Images", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a126/1dUo4qkjttu", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2020/6547/0/654700a106", "title": "A Fast JPEG Image Compression Algorithm Based on DCT", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2020/654700a106/1p6f4jWKG8o", "parentPublication": { "id": "proceedings/smartcloud/2020/6547/0", "title": "2020 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428243", "title": "On Generating JPEG Adversarial Images", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428243/1uim0exNIHu", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "14jQfMYohco", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "14jQfSnkWGu", "doi": "10.1109/ICME.2018.8486525", "title": "Grayscale-Based Block Scrambling Image Encryption for Social Networking Services", "normalizedTitle": "Grayscale-Based Block Scrambling Image Encryption for Social Networking Services", "abstract": "This paper proposes a new block scrambling encryption scheme that enhances the security of encryption-then-compression (EtC) systems for JPEG images, which are used, for example, to securely transmit images through an untrusted channel provider. The proposed method allows the use of a smaller block size and a larger number of blocks than the conventional ones. Moreover, images encrypted using proposed scheme include less color information due to the use of grayscale even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. The results of an experiment in which encrypted images were uploaded to and then downloaded from Twitter and Facebook demonstrated the effectiveness of the proposed scheme for EtC systems.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a new block scrambling encryption scheme that enhances the security of encryption-then-compression (EtC) systems for JPEG images, which are used, for example, to securely transmit images through an untrusted channel provider. The proposed method allows the use of a smaller block size and a larger number of blocks than the conventional ones. Moreover, images encrypted using proposed scheme include less color information due to the use of grayscale even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. The results of an experiment in which encrypted images were uploaded to and then downloaded from Twitter and Facebook demonstrated the effectiveness of the proposed scheme for EtC systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a new block scrambling encryption scheme that enhances the security of encryption-then-compression (EtC) systems for JPEG images, which are used, for example, to securely transmit images through an untrusted channel provider. The proposed method allows the use of a smaller block size and a larger number of blocks than the conventional ones. Moreover, images encrypted using proposed scheme include less color information due to the use of grayscale even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. The results of an experiment in which encrypted images were uploaded to and then downloaded from Twitter and Facebook demonstrated the effectiveness of the proposed scheme for EtC systems.", "fno": "08486525", "keywords": [ "Encryption", "Image Color Analysis", "Transform Coding", "Image Coding", "Standards", "Encryption", "Et C System", "Social Media" ], "authors": [ { "affiliation": "Tokyo Metropolitan University, Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan", "fullName": "Warit Sirichotedumrong", "givenName": "Warit", "surname": "Sirichotedumrong", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Metropolitan University, Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan", "fullName": "Tatsuya Chuman", "givenName": "Tatsuya", "surname": "Chuman", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Metropolitan University, Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan", "fullName": "Shoko Imaizumi", "givenName": "Shoko", "surname": "Imaizumi", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Metropolitan University, Asahigaoka, Hino-shi, Tokyo, 191-0065, Japan", "fullName": "Hitoshi Kiya", "givenName": "Hitoshi", "surname": "Kiya", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2018", "issn": null, "isbn": "978-1-5386-1737-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08486460", "articleId": "14jQfPJPZLi", "__typename": "AdjacentArticleType" }, "next": { "fno": "08486463", "articleId": "14jQfOTBNPq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icccnt/2013/3926/0/06726546", "title": "Double image encryption using double pixel scrambling and linear canonical transform", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726546/12OmNAkniYa", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/1/4296a218", "title": "A Novel Scheme on Reality Preserving Image Encryption", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296a218/12OmNB9bvfL", "parentPublication": { "id": "proceedings/icmtma/2011/4296/1", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/4115/1/4115a277", "title": "A New Compound Chaos Encryption Algorithm for Digital Images", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/4115a277/12OmNCctfmL", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2015/6590/0/6590a417", "title": "Markov Process Based Retrieval for Encrypted JPEG Images", "doi": null, "abstractUrl": "/proceedings-article/ares/2015/6590a417/12OmNqBbI2h", "parentPublication": { "id": "proceedings/ares/2015/6590/0", "title": "2015 10th International Conference on Availability, Reliability and Security (ARES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019487", "title": "Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019487/12OmNs5rkNz", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2015/7511/0/07106192", "title": "Securing the architecture of the JPEG compression by an dynamic encryption", "doi": null, "abstractUrl": "/proceedings-article/iscv/2015/07106192/12OmNvDZF4o", "parentPublication": { "id": "proceedings/iscv/2015/7511/0", "title": "2015 Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2017/0852/0/0852a079", "title": "A Novel Selective Encryption DWT-Based Algorithm for Medical Images", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2017/0852a079/12OmNy3RRAl", "parentPublication": { "id": "proceedings/cgiv/2017/0852/0", "title": "2017 14th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2018/9497/0/949700a037", "title": "A New Image Block Encryption Method Based on Chaotic Map and DNA Encoding", "doi": null, "abstractUrl": "/proceedings-article/icdh/2018/949700a037/17D45Wuc36h", "parentPublication": { "id": "proceedings/icdh/2018/9497/0", "title": "2018 7th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956664", "title": "Utilizing CNNs for Cryptanalysis of Selective Biometric Face Sample Encryption", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956664/1IHoHeeViM0", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uiluGq0Oo8", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uilC8yGacw", "doi": "10.1109/ICME51207.2021.9428464", "title": "Invertible Color-to-Grayscale Conversion by Using Clustering and Reversible Watermarking", "normalizedTitle": "Invertible Color-to-Grayscale Conversion by Using Clustering and Reversible Watermarking", "abstract": "Invertible color-to-grayscale conversion is a method that embeds the color information into the corresponding grayscale image and extracts the color information to reconstruct the color image when necessary. In this paper, we propose an efficient method by using K-means clustering to generate a color palette and its corresponding grayscale image, and further making use of a reversible watermarking technique to embed the color palette into the grayscale image. For purpose of integrality authentication, the grayscale image is hashed as part of the embedded information before the embedding. In the process of reconstructing the color image, the color palette can be extracted correctly and the grayscale image can be recovered without any loss. Experimental results have shown that the proposed method can provide satisfactory performance.", "abstracts": [ { "abstractType": "Regular", "content": "Invertible color-to-grayscale conversion is a method that embeds the color information into the corresponding grayscale image and extracts the color information to reconstruct the color image when necessary. In this paper, we propose an efficient method by using K-means clustering to generate a color palette and its corresponding grayscale image, and further making use of a reversible watermarking technique to embed the color palette into the grayscale image. For purpose of integrality authentication, the grayscale image is hashed as part of the embedded information before the embedding. In the process of reconstructing the color image, the color palette can be extracted correctly and the grayscale image can be recovered without any loss. Experimental results have shown that the proposed method can provide satisfactory performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Invertible color-to-grayscale conversion is a method that embeds the color information into the corresponding grayscale image and extracts the color information to reconstruct the color image when necessary. In this paper, we propose an efficient method by using K-means clustering to generate a color palette and its corresponding grayscale image, and further making use of a reversible watermarking technique to embed the color palette into the grayscale image. For purpose of integrality authentication, the grayscale image is hashed as part of the embedded information before the embedding. In the process of reconstructing the color image, the color palette can be extracted correctly and the grayscale image can be recovered without any loss. Experimental results have shown that the proposed method can provide satisfactory performance.", "fno": "09428464", "keywords": [ "Authorisation", "Cryptography", "Image Coding", "Image Colour Analysis", "Image Reconstruction", "Image Watermarking", "Pattern Clustering", "Embedded Information", "Integrality Authentication", "Grayscale Image", "K Means Clustering", "Color Image Reconstruction", "Reversible Watermarking", "Color Palette", "Color Information", "Invertible Color To Grayscale Conversion", "Image Color Analysis", "Conferences", "Clustering Algorithms", "Watermarking", "Color", "Gray Scale", "Classification Algorithms", "Invertible Color To Grayscale Conversion", "K Means Clustering", "Reversible Watermarking" ], "authors": [ { "affiliation": "Jinan University,School of Information Science and Technology/School of Cyber Security,Guangzhou,China", "fullName": "Qiaoyi Liang", "givenName": "Qiaoyi", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Jinan University,School of Information Science and Technology/School of Cyber Security,Guangzhou,China", "fullName": "Runwen Hu", "givenName": "Runwen", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Jinan University,School of Information Science and Technology/School of Cyber Security,Guangzhou,China", "fullName": "Shijun Xiang", "givenName": "Shijun", "surname": "Xiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-3864-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09428446", "articleId": "1uilxny3DHi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09428102", "articleId": "1uim3qTIR6E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicic/2008/3161/0/31610024", "title": "Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement", "doi": null, "abstractUrl": "/proceedings-article/icicic/2008/31610024/12OmNAqU4T6", "parentPublication": { "id": "proceedings/icicic/2008/3161/0", "title": "Innovative Computing ,Information and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/06963147", "title": "Enhanced digital watermarking scheme using fractal images in wavelets", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/06963147/12OmNButq55", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2015/7204/0/7204a001", "title": "A Comparative Study of Grayscale Conversion Techniques Applied to Descriptor Based Tracking", "doi": null, "abstractUrl": "/proceedings-article/svr/2015/7204a001/12OmNxj23dM", "parentPublication": { "id": "proceedings/svr/2015/7204/0", "title": "2015 XVII Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607407", "title": "Optimizing the capacity of distortion-freewatermarking on palette images", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607407/12OmNyfdON5", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/psivt/2010/4285/0/4285a337", "title": "Color to Gray: Attention Preservation", "doi": null, "abstractUrl": "/proceedings-article/psivt/2010/4285a337/12OmNylKAU1", "parentPublication": { "id": "proceedings/psivt/2010/4285/0", "title": "Image and Video Technology, Pacific-Rim Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/3982/2/3982b196", "title": "Color Image to Grayscale Image Conversion", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/3982b196/12OmNzV70CO", "parentPublication": { "id": "proceedings/iccea/2010/3982/2", "title": "Computer Engineering and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icetet/2008/3267/0/3267a082", "title": "Color Traits Transfer to Grayscale Images", "doi": null, "abstractUrl": "/proceedings-article/icetet/2008/3267a082/12OmNzVXNUY", "parentPublication": { "id": "proceedings/icetet/2008/3267/0", "title": "Emerging Trends in Engineering & Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a459", "title": "Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a459/1AUpDiKk0Io", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeae/2018/9190/0/919100a003", "title": "Security Enhancement for Color Images via Invisible Watermarking and Reversible Data Hiding in Encrypted Domain", "doi": null, "abstractUrl": "/proceedings-article/icmeae/2018/919100a003/1b65T1cZRKg", "parentPublication": { "id": "proceedings/icmeae/2018/9190/0", "title": "2018 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453114", "title": "JPEG Robust Invertible Grayscale", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453114/1ulCAbr1xpC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCeaPZB", "title": "Proceedings of 1st International Conference on Image Processing", "acronym": "icip", "groupId": "1000349", "volume": "1", "displayVolume": "1", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNAq3hM1", "doi": "10.1109/ICIP.1994.413269", "title": "Total variation based image restoration with free local constraints", "normalizedTitle": "Total variation based image restoration with free local constraints", "abstract": "A new total variation based approach was developed by Rudin, Osher and Fatemi (see Physica D., vol.60, p.259, 1992) to overcome the basic limitations of all smooth regularization algorithms. The TV-based technique use the L/sup 1/ norm of the magnitude of a gradient, thus making discontinuous and nonsmooth solutions possible. In TV image restoration, the solution is obtained by solving a time-dependent, nonlinear PDE on a manifold that satisfies the degradation constraints. In practical applications, one assumes a space-varying blurring kernel and signal-dependent (e.g. multiplicative) noise. The evolution part of the TV-based PDE turned out to be related to the curve shortening equation, but scaled by an inverse.<>", "abstracts": [ { "abstractType": "Regular", "content": "A new total variation based approach was developed by Rudin, Osher and Fatemi (see Physica D., vol.60, p.259, 1992) to overcome the basic limitations of all smooth regularization algorithms. The TV-based technique use the L/sup 1/ norm of the magnitude of a gradient, thus making discontinuous and nonsmooth solutions possible. In TV image restoration, the solution is obtained by solving a time-dependent, nonlinear PDE on a manifold that satisfies the degradation constraints. In practical applications, one assumes a space-varying blurring kernel and signal-dependent (e.g. multiplicative) noise. The evolution part of the TV-based PDE turned out to be related to the curve shortening equation, but scaled by an inverse.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new total variation based approach was developed by Rudin, Osher and Fatemi (see Physica D., vol.60, p.259, 1992) to overcome the basic limitations of all smooth regularization algorithms. The TV-based technique use the L/sup 1/ norm of the magnitude of a gradient, thus making discontinuous and nonsmooth solutions possible. In TV image restoration, the solution is obtained by solving a time-dependent, nonlinear PDE on a manifold that satisfies the degradation constraints. In practical applications, one assumes a space-varying blurring kernel and signal-dependent (e.g. multiplicative) noise. The evolution part of the TV-based PDE turned out to be related to the curve shortening equation, but scaled by an inverse.", "fno": "00413269", "keywords": [ "Image Restoration", "Video Signal Processing", "Smoothing Methods", "Partial Differential Equations", "Oscillations", "Image Restoration", "Free Local Constraints", "Total Variation", "Smooth Regularization Algorithms", "TV Based Technique", "L Sup 1 Norm", "Gradient", "Nonsmooth Solutions", "Discontinuous Solutions", "TV Image Restoration", "Time Dependent Nonlinear PDE", "Space Varying Blurring Kernel", "Signal Dependent Noise", "Multiplicative Noise", "Curve Shortening Equation", "Degradation Constraints", "Singular Information", "Mean Curvature Evolution", "Linear Dissipation", "Image Intensity", "Feature Curves", "Feature Regions", "Image Restoration", "Level Set", "TV", "Degradation", "Smoothing Methods", "Nonlinear Distortion", "Kernel", "Nonlinear Equations", "Signal Restoration", "Linearity" ], "authors": [ { "affiliation": "Cognitech Inc., Santa Monica, CA, USA", "fullName": "L.I. Rudin", "givenName": "L.I.", "surname": "Rudin", "__typename": "ArticleAuthorType" }, { "affiliation": "Cognitech Inc., Santa Monica, CA, USA", "fullName": "S. Osher", "givenName": "S.", "surname": "Osher", "__typename": "ArticleAuthorType" } ], "idPrefix": "icip", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "31,32,33,34,35", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00413268", "articleId": "12OmNxEjY0h", "__typename": "AdjacentArticleType" }, "next": { "fno": "00413270", "articleId": "12OmNqIhG4l", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmete/2016/3411/0/07938926", "title": "Using High Order Total Variation for Denoising Speckle, Gaussian, Salt & Pepper", "doi": null, "abstractUrl": "/proceedings-article/icmete/2016/07938926/12OmNqI04Zs", "parentPublication": { "id": "proceedings/icmete/2016/3411/0", "title": "2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2014/7434/0/7434a736", "title": "Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a736/12OmNwp74Lb", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019463", "title": "Image restoration via multi-scale non-local total variation regularization", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019463/12OmNyqRn7G", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298819", "title": "Total variation regularization of shape signals", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298819/12OmNyuy9Sp", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a258", "title": "Image Restoration Using IIST Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a258/12OmNz2TCE7", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2002/7402/4/05745420", "title": "A multiplicative weighted L2-norm total variation regularization for deblurring algorithms", "doi": null, "abstractUrl": "/proceedings-article/icassp/2002/05745420/12OmNz2TCKf", "parentPublication": { "id": "proceedings/icassp/2002/7402/4", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmai/2008/3270/0/3270a098", "title": "Chapter 16: Image Restoration by Non-standard Diffusion", "doi": null, "abstractUrl": "/proceedings-article/gmai/2008/3270a098/12OmNzxyiH2", "parentPublication": { "id": "proceedings/gmai/2008/3270/0", "title": "Geometric Modeling and Imaging--New Trends", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a701", "title": "Total Variation Optimization Layers for Computer Vision", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a701/1H1m2jH9DbO", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a318", "title": "Image Deblurring Based on Normalized-weighted Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a318/1KYtaF1gUzS", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453151", "title": "Mesh Total Generalized Variation for Denoising", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453151/1ulCADl6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvSbBsv", "title": "2009 Second International Symposium on Information Science and Engineering", "acronym": "isise", "groupId": "1002561", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBpVQ4H", "doi": "10.1109/ISISE.2009.118", "title": "A Three Dimensional Mesh Improvement Algorithm Based on Curvature Flow", "normalizedTitle": "A Three Dimensional Mesh Improvement Algorithm Based on Curvature Flow", "abstract": "In order to suppress undesirable noises in triangular meshes for quality improvement, an effective smoothing method based on curvature flow is proposed in this paper. For triangular meshes generated from planar contours, the continuity information amongst adjacent contours is utilized to determine whether a vertex represents a geometric feature to preserve or an isolated noise to smooth. Before smoothing the original mesh with an isotropic diffusion process, local adaptive refinement is performed where the sharp features are detected. In doing so, the smoothing method has both the benefits of the isotropic diffusion method, simplicity and stability, and that of the anisotropic diffusion method, feature preserving. The presented method is implemented along with several other smoothing methods, and experiments that smooth triangular meshes reconstructed from contours are performed. Experimental results demonstrate that our method can smooth triangular meshes in an effective way.", "abstracts": [ { "abstractType": "Regular", "content": "In order to suppress undesirable noises in triangular meshes for quality improvement, an effective smoothing method based on curvature flow is proposed in this paper. For triangular meshes generated from planar contours, the continuity information amongst adjacent contours is utilized to determine whether a vertex represents a geometric feature to preserve or an isolated noise to smooth. Before smoothing the original mesh with an isotropic diffusion process, local adaptive refinement is performed where the sharp features are detected. In doing so, the smoothing method has both the benefits of the isotropic diffusion method, simplicity and stability, and that of the anisotropic diffusion method, feature preserving. The presented method is implemented along with several other smoothing methods, and experiments that smooth triangular meshes reconstructed from contours are performed. Experimental results demonstrate that our method can smooth triangular meshes in an effective way.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to suppress undesirable noises in triangular meshes for quality improvement, an effective smoothing method based on curvature flow is proposed in this paper. For triangular meshes generated from planar contours, the continuity information amongst adjacent contours is utilized to determine whether a vertex represents a geometric feature to preserve or an isolated noise to smooth. Before smoothing the original mesh with an isotropic diffusion process, local adaptive refinement is performed where the sharp features are detected. In doing so, the smoothing method has both the benefits of the isotropic diffusion method, simplicity and stability, and that of the anisotropic diffusion method, feature preserving. The presented method is implemented along with several other smoothing methods, and experiments that smooth triangular meshes reconstructed from contours are performed. Experimental results demonstrate that our method can smooth triangular meshes in an effective way.", "fno": "05447224", "keywords": [ "Mesh Generation", "Smoothing Methods", "Three Dimensional Mesh Improvement Algorithm", "Curvature Flow", "Triangular Meshes", "Planar Contours", "Isotropic Diffusion Process", "Local Adaptive Refinement", "Anisotropic Diffusion Method", "Smoothing Method", "Undesirable Noise Suppression", "Smoothing Methods", "Anisotropic Magnetoresistance", "Image Reconstruction", "Diffusion Processes", "Computer Vision", "Solid Modeling", "Noise Shaping", "Low Pass Filters", "Nonlinear Equations", "Image Edge Detection", "Smoothing", "Curvature Flow", "Feature Preserving" ], "authors": [ { "affiliation": null, "fullName": "Zhenhong Lv", "givenName": "Zhenhong", "surname": "Lv", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xin Chen", "givenName": "Xin", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "isise", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2009", "issn": "2160-1283", "isbn": "978-1-4244-6325-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05447223", "articleId": "12OmNzICEPv", "__typename": "AdjacentArticleType" }, "next": { "fno": "05447219", "articleId": "12OmNwK7o9o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iitsi/2010/4020/0/4020a789", "title": "Volume Rendering Effect Analysis with Image Preprocessing Technology Based on Three Dimension Anisotropic Diffusion", "doi": null, "abstractUrl": "/proceedings-article/iitsi/2010/4020a789/12OmNBEpnBT", "parentPublication": { "id": "proceedings/iitsi/2010/4020/0", "title": "Intelligent Information Technology and Security Informatics, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576349", "title": "Improvement of the curvature computation", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576349/12OmNBrV1Oz", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2007/2822/2/04377079", "title": "OCR Accuracy Improvement through a PDE-Based Approach", "doi": null, "abstractUrl": "/proceedings-article/icdar/2007/04377079/12OmNvF83no", "parentPublication": { "id": "proceedings/icdar/2007/2822/2", "title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/1/3930a126", "title": "Anisotropic Smoothing Algorithm for Triangular Mesh Models", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930a126/12OmNvHY2Fc", "parentPublication": { "id": "proceedings/ifcsta/2009/3930/3", "title": "Computer Science-Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2003/1946/0/19460028", "title": "Mesh Denoising via Iterative Alpha-Trimming and Nonlinear Diffusion of Normals with Automatic Thresholding", "doi": null, "abstractUrl": "/proceedings-article/cgi/2003/19460028/12OmNvq5jyl", "parentPublication": { "id": "proceedings/cgi/2003/1946/0", "title": "Computer Graphics International Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2004/8689/0/01434410", "title": "Three dimensional reconstruction of the left ventricle based on the Delaunay triangulation", "doi": null, "abstractUrl": "/proceedings-article/isspit/2004/01434410/12OmNyL0TEP", "parentPublication": { "id": "proceedings/isspit/2004/8689/0", "title": "Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccie/2010/4026/2/4026b111", "title": "Digital Image Magnification with Improved Anisotropic Diffusion", "doi": null, "abstractUrl": "/proceedings-article/ccie/2010/4026b111/12OmNyoSbiK", "parentPublication": { "id": "proceedings/ccie/2010/4026/2", "title": "Computing, Control and Industrial Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/2/3925b258", "title": "Feature-Preserving Smoothing Algorithm for Triangular Mesh Denoising", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925b258/12OmNyv7miu", "parentPublication": { "id": "proceedings/iccee/2009/3925/2", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206490", "title": "Curvature and singularity driven diffusion for oriented pattern enhancement with singular points", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206490/12OmNzBOhze", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2002/06/i0844", "title": "A Fundamental Relationship between Bilateral Filtering, Adaptive Smoothing, and the Nonlinear Diffusion Equation", "doi": null, "abstractUrl": "/journal/tp/2002/06/i0844/13rRUwIF6eM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzvQHKd", "title": "2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)", "acronym": "icmete", "groupId": "1817244", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNqI04Zs", "doi": "10.1109/ICMETE.2016.37", "title": "Using High Order Total Variation for Denoising Speckle, Gaussian, Salt & Pepper", "normalizedTitle": "Using High Order Total Variation for Denoising Speckle, Gaussian, Salt & Pepper", "abstract": "Noise reduction for image enhancement is the important issue for any image processing algorithm. Total variation (TV) regularization based methods were proposed for multiplicative speckle noise reduction, though sometimes have the undesirable staircase effect. As a solution for this problem, high order TV (High-TV) algorithm was proposed. In this paper we use the High-TV not only for speckle but also Gaussian and salt & pepper noises. The performance among High-TV and some TV based denoising algorithms are also compared in terms of objective and subjective image assessment parameters for two test images and two true SAR images degraded by speckle noise.", "abstracts": [ { "abstractType": "Regular", "content": "Noise reduction for image enhancement is the important issue for any image processing algorithm. Total variation (TV) regularization based methods were proposed for multiplicative speckle noise reduction, though sometimes have the undesirable staircase effect. As a solution for this problem, high order TV (High-TV) algorithm was proposed. In this paper we use the High-TV not only for speckle but also Gaussian and salt & pepper noises. The performance among High-TV and some TV based denoising algorithms are also compared in terms of objective and subjective image assessment parameters for two test images and two true SAR images degraded by speckle noise.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Noise reduction for image enhancement is the important issue for any image processing algorithm. Total variation (TV) regularization based methods were proposed for multiplicative speckle noise reduction, though sometimes have the undesirable staircase effect. As a solution for this problem, high order TV (High-TV) algorithm was proposed. In this paper we use the High-TV not only for speckle but also Gaussian and salt & pepper noises. The performance among High-TV and some TV based denoising algorithms are also compared in terms of objective and subjective image assessment parameters for two test images and two true SAR images degraded by speckle noise.", "fno": "07938926", "keywords": [ "Gaussian Noise", "Image Denoising", "Image Enhancement", "High Order Total Variation Algorithm", "Image Enhancement", "Image Processing Algorithm", "TV Regularization Based Methods", "Multiplicative Speckle Noise Reduction", "High Order TV Algorithm", "TV Based Denoising Algorithms", "SAR Images", "Speckle", "TV", "Noise Reduction", "Optical Filters", "Estimation", "Noise Measurement", "Synthetic Aperture Radar", "Higher Order TV", "SAR Denoising", "Speckle Suppression", "Total Variation" ], "authors": [ { "affiliation": null, "fullName": "Sedigheh Ghofrani", "givenName": "Sedigheh", "surname": "Ghofrani", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Haybert Markarian", "givenName": "Haybert", "surname": "Markarian", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmete", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-09-01T00:00:00", "pubType": "proceedings", "pages": "282-286", "year": "2016", "issn": null, "isbn": "978-1-5090-3411-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07938925", "articleId": "12OmNxG1yAM", "__typename": "AdjacentArticleType" }, "next": { "fno": "07938927", "articleId": "12OmNxwnct5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ncm/2009/3769/0/3769b335", "title": "Speckle Filtering by Generalized Gamma Distribution", "doi": null, "abstractUrl": "/proceedings-article/ncm/2009/3769b335/12OmNAT0mMH", "parentPublication": { "id": "proceedings/ncm/2009/3769/0", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2001/7010/1/00982773", "title": "A speckle reduction algorithm for SAR images", "doi": null, "abstractUrl": "/proceedings-article/icii/2001/00982773/12OmNAlvI4j", "parentPublication": { "id": "proceedings/icii/2001/7010/1", "title": "2001 International Conferences on Info-tech and Info-net. Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a700", "title": "Speckle Reduction with Multiresolution Bilateral Filtering for SAR Image", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a700/12OmNBO3JYb", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/5642/2/05421106", "title": "SAR Speckle Reduction Based on Nonlocal Means Method", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/05421106/12OmNBhpS5P", "parentPublication": { "id": "proceedings/iccms/2010/5642/2", "title": "2010 Second International Conference on Computer Modeling and Simulation (ICCMS 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2016/3071/0/3071a829", "title": "A Blind Estimation for Speckle Noise Based on Gaussian-Hermite Moments", "doi": null, "abstractUrl": "/proceedings-article/is3c/2016/3071a829/12OmNBr4etJ", "parentPublication": { "id": "proceedings/is3c/2016/3071/0", "title": "2016 International Symposium on Computer, Consumer and Control (IS3C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/1/3557a933", "title": "Speckle Reduction of Synthetic Aperture Radar Images Based on Fuzzy Logic", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557a933/12OmNClQ0yX", "parentPublication": { "id": "proceedings/etcs/2009/3557/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2014/6239/0/6239a143", "title": "SAR Image Despeckling Based on the Nonlocally Centralized Sparse Representation Model", "doi": null, "abstractUrl": "/proceedings-article/cit/2014/6239a143/12OmNz61dqQ", "parentPublication": { "id": "proceedings/cit/2014/6239/0", "title": "2014 IEEE International Conference on Computer and Information Technology (CIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2009/3571/4/3571d523", "title": "Speckle Noise Filtering for Sea SAR Image", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571d523/12OmNzICETH", "parentPublication": { "id": "proceedings/gcis/2009/3571/4", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2008/3308/0/3308a889", "title": "A Novel Wavelet-based Denoising Method of SAR Image Using Interscale Dependency", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2008/3308a889/12OmNzvhvz0", "parentPublication": { "id": "proceedings/iccsit/2008/3308/0", "title": "2008 International Conference on Computer Science and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413017", "title": "DSPNet: Deep Learning-Enabled Blind Reduction of Speckle Noise", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413017/1tmi7NCvm2A", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqMDo2", "title": "Computer and Electrical Engineering, International Conference on", "acronym": "iccee", "groupId": "1002575", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyv7miu", "doi": "10.1109/ICCEE.2009.126", "title": "Feature-Preserving Smoothing Algorithm for Triangular Mesh Denoising", "normalizedTitle": "Feature-Preserving Smoothing Algorithm for Triangular Mesh Denoising", "abstract": "A smoothing algorithm based on curvature flow is proposed to suppress noises in triangular meshes reconstructed from contours. Geometric features among the mesh are detected, according to which the original mesh is refined adaptively. An isotropic method is used to smooth the refined mesh, making the algorithm straightforward and stable while preserving important geometric features. Experimental results show that the algorithm can denoise triangular meshes constructed from contours with important geometric features preserved competently", "abstracts": [ { "abstractType": "Regular", "content": "A smoothing algorithm based on curvature flow is proposed to suppress noises in triangular meshes reconstructed from contours. Geometric features among the mesh are detected, according to which the original mesh is refined adaptively. An isotropic method is used to smooth the refined mesh, making the algorithm straightforward and stable while preserving important geometric features. Experimental results show that the algorithm can denoise triangular meshes constructed from contours with important geometric features preserved competently", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A smoothing algorithm based on curvature flow is proposed to suppress noises in triangular meshes reconstructed from contours. Geometric features among the mesh are detected, according to which the original mesh is refined adaptively. An isotropic method is used to smooth the refined mesh, making the algorithm straightforward and stable while preserving important geometric features. Experimental results show that the algorithm can denoise triangular meshes constructed from contours with important geometric features preserved competently", "fno": "3925b258", "keywords": [ "Triangular Mesh", "Smoothing", "Feature Preserving", "Isotropic Diffusion" ], "authors": [ { "affiliation": null, "fullName": "Xin Chen", "givenName": "Xin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jie Shen", "givenName": "Jie", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xianmei Huang", "givenName": "Xianmei", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccee", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "258-261", "year": "2009", "issn": null, "isbn": "978-0-7695-3925-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3925b254", "articleId": "12OmNA14A4Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "3925b262", "articleId": "12OmNBO3JUv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/3/3962e702", "title": "Survey on Planar Parameterization of Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e702/12OmNA1mbfa", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ihmsc/2009/3752/1/3752a347", "title": "Influencing Factors on Vertex Normal Accuracy for Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2009/3752a347/12OmNAMbZHZ", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2009/6325/0/05447224", "title": "A Three Dimensional Mesh Improvement Algorithm Based on Curvature Flow", "doi": null, "abstractUrl": "/proceedings-article/isise/2009/05447224/12OmNBpVQ4H", "parentPublication": { "id": "proceedings/isise/2009/6325/0", "title": "2009 Second International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a119", "title": "The Spherical Images of Triangular Mesh Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/1/3930a126", "title": "Anisotropic Smoothing Algorithm for Triangular Mesh Models", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930a126/12OmNvHY2Fc", "parentPublication": { "id": "proceedings/ifcsta/2009/3930/3", "title": "Computer Science-Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2003/1946/0/19460028", "title": "Mesh Denoising via Iterative Alpha-Trimming and Nonlinear Diffusion of Normals with Automatic Thresholding", "doi": null, "abstractUrl": "/proceedings-article/cgi/2003/19460028/12OmNvq5jyl", "parentPublication": { "id": "proceedings/cgi/2003/1946/0", "title": "Computer Graphics International Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2000/0868/0/08680235", "title": "Efficient Coding of Non-Triangular Mesh Connectivity", "doi": null, "abstractUrl": "/proceedings-article/pg/2000/08680235/12OmNwdtwaQ", "parentPublication": { "id": "proceedings/pg/2000/0868/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2005/2392/0/23920397", "title": "Directional Smoothing of Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2005/23920397/12OmNxiKrZS", "parentPublication": { "id": "proceedings/cgiv/2005/2392/0", "title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/10/ttg2011101521", "title": "Bilateral Normal Filtering for Mesh Denoising", "doi": null, "abstractUrl": "/journal/tg/2011/10/ttg2011101521/13rRUwjXZS9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a001", "title": "Adaptive Patches for Mesh Denoising", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a001/17D45XvMce1", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAWH9tO", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "acronym": "icassp", "groupId": "1000002", "volume": "4", "displayVolume": "4", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2TCKf", "doi": "10.1109/ICASSP.2002.5745420", "title": "A multiplicative weighted L2-norm total variation regularization for deblurring algorithms", "normalizedTitle": "A multiplicative weighted L2-norm total variation regularization for deblurring algorithms", "abstract": "In this paper a new deblurring algorithms for a special deconvolution problem, where a parameter describes the degree of blurring, is considered. The algorithm is based on a Conjugate Gradient technique and used the recently developed weighted l2(Ω)-norm Total Variation regularizer to obtain a reasonable solution. In order to avoid the necessity of determining the appropriate regularization parameter for this TV regularizer, this TV regularizer is included as a multiplicative constraint. In this way the appropriate regularization parameter is determined by the deblurring process itself. Numerical test shows that the proposed algorithm works very effective.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper a new deblurring algorithms for a special deconvolution problem, where a parameter describes the degree of blurring, is considered. The algorithm is based on a Conjugate Gradient technique and used the recently developed weighted l2(Ω)-norm Total Variation regularizer to obtain a reasonable solution. In order to avoid the necessity of determining the appropriate regularization parameter for this TV regularizer, this TV regularizer is included as a multiplicative constraint. In this way the appropriate regularization parameter is determined by the deblurring process itself. Numerical test shows that the proposed algorithm works very effective.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper a new deblurring algorithms for a special deconvolution problem, where a parameter describes the degree of blurring, is considered. The algorithm is based on a Conjugate Gradient technique and used the recently developed weighted l2(Ω)-norm Total Variation regularizer to obtain a reasonable solution. In order to avoid the necessity of determining the appropriate regularization parameter for this TV regularizer, this TV regularizer is included as a multiplicative constraint. In this way the appropriate regularization parameter is determined by the deblurring process itself. Numerical test shows that the proposed algorithm works very effective.", "fno": "05745420", "keywords": [ "Image Resolution", "TV" ], "authors": [ { "affiliation": "Centre for Technical Geoscience, Delft University of Technology, Mekelweg 4, 2628 CD, The Netherlands", "fullName": "Aria Abubakar", "givenName": "Aria", "surname": "Abubakar", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Technical Geoscience, Delft University of Technology, Mekelweg 4, 2628 CD, The Netherlands", "fullName": "Peter M. van den Berg", "givenName": "Peter M.", "surname": "van den Berg", "__typename": "ArticleAuthorType" } ], "idPrefix": "icassp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-05-01T00:00:00", "pubType": "proceedings", "pages": "IV-3545-IV-3548", "year": "2002", "issn": "1520-6149", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05745419", "articleId": "12OmNxeut17", "__typename": "AdjacentArticleType" }, "next": { "fno": "05745421", "articleId": "12OmNCwlalY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cis/2014/7434/0/7434a736", "title": "Choice of Regularization Parameter in Constrained Total Variational Image Restoration Model", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a736/12OmNwp74Lb", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995653", "title": "Bayesian deblurring with integrated noise estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995653/12OmNxVDuMQ", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890184", "title": "Adaptive shearlet-regularized image deblurring via alternating direction method", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890184/12OmNxzMnJz", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2011/4455/0/4455a610", "title": "Image Deblurring Regularized by Wavelet Probability Shrink", "doi": null, "abstractUrl": "/proceedings-article/icdma/2011/4455a610/12OmNyfdOKT", "parentPublication": { "id": "proceedings/icdma/2011/4455/0", "title": "2011 Second International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a119", "title": "A Nonlinear Inverse Scale Space Method for Multiplicative Noise Removal Based on Weberized Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a119/12OmNynJMSg", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biomedcom/2012/4938/0/4938a001", "title": "3-D Tomosynthesis Image Reconstruction Using Total Variation", "doi": null, "abstractUrl": "/proceedings-article/biomedcom/2012/4938a001/12OmNyoiZ4t", "parentPublication": { "id": "proceedings/biomedcom/2012/4938/0", "title": "ASE/IEEE International Conference on BioMedical Computing (BioMedCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019463", "title": "Image restoration via multi-scale non-local total variation regularization", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019463/12OmNyqRn7G", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2015/1843/0/1843a223", "title": "Hyper-Laplacian Non-blind Deblurring Model Based on Regional Division", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2015/1843a223/12OmNzkMlSv", "parentPublication": { "id": "proceedings/icnisc/2015/1843/0", "title": "2015 International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482069", "title": "Multi-Images Restoration Method with a Mixed-Regularization Approach for Cognitive Informatics", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482069/14dcDYzVcd4", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a318", "title": "Image Deblurring Based on Normalized-weighted Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a318/1KYtaF1gUzS", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iC6qvXFvuU", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "acronym": "ispa-bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iC6Gh65bOw", "doi": "10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00149", "title": "Underwater Image Enhancement with a Total Generalized Variation Illumination Prior", "normalizedTitle": "Underwater Image Enhancement with a Total Generalized Variation Illumination Prior", "abstract": "In order to promote the visual quality of degraded underwater images, we develop an innovative variational model based on Retinex with a total generalized variation (TGV) prior on the illumination. The TGV prior is adopted to approximate piecewise smoothness and piecewise linear smoothness of the illumination, which combines the first-order and second-order total variation (TV) to model the variation of illumination. When adopting this illumination prior in the Retinex-based algorithm, the illumination and reflection are well separated, and underwater enhanced results appear more natural and their details and edges are better preserved. Then an efficient iterative optimization method is derived to settle the proposed model via alternately calculating the illumination and the reflection simultaneously. Numerous experiments on both visual results and objective metrics demonstrate the superiority of our method compared with several underwater enhancement methods. In addition, the proposed method can be extended for dehazing, sandstorm removal and low illumination image enhancement, which can illustrate better capacity of our model.", "abstracts": [ { "abstractType": "Regular", "content": "In order to promote the visual quality of degraded underwater images, we develop an innovative variational model based on Retinex with a total generalized variation (TGV) prior on the illumination. The TGV prior is adopted to approximate piecewise smoothness and piecewise linear smoothness of the illumination, which combines the first-order and second-order total variation (TV) to model the variation of illumination. When adopting this illumination prior in the Retinex-based algorithm, the illumination and reflection are well separated, and underwater enhanced results appear more natural and their details and edges are better preserved. Then an efficient iterative optimization method is derived to settle the proposed model via alternately calculating the illumination and the reflection simultaneously. Numerous experiments on both visual results and objective metrics demonstrate the superiority of our method compared with several underwater enhancement methods. In addition, the proposed method can be extended for dehazing, sandstorm removal and low illumination image enhancement, which can illustrate better capacity of our model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to promote the visual quality of degraded underwater images, we develop an innovative variational model based on Retinex with a total generalized variation (TGV) prior on the illumination. The TGV prior is adopted to approximate piecewise smoothness and piecewise linear smoothness of the illumination, which combines the first-order and second-order total variation (TV) to model the variation of illumination. When adopting this illumination prior in the Retinex-based algorithm, the illumination and reflection are well separated, and underwater enhanced results appear more natural and their details and edges are better preserved. Then an efficient iterative optimization method is derived to settle the proposed model via alternately calculating the illumination and the reflection simultaneously. Numerous experiments on both visual results and objective metrics demonstrate the superiority of our method compared with several underwater enhancement methods. In addition, the proposed method can be extended for dehazing, sandstorm removal and low illumination image enhancement, which can illustrate better capacity of our model.", "fno": "09047325", "keywords": [ "Image Colour Analysis", "Image Denoising", "Image Enhancement", "Image Restoration", "Iterative Methods", "Optimisation", "Variational Techniques", "TGV", "Second Order Total Variation", "Retinex Based Algorithm", "Underwater Image Enhancement Methods", "Low Illumination Image Enhancement", "Variational Model", "Total Generalized Variation Illumination Prior", "First Order Total Variation", "Iterative Optimization Method", "Underwater Images Visual Quality", "Piecewise Linear Smoothness Approximation", "Lighting", "Image Color Analysis", "Mathematical Model", "Optimization", "Image Enhancement", "Visualization", "Adaptation Models", "Underwater Image Enhancement", "Total Generalized Variation", "Retinex", "Alternating Optimization" ], "authors": [ { "affiliation": "Nanjing University of Information Science and Technology", "fullName": "Zhengjie Zhao", "givenName": "Zhengjie", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University of Information Science and Technology", "fullName": "Yuxiang Dai", "givenName": "Yuxiang", "surname": "Dai", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University of Information Science and Technology", "fullName": "Peixian Zhuang", "givenName": "Peixian", "surname": "Zhuang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispa-bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "1041-1048", "year": "2019", "issn": null, "isbn": "978-1-7281-4328-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09047331", "articleId": "1iC6qNtpc1G", "__typename": "AdjacentArticleType" }, "next": { "fno": "09047397", "articleId": "1iC6zf2f0TC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2016/2535/0/2535a083", "title": "A Novel Illumination Compensation Method with Enhanced Retinex", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a083/12OmNBpVPTp", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmip/2017/5954/0/5954a286", "title": "Removal of Uneven Illumination in Panorama Using Illumination Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmip/2017/5954a286/12OmNCw3zan", "parentPublication": { "id": "proceedings/icmip/2017/5954/0", "title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2016/3575/0/3575a083", "title": "Image Enhancement Using Bright Channel Prior", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2016/3575a083/12OmNCwlam0", "parentPublication": { "id": "proceedings/iciicii/2016/3575/0", "title": "2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ibica/2011/4606/0/4606a017", "title": "Low Complexity Underwater Image Enhancement Based on Dark Channel Prior", "doi": null, "abstractUrl": "/proceedings-article/ibica/2011/4606a017/12OmNqFrGKL", "parentPublication": { "id": "proceedings/ibica/2011/4606/0", "title": "Innovations in Bio-inspired Computing and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/08237693", "title": "A Joint Intrinsic-Extrinsic Prior Model for Retinex", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/08237693/12OmNs59JJt", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/navcomp/2014/1899/0/1899a018", "title": "Underwater Single Image Restoration Using Dark Channel Prior", "doi": null, "abstractUrl": "/proceedings-article/navcomp/2014/1899a018/12OmNsdo6v1", "parentPublication": { "id": "proceedings/navcomp/2014/1899/0", "title": "2014 Symposium on Automation and Computation for Naval, Offshore and Subsea (NAVCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2009/3651/0/3651a108", "title": "Adaptive Monte Carlo Retinex Method for Illumination and Reflectance Separation and Color Image Enhancement", "doi": null, "abstractUrl": "/proceedings-article/crv/2009/3651a108/12OmNvjyxTJ", "parentPublication": { "id": "proceedings/crv/2009/3651/0", "title": "2009 Canadian Conference on Computer and Robot Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a226", "title": "Improved Retinex for low illumination image enhancement of nighttime traffic", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a226/1FUVQUrSrS0", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2019/5045/0/504500a499", "title": "Light Field Camera Image Sharpness Enhancement for Underwater Machine Vision Application", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2019/504500a499/1hHLo4hLuVy", "parentPublication": { "id": "proceedings/wcmeim/2019/5045/0", "title": "2019 2nd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2021/2598/0/259800a241", "title": "Low Illumination Image Enhancement Algorithm Combining Homomorphic Filtering and Retinex", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2021/259800a241/1yQBb3dzBfO", "parentPublication": { "id": "proceedings/icwcsg/2021/2598/0", "title": "2021 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3nYsqK8b6", "doi": "10.1109/CVPR42600.2020.00757", "title": "Total Deep Variation for Linear Inverse Problems", "normalizedTitle": "Total Deep Variation for Linear Inverse Problems", "abstract": "Diverse inverse problems in imaging can be cast as variational problems composed of a task-specific data fidelity term and a regularization term. In this paper, we propose a novel learnable general-purpose regularizer exploiting recent architectural design patterns from deep learning. We cast the learning problem as a discrete sampled optimal control problem, for which we derive the adjoint state equations and an optimality condition. By exploiting the variational structure of our approach, we perform a sensitivity analysis with respect to the learned parameters obtained from different training datasets. Moreover, we carry out a nonlinear eigenfunction analysis, which reveals interesting properties of the learned regularizer. We show state-of-the-art performance for classical image restoration and medical image reconstruction problems.", "abstracts": [ { "abstractType": "Regular", "content": "Diverse inverse problems in imaging can be cast as variational problems composed of a task-specific data fidelity term and a regularization term. In this paper, we propose a novel learnable general-purpose regularizer exploiting recent architectural design patterns from deep learning. We cast the learning problem as a discrete sampled optimal control problem, for which we derive the adjoint state equations and an optimality condition. By exploiting the variational structure of our approach, we perform a sensitivity analysis with respect to the learned parameters obtained from different training datasets. Moreover, we carry out a nonlinear eigenfunction analysis, which reveals interesting properties of the learned regularizer. We show state-of-the-art performance for classical image restoration and medical image reconstruction problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diverse inverse problems in imaging can be cast as variational problems composed of a task-specific data fidelity term and a regularization term. In this paper, we propose a novel learnable general-purpose regularizer exploiting recent architectural design patterns from deep learning. We cast the learning problem as a discrete sampled optimal control problem, for which we derive the adjoint state equations and an optimality condition. By exploiting the variational structure of our approach, we perform a sensitivity analysis with respect to the learned parameters obtained from different training datasets. Moreover, we carry out a nonlinear eigenfunction analysis, which reveals interesting properties of the learned regularizer. We show state-of-the-art performance for classical image restoration and medical image reconstruction problems.", "fno": "716800h546", "keywords": [ "Control Engineering Computing", "Discrete Systems", "Eigenvalues And Eigenfunctions", "Image Reconstruction", "Image Restoration", "Inverse Problems", "Learning Artificial Intelligence", "Medical Image Processing", "Optimal Control", "Optimisation", "Sensitivity Analysis", "Variational Techniques", "Learnable General Purpose Regularizer", "Nonlinear Eigenfunction Analysis", "Training Datasets", "Learned Parameters", "Sensitivity Analysis", "Variational Structure", "Optimality Condition", "Adjoint State Equations", "Discrete Sampled Optimal Control Problem", "Deep Learning", "Architectural Design Patterns", "Regularization Term", "Task Specific Data Fidelity Term", "Variational Problems", "Diverse Inverse Problems", "Linear Inverse Problems", "Total Deep Variation", "Medical Image Reconstruction Problems", "Classical Image Restoration", "Learned Regularizer", "Optimal Control", "Convolution", "Training", "Inverse Problems", "Task Analysis", "Kernel", "Imaging" ], "authors": [ { "affiliation": "Graz University of Technology", "fullName": "Erich Kobler", "givenName": "Erich", "surname": "Kobler", "__typename": "ArticleAuthorType" }, { "affiliation": "Graz University of Technology", "fullName": "Alexander Effland", "givenName": "Alexander", "surname": "Effland", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Graz", "fullName": "Karl Kunisch", "givenName": "Karl", "surname": "Kunisch", "__typename": "ArticleAuthorType" }, { "affiliation": "Graz University of Technology", "fullName": "Thomas Pock", "givenName": "Thomas", "surname": "Pock", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "7546-7555", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800h536", "articleId": "1m3nK8WamGI", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800h556", "articleId": "1m3nLGkO412", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2009/3804/4/3804e719", "title": "Variational Theory for 3-D Unsteady Compressible Rotational Flow by Semi-Inverse Method", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804e719/12OmNAlNiBx", "parentPublication": { "id": "proceedings/icicta/2009/3804/4", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a119", "title": "A Nonlinear Inverse Scale Space Method for Multiplicative Noise Removal Based on Weberized Total Variation", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a119/12OmNynJMSg", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298819", "title": "Total variation regularization of shape signals", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298819/12OmNyuy9Sp", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2010/05/mcs2010050064", "title": "Globally Convergent Numerical Methods for Some Coefficient Inverse Problems", "doi": null, "abstractUrl": "/magazine/cs/2010/05/mcs2010050064/13rRUB6SpTd", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545232", "title": "Cascade Deep Networks for Sparse Linear Inverse Problems", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545232/17D45WwsQ78", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a722", "title": "Recurrent Variational Network: A Deep Learning Inverse Problem Solver applied to the task of Accelerated MRI Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a722/1H1iT2yJqqk", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b324", "title": "InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b324/1cdOOfQFTaw", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i223", "title": "When to Use Convolutional Neural Networks for Inverse Problems", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i223/1m3neUyUZvG", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09453151", "title": "Mesh Total Generalized Variation for Denoising", "doi": null, "abstractUrl": "/journal/tg/2022/12/09453151/1ulCADl6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09599362", "title": "Total Deep Variation: A Stable Regularization Method for Inverse Problems", "doi": null, "abstractUrl": "/journal/tp/2022/12/09599362/1yeC8CaRqKY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvRU0cM", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAjO6Ey", "doi": "10.1109/ISMAR-Adjunct.2017.48", "title": "[POSTER] Automated Evaluation and Configuration of Object Tracking for Augmented Reality", "normalizedTitle": "[POSTER] Automated Evaluation and Configuration of Object Tracking for Augmented Reality", "abstract": "Object tracking configuration is a tedious task for users due to an overwhelming amount of parameters while solving a multicriterial optimisation problem for a black box. With increasing complexity of the algorithms and fast changing situations due to the upcoming fourth industrial revolution, even experts will find themselves struggling with this topic. For this reason we present a concept for an automated evaluation and configuration of object tracking algorithms used in augmented reality applications. Given an arbitrary but specified use case the best suitable parameter set shall be found. Therefore the concept utilises statistical analysis of the vast parameter space performing multicriterial optimisation regarding a formalisation of the tracking quality within a virtual testbed.", "abstracts": [ { "abstractType": "Regular", "content": "Object tracking configuration is a tedious task for users due to an overwhelming amount of parameters while solving a multicriterial optimisation problem for a black box. With increasing complexity of the algorithms and fast changing situations due to the upcoming fourth industrial revolution, even experts will find themselves struggling with this topic. For this reason we present a concept for an automated evaluation and configuration of object tracking algorithms used in augmented reality applications. Given an arbitrary but specified use case the best suitable parameter set shall be found. Therefore the concept utilises statistical analysis of the vast parameter space performing multicriterial optimisation regarding a formalisation of the tracking quality within a virtual testbed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Object tracking configuration is a tedious task for users due to an overwhelming amount of parameters while solving a multicriterial optimisation problem for a black box. With increasing complexity of the algorithms and fast changing situations due to the upcoming fourth industrial revolution, even experts will find themselves struggling with this topic. For this reason we present a concept for an automated evaluation and configuration of object tracking algorithms used in augmented reality applications. Given an arbitrary but specified use case the best suitable parameter set shall be found. Therefore the concept utilises statistical analysis of the vast parameter space performing multicriterial optimisation regarding a formalisation of the tracking quality within a virtual testbed.", "fno": "6327a132", "keywords": [ "Optimization", "Target Tracking", "Augmented Reality", "Object Tracking", "Complexity Theory", "Industries" ], "authors": [ { "affiliation": null, "fullName": "Kevin K. Thiel", "givenName": "Kevin K.", "surname": "Thiel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eduard Jundt", "givenName": "Eduard", "surname": "Jundt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gudrun Klinker", "givenName": "Gudrun", "surname": "Klinker", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "132-134", "year": "2017", "issn": null, "isbn": "978-0-7695-6327-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6327a130", "articleId": "12OmNvA1hoC", "__typename": "AdjacentArticleType" }, "next": { "fno": "6327a135", "articleId": "12OmNB6UIa5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iswc/2003/2034/0/20340127", "title": "First Steps Towards Handheld Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/iswc/2003/20340127/12OmNAlvHNr", "parentPublication": { "id": "proceedings/iswc/2003/2034/0", "title": "Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892313", "title": "Prioritization and static error compensation for multi-camera collaborative tracking in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892313/12OmNBSSVg2", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550212", "title": "Poster: Markerless fingertip-based 3D interaction for handheld augmented reality in a small workspace", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550212/12OmNBsue2b", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a140", "title": "[POSTER] AR4AR: Using Augmented Reality for guidance in Augmented Reality Systems Setup", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a140/12OmNCd2rIf", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2015/9403/0/9403a050", "title": "Acceleration of Dynamic Spatial Augmented Reality System with a Depth Camera", "doi": null, "abstractUrl": "/proceedings-article/cw/2015/9403a050/12OmNvD8RuT", "parentPublication": { "id": "proceedings/cw/2015/9403/0", "title": "2015 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a148", "title": "[POSTER] Rubix: Dynamic Spatial Augmented Reality by Extraction of Plane Regions with a RGB-D Camera", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a148/12OmNyKJicb", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2011/03/mpc2011030068", "title": "Automatic Configuration of Pervasive Sensor Networks for Augmented Reality", "doi": null, "abstractUrl": "/magazine/pc/2011/03/mpc2011030068/13rRUxASuVd", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2002/06/mcg2002060039", "title": "Augmented Reality Camera Tracking with Homographies", "doi": null, "abstractUrl": "/magazine/cg/2002/06/mcg2002060039/13rRUyp7u1m", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088308", "title": "Home Automation using Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088308/1M4rH4muSoE", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09454303", "title": "C.DOT - Convolutional Deep Object Tracker for Augmented Reality Based Purely on Synthetic Data", "doi": null, "abstractUrl": "/journal/tg/2022/12/09454303/1uqBhF8Gmo8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwE9Ott", "title": "International Symposium on Ubiquitous Virtual Reality", "acronym": "isuvr", "groupId": "1002009", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEBzbj", "doi": "10.1109/ISUVR.2008.10", "title": "On Computer Vision for Augmented Reality", "normalizedTitle": "On Computer Vision for Augmented Reality", "abstract": "We review some recent techniques for 3D tracking and occlusion handling for Computer Vision-based Augmented Reality. We discuss what their limits for real applications??are, and why Object Recognition techniques are certainly the???key to further improvements.", "abstracts": [ { "abstractType": "Regular", "content": "We review some recent techniques for 3D tracking and occlusion handling for Computer Vision-based Augmented Reality. We discuss what their limits for real applications??are, and why Object Recognition techniques are certainly the???key to further improvements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We review some recent techniques for 3D tracking and occlusion handling for Computer Vision-based Augmented Reality. We discuss what their limits for real applications??are, and why Object Recognition techniques are certainly the???key to further improvements.", "fno": "3259a013", "keywords": [ "Augmented Reality", "Computer Vision" ], "authors": [ { "affiliation": null, "fullName": "Vincent Lepetit", "givenName": "Vincent", "surname": "Lepetit", "__typename": "ArticleAuthorType" } ], "idPrefix": "isuvr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "13-16", "year": "2008", "issn": null, "isbn": "978-0-7695-3259-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3259a009", "articleId": "12OmNyLius0", "__typename": "AdjacentArticleType" }, "next": { "fno": "3259a017", "articleId": "12OmNvSKNP3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccms/2010/3941/1/3941a133", "title": "Key Technique of Assembly System in an Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a133/12OmNqC2uYI", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2012/2712/0/IS225", "title": "Vision-based user tracking for outdoor augmented reality", "doi": null, "abstractUrl": "/proceedings-article/iscc/2012/IS225/12OmNrH1PAZ", "parentPublication": { "id": "proceedings/iscc/2012/2712/0", "title": "2012 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726809", "title": "A review on illumination techniques in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726809/12OmNwMFMfk", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2010/9343/0/05643593", "title": "Augmented reality for board games", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643593/12OmNxj23c6", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539195", "title": "Haptics in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539195/12OmNyQ7G3s", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2010/6237/0/05444821", "title": "Performance evaluation method for mobile computer vision systems using augmented reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2010/05444821/12OmNzmclyD", "parentPublication": { "id": "proceedings/vr/2010/6237/0", "title": "2010 IEEE Virtual Reality Conference (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2002/06/mcg2002060039", "title": "Augmented Reality Camera Tracking with Homographies", "doi": null, "abstractUrl": "/magazine/cg/2002/06/mcg2002060039/13rRUyp7u1m", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699304", "title": "Addressing the Occlusion Problem in Augmented Reality Environments with Phantom Hollow Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699304/19F1T4QjgOY", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a298", "title": "Real-Time Augmented Reality with Occlusion Handling Based on RGBD Images", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a298/1ap5xY9dZni", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811002", "title": "Improving Spatial Perception for Augmented Reality X-Ray Vision", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811002/1t0I1sqXnl6", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H0OidPSRQQ", "doi": "10.1109/CVPR52688.2022.00858", "title": "Unified Transformer Tracker for Object Tracking", "normalizedTitle": "Unified Transformer Tracker for Object Tracking", "abstract": "As an important area in computer vision, object tracking has formed two separate communities that respectively study Single Object Tracking (SOT) and Multiple Object Tracking (MOT). However, current methods in one tracking scenario are not easily adapted to the other due to the divergent training datasets and tracking objects of both tasks. Although UniTrack [45] demonstrates that a shared appearance model with multiple heads can be used to tackle individual tracking tasks, it fails to exploit the large-scale tracking datasets for training and performs poorly on the single object tracking. In this work, we present the Unified Transformer Tracker (UTT) to address tracking problems in different scenarios with one paradigm. A track transformer is developed in our UTT to track the target in both SOT and MOT where the correlation between the target feature and the tracking frame feature is exploited to localize the target. We demonstrate that both SOT and MOT tasks can be solved within this framework, and the model can be simultaneously end-to-end trained by alternatively optimizing the SOT and MOT objectives on the datasets of individual tasks. Extensive experiments are conducted on several benchmarks with a unified model trained on both SOT and MOT datasets.", "abstracts": [ { "abstractType": "Regular", "content": "As an important area in computer vision, object tracking has formed two separate communities that respectively study Single Object Tracking (SOT) and Multiple Object Tracking (MOT). However, current methods in one tracking scenario are not easily adapted to the other due to the divergent training datasets and tracking objects of both tasks. Although UniTrack [45] demonstrates that a shared appearance model with multiple heads can be used to tackle individual tracking tasks, it fails to exploit the large-scale tracking datasets for training and performs poorly on the single object tracking. In this work, we present the Unified Transformer Tracker (UTT) to address tracking problems in different scenarios with one paradigm. A track transformer is developed in our UTT to track the target in both SOT and MOT where the correlation between the target feature and the tracking frame feature is exploited to localize the target. We demonstrate that both SOT and MOT tasks can be solved within this framework, and the model can be simultaneously end-to-end trained by alternatively optimizing the SOT and MOT objectives on the datasets of individual tasks. Extensive experiments are conducted on several benchmarks with a unified model trained on both SOT and MOT datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As an important area in computer vision, object tracking has formed two separate communities that respectively study Single Object Tracking (SOT) and Multiple Object Tracking (MOT). However, current methods in one tracking scenario are not easily adapted to the other due to the divergent training datasets and tracking objects of both tasks. Although UniTrack [45] demonstrates that a shared appearance model with multiple heads can be used to tackle individual tracking tasks, it fails to exploit the large-scale tracking datasets for training and performs poorly on the single object tracking. In this work, we present the Unified Transformer Tracker (UTT) to address tracking problems in different scenarios with one paradigm. A track transformer is developed in our UTT to track the target in both SOT and MOT where the correlation between the target feature and the tracking frame feature is exploited to localize the target. We demonstrate that both SOT and MOT tasks can be solved within this framework, and the model can be simultaneously end-to-end trained by alternatively optimizing the SOT and MOT objectives on the datasets of individual tasks. Extensive experiments are conducted on several benchmarks with a unified model trained on both SOT and MOT datasets.", "fno": "694600i771", "keywords": [ "Computer Vision", "Feature Extraction", "Object Detection", "Object Tracking", "Optimisation", "Particle Filtering Numerical Methods", "Target Tracking", "Tracking", "Video Signal Processing", "Tracking Objects", "Individual Tracking Tasks", "Large Scale Tracking Datasets", "Unified Transformer Tracker", "Tracking Problems", "Track Transformer", "SOT", "Tracking Frame Feature", "MOT Tasks", "MOT Objectives", "MOT Datasets", "Study Single Object Tracking", "Multiple Object Tracking", "Tracking Scenario", "Divergent Training Datasets", "Training", "Computer Vision", "Target Tracking", "Correlation", "Computational Modeling", "Benchmark Testing", "Transformers" ], "authors": [ { "affiliation": "AAII, University of Technology Sydney,ReLER Lab", "fullName": "Fan Ma", "givenName": "Fan", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "Mike Zheng Shou", "givenName": "Mike Zheng", "surname": "Shou", "__typename": "ArticleAuthorType" }, { "affiliation": "AAII, University of Technology Sydney,ReLER Lab", "fullName": "Linchao Zhu", "givenName": "Linchao", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Meta AI", "fullName": "Haoqi Fan", "givenName": "Haoqi", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": "Meta AI", "fullName": "Yilei Xu", "givenName": "Yilei", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Yi Yang", "givenName": "Yi", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Meta AI", "fullName": "Zhicheng Yan", "givenName": "Zhicheng", "surname": "Yan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "8771-8780", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H0OiaC3ghq", "name": "pcvpr202269460-09879453s1-mm_694600i771.zip", "size": "352 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09879453s1-mm_694600i771.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600i761", "articleId": "1H0LxEi9m0g", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600i781", "articleId": "1H1kJx2vUIM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391e705", "title": "Learning to Track: Online Multi-object Tracking by Decision Making", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391e705/12OmNxYbT1q", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298675", "title": "MUlti-Store Tracker (MUSTer): A cognitive psychology inspired approach to object tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298675/12OmNzaQolB", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a161", "title": "Online Multi-Object Tracking With Instance-Aware Tracker and Dynamic Model Refreshment", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a161/18j8HI5v5yo", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b235", "title": "Simple Online Unmanned Aerial Vehicle Tracking with Transformer", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b235/1BBztzT8cOA", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991572", "title": "Rethink Object Tracking Based on Transformer", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991572/1JwPYhGqbDO", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600e859", "title": "TransMOT: Spatial-Temporal Graph Transformer for Multiple Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600e859/1KxUGrr4jRK", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800g767", "title": "A Unified Object Motion and Affinity Model for Online Multi-Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800g767/1m3nYM2cv9m", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900c453", "title": "Improving Multiple Object Tracking with Single Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900c453/1yeJPx3GkI8", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b571", "title": "Transformer Meets Tracker: Exploiting Temporal Context for Robust Visual Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b571/1yeLRUEC27S", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900g715", "title": "GMOT-40: A Benchmark for Generic Multiple Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900g715/1yeLkCh7Nf2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MBEUKaHfC8", "title": "2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI)", "acronym": "sti", "groupId": "10103226", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1MBFeH4UWgo", "doi": "10.1109/STI56238.2022.10103326", "title": "PestDetector: A Deep Convolutional Neural Network to Detect Jute Pests", "normalizedTitle": "PestDetector: A Deep Convolutional Neural Network to Detect Jute Pests", "abstract": "Widely known as the \"Golden Fiber\", jute is regarded as one of the most important and profitable crops in many countries including Bangladesh. Jute and jute-based commodities can bring a lot of foreign income and eventually boosts the overall economy of the country. However, many a time, jute production gets hindered due to many harmful pests and insects. Even though farmers identify and take actions against these pests following a manual procedure, it is often tedious and time-consuming. That is why it may be very beneficial to have a machine learning-based approach towards pest detection. This paper proposes a deep CNN model named \"PestDetector\" that can correctly identify 4 major types of jute pests (Field Cricket, Jute Stem Weevil, Spilosoma Obliqua, and Yellow Mite) with substantial accuracy. The work is done on a total of 2200 images separated into 3 categories: Training, Validation, and Testing. The model ultimately demonstrates 99.18% training accuracy and 99.00% validation accuracy. Additionally, the model's overall performance has been assessed using precision, recall, F1-score, and confusion matrix.", "abstracts": [ { "abstractType": "Regular", "content": "Widely known as the \"Golden Fiber\", jute is regarded as one of the most important and profitable crops in many countries including Bangladesh. Jute and jute-based commodities can bring a lot of foreign income and eventually boosts the overall economy of the country. However, many a time, jute production gets hindered due to many harmful pests and insects. Even though farmers identify and take actions against these pests following a manual procedure, it is often tedious and time-consuming. That is why it may be very beneficial to have a machine learning-based approach towards pest detection. This paper proposes a deep CNN model named \"PestDetector\" that can correctly identify 4 major types of jute pests (Field Cricket, Jute Stem Weevil, Spilosoma Obliqua, and Yellow Mite) with substantial accuracy. The work is done on a total of 2200 images separated into 3 categories: Training, Validation, and Testing. The model ultimately demonstrates 99.18% training accuracy and 99.00% validation accuracy. Additionally, the model's overall performance has been assessed using precision, recall, F1-score, and confusion matrix.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Widely known as the \"Golden Fiber\", jute is regarded as one of the most important and profitable crops in many countries including Bangladesh. Jute and jute-based commodities can bring a lot of foreign income and eventually boosts the overall economy of the country. However, many a time, jute production gets hindered due to many harmful pests and insects. Even though farmers identify and take actions against these pests following a manual procedure, it is often tedious and time-consuming. That is why it may be very beneficial to have a machine learning-based approach towards pest detection. This paper proposes a deep CNN model named \"PestDetector\" that can correctly identify 4 major types of jute pests (Field Cricket, Jute Stem Weevil, Spilosoma Obliqua, and Yellow Mite) with substantial accuracy. The work is done on a total of 2200 images separated into 3 categories: Training, Validation, and Testing. The model ultimately demonstrates 99.18% training accuracy and 99.00% validation accuracy. Additionally, the model's overall performance has been assessed using precision, recall, F1-score, and confusion matrix.", "fno": "10103326", "keywords": [ "Training", "Insects", "Crops", "Production", "Manuals", "Optical Fiber Networks", "Fourth Industrial Revolution", "Deep Learning", "CNN", "Classification", "Jute Pest Detection", "Image Processing" ], "authors": [ { "affiliation": "Brac University,Department of Computer Science and Engineering,Bangladesh", "fullName": "Dewan Ziaul Karim", "givenName": "Dewan Ziaul", "surname": "Karim", "__typename": "ArticleAuthorType" }, { "affiliation": "Daffodil International University,Department of Computer Science and Engineering,Bangladesh", "fullName": "Tasfia Anika Bushra", "givenName": "Tasfia Anika", "surname": "Bushra", "__typename": "ArticleAuthorType" }, { "affiliation": "Brac University,Department of Computer Science and Engineering,Bangladesh", "fullName": "Muntasir Mahmud Saif", "givenName": "Muntasir Mahmud", "surname": "Saif", "__typename": "ArticleAuthorType" } ], "idPrefix": "sti", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": null, "isbn": "978-1-6654-9045-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10103281", "articleId": "1MBFbl8kam4", "__typename": "AdjacentArticleType" }, "next": { "fno": "10103302", "articleId": "1MBFc5RTs8E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2015/1805/0/07333933", "title": "Deepdocclassifier: Document classification with deep Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icdar/2015/07333933/12OmNyL0TI6", "parentPublication": { "id": "proceedings/icdar/2015/1805/0", "title": "2015 13th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/2/3735b349", "title": "Research on the Diagnosis Method of Crop Pests and Diseases Based on the Heuristic Search", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b349/12OmNyL0TkU", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2018/5163/0/08640962", "title": "Bengali Sign Language Recognition Using Deep Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2018/08640962/17PYEkXA5N0", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2018/5163/0", "title": "2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/accc/2021/0743/0/074300a006", "title": "PlantifyAI: A Novel Convolutional Neural Network Based Mobile Application for Efficient Crop Disease Detection and Treatment", "doi": null, "abstractUrl": "/proceedings-article/accc/2021/074300a006/1AqxUDa6yic", "parentPublication": { "id": "proceedings/accc/2021/0743/0", "title": "2021 2nd Asia Conference on Computers and Communications (ACCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiipcc/2022/6287/0/628700a112", "title": "Multi-node Monitoring of Jujube Diseases and Pests Based on Internet of Things Technology", "doi": null, "abstractUrl": "/proceedings-article/aiipcc/2022/628700a112/1LR9Y5fPiz6", "parentPublication": { "id": "proceedings/aiipcc/2022/6287/0", "title": "2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2019/5050/0/505000a166", "title": "Research on Pest and Disease Recognition Algorithms Based on Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icvris/2019/505000a166/1fHk7loWlR6", "parentPublication": { "id": "proceedings/icvris/2019/5050/0", "title": "2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2020/8243/0/09425273", "title": "Deep Convolutional Neural Network Ensemble for Improved Malaria Parasite Detection", "doi": null, "abstractUrl": "/proceedings-article/aipr/2020/09425273/1tuA2c7suRy", "parentPublication": { "id": "proceedings/aipr/2020/8243/0", "title": "2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09454303", "title": "C.DOT - Convolutional Deep Object Tracker for Augmented Reality Based Purely on Synthetic Data", "doi": null, "abstractUrl": "/journal/tg/2022/12/09454303/1uqBhF8Gmo8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2020/9636/0/963600a442", "title": "Pest Detection in Crop Images Based on OTSU Algorithm and Deep Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icvris/2020/963600a442/1x4Z8S7KFQ4", "parentPublication": { "id": "proceedings/icvris/2020/9636/0", "title": "2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscipt/2021/4137/0/413700a846", "title": "Hyperspectral imaging combined with convolutional neural network for outdoor detection of potato diseases", "doi": null, "abstractUrl": "/proceedings-article/iscipt/2021/413700a846/1zzpwm9o9u8", "parentPublication": { "id": "proceedings/iscipt/2021/4137/0", "title": "2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oZBzHKi4UM", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "acronym": "svr", "groupId": "1800426", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oZBDk3EOPK", "doi": "10.1109/SVR51698.2020.00073", "title": "A tracker selection model for augmented reality applications", "normalizedTitle": "A tracker selection model for augmented reality applications", "abstract": "Performance degradation When running augmented reality applications in wearable platforms can be greater than expected, as desktop and mobile platforms present different levels of hardware capabilities, and consequently, different performance restrictions. This work addresses the object tracking problem using a decision model that prioritizes using the least computationally intensive algorithm whenever possible. This could be achieved by analyzing different metrics regarding image interference such as occlusion and image noise. The OTS (Object Tracking SWitcher) model allows automatic switching of different trackers to balance application's performance without compromising its tracking quality. It was validated by synthetic case studies that comprise different object classes that can be tracked, focusing on augmented reality applications that can run on restricted platforms. It was possible to reach a performance improvement of a factor of three, While keeping a minimum quality defined by a reprojection error of 10 pixels when compared to the use of only the best algorithm independent of its computational cost.", "abstracts": [ { "abstractType": "Regular", "content": "Performance degradation When running augmented reality applications in wearable platforms can be greater than expected, as desktop and mobile platforms present different levels of hardware capabilities, and consequently, different performance restrictions. This work addresses the object tracking problem using a decision model that prioritizes using the least computationally intensive algorithm whenever possible. This could be achieved by analyzing different metrics regarding image interference such as occlusion and image noise. The OTS (Object Tracking SWitcher) model allows automatic switching of different trackers to balance application's performance without compromising its tracking quality. It was validated by synthetic case studies that comprise different object classes that can be tracked, focusing on augmented reality applications that can run on restricted platforms. It was possible to reach a performance improvement of a factor of three, While keeping a minimum quality defined by a reprojection error of 10 pixels when compared to the use of only the best algorithm independent of its computational cost.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Performance degradation When running augmented reality applications in wearable platforms can be greater than expected, as desktop and mobile platforms present different levels of hardware capabilities, and consequently, different performance restrictions. This work addresses the object tracking problem using a decision model that prioritizes using the least computationally intensive algorithm whenever possible. This could be achieved by analyzing different metrics regarding image interference such as occlusion and image noise. The OTS (Object Tracking SWitcher) model allows automatic switching of different trackers to balance application's performance without compromising its tracking quality. It was validated by synthetic case studies that comprise different object classes that can be tracked, focusing on augmented reality applications that can run on restricted platforms. It was possible to reach a performance improvement of a factor of three, While keeping a minimum quality defined by a reprojection error of 10 pixels when compared to the use of only the best algorithm independent of its computational cost.", "fno": "923100a453", "keywords": [ "Augmented Reality", "Image Denoising", "Mobile Computing", "Object Detection", "Object Tracking", "Tracking Quality", "Augmented Reality Applications", "Tracker Selection Model", "Performance Degradation", "Wearable Platforms", "Desktop Platforms", "Mobile Platforms", "Image Interference", "Occlusion", "Image Noise", "OTS Model", "Object Tracking Switcher", "Xenon", "6 G Mobile Communication", "Decision Model", "Object Tracking", "Augmented Reality" ], "authors": [ { "affiliation": "Universidade Federal de Pernambuco,Voxar Labs/Electronics and Systems Department,Recife,Brazil", "fullName": "João Marcelo Teixeira", "givenName": "João Marcelo", "surname": "Teixeira", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal de Pernambuco,Voxar Labs/ Informatics Center,Recife,Brazil", "fullName": "Veronica Teichneb", "givenName": "Veronica", "surname": "Teichneb", "__typename": "ArticleAuthorType" } ], "idPrefix": "svr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "453-462", "year": "2020", "issn": null, "isbn": "978-1-7281-9231-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "923100a443", "articleId": "1oZBAABYXHW", "__typename": "AdjacentArticleType" }, "next": { "fno": "923100a463", "articleId": "1oZBBL1XVcs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2009/5390/0/05336452", "title": "Vision based people tracking for ubiquitous Augmented Reality applications", "doi": null, "abstractUrl": "/proceedings-article/ismar/2009/05336452/12OmNrJRPoy", "parentPublication": { "id": "proceedings/ismar/2009/5390/0", "title": "2009 8th IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2013/4983/0/4983a226", "title": "A Markerless Augmented Reality System for Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/crv/2013/4983a226/12OmNrNh0u8", "parentPublication": { "id": "proceedings/crv/2013/4983/0", "title": "2013 International Conference on Computer and Robot Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2014/4985/0/06836012", "title": "Automatic tracker selection w.r.t object detection performance", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836012/12OmNs4S8KF", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06012118", "title": "3-D visual tracking for mobile augmented reality applications", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06012118/12OmNwGIcwp", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2003/2006/0/20060036", "title": "A real-time tracker for markerless augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2003/20060036/12OmNwNOaQp", "parentPublication": { "id": "proceedings/ismar/2003/2006/0", "title": "The Second IEEE and ACM International Symposium on Mixed and Augmented Reality, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1997/7843/0/78430146", "title": "An optical tracker for augmented reality and wearable computers", "doi": null, "abstractUrl": "/proceedings-article/vrais/1997/78430146/12OmNzaQoJJ", "parentPublication": { "id": "proceedings/vrais/1997/7843/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460077", "title": "Rectangular target extraction for mobile augmented reality applications", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460077/12OmNzd7bYZ", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilware/2013/94/0/06775047", "title": "Mobile, Collaborative Augmented Reality Using Cloudlets", "doi": null, "abstractUrl": "/proceedings-article/mobilware/2013/06775047/12OmNzzP5Iu", "parentPublication": { "id": "proceedings/mobilware/2013/94/0", "title": "2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088308", "title": "Home Automation using Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088308/1M4rH4muSoE", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412445", "title": "Mobile Augmented Reality: Fast, Precise, and Smooth Planar Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412445/1tmhttV9Xji", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmjSBS4Cbu", "doi": "10.1109/ICPR48806.2021.9412291", "title": "SynDHN: Multi-Object Fish Tracker Trained on Synthetic Underwater Videos", "normalizedTitle": "SynDHN: Multi-Object Fish Tracker Trained on Synthetic Underwater Videos", "abstract": "In this paper, we seek to extend multi-object tracking research on a relatively less explored domain, that of, underwater multi-object tracking in the wild. Multi-object fish tracking is an important task because it can provide fish monitoring systems with richer information (e.g. multiple views of the same fish) as compared to detections and it can be an invaluable input to fish behavior analysis. However, there is a lack of an annotated benchmark dataset with enough samples for this task. To circumvent the need for manual ground truth tracking annotation, we craft a synthetic dataset. Using this synthetic dataset, we train an integrated detector and tracker called SynDHN. SynDHN uses the Deep Hungarian Network (DHN), which is a differentiable approximation of the Hungarian assignment algorithm. We repurpose DHN to become the tracking component of our algorithm by performing the task of affinity estimation between detector predictions. We consider both spatial and appearance features for affinity estimation. Our results show that despite being trained on a synthetic dataset, SynDHN generalizes well to real underwater video tracking and performs better against our baseline algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we seek to extend multi-object tracking research on a relatively less explored domain, that of, underwater multi-object tracking in the wild. Multi-object fish tracking is an important task because it can provide fish monitoring systems with richer information (e.g. multiple views of the same fish) as compared to detections and it can be an invaluable input to fish behavior analysis. However, there is a lack of an annotated benchmark dataset with enough samples for this task. To circumvent the need for manual ground truth tracking annotation, we craft a synthetic dataset. Using this synthetic dataset, we train an integrated detector and tracker called SynDHN. SynDHN uses the Deep Hungarian Network (DHN), which is a differentiable approximation of the Hungarian assignment algorithm. We repurpose DHN to become the tracking component of our algorithm by performing the task of affinity estimation between detector predictions. We consider both spatial and appearance features for affinity estimation. Our results show that despite being trained on a synthetic dataset, SynDHN generalizes well to real underwater video tracking and performs better against our baseline algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we seek to extend multi-object tracking research on a relatively less explored domain, that of, underwater multi-object tracking in the wild. Multi-object fish tracking is an important task because it can provide fish monitoring systems with richer information (e.g. multiple views of the same fish) as compared to detections and it can be an invaluable input to fish behavior analysis. However, there is a lack of an annotated benchmark dataset with enough samples for this task. To circumvent the need for manual ground truth tracking annotation, we craft a synthetic dataset. Using this synthetic dataset, we train an integrated detector and tracker called SynDHN. SynDHN uses the Deep Hungarian Network (DHN), which is a differentiable approximation of the Hungarian assignment algorithm. We repurpose DHN to become the tracking component of our algorithm by performing the task of affinity estimation between detector predictions. We consider both spatial and appearance features for affinity estimation. Our results show that despite being trained on a synthetic dataset, SynDHN generalizes well to real underwater video tracking and performs better against our baseline algorithms.", "fno": "09412291", "keywords": [ "Feature Extraction", "Image Classification", "Learning Artificial Intelligence", "Object Detection", "Object Tracking", "Target Tracking", "Video Signal Processing", "Syn DHN", "Synthetic Underwater Videos", "Multiobject Tracking Research", "Relatively Less Explored Domain", "Underwater Multiobject Tracking", "Multiobject Fish Tracking", "Fish Monitoring Systems", "Richer Information", "Fish Behavior Analysis", "Annotated Benchmark Dataset", "Manual Ground Truth Tracking Annotation", "Synthetic Dataset", "Integrated Detector", "Hungarian Assignment Algorithm", "Tracking Component", "Affinity Estimation", "Underwater Video Tracking", "Deep Hungarian Network", "Multiobject Fish Tracker", "Video Tracking", "Video Sequences", "Estimation", "Detectors", "Fish", "Prediction Algorithms", "Approximation Algorithms" ], "authors": [ { "affiliation": "University of the Philippines,Department of Computer Science", "fullName": "Mygel Andrei M. Martija", "givenName": "Mygel Andrei M.", "surname": "Martija", "__typename": "ArticleAuthorType" }, { "affiliation": "University of the Philippines,Department of Computer Science", "fullName": "Prospero C. Naval", "givenName": "Prospero C.", "surname": "Naval", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "8841-8848", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412015", "articleId": "1tmiWhe1aYo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412112", "articleId": "1tmi6ZAhhtu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icess/2016/3727/0/3727a024", "title": "Target Tracking with Energy Efficiency Using Robotic Fish-based Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/icess/2016/3727a024/12OmNrFkeUS", "parentPublication": { "id": "proceedings/icess/2016/3727/0", "title": "2016 13th International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130426", "title": "Fine-grained categorization of fish motion patterns in underwater videos", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130426/12OmNrJRPmH", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvaui/2016/5870/0/5870a007", "title": "Closed-Loop Tracking-by-Detection for ROV-Based Multiple Fish Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvaui/2016/5870a007/12OmNxVlTGm", "parentPublication": { "id": "proceedings/cvaui/2016/5870/0", "title": "2016 ICPR 2nd Workshop on Computer Vision for Analysis of Underwater Imagery (CVAUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2016/2114/0/07470121", "title": "Unsupervised underwater fish detection fusing flow and objectiveness", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2016/07470121/12OmNy3iFvA", "parentPublication": { "id": "proceedings/wacvw/2016/2114/0", "title": "2016 IEEE Winter Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isai/2016/1585/0/1585a581", "title": "Research of the Fish Tracking Method with Occlusion Based on Monocular Stereo Vision", "doi": null, "abstractUrl": "/proceedings-article/isai/2016/1585a581/12OmNz4Bdsu", "parentPublication": { "id": "proceedings/isai/2016/1585/0", "title": "2016 International Conference on Information System and Artificial Intelligence (ISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760189", "title": "Fish activity tracking and species identification in underwater video", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760189/12OmNzJbR34", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2008/3456/0/3456a457", "title": "Application of the Particle Filter to Tracking of Fish in Aquaculture Research", "doi": null, "abstractUrl": "/proceedings-article/dicta/2008/3456a457/12OmNzWfoVv", "parentPublication": { "id": "proceedings/dicta/2008/3456/0", "title": "2008 Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546183", "title": "Fish Detection from Low Visibility Underwater Videos", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546183/17D45WaTkpk", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0/666700a196", "title": "An Underwater Fish Individual Recognition Method Based on Improved YoloV4 and FaceNet", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2021/666700a196/1BrAIa05LI4", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0", "title": "2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a313", "title": "Underwater Fish Detection Using Deep Learning for Water Power Applications", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a313/1gjRoetDBW8", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }