data
dict
{ "proceeding": { "id": "12OmNzvQI1T", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "acronym": "icdar", "groupId": "1000219", "volume": "1", "displayVolume": "1", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDgk", "doi": "10.1109/ICDAR.1995.599047", "title": "Automatic recognition of facility drawings and street maps utilizing the facility management database", "normalizedTitle": "Automatic recognition of facility drawings and street maps utilizing the facility management database", "abstract": "This paper proposes a new approach for inputting handwritten Distribution Facility Drawings (DFD) and their maps into a computer automatically by using the Facility Management Database (FMD). Our recognition method makes use of external information for drawing/map recognition. It identifies each electric-pole symbol and support cable symbol on drawings simply by consulting the FMD. Other symbols such as transformers and electric wires can be placed on drawings automatically. When a contradiction is unsolved due to an inconsistency between the content of the DFD and the FMD, the system requests a manual feedback from the operator. Furthermore, it uses the distribution network of the DFD to recognize the sheet lines on the maps. This can drastically reduce the cost for computerizing drawings and maps.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a new approach for inputting handwritten Distribution Facility Drawings (DFD) and their maps into a computer automatically by using the Facility Management Database (FMD). Our recognition method makes use of external information for drawing/map recognition. It identifies each electric-pole symbol and support cable symbol on drawings simply by consulting the FMD. Other symbols such as transformers and electric wires can be placed on drawings automatically. When a contradiction is unsolved due to an inconsistency between the content of the DFD and the FMD, the system requests a manual feedback from the operator. Furthermore, it uses the distribution network of the DFD to recognize the sheet lines on the maps. This can drastically reduce the cost for computerizing drawings and maps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a new approach for inputting handwritten Distribution Facility Drawings (DFD) and their maps into a computer automatically by using the Facility Management Database (FMD). Our recognition method makes use of external information for drawing/map recognition. It identifies each electric-pole symbol and support cable symbol on drawings simply by consulting the FMD. Other symbols such as transformers and electric wires can be placed on drawings automatically. When a contradiction is unsolved due to an inconsistency between the content of the DFD and the FMD, the system requests a manual feedback from the operator. Furthermore, it uses the distribution network of the DFD to recognize the sheet lines on the maps. This can drastically reduce the cost for computerizing drawings and maps.", "fno": "71280516", "keywords": [ "Electricity Supply Industry Cartography Feature Extraction Image Recognition Facility Drawings Street Maps Facility Management Database Handwritten Distribution Facility Drawings Recognition Method Map Recognition Electric Pole Symbol Support Cable Symbol" ], "authors": [ { "affiliation": "Dept. of Inf. Sci., Central Res. Inst. of Electr. Power Ind., Tokyo, Japan", "fullName": "C. Nakajima", "givenName": "C.", "surname": "Nakajima", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Inf. Sci., Central Res. Inst. of Electr. Power Ind., Tokyo, Japan", "fullName": "T. Yazawa", "givenName": "T.", "surname": "Yazawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-08-01T00:00:00", "pubType": "proceedings", "pages": "516", "year": "1995", "issn": null, "isbn": "0-8186-7128-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "71280512", "articleId": "12OmNwcCIWF", "__typename": "AdjacentArticleType" }, "next": { "fno": "71280520", "articleId": "12OmNwDj1fL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAo45Ci", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNwF0BVQ", "doi": "10.1109/ICDAR.1993.395766", "title": "Automatic lettering of cadastral maps", "normalizedTitle": "Automatic lettering of cadastral maps", "abstract": "A system for the automatic placement of names on cadastral maps, using a method which, because of its generality, can be easily applied to other types of maps is presented. The method is based on a robust algorithm that, after having detected character strings on the original paper map, encases them with rectangles, and searches for the most convenient location where to place such rectangles on the computer version of the map. The system is part of an operative package working to feed the GIS of the Italian Land Register by means of the automatic interpretation of cadastral maps. Results obtained on a sample set of more than 100 maps are reported.<>", "abstracts": [ { "abstractType": "Regular", "content": "A system for the automatic placement of names on cadastral maps, using a method which, because of its generality, can be easily applied to other types of maps is presented. The method is based on a robust algorithm that, after having detected character strings on the original paper map, encases them with rectangles, and searches for the most convenient location where to place such rectangles on the computer version of the map. The system is part of an operative package working to feed the GIS of the Italian Land Register by means of the automatic interpretation of cadastral maps. Results obtained on a sample set of more than 100 maps are reported.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A system for the automatic placement of names on cadastral maps, using a method which, because of its generality, can be easily applied to other types of maps is presented. The method is based on a robust algorithm that, after having detected character strings on the original paper map, encases them with rectangles, and searches for the most convenient location where to place such rectangles on the computer version of the map. The system is part of an operative package working to feed the GIS of the Italian Land Register by means of the automatic interpretation of cadastral maps. Results obtained on a sample set of more than 100 maps are reported.", "fno": "00395766", "keywords": [ "Cartography", "Geographic Information Systems", "Word Processing", "Automatic Lettering", "Cadastral Maps", "Automatic Placement", "Robust Algorithm", "Character Strings", "Paper Map", "Computer Version", "GIS", "Italian Land Register", "Automatic Interpretation", "Guidelines", "Labeling", "Robustness", "Packaging", "Feeds", "Registers", "Databases", "Modems", "Image Converters", "Computer Graphics" ], "authors": [ { "affiliation": "IBM SEMEA Sci. & Tech. Solution Center, Rome, Italy", "fullName": "V. Consorti", "givenName": "V.", "surname": "Consorti", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "L.P. Cordella", "givenName": "L.P.", "surname": "Cordella", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M. Iaccarino", "givenName": "M.", "surname": "Iaccarino", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "129,130,131,132", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00395765", "articleId": "12OmNwdtwb3", "__typename": "AdjacentArticleType" }, "next": { "fno": "00395767", "articleId": "12OmNya72u1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2016/1790/0/07757737", "title": "Improved method for creating criterion maps for automatic mind map analysis", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757737/12OmNASraIX", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1993/4960/0/00395594", "title": "Towards automatic evaluation of drawing analysis performance-A statistical model of cadastral map", "doi": null, "abstractUrl": "/proceedings-article/icdar/1993/00395594/12OmNApcuvH", "parentPublication": { "id": "proceedings/icdar/1993/4960/0", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2007/3038/0/30380907", "title": "Conflict Detection and Resolution in Merging of Topic Maps", "doi": null, "abstractUrl": "/proceedings-article/iccit/2007/30380907/12OmNBO3Kea", "parentPublication": { "id": "proceedings/iccit/2007/3038/0", "title": "2007 International Conference on Convergence Information Technology - ICCIT '07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2010/4271/0/4271a593", "title": "Automatic Extraction of Contour Lines from Topographic Maps", "doi": null, "abstractUrl": "/proceedings-article/dicta/2010/4271a593/12OmNqJ8tuR", "parentPublication": { "id": "proceedings/dicta/2010/4271/0", "title": "2010 International Conference on Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2008/3337/0/3337a506", "title": "Object Extraction from Colour Cadastral Maps", "doi": null, "abstractUrl": "/proceedings-article/das/2008/3337a506/12OmNwlqhLc", "parentPublication": { "id": "proceedings/das/2008/3337/0", "title": "2008 The Eighth IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2011/926/0/06115522", "title": "MapCorrect: Automatic correction and validation of road maps using public sensing", "doi": null, "abstractUrl": "/proceedings-article/lcn/2011/06115522/12OmNwxlrgo", "parentPublication": { "id": "proceedings/lcn/2011/926/0", "title": "2011 IEEE 36th Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/2000/0683/0/06830146", "title": "Layered Animation Using Displacement Maps", "doi": null, "abstractUrl": "/proceedings-article/ca/2000/06830146/12OmNx0A7Lz", "parentPublication": { "id": "proceedings/ca/2000/0683/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1995/7084/0/70840040", "title": "The use of sketch maps to measure cognitive maps of virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vrais/1995/70840040/12OmNy3RRHQ", "parentPublication": { "id": "proceedings/vrais/1995/7084/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciap/1999/0040/0/00400792", "title": "An Interpretation System for Cadastral Maps", "doi": null, "abstractUrl": "/proceedings-article/iciap/1999/00400792/12OmNyQYtvt", "parentPublication": { "id": "proceedings/iciap/1999/0040/0", "title": "Image Analysis and Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1993/4960/0/00395767", "title": "Evaluation method for an automatic map interpretation system for cadastral maps", "doi": null, "abstractUrl": "/proceedings-article/icdar/1993/00395767/12OmNya72u1", "parentPublication": { "id": "proceedings/icdar/1993/4960/0", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC42", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "acronym": "icdar", "groupId": "1000219", "volume": "2", "displayVolume": "2", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNxu6p8d", "doi": "10.1109/ICDAR.1995.602054", "title": "Recursive morphological sieve method for searching pictorial point symbols on maps", "normalizedTitle": "Recursive morphological sieve method for searching pictorial point symbols on maps", "abstract": "Point symbols on a map represent interesting and significant positional data, such as airports, ski areas and natural parks. Identification of point symbols and finding their positions are important for automatic map understanding. Point symbols on maps may partially overlap on each other. More often they are touched or connected by line symbols, and their background consists of colored and/or textured regions. In this situation, a straightforward morphological template matching method is not feasible. A new partial ordering method for aligning pictorial point symbols which is based on the relationship of K-tolerance covering and a new general method for searching pictorial point symbols on maps, the recursive morphological sieve method, are described. The main ideas of this new method include (1) finding the coverings of the kernels of a symbol instead of the symbol itself, (2) morphologically preprocessing maps to form multi-level sieves, (3) using the sieves to screen out symbol kernels, and (4) renewing sieves during a recursive screening process. This method may also be used to recognize pictorial point symbols on other types of documental files.", "abstracts": [ { "abstractType": "Regular", "content": "Point symbols on a map represent interesting and significant positional data, such as airports, ski areas and natural parks. Identification of point symbols and finding their positions are important for automatic map understanding. Point symbols on maps may partially overlap on each other. More often they are touched or connected by line symbols, and their background consists of colored and/or textured regions. In this situation, a straightforward morphological template matching method is not feasible. A new partial ordering method for aligning pictorial point symbols which is based on the relationship of K-tolerance covering and a new general method for searching pictorial point symbols on maps, the recursive morphological sieve method, are described. The main ideas of this new method include (1) finding the coverings of the kernels of a symbol instead of the symbol itself, (2) morphologically preprocessing maps to form multi-level sieves, (3) using the sieves to screen out symbol kernels, and (4) renewing sieves during a recursive screening process. This method may also be used to recognize pictorial point symbols on other types of documental files.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point symbols on a map represent interesting and significant positional data, such as airports, ski areas and natural parks. Identification of point symbols and finding their positions are important for automatic map understanding. Point symbols on maps may partially overlap on each other. More often they are touched or connected by line symbols, and their background consists of colored and/or textured regions. In this situation, a straightforward morphological template matching method is not feasible. A new partial ordering method for aligning pictorial point symbols which is based on the relationship of K-tolerance covering and a new general method for searching pictorial point symbols on maps, the recursive morphological sieve method, are described. The main ideas of this new method include (1) finding the coverings of the kernels of a symbol instead of the symbol itself, (2) morphologically preprocessing maps to form multi-level sieves, (3) using the sieves to screen out symbol kernels, and (4) renewing sieves during a recursive screening process. This method may also be used to recognize pictorial point symbols on other types of documental files.", "fno": "71280931", "keywords": [ "Cartography Document Image Processing Edge Detection Image Segmentation Identification Recursive Morphological Sieve Method Pictorial Point Symbol Searching Maps Positional Data Point Symbol Identification Automatic Map Understanding Line Symbols Colored Regions Textured Regions Morphological Template Matching Method Partial Ordering Method K Tolerance Covering Symbol Kernel Covering Morphologically Preprocessed Maps Multi Level Sieves Screened Out Symbol Kernels Sieve Renewal Recursive Screening Process Pictorial Point Symbol Recognition Documental Files" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Memorial Univ. of Newfoundland, St. John's, Nfld., Canada", "fullName": "J.S. Shieh", "givenName": "J.S.", "surname": "Shieh", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-08-01T00:00:00", "pubType": "proceedings", "pages": "931", "year": "1995", "issn": null, "isbn": "0-8186-7128-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "71280927", "articleId": "12OmNxdDFIM", "__typename": "AdjacentArticleType" }, "next": { "fno": "71280936", "articleId": "12OmNvAiSxS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1fw1qqGBsGI", "title": "2019 6th International Conference on Computational Science/Intelligence and Applied Informatics (CSII)", "acronym": "csii", "groupId": "1833666", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fw1r9isS7m", "doi": "10.1109/CSII.2019.00018", "title": "Map Creations with OpenStreetMap for RoboCupRescue Simulation", "normalizedTitle": "Map Creations with OpenStreetMap for RoboCupRescue Simulation", "abstract": "In this paper, we discuss map creation for the RoboCupRescue Simulation (RRS) disaster relief simulator, which is a multi-agent testbed for representing large-scale natural urban disasters and rescue activities. The RRS needs map data for various regions because this is important for the disaster relief simulator to enable simulations in these regions. However, RRS currently only provides a few maps because its map creation tool is not adequate for creating the maps of various regions. Therefore, we investigated the reason for the tool being inadequate and we propose a new map creation tool for the RRS based on the results of our investigation. Finally, we confirmed the effectiveness of the tool with many created maps.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we discuss map creation for the RoboCupRescue Simulation (RRS) disaster relief simulator, which is a multi-agent testbed for representing large-scale natural urban disasters and rescue activities. The RRS needs map data for various regions because this is important for the disaster relief simulator to enable simulations in these regions. However, RRS currently only provides a few maps because its map creation tool is not adequate for creating the maps of various regions. Therefore, we investigated the reason for the tool being inadequate and we propose a new map creation tool for the RRS based on the results of our investigation. Finally, we confirmed the effectiveness of the tool with many created maps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we discuss map creation for the RoboCupRescue Simulation (RRS) disaster relief simulator, which is a multi-agent testbed for representing large-scale natural urban disasters and rescue activities. The RRS needs map data for various regions because this is important for the disaster relief simulator to enable simulations in these regions. However, RRS currently only provides a few maps because its map creation tool is not adequate for creating the maps of various regions. Therefore, we investigated the reason for the tool being inadequate and we propose a new map creation tool for the RRS based on the results of our investigation. Finally, we confirmed the effectiveness of the tool with many created maps.", "fno": "255300a060", "keywords": [ "Buildings", "Tools", "Roads", "Face", "Shape", "Information Science", "Data Models", "Artificial Intelligence", "Multi Agent System", "Robo Cup Rescue Simulation", "Open Street Map" ], "authors": [ { "affiliation": "Aichi Institute of Technology", "fullName": "Yusuke Hosoya", "givenName": "Yusuke", "surname": "Hosoya", "__typename": "ArticleAuthorType" }, { "affiliation": "Aichi Institute of Technology", "fullName": "Haruaki Ueda", "givenName": "Haruaki", "surname": "Ueda", "__typename": "ArticleAuthorType" }, { "affiliation": "Aichi Institute of Technology", "fullName": "Nobuhiro Ito", "givenName": "Nobuhiro", "surname": "Ito", "__typename": "ArticleAuthorType" }, { "affiliation": "Aichi University", "fullName": "Kazunori Iwata", "givenName": "Kazunori", "surname": "Iwata", "__typename": "ArticleAuthorType" } ], "idPrefix": "csii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "60-65", "year": "2019", "issn": null, "isbn": "978-1-7281-2553-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "255300a056", "articleId": "1fw1rfVu2sM", "__typename": "AdjacentArticleType" }, "next": { "fno": "255300a066", "articleId": "1fw1rjeqqnm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670a188", "title": "Potential of Collaborative Mapping for Disaster Relief: A Case Study of OpenStreetMap in the Nepal Earthquake 2015", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a188/12OmNB8kHQc", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1988/0878/0/00028282", "title": "Representing a global map for a mobile robot with relational local maps from sensory data", "doi": null, "abstractUrl": "/proceedings-article/icpr/1988/00028282/12OmNxdm4Ax", "parentPublication": { "id": "proceedings/icpr/1988/0878/0", "title": "9th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2018/4705/0/470501a270", "title": "WiP: Personalizing Focus Area in Map-Based Applications", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2018/470501a270/12OmNzICEFM", "parentPublication": { "id": "proceedings/smartcomp/2018/4705/0", "title": "2018 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/09/06774478", "title": "Drawing Road Networks with Mental Maps", "doi": null, "abstractUrl": "/journal/tg/2014/09/06774478/13rRUwbs2b5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2016/03/07084117", "title": "Privacy-Aware High-Quality Map Generation with Participatory Sensing", "doi": null, "abstractUrl": "/journal/tm/2016/03/07084117/13rRUynHujK", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a367", "title": "Machine Learning Assisted High-Definition Map Creation", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a367/17D45VsBTZN", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2022/5176/0/517600a230", "title": "A Geospatial Method for Detecting Map-Based Road Segment Discrepancies", "doi": null, "abstractUrl": "/proceedings-article/mdm/2022/517600a230/1G89KdgyIgw", "parentPublication": { "id": "proceedings/mdm/2022/5176/0", "title": "2022 23rd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b715", "title": "Topological Map Extraction From Overhead Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b715/1hVlkVtuWfS", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600a472", "title": "Post Disaster Mapping With Semantic Change Detection in Satellite Imagery", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600a472/1iTviuHuOSA", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232519", "title": "Procedural Generation of Roads with Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232519/1o56z7a1pK0", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbvyRDjQ4", "doi": "10.1109/WACV45572.2020.9093617", "title": "Actor Conditioned Attention Maps for Video Action Detection", "normalizedTitle": "Actor Conditioned Attention Maps for Video Action Detection", "abstract": "While observing complex events with multiple actors, humans do not assess each actor separately, but infer from the context. The surrounding context provides essential information for understanding actions. To this end, we propose to replace region of interest(RoI) pooling with an attention module, which ranks each spatio-temporal region's relevance to a detected actor instead of cropping. We refer to these as Actor-Conditioned Attention Maps (ACAM), which amplify/dampen the features extracted from the entire scene. The resulting actor-conditioned features focus the model on regions that are relevant to the conditioned actor. For actor localization, we leverage pre-trained object detectors, which transfer better. The proposed model is efficient and our action detection pipeline achieves near real-time performance. Experimental results on AVA 2.1 and JHMDB demonstrate the effectiveness of attention maps, with improvements of 7 mAP on AVA and 4 mAP on JHMDB.", "abstracts": [ { "abstractType": "Regular", "content": "While observing complex events with multiple actors, humans do not assess each actor separately, but infer from the context. The surrounding context provides essential information for understanding actions. To this end, we propose to replace region of interest(RoI) pooling with an attention module, which ranks each spatio-temporal region's relevance to a detected actor instead of cropping. We refer to these as Actor-Conditioned Attention Maps (ACAM), which amplify/dampen the features extracted from the entire scene. The resulting actor-conditioned features focus the model on regions that are relevant to the conditioned actor. For actor localization, we leverage pre-trained object detectors, which transfer better. The proposed model is efficient and our action detection pipeline achieves near real-time performance. Experimental results on AVA 2.1 and JHMDB demonstrate the effectiveness of attention maps, with improvements of 7 mAP on AVA and 4 mAP on JHMDB.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While observing complex events with multiple actors, humans do not assess each actor separately, but infer from the context. The surrounding context provides essential information for understanding actions. To this end, we propose to replace region of interest(RoI) pooling with an attention module, which ranks each spatio-temporal region's relevance to a detected actor instead of cropping. We refer to these as Actor-Conditioned Attention Maps (ACAM), which amplify/dampen the features extracted from the entire scene. The resulting actor-conditioned features focus the model on regions that are relevant to the conditioned actor. For actor localization, we leverage pre-trained object detectors, which transfer better. The proposed model is efficient and our action detection pipeline achieves near real-time performance. Experimental results on AVA 2.1 and JHMDB demonstrate the effectiveness of attention maps, with improvements of 7 mAP on AVA and 4 mAP on JHMDB.", "fno": "09093617", "keywords": [ "Feature Extraction", "Object Detection", "Video Signal Processing", "Actor Localization", "Actor Conditioned Attention Maps", "Video Action Detection", "Attention Module", "Spatio Temporal Region", "Actor Conditioned Attention Maps", "Actor Conditioned Features", "Pre Trained Object Detectors", "AVA 2 1", "JHMDB", "Region Of Interest", "Feature Extraction", "Context Modeling", "Task Analysis", "Shape", "Detectors", "Pipelines", "Three Dimensional Displays" ], "authors": [ { "affiliation": "University of California,Santa Barbara", "fullName": "Oytun Ulutan", "givenName": "Oytun", "surname": "Ulutan", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM T. J. Watson Research Centre", "fullName": "Swati Rallapalli", "givenName": "Swati", "surname": "Rallapalli", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM T. J. Watson Research Centre", "fullName": "Mudhakar Srivatsa", "givenName": "Mudhakar", "surname": "Srivatsa", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Santa Barbara", "fullName": "Carlos Torres", "givenName": "Carlos", "surname": "Torres", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Santa Barbara", "fullName": "B.S. Manjunath", "givenName": "B.S.", "surname": "Manjunath", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "516-525", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093612", "articleId": "1jPbcxnMhH2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093263", "articleId": "1jPbjRBFbBS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacvw/2022/5824/0/582400a122", "title": "GabriellaV2: Towards better generalization in surveillance videos for Action Detection", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2022/582400a122/1B12tFgF1pm", "parentPublication": { "id": "proceedings/wacvw/2022/5824/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0965", "title": "Action-Conditioned 3D Human Motion Synthesis with Transformer VAE", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0965/1BmIZHGnurS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i158", "title": "Watch Only Once: An End-to-End Video Action Detection Framework", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i158/1BmKOdJmWl2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f575", "title": "HyperDet3D: Learning a Scene-conditioned 3D Object Detector", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f575/1H1iqIa1jxu", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600n3588", "title": "TubeR: Tubelet Transformer for Video Action Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3588/1H1lPpG9w08", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f998", "title": "Spatio-Temporal Action Detection Under Large Motion", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f998/1KxVKv2WXUk", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/9.346E294", "title": "DSAG: A Scalable Deep Framework for Action-Conditioned Multi-Actor Full Body Motion Synthesis", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/9.346E294/1L8qhSqpWrS", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300d938", "title": "Asymmetric Cross-Guided Attention Network for Actor and Action Video Segmentation From Natural Language Query", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300d938/1hVlfZJOfZu", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800b006", "title": "Weakly-Supervised Action Localization by Generative Attention Modeling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800b006/1m3o24SCQ00", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a464", "title": "Actor-Context-Actor Relation Network for Spatio-Temporal Action Localization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a464/1yeIy7MBYYg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbDd", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "acronym": "acsat", "groupId": "1802667", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBCqbDK", "doi": "10.1109/ACSAT.2013.52", "title": "3D Mobile Map Visualization Concept for Remote Rendered Dataset", "normalizedTitle": "3D Mobile Map Visualization Concept for Remote Rendered Dataset", "abstract": "Three-dimension (3D) maps visualization concept for mobile devices which can be used for navigation aid comes in to being as a result of the weakness perceived with the two dimension (2D) map. The representation of scene in 2D map is generally limited and lack interaction with the users. The interaction of 2D map is limited to the interpretation of symbols explained in the legend which not every user knows how to use efficiently. 3D map, on the other hand, is able to produce a realistic scene. 3D map delivered to mobile device through remote rendering will serves as a navigation aid. Unfortunately, visualization of 3D map in mobile devices is faced with a huge drawbacks when considering the small screen size mobile device and with low computing resources. This paper survey the optimum remote rendered techniques used for 3D visualization on mobile devices and provide a prototype of 3D mobile map that will be suitable as navigation aid. The 3D map that this paper is considering is different from the manipulated static aerial photo-realistic images that gives the illusion of 3D presentation.", "abstracts": [ { "abstractType": "Regular", "content": "Three-dimension (3D) maps visualization concept for mobile devices which can be used for navigation aid comes in to being as a result of the weakness perceived with the two dimension (2D) map. The representation of scene in 2D map is generally limited and lack interaction with the users. The interaction of 2D map is limited to the interpretation of symbols explained in the legend which not every user knows how to use efficiently. 3D map, on the other hand, is able to produce a realistic scene. 3D map delivered to mobile device through remote rendering will serves as a navigation aid. Unfortunately, visualization of 3D map in mobile devices is faced with a huge drawbacks when considering the small screen size mobile device and with low computing resources. This paper survey the optimum remote rendered techniques used for 3D visualization on mobile devices and provide a prototype of 3D mobile map that will be suitable as navigation aid. The 3D map that this paper is considering is different from the manipulated static aerial photo-realistic images that gives the illusion of 3D presentation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Three-dimension (3D) maps visualization concept for mobile devices which can be used for navigation aid comes in to being as a result of the weakness perceived with the two dimension (2D) map. The representation of scene in 2D map is generally limited and lack interaction with the users. The interaction of 2D map is limited to the interpretation of symbols explained in the legend which not every user knows how to use efficiently. 3D map, on the other hand, is able to produce a realistic scene. 3D map delivered to mobile device through remote rendering will serves as a navigation aid. Unfortunately, visualization of 3D map in mobile devices is faced with a huge drawbacks when considering the small screen size mobile device and with low computing resources. This paper survey the optimum remote rendered techniques used for 3D visualization on mobile devices and provide a prototype of 3D mobile map that will be suitable as navigation aid. The 3D map that this paper is considering is different from the manipulated static aerial photo-realistic images that gives the illusion of 3D presentation.", "fno": "2758a228", "keywords": [ "Three Dimensional Displays", "Navigation", "Mobile Handsets", "Solid Modeling", "Rendering Computer Graphics", "Androids", "Humanoid Robots", "Remote Rendering", "3 D Map", "2 D Map", "Visualisation" ], "authors": [ { "affiliation": null, "fullName": "Adamu Abubakar", "givenName": "Adamu", "surname": "Abubakar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Akram M. Zeki", "givenName": "Akram M.", "surname": "Zeki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Haruna Chiroma", "givenName": "Haruna", "surname": "Chiroma", "__typename": "ArticleAuthorType" } ], "idPrefix": "acsat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "228-231", "year": "2013", "issn": null, "isbn": "978-1-4799-2758-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2758a223", "articleId": "12OmNrJAe9A", "__typename": "AdjacentArticleType" }, "next": { "fno": "2758a232", "articleId": "12OmNz2kqeC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2015/7660/0/7660a210", "title": "[POSTER] Photo Billboarding: A Simple Method to Provide Clues that Relate Camera Views and a 2D Map for Mobile Pedestrian Navigation", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a210/12OmNAgY7og", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a262", "title": "Transfer Function Map", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a262/12OmNC1Guj1", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550211", "title": "Poster: Virtual reality interaction using mobile devices", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550211/12OmNqC2uX0", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2005/2378/0/23780059", "title": "The Interactive 3D BreakAway Map: A navigation and examination aid for multi-floor 3D worlds", "doi": null, "abstractUrl": "/proceedings-article/cw/2005/23780059/12OmNqJHFJ7", "parentPublication": { "id": "proceedings/cw/2005/2378/0", "title": "2005 International Conference on Cyberworlds (CW'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2018/2290/0/08343267", "title": "Immersive gesture interfaces for 3D map navigation in HMD-based virtual environments", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343267/12OmNvD8Rwt", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nooric/2013/2823/0/2823a190", "title": "NOOR eMashaf Application for Android-Based Tablets: Concept and Design", "doi": null, "abstractUrl": "/proceedings-article/nooric/2013/2823a190/12OmNwfKj9K", "parentPublication": { "id": "proceedings/nooric/2013/2823/0", "title": "2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2013/3218/0/06778630", "title": "Applied Research on Mobile Tourism Scenic Spots Integrated System Based on Android", "doi": null, "abstractUrl": "/proceedings-article/wisa/2013/06778630/12OmNwoxShh", "parentPublication": { "id": "proceedings/wisa/2013/3218/0", "title": "2013 10th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nooric/2013/2823/0/2823a194", "title": "Feature Analysis of Android-Based Holy Quran Applications", "doi": null, "abstractUrl": "/proceedings-article/nooric/2013/2823a194/12OmNx3q6Y3", "parentPublication": { "id": "proceedings/nooric/2013/2823/0", "title": "2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a232", "title": "Optimizing Three-Dimensional (3D) Map View on Mobile Devices as Navigation Aids Using Artificial Neural Network", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a232/12OmNz2kqeC", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2014/6036/0/6036a064", "title": "Navigating in Signal Space: A Crowd-Sourced Sensing Map Construction for Navigation", "doi": null, "abstractUrl": "/proceedings-article/mass/2014/6036a064/12OmNzGDsIR", "parentPublication": { "id": "proceedings/mass/2014/6036/0", "title": "2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAndii4", "title": "2010 IEEE Second International Conference on Cloud Computing Technology and Science", "acronym": "cloudcom", "groupId": "1800284", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBSBk6J", "doi": "10.1109/CloudCom.2010.46", "title": "An Interface Design for Future Cloud-Based Visualization Services", "normalizedTitle": "An Interface Design for Future Cloud-Based Visualization Services", "abstract": "The pervasive concept of cloud computing suggests that visualization, which is both data and computing intensive, is a perfect cloud computing application. This paper presents a sketch of an interface design for an online visualization service. To make such a service attractive to a wider audience, its user interface must be simple and easy to use for both casual and expert users. We envision an interface that supports visualization processes mainly directed by browsing and assessing existing visualizations in terms of images and videos will be very appealing to, in particular, casual users. That is, the aim is to maximize the utilization of the rich visualization data on the web. Without losing generality, we consider volume data visualization applications for our interface design. We also discuss issues in organizing online visualization data, and constructing and managing a rendering cloud.", "abstracts": [ { "abstractType": "Regular", "content": "The pervasive concept of cloud computing suggests that visualization, which is both data and computing intensive, is a perfect cloud computing application. This paper presents a sketch of an interface design for an online visualization service. To make such a service attractive to a wider audience, its user interface must be simple and easy to use for both casual and expert users. We envision an interface that supports visualization processes mainly directed by browsing and assessing existing visualizations in terms of images and videos will be very appealing to, in particular, casual users. That is, the aim is to maximize the utilization of the rich visualization data on the web. Without losing generality, we consider volume data visualization applications for our interface design. We also discuss issues in organizing online visualization data, and constructing and managing a rendering cloud.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The pervasive concept of cloud computing suggests that visualization, which is both data and computing intensive, is a perfect cloud computing application. This paper presents a sketch of an interface design for an online visualization service. To make such a service attractive to a wider audience, its user interface must be simple and easy to use for both casual and expert users. We envision an interface that supports visualization processes mainly directed by browsing and assessing existing visualizations in terms of images and videos will be very appealing to, in particular, casual users. That is, the aim is to maximize the utilization of the rich visualization data on the web. Without losing generality, we consider volume data visualization applications for our interface design. We also discuss issues in organizing online visualization data, and constructing and managing a rendering cloud.", "fno": "4302a609", "keywords": [ "Cloud Computing", "Online Visualization", "Web User Interface", "Example Based Visualization" ], "authors": [ { "affiliation": null, "fullName": "Yuzuru Tanahashi", "givenName": "Yuzuru", "surname": "Tanahashi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cheng-Kai Chen", "givenName": "Cheng-Kai", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stéphane Marchesin", "givenName": "Stéphane", "surname": "Marchesin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "cloudcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-11-01T00:00:00", "pubType": "proceedings", "pages": "609-613", "year": "2010", "issn": null, "isbn": "978-0-7695-4302-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4302a603", "articleId": "12OmNyaGeGP", "__typename": "AdjacentArticleType" }, "next": { "fno": "4302a614", "articleId": "12OmNz61dkX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/etcs/2009/3557/1/3557b096", "title": "Study on XML Based Visualization Interface for Engineering Data", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557b096/12OmNBCqbzH", "parentPublication": { "id": "proceedings/etcs/2009/3557/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi-t/2012/4830/0/4830a021", "title": "Cloud and Mobile Web-Based Graphics and Visualization", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi-t/2012/4830a021/12OmNvAiSbv", "parentPublication": { "id": "proceedings/sibgrapi-t/2012/4830/0", "title": "2012 25th SIBGRAPI Conference on Graphics, Patterns and Images Tutorials", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2009/3745/1/3745a063", "title": "Visualization User Interface for Decision Support Systems", "doi": null, "abstractUrl": "/proceedings-article/his/2009/3745a063/12OmNvjyy2U", "parentPublication": { "id": "proceedings/his/2009/3745/1", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682154", "title": "Visualization Services for Multidisciplinary Experiments on Cloud-Based Virtual Educational Platform", "doi": null, "abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682154/12OmNwDAC4u", "parentPublication": { "id": "proceedings/greencom-ithingscpscom/2013/5046/0", "title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ihmsc/2009/3752/2/3752b262", "title": "Human-Machine Interface: Design Principles of Visual Information in Human-Machine Interface Design", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2009/3752b262/12OmNwIHosD", "parentPublication": { "id": "proceedings/ihmsc/2009/3752/1", "title": "2009 International Conference on Intelligent Human-Machine Systems and Cybernetics. IHMSC 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780007", "title": "A Spreadsheet Interface for Visualization Exploration", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780007/12OmNxEjXXr", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2017/1003/0/1003a139", "title": "A Conversational User Interface for Software Visualization", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2017/1003a139/12OmNxdm4sz", "parentPublication": { "id": "proceedings/vissoft/2017/1003/0", "title": "2017 IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ozchi/1998/9206/0/92060200", "title": "Integrating Metric Visualization into a Commercial User-Interface Builder", "doi": null, "abstractUrl": "/proceedings-article/ozchi/1998/92060200/12OmNyuPLbI", "parentPublication": { "id": "proceedings/ozchi/1998/9206/0", "title": "Computer-Human Interaction, Australasian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2001/03/v0275", "title": "Visualization Exploration and Encapsulation via a Spreadsheet-Like Interface", "doi": null, "abstractUrl": "/journal/tg/2001/03/v0275/13rRUwdIOUB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx7ouUM", "title": "2013 International Conference on Computational and Information Sciences", "acronym": "iccis", "groupId": "1800262", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNs0kyF4", "doi": "10.1109/ICCIS.2013.33", "title": "Selecting Visualization Web Services Based on Visualization Characteristics", "normalizedTitle": "Selecting Visualization Web Services Based on Visualization Characteristics", "abstract": "Large numbers of visualization services exist in Web, which promote service discovery problems for those who perform visualization tasks. An approach to visualization services selection based on visualization characteristics is proposed in this paper. Firstly, an architecture to discover services in visualization domain is proposed. Secondly, a novel algorithm of visualization services selection based on visualization characteristics is discussed. Finally, a case study is given to review the availability of the algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Large numbers of visualization services exist in Web, which promote service discovery problems for those who perform visualization tasks. An approach to visualization services selection based on visualization characteristics is proposed in this paper. Firstly, an architecture to discover services in visualization domain is proposed. Secondly, a novel algorithm of visualization services selection based on visualization characteristics is discussed. Finally, a case study is given to review the availability of the algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large numbers of visualization services exist in Web, which promote service discovery problems for those who perform visualization tasks. An approach to visualization services selection based on visualization characteristics is proposed in this paper. Firstly, an architecture to discover services in visualization domain is proposed. Secondly, a novel algorithm of visualization services selection based on visualization characteristics is discussed. Finally, a case study is given to review the availability of the algorithm.", "fno": "5004a094", "keywords": [ "Data Visualization", "Quality Of Service", "Semantics", "Ontologies", "Data Models", "Filtering", "Web Services", "Qo S", "Visualization", "Web Service Selection", "Semantic Web Service" ], "authors": [ { "affiliation": null, "fullName": "Gao Shu", "givenName": "Gao", "surname": "Shu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fan Xin", "givenName": "Fan", "surname": "Xin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu Chang Jun", "givenName": "Yu Chang", "surname": "Jun", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-06-01T00:00:00", "pubType": "proceedings", "pages": "94-97", "year": "2013", "issn": null, "isbn": "978-0-7695-5004-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5004a090", "articleId": "12OmNscxj7t", "__typename": "AdjacentArticleType" }, "next": { "fno": "5004a098", "articleId": "12OmNvAiSeK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2014/5054/0/5054a680", "title": "Fast Selection of Web Services with QoS Using a Distributed Parallel Semantic Approach", "doi": null, "abstractUrl": "/proceedings-article/icws/2014/5054a680/12OmNAObbIm", "parentPublication": { "id": "proceedings/icws/2014/5054/0", "title": "2014 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2017/2005/0/2005a233", "title": "QoS Aware Service Clustering to Bootstrap the Web Service Selection", "doi": null, "abstractUrl": "/proceedings-article/scc/2017/2005a233/12OmNAoDi6S", "parentPublication": { "id": "proceedings/scc/2017/2005/0", "title": "2017 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2013/5026/0/5026a089", "title": "Clustering and Spherical Visualization of Web Services", "doi": null, "abstractUrl": "/proceedings-article/scc/2013/5026a089/12OmNBkP3Bn", "parentPublication": { "id": "proceedings/scc/2013/5026/0", "title": "2013 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/alpit/2008/3273/0/3273a491", "title": "Composite Services Discovery Based on QoS", "doi": null, "abstractUrl": "/proceedings-article/alpit/2008/3273a491/12OmNCcKQjZ", "parentPublication": { "id": "proceedings/alpit/2008/3273/0", "title": "Advanced Language Processing and Web Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2008/3380/0/04736733", "title": "A Web Services Architecture for Visualization", "doi": null, "abstractUrl": "/proceedings-article/e-science/2008/04736733/12OmNqGRGko", "parentPublication": { "id": "proceedings/e-science/2008/3380/0", "title": "2008 IEEE Fourth International Conference on eScience", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2012/4756/0/4756a330", "title": "Visualization of Real-World Web Services Based on Fuzzy Logic", "doi": null, "abstractUrl": "/proceedings-article/services/2012/4756a330/12OmNwHz06M", "parentPublication": { "id": "proceedings/services/2012/4756/0", "title": "2012 IEEE Eighth World Congress on Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2009/5338/0/05394121", "title": "Selecting Web services based on past user experiences", "doi": null, "abstractUrl": "/proceedings-article/apscc/2009/05394121/12OmNwNeYBy", "parentPublication": { "id": "proceedings/apscc/2009/5338/0", "title": "2009 IEEE Asia-Pacific Services Computing Conference (APSCC 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2017/2005/0/2005a100", "title": "Selecting Green Data Mining Services", "doi": null, "abstractUrl": "/proceedings-article/scc/2017/2005a100/12OmNx3ZjeF", "parentPublication": { "id": "proceedings/scc/2017/2005/0", "title": "2017 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2013/5025/0/5025a075", "title": "Selecting Top-k Composite Web Services Using Preference-Aware Dominance Relationship", "doi": null, "abstractUrl": "/proceedings-article/icws/2013/5025a075/12OmNzvz6LM", "parentPublication": { "id": "proceedings/icws/2013/5025/0", "title": "2013 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2004/04/x4042", "title": "Filtering and Selecting Semantic Web Services with Interactive Composition Techniques", "doi": null, "abstractUrl": "/magazine/ex/2004/04/x4042/13rRUyZaxuI", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRcV", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNy314jP", "doi": "10.1109/INFVIS.2000.885095", "title": "From Metaphor to Method: Cartographic Perspectives on Information Visualization", "normalizedTitle": "From Metaphor to Method: Cartographic Perspectives on Information Visualization", "abstract": "By virtue of their spatio-cognitive abilities, humans are able to navigate through geographic space as well as meaningfully communicate geographic information represented in cartographic form. The current dominance of spatial metaphors in information visualization research is the result of the realization that those cognitive skills also have value in the exploration and analysis of non-geographic information. While mapping or landscape metaphors are routinely used in this field, there is a noticeable lack of consideration for existing cartographic expertise. This is especially apparent whenever problematic issues are encountered, such as graphic complexity or feature labeling. There are a number of areas in which a cartographic outlook could provide a valuable perspective. This paper discusses how geographic and cartographic notions may influence the design of visualizations for textual information spaces. Map projections, generalization, feature labeling and map design issues are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "By virtue of their spatio-cognitive abilities, humans are able to navigate through geographic space as well as meaningfully communicate geographic information represented in cartographic form. The current dominance of spatial metaphors in information visualization research is the result of the realization that those cognitive skills also have value in the exploration and analysis of non-geographic information. While mapping or landscape metaphors are routinely used in this field, there is a noticeable lack of consideration for existing cartographic expertise. This is especially apparent whenever problematic issues are encountered, such as graphic complexity or feature labeling. There are a number of areas in which a cartographic outlook could provide a valuable perspective. This paper discusses how geographic and cartographic notions may influence the design of visualizations for textual information spaces. Map projections, generalization, feature labeling and map design issues are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "By virtue of their spatio-cognitive abilities, humans are able to navigate through geographic space as well as meaningfully communicate geographic information represented in cartographic form. The current dominance of spatial metaphors in information visualization research is the result of the realization that those cognitive skills also have value in the exploration and analysis of non-geographic information. While mapping or landscape metaphors are routinely used in this field, there is a noticeable lack of consideration for existing cartographic expertise. This is especially apparent whenever problematic issues are encountered, such as graphic complexity or feature labeling. There are a number of areas in which a cartographic outlook could provide a valuable perspective. This paper discusses how geographic and cartographic notions may influence the design of visualizations for textual information spaces. Map projections, generalization, feature labeling and map design issues are discussed.", "fno": "08040091", "keywords": [ "Information Visualization", "Cartography", "Cartographic Generalization", "Feature Labeling", "Maps" ], "authors": [ { "affiliation": "University of New Orleans", "fullName": "André Skupin", "givenName": "André", "surname": "Skupin", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "91", "year": "2000", "issn": "1522-404X", "isbn": "0-7695-0804-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08040085", "articleId": "12OmNB0nW9E", "__typename": "AdjacentArticleType" }, "next": { "fno": "08040099", "articleId": "12OmNBp52vU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtpCV4eGI", "doi": "10.1109/PacificVis52677.2021.00024", "title": "Unravelling the Human Perspective and Considerations for Urban Data Visualization", "normalizedTitle": "Unravelling the Human Perspective and Considerations for Urban Data Visualization", "abstract": "Effective use of data is an essential asset to modern cities. Visualization as a tool for analysis, exploration, and communication has become a driving force in the task of unravelling our complex urban fabrics. This paper outlines the findings from a series of three workshops from 2018-2020 bringing together experts in urban data visualization with the aim of exploring multidisciplinary perspectives from the human-centric lens. Based on the rich and detailed workshop discussions identifying challenges and opportunities for urban data visualization research, we outline major human-centric themes and considerations fundamental for CityVis design and introduce a framework for an urban visualization design space.", "abstracts": [ { "abstractType": "Regular", "content": "Effective use of data is an essential asset to modern cities. Visualization as a tool for analysis, exploration, and communication has become a driving force in the task of unravelling our complex urban fabrics. This paper outlines the findings from a series of three workshops from 2018-2020 bringing together experts in urban data visualization with the aim of exploring multidisciplinary perspectives from the human-centric lens. Based on the rich and detailed workshop discussions identifying challenges and opportunities for urban data visualization research, we outline major human-centric themes and considerations fundamental for CityVis design and introduce a framework for an urban visualization design space.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Effective use of data is an essential asset to modern cities. Visualization as a tool for analysis, exploration, and communication has become a driving force in the task of unravelling our complex urban fabrics. This paper outlines the findings from a series of three workshops from 2018-2020 bringing together experts in urban data visualization with the aim of exploring multidisciplinary perspectives from the human-centric lens. Based on the rich and detailed workshop discussions identifying challenges and opportunities for urban data visualization research, we outline major human-centric themes and considerations fundamental for CityVis design and introduce a framework for an urban visualization design space.", "fno": "393100a126", "keywords": [ "Data Visualisation", "Geographic Information Systems", "Object Oriented Programming", "Town And Country Planning", "Rich Workshop Discussions", "Human Centric Lens", "Multidisciplinary Perspectives", "Complex Urban Fabrics", "Modern Cities", "Essential Asset", "Human Perspective", "Urban Visualization Design Space", "Human Centric Themes", "Urban Data Visualization Research", "Detailed Workshop Discussions", "Design Methodology", "Conferences", "Urban Areas", "Force", "Data Visualization", "Tools", "Fabrics", "Human Centered Computing", "Interaction Design", "Interaction Design Process And Methods", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Monash University", "fullName": "Sarah Goodwin", "givenName": "Sarah", "surname": "Goodwin", "__typename": "ArticleAuthorType" }, { "affiliation": "HafenCity University", "fullName": "Sebastian Meier", "givenName": "Sebastian", "surname": "Meier", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Lyn Bartram", "givenName": "Lyn", "surname": "Bartram", "__typename": "ArticleAuthorType" }, { "affiliation": "American University", "fullName": "Alex Godwin", "givenName": "Alex", "surname": "Godwin", "__typename": "ArticleAuthorType" }, { "affiliation": "Mannheim University of Applied Sciences", "fullName": "Till Nagel", "givenName": "Till", "surname": "Nagel", "__typename": "ArticleAuthorType" }, { "affiliation": "Potsdam University of Applied Sciences", "fullName": "Marian Dörk", "givenName": "Marian", "surname": "Dörk", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "126-130", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a116", "articleId": "1tTtryPJTyw", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a131", "articleId": "1tTtqpZY94k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2015/3854/0/07403617", "title": "A comparative evaluation of urban fabric detection techniques based on mobile traffic data", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403617/12OmNBscCVV", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2016/2833/0/2833a001", "title": "Mobile Traffic Data Decomposition for Understanding Human Urban Activities", "doi": null, "abstractUrl": "/proceedings-article/mass/2016/2833a001/12OmNBtCCIW", "parentPublication": { "id": "proceedings/mass/2016/2833/0", "title": "2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ciis/2017/3886/0/3886a283", "title": "Multi-scale Politics Analysis on Urban Function Area Human Mobility", "doi": null, "abstractUrl": "/proceedings-article/ciis/2017/3886a283/12OmNvrMUfa", "parentPublication": { "id": "proceedings/ciis/2017/3886/0", "title": "2017 International Conference on Computing Intelligence and Information System (CIIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/05/mcg2018050026", "title": "Spatio-Temporal Urban Data Analysis: A Visual Analytics Perspective", "doi": null, "abstractUrl": "/magazine/cg/2018/05/mcg2018050026/13WBGTItFGV", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2016/03/07506246", "title": "Visual Analytics in Urban Computing: An Overview", "doi": null, "abstractUrl": "/journal/bd/2016/03/07506246/13rRUB6SpUe", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/07/07208899", "title": "Interactive Urban Context-Aware Visualization via Multiple Disocclusion Operators", "doi": null, "abstractUrl": "/journal/tg/2016/07/07208899/13rRUxC0SEj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2017/10/07779102", "title": "A Tale of Ten Cities: Characterizing Signatures of Mobile Traffic in Urban Areas", "doi": null, "abstractUrl": "/journal/tm/2017/10/07779102/13rRUyYSWtu", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222248", "title": "Topology Density Map for Urban Data Visualization and Analysis", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222248/1nTr0CUpIIM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2020/9274/0/927400a148", "title": "Mirante: A visualization tool for analyzing urban crimes", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2020/927400a148/1p2VzBEZp5K", "parentPublication": { "id": "proceedings/sibgrapi/2020/9274/0", "title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a029", "title": "Research on Urban Landscape Image Enhancement under the Background ofBig Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a029/1tROxjE7tTi", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aQ", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "acronym": "fie", "groupId": "1000297", "volume": "2", "displayVolume": "2", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNAMtANa", "doi": "10.1109/FIE.2003.1264712", "title": "An inexpensive method to teach hands-on digital communications", "normalizedTitle": "An inexpensive method to teach hands-on digital communications", "abstract": "Some of the more subtle concepts related to digital communication systems such as signal constellation imbalance, intersymbol interference, pulse shaping ramifications, and performance with in-band interference are quite difficult for most students to grasp from a textbook or lectures alone. This paper describes an inexpensive approach to providing a real-time, hands-on laboratory experience for the students covering these same topics using the Texas Instruments C6711 digital signal processing starter kit along with custom software the authors have developed in MATLAB and C/C++. Expensive specialized test equipment such as a vector signal generator or a vector signal analyzer is not needed using this method. Our initial teaching experience has shown this new method to be highly successful yet very inexpensive when compared to purchasing traditional dedicated test equipment. The software described herein is freely available to educators and students.", "abstracts": [ { "abstractType": "Regular", "content": "Some of the more subtle concepts related to digital communication systems such as signal constellation imbalance, intersymbol interference, pulse shaping ramifications, and performance with in-band interference are quite difficult for most students to grasp from a textbook or lectures alone. This paper describes an inexpensive approach to providing a real-time, hands-on laboratory experience for the students covering these same topics using the Texas Instruments C6711 digital signal processing starter kit along with custom software the authors have developed in MATLAB and C/C++. Expensive specialized test equipment such as a vector signal generator or a vector signal analyzer is not needed using this method. Our initial teaching experience has shown this new method to be highly successful yet very inexpensive when compared to purchasing traditional dedicated test equipment. The software described herein is freely available to educators and students.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Some of the more subtle concepts related to digital communication systems such as signal constellation imbalance, intersymbol interference, pulse shaping ramifications, and performance with in-band interference are quite difficult for most students to grasp from a textbook or lectures alone. This paper describes an inexpensive approach to providing a real-time, hands-on laboratory experience for the students covering these same topics using the Texas Instruments C6711 digital signal processing starter kit along with custom software the authors have developed in MATLAB and C/C++. Expensive specialized test equipment such as a vector signal generator or a vector signal analyzer is not needed using this method. Our initial teaching experience has shown this new method to be highly successful yet very inexpensive when compared to purchasing traditional dedicated test equipment. The software described herein is freely available to educators and students.", "fno": "01264712", "keywords": [ "Teaching", "Digital Communication", "Signal Processing", "Intersymbol Interference", "Pulse Shaping", "Telecommunication Engineering Education", "Computer Science Education", "Hands On Digital Communications", "Teach", "Signal Constellation Imbalance", "Intersymbol Interference", "Pulse Shaping Ramifications", "In Band Interference", "Hands On Laboratory Experience", "Texas Instruments C 6711 Digital Signal Processing Starter Kit", "MATLAB", "C C", "Test Equipment", "Educators", "Students", "Digital Communication", "Intersymbol Interference", "Test Equipment", "Constellation Diagram", "Pulse Shaping Methods", "Instruments", "Digital Signal Processing", "MATLAB", "Signal Generators", "Signal Analysis" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Wyoming Univ., Laramie, WY, USA", "fullName": "C.H.G. Wright", "givenName": "C.H.G.", "surname": "Wright", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "T.B. Welch", "givenName": "T.B.", "surname": "Welch", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M.G. Morrow", "givenName": "M.G.", "surname": "Morrow", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "F2E-20-5 Vol.2", "year": "2003", "issn": "0190-5848", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7961f2b4", "articleId": "12OmNxxvALD", "__typename": "AdjacentArticleType" }, "next": { "fno": "7961f2b5", "articleId": "12OmNwKYbtO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2003/7961/2/01264661", "title": "Digital signal processing course innovations for power electronics practice", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01264661/12OmNAYXWzB", "parentPublication": { "id": "proceedings/fie/2003/7961/2", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327286", "title": "Continuing education courses emphasizing hands-on DSP experiments for night-school students", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327286/12OmNBO3K9N", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/1998/4762/3/00738574", "title": "Active learning using inexpensive sound cards for circuits and communications experiments", "doi": null, "abstractUrl": "/proceedings-article/fie/1998/00738574/12OmNBO3Kgk", "parentPublication": { "id": "proceedings/fie/1998/4762/3", "title": "FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327069", "title": "A software/hardware codesigned hands free system on a \"resizable\" block-floating-point DSP", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327069/12OmNqBbHOt", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i260", "title": "Design and Implementation of Digital Signal Processing Soft Laboratory", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i260/12OmNqGRGn3", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/3/01326670", "title": "On the design of non-(bi)orthogonal pulse-shaped FDM for doubly-dispersive channels", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326670/12OmNs5rkSW", "parentPublication": { "id": "proceedings/icassp/2004/8484/3", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/milcom/2002/7625/1/01180432", "title": "Analysis of slow-frequency-hop satellite communications using ambiguity functions", "doi": null, "abstractUrl": "/proceedings-article/milcom/2002/01180432/12OmNwt5skf", "parentPublication": { "id": "proceedings/milcom/2002/7625/2", "title": "Military Communications Conference (MILCOM 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1993/4120/0/00342327", "title": "On the design of pre-equalized square-root raised cosine matched filters for DSP based digital receivers", "doi": null, "abstractUrl": "/proceedings-article/acssc/1993/00342327/12OmNy5R3tn", "parentPublication": { "id": "proceedings/acssc/1993/4120/0", "title": "Proceedings of 27th Asilomar Conference on Signals, Systems and Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757505", "title": "Considerations for the design of a hands-on wireless communications graduate course based on software-defined radio", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757505/12OmNyRPgtL", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2012/1429/0/p211saxena", "title": "Interference-free regions with Han-Kobayashi scheme for M-QAM and scalar channels", "doi": null, "abstractUrl": "/proceedings-article/wimob/2012/p211saxena/12OmNzAohYJ", "parentPublication": { "id": "proceedings/wimob/2012/1429/0", "title": "2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVb5", "title": "International Conference on Automation, Quality and Testing, Robotics", "acronym": "aqtr", "groupId": "1001746", "volume": "2", "displayVolume": "2", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAAtHG", "doi": "10.1109/AQTR.2006.254626", "title": "Type Test Procedure for Electronic Ground Power Units", "normalizedTitle": "Type Test Procedure for Electronic Ground Power Units", "abstract": "The first step to develop a product with integrated power electronics consists in analysing the requirement specifications from customers. In the next developing step is necessary to carry out some series of measurements and tests on a functional prototype. The goal of the type test is to confirm that the proposed product specifications combined with the customer wishes are achieved. The present paper refers to international standards, which are dedicated to power electronics products, as for instance IEC 146-1 part 1-3, general requirements; IEC 146-2, 3 semiconductor converters, IEC 478 part 1-4, stabilized power device and other regulations. On the base of practical measurement examples and case studies in the proposed contribution are described along with the procedure used to test the 18 kW ground power devices. The measurements have been carried out with calibrated instruments like: multimeter, oscilloscope, radio interference analyzer, noise level meter, temperature-meter, milliohm- and airflow meter, ESD instrument and burst generator assuring their reproducibility. In order to demonstrate the keeping of the initial quality level, the type tests mentioned in the paper, like technical testing, static and dynamic measurements, special loads, conducted emissions measurement, sound level measurement, heat run test and additional measurements will be repeated after some time intervals or after a certain number of delivered units. By testing the prototypes all technical and sales documents should be considered, and if required, the national and international specifications", "abstracts": [ { "abstractType": "Regular", "content": "The first step to develop a product with integrated power electronics consists in analysing the requirement specifications from customers. In the next developing step is necessary to carry out some series of measurements and tests on a functional prototype. The goal of the type test is to confirm that the proposed product specifications combined with the customer wishes are achieved. The present paper refers to international standards, which are dedicated to power electronics products, as for instance IEC 146-1 part 1-3, general requirements; IEC 146-2, 3 semiconductor converters, IEC 478 part 1-4, stabilized power device and other regulations. On the base of practical measurement examples and case studies in the proposed contribution are described along with the procedure used to test the 18 kW ground power devices. The measurements have been carried out with calibrated instruments like: multimeter, oscilloscope, radio interference analyzer, noise level meter, temperature-meter, milliohm- and airflow meter, ESD instrument and burst generator assuring their reproducibility. In order to demonstrate the keeping of the initial quality level, the type tests mentioned in the paper, like technical testing, static and dynamic measurements, special loads, conducted emissions measurement, sound level measurement, heat run test and additional measurements will be repeated after some time intervals or after a certain number of delivered units. By testing the prototypes all technical and sales documents should be considered, and if required, the national and international specifications", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The first step to develop a product with integrated power electronics consists in analysing the requirement specifications from customers. In the next developing step is necessary to carry out some series of measurements and tests on a functional prototype. The goal of the type test is to confirm that the proposed product specifications combined with the customer wishes are achieved. The present paper refers to international standards, which are dedicated to power electronics products, as for instance IEC 146-1 part 1-3, general requirements; IEC 146-2, 3 semiconductor converters, IEC 478 part 1-4, stabilized power device and other regulations. On the base of practical measurement examples and case studies in the proposed contribution are described along with the procedure used to test the 18 kW ground power devices. The measurements have been carried out with calibrated instruments like: multimeter, oscilloscope, radio interference analyzer, noise level meter, temperature-meter, milliohm- and airflow meter, ESD instrument and burst generator assuring their reproducibility. In order to demonstrate the keeping of the initial quality level, the type tests mentioned in the paper, like technical testing, static and dynamic measurements, special loads, conducted emissions measurement, sound level measurement, heat run test and additional measurements will be repeated after some time intervals or after a certain number of delivered units. By testing the prototypes all technical and sales documents should be considered, and if required, the national and international specifications", "fno": "04022949", "keywords": [ "Heat Run Test", "Type Test Procedure", "Electronic Ground Power Units", "Integrated Power Electronics", "Requirement Specifications Analysis", "Product Specifications", "International Standards", "Technical Testing", "Static Measurements", "Dynamic Measurements", "Special Loads", "Conducted Emissions Measurement", "Sound Level Measurement" ], "authors": [ { "affiliation": "Petrosani Univ.", "fullName": "A. Tulbure", "givenName": "A.", "surname": "Tulbure", "__typename": "ArticleAuthorType" } ], "idPrefix": "aqtr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-05-01T00:00:00", "pubType": "proceedings", "pages": "176-179", "year": "2006", "issn": null, "isbn": "1-4244-0360-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04022948", "articleId": "12OmNrNh0HX", "__typename": "AdjacentArticleType" }, "next": { "fno": "04022950", "articleId": "12OmNCgrCVw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670a396", "title": "Selecting Physiological Features for Predicting Bidding Behavior in Electronic Auctions", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a396/12OmNAkEU6t", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811009", "title": "Quantification of Contrast Sensitivity and Color Perception using Head-worn Augmented Reality Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811009/12OmNB8CiYX", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2000/0912/0/09120296", "title": "Performance measurements and analysis of TCP flows in a differentiated services WAN", "doi": null, "abstractUrl": "/proceedings-article/lcn/2000/09120296/12OmNqFrGAT", "parentPublication": { "id": "proceedings/lcn/2000/0912/0", "title": "Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eecs/2017/2085/0/2085a421", "title": "The Assessment of Wind Speed Distortions in a Simulated Flow Around a Lattice Cellular Communication Mast", "doi": null, "abstractUrl": "/proceedings-article/eecs/2017/2085a421/12OmNrIaebR", "parentPublication": { "id": "proceedings/eecs/2017/2085/0", "title": "2017 European Conference on Electrical Engineering and Computer Science (EECS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1992/2910/0/00201586", "title": "Ground and airborne localization over rough terrain using random environmental range-measurements", "doi": null, "abstractUrl": "/proceedings-article/icpr/1992/00201586/12OmNwGqBpo", "parentPublication": { "id": "proceedings/icpr/1992/2910/0", "title": "1992 11th IAPR International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/test/1993/1430/0/00470652", "title": "Catch the ground bounce before it hits your system", "doi": null, "abstractUrl": "/proceedings-article/test/1993/00470652/12OmNx7ouVl", "parentPublication": { "id": "proceedings/test/1993/1430/0", "title": "Proceedings of IEEE International Test Conference - (ITC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223174", "title": "Computational ground and airborne localization over rough terrain", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223174/12OmNxbEtNH", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670c556", "title": "Jamming Aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670c556/12OmNz4Bdhm", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itc/2009/4868/0/05355722", "title": "A2DTest: A complete integrated solution for on-chip ADC self-test and analysis", "doi": null, "abstractUrl": "/proceedings-article/itc/2009/05355722/12OmNz5s0Mu", "parentPublication": { "id": "proceedings/itc/2009/4868/0", "title": "2009 International Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/09/08732973", "title": "Efficient Indoor Localization via Switched-Beam Antennas", "doi": null, "abstractUrl": "/journal/tm/2020/09/08732973/1aFvpEeKfHG", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2YI", "title": "2004 International Conferce on Test", "acronym": "test", "groupId": "1000753", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNwBjP7d", "doi": "10.1109/TEST.2004.1387420", "title": "Electronic circuit comprising a secret sub-module", "normalizedTitle": "Electronic circuit comprising a secret sub-module", "abstract": "A sub-module of a digital circuit contain secret elements such as keys and algorithms. These elements need to be kept secret all along the product life. In particular testing in a critical step, since conventional techniques include structural scan test, which allows downloading of all the internal registers of the circuit and functional application like tests in which the sub-module receives stimuli such as it receives during operation, and outputs respective signal which reveal information on the function of the sub-module by linking the expected output signals to the input signals. The sub-module assembly consist of a sub-module for performing a function and comprising at least one scan chain. A built-in self test circuit including a pattern generator was adapted in test mode.", "abstracts": [ { "abstractType": "Regular", "content": "A sub-module of a digital circuit contain secret elements such as keys and algorithms. These elements need to be kept secret all along the product life. In particular testing in a critical step, since conventional techniques include structural scan test, which allows downloading of all the internal registers of the circuit and functional application like tests in which the sub-module receives stimuli such as it receives during operation, and outputs respective signal which reveal information on the function of the sub-module by linking the expected output signals to the input signals. The sub-module assembly consist of a sub-module for performing a function and comprising at least one scan chain. A built-in self test circuit including a pattern generator was adapted in test mode.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A sub-module of a digital circuit contain secret elements such as keys and algorithms. These elements need to be kept secret all along the product life. In particular testing in a critical step, since conventional techniques include structural scan test, which allows downloading of all the internal registers of the circuit and functional application like tests in which the sub-module receives stimuli such as it receives during operation, and outputs respective signal which reveal information on the function of the sub-module by linking the expected output signals to the input signals. The sub-module assembly consist of a sub-module for performing a function and comprising at least one scan chain. A built-in self test circuit including a pattern generator was adapted in test mode.", "fno": "01387420", "keywords": [ "Digital Circuits", "Built In Self Test", "Logic Testing", "Automatic Test Pattern Generation", "Electronic Circuit", "Secret Submodule", "Digital Circuit Testing", "Secret Elements", "Product Life", "Structural Scan Test", "Internal Registers", "Functional Application Tests", "Submodule Assembly", "Built In Self Test Circuit", "Pattern Generator", "Electronic Circuits", "Circuit Testing", "Registers", "Assembly", "Automatic Testing", "Signal Generators", "Test Pattern Generators", "Production", "Joining Processes", "Signal Design" ], "authors": [ { "affiliation": "Philips Semicond., France", "fullName": "H. Fleury", "givenName": "H.", "surname": "Fleury", "__typename": "ArticleAuthorType" } ], "idPrefix": "test", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "1412", "year": "2004", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01387377", "articleId": "12OmNBBhN9f", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itc/2004/2741/0/27411412", "title": "Electronic circuit comprising a secret sub-module", "doi": null, "abstractUrl": "/proceedings-article/itc/2004/27411412/12OmNAoDi5o", "parentPublication": { "id": "proceedings/itc/2004/2741/0", "title": "2004 International Conferce on Test", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ats/1994/6690/0/00367240", "title": "A built-in I/sub DDQ/ test circuit utilizing upper and lower limits", "doi": null, "abstractUrl": "/proceedings-article/ats/1994/00367240/12OmNBZHifr", "parentPublication": { "id": "proceedings/ats/1994/6690/0", "title": "Proceedings of IEEE 3rd Asian Test Symposium (ATS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftdcs/1990/2088/0/00138314", "title": "Linking schemas and module specifications for distributed systems", "doi": null, "abstractUrl": "/proceedings-article/ftdcs/1990/00138314/12OmNBoNrmU", "parentPublication": { "id": "proceedings/ftdcs/1990/2088/0", "title": "Proceedings Second IEEE Workshop on Future Trends of Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ias/2009/3744/2/3744b734", "title": "Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744b734/12OmNC4O4D3", "parentPublication": { "id": "proceedings/ias/2009/3744/2", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2015/8562/0/07439476", "title": "Visual pattern embedding in multi-secret image steganography", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439476/12OmNCcKQOW", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/test/1993/1430/0/00470639", "title": "A general purpose I/sub DDQ/ measurement circuit", "doi": null, "abstractUrl": "/proceedings-article/test/1993/00470639/12OmNwAKCPE", "parentPublication": { "id": "proceedings/test/1993/1430/0", "title": "Proceedings of IEEE International Test Conference - (ITC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcmc/1996/7286/0/72860050", "title": "Mixed Signal Digital Sub-Band Tuner Multichip Module", "doi": null, "abstractUrl": "/proceedings-article/mcmc/1996/72860050/12OmNyKJizx", "parentPublication": { "id": "proceedings/mcmc/1996/7286/0", "title": "Multi-Chip Module Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwcs/2010/4003/0/4003a059", "title": "Thick Film Integrated Circuit Design of Multi-measurement Module", "doi": null, "abstractUrl": "/proceedings-article/apwcs/2010/4003a059/12OmNyTOsq1", "parentPublication": { "id": "proceedings/apwcs/2010/4003/0", "title": "Wearable Computing Systems, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/test/1995/2992/0/00529822", "title": "A general purpose ATE based I/sub DDQ/ measurement circuit", "doi": null, "abstractUrl": "/proceedings-article/test/1995/00529822/12OmNypIYAV", "parentPublication": { "id": "proceedings/test/1995/2992/0", "title": "Proceedings of 1995 IEEE International Test Conference (ITC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eei/2019/4076/0/407600a233", "title": "Study on a New Type MMC Hybrid Double Sub-Module Topology and Control Strategy", "doi": null, "abstractUrl": "/proceedings-article/eei/2019/407600a233/1hrJtxg4lG0", "parentPublication": { "id": "proceedings/eei/2019/4076/0", "title": "2019 International Conference on Electronic Engineering and Informatics (EEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyFCvPi", "title": "VLSI Design, International Conference on", "acronym": "vlsid", "groupId": "1000799", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNxGj9Jv", "doi": "10.1109/ICVD.2005.34", "title": "A System-Level Alternate Test Approach for Specification Test of RF Transceivers in Loopback Mode", "normalizedTitle": "A System-Level Alternate Test Approach for Specification Test of RF Transceivers in Loopback Mode", "abstract": "In this paper, a loop-back test scheme for RF transceivers using optimized periodic bit streams is presented. In this approach, optimized periodic bitstreams modulated at baseband are sent through RF transmit subsystem, and the transmitter output is looped back into the receiver using the proposed test architecture. The corresponding test response is captured in the baseband at the output of the receive subsystem. From the spectral content of the test response at the baseband, all the linear and the nonlinear specifications of the transmit and the receive subsystems are computed. The key contribution of the presented work is that, the subsystem specification values are decoupled and computed using the looped-back test response at the receiver baseband. This eliminates the need for expensive RF ATE instrumentation to probe high frequency access points. Hardware measurement and validation data for a 900MHz wireless GSM transceiver system are presented.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, a loop-back test scheme for RF transceivers using optimized periodic bit streams is presented. In this approach, optimized periodic bitstreams modulated at baseband are sent through RF transmit subsystem, and the transmitter output is looped back into the receiver using the proposed test architecture. The corresponding test response is captured in the baseband at the output of the receive subsystem. From the spectral content of the test response at the baseband, all the linear and the nonlinear specifications of the transmit and the receive subsystems are computed. The key contribution of the presented work is that, the subsystem specification values are decoupled and computed using the looped-back test response at the receiver baseband. This eliminates the need for expensive RF ATE instrumentation to probe high frequency access points. Hardware measurement and validation data for a 900MHz wireless GSM transceiver system are presented.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, a loop-back test scheme for RF transceivers using optimized periodic bit streams is presented. In this approach, optimized periodic bitstreams modulated at baseband are sent through RF transmit subsystem, and the transmitter output is looped back into the receiver using the proposed test architecture. The corresponding test response is captured in the baseband at the output of the receive subsystem. From the spectral content of the test response at the baseband, all the linear and the nonlinear specifications of the transmit and the receive subsystems are computed. The key contribution of the presented work is that, the subsystem specification values are decoupled and computed using the looped-back test response at the receiver baseband. This eliminates the need for expensive RF ATE instrumentation to probe high frequency access points. Hardware measurement and validation data for a 900MHz wireless GSM transceiver system are presented.", "fno": "22640289", "keywords": [ "System Level Test", "RF Test", "Loop Back Test", "Wireless Transceiver Test", "Specification Test", "Analog And Mixed Signal Test" ], "authors": [ { "affiliation": "Georgia Institute of Technology", "fullName": "A. Halder", "givenName": "A.", "surname": "Halder", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "S. Bhattacharya", "givenName": "S.", "surname": "Bhattacharya", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "G. Srinivasan", "givenName": "G.", "surname": "Srinivasan", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "A. Chatterjee", "givenName": "A.", "surname": "Chatterjee", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlsid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "289-294", "year": "2005", "issn": "1063-9667", "isbn": "0-7695-2264-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "22640280", "articleId": "12OmNwwuDUV", "__typename": "AdjacentArticleType" }, "next": { "fno": "22640295", "articleId": "12OmNqzcvRH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vts/2008/3123/0/3123a209", "title": "Single-Measurement Diagnostic Test Method for Parametric Faults of I/Q Modulating RF Transceivers", "doi": null, "abstractUrl": "/proceedings-article/vts/2008/3123a209/12OmNAZfxEo", "parentPublication": { "id": "proceedings/vts/2008/3123/0", "title": "26th IEEE VLSI Test Symposium (vts 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvd/2005/2264/0/01383290", "title": "A system-level alternate test approach for specification test of RF transceivers in loopback mode", "doi": null, "abstractUrl": "/proceedings-article/icvd/2005/01383290/12OmNwp74s0", "parentPublication": { "id": "proceedings/icvd/2005/2264/0", "title": "Proceedings. 18th International Conference on VLSI Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dft/2004/2241/0/22410220", "title": "Mixed Loopback BiST for RF Digital Transceivers", "doi": null, "abstractUrl": "/proceedings-article/dft/2004/22410220/12OmNwwMeXn", "parentPublication": { "id": "proceedings/dft/2004/2241/0", "title": "19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ets/2009/3703/0/3703a101", "title": "Defect Filter for Alternate RF Test", "doi": null, "abstractUrl": "/proceedings-article/ets/2009/3703a101/12OmNx0RIQg", "parentPublication": { "id": "proceedings/ets/2009/3703/0", "title": "2009 14th IEEE European Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vts/2006/2514/0/25140222", "title": "Alternate Loop-Back Diagnostic Tests for Wafer-Level Diagnosis of Modern Wireless Transceivers using Spectral Signatures", "doi": null, "abstractUrl": "/proceedings-article/vts/2006/25140222/12OmNzBwGtz", "parentPublication": { "id": "proceedings/vts/2006/2514/0", "title": "24th IEEE VLSI Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dft/2004/2241/0/01347843", "title": "Mixed loopback BiST for RF digital transceivers", "doi": null, "abstractUrl": "/proceedings-article/dft/2004/01347843/12OmNzaQofj", "parentPublication": { "id": "proceedings/dft/2004/2241/0", "title": "19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ets/2010/5834/0/05512783", "title": "Sensors for built-in alternate RF test", "doi": null, "abstractUrl": "/proceedings-article/ets/2010/05512783/12OmNzwpU7q", "parentPublication": { "id": "proceedings/ets/2010/5834/0", "title": "2010 15th IEEE European Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/dt/2008/02/mdt2008020150", "title": "Loopback DFT for Low-Cost Test of Single-VCO-Based Wireless Transceivers", "doi": null, "abstractUrl": "/magazine/dt/2008/02/mdt2008020150/13rRUwInv0j", "parentPublication": { "id": "mags/dt", "title": "IEEE Design & Test of Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2010/06/05325816", "title": "Built-in Loopback Test for IC RF Transceivers", "doi": null, "abstractUrl": "/journal/si/2010/06/05325816/13rRUxOdD5G", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/dt/2006/04/d4268", "title": "On-Chip Testing Techniques for RF Wireless Transceivers", "doi": null, "abstractUrl": "/magazine/dt/2006/04/d4268/13rRUyekJ1E", "parentPublication": { "id": "mags/dt", "title": "IEEE Design & Test of Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxYUW", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "acronym": "icicta", "groupId": "1002487", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxVDuJL", "doi": "10.1109/ICICTA.2014.61", "title": "Electronic Circuit Virtual Laboratory Based on LabVIEW and Multisim", "normalizedTitle": "Electronic Circuit Virtual Laboratory Based on LabVIEW and Multisim", "abstract": "With the increase of students, electronic laboratories and instruments have become in critical need in many universities and colleges, thus the construction of virtual laboratory and virtual instruments have attracted attentions of many researchers. LabVIEW is the most widely used virtual instruments developing software with the most powerful functions, which can be used for virtual instruments developing, such as virtual oscilloscope, virtual signal generator, virtual spectrum analyzer, etc. Multisim is simulation tool for electronic circuit, which can be used for analog electronic circuit and digital electronic circuit simulation. This paper develops an electronic circuit virtual laboratory system with LabVIEW and Multisim 10.0 software. The system includes 5 main sub-systems: EDA experiment system, virtual instrument system, assistance teaching system, teaching management system and user management system. Data is transferred in the three-layer structure: user interface layer, business processing layer and data storage layer. Users can access the system through only web browsers. Constructing virtual laboratory on computers can make up for the experiment hardware shortage and improve the electronic circuit experiment teaching quality.", "abstracts": [ { "abstractType": "Regular", "content": "With the increase of students, electronic laboratories and instruments have become in critical need in many universities and colleges, thus the construction of virtual laboratory and virtual instruments have attracted attentions of many researchers. LabVIEW is the most widely used virtual instruments developing software with the most powerful functions, which can be used for virtual instruments developing, such as virtual oscilloscope, virtual signal generator, virtual spectrum analyzer, etc. Multisim is simulation tool for electronic circuit, which can be used for analog electronic circuit and digital electronic circuit simulation. This paper develops an electronic circuit virtual laboratory system with LabVIEW and Multisim 10.0 software. The system includes 5 main sub-systems: EDA experiment system, virtual instrument system, assistance teaching system, teaching management system and user management system. Data is transferred in the three-layer structure: user interface layer, business processing layer and data storage layer. Users can access the system through only web browsers. Constructing virtual laboratory on computers can make up for the experiment hardware shortage and improve the electronic circuit experiment teaching quality.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the increase of students, electronic laboratories and instruments have become in critical need in many universities and colleges, thus the construction of virtual laboratory and virtual instruments have attracted attentions of many researchers. LabVIEW is the most widely used virtual instruments developing software with the most powerful functions, which can be used for virtual instruments developing, such as virtual oscilloscope, virtual signal generator, virtual spectrum analyzer, etc. Multisim is simulation tool for electronic circuit, which can be used for analog electronic circuit and digital electronic circuit simulation. This paper develops an electronic circuit virtual laboratory system with LabVIEW and Multisim 10.0 software. The system includes 5 main sub-systems: EDA experiment system, virtual instrument system, assistance teaching system, teaching management system and user management system. Data is transferred in the three-layer structure: user interface layer, business processing layer and data storage layer. Users can access the system through only web browsers. Constructing virtual laboratory on computers can make up for the experiment hardware shortage and improve the electronic circuit experiment teaching quality.", "fno": "6636a222", "keywords": [ "Instruments", "Laboratories", "Software", "Electronic Circuits", "Analytical Models", "Educational Institutions", "Electronic Circuit Experiment", "Virtual Laboratory", "Virtual Instrument", "Lab VIEW", "Multisim" ], "authors": [ { "affiliation": null, "fullName": "Li Yang-Mei", "givenName": "Li", "surname": "Yang-Mei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cai Bo", "givenName": "Cai", "surname": "Bo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "222-225", "year": "2014", "issn": null, "isbn": "978-1-4799-6636-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6636a218", "articleId": "12OmNBhHt6C", "__typename": "AdjacentArticleType" }, "next": { "fno": "6636a226", "articleId": "12OmNqzcvCQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/3/3962e893", "title": "The Largest Amount of Fault Information in Analog Circuit Fault Diagnosis Based on Multisim Circuit Simulation", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e893/12OmNAXPy8h", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2010/7362/0/05550110", "title": "Cost-effectiveweb-based electronics laboratory using NI MultiSim, LabVIEW and ELVIS II", "doi": null, "abstractUrl": "/proceedings-article/t4e/2010/05550110/12OmNB9bvlT", "parentPublication": { "id": "proceedings/t4e/2010/7362/0", "title": "2010 International Conference on Technology for Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2009/3778/0/3778a009", "title": "Electronic Payment Instruments and Endogenous Money Supply", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2009/3778a009/12OmNBTawsp", "parentPublication": { "id": "proceedings/icmecg/2009/3778/0", "title": "2009 International Conference on Management of e-Commerce and e-Government (ICMECG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccs/2009/3906/0/3906a103", "title": "Real-time Simulation of Web-Based Virtual Laboratory System for Electronic Circuit Experiment", "doi": null, "abstractUrl": "/proceedings-article/icccs/2009/3906a103/12OmNx19k1Z", "parentPublication": { "id": "proceedings/icccs/2009/3906/0", "title": "2009 International Conference on Computer and Communications Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icds/2010/3953/0/3953a098", "title": "Inernet Tool for Electronic Circuit Analysis", "doi": null, "abstractUrl": "/proceedings-article/icds/2010/3953a098/12OmNz2TCzS", "parentPublication": { "id": "proceedings/icds/2010/3953/0", "title": "International Conference on the Digital Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408524", "title": "Work in progress - virtual lab for electronic engineering curricula", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408524/12OmNzkuKDO", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2013/02/tlt2013020103", "title": "Intelligent Performance Assessment of Students' Laboratory Work in a Virtual Electronic Laboratory Environment", "doi": null, "abstractUrl": "/journal/lt/2013/02/tlt2013020103/13rRUIIVlh4", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2013/01/tlt2013010060", "title": "Virtual Instrument Systems in Reality (VISIR) for Remote Wiring and Measurement of Electronic Circuits on Breadboard", "doi": null, "abstractUrl": "/journal/lt/2013/01/tlt2013010060/13rRUxBJhCo", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273921", "title": "Freewheeling Electronic Laboratory Learning with Pocket Instruments", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273921/1phRCRXHyrS", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600c331", "title": "Control operation circuit system design and simulation based on Multisim 13.0", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600c331/1x3kyStUXlK", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBEGYGg", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "acronym": "iccea", "groupId": "1040032", "volume": "1", "displayVolume": "1", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNxveNNB", "doi": "10.1109/ICCEA.2010.124", "title": "Processing of VoIP Signal Using TMS320C6713 in Digital Domain", "normalizedTitle": "Processing of VoIP Signal Using TMS320C6713 in Digital Domain", "abstract": "The speech of the VoIP system is degraded by network layer problems which include delay, packet loss and jitter. The implementation of signal through digital signal processor can improve the quality of degraded VoIP signal. The work in this paper deals with the implementation of digital filtering algorithm on degraded VoIP speech signal. The results of implementation experiment indicate the improvement of signal quality. The results are validated through the measurement of enhancement signal using perceptual evaluation of speech quality (PESQ) measurement.", "abstracts": [ { "abstractType": "Regular", "content": "The speech of the VoIP system is degraded by network layer problems which include delay, packet loss and jitter. The implementation of signal through digital signal processor can improve the quality of degraded VoIP signal. The work in this paper deals with the implementation of digital filtering algorithm on degraded VoIP speech signal. The results of implementation experiment indicate the improvement of signal quality. The results are validated through the measurement of enhancement signal using perceptual evaluation of speech quality (PESQ) measurement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The speech of the VoIP system is degraded by network layer problems which include delay, packet loss and jitter. The implementation of signal through digital signal processor can improve the quality of degraded VoIP signal. The work in this paper deals with the implementation of digital filtering algorithm on degraded VoIP speech signal. The results of implementation experiment indicate the improvement of signal quality. The results are validated through the measurement of enhancement signal using perceptual evaluation of speech quality (PESQ) measurement.", "fno": "05445757", "keywords": [ "Digital Signal Processing Chips", "Filtering Theory", "Hearing", "Internet Telephony", "Speech Enhancement", "TMS 320 C 6713", "Network Layer Problems", "Digital Signal Processor", "Digital Filtering Algorithm", "Vo IP Speech Signal", "Perceptual Evaluation", "Speech Quality Measurement", "Signal Enhancement", "Signal Processing", "Finite Impulse Response Filter", "Degradation", "Digital Signal Processing", "Signal Processing Algorithms", "Electronic Mail", "Decoding", "Physics", "Speech Processing", "Jitter", "Vo IP", "Signal Processing", "TMS 320 C 6713 DSP Processor", "Spectral Analysis" ], "authors": [ { "affiliation": null, "fullName": "Harjit Pal Singh", "givenName": "Harjit Pal", "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sarabjeet Singh", "givenName": "Sarabjeet", "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jasvir Singh", "givenName": "Jasvir", "surname": "Singh", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccea", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2010", "issn": null, "isbn": "978-1-4244-6079-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05445760", "articleId": "12OmNweBUJl", "__typename": "AdjacentArticleType" }, "next": { "fno": "05445758", "articleId": "12OmNqOwQL3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2011/348/0/06011962", "title": "Field performance evaluation of VoIP in 4G trials", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011962/12OmNAkWvDz", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2010/5942/0/05480523", "title": "VoIP QoS(Quality of Service) Design of Measurement Management Process Model", "doi": null, "abstractUrl": "/proceedings-article/icisa/2010/05480523/12OmNAkWvsK", "parentPublication": { "id": "proceedings/icisa/2010/5942/0", "title": "2010 International Conference on Information Science and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344377", "title": "A new signal processing course for digital culture", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344377/12OmNqOwQGH", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/6079/1/05445758", "title": "Computer Modeling & Performance Analysis of VoIP under Different Strategic Conditions", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/05445758/12OmNqOwQL3", "parentPublication": { "id": "proceedings/iccea/2010/6079/1", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a182", "title": "Spectral Analysis of Speech Quality in VoIP for G.729A and AMR-WB Speech Coders", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a182/12OmNwKGAnw", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a289", "title": "Implementation of FIR Interpolation Filter on TMS320C6713 for VoIP Analysis", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a289/12OmNyp9Mle", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2015/7125/0/07102583", "title": "Combining Algebraic and Domain Testing to Design Adequate Test Cases for Signal Processing Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icst/2015/07102583/12OmNzYeASr", "parentPublication": { "id": "proceedings/icst/2015/7125/0", "title": "2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2007/1520/0/04381543", "title": "Performance Study of Objective Voice Quality Measures in VoIP", "doi": null, "abstractUrl": "/proceedings-article/iscc/2007/04381543/12OmNzZWbJB", "parentPublication": { "id": "proceedings/iscc/2007/1520/0", "title": "2007 12th IEEE Symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2013/07/06255804", "title": "Energy-Efficient Digital Signal Processing via Voltage-Overscaling-Based Residue Number System", "doi": null, "abstractUrl": "/journal/si/2013/07/06255804/13rRUy08MCP", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a192", "title": "Research on Audio Signal Denoising and Simulation Processing", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a192/1cI5UC9uSQM", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1phRpGBKvFS", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1phRCRXHyrS", "doi": "10.1109/FIE44824.2020.9273921", "title": "Freewheeling Electronic Laboratory Learning with Pocket Instruments", "normalizedTitle": "Freewheeling Electronic Laboratory Learning with Pocket Instruments", "abstract": "Work in Progress: This Innovative Practice Work-in-Progress Paper presents how a portable laboratory kit named Pocket Instruments has facilitated electronic laboratory learning in the undergraduate engineering programs. Traditionally, owing to the lack of necessary instruments at hand, students could only think abstractly and design on paper during pre-lab and post-lab time but could not physically work on their circuits outside the laboratories. Through the corresponding virtual instrument application software deployed on a laptop, the Pocket Instruments can act as a portable signal generator, an oscilloscope, a digital analyzer, and a spectrum analyzer, which makes it possible for students to experiment with electronic circuits freely outside the allocated laboratory time. The teaching practices in the engineering program of Tsinghua University for seven years have shown that such an always-available lab kit can achieve a measurable increase in students' engagement and achievement in experimental exploration. With the growing needs in online learning, the Pocket Instruments can also provide an effective means for distance learning of laboratory skill training.", "abstracts": [ { "abstractType": "Regular", "content": "Work in Progress: This Innovative Practice Work-in-Progress Paper presents how a portable laboratory kit named Pocket Instruments has facilitated electronic laboratory learning in the undergraduate engineering programs. Traditionally, owing to the lack of necessary instruments at hand, students could only think abstractly and design on paper during pre-lab and post-lab time but could not physically work on their circuits outside the laboratories. Through the corresponding virtual instrument application software deployed on a laptop, the Pocket Instruments can act as a portable signal generator, an oscilloscope, a digital analyzer, and a spectrum analyzer, which makes it possible for students to experiment with electronic circuits freely outside the allocated laboratory time. The teaching practices in the engineering program of Tsinghua University for seven years have shown that such an always-available lab kit can achieve a measurable increase in students' engagement and achievement in experimental exploration. With the growing needs in online learning, the Pocket Instruments can also provide an effective means for distance learning of laboratory skill training.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Work in Progress: This Innovative Practice Work-in-Progress Paper presents how a portable laboratory kit named Pocket Instruments has facilitated electronic laboratory learning in the undergraduate engineering programs. Traditionally, owing to the lack of necessary instruments at hand, students could only think abstractly and design on paper during pre-lab and post-lab time but could not physically work on their circuits outside the laboratories. Through the corresponding virtual instrument application software deployed on a laptop, the Pocket Instruments can act as a portable signal generator, an oscilloscope, a digital analyzer, and a spectrum analyzer, which makes it possible for students to experiment with electronic circuits freely outside the allocated laboratory time. The teaching practices in the engineering program of Tsinghua University for seven years have shown that such an always-available lab kit can achieve a measurable increase in students' engagement and achievement in experimental exploration. With the growing needs in online learning, the Pocket Instruments can also provide an effective means for distance learning of laboratory skill training.", "fno": "09273921", "keywords": [ "Computer Aided Instruction", "Distance Learning", "Educational Courses", "Engineering Education", "Laboratories", "Portable Instruments", "Student Experiments", "Teaching", "Virtual Instrumentation", "Undergraduate Engineering Programs", "Post Lab Time", "Pocket Instruments", "Electronic Circuits", "Always Available Lab Kit", "Laboratory Skill Training", "Freewheeling Electronic Laboratory Learning", "Portable Laboratory Kit", "Facilitated Electronic Laboratory Learning", "Virtual Instrument Application Software", "Distance Learning", "Oscilloscopes", "Signal Generators", "Field Programmable Gate Arrays", "Breadboard", "Training", "Portable Computers", "Logic Gates", "Portable Lab Kit", "Electronic Circuit", "Laboratory Learning", "Signal Generator", "Oscilloscope" ], "authors": [ { "affiliation": "Tsinghua University,Department of Automation,Beijing,P. R. China", "fullName": "Yanpin Ren", "givenName": "Yanpin", "surname": "Ren", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland,Department of Electrical and Computer Engineering,College Park,USA", "fullName": "Min Wu", "givenName": "Min", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2020", "issn": null, "isbn": "978-1-7281-8961-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09274005", "articleId": "1phRBjnxKqQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "09273895", "articleId": "1phRtDnn0L6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2002/7402/4/05745569", "title": "A systematic model for teaching DSP", "doi": null, "abstractUrl": "/proceedings-article/icassp/2002/05745569/12OmNClQ0Ah", "parentPublication": { "id": "proceedings/icassp/2002/7402/4", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881367", "title": "Low Cost Motor Control Systems Laboratory Kit for Distance Learning Courses", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881367/12OmNqIQS0V", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408554", "title": "A programming laboratory for electronic commerce", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408554/12OmNvqmUIh", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mse/2015/9913/0/07160015", "title": "An ad-hoc implementation of a remote laboratory", "doi": null, "abstractUrl": "/proceedings-article/mse/2015/07160015/12OmNwvDQss", "parentPublication": { "id": "proceedings/mse/2015/9913/0", "title": "2015 IEEE International Conference on Microelectronics Systems Education (MSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2014/6636/0/6636a222", "title": "Electronic Circuit Virtual Laboratory Based on LabVIEW and Multisim", "doi": null, "abstractUrl": "/proceedings-article/icicta/2014/6636a222/12OmNxVDuJL", "parentPublication": { "id": "proceedings/icicta/2014/6636/0", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aped/2010/4045/0/4045a020", "title": "Research on Network Virtual Electrical and Electronic Laboratory", "doi": null, "abstractUrl": "/proceedings-article/aped/2010/4045a020/12OmNyugyOb", "parentPublication": { "id": "proceedings/aped/2010/4045/0", "title": "2010 Asia-Pacific Conference on Power Electronics and Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01612242", "title": "A Laboratory Experience in Probability and Random Processes", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612242/12OmNyvY9rL", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2009/3738/0/3738a520", "title": "VL-DSC: A Dynamic Service Composition Based Model for Virtual Laboratory Platform and Its Implementation", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2009/3738a520/12OmNzEVRXM", "parentPublication": { "id": "proceedings/hpcc-icess/2009/3738/0", "title": "High Performance Computing and Communication &amp; IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658977", "title": "A Curriculum Design on Electronic Devices Design Laboratory", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658977/18j96Nvmjn2", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028701", "title": "Integration of Mixed Reality into an Engineering Laboratory Experience for Online Students", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028701/1iffbHe0psk", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqI04In", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "acronym": "bibmw", "groupId": "1001585", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNAXPy26", "doi": "10.1109/BIBMW.2009.5332104", "title": "Mining association rules among gene functions in clusters of similar gene expression maps", "normalizedTitle": "Mining association rules among gene functions in clusters of similar gene expression maps", "abstract": "Association rules mining methods have been recently applied to gene expression data analysis to reveal relationships between genes and different conditions and features. However, not much effort has focused on detecting the relation between gene expression maps and related gene functions. Here we describe such an approach to mine association rules among gene functions in clusters of similar gene expression maps on mouse brain. The experimental results show that the detected association rules make sense biologically. By inspecting the obtained clusters and the genes having the gene functions of frequent itemsets, interesting clues were discovered that provide valuable insight to biological scientists. Moreover, discovered association rules can be potentially used to predict gene functions based on similarity of gene expression maps.", "abstracts": [ { "abstractType": "Regular", "content": "Association rules mining methods have been recently applied to gene expression data analysis to reveal relationships between genes and different conditions and features. However, not much effort has focused on detecting the relation between gene expression maps and related gene functions. Here we describe such an approach to mine association rules among gene functions in clusters of similar gene expression maps on mouse brain. The experimental results show that the detected association rules make sense biologically. By inspecting the obtained clusters and the genes having the gene functions of frequent itemsets, interesting clues were discovered that provide valuable insight to biological scientists. Moreover, discovered association rules can be potentially used to predict gene functions based on similarity of gene expression maps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Association rules mining methods have been recently applied to gene expression data analysis to reveal relationships between genes and different conditions and features. However, not much effort has focused on detecting the relation between gene expression maps and related gene functions. Here we describe such an approach to mine association rules among gene functions in clusters of similar gene expression maps on mouse brain. The experimental results show that the detected association rules make sense biologically. By inspecting the obtained clusters and the genes having the gene functions of frequent itemsets, interesting clues were discovered that provide valuable insight to biological scientists. Moreover, discovered association rules can be potentially used to predict gene functions based on similarity of gene expression maps.", "fno": "05332104", "keywords": [ "Mouse Brain", "Association Rules Mining Methods", "Gene Functions", "Similar Gene Expression Map Cluster", "Gene Expression Data Analysis" ], "authors": [ { "affiliation": "Dept. of Comput.&Inf. Sci., Temple Univ., Philadelphia, PA, USA", "fullName": "Li An", "givenName": null, "surname": "Li An", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Inf. Sci.&Technol., Temple Univ., Philadelphia, PA, USA", "fullName": "Z. Obradovic", "givenName": "Z.", "surname": "Obradovic", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Mol.&Med. Pharmacology, UCLA, CA, USA", "fullName": "D. Smith", "givenName": "D.", "surname": "Smith", "__typename": "ArticleAuthorType" }, { "affiliation": "Lister Hill Nat. Center for Biomed. Commun., U.S. Nat. Libr. of Med., Washington, DC, USA", "fullName": "O. Bodenreider", "givenName": "O.", "surname": "Bodenreider", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput.&Inf. Sci., Temple Univ., Philadelphia, PA, USA", "fullName": "V. Megalooikonomou", "givenName": "V.", "surname": "Megalooikonomou", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "254-259", "year": "2009", "issn": null, "isbn": "978-1-4244-5121-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05332103", "articleId": "12OmNAoDhWf", "__typename": "AdjacentArticleType" }, "next": { "fno": "05332105", "articleId": "12OmNz61dcB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2012/2559/0/06392627", "title": "Inferring Fuzzy Cognitive Map models for Gene Regulatory Networks from gene expression data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392627/12OmNASraIl", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706568", "title": "Outcomes of gene association analysis of cancer microarray data are impacted by pre-processing algorithms", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706568/12OmNCd2rmx", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392675", "title": "Combining gene expression and function in a spatially localized approach", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392675/12OmNrAv3Hc", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706543", "title": "A new perspective of integrative genome-wide association analysis considering trans eSNP effect", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706543/12OmNwudQPG", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051901", "title": "Analyzing Alzheimer's disease gene expression dataset using clustering and association rule mining", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051901/12OmNxX3uHY", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a023", "title": "Analysis of Multiplex Gene Expression Maps Obtained by Voxelation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a023/12OmNyNzhuX", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/6/3736f139", "title": "Deducing Causal Relationships among Different Histone Modifications, DNA Methylation and Gene Expression", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f139/12OmNzlUKyp", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/11/ttk2011111735", "title": "What is Unequal among the Equals? Ranking Equivalent Rules from Gene Expression Data", "doi": null, "abstractUrl": "/journal/tk/2011/11/ttk2011111735/13rRUIIVld6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2007/04/n0624", "title": "Inferring Adaptive Regulation Thresholds and Association Rules from Gene Expression Data through Combinatorial Optimization Learning", "doi": null, "abstractUrl": "/journal/tb/2007/04/n0624/13rRUwbJD3n", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/05/ttb2011051385", "title": "A Mathematical Model for the Validation of Gene Selection Methods", "doi": null, "abstractUrl": "/journal/tb/2011/05/ttb2011051385/13rRUx0geym", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwpGgKs", "title": "Biomedical Engineering and Biotechnology, International Conference on", "acronym": "icbeb", "groupId": "1801747", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBigFyc", "doi": "10.1109/iCBEB.2012.242", "title": "ICA-based Gene Expression Modules Exploring for Alzheimer's Disease", "normalizedTitle": "ICA-based Gene Expression Modules Exploring for Alzheimer's Disease", "abstract": "The grand challenge of Alzheimer's disease (AD) are the early detection, accurately diagnoising, and the the reconstruction of genes signal pathways and its regulatory network. In our study, we use informatics methods to extract significant genes and reconstruct AD gene regulatory network. To avoid the limitation of traditional clustering methods which group genes in only one class and base on the global similarities in their expression profiles, we provide a data-driven biclustering method, independent component analysis (ICA), to identify significant genes and gene regulatory modules in a meta-analysis of gene expression data of Alzheimer's disease (AD). According to the function of brain area, we use the gene expression data of normal and AD samples of hippocampus (HIP), entorhinal cortex (EC), media temporal gyrus (MTG) and primary visual cortex (VCX) which have close relationship of human learning and memory. The reconstructed AD regulatory modules demonstrated that integration of the significant genes from more brain areas can enrich the information of genes and their pathways that play a prominent role in AD and improve the validity of the gene regulatory network.", "abstracts": [ { "abstractType": "Regular", "content": "The grand challenge of Alzheimer's disease (AD) are the early detection, accurately diagnoising, and the the reconstruction of genes signal pathways and its regulatory network. In our study, we use informatics methods to extract significant genes and reconstruct AD gene regulatory network. To avoid the limitation of traditional clustering methods which group genes in only one class and base on the global similarities in their expression profiles, we provide a data-driven biclustering method, independent component analysis (ICA), to identify significant genes and gene regulatory modules in a meta-analysis of gene expression data of Alzheimer's disease (AD). According to the function of brain area, we use the gene expression data of normal and AD samples of hippocampus (HIP), entorhinal cortex (EC), media temporal gyrus (MTG) and primary visual cortex (VCX) which have close relationship of human learning and memory. The reconstructed AD regulatory modules demonstrated that integration of the significant genes from more brain areas can enrich the information of genes and their pathways that play a prominent role in AD and improve the validity of the gene regulatory network.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The grand challenge of Alzheimer's disease (AD) are the early detection, accurately diagnoising, and the the reconstruction of genes signal pathways and its regulatory network. In our study, we use informatics methods to extract significant genes and reconstruct AD gene regulatory network. To avoid the limitation of traditional clustering methods which group genes in only one class and base on the global similarities in their expression profiles, we provide a data-driven biclustering method, independent component analysis (ICA), to identify significant genes and gene regulatory modules in a meta-analysis of gene expression data of Alzheimer's disease (AD). According to the function of brain area, we use the gene expression data of normal and AD samples of hippocampus (HIP), entorhinal cortex (EC), media temporal gyrus (MTG) and primary visual cortex (VCX) which have close relationship of human learning and memory. The reconstructed AD regulatory modules demonstrated that integration of the significant genes from more brain areas can enrich the information of genes and their pathways that play a prominent role in AD and improve the validity of the gene regulatory network.", "fno": "4706a821", "keywords": [ "Independent Component Analysis", "DNA Microarray Gene Expression Data", "Gene Expression Module", "Alzheimers Disease" ], "authors": [ { "affiliation": null, "fullName": "Wei Kong", "givenName": "Wei", "surname": "Kong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shasha Li", "givenName": "Shasha", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaoyang Mou", "givenName": "Xiaoyang", "surname": "Mou", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbeb", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-05-01T00:00:00", "pubType": "proceedings", "pages": "821-824", "year": "2012", "issn": null, "isbn": "978-0-7695-4706-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4706a817", "articleId": "12OmNAJm0oI", "__typename": "AdjacentArticleType" }, "next": { "fno": "4706a825", "articleId": "12OmNrJiCR1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2012/2310/0/06468612", "title": "Ant Colony Optimization Vs Genetic Algorithm to calculate gene order of gene expression level of Alzheimer's disease", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468612/12OmNAmmuPf", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122714", "title": "The nonlinear correlation character of gene expression data on Alzheimer's disease and hierarchy clustering of co-regulated gene", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122714/12OmNqJ8tpo", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2016/3846/0/07862090", "title": "Finding a disease-related gene from microarray data using random forest", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2016/07862090/12OmNrkjVkn", "parentPublication": { "id": "proceedings/iccicc/2016/3846/0", "title": "2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2012/2310/0/06468605", "title": "The feature of resonance of gene expression and identification of the genes associated with Alzheimer's disease", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468605/12OmNro0HYE", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706599", "title": "Exploring matrix factorization techniques for significant genes identification of microarray dataset", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706599/12OmNwvVrN8", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122713", "title": "The strong correlation of gene expression data on Alzheimer's disease and co-regulation of gene", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122713/12OmNx3q6YW", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051901", "title": "Analyzing Alzheimer's disease gene expression dataset using clustering and association rule mining", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051901/12OmNxX3uHY", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122708", "title": "Define a function on gene order of DNA microarray data and use it to identify genes associated with Alzheimer's disease", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122708/12OmNzUPpH4", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122707", "title": "The framework of applying vertex coloring method to identify genes associated with Alzheimer's diseases basing on gene expression", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122707/12OmNzmclV2", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a248", "title": "Classification of Alzheimer's Disease Based on Stacked Denoising Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a248/1dUo29kv0CA", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy6qfOH", "title": "2013 Computer Science and Information Technologies (CSIT)", "acronym": "csit", "groupId": "1002437", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNx5Yvea", "doi": "10.1109/CSITechnol.2013.6710349", "title": "On knowledge-based gene expression data analysis", "normalizedTitle": "On knowledge-based gene expression data analysis", "abstract": "Nowadays, technology and technological diversity of the gene expression measurements raise new issues related to proper data analysis and accurate interpretation of results. Because gene expression measurement includes many complex steps and is performed on randomly selected cells from population, the measured value of gene expression is a stochastic variable, and may vary in wide range. Consequently, based on gene expression values it is hard to distinguish the genes associated with condition of interest from those none-associated. Thepresent articleis focused on theoretical justification ofthe mentioned problemand proposesa solutionthrough complementing of data-driven analysis with knowledge-based approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, technology and technological diversity of the gene expression measurements raise new issues related to proper data analysis and accurate interpretation of results. Because gene expression measurement includes many complex steps and is performed on randomly selected cells from population, the measured value of gene expression is a stochastic variable, and may vary in wide range. Consequently, based on gene expression values it is hard to distinguish the genes associated with condition of interest from those none-associated. Thepresent articleis focused on theoretical justification ofthe mentioned problemand proposesa solutionthrough complementing of data-driven analysis with knowledge-based approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, technology and technological diversity of the gene expression measurements raise new issues related to proper data analysis and accurate interpretation of results. Because gene expression measurement includes many complex steps and is performed on randomly selected cells from population, the measured value of gene expression is a stochastic variable, and may vary in wide range. Consequently, based on gene expression values it is hard to distinguish the genes associated with condition of interest from those none-associated. Thepresent articleis focused on theoretical justification ofthe mentioned problemand proposesa solutionthrough complementing of data-driven analysis with knowledge-based approaches.", "fno": "06710349", "keywords": [ "Gene Expression", "Bioinformatics", "Genomics", "Proteins", "Noise", "Algorithm Design And Analysis", "Functional Pathway", "Gene Expression", "Probability Distribution", "Classification", "Feature Selection" ], "authors": [ { "affiliation": "Institute of Molecular Biology, Yerevan, Armenia", "fullName": "Arsen Arakelyan", "givenName": "Arsen", "surname": "Arakelyan", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Informatics and Automation Problems of NAS RA, Yerevan, Armenia", "fullName": "Levon Aslanyan", "givenName": "Levon", "surname": "Aslanyan", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Molecular Biology, Yerevan, Armenia", "fullName": "Anna Boyajyan", "givenName": "Anna", "surname": "Boyajyan", "__typename": "ArticleAuthorType" } ], "idPrefix": "csit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2013", "issn": null, "isbn": "978-1-4799-2460-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06710348", "articleId": "12OmNzkMlH9", "__typename": "AdjacentArticleType" }, "next": { "fno": "06710350", "articleId": "12OmNBZYTpX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2014/4435/0/4435a247", "title": "miXGENE Tool for Learning from Heterogeneous Gene Expression Data Using Prior Knowledge", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a247/12OmNCcbEhW", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392656", "title": "Identifying context-specific transcription factor targets from prior knowledge and gene expression data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392656/12OmNCesr7o", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217918", "title": "Correlation networks: Biologically driven relationships from gene expression data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217918/12OmNqBKU8h", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2017/6721/0/07923727", "title": "Differential Gene Expression with Lossy Compression of Quality Scores in RNA-Seq Data", "doi": null, "abstractUrl": "/proceedings-article/dcc/2017/07923727/12OmNqzcvT6", "parentPublication": { "id": "proceedings/dcc/2017/6721/0", "title": "2017 Data Compression Conference (DCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120507", "title": "Visually Relating Gene Expression and in vivo DNA Binding Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120507/12OmNzCF4ST", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/01/07593332", "title": "GSEH: A Novel Approach to Select Prostate Cancer-Associated Genes Using Gene Expression Heterogeneity", "doi": null, "abstractUrl": "/journal/tb/2018/01/07593332/13rRUxN5eC9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a251", "title": "Quantitative Analysis of ECI2 Expression from RNA-Seq for Breast Cancer Gene Signatures", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a251/17D45WrVggI", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669808", "title": "Gene expression analysis of known COPD loci revealed its varied levels by disease severity", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669808/1A9VFvDTb9e", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a477", "title": "Support for Accessibility, Reproducibility and Transparency in a Service-Oriented Gene Expression Analysis Platform", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a477/1cdO1M9V8MU", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073128", "title": "DeepGx: Deep Learning Using Gene Expression for Cancer Classification", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073128/1jjAaeu5G3C", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkEU4h", "title": "2006 IEEE/NLM Life Science Systems and Applications Workshop", "acronym": "lssa", "groupId": "1001257", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzahbTo", "doi": "10.1109/LSSA.2006.250396", "title": "Mining Gene Expression Profiles with Biological Prior Knowledge", "normalizedTitle": "Mining Gene Expression Profiles with Biological Prior Knowledge", "abstract": "One of the important goals in the post-genomic era is to identify the functions of genes, either individually or as group. Recently, there has been an increasing use of the gene ontology (GO) to analyze a list of genes identified via various statistical and/or computational methods. The main assumption behind using GO for interpreting microarray data is that the genes that belong to similar molecular functions or biological processes would display similarly tightly regulated expression patterns. Current methods utilize GO after the statistical analysis of gene expression data. In this paper, we describe a method that utilizes both gene expression values and biological knowledge simultaneously to identify the significant biological functions. The method is different from other methods in that it incorporates GO as prior knowledge into the mining of gene expression data. The method has been applied to the gene expression profiles to cell cycle experiments", "abstracts": [ { "abstractType": "Regular", "content": "One of the important goals in the post-genomic era is to identify the functions of genes, either individually or as group. Recently, there has been an increasing use of the gene ontology (GO) to analyze a list of genes identified via various statistical and/or computational methods. The main assumption behind using GO for interpreting microarray data is that the genes that belong to similar molecular functions or biological processes would display similarly tightly regulated expression patterns. Current methods utilize GO after the statistical analysis of gene expression data. In this paper, we describe a method that utilizes both gene expression values and biological knowledge simultaneously to identify the significant biological functions. The method is different from other methods in that it incorporates GO as prior knowledge into the mining of gene expression data. The method has been applied to the gene expression profiles to cell cycle experiments", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One of the important goals in the post-genomic era is to identify the functions of genes, either individually or as group. Recently, there has been an increasing use of the gene ontology (GO) to analyze a list of genes identified via various statistical and/or computational methods. The main assumption behind using GO for interpreting microarray data is that the genes that belong to similar molecular functions or biological processes would display similarly tightly regulated expression patterns. Current methods utilize GO after the statistical analysis of gene expression data. In this paper, we describe a method that utilizes both gene expression values and biological knowledge simultaneously to identify the significant biological functions. The method is different from other methods in that it incorporates GO as prior knowledge into the mining of gene expression data. The method has been applied to the gene expression profiles to cell cycle experiments", "fno": "04015797", "keywords": [ "Statistical Analysis", "Data Mining", "Gene Expression Profiles", "Biological Prior Knowledge", "Gene Ontology", "Statistical Methods", "Computational Methods", "Microarray Data", "Molecular Functions", "Tightly Regulated Expression Patterns" ], "authors": [ { "affiliation": "Dept. of Comput. Sci.&Eng., Arizona State Univ., Tempe, AZ", "fullName": "Seungchan Kim", "givenName": null, "surname": "Seungchan Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci.&Eng., Arizona State Univ., Tempe, AZ", "fullName": "Younghee Tak", "givenName": null, "surname": "Younghee Tak", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci.&Eng., Arizona State Univ., Tempe, AZ", "fullName": "L. Tari", "givenName": "L.", "surname": "Tari", "__typename": "ArticleAuthorType" } ], "idPrefix": "lssa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "1-2", "year": "2006", "issn": null, "isbn": "1-4244-0277-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04015812", "articleId": "12OmNxA3Z81", "__typename": "AdjacentArticleType" }, "next": { "fno": "04015798", "articleId": "12OmNqyUUGd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2009/5121/0/05332104", "title": "Mining association rules among gene functions in clusters of similar gene expression maps", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332104/12OmNAXPy26", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732491", "title": "A software framework integrating gene expression patterns, binding site analysis and gene ontology to hypothesize gene regulation relationships", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732491/12OmNBiygtn", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2010/4300/0/4300a540", "title": "Smoothing Gene Expression Using Biological Networks", "doi": null, "abstractUrl": "/proceedings-article/icmla/2010/4300a540/12OmNC3FGjz", "parentPublication": { "id": "proceedings/icmla/2010/4300/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392675", "title": "Combining gene expression and function in a spatially localized approach", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392675/12OmNrAv3Hc", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csb/2004/2194/0/21940436", "title": "Gene Ontology Friendly Biclustering of Expression Profiles", "doi": null, "abstractUrl": "/proceedings-article/csb/2004/21940436/12OmNrJiCSA", "parentPublication": { "id": "proceedings/csb/2004/2194/0", "title": "Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a372", "title": "Improvement of Survival Prediction from Gene Expression Profiles by Mining of Prior Knowledge", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a372/12OmNwwuDYj", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2010/7779/0/05575916", "title": "Analysis of Gene Expression Data Based on Density and Biological Knowledge", "doi": null, "abstractUrl": "/proceedings-article/fcst/2010/05575916/12OmNxE2mUP", "parentPublication": { "id": "proceedings/fcst/2010/7779/0", "title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999138", "title": "Integrative analysis of chemo-transcriptomic profiles for drug-feature specific gene expression signatures", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999138/12OmNyRPgwZ", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/03/06138849", "title": "Empirical Evidence of the Applicability of Functional Clustering through Gene Expression Classification", "doi": null, "abstractUrl": "/journal/tb/2012/03/06138849/13rRUyXKxSY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/02/09833353", "title": "AngClust: Angle Feature-Based Clustering for Short Time Series Gene Expression Profiles", "doi": null, "abstractUrl": "/journal/tb/2023/02/09833353/1F8uKN6TkM8", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwd2X9", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNApcuoJ", "doi": "10.1109/BIBE.2007.4375655", "title": "Towards Construction of Optimal Strip-Exchanging Moves", "normalizedTitle": "Towards Construction of Optimal Strip-Exchanging Moves", "abstract": "Genome and other syntenic blocks rearrangements have become a topic of intensive study by phylogenists, comparative genomicists, and computational biologists: they are a feature of many cancers, must be taken into account to align highly divergent sequences, and constitute a phylogenetic marker of great interest. The mathematics of rearrangements is far more complex than for indels and mutations in sequences. Genome rearrangements have been modeled by a variety of primitives such as reversals, transpositions , block moves and block interchanges. In this paper, we study a genome rearrangement primitive called strip exchanges. We formulate the primitive as a special case of another primitive, the block interchanges, identify a new lower bound for the sorting by strip exchanges problem. We then design a 2 approximation algorithm for the problem.", "abstracts": [ { "abstractType": "Regular", "content": "Genome and other syntenic blocks rearrangements have become a topic of intensive study by phylogenists, comparative genomicists, and computational biologists: they are a feature of many cancers, must be taken into account to align highly divergent sequences, and constitute a phylogenetic marker of great interest. The mathematics of rearrangements is far more complex than for indels and mutations in sequences. Genome rearrangements have been modeled by a variety of primitives such as reversals, transpositions , block moves and block interchanges. In this paper, we study a genome rearrangement primitive called strip exchanges. We formulate the primitive as a special case of another primitive, the block interchanges, identify a new lower bound for the sorting by strip exchanges problem. We then design a 2 approximation algorithm for the problem.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Genome and other syntenic blocks rearrangements have become a topic of intensive study by phylogenists, comparative genomicists, and computational biologists: they are a feature of many cancers, must be taken into account to align highly divergent sequences, and constitute a phylogenetic marker of great interest. The mathematics of rearrangements is far more complex than for indels and mutations in sequences. Genome rearrangements have been modeled by a variety of primitives such as reversals, transpositions , block moves and block interchanges. In this paper, we study a genome rearrangement primitive called strip exchanges. We formulate the primitive as a special case of another primitive, the block interchanges, identify a new lower bound for the sorting by strip exchanges problem. We then design a 2 approximation algorithm for the problem.", "fno": "04375655", "keywords": [ "Biocomputing", "Biological Techniques", "DNA", "Optimal Strip Exchanging Moves", "Syntenic Blocks Rearrangements", "Phylogenists", "Comparative Genomicists", "Computational Biologists", "Cancers", "Divergent Sequences", "Phylogenetic Marker", "Indels", "Mutations", "Genome Rearrangements", "Reversals", "Transpositions", "Block Interchanges", "Block Moves", "Rearrangement Primitive", "Genomics", "Bioinformatics", "Strips", "Biology Computing", "Cancer", "Phylogeny", "Mathematics", "Genetic Mutations", "Biological System Modeling", "Sorting" ], "authors": [ { "affiliation": "IBM India Pvt. Ltd., swapnoneel.roy@in.ibm.com", "fullName": "Swapnoneel Roy", "givenName": "Swapnoneel", "surname": "Roy", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM India Pvt. Ltd., ashok.thakur@in.ibm.com", "fullName": "Ashok Kumar Thakur", "givenName": "Ashok Kumar", "surname": "Thakur", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2007", "issn": null, "isbn": "1-4244-1509-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04375654", "articleId": "12OmNs0C9Bd", "__typename": "AdjacentArticleType" }, "next": { "fno": "04375656", "articleId": "12OmNC943E9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icas/2007/2859/0/27990035", "title": "Algorithms and Design for an Autonomous Biological System", "doi": null, "abstractUrl": "/proceedings-article/icas/2007/27990035/12OmNxVlTFU", "parentPublication": { "id": "proceedings/icas/2007/2859/0", "title": "Autonomic and Autonomous Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2014/2729/0/2729a360", "title": "An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem", "doi": null, "abstractUrl": "/proceedings-article/pdp/2014/2729a360/12OmNxvO07L", "parentPublication": { "id": "proceedings/pdp/2014/2729/0", "title": "2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1998/5214/0/00744853", "title": "A genetic algorithm approach to hot strip mill rolling scheduling problems", "doi": null, "abstractUrl": "/proceedings-article/tai/1998/00744853/12OmNyUWR1k", "parentPublication": { "id": "proceedings/tai/1998/5214/0", "title": "Proceedings of 10th International Conference on Tools with Artificial Intelligence (ICTA'98)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07229299", "title": "A GRASP-Based Heuristic for the Sorting by Length-Weighted Inversions Problem", "doi": null, "abstractUrl": "/journal/tb/2018/02/07229299/13rRUx0xPH5", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/09423578", "title": "Sorting Permutations by Intergenic Operations", "doi": null, "abstractUrl": "/journal/tb/2021/06/09423578/1tky7m1Y5rO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icispc/2020/8548/0/854800a029", "title": "Stitching Strip Determination for Optimal Seamline Search", "doi": null, "abstractUrl": "/proceedings-article/icispc/2020/854800a029/1u6KBKrmaOY", "parentPublication": { "id": "proceedings/icispc/2020/8548/0", "title": "2020 4th International Conference on Imaging, Signal Processing and Communications (ICISPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFty", "title": "Proceedings of IEEE 36th Annual Foundations of Computer Science", "acronym": "focs", "groupId": "1000292", "volume": "0", "displayVolume": "0", "year": "1995", "__typename": "ProceedingType" }, "article": { "id": "12OmNBiyguE", "doi": "10.1109/SFCS.1995.492588", "title": "Transforming men into mice (polynomial algorithm for genomic distance problem)", "normalizedTitle": "Transforming men into mice (polynomial algorithm for genomic distance problem)", "abstract": "Many people believe that transformations of humans into mice happen only in fairy tales. However, despite some differences in appearance and habits, men and mice are genetically very similar. In the pioneering paper, J.H. Nadeau and B.A. Taylor (1984) estimated that surprisingly few genomic rearrangements (178/spl plusmn/39) happened since the divergence of human and mouse 80 million years ago. However, their analysis is nonconstructive and no rearrangement scenario for human-mouse evolution has been suggested yet. The problem is complicated by the fact that rearrangements in multi chromosomal genomes include inversions, translocations, fusions and fissions of chromosomes, a rather complex set of operations. As a result, at first glance, a polynomial algorithm for the genomic distance problem with all these operations looks almost as improbable as the transformation of a (real) man into a (real) mouse. We prove a duality theorem which expresses the genomic distance in terms of easily computable parameters reflecting different combinatorial properties of sets of strings. This theorem leads to a polynomial time algorithm for computing most parsimonious rearrangement scenarios. Based on this result and the latest comparative physical mapping data we have constructed a scenario of human-mouse evolution with 131 reversals/translocaitons/fusions/fissions. A combination of the genome rearrangement algorithm with the recently proposed experimental technique called ZOO FISH suggests a new constructive approach to the 100 year old problem of reconstructing mammalian evolution.", "abstracts": [ { "abstractType": "Regular", "content": "Many people believe that transformations of humans into mice happen only in fairy tales. However, despite some differences in appearance and habits, men and mice are genetically very similar. In the pioneering paper, J.H. Nadeau and B.A. Taylor (1984) estimated that surprisingly few genomic rearrangements (178/spl plusmn/39) happened since the divergence of human and mouse 80 million years ago. However, their analysis is nonconstructive and no rearrangement scenario for human-mouse evolution has been suggested yet. The problem is complicated by the fact that rearrangements in multi chromosomal genomes include inversions, translocations, fusions and fissions of chromosomes, a rather complex set of operations. As a result, at first glance, a polynomial algorithm for the genomic distance problem with all these operations looks almost as improbable as the transformation of a (real) man into a (real) mouse. We prove a duality theorem which expresses the genomic distance in terms of easily computable parameters reflecting different combinatorial properties of sets of strings. This theorem leads to a polynomial time algorithm for computing most parsimonious rearrangement scenarios. Based on this result and the latest comparative physical mapping data we have constructed a scenario of human-mouse evolution with 131 reversals/translocaitons/fusions/fissions. A combination of the genome rearrangement algorithm with the recently proposed experimental technique called ZOO FISH suggests a new constructive approach to the 100 year old problem of reconstructing mammalian evolution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many people believe that transformations of humans into mice happen only in fairy tales. However, despite some differences in appearance and habits, men and mice are genetically very similar. In the pioneering paper, J.H. Nadeau and B.A. Taylor (1984) estimated that surprisingly few genomic rearrangements (178/spl plusmn/39) happened since the divergence of human and mouse 80 million years ago. However, their analysis is nonconstructive and no rearrangement scenario for human-mouse evolution has been suggested yet. The problem is complicated by the fact that rearrangements in multi chromosomal genomes include inversions, translocations, fusions and fissions of chromosomes, a rather complex set of operations. As a result, at first glance, a polynomial algorithm for the genomic distance problem with all these operations looks almost as improbable as the transformation of a (real) man into a (real) mouse. We prove a duality theorem which expresses the genomic distance in terms of easily computable parameters reflecting different combinatorial properties of sets of strings. This theorem leads to a polynomial time algorithm for computing most parsimonious rearrangement scenarios. Based on this result and the latest comparative physical mapping data we have constructed a scenario of human-mouse evolution with 131 reversals/translocaitons/fusions/fissions. A combination of the genome rearrangement algorithm with the recently proposed experimental technique called ZOO FISH suggests a new constructive approach to the 100 year old problem of reconstructing mammalian evolution.", "fno": "71830581", "keywords": [ "Biology Computing Evolution Biological Genetics Duality Mathematics Sorting Set Theory String Matching Pattern Matching Polynomial Algorithm Genomic Distance Problem Genomic Rearrangements Human Mouse Evolution Multi Chromosomal Genomes Duality Theorem Computable Parameters Combinatorial Properties Strings Polynomial Time Algorithm Parsimonious Rearrangement Scenarios Comparative Physical Mapping Data Genome Rearrangement Algorithm ZOO FISH Mammalian Evolution" ], "authors": [ { "affiliation": "Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA", "fullName": "S. Hannenhalli", "givenName": "S.", "surname": "Hannenhalli", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA", "fullName": "P.A. Pevzner", "givenName": "P.A.", "surname": "Pevzner", "__typename": "ArticleAuthorType" } ], "idPrefix": "focs", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1995-10-01T00:00:00", "pubType": "proceedings", "pages": "581", "year": "1995", "issn": "0272-5428", "isbn": "0-8186-7183-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "71830571", "articleId": "12OmNANBZrt", "__typename": "AdjacentArticleType" }, "next": { "fno": "71830593", "articleId": "12OmNzcPAGk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvDI3WC", "doi": "10.1109/BIBM.2017.8217647", "title": "Unraveling complex local genomic rearrangements from long-read data", "normalizedTitle": "Unraveling complex local genomic rearrangements from long-read data", "abstract": "In this paper, we present a graph search approach for identifying arbitrarily complex structural genomic variation. Our method leverages the ability of long reads (e.g. from Pacific Biosciences platforms) to span multiple breakpoints of complicated local rearrangements, allowing us to resolve small-scale complexities that may be overlooked by other tools. We applied our method to a subset of NA12878 germline events using two long read datasets and demonstrate, with a concordance rate of 88.4% between the two sets, an increased ability to denote complex events over baseline calls from short read data. In a majority of the regions analyzed we detected small complexities that flank the breakpoints of larger events, including small insertions, inversions, and duplicated sequences. These patterns of complexity match known mechanisms associated with DNA replication and structural variant formation, and showcase the ability of our approach to efficiently unravel such events. Our method automatically classifies complex structural variant calls as a combination of nested or adjacent reference transformations, allowing users to identify specific structure types of interest. Additionally, an output report is generated for each event with interactive visual representations of the rearrangement.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a graph search approach for identifying arbitrarily complex structural genomic variation. Our method leverages the ability of long reads (e.g. from Pacific Biosciences platforms) to span multiple breakpoints of complicated local rearrangements, allowing us to resolve small-scale complexities that may be overlooked by other tools. We applied our method to a subset of NA12878 germline events using two long read datasets and demonstrate, with a concordance rate of 88.4% between the two sets, an increased ability to denote complex events over baseline calls from short read data. In a majority of the regions analyzed we detected small complexities that flank the breakpoints of larger events, including small insertions, inversions, and duplicated sequences. These patterns of complexity match known mechanisms associated with DNA replication and structural variant formation, and showcase the ability of our approach to efficiently unravel such events. Our method automatically classifies complex structural variant calls as a combination of nested or adjacent reference transformations, allowing users to identify specific structure types of interest. Additionally, an output report is generated for each event with interactive visual representations of the rearrangement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a graph search approach for identifying arbitrarily complex structural genomic variation. Our method leverages the ability of long reads (e.g. from Pacific Biosciences platforms) to span multiple breakpoints of complicated local rearrangements, allowing us to resolve small-scale complexities that may be overlooked by other tools. We applied our method to a subset of NA12878 germline events using two long read datasets and demonstrate, with a concordance rate of 88.4% between the two sets, an increased ability to denote complex events over baseline calls from short read data. In a majority of the regions analyzed we detected small complexities that flank the breakpoints of larger events, including small insertions, inversions, and duplicated sequences. These patterns of complexity match known mechanisms associated with DNA replication and structural variant formation, and showcase the ability of our approach to efficiently unravel such events. Our method automatically classifies complex structural variant calls as a combination of nested or adjacent reference transformations, allowing users to identify specific structure types of interest. Additionally, an output report is generated for each event with interactive visual representations of the rearrangement.", "fno": "08217647", "keywords": [ "Genomics", "Bioinformatics", "Complexity Theory", "Tools", "Sensitivity", "Sequential Analysis", "Pattern Matching" ], "authors": [ { "affiliation": "University of Illinois at Urbana-Champaign, USA", "fullName": "Zachary D. Stephens", "givenName": "Zachary D.", "surname": "Stephens", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Urbana-Champaign, USA", "fullName": "Ravishankar K. Iyer", "givenName": "Ravishankar K.", "surname": "Iyer", "__typename": "ArticleAuthorType" }, { "affiliation": "Mayo Clinic, Rochester, MN, USA", "fullName": "Chen Wang", "givenName": "Chen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Mayo Clinic, Rochester, MN, USA", "fullName": "Jean-Pierre A. Kocher", "givenName": "Jean-Pierre A.", "surname": "Kocher", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "181-187", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217646", "articleId": "12OmNx3HI8J", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217648", "articleId": "12OmNwekjJ9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2017/3050/0/08217655", "title": "Inversion detection using PacBio long reads", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217655/12OmNA1DMlG", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217962", "title": "Detecting chromosomal structural variation using jaccard distance and parallel architecture", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217962/12OmNB836Ta", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a431", "title": "An Efficient Algorithm for Identifying Genomic Structural Inversion with Wide-spectrum of Length", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a431/12OmNBTawkb", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004395", "title": "TIDE: Inter-chromosomal translocation and insertion detection using embeddings", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004395/12OmNxZBSB5", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipc/2015/8488/0/8488a446", "title": "Parallel Read Error Correction for Big Genomic Datasets", "doi": null, "abstractUrl": "/proceedings-article/hipc/2015/8488a446/12OmNyQphcE", "parentPublication": { "id": "proceedings/hipc/2015/8488/0", "title": "2015 IEEE 22nd International Conference on High Performance Computing (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544889", "title": "Efficient direct search on compressed genomic data", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544889/12OmNzQR1p6", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07484749", "title": "Copy Number Variations Detection: Unravelling the Problem in Tangible Aspects", "doi": null, "abstractUrl": "/journal/tb/2017/06/07484749/13rRUwI5TPw", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/04/07964739", "title": "Modeling Methylation Patterns with Long Read Sequencing Data", "doi": null, "abstractUrl": "/journal/tb/2018/04/07964739/13rRUwh80Bq", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669141", "title": "ParaPindel: a scalable coordinated parallel detection framework for human genome-wide structural variation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669141/1A9VDRaYOZi", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/05/08906140", "title": "ERINS: Novel Sequence Insertion Detection by Constructing an Extended Reference", "doi": null, "abstractUrl": "/journal/tb/2021/05/08906140/1f5qJqyQs4o", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBTawmn", "title": "Cognitive Informatics, IEEE International Conference on", "acronym": "icci", "groupId": "1000097", "volume": "2", "displayVolume": "2", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNybfraT", "doi": "10.1109/COGINF.2006.365601", "title": "Fast Approximate Search in Strings with Rearrangements", "normalizedTitle": "Fast Approximate Search in Strings with Rearrangements", "abstract": "One of the types of genovariation is the intrasequence rearrangement. If we consider nucleotide sequence as a string, then the intrasequence rearrangement may be interpreted as mutual transposition of string parts. Common instruments for the analysis of the nucleotide strings (such as BLAST (Altschul et al., 1990)) are based on the computation of edit distance. Edit-distance approach is very efficient in case of such mutations as deletion, insertion or substitution of a single nucleotide, but almost inapplicable for the sequences with rearrangements. Another approach to the approximate searching in strings under condition of sequence rearrangements is block-edit approach (Lopresti and Tomkins, 1997). However algorithms based on this approach have a very high time complexity, which leads to the tight restrictions in its bioinformatics applications. One of the modern methods of approximate searching with rearrangements is reflected in QUASAR system (Burkhardt et al., 1999). In this article an approach to the search is proposed that is similar to QUASAR. The proposed approach gives visualization of the searching results. As distinct from QUASAR the proposed approach does not involve edit distance concept which allows to obtain time complexity O(n middot ln m), where n is the length of data string and m is the length of pattern. Another peculiarity is the visualization of the results", "abstracts": [ { "abstractType": "Regular", "content": "One of the types of genovariation is the intrasequence rearrangement. If we consider nucleotide sequence as a string, then the intrasequence rearrangement may be interpreted as mutual transposition of string parts. Common instruments for the analysis of the nucleotide strings (such as BLAST (Altschul et al., 1990)) are based on the computation of edit distance. Edit-distance approach is very efficient in case of such mutations as deletion, insertion or substitution of a single nucleotide, but almost inapplicable for the sequences with rearrangements. Another approach to the approximate searching in strings under condition of sequence rearrangements is block-edit approach (Lopresti and Tomkins, 1997). However algorithms based on this approach have a very high time complexity, which leads to the tight restrictions in its bioinformatics applications. One of the modern methods of approximate searching with rearrangements is reflected in QUASAR system (Burkhardt et al., 1999). In this article an approach to the search is proposed that is similar to QUASAR. The proposed approach gives visualization of the searching results. As distinct from QUASAR the proposed approach does not involve edit distance concept which allows to obtain time complexity O(n middot ln m), where n is the length of data string and m is the length of pattern. Another peculiarity is the visualization of the results", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One of the types of genovariation is the intrasequence rearrangement. If we consider nucleotide sequence as a string, then the intrasequence rearrangement may be interpreted as mutual transposition of string parts. Common instruments for the analysis of the nucleotide strings (such as BLAST (Altschul et al., 1990)) are based on the computation of edit distance. Edit-distance approach is very efficient in case of such mutations as deletion, insertion or substitution of a single nucleotide, but almost inapplicable for the sequences with rearrangements. Another approach to the approximate searching in strings under condition of sequence rearrangements is block-edit approach (Lopresti and Tomkins, 1997). However algorithms based on this approach have a very high time complexity, which leads to the tight restrictions in its bioinformatics applications. One of the modern methods of approximate searching with rearrangements is reflected in QUASAR system (Burkhardt et al., 1999). In this article an approach to the search is proposed that is similar to QUASAR. The proposed approach gives visualization of the searching results. As distinct from QUASAR the proposed approach does not involve edit distance concept which allows to obtain time complexity O(n middot ln m), where n is the length of data string and m is the length of pattern. Another peculiarity is the visualization of the results", "fno": "04216519", "keywords": [ "Data String", "Approximate Search", "Genovariation", "Intrasequence Rearrangement", "Nucleotide Sequence", "Nucleotide Strings", "Block Edit Approach", "Time Complexity", "Bioinformatics", "QUASAR System" ], "authors": [ { "affiliation": "Inst. of Math.&Mech., Russian Acad. of Sci., Ural", "fullName": "E. Ivanko", "givenName": "E.", "surname": "Ivanko", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "845-849", "year": "2006", "issn": null, "isbn": "1-4244-0475-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04216518", "articleId": "12OmNBaT60c", "__typename": "AdjacentArticleType" }, "next": { "fno": "04216520", "articleId": "12OmNzYwbVq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sccompanion/2012/4956/0/4956b234", "title": "Understanding Cloud Data Using Approximate String Matching and Edit Distance", "doi": null, "abstractUrl": "/proceedings-article/sccompanion/2012/4956b234/12OmNAYoKxm", "parentPublication": { "id": "proceedings/sccompanion/2012/4956/0", "title": "2012 SC Companion: High Performance Computing, Networking Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2002/1695/4/169540188", "title": "A Windowed Weighted Approach for Approximate Cyclic String Matching", "doi": null, "abstractUrl": "/proceedings-article/icpr/2002/169540188/12OmNBLdKH7", "parentPublication": { "id": "proceedings/icpr/2002/1695/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/3982/2/3982b300", "title": "A Retrieval Method of Similar Strings Using Substrings", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/3982b300/12OmNBQ2VZ2", "parentPublication": { "id": "proceedings/iccea/2010/3982/2", "title": "Computer Engineering and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2009/3874/0/3874a071", "title": "An Adjusted-Edit Distance Algorithm Applying to Web Environment", "doi": null, "abstractUrl": "/proceedings-article/wisa/2009/3874a071/12OmNvxsSVv", "parentPublication": { "id": "proceedings/wisa/2009/3874/0", "title": "Web Information Systems and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2010/4237/0/4237a264", "title": "Approximate Address Matching", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2010/4237a264/12OmNwKGAkI", "parentPublication": { "id": "proceedings/3pgcic/2010/4237/0", "title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/2/71280944", "title": "Rotation-invariant recognition of character strings for Korean cadastral map digitizing", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71280944/12OmNxcMSeJ", "parentPublication": { "id": "proceedings/icdar/1995/7128/2", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/istcs/1995/6915/0/69150067", "title": "All shortest paths in weighted grid graphs and its application to finding all approximate repeats in strings", "doi": null, "abstractUrl": "/proceedings-article/istcs/1995/69150067/12OmNzUgdh7", "parentPublication": { "id": "proceedings/istcs/1995/6915/0", "title": "Theory of Computing Systems, Israel Symposium on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icycs/2008/3398/0/3398a054", "title": "An Edit Distance Algorithm with Block Swap", "doi": null, "abstractUrl": "/proceedings-article/icycs/2008/3398a054/12OmNznkJTK", "parentPublication": { "id": "proceedings/icycs/2008/3398/0", "title": "2008 9th International Conference for Young Computer Scientists", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1998/05/i0522", "title": "Learning String-Edit Distance", "doi": null, "abstractUrl": "/journal/tp/1998/05/i0522/13rRUwhpBOQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/08/i0824", "title": "CASM: A VLSI Chip for Approximate String Matching", "doi": null, "abstractUrl": "/journal/tp/1995/08/i0824/13rRUwkfB08", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQ7FQU", "title": "Proceedings Visualization '93", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNzXFoxI", "doi": "10.1109/VISUAL.1993.398883", "title": "Computer visualization of long genomic sequences", "normalizedTitle": "Computer visualization of long genomic sequences", "abstract": "Human beings find it difficult to analyze local and global oligonucleotide patterns in the linear primary sequences of a genome. In this paper, we present a family of iterated function systems (IFS) that can be used to generate a set of visual models of a DNA sequence. A new visualization function, the W-curve, that is derived from this IFS family is introduced. Using W-curves, a user can readily compare subsequences within a long genomic sequence - or between genomic sequences - and can visually evaluate the effect of local variations (mutations) upon the global genomic information content.<>", "abstracts": [ { "abstractType": "Regular", "content": "Human beings find it difficult to analyze local and global oligonucleotide patterns in the linear primary sequences of a genome. In this paper, we present a family of iterated function systems (IFS) that can be used to generate a set of visual models of a DNA sequence. A new visualization function, the W-curve, that is derived from this IFS family is introduced. Using W-curves, a user can readily compare subsequences within a long genomic sequence - or between genomic sequences - and can visually evaluate the effect of local variations (mutations) upon the global genomic information content.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human beings find it difficult to analyze local and global oligonucleotide patterns in the linear primary sequences of a genome. In this paper, we present a family of iterated function systems (IFS) that can be used to generate a set of visual models of a DNA sequence. A new visualization function, the W-curve, that is derived from this IFS family is introduced. Using W-curves, a user can readily compare subsequences within a long genomic sequence - or between genomic sequences - and can visually evaluate the effect of local variations (mutations) upon the global genomic information content.", "fno": "00398883", "keywords": [ "Molecular Biophysics", "Data Visualisation", "Biology Computing", "DNA", "Biophysics", "Iterative Methods", "Sequences", "Computer Visualisation", "Local Oligonucleotide Patterns", "Long Genomic Sequences", "Global Oligonucleotide Patterns", "Linear Primary Sequences", "Iterated Function Systems", "Visual Models", "DNA Sequence", "Visualization Function", "W Curve", "Subsequences", "Local Variations", "Mutations", "Global Genomic Information Content", "Visualization", "Genomics", "Bioinformatics", "Sequences", "DNA", "Pattern Analysis", "Computer Science", "Humans", "Encoding", "Biology Computing" ], "authors": [ { "affiliation": "Illinois Inst. of Technol., Chicago, IL, USA", "fullName": "D. Wu", "givenName": "D.", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Illinois Inst. of Technol., Chicago, IL, USA", "fullName": "J. Roberge", "givenName": "J.", "surname": "Roberge", "__typename": "ArticleAuthorType" }, { "affiliation": "Illinois Inst. of Technol., Chicago, IL, USA", "fullName": "D.J. Cork", "givenName": "D.J.", "surname": "Cork", "__typename": "ArticleAuthorType" }, { "affiliation": "Illinois Inst. of Technol., Chicago, IL, USA", "fullName": "B.G. Nguyen", "givenName": "B.G.", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Illinois Inst. of Technol., Chicago, IL, USA", "fullName": "T. Grace", "givenName": "T.", "surname": "Grace", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "308,309,310,311,312,313,314,315", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00398882", "articleId": "12OmNyRPgSP", "__typename": "AdjacentArticleType" }, "next": { "fno": "00398884", "articleId": "12OmNBqdr14", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2007/3031/0/30310159", "title": "Predicting Markov Chain Order in Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibm/2007/30310159/12OmNqHItHx", "parentPublication": { "id": "proceedings/bibm/2007/3031/0", "title": "2007 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2017/3151/0/315101a243", "title": "A Parallel Pairwise Alignment with Pruning for Large Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2017/315101a243/12OmNrkjVes", "parentPublication": { "id": "proceedings/pdcat/2017/3151/0", "title": "2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2014/5103/0/5103a044", "title": "Hurdles for Genomic Data Usage Management", "doi": null, "abstractUrl": "/proceedings-article/spw/2014/5103a044/12OmNxj23cm", "parentPublication": { "id": "proceedings/spw/2014/5103/0", "title": "2014 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fbit/2007/2999/0/04524112", "title": "Signal Analysis of Pathogens' Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/fbit/2007/04524112/12OmNy9Prh7", "parentPublication": { "id": "proceedings/fbit/2007/2999/0", "title": "2007 Frontiers in the Convergence of Bioscience and Information Technologies (FBIT '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113275", "title": "Using Private Matching for Securely Querying Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113275/12OmNzBwGuL", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2001/1423/0/00974417", "title": "An XML application for genomic data interoperation", "doi": null, "abstractUrl": "/proceedings-article/bibe/2001/00974417/12OmNzlUKxP", "parentPublication": { "id": "proceedings/bibe/2001/1423/0", "title": "Proceedings 2nd Annual IEEE International Symposium on Bioinformatics and Bioengineering (BIBE 2001)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2017/03/07555354", "title": "Framework for Supporting Genomic Operations", "doi": null, "abstractUrl": "/journal/tc/2017/03/07555354/13rRUwI5U7o", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2017/05/msp2017050029", "title": "Inference Attacks against Kin Genomic Privacy", "doi": null, "abstractUrl": "/magazine/sp/2017/05/msp2017050029/13rRUwbaqT2", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/11/07524001", "title": "Pattern Similarity Search in Genomic Sequences", "doi": null, "abstractUrl": "/journal/tk/2016/11/07524001/13rRUwbaqVl", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a010", "title": "Constructing the Relationship Tree of All Viruses via Whole Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a010/17D45Vw15tg", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4vB", "title": "Parallel and Distributed Processing, IEEE Symposium on", "acronym": "spdp", "groupId": "1000530", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvzs", "doi": "10.1109/SPDP.1992.242748", "title": "A new framework for designing parallel algorithms on series parallel graphs", "normalizedTitle": "A new framework for designing parallel algorithms on series parallel graphs", "abstract": "The authors propose a novel framework for designing efficient parallel algorithms on series parallel graphs. Recently, a novel approach for recognizing series parallel graphs was presented by D. Eppstein. Eppstein explored characterizations of the ear decomposition of series parallel graphs, which can be identified efficiently, in parallel. The authors extend Eppstein's results and show in a unified manner how to solve problems on series parallel graphs efficiently, in parallel, by finding a special ear decomposition of the graph. They demonstrate the utility of their novel framework by presenting O(log n) concurrent read exclusive write (CREW) parallel random access machine (PRAM) algorithms for the construction of a depth-first spanning tree, st-numbering, and a breadth-first spanning tree on series parallel graphs.", "abstracts": [ { "abstractType": "Regular", "content": "The authors propose a novel framework for designing efficient parallel algorithms on series parallel graphs. Recently, a novel approach for recognizing series parallel graphs was presented by D. Eppstein. Eppstein explored characterizations of the ear decomposition of series parallel graphs, which can be identified efficiently, in parallel. The authors extend Eppstein's results and show in a unified manner how to solve problems on series parallel graphs efficiently, in parallel, by finding a special ear decomposition of the graph. They demonstrate the utility of their novel framework by presenting O(log n) concurrent read exclusive write (CREW) parallel random access machine (PRAM) algorithms for the construction of a depth-first spanning tree, st-numbering, and a breadth-first spanning tree on series parallel graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The authors propose a novel framework for designing efficient parallel algorithms on series parallel graphs. Recently, a novel approach for recognizing series parallel graphs was presented by D. Eppstein. Eppstein explored characterizations of the ear decomposition of series parallel graphs, which can be identified efficiently, in parallel. The authors extend Eppstein's results and show in a unified manner how to solve problems on series parallel graphs efficiently, in parallel, by finding a special ear decomposition of the graph. They demonstrate the utility of their novel framework by presenting O(log n) concurrent read exclusive write (CREW) parallel random access machine (PRAM) algorithms for the construction of a depth-first spanning tree, st-numbering, and a breadth-first spanning tree on series parallel graphs.", "fno": "0242748", "keywords": [ "Framework", "Designing Parallel Algorithms", "Series Parallel Graphs", "Ear Decomposition", "CREW", "Parallel Random Access Machine", "Depth First Spanning Tree", "St Numbering", "Breadth First Spanning Tree" ], "authors": [ { "affiliation": "Texas Univ., Dallas, TX, USA", "fullName": "Caspi", "givenName": null, "surname": "Caspi", "__typename": "ArticleAuthorType" }, { "affiliation": "Texas Univ., Dallas, TX, USA", "fullName": "Dekel", "givenName": null, "surname": "Dekel", "__typename": "ArticleAuthorType" } ], "idPrefix": "spdp", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-12-01T00:00:00", "pubType": "proceedings", "pages": "168-175", "year": "1992", "issn": null, "isbn": "0-8186-3200-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0242747", "articleId": "12OmNvTjZWm", "__typename": "AdjacentArticleType" }, "next": { "fno": "0242749", "articleId": "12OmNqEAT6e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzn38JC", "title": "Machine Learning and Applications, Fourth International Conference on", "acronym": "icmla", "groupId": "1001544", "volume": "2", "displayVolume": "2", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGRGbR", "doi": "10.1109/ICMLA.2011.46", "title": "Classification of Patients Using Novel Multivariate Time Series Representations of Physiological Data", "normalizedTitle": "Classification of Patients Using Novel Multivariate Time Series Representations of Physiological Data", "abstract": "In this paper we present two novel multivariate time series representations to classify physiological data of different lengths. The representations may be applied to any group of multivariate time series data that examine the state or health of an entity. Multivariate Bag-of-Patterns and Stacked Bags of-Patterns improve on their univariate counterpart, inspired by the bag-of-words model, by using multiple time series and analyzing the data in a multivariate fashion. We also borrow techniques from the natural language processing domain such as term frequency and inverse document frequency to improve classification accuracy. We introduce a technique named inverse frequency and present experimental results on classifying patients who have experienced acute episodes of hypotension.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we present two novel multivariate time series representations to classify physiological data of different lengths. The representations may be applied to any group of multivariate time series data that examine the state or health of an entity. Multivariate Bag-of-Patterns and Stacked Bags of-Patterns improve on their univariate counterpart, inspired by the bag-of-words model, by using multiple time series and analyzing the data in a multivariate fashion. We also borrow techniques from the natural language processing domain such as term frequency and inverse document frequency to improve classification accuracy. We introduce a technique named inverse frequency and present experimental results on classifying patients who have experienced acute episodes of hypotension.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we present two novel multivariate time series representations to classify physiological data of different lengths. The representations may be applied to any group of multivariate time series data that examine the state or health of an entity. Multivariate Bag-of-Patterns and Stacked Bags of-Patterns improve on their univariate counterpart, inspired by the bag-of-words model, by using multiple time series and analyzing the data in a multivariate fashion. We also borrow techniques from the natural language processing domain such as term frequency and inverse document frequency to improve classification accuracy. We introduce a technique named inverse frequency and present experimental results on classifying patients who have experienced acute episodes of hypotension.", "fno": "4607b172", "keywords": [ "Multivariate Time Series", "Stacked Bags Of Patterns", "Multivariate Bag Of Patterns", "Classification", "Inverse Frequency" ], "authors": [ { "affiliation": null, "fullName": "Patricia Ordóñez", "givenName": "Patricia", "surname": "Ordóñez", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tom Armstrong", "givenName": "Tom", "surname": "Armstrong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tim Oates", "givenName": "Tim", "surname": "Oates", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jim Fackler", "givenName": "Jim", "surname": "Fackler", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmla", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-12-01T00:00:00", "pubType": "proceedings", "pages": "172-179", "year": "2011", "issn": null, "isbn": "978-0-7695-4607-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4607b168", "articleId": "12OmNzYeAQz", "__typename": "AdjacentArticleType" }, "next": { "fno": "4607b180", "articleId": "12OmNyL0TvU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2010/4257/0/4257a096", "title": "Detecting Climate Change in Multivariate Time Series Data by Novel Clustering and Cluster Tracing Techniques", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a096/12OmNAFFdH6", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2011/4409/0/4409a534", "title": "Using Modified Multivariate Bag-of-Words Models to Classify Physiological Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a534/12OmNBO3JYM", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392654", "title": "Early classification of multivariate time series using a hybrid HMM/SVM model", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392654/12OmNvT2peB", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2009/3859/3/3859c636", "title": "The Characterization of a Sort of Biorthogonal Multivariate Wavelet Packets According to an Integer-valued Dilation Matrix", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859c636/12OmNwHz0aL", "parentPublication": { "id": "proceedings/iita/2009/3859/3", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a048", "title": "Fast and Flexible Multivariate Time Series Subsequence Search", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a048/12OmNyKJimJ", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/1/3736a382", "title": "WMCA: A Weighted Matrix Coverage Based Approach to Cluster Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736a382/12OmNyYDDLp", "parentPublication": { "id": "proceedings/icnc/2009/3736/4", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a103", "title": "Granger Causality for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a103/12OmNzahc9L", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2008/3503/0/3503a349", "title": "A Robust Graph-Based Algorithm for Detection and Characterization of Anomalies in Noisy Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2008/3503a349/12OmNzdoN4K", "parentPublication": { "id": "proceedings/icdmw/2008/3503/0", "title": "2008 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09856934", "title": "Multiview Unsupervised Shapelet Learning for Multivariate Time Series Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/04/09856934/1FSY5sQC3tu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006112", "title": "Utilizing Multivariate Time Series for Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006112/1hJsko814TC", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8OunG", "title": "1992 Fourth International Conference on Computing and Information", "acronym": "icci", "groupId": "1000159", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNx3ZjjX", "doi": "10.1109/ICCI.1992.227716", "title": "Maximum and minimum matchings for series-parallel networks", "normalizedTitle": "Maximum and minimum matchings for series-parallel networks", "abstract": "Series-parallel networks are often used as models for electric circuits. The authors use series-parallel graphs to represent series-parallel networks. Since, there are many different graph representations for a series-parallel networks, they are interested in studying maximum matching in different graph representations of a single network. The number of edges in a maximum matching of G is called the edge independence number of G ad denoted by beta (G). For a network N, the maximum matching number, beta (N), is defined to be max( beta (G(N))) where G(N) is a graph representation for N. The minimum matching number, beta *(N), is defined to be min( beta (G(N))). The authors present linear time algorithms to compute beta (N) and beta *(N) for any series-parallel network N.<>", "abstracts": [ { "abstractType": "Regular", "content": "Series-parallel networks are often used as models for electric circuits. The authors use series-parallel graphs to represent series-parallel networks. Since, there are many different graph representations for a series-parallel networks, they are interested in studying maximum matching in different graph representations of a single network. The number of edges in a maximum matching of G is called the edge independence number of G ad denoted by beta (G). For a network N, the maximum matching number, beta (N), is defined to be max( beta (G(N))) where G(N) is a graph representation for N. The minimum matching number, beta *(N), is defined to be min( beta (G(N))). The authors present linear time algorithms to compute beta (N) and beta *(N) for any series-parallel network N.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Series-parallel networks are often used as models for electric circuits. The authors use series-parallel graphs to represent series-parallel networks. Since, there are many different graph representations for a series-parallel networks, they are interested in studying maximum matching in different graph representations of a single network. The number of edges in a maximum matching of G is called the edge independence number of G ad denoted by beta (G). For a network N, the maximum matching number, beta (N), is defined to be max( beta (G(N))) where G(N) is a graph representation for N. The minimum matching number, beta *(N), is defined to be min( beta (G(N))). The authors present linear time algorithms to compute beta (N) and beta *(N) for any series-parallel network N.", "fno": "00227716", "keywords": [ "Graph Theory", "Logic Design", "Edge Labelled Graph", "Series Parallel Networks", "Series Parallel Graphs", "Maximum Matching", "Graph Representations", "Edge Independence Number", "Maximum Matching Number", "Minimum Matching Number", "Linear Time Algorithms", "Computer Networks", "Circuits", "Information Science", "Concurrent Computing", "Tree Data Structures", "Tree Graphs", "Boolean Functions" ], "authors": [ { "affiliation": "Dept. of Comput. & Inf. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan", "fullName": "Shih-Yih Wang", "givenName": null, "surname": "Shih-Yih Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. & Inf. Sci., Nat. Chiao-Tung Univ., Hsinchu, Taiwan", "fullName": "Lih-Hsing Hsu", "givenName": null, "surname": "Lih-Hsing Hsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "14,15,16,17", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00227715", "articleId": "12OmNrIrPhH", "__typename": "AdjacentArticleType" }, "next": { "fno": "00227717", "articleId": "12OmNBWi6Mb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icci/1992/2812/0/00227709", "title": "Efficient algorithms for computing matching and chromatic polynomials on series-parallel graphs", "doi": null, "abstractUrl": "/proceedings-article/icci/1992/00227709/12OmNAH5dm2", "parentPublication": { "id": "proceedings/icci/1992/2812/0", "title": "1992 Fourth International Conference on Computing and Information", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1992/3200/0/0242748", "title": "A new framework for designing parallel algorithms on series parallel graphs", "doi": null, "abstractUrl": "/proceedings-article/spdp/1992/0242748/12OmNAkWvzs", "parentPublication": { "id": "proceedings/spdp/1992/3200/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci/1993/4212/0/00315371", "title": "Parallel computing dominators on hypercube multiprocessors", "doi": null, "abstractUrl": "/proceedings-article/icci/1993/00315371/12OmNApcudE", "parentPublication": { "id": "proceedings/icci/1993/4212/0", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1990/2087/0/00143498", "title": "On the parallel recognition of some tree-representable graphs", "doi": null, "abstractUrl": "/proceedings-article/spdp/1990/00143498/12OmNqG0T1n", "parentPublication": { "id": "proceedings/spdp/1990/2087/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/1994/6555/0/00590315", "title": "Parallel algorithms for verification and sensitivity analysis of minimum spanning trees", "doi": null, "abstractUrl": "/proceedings-article/icpads/1994/00590315/12OmNrJiCWs", "parentPublication": { "id": "proceedings/icpads/1994/6555/0", "title": "Proceedings of 1994 International Conference on Parallel and Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1993/3230/2/00284100", "title": "An efficient EREW algorithm for minimum path cover and Hamiltonicity on cographs", "doi": null, "abstractUrl": "/proceedings-article/hicss/1993/00284100/12OmNwe2IBV", "parentPublication": { "id": "proceedings/hicss/1993/3230/2", "title": "1993 The Twenty-sixth Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2001/1390/0/13900579", "title": "Randomly Colouring Graphs with Lower Bounds on Girth and Maximum Degree", "doi": null, "abstractUrl": "/proceedings-article/focs/2001/13900579/12OmNx965zi", "parentPublication": { "id": "proceedings/focs/2001/1390/0", "title": "Proceedings 2001 IEEE International Conference on Cluster Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1992/3200/0/0242754", "title": "An NC algorithm for finding minimum weighted completion time schedule on series parallel graphs", "doi": null, "abstractUrl": "/proceedings-article/spdp/1992/0242754/12OmNxWLTGg", "parentPublication": { "id": "proceedings/spdp/1992/3200/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2002/09/l0985", "title": "An Efficient Parallel Algorithm for the Efficient Domination Problem on Distance-Hereditary Graphs", "doi": null, "abstractUrl": "/journal/td/2002/09/l0985/13rRUwdrdS1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1986/02/01676729", "title": "Complexity Based on Partitioning of Boolean Circuits and their Relation to Multivalued Circuits", "doi": null, "abstractUrl": "/journal/tc/1986/02/01676729/13rRUxcbnBn", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzgNXYN", "title": "Communication Systems and Network Technologies, International Conference on", "acronym": "csnt", "groupId": "1800448", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyaoDvw", "doi": "10.1109/CSNT.2012.136", "title": "Coordinated Design of Power System Stabilizer Using Thyristor Controlled Series Compensator Controller: An Artificial Bee Colony Approach", "normalizedTitle": "Coordinated Design of Power System Stabilizer Using Thyristor Controlled Series Compensator Controller: An Artificial Bee Colony Approach", "abstract": "This paper introduces a novel application of artificial bee colony (ABC) in designing the coordinated Power System Stabilizer (PSS) with Thyristor Controlled Series Compensator (TCSC) based Controller to improve the transient stability of single machine connected to infinite bus through transmission line. Various simulation results and comparisons over different loading conditions on a single machine infinite bus power system shows the superiority of ABC in designing the coordinated controller.", "abstracts": [ { "abstractType": "Regular", "content": "This paper introduces a novel application of artificial bee colony (ABC) in designing the coordinated Power System Stabilizer (PSS) with Thyristor Controlled Series Compensator (TCSC) based Controller to improve the transient stability of single machine connected to infinite bus through transmission line. Various simulation results and comparisons over different loading conditions on a single machine infinite bus power system shows the superiority of ABC in designing the coordinated controller.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper introduces a novel application of artificial bee colony (ABC) in designing the coordinated Power System Stabilizer (PSS) with Thyristor Controlled Series Compensator (TCSC) based Controller to improve the transient stability of single machine connected to infinite bus through transmission line. Various simulation results and comparisons over different loading conditions on a single machine infinite bus power system shows the superiority of ABC in designing the coordinated controller.", "fno": "4692a606", "keywords": [ "Artificial Bee Colony", "PSS", "TCSC", "Phillips Heffron Model", "Small Signal Stability" ], "authors": [ { "affiliation": null, "fullName": "Bagepalli Sreenivas Theja", "givenName": "Bagepalli Sreenivas", "surname": "Theja", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Annamdevula Raviteja", "givenName": "Annamdevula", "surname": "Raviteja", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Anguluri Rajasekhar", "givenName": "Anguluri", "surname": "Rajasekhar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ajith Abraham", "givenName": "Ajith", "surname": "Abraham", "__typename": "ArticleAuthorType" } ], "idPrefix": "csnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-05-01T00:00:00", "pubType": "proceedings", "pages": "606-611", "year": "2012", "issn": null, "isbn": "978-0-7695-4692-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4692a600", "articleId": "12OmNyv7mi5", "__typename": "AdjacentArticleType" }, "next": { "fno": "4692a612", "articleId": "12OmNxWcH6u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icgec/2010/4281/0/4281a350", "title": "Parallelized Artificial Bee Colony with Ripple-communication Strategy", "doi": null, "abstractUrl": "/proceedings-article/icgec/2010/4281a350/12OmNARiM1y", "parentPublication": { "id": "proceedings/icgec/2010/4281/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2009/3745/1/3745a411", "title": "Comparison and Analysis of the Selection Mechanism in the Artificial Bee Colony Algorithm", "doi": null, "abstractUrl": "/proceedings-article/his/2009/3745a411/12OmNAZx8NL", "parentPublication": { "id": "proceedings/his/2009/3745/1", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bic-ta/2011/4514/0/4514a009", "title": "An Improved Artificial Bee Colony for Course Timetabling", "doi": null, "abstractUrl": "/proceedings-article/bic-ta/2011/4514a009/12OmNBscCWN", "parentPublication": { "id": "proceedings/bic-ta/2011/4514/0", "title": "Bio-Inspired Computing: Theories and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2012/2712/0/06249302", "title": "A modified artificial bee colony algorithm for numerical function optimization", "doi": null, "abstractUrl": "/proceedings-article/iscc/2012/06249302/12OmNC3FG6a", "parentPublication": { "id": "proceedings/iscc/2012/2712/0", "title": "2012 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a102", "title": "Application Artificial Bee Colony Algorithm (ABC) for Reconfiguring Distribution Network", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a102/12OmNCxbXKa", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ici/2011/4618/0/4618a112", "title": "Solving Curriculum-Based Course Timetabling Problem with Artificial Bee Colony Algorithm", "doi": null, "abstractUrl": "/proceedings-article/ici/2011/4618a112/12OmNxH9Xf8", "parentPublication": { "id": "proceedings/ici/2011/4618/0", "title": "Informatics and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bic-ta/2011/4514/0/4514a080", "title": "Halton Based Initial Distribution in Artificial Bee Colony Algorithm and Its Application in Software Effort Estimation", "doi": null, "abstractUrl": "/proceedings-article/bic-ta/2011/4514a080/12OmNzDvSiC", "parentPublication": { "id": "proceedings/bic-ta/2011/4514/0", "title": "Bio-Inspired Computing: Theories and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceee/2019/3910/0/391000a091", "title": "Binary Artificial Bee Colony Algorithms for {0-1} Advertisement Problem", "doi": null, "abstractUrl": "/proceedings-article/iceee/2019/391000a091/1cpqDKaXofS", "parentPublication": { "id": "proceedings/iceee/2019/3910/0", "title": "2019 6th International Conference on Electrical and Electronics Engineering (ICEEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartblock/2020/4073/0/407300a173", "title": "Optimization of Artificial Bee Colony Algorithm Based on Immune Regulation", "doi": null, "abstractUrl": "/proceedings-article/smartblock/2020/407300a173/1tpBpETbM5O", "parentPublication": { "id": "proceedings/smartblock/2020/4073/0", "title": "2020 3rd International Conference on Smart BlockChain (SmartBlock)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2021/4486/0/448600a101", "title": "An Improved Artificial Bee Colony with Self-Adaptive Strategies and Application", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2021/448600a101/1yEZpbJAjaU", "parentPublication": { "id": "proceedings/iccnea/2021/4486/0", "title": "2021 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPPB", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNzBOhOv", "doi": "10.1109/INFVIS.2001.963273", "title": "Visualizing Time-Series on Spirals", "normalizedTitle": "Visualizing Time-Series on Spirals", "abstract": "In this paper, we present a new approach for the visualization of time-series data based on spirals. Different to classical bar charts and line graphs, the spiral is suited to visualize large data sets and supports much better the identification of periodic structures in the data. Moreover, it supports both the visualization of nominal and quantitative data based on a similar visualization metaphor. The extension of the spiral visualization to 3D gives access to concepts for zooming and focusing and linking in the data set. As such, spirals complement other visualization techniques for time series and specifically enhance the identication of periodic patterns.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a new approach for the visualization of time-series data based on spirals. Different to classical bar charts and line graphs, the spiral is suited to visualize large data sets and supports much better the identification of periodic structures in the data. Moreover, it supports both the visualization of nominal and quantitative data based on a similar visualization metaphor. The extension of the spiral visualization to 3D gives access to concepts for zooming and focusing and linking in the data set. As such, spirals complement other visualization techniques for time series and specifically enhance the identication of periodic patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a new approach for the visualization of time-series data based on spirals. Different to classical bar charts and line graphs, the spiral is suited to visualize large data sets and supports much better the identification of periodic structures in the data. Moreover, it supports both the visualization of nominal and quantitative data based on a similar visualization metaphor. The extension of the spiral visualization to 3D gives access to concepts for zooming and focusing and linking in the data set. As such, spirals complement other visualization techniques for time series and specifically enhance the identication of periodic patterns.", "fno": "13420007", "keywords": [ "Information Visualization", "Graph Drawing", "Visualization Of Time Series Data", "Data Mining" ], "authors": [ { "affiliation": "crcp", "fullName": "Marc Weber", "givenName": "Marc", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Darmstadt", "fullName": "Marc Alexa", "givenName": "Marc", "surname": "Alexa", "__typename": "ArticleAuthorType" }, { "affiliation": "e4ib.com", "fullName": "Wolfgang Müller", "givenName": "Wolfgang", "surname": "Müller", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-10-01T00:00:00", "pubType": "proceedings", "pages": "7", "year": "2001", "issn": "1522-404X", "isbn": "0-7695-1342-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "13420003", "articleId": "12OmNAlvI1J", "__typename": "AdjacentArticleType" }, "next": { "fno": "13420015", "articleId": "12OmNzDeh89", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1ua4stSUlfa", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "acronym": "ispa-bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1ua4B9LV26Y", "doi": "10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00208", "title": "Design of Performance Benchmark for Time Series Databases", "normalizedTitle": "Design of Performance Benchmark for Time Series Databases", "abstract": "Time series databases are widely used in fields such as Internet, Internet of Things, and Industrial Internet. However, due to diverse applications and architectures of time series databases, the industry has not yet reached a consensus on their performance testing methods. This article starts from the definition and characteristics of time series databases, analyzes the commonly used benchmarking tools. Based on this, suitable datasets and test methods are designed for performance testing, and performance comparisons are analyzed based on this method.", "abstracts": [ { "abstractType": "Regular", "content": "Time series databases are widely used in fields such as Internet, Internet of Things, and Industrial Internet. However, due to diverse applications and architectures of time series databases, the industry has not yet reached a consensus on their performance testing methods. This article starts from the definition and characteristics of time series databases, analyzes the commonly used benchmarking tools. Based on this, suitable datasets and test methods are designed for performance testing, and performance comparisons are analyzed based on this method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Time series databases are widely used in fields such as Internet, Internet of Things, and Industrial Internet. However, due to diverse applications and architectures of time series databases, the industry has not yet reached a consensus on their performance testing methods. This article starts from the definition and characteristics of time series databases, analyzes the commonly used benchmarking tools. Based on this, suitable datasets and test methods are designed for performance testing, and performance comparisons are analyzed based on this method.", "fno": "148500b394", "keywords": [ "Temporal Databases", "Time Series", "Time Series Databases", "Performance Benchmark Design", "Internet Of Things", "Industrial Internet", "Performance Testing Methods", "Industries", "Databases", "Design Methodology", "Time Series Analysis", "Benchmark Testing", "Tools", "Internet Of Things", "Time Series Database", "Test Method", "Performance Benchmark", "Industrial Internet" ], "authors": [ { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Miaoqiong Wang", "givenName": "Miaoqiong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Siyuan Liu", "givenName": "Siyuan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Cloud Comput. & Big Data Res. Inst., China Acad. of Inf. & Commun. Technol., Beijing, China", "fullName": "Kai Wei", "givenName": "Kai", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Han Liu", "givenName": "Han", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Chunyu Jiang", "givenName": "Chunyu", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Shu Yan", "givenName": "Shu", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": "China Academy of Information and Communications Technology, Cloud Computing and Big Data Research Institute,Beijing,China", "fullName": "Pengwei Ma", "givenName": "Pengwei", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispa-bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "1394-1399", "year": "2020", "issn": null, "isbn": "978-1-6654-1485-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "148500b389", "articleId": "1ua4KSXO2l2", "__typename": "AdjacentArticleType" }, "next": { "fno": "148500b400", "articleId": "1ua4EfiTQI0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscid/2008/3311/2/3311b098", "title": "A Moving-Window based Partial Periodic Patterns Update Technology in Time Series Databases", "doi": null, "abstractUrl": "/proceedings-article/iscid/2008/3311b098/12OmNAJVcCX", "parentPublication": { "id": "proceedings/iscid/2008/3311/2", "title": "2008 International Symposium on Computational Intelligence and Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icac/2017/1762/0/1762a279", "title": "Compression for Time Series Databases Using Independent and Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/icac/2017/1762a279/12OmNrAv3MN", "parentPublication": { "id": "proceedings/icac/2017/1762/0", "title": "2017 IEEE International Conference on Autonomic Computing (ICAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2015/6598/0/6598a523", "title": "monBench: A Database Performance Benchmark for Cloud Monitoring System", "doi": null, "abstractUrl": "/proceedings-article/cluster/2015/6598a523/12OmNviHKen", "parentPublication": { "id": "proceedings/cluster/2015/6598/0", "title": "2015 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2014/5063/0/5063a602", "title": "Scalability and Robustness of Time-Series Databases for Cloud-Native Monitoring of Industrial Processes", "doi": null, "abstractUrl": "/proceedings-article/cloud/2014/5063a602/12OmNxWLTjY", "parentPublication": { "id": "proceedings/cloud/2014/5063/0", "title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2004/03/k0332", "title": "Incremental, Online, and Merge Mining of Partial Periodic Patterns in Time-Series Databases", "doi": null, "abstractUrl": "/journal/tk/2004/03/k0332/13rRUNvyafj", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2005/07/k0875", "title": "Periodicity Detection in Time Series Databases", "doi": null, "abstractUrl": "/journal/tk/2005/07/k0875/13rRUwdrdL0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/01/07172543", "title": "Similarity Measure Selection for Clustering Time Series Databases", "doi": null, "abstractUrl": "/journal/tk/2016/01/07172543/13rRUxD9gYc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2022/8106/0/810600b283", "title": "TagTree: Global Tagging Index with Efficient Querying for Time Series Databases", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2022/810600b283/1F1VVqhDE4g", "parentPublication": { "id": "proceedings/ipdps/2022/8106/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2019/0676/0/067600a340", "title": "Industrial Internet of Things: Persistence for Time Series with NoSQL Databases", "doi": null, "abstractUrl": "/proceedings-article/wetice/2019/067600a340/1cJ1ro5BQ3e", "parentPublication": { "id": "proceedings/wetice/2019/0676/0", "title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400a588", "title": "TS-Benchmark: A Benchmark for Time Series Databases", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400a588/1uGXDlWC7bG", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC8uRqY", "title": "2010 International Conference on Computational and Information Sciences", "acronym": "iccis", "groupId": "1800262", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNwDACq6", "doi": "10.1109/ICCIS.2010.15", "title": "Implementation and Simulation of a 3D Constant Turn Target Tracking Model", "normalizedTitle": "Implementation and Simulation of a 3D Constant Turn Target Tracking Model", "abstract": "A new Kalman Filtering model for 3D constant turn (3DCT) target had been presented. This paper makes a study of changing measurements from Pole coordinate to Cartesian coordinate. Then on this basis, this paper uses the method of EKF to make nonlinear equation linearity in the case of unknown pitch and azimuth angular velocity (Convert Measurements Kalman Filtering, CMKF). At last a method for the pseudo kalman filtering using radial velocity and angular velocity is presented for radar awareness system (Adopted Velocity Kalman Filtering, AVKF) which can detect target radial velocity and angular velocity. Simulation results indicate that the 3DCT can increase the convergent rate and precision.", "abstracts": [ { "abstractType": "Regular", "content": "A new Kalman Filtering model for 3D constant turn (3DCT) target had been presented. This paper makes a study of changing measurements from Pole coordinate to Cartesian coordinate. Then on this basis, this paper uses the method of EKF to make nonlinear equation linearity in the case of unknown pitch and azimuth angular velocity (Convert Measurements Kalman Filtering, CMKF). At last a method for the pseudo kalman filtering using radial velocity and angular velocity is presented for radar awareness system (Adopted Velocity Kalman Filtering, AVKF) which can detect target radial velocity and angular velocity. Simulation results indicate that the 3DCT can increase the convergent rate and precision.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new Kalman Filtering model for 3D constant turn (3DCT) target had been presented. This paper makes a study of changing measurements from Pole coordinate to Cartesian coordinate. Then on this basis, this paper uses the method of EKF to make nonlinear equation linearity in the case of unknown pitch and azimuth angular velocity (Convert Measurements Kalman Filtering, CMKF). At last a method for the pseudo kalman filtering using radial velocity and angular velocity is presented for radar awareness system (Adopted Velocity Kalman Filtering, AVKF) which can detect target radial velocity and angular velocity. Simulation results indicate that the 3DCT can increase the convergent rate and precision.", "fno": "4270a029", "keywords": [ "Target Tracking", "3 D Constant Turn Target Model", "Radial Velocity", "Angular Velocity", "Kalman Filtering" ], "authors": [ { "affiliation": null, "fullName": "Guodong Zhang", "givenName": "Guodong", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhong Liu", "givenName": "Zhong", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shiyan Sun", "givenName": "Shiyan", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "29-32", "year": "2010", "issn": null, "isbn": "978-0-7695-4270-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4270a025", "articleId": "12OmNCcbE6U", "__typename": "AdjacentArticleType" }, "next": { "fno": "4270a033", "articleId": "12OmNwLOYU2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccsee/2012/4647/2/4647b563", "title": "Comparison of Two Kinds of Algebraic Algorithms for Solving Angular Velocity in GFSINS", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b563/12OmNAlNiy5", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/3/00914164", "title": "A quaternion-based adaptive attitude tracking controller without velocity measurements", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914164/12OmNBQC85j", "parentPublication": { "id": "proceedings/cdc/2000/6638/3", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b267", "title": "A Novel Design of NGIMU", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b267/12OmNBrV1Rw", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00220228", "title": "Estimation of angular velocity and acceleration from shaft encoder measurements", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00220228/12OmNCcKQQd", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2010/8387/0/p913lim", "title": "Tracking a non-cooperative mobile target using low-power pulsed Doppler radars", "doi": null, "abstractUrl": "/proceedings-article/lcn/2010/p913lim/12OmNwudQM6", "parentPublication": { "id": "proceedings/lcn/2010/8387/0", "title": "IEEE Local Computer Network Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042344", "title": "Investigation on the Extended Angular-Velocity Vold-Kalman Order Tracking", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042344/12OmNyPQ4Hk", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a780", "title": "Research on Torque Control Algorithm for Path Planning of Free Floating Space Robots Capturing Target", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a780/1FUVRk0CX4c", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a112", "title": "Total angular velocity noise research of fan shaped superfluid interference grating gyroscope", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a112/1rvCAs4CqBi", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tcs/2021/2910/0/291000a211", "title": "Kinematic Factors Effecting Push-off Velocity in Flip Turn of Front Crawl Swimming", "doi": null, "abstractUrl": "/proceedings-article/tcs/2021/291000a211/1wRIhmx0jO8", "parentPublication": { "id": "proceedings/tcs/2021/2910/0", "title": "2021 International Conference on Information Technology and Contemporary Sports (TCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600c221", "title": "Study on Modeling of Ship Heading Control System Based on RBFNN-DCBC", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600c221/1x3kDstAATK", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqAU6sR", "title": "Image and Graphics, International Conference on", "acronym": "icig", "groupId": "1001790", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyL0TDC", "doi": "10.1109/ICIG.2011.62", "title": "Invariant Image Recognition Using Radial Jacobi Moment Invariants", "normalizedTitle": "Invariant Image Recognition Using Radial Jacobi Moment Invariants", "abstract": "As orthogonal moments in the polar coordinate, radial orthogonal moments such as Zernike, pseudo-Zernike and orthogonal Fourier-Mellin moments have been successfully used in the field of pattern recognition. However, the scale and rotation invariant property of these moments has not been studied. In this paper, we present a generic approach based on Jacobi-Fourier moments for scale and rotation invariant analysis of radial orthogonal moments. It provides a fundamental mathematical tool for invariant analysis of the radial orthogonal moments since Jacobi-Fourier moments are the generic expressions of radial orthogonal moments. Experimental results show the efficiency and the robustness to noise of the proposed method for recognition tasks.", "abstracts": [ { "abstractType": "Regular", "content": "As orthogonal moments in the polar coordinate, radial orthogonal moments such as Zernike, pseudo-Zernike and orthogonal Fourier-Mellin moments have been successfully used in the field of pattern recognition. However, the scale and rotation invariant property of these moments has not been studied. In this paper, we present a generic approach based on Jacobi-Fourier moments for scale and rotation invariant analysis of radial orthogonal moments. It provides a fundamental mathematical tool for invariant analysis of the radial orthogonal moments since Jacobi-Fourier moments are the generic expressions of radial orthogonal moments. Experimental results show the efficiency and the robustness to noise of the proposed method for recognition tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As orthogonal moments in the polar coordinate, radial orthogonal moments such as Zernike, pseudo-Zernike and orthogonal Fourier-Mellin moments have been successfully used in the field of pattern recognition. However, the scale and rotation invariant property of these moments has not been studied. In this paper, we present a generic approach based on Jacobi-Fourier moments for scale and rotation invariant analysis of radial orthogonal moments. It provides a fundamental mathematical tool for invariant analysis of the radial orthogonal moments since Jacobi-Fourier moments are the generic expressions of radial orthogonal moments. Experimental results show the efficiency and the robustness to noise of the proposed method for recognition tasks.", "fno": "4541a280", "keywords": [ "Radial Orthogonal Moments", "Jacobi Fourier Moments", "Invariant Recognition", "Invariant Features" ], "authors": [ { "affiliation": null, "fullName": "Bin Xiao", "givenName": "Bin", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jian-Feng Ma", "givenName": "Jian-Feng", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiang-Tao Cui", "givenName": "Jiang-Tao", "surname": "Cui", "__typename": "ArticleAuthorType" } ], "idPrefix": "icig", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "280-285", "year": "2011", "issn": null, "isbn": "978-0-7695-4541-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4541a275", "articleId": "12OmNBOCWjG", "__typename": "AdjacentArticleType" }, "next": { "fno": "4541a286", "articleId": "12OmNzBwGoT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2009/2353/0/04959990", "title": "Degraded image analysis using Zernike moment invariants", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04959990/12OmNA1mbdg", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci/2006/0475/2/04216508", "title": "Combining Discrete Orthogonal Moments and DHMMs for Off-Line Handwritten Chinese Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/icci/2006/04216508/12OmNxw5B6l", "parentPublication": { "id": "proceedings/icci/2006/0475/2", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a155", "title": "Moment-Based Techniques for Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a155/12OmNzX6cjB", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/elmar/2006/4403/0/04127480", "title": "Assessment of Region-Based Moment Invariants for Object Recognition", "doi": null, "abstractUrl": "/proceedings-article/elmar/2006/04127480/12OmNznkJQv", "parentPublication": { "id": "proceedings/elmar/2006/4403/0", "title": "International Symposium ELMAR", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1981/02/04767087", "title": "Radial and Angular Moment Invariants for Image Identification", "doi": null, "abstractUrl": "/journal/tp/1981/02/04767087/13rRUwcAqqV", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/05/i0489", "title": "Invariant Image Recognition by Zernike Moments", "doi": null, "abstractUrl": "/journal/tp/1990/05/i0489/13rRUx0gevM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1996/04/i0366", "title": "The Method of Normalization to Determine Invariants", "doi": null, "abstractUrl": "/journal/tp/1996/04/i0366/13rRUxASuiH", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1996/04/i0389", "title": "Orthogonal Moment Features for Use With Parametric and Non-Parametric Classifiers", "doi": null, "abstractUrl": "/journal/tp/1996/04/i0389/13rRUygT7yW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/07/ttp2010071259", "title": "Two-Dimensional Polar Harmonic Transforms for Invariant Image Representation", "doi": null, "abstractUrl": "/journal/tp/2010/07/ttp2010071259/13rRUyuegi9", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC3Xhho", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNzR8CvT", "doi": "10.1109/INFVIS.2004.68", "title": "Uncovering Clusters in Crowded Parallel Coordinates Visualizations", "normalizedTitle": "Uncovering Clusters in Crowded Parallel Coordinates Visualizations", "abstract": "The one-to-one strategy of mapping each single data item into a graphical marker adopted in many visualization techniques has limited usefulness when the number of records and/or the dimensionality of the data set are very high. In this situation, the strong overlapping of graphical markers severely hampers the user's ability to identify patterns in the data from its visual representation. We tackle this problem here with a strategy that computes frequency or density information from the data set, and uses such information in Parallel Coordinates visualizations to filter out the information to be presented to the user, thus reducing visual clutter and allowing the analyst to observe relevant patterns in the data. The algorithms to construct such visualizations, and the interaction mechanisms supported, inspired by traditional image processing techniques such as grayscale manipulation and thresholding are also presented. We also illustrate how such algorithms can assist users to effectively identify clusters in very noisy large data sets.", "abstracts": [ { "abstractType": "Regular", "content": "The one-to-one strategy of mapping each single data item into a graphical marker adopted in many visualization techniques has limited usefulness when the number of records and/or the dimensionality of the data set are very high. In this situation, the strong overlapping of graphical markers severely hampers the user's ability to identify patterns in the data from its visual representation. We tackle this problem here with a strategy that computes frequency or density information from the data set, and uses such information in Parallel Coordinates visualizations to filter out the information to be presented to the user, thus reducing visual clutter and allowing the analyst to observe relevant patterns in the data. The algorithms to construct such visualizations, and the interaction mechanisms supported, inspired by traditional image processing techniques such as grayscale manipulation and thresholding are also presented. We also illustrate how such algorithms can assist users to effectively identify clusters in very noisy large data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The one-to-one strategy of mapping each single data item into a graphical marker adopted in many visualization techniques has limited usefulness when the number of records and/or the dimensionality of the data set are very high. In this situation, the strong overlapping of graphical markers severely hampers the user's ability to identify patterns in the data from its visual representation. We tackle this problem here with a strategy that computes frequency or density information from the data set, and uses such information in Parallel Coordinates visualizations to filter out the information to be presented to the user, thus reducing visual clutter and allowing the analyst to observe relevant patterns in the data. The algorithms to construct such visualizations, and the interaction mechanisms supported, inspired by traditional image processing techniques such as grayscale manipulation and thresholding are also presented. We also illustrate how such algorithms can assist users to effectively identify clusters in very noisy large data sets.", "fno": "87790081", "keywords": [ "Information Visualization", "Visual Clustering", "Density Based Visualization", "Visual Data Mining" ], "authors": [ { "affiliation": "University of São Paulo", "fullName": "Almir Olivette Artero", "givenName": "Almir Olivette", "surname": "Artero", "__typename": "ArticleAuthorType" }, { "affiliation": "University of São Paulo", "fullName": "Maria Cristina Ferreira de Oliveira", "givenName": "Maria Cristina Ferreira", "surname": "de Oliveira", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Massachusetts", "fullName": "Haim Levkowitz", "givenName": "Haim", "surname": "Levkowitz", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-10-01T00:00:00", "pubType": "proceedings", "pages": "81-88", "year": "2004", "issn": "1522-404X", "isbn": "0-7803-8779-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "87790073", "articleId": "12OmNB7LvJ4", "__typename": "AdjacentArticleType" }, "next": { "fno": "87790089", "articleId": "12OmNs5rkRK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ozchi/1996/7525/0/75250012", "title": "Automated General Visualizations", "doi": null, "abstractUrl": "/proceedings-article/ozchi/1996/75250012/12OmNBZYTnu", "parentPublication": { "id": "proceedings/ozchi/1996/7525/0", "title": "Proceedings Sixth Australian Conference on Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/es/2016/3790/0/07880487", "title": "Recommendations for Data Visualizations Based on Gestalt Patterns", "doi": null, "abstractUrl": "/proceedings-article/es/2016/07880487/12OmNCb3ftz", "parentPublication": { "id": "proceedings/es/2016/3790/0", "title": "2016 4th International Conference on Enterprise Systems (ES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790159", "title": "Building Highly-Coordinated Visualizations in Improvise", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790159/12OmNqBtiFh", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780005", "title": "Creating Reusable Visualizations with the Relational Visualization Notation", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780005/12OmNx8wTqW", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edoc/2015/9203/0/9203a068", "title": "A Description Framework for Data Visualizations in Enterprise Information Systems", "doi": null, "abstractUrl": "/proceedings-article/edoc/2015/9203a068/12OmNxd4tAO", "parentPublication": { "id": "proceedings/edoc/2015/9203/0", "title": "2015 IEEE 19th International Enterprise Distributed Object Computing Conference (EDOC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400487", "title": "Just-in-time annotation of clusters, outliers, and trends in point-based data visualizations", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400487/12OmNyyO8KW", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060943", "title": "How Information Visualization Novices Construct Visualizations", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060935", "title": "Uncovering Strengths and Weaknesses of Radial Visualizations---an Empirical Approach", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060935/13rRUwjGoFS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/02/08081825", "title": "Efficient Recommendation of Aggregate Data Visualizations", "doi": null, "abstractUrl": "/journal/tk/2018/02/08081825/13rRUxYrbV5", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a085", "title": "Let&#x0027;s Get Personal: Exploring the Design of Personalized Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a085/1J6hbZrS4dG", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzmclWu", "title": "Ninth International Conference on Information Visualisation (IV'05)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNCd2rUJ", "doi": "10.1109/IV.2005.70", "title": "Learnability of Interactive Coordinated-View Visualizations", "normalizedTitle": "Learnability of Interactive Coordinated-View Visualizations", "abstract": "This paper examines the Human Computer Interaction issue of learnability of interactive coordinated-view visualizations. We take the case of DataMaps, a Census data visualization tool intended for a general audience with a huge percentage of novices. Usability tests conducted on DataMaps revealed three main kinds of problems that novices faced: they could not make strategic selections of coordinated visualizations according to a given task, they lacked familiarity with the nature of the attributes, and there were several misunderstandings of visual syntax and interaction widget usage. We outline design features which are desirable for novice-friendliness: Task based organization of coordinated views to enable strategic selection of views to suit the task, Data centric approach to familiarize novices with data, Self disclosure of visual syntax features and interaction mechanisms by the interface. The design should be such that they can smoothly transition from being a novice to expert. We examine how these principles may be applied to DataMaps to re-design it for \"novice-friendliness\".", "abstracts": [ { "abstractType": "Regular", "content": "This paper examines the Human Computer Interaction issue of learnability of interactive coordinated-view visualizations. We take the case of DataMaps, a Census data visualization tool intended for a general audience with a huge percentage of novices. Usability tests conducted on DataMaps revealed three main kinds of problems that novices faced: they could not make strategic selections of coordinated visualizations according to a given task, they lacked familiarity with the nature of the attributes, and there were several misunderstandings of visual syntax and interaction widget usage. We outline design features which are desirable for novice-friendliness: Task based organization of coordinated views to enable strategic selection of views to suit the task, Data centric approach to familiarize novices with data, Self disclosure of visual syntax features and interaction mechanisms by the interface. The design should be such that they can smoothly transition from being a novice to expert. We examine how these principles may be applied to DataMaps to re-design it for \"novice-friendliness\".", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper examines the Human Computer Interaction issue of learnability of interactive coordinated-view visualizations. We take the case of DataMaps, a Census data visualization tool intended for a general audience with a huge percentage of novices. Usability tests conducted on DataMaps revealed three main kinds of problems that novices faced: they could not make strategic selections of coordinated visualizations according to a given task, they lacked familiarity with the nature of the attributes, and there were several misunderstandings of visual syntax and interaction widget usage. We outline design features which are desirable for novice-friendliness: Task based organization of coordinated views to enable strategic selection of views to suit the task, Data centric approach to familiarize novices with data, Self disclosure of visual syntax features and interaction mechanisms by the interface. The design should be such that they can smoothly transition from being a novice to expert. We examine how these principles may be applied to DataMaps to re-design it for \"novice-friendliness\".", "fno": "23970306", "keywords": [], "authors": [ { "affiliation": "Virginia Tech", "fullName": "Sujatha Krishnamoorthy", "givenName": "Sujatha", "surname": "Krishnamoorthy", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech", "fullName": "Christopher North", "givenName": "Christopher", "surname": "North", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-07-01T00:00:00", "pubType": "proceedings", "pages": "306-311", "year": "2005", "issn": "1550-6037", "isbn": "0-7695-2397-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23970297", "articleId": "12OmNzlly3J", "__typename": "AdjacentArticleType" }, "next": { "fno": "23970312", "articleId": "12OmNqGA51x", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2013/5049/0/5049a239", "title": "EyeC: Coordinated Views for Interactive Visual Exploration of Eye-Tracking Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a239/12OmNAWYKJS", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070374", "title": "Ruru: A spatial and interactive visual programming language for novice robot programming", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070374/12OmNAolGRn", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/blocks-and-beyond/2015/8367/0/07369016", "title": "Transparency and liveness in visual programming environments for novices", "doi": null, "abstractUrl": "/proceedings-article/blocks-and-beyond/2015/07369016/12OmNAq3hMw", "parentPublication": { "id": "proceedings/blocks-and-beyond/2015/8367/0", "title": "2015 IEEE Blocks and Beyond Workshop (Blocks and Beyond)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042546", "title": "Multi-view display coordinated visualization design for crime solving analysis: Vast challenge 2014: Honorable mention for effective use of coordinated visualizations", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042546/12OmNBTawyy", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030072", "title": "Coordinated Multiple Views: a Critical View", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a210", "title": "Interactive Exploration of Ingredient Mixtures Using Multiple Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a210/12OmNClQ0u7", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2013/5091/0/06619514", "title": "SEAL: A Domain-Specific Language for Novice Wireless Sensor Network Programmers", "doi": null, "abstractUrl": "/proceedings-article/seaa/2013/06619514/12OmNvjgWFd", "parentPublication": { "id": "proceedings/seaa/2013/5091/0", "title": "2013 39th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1993/1363/0/00380799", "title": "The heaven and earth virtual reality: Designing applications for novice users", "doi": null, "abstractUrl": "/proceedings-article/vrais/1993/00380799/12OmNzQR1pD", "parentPublication": { "id": "proceedings/vrais/1993/1363/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/05/08809391", "title": "BandWeavy: Interactive Modeling for Craft Band Design", "doi": null, "abstractUrl": "/magazine/cg/2019/05/08809391/1cFV3JOs3kY", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576372", "title": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576372/1y63pjBC6qs", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2Yv", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8wTqW", "doi": "10.1109/VISUAL.2000.885676", "title": "Creating Reusable Visualizations with the Relational Visualization Notation", "normalizedTitle": "Creating Reusable Visualizations with the Relational Visualization Notation", "abstract": "Richly expressive information visualizations are difficult to design and rarely found. Few software tools can generate multi-dimensional visualizations at all, let alone incorporate artistic detail. Although, it is a great efficiency to reuse these visualizations with new data, the associated artistic detail is rarely reusable. The Relational Visualization Notation is a new technique and toolkit for specifying highly expressive graphical representations of data without traditional programming. We seek to discover the accessible power of this notation - both its graphical expressiveness and its ease of re-use. Towards this end we have used the system to reconstruct Minard's visualization of Napoleon's Russian campaign of 1812. The resulting image is strikingly similar to the original, and the design is straightforward to construct. Furthermore, the design permitted by the notation can be directly reused to visualize Hitler's WWII defeat before Moscow. This experience leads us to believe that artistically expressive visualizations can be made to be reusable.", "abstracts": [ { "abstractType": "Regular", "content": "Richly expressive information visualizations are difficult to design and rarely found. Few software tools can generate multi-dimensional visualizations at all, let alone incorporate artistic detail. Although, it is a great efficiency to reuse these visualizations with new data, the associated artistic detail is rarely reusable. The Relational Visualization Notation is a new technique and toolkit for specifying highly expressive graphical representations of data without traditional programming. We seek to discover the accessible power of this notation - both its graphical expressiveness and its ease of re-use. Towards this end we have used the system to reconstruct Minard's visualization of Napoleon's Russian campaign of 1812. The resulting image is strikingly similar to the original, and the design is straightforward to construct. Furthermore, the design permitted by the notation can be directly reused to visualize Hitler's WWII defeat before Moscow. This experience leads us to believe that artistically expressive visualizations can be made to be reusable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Richly expressive information visualizations are difficult to design and rarely found. Few software tools can generate multi-dimensional visualizations at all, let alone incorporate artistic detail. Although, it is a great efficiency to reuse these visualizations with new data, the associated artistic detail is rarely reusable. The Relational Visualization Notation is a new technique and toolkit for specifying highly expressive graphical representations of data without traditional programming. We seek to discover the accessible power of this notation - both its graphical expressiveness and its ease of re-use. Towards this end we have used the system to reconstruct Minard's visualization of Napoleon's Russian campaign of 1812. The resulting image is strikingly similar to the original, and the design is straightforward to construct. Furthermore, the design permitted by the notation can be directly reused to visualize Hitler's WWII defeat before Moscow. This experience leads us to believe that artistically expressive visualizations can be made to be reusable.", "fno": "64780005", "keywords": [ "Information Visualization", "Graphic Design", "Visual Design" ], "authors": [ { "affiliation": "Intellisure", "fullName": "Matthew C. Humphrey", "givenName": "Matthew C.", "surname": "Humphrey", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "5", "year": "2000", "issn": "1070-2385", "isbn": "0-7803-6478-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "64780004", "articleId": "12OmNyQ7FNM", "__typename": "AdjacentArticleType" }, "next": { "fno": "64780006", "articleId": "12OmNxb5hsP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visual/2000/6478/0/00885676", "title": "Creating reusable visualizations with the Relational Visualization Notation", "doi": null, "abstractUrl": "/proceedings-article/visual/2000/00885676/12OmNBNM8TL", "parentPublication": { "id": "proceedings/visual/2000/6478/0", "title": "Proceedings Visualization 2000. VIS 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2009/3575/0/3575a688", "title": "Creating Visualizations through Ontology Mapping", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575a688/12OmNC1Y5iR", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790159", "title": "Building Highly-Coordinated Visualizations in Improvise", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790159/12OmNqBtiFh", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/5/09815034", "title": "Polygraph Diagrams for Holistic Visualization of Data Sets Using Multiple-Units of Analysis", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/09815034/12OmNrF2DGO", "parentPublication": { "id": "proceedings/hicss/2001/0981/5", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790081", "title": "Uncovering Clusters in Crowded Parallel Coordinates Visualizations", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790081/12OmNzR8CvT", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07185456", "title": "Visualization-by-Sketching: An Artist&#x0027;s Interface for Creating Multivariate Time-Varying Data Visualizations", "doi": null, "abstractUrl": "/journal/tg/2016/01/07185456/13rRUIIVlcO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060943", "title": "How Information Visualization Novices Construct Visualizations", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1560", "title": "Querying and Creating Visualizations by Analogy", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1560/13rRUx0xPZq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08233127", "title": "Atom: A Grammar for Unit Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/12/08233127/14H4WLzSYsE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440818", "title": "Looks Good To Me: Visualizations As Sanity Checks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440818/17D45W2WyxG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1Am", "title": "XII Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00481)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoUT4O", "doi": "10.1109/SIBGRA.1999.805722", "title": "Keeping an Eye for HCI", "normalizedTitle": "Keeping an Eye for HCI", "abstract": "We present a computer vision system for real time eye gaze tracking, and discuss some applications of the system to enhance human computer interaction (HCI). The system is based on a inexpensive, robust, real-time pupil detection technique that uses active illumination to segment the pupil. Once the pupil is detected, the glint on the cornea of the eye generated by the active illuminators, are also detected, and used as a reference point to compute the gaze direction. A simple calibration procedure allows the computer to estimate a screen coordinate to where the user is looking at. This information can be used by eye-aware applications to directly control the position of the cursor on the screen, or to assist the user based on her eye movements behavior.", "abstracts": [ { "abstractType": "Regular", "content": "We present a computer vision system for real time eye gaze tracking, and discuss some applications of the system to enhance human computer interaction (HCI). The system is based on a inexpensive, robust, real-time pupil detection technique that uses active illumination to segment the pupil. Once the pupil is detected, the glint on the cornea of the eye generated by the active illuminators, are also detected, and used as a reference point to compute the gaze direction. A simple calibration procedure allows the computer to estimate a screen coordinate to where the user is looking at. This information can be used by eye-aware applications to directly control the position of the cursor on the screen, or to assist the user based on her eye movements behavior.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a computer vision system for real time eye gaze tracking, and discuss some applications of the system to enhance human computer interaction (HCI). The system is based on a inexpensive, robust, real-time pupil detection technique that uses active illumination to segment the pupil. Once the pupil is detected, the glint on the cornea of the eye generated by the active illuminators, are also detected, and used as a reference point to compute the gaze direction. A simple calibration procedure allows the computer to estimate a screen coordinate to where the user is looking at. This information can be used by eye-aware applications to directly control the position of the cursor on the screen, or to assist the user based on her eye movements behavior.", "fno": "04810171", "keywords": [ "Real Time Computer Vision", "Eye Gaze Tracking", "Human Computer Interaction" ], "authors": [ { "affiliation": null, "fullName": "Carlos Morimoto", "givenName": "Carlos", "surname": "Morimoto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dave Koons", "givenName": "Dave", "surname": "Koons", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Arnon Amir", "givenName": "Arnon", "surname": "Amir", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Myron Flickner", "givenName": "Myron", "surname": "Flickner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shumin Zhai", "givenName": "Shumin", "surname": "Zhai", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-10-01T00:00:00", "pubType": "proceedings", "pages": "171", "year": "1999", "issn": "1530-1834", "isbn": "0-7695-0481-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04810161", "articleId": "12OmNvBrgF9", "__typename": "AdjacentArticleType" }, "next": { "fno": "04810177", "articleId": "12OmNzvz6NM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNviZlH1", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "acronym": "sitis", "groupId": "1002425", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqv2l6", "doi": "10.1109/SITIS.2013.125", "title": "Image Tracking Based Measuring System for Adaptive English Learning", "normalizedTitle": "Image Tracking Based Measuring System for Adaptive English Learning", "abstract": "It is significantly obvious that English learning requires personally adapting systems. In order to satisfy this need, measuring the degrees of understanding by image tracking is fairly important. This study investigated whether eye tracking could be employed as a measure of the effectiveness of an E-Learning material on reading. Learners' eye fixations were used as a means of noticing. Results showed a relationship between different proficiencies and patterns of fixations. Suggested effects were found for improving reading proficiencies with eye movement trainings. Future possibilities for technological development of a combining system of image gazing with an E-Learning material are also proposed.", "abstracts": [ { "abstractType": "Regular", "content": "It is significantly obvious that English learning requires personally adapting systems. In order to satisfy this need, measuring the degrees of understanding by image tracking is fairly important. This study investigated whether eye tracking could be employed as a measure of the effectiveness of an E-Learning material on reading. Learners' eye fixations were used as a means of noticing. Results showed a relationship between different proficiencies and patterns of fixations. Suggested effects were found for improving reading proficiencies with eye movement trainings. Future possibilities for technological development of a combining system of image gazing with an E-Learning material are also proposed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is significantly obvious that English learning requires personally adapting systems. In order to satisfy this need, measuring the degrees of understanding by image tracking is fairly important. This study investigated whether eye tracking could be employed as a measure of the effectiveness of an E-Learning material on reading. Learners' eye fixations were used as a means of noticing. Results showed a relationship between different proficiencies and patterns of fixations. Suggested effects were found for improving reading proficiencies with eye movement trainings. Future possibilities for technological development of a combining system of image gazing with an E-Learning material are also proposed.", "fno": "3211a771", "keywords": [ "Materials", "Electronic Learning", "Training", "Tracking", "Computers", "Cameras", "Vocabulary", "Reading Proficiencies", "E Learning", "Effective Reading", "Eye Tracking", "Gazing" ], "authors": [ { "affiliation": null, "fullName": "Makoto Shishido", "givenName": "Makoto", "surname": "Shishido", "__typename": "ArticleAuthorType" } ], "idPrefix": "sitis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "771-778", "year": "2013", "issn": null, "isbn": "978-1-4799-3211-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3211a765", "articleId": "12OmNy1SFNV", "__typename": "AdjacentArticleType" }, "next": { "fno": "3211a779", "articleId": "12OmNAYoKwz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/compsac/2016/8845/2/8845b503", "title": "Your Eye Tells How Well You Comprehend", "doi": null, "abstractUrl": "/proceedings-article/compsac/2016/8845b503/12OmNBKW9A2", "parentPublication": { "id": "proceedings/compsac/2016/8845/1", "title": "2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2011/4554/0/4554a287", "title": "The Effect of Arabic Language on Reading English for Arab EFL Learners: An Eye Tracking Study", "doi": null, "abstractUrl": "/proceedings-article/ialp/2011/4554a287/12OmNBO3JWY", "parentPublication": { "id": "proceedings/ialp/2011/4554/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2004/2291/0/22910456", "title": "Realizing Small Involuntary Movements in Reading English", "doi": null, "abstractUrl": "/proceedings-article/his/2004/22910456/12OmNvs4vrN", "parentPublication": { "id": "proceedings/his/2004/2291/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122569", "title": "Linguistic analysis of English books on environmentology", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122569/12OmNyLiuCJ", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06239191", "title": "Adaptive object tracking by learning background context", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06239191/12OmNz6iO6d", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/emip/2019/2243/0/224300a018", "title": "Visually Analyzing Students' Gaze on C++ Code Snippets", "doi": null, "abstractUrl": "/proceedings-article/emip/2019/224300a018/1dlvMqjcgb6", "parentPublication": { "id": "proceedings/emip/2019/2243/0", "title": "2019 IEEE/ACM 6th International Workshop on Eye Movements in Programming (EMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090461", "title": "Front Camera Eye Tracking For Mobile VR", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090461/1jIxzvZw4YU", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2021/4065/0/406500a188", "title": "ML-based classification of eye movement patterns during reading using eye tracking data from an Apple iPad device: Perspective machine learning algorithm needed for reading quality analytics app on an iPad with built-in eye tracking", "doi": null, "abstractUrl": "/proceedings-article/cw/2021/406500a188/1yBF5P8nrXy", "parentPublication": { "id": "proceedings/cw/2021/4065/0", "title": "2021 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eimss/2021/2707/0/270700a228", "title": "An Eye Movement Experiment Study on Differences between English and Chinese Reading by English Majors", "doi": null, "abstractUrl": "/proceedings-article/eimss/2021/270700a228/1yEZJS3ld16", "parentPublication": { "id": "proceedings/eimss/2021/2707/0", "title": "2021 International Conference on Education, Information Management and Service Science (EIMSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2021/1770/0/177000a282", "title": "Analyzing Unconstrained Reading Patterns of Digital Documents Using Eye Tracking", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2021/177000a282/1zJmSma8aYM", "parentPublication": { "id": "proceedings/jcdl/2021/1770/0", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzXFowU", "title": "2008 IEEE Southwest Symposium on Image Analysis and Interpretation", "acronym": "ssiai", "groupId": "1000345", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNvwTGA5", "doi": "10.1109/SSIAI.2008.4512288", "title": "Visual Fixation Patterns when Judging Image Quality: Effects of Distortion Type, Amount, and Subject Experience", "normalizedTitle": "Visual Fixation Patterns when Judging Image Quality: Effects of Distortion Type, Amount, and Subject Experience", "abstract": "Human visual fixation patterns can provide important insights into how biological systems address the image-analysis problem. This paper presents the results of two eye-tracking experiments designed to investigate how normal visual fixations may be affected when judging image quality. We asked (1) whether people look at different regions when judging image quality vs. just looking; and (2) how different types and amounts of distortion affect fixations. We found that white noise and blurring do not change fixations relative to the task-free condition, whereas compression artifacts can influence fixations, depending on the amount of distortion.", "abstracts": [ { "abstractType": "Regular", "content": "Human visual fixation patterns can provide important insights into how biological systems address the image-analysis problem. This paper presents the results of two eye-tracking experiments designed to investigate how normal visual fixations may be affected when judging image quality. We asked (1) whether people look at different regions when judging image quality vs. just looking; and (2) how different types and amounts of distortion affect fixations. We found that white noise and blurring do not change fixations relative to the task-free condition, whereas compression artifacts can influence fixations, depending on the amount of distortion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human visual fixation patterns can provide important insights into how biological systems address the image-analysis problem. This paper presents the results of two eye-tracking experiments designed to investigate how normal visual fixations may be affected when judging image quality. We asked (1) whether people look at different regions when judging image quality vs. just looking; and (2) how different types and amounts of distortion affect fixations. We found that white noise and blurring do not change fixations relative to the task-free condition, whereas compression artifacts can influence fixations, depending on the amount of distortion.", "fno": "04512288", "keywords": [], "authors": [ { "affiliation": "Image Coding and Analysis Lab, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK 74078, cuong.vu@okstate.edu", "fullName": "C. T. Vu", "givenName": "C. T.", "surname": "Vu", "__typename": "ArticleAuthorType" }, { "affiliation": "Image Coding and Analysis Lab, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK 74078, ericcl@okstate.edu", "fullName": "E. C. Larson", "givenName": "E. C.", "surname": "Larson", "__typename": "ArticleAuthorType" }, { "affiliation": "Image Coding and Analysis Lab, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK 74078, damon.chandler@okstate.edu", "fullName": "D. M. Chandler", "givenName": "D. M.", "surname": "Chandler", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssiai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-03-01T00:00:00", "pubType": "proceedings", "pages": "73-76", "year": "2008", "issn": null, "isbn": "978-1-4244-2296-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04512287", "articleId": "12OmNqGiu8n", "__typename": "AdjacentArticleType" }, "next": { "fno": "04512289", "articleId": "12OmNy2ah0r", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cad-cg/2005/2473/0/24730509", "title": "Foreground-Distortion Method for Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cad-cg/2005/24730509/12OmNAlvHPU", "parentPublication": { "id": "proceedings/cad-cg/2005/2473/0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2002/1695/2/169520584", "title": "Unified Approach to Image Distortion", "doi": null, "abstractUrl": "/proceedings-article/icpr/2002/169520584/12OmNAoUTnk", "parentPublication": { "id": "proceedings/icpr/2002/1695/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/3/3570c513", "title": "Research on Background Reconstruction Based on the Judging of Model Categories", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570c513/12OmNBOllgx", "parentPublication": { "id": "proceedings/wcse/2009/3570/2", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1994/6952/2/00413502", "title": "Perceptual image distortion", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413502/12OmNCgrD7p", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032e799", "title": "Understanding Low- and High-Level Contributions to Fixation Prediction", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032e799/12OmNvEyRau", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2004/2128/1/212810668", "title": "Spectral Image Distortion Map", "doi": null, "abstractUrl": "/proceedings-article/icpr/2004/212810668/12OmNwxlrhx", "parentPublication": { "id": "proceedings/icpr/2004/2128/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459254", "title": "Active segmentation with fixation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459254/12OmNzVoBw5", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a220", "title": "Image Distortion Detection Using Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a220/17D45WgziSm", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000g228", "title": "The Perception-Distortion Tradeoff", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000g228/17D45XuDNEk", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e369", "title": "Multi-Level Curriculum for Training A Distortion-Aware Barrel Distortion Rectification Model", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e369/1BmFEU51H2g", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxX3uMb", "title": "International Conference on Development and Learning", "acronym": "devlrn", "groupId": "1001919", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNwbukkO", "doi": "10.1109/DEVLRN.2005.1490981", "title": "A Computational Model which Learns to Selectively Attend in Category Learning", "normalizedTitle": "A Computational Model which Learns to Selectively Attend in Category Learning", "abstract": "Shepard et al. (1961) made empirical and theoretical investigation of the difficulties of different kinds of classifications using both learning and memory tasks. As the difficulty rank mirrors the number of feature dimensions relevant to the category, later researchers took it as evidence that category learning includes learning how to selectively attend to only useful features, i.e. learning to optimally allocate the attention to those dimensions relative to the category (Rosch and Mervis, 1975). We built a recurrent neural network model that sequentially attended to individual features. Only one feature is explicitly available at one time (as in Rehder and Hoffman's eye tracking settings (Render and Hoffman, 2003)) and previous information is represented implicitly in the network. The probabilities of eye movement from one feature to the next is kept as a fixation transition table. The fixations started randomly without much bias on any particular feature or any movement. The network learned the relevant feature(s) and did the classification by sequentially attending to these features. The rank of the learning time qualitatively matched the difficulty of the categories", "abstracts": [ { "abstractType": "Regular", "content": "Shepard et al. (1961) made empirical and theoretical investigation of the difficulties of different kinds of classifications using both learning and memory tasks. As the difficulty rank mirrors the number of feature dimensions relevant to the category, later researchers took it as evidence that category learning includes learning how to selectively attend to only useful features, i.e. learning to optimally allocate the attention to those dimensions relative to the category (Rosch and Mervis, 1975). We built a recurrent neural network model that sequentially attended to individual features. Only one feature is explicitly available at one time (as in Rehder and Hoffman's eye tracking settings (Render and Hoffman, 2003)) and previous information is represented implicitly in the network. The probabilities of eye movement from one feature to the next is kept as a fixation transition table. The fixations started randomly without much bias on any particular feature or any movement. The network learned the relevant feature(s) and did the classification by sequentially attending to these features. The rank of the learning time qualitatively matched the difficulty of the categories", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shepard et al. (1961) made empirical and theoretical investigation of the difficulties of different kinds of classifications using both learning and memory tasks. As the difficulty rank mirrors the number of feature dimensions relevant to the category, later researchers took it as evidence that category learning includes learning how to selectively attend to only useful features, i.e. learning to optimally allocate the attention to those dimensions relative to the category (Rosch and Mervis, 1975). We built a recurrent neural network model that sequentially attended to individual features. Only one feature is explicitly available at one time (as in Rehder and Hoffman's eye tracking settings (Render and Hoffman, 2003)) and previous information is represented implicitly in the network. The probabilities of eye movement from one feature to the next is kept as a fixation transition table. The fixations started randomly without much bias on any particular feature or any movement. The network learned the relevant feature(s) and did the classification by sequentially attending to these features. The rank of the learning time qualitatively matched the difficulty of the categories", "fno": "01490981", "keywords": [ "Sequential Processing", "Category Learning", "Learning Task", "Memory Task", "Recurrent Neural Network", "Eye Tracking", "Eye Movement", "Fixation Transition Table", "Selective Attention" ], "authors": [ { "affiliation": "Dept. of Comput. Sci.&Eng., California Univ., La Jolla, CA", "fullName": "Lingyun Zhang", "givenName": null, "surname": "Lingyun Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci.&Eng., California Univ., La Jolla, CA", "fullName": "G.W. Cottrell", "givenName": "G.W.", "surname": "Cottrell", "__typename": "ArticleAuthorType" } ], "idPrefix": "devlrn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-07-01T00:00:00", "pubType": "proceedings", "pages": "195-200", "year": "2005", "issn": null, "isbn": "0-7803-9226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01490980", "articleId": "12OmNxTVU0A", "__typename": "AdjacentArticleType" }, "next": { "fno": "01490982", "articleId": "12OmNClQ0zS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2011/0394/0/05995527", "title": "From region similarity to category discovery", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995527/12OmNASraHa", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccgi/2010/4181/0/4181a066", "title": "A Content Recommendation System Based on Category Correlations", "doi": null, "abstractUrl": "/proceedings-article/iccgi/2010/4181a066/12OmNAlvHCC", "parentPublication": { "id": "proceedings/iccgi/2010/4181/0", "title": "Computing in the Global Information Technology, International Multi-Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2008/3502/0/3502a833", "title": "Graph-Based Rare Category Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a833/12OmNAoUT09", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/1/3735a095", "title": "A Text Classification Method with an Effective Feature Extraction Based on Category Analysis", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735a095/12OmNBUAvXl", "parentPublication": { "id": "proceedings/fskd/2009/3735/1", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109b405", "title": "Sub-Category Optimization for Multi-view Multi-pose Object Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109b405/12OmNwbLVtu", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2011/4335/0/4335a852", "title": "Document Topic Extraction Based on Wikipedia Category", "doi": null, "abstractUrl": "/proceedings-article/cso/2011/4335a852/12OmNxRF6YM", "parentPublication": { "id": "proceedings/cso/2011/4335/0", "title": "2011 Fourth International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2010/4047/3/4047c269", "title": "Piecewise Frequency Domain Visual Saliency Detection", "doi": null, "abstractUrl": "/proceedings-article/icic/2010/4047c269/12OmNxX3uvS", "parentPublication": { "id": "proceedings/icic/2010/4047/3", "title": "2010 Third International Conference on Information and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/1/3305a448", "title": "The Category RSC of I-Rough Sets", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305a448/12OmNyoSbb6", "parentPublication": { "id": "proceedings/fskd/2008/3305/1", "title": "2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995312", "title": "Towards cross-category knowledge propagation for learning visual concepts", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995312/12OmNzVoBvV", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom/2012/4865/0/4865a717", "title": "Horizontal Search Method for Wikipedia Category Grouping", "doi": null, "abstractUrl": "/proceedings-article/greencom/2012/4865a717/12OmNzmclIC", "parentPublication": { "id": "proceedings/greencom/2012/4865/0", "title": "2012 IEEE International Conference on Green Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBV9Icj", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "acronym": "etvis", "groupId": "1818666", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUnEDW", "doi": "10.1109/ETVIS.2016.7851164", "title": "Color bands: visualizing dynamic eye movement patterns", "normalizedTitle": "Color bands: visualizing dynamic eye movement patterns", "abstract": "We introduce a visualization technique called color bands for showing the time-varying eye movement behavior of eye-tracked people. Our contribution is the clutter-free representation of time-varying x- and y-positions of gaze data. We map these coordinates to vertical positions from left to right as in traditional line plots. On top, we display the differences between the x- and y-coordinates by the thickness of the band. Fixation durations are visually encoded as circles of varying diameters. Color coding is used to additionally enhance the distance values and the durations in order to perceptually benefit from pattern recognition for an individual participant but also to compare the eye movement behavior of several participants. We illustrate the usefulness of our technique in a case study investigating eye movements from a formerly conducted eye tracking study on the readability of node-link tree diagrams", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a visualization technique called color bands for showing the time-varying eye movement behavior of eye-tracked people. Our contribution is the clutter-free representation of time-varying x- and y-positions of gaze data. We map these coordinates to vertical positions from left to right as in traditional line plots. On top, we display the differences between the x- and y-coordinates by the thickness of the band. Fixation durations are visually encoded as circles of varying diameters. Color coding is used to additionally enhance the distance values and the durations in order to perceptually benefit from pattern recognition for an individual participant but also to compare the eye movement behavior of several participants. We illustrate the usefulness of our technique in a case study investigating eye movements from a formerly conducted eye tracking study on the readability of node-link tree diagrams", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a visualization technique called color bands for showing the time-varying eye movement behavior of eye-tracked people. Our contribution is the clutter-free representation of time-varying x- and y-positions of gaze data. We map these coordinates to vertical positions from left to right as in traditional line plots. On top, we display the differences between the x- and y-coordinates by the thickness of the band. Fixation durations are visually encoded as circles of varying diameters. Color coding is used to additionally enhance the distance values and the durations in order to perceptually benefit from pattern recognition for an individual participant but also to compare the eye movement behavior of several participants. We illustrate the usefulness of our technique in a case study investigating eye movements from a formerly conducted eye tracking study on the readability of node-link tree diagrams", "fno": "07851164", "keywords": [ "Image Color Analysis", "Visualization", "Data Visualization", "Gaze Tracking", "Trajectory", "Encoding", "Two Dimensional Displays" ], "authors": [ { "affiliation": "VISUS, University of Stuttgart", "fullName": "Michael Burch", "givenName": "Michael", "surname": "Burch", "__typename": "ArticleAuthorType" }, { "affiliation": "SUNY Korea; Stony Brook University", "fullName": "Ayush Kumar", "givenName": "Ayush", "surname": "Kumar", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook University", "fullName": "Klaus Mueller", "givenName": "Klaus", "surname": "Mueller", "__typename": "ArticleAuthorType" }, { "affiliation": "VISUS, University of Stuttgart", "fullName": "Daniel Weiskopf", "givenName": "Daniel", "surname": "Weiskopf", "__typename": "ArticleAuthorType" } ], "idPrefix": "etvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "40-44", "year": "2016", "issn": null, "isbn": "978-1-5090-4731-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07851163", "articleId": "12OmNqGRGbW", "__typename": "AdjacentArticleType" }, "next": { "fno": "07851165", "articleId": "12OmNB8kHPk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/etvis/2016/4731/0/07851162", "title": "Saccadelenses: interactive exploratory filtering of eye tracking trajectories", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851162/12OmNAq3hKc", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851165", "title": "Visualizing eye tracking data with gaze-guided slit-scans", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851165/12OmNB8kHPk", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314288", "title": "Challenges and Perspectives in Big Eye-Movement Data Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314288/12OmNButq1p", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a107", "title": "Visual Analysis of Eye Movements by Hierarchical Filter Wheels", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a107/12OmNC2xhyv", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2015/7899/0/07321188", "title": "An Empirical Study on the Patterns of Eye Movement during Summarization Tasks", "doi": null, "abstractUrl": "/proceedings-article/esem/2015/07321188/12OmNCcKQL5", "parentPublication": { "id": "proceedings/esem/2015/7899/0", "title": "2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2015/8037/0/07446176", "title": "An Eye Movement Study on the Reading Process of Automobile Maintenance Test", "doi": null, "abstractUrl": "/proceedings-article/eitt/2015/07446176/12OmNqzcvNx", "parentPublication": { "id": "proceedings/eitt/2015/8037/0", "title": "2015 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2017/1003/0/1003a022", "title": "iTraceVis: Visualizing Eye Movement Data Within Eclipse", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2017/1003a022/12OmNxWcHcx", "parentPublication": { "id": "proceedings/vissoft/2017/1003/0", "title": "2017 IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2015/0478/0/07507101", "title": "An extended Eye Movement Tracker system for an electric wheelchair movement control", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2015/07507101/12OmNyLiuFb", "parentPublication": { "id": "proceedings/aiccsa/2015/0478/0", "title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851161", "title": "Multi-similarity matrices of eye movement data", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851161/12OmNz2C1oZ", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2020/7438/0/09218195", "title": "Towards Automatic Capturing of Traceability Links by Combining Eye Tracking and Interaction Data", "doi": null, "abstractUrl": "/proceedings-article/re/2020/09218195/1nMQwyxTtuM", "parentPublication": { "id": "proceedings/re/2020/7438/0", "title": "2020 IEEE 28th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx0A7Jc", "title": "Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition", "acronym": "fg", "groupId": "1000065", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNzgwmIY", "doi": "10.1109/AFGR.2002.1004139", "title": "Non-Contact Eye Gaze Tracking System by Mapping of Corneal Reflections", "normalizedTitle": "Non-Contact Eye Gaze Tracking System by Mapping of Corneal Reflections", "abstract": "In this paper, we suggest a new system to estimate the direction of a user's eye gaze. Our system consisted of five IR LEDs and a CCD camera. The IR LEDs that are attached to the corners of a computer monitor make glints on the surface of the cornea of the eye. If the user sees the monitor, the center of a pupil is always in a polygon that is made by the glints. Consequently, the direction of the user's eye gaze can be computed without computing the geometrical relation among the eye, the camera, and the monitor in 3D space. Our method is comparatively simple and fast. We will introduce the method and show experimental results.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we suggest a new system to estimate the direction of a user's eye gaze. Our system consisted of five IR LEDs and a CCD camera. The IR LEDs that are attached to the corners of a computer monitor make glints on the surface of the cornea of the eye. If the user sees the monitor, the center of a pupil is always in a polygon that is made by the glints. Consequently, the direction of the user's eye gaze can be computed without computing the geometrical relation among the eye, the camera, and the monitor in 3D space. Our method is comparatively simple and fast. We will introduce the method and show experimental results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we suggest a new system to estimate the direction of a user's eye gaze. Our system consisted of five IR LEDs and a CCD camera. The IR LEDs that are attached to the corners of a computer monitor make glints on the surface of the cornea of the eye. If the user sees the monitor, the center of a pupil is always in a polygon that is made by the glints. Consequently, the direction of the user's eye gaze can be computed without computing the geometrical relation among the eye, the camera, and the monitor in 3D space. Our method is comparatively simple and fast. We will introduce the method and show experimental results.", "fno": "16020101", "keywords": [ "Eye Gaze Tracking System", "Corneal Reflection", "Cross Ratio" ], "authors": [ { "affiliation": "Korea Advanced Institute of Sciencd and Technology", "fullName": "Dong Hyun Yoo", "givenName": "Dong Hyun", "surname": "Yoo", "__typename": "ArticleAuthorType" }, { "affiliation": "Korea Advanced Institute of Sciencd and Technology", "fullName": "Jae Heon Kim", "givenName": "Jae Heon", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Korea Advanced Institute of Sciencd and Technology", "fullName": "Bang Rae Lee", "givenName": "Bang Rae", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Korea Advanced Institute of Sciencd and Technology", "fullName": "Myoung Jin Chung", "givenName": "Myoung Jin", "surname": "Chung", "__typename": "ArticleAuthorType" } ], "idPrefix": "fg", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-05-01T00:00:00", "pubType": "proceedings", "pages": "0101", "year": "2002", "issn": null, "isbn": "0-7695-1602-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04527207", "articleId": "12OmNviZlpZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "16020107", "articleId": "12OmNqIhFOD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1vb8N7rSv0A", "title": "2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS)", "acronym": "cbms", "groupId": "1000153", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1vb8Wg2mwiQ", "doi": "10.1109/CBMS52027.2021.00070", "title": "Enhanced CNN-Based Gaze Estimation on Wireless Capsule Endoscopy Images", "normalizedTitle": "Enhanced CNN-Based Gaze Estimation on Wireless Capsule Endoscopy Images", "abstract": "Wireless capsule endoscopy (WCE) is a modality used for the non-invasive examination of the gastrointestinal (GI) tract. Physicians diagnose pathologies in images derived from Capsule Endoscopy (CE) using specific gaze patterns to observe pathologically related visual cues. Lately, deep learning has advanced in the domain of human eye-fixation estimation in natural images. However, the potentials of predicting the eye related patterns, such as eye fixations, in medical images has not been thoroughly investigated. In this work, we propose a CNN auto-encoder model, that is capable of predicting saliency maps estimating the gaze-patterns, in terms of eye-fixations, of physicians in CE images. The proposed model outperforms other approaches for visual saliency estimation based on physicians' eye fixation by providing an AUC-J of 0.726 among CE images depicting various pathological and normal cases.", "abstracts": [ { "abstractType": "Regular", "content": "Wireless capsule endoscopy (WCE) is a modality used for the non-invasive examination of the gastrointestinal (GI) tract. Physicians diagnose pathologies in images derived from Capsule Endoscopy (CE) using specific gaze patterns to observe pathologically related visual cues. Lately, deep learning has advanced in the domain of human eye-fixation estimation in natural images. However, the potentials of predicting the eye related patterns, such as eye fixations, in medical images has not been thoroughly investigated. In this work, we propose a CNN auto-encoder model, that is capable of predicting saliency maps estimating the gaze-patterns, in terms of eye-fixations, of physicians in CE images. The proposed model outperforms other approaches for visual saliency estimation based on physicians' eye fixation by providing an AUC-J of 0.726 among CE images depicting various pathological and normal cases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Wireless capsule endoscopy (WCE) is a modality used for the non-invasive examination of the gastrointestinal (GI) tract. Physicians diagnose pathologies in images derived from Capsule Endoscopy (CE) using specific gaze patterns to observe pathologically related visual cues. Lately, deep learning has advanced in the domain of human eye-fixation estimation in natural images. However, the potentials of predicting the eye related patterns, such as eye fixations, in medical images has not been thoroughly investigated. In this work, we propose a CNN auto-encoder model, that is capable of predicting saliency maps estimating the gaze-patterns, in terms of eye-fixations, of physicians in CE images. The proposed model outperforms other approaches for visual saliency estimation based on physicians' eye fixation by providing an AUC-J of 0.726 among CE images depicting various pathological and normal cases.", "fno": "412100a189", "keywords": [ "Biomedical Optical Imaging", "Diseases", "Endoscopes", "Eye", "Image Colour Analysis", "Learning Artificial Intelligence", "Medical Image Processing", "Specific Gaze Patterns", "Pathologically Related Visual Cues", "Deep Learning", "Human Eye Fixation Estimation", "Natural Images", "Eye Related Patterns", "Eye Fixations", "Medical Images", "CNN Auto Encoder Model", "Gaze Patterns", "Eye Fixations", "CE Images", "Visual Saliency Estimation", "Pathological Cases", "Normal Cases", "Enhanced CNN Based Gaze Estimation", "Wireless Capsule Endoscopy Images", "Noninvasive Examination", "Gastrointestinal Tract", "Physicians Diagnose Pathologies", "Wireless Communication", "Training", "Visualization", "Pathology", "Endoscopes", "Estimation", "Medical Services", "Wireless Capsule Endoscopy", "Deep Learning", "Visual Saliency" ], "authors": [ { "affiliation": "University of Thessaly,Dept. of Computer Science and Biomedical Informatics,Lamia,Greece", "fullName": "Panagiota Gatoula", "givenName": "Panagiota", "surname": "Gatoula", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Thessaly,Dept. of Computer Science and Biomedical Informatics,Lamia,Greece", "fullName": "George Dimas", "givenName": "George", "surname": "Dimas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Thessaly,Dept. of Computer Science and Biomedical Informatics,Lamia,Greece", "fullName": "Dimitris K. Iakovidis", "givenName": "Dimitris K.", "surname": "Iakovidis", "__typename": "ArticleAuthorType" }, { "affiliation": "Pomeranian Medical University,Dept. of Social Medicine and Public Health,Szczecin,Poland", "fullName": "Anastasios Koulaouzidis", "givenName": "Anastasios", "surname": "Koulaouzidis", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "189-195", "year": "2021", "issn": null, "isbn": "978-1-6654-4121-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "412100a183", "articleId": "1vb8WYx7XtS", "__typename": "AdjacentArticleType" }, "next": { "fno": "412100a196", "articleId": "1vb8VeKWUr6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209c721", "title": "A Web-Based Education System for Reading Video Capsule Endoscopy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c721/12OmNBh8gWZ", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a859", "title": "Active Blood Detection in a High Resolution Capsule Endoscopy using Color Spectrum Transformation", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a859/12OmNqN6R5c", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2014/6929/0/6929a190", "title": "Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method", "doi": null, "abstractUrl": "/proceedings-article/cicn/2014/6929a190/12OmNwGZNKv", "parentPublication": { "id": "proceedings/cicn/2014/6929/0", "title": "2014 International Conference on Computational Intelligence and Communication Networks (CICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2018/4652/0/465201a403", "title": "Simulation Study of Autonomous Drive for Active Capsule Endoscopy", "doi": null, "abstractUrl": "/proceedings-article/irc/2018/465201a403/12OmNxGAL3N", "parentPublication": { "id": "proceedings/irc/2018/4652/0", "title": "2018 Second IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d263", "title": "Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d263/12OmNzxgHtv", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671281", "title": "Graph Convolutional Neural Network For Weakly Supervised Abnormality Localization In Long Capsule Endoscopy Videos", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671281/1A8h5WefoQw", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmbs/2022/6770/0/677000a323", "title": "Video Capsule Endoscopy Classification using Focal Modulation Guided Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cmbs/2022/677000a323/1GhVXg87LvW", "parentPublication": { "id": "proceedings/cmbs/2022/6770/0", "title": "2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956652", "title": "Time-coherent embeddings for Wireless Capsule Endoscopy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956652/1IHqkCNp0yY", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020333", "title": "Thick Data Techniques for Identifying Abnormality in Video Frames for Wireless Capsule Endoscopy", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020333/1KfRgpeCmaI", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2019/4617/0/461700a363", "title": "MedGaze: Gaze Estimation on WCE Images Based on a CNN Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/bibe/2019/461700a363/1grPhN5GVLq", "parentPublication": { "id": "proceedings/bibe/2019/4617/0", "title": "2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zJmQt5adCU", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zJmSma8aYM", "doi": "10.1109/JCDL52503.2021.00036", "title": "Analyzing Unconstrained Reading Patterns of Digital Documents Using Eye Tracking", "normalizedTitle": "Analyzing Unconstrained Reading Patterns of Digital Documents Using Eye Tracking", "abstract": "Researchers read scientific literature to keep current in the field and find state-of-the-art solutions to various scientific problems. Prior work suggests that reading patterns may vary with the researcher&#x0027;s domain expertise and on the content of the digital document. In this work, we present a pilot study of eye-tracking measures during a reading task with the options for zooming and panning of the reading material. The main goal is to analyze unconstrained reading patterns of digital documents using eye movement fixations and dwell time on various sections of a digital document. Our results indicate that participants mostly focused on methodology and results sections, which is consistent with the prior work with constrained reading patterns.", "abstracts": [ { "abstractType": "Regular", "content": "Researchers read scientific literature to keep current in the field and find state-of-the-art solutions to various scientific problems. Prior work suggests that reading patterns may vary with the researcher&#x0027;s domain expertise and on the content of the digital document. In this work, we present a pilot study of eye-tracking measures during a reading task with the options for zooming and panning of the reading material. The main goal is to analyze unconstrained reading patterns of digital documents using eye movement fixations and dwell time on various sections of a digital document. Our results indicate that participants mostly focused on methodology and results sections, which is consistent with the prior work with constrained reading patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Researchers read scientific literature to keep current in the field and find state-of-the-art solutions to various scientific problems. Prior work suggests that reading patterns may vary with the researcher's domain expertise and on the content of the digital document. In this work, we present a pilot study of eye-tracking measures during a reading task with the options for zooming and panning of the reading material. The main goal is to analyze unconstrained reading patterns of digital documents using eye movement fixations and dwell time on various sections of a digital document. Our results indicate that participants mostly focused on methodology and results sections, which is consistent with the prior work with constrained reading patterns.", "fno": "177000a282", "keywords": [ "Biomechanics", "Eye", "Laser Applications In Medicine", "Measurement By Laser Beam", "Unconstrained Reading Patterns", "Digital Document", "Scientific Literature", "Scientific Problems", "Researcher", "Eye Tracking Measures", "Reading Task", "Reading Material", "Eye Movement Fixations", "Constrained Reading Patterns", "Limiting", "Atmospheric Measurements", "Current Measurement", "Gaze Tracking", "Particle Measurements", "Libraries", "Motion Measurement", "Eye Tracking", "Digital Documents", "Reading Patterns" ], "authors": [ { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Bhanuka Mahanama", "givenName": "Bhanuka", "surname": "Mahanama", "__typename": "ArticleAuthorType" }, { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Gavindya Jayawardena", "givenName": "Gavindya", "surname": "Jayawardena", "__typename": "ArticleAuthorType" }, { "affiliation": "Old Dominion University,Department of Computer Science,Norfolk,VA,USA", "fullName": "Sampath Jayarathna", "givenName": "Sampath", "surname": "Jayarathna", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "282-283", "year": "2021", "issn": null, "isbn": "978-1-6654-1770-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "177000a280", "articleId": "1zJmSVDZr2M", "__typename": "AdjacentArticleType" }, "next": { "fno": "177000a284", "articleId": "1zJmYHsvhT2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2015/1805/0/07333762", "title": "The eye as the window of the language ability: Estimation of English skills by analyzing eye movement while reading documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2015/07333762/12OmNA1VnwG", "parentPublication": { "id": "proceedings/icdar/2015/1805/0", "title": "2015 13th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2015/7079/0/07169792", "title": "Analysis of text layout quality using wearable eye trackers", "doi": null, "abstractUrl": "/proceedings-article/icmew/2015/07169792/12OmNAmVH8p", "parentPublication": { "id": "proceedings/icmew/2015/7079/0", "title": "2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2015/7899/0/07321188", "title": "An Empirical Study on the Patterns of Eye Movement during Summarization Tasks", "doi": null, "abstractUrl": "/proceedings-article/esem/2015/07321188/12OmNCcKQL5", "parentPublication": { "id": "proceedings/esem/2015/7899/0", "title": "2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2015/8159/0/8159a255", "title": "Eye Movements in Code Reading: Relaxing the Linear Order", "doi": null, "abstractUrl": "/proceedings-article/icpc/2015/8159a255/12OmNzlD9bo", "parentPublication": { "id": "proceedings/icpc/2015/8159/0", "title": "2015 IEEE 23rd International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586b346", "title": "Identification of Reader Specific Difficult Words by Analyzing Eye Gaze and Document Content", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586b346/12OmNzlD9nv", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2018/7447/0/744701a182", "title": "A Visual Interactive Reading System Based on Eye Tracking Technology to Improve Digital Reading Performance", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2018/744701a182/19m3CYcZJVC", "parentPublication": { "id": "proceedings/iiai-aai/2018/7447/0", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/emip/2022/9289/0/928900a008", "title": "Entropy of Eye Movements While Reading Code or Text", "doi": null, "abstractUrl": "/proceedings-article/emip/2022/928900a008/1ED1UZAQKME", "parentPublication": { "id": "proceedings/emip/2022/9289/0", "title": "2022 IEEE/ACM 10th International Workshop on Eye Movements in Programming (EMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2022/9519/0/951900a172", "title": "Predicting Reading Performance based on Eye Movement Analysis with Hidden Markov Models", "doi": null, "abstractUrl": "/proceedings-article/icalt/2022/951900a172/1FUUgXB4TCw", "parentPublication": { "id": "proceedings/icalt/2022/9519/0", "title": "2022 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/emip/2019/2243/0/224300a001", "title": "Eye Tracking and Program Comprehension", "doi": null, "abstractUrl": "/proceedings-article/emip/2019/224300a001/1dlvMjfuNBC", "parentPublication": { "id": "proceedings/emip/2019/2243/0", "title": "2019 IEEE/ACM 6th International Workshop on Eye Movements in Programming (EMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2021/4065/0/406500a188", "title": "ML-based classification of eye movement patterns during reading using eye tracking data from an Apple iPad device: Perspective machine learning algorithm needed for reading quality analytics app on an iPad with built-in eye tracking", "doi": null, "abstractUrl": "/proceedings-article/cw/2021/406500a188/1yBF5P8nrXy", "parentPublication": { "id": "proceedings/cw/2021/4065/0", "title": "2021 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJiaV", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNASILQb", "doi": "10.1109/ICPR.2010.339", "title": "Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks", "normalizedTitle": "Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks", "abstract": "This paper presents a cascaded scheme with block-based and pixel-based codebooks for background subtraction. The codebook is mainly used to compress information to achieve high efficient processing speed. In the block-based stage, 12 intensity values are employed to represent a block. The algorithm extends the concept of the Block Truncation Coding (BTC), and thus it can further improve the processing efficiency by enjoying its low complexity advantage. In detail, the block-based stage can remove the most noise without reducing the True Positive (TP) rate, yet it has low precision. To overcome this problem, the pixel-based stage is adopted to enhance the precision, which also can reduce the False Positive (FP) rate. Moreover, this study also presents a color model and a match function which can classify an input pixel as shadow, highlight, background, or foreground. As documented in the experimental results, the proposed algorithm can provide superior performance to that of the former approaches.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a cascaded scheme with block-based and pixel-based codebooks for background subtraction. The codebook is mainly used to compress information to achieve high efficient processing speed. In the block-based stage, 12 intensity values are employed to represent a block. The algorithm extends the concept of the Block Truncation Coding (BTC), and thus it can further improve the processing efficiency by enjoying its low complexity advantage. In detail, the block-based stage can remove the most noise without reducing the True Positive (TP) rate, yet it has low precision. To overcome this problem, the pixel-based stage is adopted to enhance the precision, which also can reduce the False Positive (FP) rate. Moreover, this study also presents a color model and a match function which can classify an input pixel as shadow, highlight, background, or foreground. As documented in the experimental results, the proposed algorithm can provide superior performance to that of the former approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a cascaded scheme with block-based and pixel-based codebooks for background subtraction. The codebook is mainly used to compress information to achieve high efficient processing speed. In the block-based stage, 12 intensity values are employed to represent a block. The algorithm extends the concept of the Block Truncation Coding (BTC), and thus it can further improve the processing efficiency by enjoying its low complexity advantage. In detail, the block-based stage can remove the most noise without reducing the True Positive (TP) rate, yet it has low precision. To overcome this problem, the pixel-based stage is adopted to enhance the precision, which also can reduce the False Positive (FP) rate. Moreover, this study also presents a color model and a match function which can classify an input pixel as shadow, highlight, background, or foreground. As documented in the experimental results, the proposed algorithm can provide superior performance to that of the former approaches.", "fno": "4109b373", "keywords": [ "Cascaded Background Subtraction", "Block Truncations Coding", "GMM" ], "authors": [ { "affiliation": null, "fullName": "Jing-Ming Guo", "givenName": "Jing-Ming", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chih-Sheng Hsu", "givenName": "Chih-Sheng", "surname": "Hsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "1373-1376", "year": "2010", "issn": "1051-4651", "isbn": "978-0-7695-4109-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4109b368", "articleId": "12OmNxj23kQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "4109b377", "articleId": "12OmNzyGHaT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icess/2009/3678/0/3678a341", "title": "Drowning Detection Based on Background Subtraction", "doi": null, "abstractUrl": "/proceedings-article/icess/2009/3678a341/12OmNAQany2", "parentPublication": { "id": "proceedings/icess/2009/3678/0", "title": "Embedded Software and Systems, Second International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfn/2010/3940/0/3940a024", "title": "Background Subtraction under Single Varying Illumination in Different Background Luminance", "doi": null, "abstractUrl": "/proceedings-article/icfn/2010/3940a024/12OmNBf94Xj", "parentPublication": { "id": "proceedings/icfn/2010/3940/0", "title": "Future Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2013/4963/0/4963a237", "title": "Shadow Removal for Background Subtraction Using Illumination Invariant Measures", "doi": null, "abstractUrl": "/proceedings-article/isms/2013/4963a237/12OmNBhZ4el", "parentPublication": { "id": "proceedings/isms/2013/4963/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2011/0844/0/06027343", "title": "A testing framework for background subtraction algorithms comparison in intrusion detection context", "doi": null, "abstractUrl": "/proceedings-article/avss/2011/06027343/12OmNvAiSN8", "parentPublication": { "id": "proceedings/avss/2011/0844/0", "title": "2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031e634", "title": "An Effective Background Subtraction Method Based on Pixel Change Classification", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031e634/12OmNvkGW5O", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2008/3456/0/3456a279", "title": "GPU Accelerated Multimodal Background Subtraction", "doi": null, "abstractUrl": "/proceedings-article/dicta/2008/3456a279/12OmNx4gUyf", "parentPublication": { "id": "proceedings/dicta/2008/3456/0", "title": "2008 Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wiamis/2008/3130/0/3130a167", "title": "Segment Based Diffusion - A Post-Processing Step (Not Only) for Background Subtraction", "doi": null, "abstractUrl": "/proceedings-article/wiamis/2008/3130a167/12OmNxGAKVu", "parentPublication": { "id": "proceedings/wiamis/2008/3130/0", "title": "Image Analysis for Multimedia Interactive Services, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a189", "title": "Background Subtraction under Multiple Varying Illuminations in Different Background Luminance", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a189/12OmNxzuMKF", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2011/4541/0/4541a562", "title": "Metrics for Objective Evaluation of Background Subtraction Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icig/2011/4541a562/12OmNzDNtoo", "parentPublication": { "id": "proceedings/icig/2011/4541/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2010/3987/1/3987a284", "title": "Motion Human Detection Based on Background Subtraction", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987a284/12OmNzcPAf4", "parentPublication": { "id": "proceedings/etcs/2010/3987/1", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkEU3v", "title": "2010 First International Conference on Networking and Computing", "acronym": "icnc", "groupId": "1800265", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBhZ4lO", "doi": "10.1109/IC-NC.2010.48", "title": "Architecture and FPGA-Implementation of Scalable Picture Segmentation by 2D Scanning with Flexible Pixel-Block Size", "normalizedTitle": "Architecture and FPGA-Implementation of Scalable Picture Segmentation by 2D Scanning with Flexible Pixel-Block Size", "abstract": "We report a two-dimensional (2D) pixel block scanning architecture for image segmentation by segment growing. This architecture can optimize processing speed, power consumption, and circuit area by modifying size and shape of the pixel block. Real-time processing can be maintained by using additional the two important techniques of (i) boundary-scan of the grown segment only, (ii) continued block-internal segment growing. We analyze and optimize the size and shape trade-offs for the pixel block, and evaluate the proposed architecture by an FPGA. Altogether, the investigated architecture concepts reduce the area-time product by 52.3 % in comparison to a previously reported one-dimensional (1D) scanning architecture.", "abstracts": [ { "abstractType": "Regular", "content": "We report a two-dimensional (2D) pixel block scanning architecture for image segmentation by segment growing. This architecture can optimize processing speed, power consumption, and circuit area by modifying size and shape of the pixel block. Real-time processing can be maintained by using additional the two important techniques of (i) boundary-scan of the grown segment only, (ii) continued block-internal segment growing. We analyze and optimize the size and shape trade-offs for the pixel block, and evaluate the proposed architecture by an FPGA. Altogether, the investigated architecture concepts reduce the area-time product by 52.3 % in comparison to a previously reported one-dimensional (1D) scanning architecture.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We report a two-dimensional (2D) pixel block scanning architecture for image segmentation by segment growing. This architecture can optimize processing speed, power consumption, and circuit area by modifying size and shape of the pixel block. Real-time processing can be maintained by using additional the two important techniques of (i) boundary-scan of the grown segment only, (ii) continued block-internal segment growing. We analyze and optimize the size and shape trade-offs for the pixel block, and evaluate the proposed architecture by an FPGA. Altogether, the investigated architecture concepts reduce the area-time product by 52.3 % in comparison to a previously reported one-dimensional (1D) scanning architecture.", "fno": "4277a128", "keywords": [ "Picture Segmentation", "Real Time Image Processing", "Boundary Scan", "Two Dimensional Pixel Block Scanning", "FPGA Implementation", "LSI Architecture" ], "authors": [ { "affiliation": null, "fullName": "T. Koide", "givenName": "T.", "surname": "Koide", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "R. Kimura", "givenName": "R.", "surname": "Kimura", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "T. Sugahara", "givenName": "T.", "surname": "Sugahara", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Okazaki", "givenName": "K.", "surname": "Okazaki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H.J. Mattausch", "givenName": "H.J.", "surname": "Mattausch", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-11-01T00:00:00", "pubType": "proceedings", "pages": "128-132", "year": "2010", "issn": null, "isbn": "978-0-7695-4277-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4277a120", "articleId": "12OmNqH9hfL", "__typename": "AdjacentArticleType" }, "next": { "fno": "4277a133", "articleId": "12OmNCd2rPG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccsee/2012/4647/1/4647a200", "title": "Research on Quantization and Scanning Order for 3-D DCT Video Coding", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647a200/12OmNvSbBlE", "parentPublication": { "id": "proceedings/iccsee/2012/4647/2", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmedia/2009/3693/0/3693a116", "title": "Network Scanning on Multi Function Device", "doi": null, "abstractUrl": "/proceedings-article/mmedia/2009/3693a116/12OmNwcUjPK", "parentPublication": { "id": "proceedings/mmedia/2009/3693/0", "title": "Advances in Multimedia, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031b230", "title": "Laser Line-Scanning Based Customized Shoe-Last System", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031b230/12OmNx6g6oP", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a105", "title": "Scanning Neural Network for Text Line Recognition", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a105/12OmNxZBSzC", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iuce/2009/3619/0/3619a148", "title": "Design and Implement of Common Network Security Scanning System", "doi": null, "abstractUrl": "/proceedings-article/iuce/2009/3619a148/12OmNyPQ4C1", "parentPublication": { "id": "proceedings/iuce/2009/3619/0", "title": "2009 International Symposium on Intelligent Ubiquitous Computing and Education, IUCE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/alpit/2008/3273/0/3273a193", "title": "Block Artifact Reduction Based on Pixel Classification Using Binary Edge Map", "doi": null, "abstractUrl": "/proceedings-article/alpit/2008/3273a193/12OmNypIYBQ", "parentPublication": { "id": "proceedings/alpit/2008/3273/0", "title": "Advanced Language Processing and Web Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2008/3488/0/3488a340", "title": "Visual Cryptography for General Access Structure by Multi-pixel Encoding with Variable Block Size", "doi": null, "abstractUrl": "/proceedings-article/kam/2008/3488a340/12OmNzEVRVd", "parentPublication": { "id": "proceedings/kam/2008/3488/0", "title": "Knowledge Acquisition and Modeling, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2011/04/ttc2011040594", "title": "A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning", "doi": null, "abstractUrl": "/journal/tc/2011/04/ttc2011040594/13rRUwhHcQg", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b478", "title": "Design and Implementation of Scanning Electron Microscope Image Acquisition Software System", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b478/1BBzvs0cNIQ", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2021/2703/0/270300a051", "title": "An adaptive pixel accumulation algorithm for a 1D micro-scanning LiDAR", "doi": null, "abstractUrl": "/proceedings-article/dsd/2021/270300a051/1xCbfBKooww", "parentPublication": { "id": "proceedings/dsd/2021/2703/0", "title": "2021 24th Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzgNXYN", "title": "Communication Systems and Network Technologies, International Conference on", "acronym": "csnt", "groupId": "1800448", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvjyxyL", "doi": "10.1109/CSNT.2012.190", "title": "A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel", "normalizedTitle": "A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel", "abstract": "Image Encryption has gain popularity because of need of secure transmission of images over open networks and increased attacks on data flowing over network. Different type of data have different features, that is why for images different techniques were evolved to protect confidential data from unauthorized access. Encryption techniques used for encrypting textual data does not work with images, so separate encryption techniques are required for images. So, we proposed here a new scheme for image encryption which is helpful for end to end secure transmission of digital information on open network using explosive block displacement followed by inter-pixel displacement of RGB values.", "abstracts": [ { "abstractType": "Regular", "content": "Image Encryption has gain popularity because of need of secure transmission of images over open networks and increased attacks on data flowing over network. Different type of data have different features, that is why for images different techniques were evolved to protect confidential data from unauthorized access. Encryption techniques used for encrypting textual data does not work with images, so separate encryption techniques are required for images. So, we proposed here a new scheme for image encryption which is helpful for end to end secure transmission of digital information on open network using explosive block displacement followed by inter-pixel displacement of RGB values.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Image Encryption has gain popularity because of need of secure transmission of images over open networks and increased attacks on data flowing over network. Different type of data have different features, that is why for images different techniques were evolved to protect confidential data from unauthorized access. Encryption techniques used for encrypting textual data does not work with images, so separate encryption techniques are required for images. So, we proposed here a new scheme for image encryption which is helpful for end to end secure transmission of digital information on open network using explosive block displacement followed by inter-pixel displacement of RGB values.", "fno": "4692a884", "keywords": [ "Image Encryption", "Block", "Transformation", "RGB", "Inter Pixel" ], "authors": [ { "affiliation": null, "fullName": "Amnesh Goel", "givenName": "Amnesh", "surname": "Goel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nidhi Chandra", "givenName": "Nidhi", "surname": "Chandra", "__typename": "ArticleAuthorType" } ], "idPrefix": "csnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-05-01T00:00:00", "pubType": "proceedings", "pages": "884-888", "year": "2012", "issn": null, "isbn": "978-0-7695-4692-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4692a879", "articleId": "12OmNAYXWvR", "__typename": "AdjacentArticleType" }, "next": { "fno": "4692a889", "articleId": "12OmNxRWIaf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waina/2012/4652/0/4652a244", "title": "Empirical Study on Performance Comparisons of Block-Based Motion Estimation on Multi Sub-Pixel Displacement with Multiples Block Size", "doi": null, "abstractUrl": "/proceedings-article/waina/2012/4652a244/12OmNARAn7A", "parentPublication": { "id": "proceedings/waina/2012/4652/0", "title": "2012 26th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762a479", "title": "Orthogonal Functional Expansion Method of Optical Flow for Large Displacement", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762a479/12OmNAXxXeg", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406293", "title": "Private (t,n) Threshold Searching on Streaming Data", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406293/12OmNqBKTVt", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icycs/2008/3398/0/3398c803", "title": "A Secure and Efficient Fingerprint Images Encryption Scheme", "doi": null, "abstractUrl": "/proceedings-article/icycs/2008/3398c803/12OmNvFHfIK", "parentPublication": { "id": "proceedings/icycs/2008/3398/0", "title": "2008 9th International Conference for Young Computer Scientists", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/artcom/2009/3845/0/3845a337", "title": "A Color Edge Detection Algorithm in RGB Color Space", "doi": null, "abstractUrl": "/proceedings-article/artcom/2009/3845a337/12OmNxiKs72", "parentPublication": { "id": "proceedings/artcom/2009/3845/0", "title": "Advances in Recent Technologies in Communication and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/1/3804a710", "title": "The Image Measurement System's Automatic Calibration Based on Micro-Displacement Technology", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804a710/12OmNy3iFmv", "parentPublication": { "id": "proceedings/icicta/2009/3804/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2006/2497/0/24970464", "title": "Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography", "doi": null, "abstractUrl": "/proceedings-article/itng/2006/24970464/12OmNy68EE0", "parentPublication": { "id": "proceedings/itng/2006/2497/0", "title": "Proceedings. Third International Conference on Information Technology: New Generation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2016/1858/0/1858a690", "title": "An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic", "doi": null, "abstractUrl": "/proceedings-article/aina/2016/1858a690/12OmNyen1pP", "parentPublication": { "id": "proceedings/aina/2016/1858/0", "title": "2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1992/2717/0/00227457", "title": "A split-merge parallel block-matching algorithm for video displacement estimation", "doi": null, "abstractUrl": "/proceedings-article/dcc/1992/00227457/12OmNzlUKxD", "parentPublication": { "id": "proceedings/dcc/1992/2717/0", "title": "1992 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797714", "title": "PILC Projector: RGB-IR Projector for Pixel-level Infrared Light Communication", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797714/1cJ0L8WggAE", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXD8", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxVDuJT", "doi": "10.1109/ICTAI.2011.25", "title": "A Simple Hierarchical Clustering Method for Improving Flame Pixel Classification", "normalizedTitle": "A Simple Hierarchical Clustering Method for Improving Flame Pixel Classification", "abstract": "In this paper, we propose a new approach for color image simplification in order to improve flame pixel classification. The fire detection performance depends critically on the performance of the flame pixel classifier. Color image simplification is the process of simplifying an image in order to decrease the number of colors while preserving, as much as possible, shapes. In this work, a hierarchical clustering method in a given color space is used to map the original colors into a smaller set of representative ones, allowing the use of a simple heuristic rule for classifying the clusters related to candidate flame colors. Using reverse mapping, we identify possible flame colors in the image. Main contributions of our work are the application of a simple hierarchical clustering method to color simplification, that decreases the number of possible flame colors, and a filtering methodology to reduce the influence of outliers. Several color spaces and distance measures were used to evaluate the proposed method. Experimental results demonstrate that color simplification is essential to successfully employ heuristic classification of flame colors.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a new approach for color image simplification in order to improve flame pixel classification. The fire detection performance depends critically on the performance of the flame pixel classifier. Color image simplification is the process of simplifying an image in order to decrease the number of colors while preserving, as much as possible, shapes. In this work, a hierarchical clustering method in a given color space is used to map the original colors into a smaller set of representative ones, allowing the use of a simple heuristic rule for classifying the clusters related to candidate flame colors. Using reverse mapping, we identify possible flame colors in the image. Main contributions of our work are the application of a simple hierarchical clustering method to color simplification, that decreases the number of possible flame colors, and a filtering methodology to reduce the influence of outliers. Several color spaces and distance measures were used to evaluate the proposed method. Experimental results demonstrate that color simplification is essential to successfully employ heuristic classification of flame colors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a new approach for color image simplification in order to improve flame pixel classification. The fire detection performance depends critically on the performance of the flame pixel classifier. Color image simplification is the process of simplifying an image in order to decrease the number of colors while preserving, as much as possible, shapes. In this work, a hierarchical clustering method in a given color space is used to map the original colors into a smaller set of representative ones, allowing the use of a simple heuristic rule for classifying the clusters related to candidate flame colors. Using reverse mapping, we identify possible flame colors in the image. Main contributions of our work are the application of a simple hierarchical clustering method to color simplification, that decreases the number of possible flame colors, and a filtering methodology to reduce the influence of outliers. Several color spaces and distance measures were used to evaluate the proposed method. Experimental results demonstrate that color simplification is essential to successfully employ heuristic classification of flame colors.", "fno": "4596a110", "keywords": [ "Flame Pixel Classification", "Hierarchical Clustering", "Minimum Spanning Tree" ], "authors": [ { "affiliation": null, "fullName": "Kleber J. F. Souza", "givenName": "Kleber J. F.", "surname": "Souza", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Silvio J. F. Guimarães", "givenName": "Silvio J. F.", "surname": "Guimarães", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zenilton Patrocínio Jr.", "givenName": "Zenilton", "surname": "Patrocínio Jr.", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Arnaldo de A. Araújo", "givenName": "Arnaldo de A.", "surname": "Araújo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jean Cousty", "givenName": "Jean", "surname": "Cousty", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "110-117", "year": "2011", "issn": "1082-3409", "isbn": "978-0-7695-4596-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4596a102", "articleId": "12OmNwEJ0Rh", "__typename": "AdjacentArticleType" }, "next": { "fno": "4596a118", "articleId": "12OmNzyGH8f", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2010/4109/0/4109d919", "title": "Fire-Flame Detection Based on Fuzzy Finite Automation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109d919/12OmNARRYBi", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2010/4249/0/4249a024", "title": "Flame Front Detection by Line Enhance Active Contour from OH-PLIF Images", "doi": null, "abstractUrl": "/proceedings-article/icinis/2010/4249a024/12OmNB0nW9C", "parentPublication": { "id": "proceedings/icinis/2010/4249/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/2/3736b062", "title": "Judging Smelting End-Point of Fuming Furnace Using Tertiary Tuyere Flame", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736b062/12OmNBQTJiy", "parentPublication": { "id": "proceedings/icnc/2009/3736/2", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2010/4108/0/4108a503", "title": "Flame Recognition Algorithm Research under Complex Background", "doi": null, "abstractUrl": "/proceedings-article/cit/2010/4108a503/12OmNBhZ4ja", "parentPublication": { "id": "proceedings/cit/2010/4108/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2010/4225/2/4225b078", "title": "Research on Flame Image Edge Detection Algorithm Based on Mobile Robot Platform", "doi": null, "abstractUrl": "/proceedings-article/aici/2010/4225b078/12OmNrFTr3K", "parentPublication": { "id": "proceedings/aici/2010/4225/2", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/3/3816c104", "title": "A Boiler Flame Detecting System Based on TMS320DM642", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816c104/12OmNwcUjW9", "parentPublication": { "id": "proceedings/aici/2009/3816/3", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/1/3930a404", "title": "Flame Color Image Segmentation Based on Neural Network", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930a404/12OmNwl8GGh", "parentPublication": { "id": "proceedings/ifcsta/2009/3930/3", "title": "Computer Science-Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/2/3119b490", "title": "Content-Based Rotary Kiln Flame Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119b490/12OmNx8Ouvd", "parentPublication": { "id": "proceedings/cisp/2008/3119/3", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2008/3382/1/3382a537", "title": "NOx Estimation Based on Flame Image of High Temperature Air Combustion", "doi": null, "abstractUrl": "/proceedings-article/isda/2008/3382a537/12OmNzC5TpJ", "parentPublication": { "id": "proceedings/isda/2008/3382/1", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/2/3816b413", "title": "Flame Edge Detection Based on C-V Active Contour Model", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816b413/12OmNzCWG7z", "parentPublication": { "id": "proceedings/aici/2009/3816/2", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC2fGtl", "title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)", "acronym": "icdar", "groupId": "1000219", "volume": "2", "displayVolume": "2", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNyNQSPU", "doi": "10.1109/ICDAR.2007.140", "title": "Image Pixel Force Fields and their Application for Color Map Vectorisation", "normalizedTitle": "Image Pixel Force Fields and their Application for Color Map Vectorisation", "abstract": "Pixel force field is a novel image representation where at each pixel a two-dimensional vector is defined for representing the circumstance of the pixel. The vector is oriented to the center of the region composed of vectors having the same qualitative property, such as color and gray-scale level. Using the pixel force field, that is, the orientation and the magnitude of the vector, many fundamental and specific image processing tasks can be solved. As examples of the tasks, the force field is applied to color image thinning, color image segmentation, and color map vectorisation.", "abstracts": [ { "abstractType": "Regular", "content": "Pixel force field is a novel image representation where at each pixel a two-dimensional vector is defined for representing the circumstance of the pixel. The vector is oriented to the center of the region composed of vectors having the same qualitative property, such as color and gray-scale level. Using the pixel force field, that is, the orientation and the magnitude of the vector, many fundamental and specific image processing tasks can be solved. As examples of the tasks, the force field is applied to color image thinning, color image segmentation, and color map vectorisation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Pixel force field is a novel image representation where at each pixel a two-dimensional vector is defined for representing the circumstance of the pixel. The vector is oriented to the center of the region composed of vectors having the same qualitative property, such as color and gray-scale level. Using the pixel force field, that is, the orientation and the magnitude of the vector, many fundamental and specific image processing tasks can be solved. As examples of the tasks, the force field is applied to color image thinning, color image segmentation, and color map vectorisation.", "fno": "28221228", "keywords": [], "authors": [ { "affiliation": "United Institute of Informatics Problems of the National Academy of Sciences", "fullName": "V. Bucha", "givenName": "V.", "surname": "Bucha", "__typename": "ArticleAuthorType" }, { "affiliation": "United Institute of Informatics Problems of the National Academy of Sciences", "fullName": "S. Ablameyko", "givenName": "S.", "surname": "Ablameyko", "__typename": "ArticleAuthorType" }, { "affiliation": "United Institute of Informatics Problems of the National Academy of Sciences", "fullName": "S. Uchida", "givenName": "S.", "surname": "Uchida", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-09-01T00:00:00", "pubType": "proceedings", "pages": "1228-1242", "year": "2007", "issn": "1520-5363", "isbn": "0-7695-2822-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28221223", "articleId": "12OmNC4wtwD", "__typename": "AdjacentArticleType" }, "next": { "fno": "28221233", "articleId": "12OmNvAiSGr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icce/2009/2558/0/05012176", "title": "Image quality comparison between 3CCD pixel shift technology and single-sensor CFA demosaicking", "doi": null, "abstractUrl": "/proceedings-article/icce/2009/05012176/12OmNCcKQmw", "parentPublication": { "id": "proceedings/icce/2009/2558/0", "title": "2009 Digest of Technical Papers International Conference on Consumer Electronics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmssp/2016/4519/0/07946031", "title": "Enhanced Hemisphere Concept for Color Pixel Classification", "doi": null, "abstractUrl": "/proceedings-article/icmssp/2016/07946031/12OmNrNh0FR", "parentPublication": { "id": "proceedings/icmssp/2016/4519/0", "title": "2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761330", "title": "Lennard-Jones force field for Geometric Active Contour", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761330/12OmNvTTckj", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2012/4855/0/4855a282", "title": "Morphology Algorithm using Conspicuousness Map for Color Image Processing", "doi": null, "abstractUrl": "/proceedings-article/icinis/2012/4855a282/12OmNweBUFR", "parentPublication": { "id": "proceedings/icinis/2012/4855/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/2/3119b044", "title": "Natural Color Mapping for FLIR Images", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119b044/12OmNxXUhUe", "parentPublication": { "id": "proceedings/cisp/2008/3119/3", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298723", "title": "FlowWeb: Joint image set alignment by weaving consistent, pixel-wise correspondences", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298723/12OmNxdVgLc", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140829", "title": "Interactive Road Extraction with Pixel Force Fields", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140829/12OmNyOHG00", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itc/2010/3975/0/05460586", "title": "Image Retrieval Using DCT Coefficients of Pixel Distribution and Average Value of Row and Column Vector", "doi": null, "abstractUrl": "/proceedings-article/itc/2010/05460586/13bd1gQYgE1", "parentPublication": { "id": "proceedings/itc/2010/3975/0", "title": "2010 International Conference on Recent Trends in Information, Telecommunication and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2018/5889/0/08441141", "title": "Color Classification based on Pixel Intensity Values", "doi": null, "abstractUrl": "/proceedings-article/snpd/2018/08441141/13bd1gzWkRd", "parentPublication": { "id": "proceedings/snpd/2018/5889/0", "title": "2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4273", "title": "Image Generators with Conditionally-Independent Pixel Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4273/1yeHUDWbprG", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyjLoQE", "title": "Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors", "acronym": "asap", "groupId": "1000037", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNySG3O0", "doi": "10.1109/ASAP.1997.606816", "title": "A flexible data-interlacing architecture for full-search block-matching algorithm", "normalizedTitle": "A flexible data-interlacing architecture for full-search block-matching algorithm", "abstract": "This paper describes a data-interlacing architecture with two-dimensional (2-D) data-reuse for full-search block-matching algorithm. Based on some cascading strategies, the same chips can be flexibly cascaded for different block sizes, search ranges, and pixel rates. In addition, the cascading chips can efficiently reuse data to decrease external memory accesses and achieve a high throughput rate. Our results demonstrate that the architecture with 2-D data-reuse is a flexible, low-pin-counts, high-throughput, and cascadable solution for full search block-matching algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes a data-interlacing architecture with two-dimensional (2-D) data-reuse for full-search block-matching algorithm. Based on some cascading strategies, the same chips can be flexibly cascaded for different block sizes, search ranges, and pixel rates. In addition, the cascading chips can efficiently reuse data to decrease external memory accesses and achieve a high throughput rate. Our results demonstrate that the architecture with 2-D data-reuse is a flexible, low-pin-counts, high-throughput, and cascadable solution for full search block-matching algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes a data-interlacing architecture with two-dimensional (2-D) data-reuse for full-search block-matching algorithm. Based on some cascading strategies, the same chips can be flexibly cascaded for different block sizes, search ranges, and pixel rates. In addition, the cascading chips can efficiently reuse data to decrease external memory accesses and achieve a high throughput rate. Our results demonstrate that the architecture with 2-D data-reuse is a flexible, low-pin-counts, high-throughput, and cascadable solution for full search block-matching algorithm.", "fno": "79580096", "keywords": [ "Motion Estimation Flexible Data Interlacing Architecture Data Reuse Cascading Strategies Search Ranges Pixel Rates External Memory Accesses Full Search Block Matching Algorithm" ], "authors": [ { "affiliation": "Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan", "fullName": "Yeong-Kang Lai", "givenName": "Yeong-Kang", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan", "fullName": "Liang-Gee Chen", "givenName": "Liang-Gee", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan", "fullName": "Yung-Pin Lee", "givenName": "Yung-Pin", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "asap", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-07-01T00:00:00", "pubType": "proceedings", "pages": "96", "year": "1997", "issn": "1063-6862", "isbn": "0-8186-7958-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "79580086", "articleId": "12OmNxE2mQw", "__typename": "AdjacentArticleType" }, "next": { "fno": "79580106", "articleId": "12OmNxw5Btq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiry", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "acronym": "acpr", "groupId": "1800942", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45WnnFYu", "doi": "10.1109/ACPR.2017.51", "title": "Pixel-Based Color Model for Robust Tracking", "normalizedTitle": "Pixel-Based Color Model for Robust Tracking", "abstract": "In this paper, we propose a Pixel-based Color Model (PCM) that can deal with the problems of deformation and occlusion in visual object tracking. We use a pixel-based classifier and a feature mapping technique that can distinguish the target pixels from the background. The PCM method is generic as it can be incorporated into any tracker that fails to deal with the problems of deformation and occlusion. The base tracker in this paper is a correlation filter which has achieved great performance in recent years. Compared with the existing trackers, the Pixel-based Color Model combined with Correlation Filter (PCMCF) has several advantages: (1) By learning the color model of the target, it can deal with the problem of deformation. (2) As the model is pixel-based, it is less sensitive to occlusion. (3) The adaptive learning strategy can avoid model drift when the target is partially or fully occluded. (4) When the target recovers from fully occlusion, the color model will find it immediately. Both quantitative and qualitative evaluations have been conducted, and it shows that the proposed PCM method can improve the performance of the base tracker, and the PCMCF algorithm is superior to most state-of-the-art trackers especially in deformation and occlusion.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a Pixel-based Color Model (PCM) that can deal with the problems of deformation and occlusion in visual object tracking. We use a pixel-based classifier and a feature mapping technique that can distinguish the target pixels from the background. The PCM method is generic as it can be incorporated into any tracker that fails to deal with the problems of deformation and occlusion. The base tracker in this paper is a correlation filter which has achieved great performance in recent years. Compared with the existing trackers, the Pixel-based Color Model combined with Correlation Filter (PCMCF) has several advantages: (1) By learning the color model of the target, it can deal with the problem of deformation. (2) As the model is pixel-based, it is less sensitive to occlusion. (3) The adaptive learning strategy can avoid model drift when the target is partially or fully occluded. (4) When the target recovers from fully occlusion, the color model will find it immediately. Both quantitative and qualitative evaluations have been conducted, and it shows that the proposed PCM method can improve the performance of the base tracker, and the PCMCF algorithm is superior to most state-of-the-art trackers especially in deformation and occlusion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a Pixel-based Color Model (PCM) that can deal with the problems of deformation and occlusion in visual object tracking. We use a pixel-based classifier and a feature mapping technique that can distinguish the target pixels from the background. The PCM method is generic as it can be incorporated into any tracker that fails to deal with the problems of deformation and occlusion. The base tracker in this paper is a correlation filter which has achieved great performance in recent years. Compared with the existing trackers, the Pixel-based Color Model combined with Correlation Filter (PCMCF) has several advantages: (1) By learning the color model of the target, it can deal with the problem of deformation. (2) As the model is pixel-based, it is less sensitive to occlusion. (3) The adaptive learning strategy can avoid model drift when the target is partially or fully occluded. (4) When the target recovers from fully occlusion, the color model will find it immediately. Both quantitative and qualitative evaluations have been conducted, and it shows that the proposed PCM method can improve the performance of the base tracker, and the PCMCF algorithm is superior to most state-of-the-art trackers especially in deformation and occlusion.", "fno": "3354a126", "keywords": [ "Feature Extraction", "Image Colour Analysis", "Learning Artificial Intelligence", "Object Detection", "Object Tracking", "Pixel Based Classifier", "Target Pixels", "PCM Method", "Base Tracker", "Pixel Based Color Model", "Visual Object Tracking", "Feature Mapping Technique", "Correlation Filter", "Adaptive Learning Strategy", "PCMCF Algorithm", "Target Tracking", "Image Color Analysis", "Correlation", "Deformable Models", "Strain", "Phase Change Materials", "Adaptation Models", "Visual Tracking", "PCM", "Feature Mapping", "Adaptive Learning" ], "authors": [ { "affiliation": null, "fullName": "Yang Huo", "givenName": "Yang", "surname": "Huo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuehuan Wang", "givenName": "Yuehuan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaoyun Yan", "givenName": "Xiaoyun", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kaiheng Dai", "givenName": "Kaiheng", "surname": "Dai", "__typename": "ArticleAuthorType" } ], "idPrefix": "acpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "126-131", "year": "2017", "issn": null, "isbn": "978-1-5386-3354-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3354a120", "articleId": "17D45W1Oa5R", "__typename": "AdjacentArticleType" }, "next": { "fno": "3354a132", "articleId": "17D45XeKgqi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2011/0529/0/05981674", "title": "Tracking through scattered occlusion", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2011/05981674/12OmNBBzoj6", "parentPublication": { "id": "proceedings/cvprw/2011/0529/0", "title": "CVPR 2011 WORKSHOPS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/3/252130037", "title": "Robust Visual Tracking via Pixel Classification and Integration", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252130037/12OmNCf1DiE", "parentPublication": { "id": "proceedings/icpr/2006/2521/3", "title": "2006 18th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2018/1424/0/142401a215", "title": "An Automatic Deformation Approach for Occlusion Free Egocentric Data Exploration", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a215/12OmNvDqsLz", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457f719", "title": "Simultaneous Facial Landmark Detection, Pose and Deformation Estimation Under Facial Occlusion", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f719/12OmNx76TF9", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/232P2B31", "title": "Robust object tracking via sparsity-based collaborative model", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/232P2B31/12OmNxiKs5g", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209b224", "title": "Real-Time Object Tracking with Generalized Part-Based Appearance Model and Structure-Constrained Motion Model", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209b224/12OmNyLA5yI", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486439", "title": "Robust Object Tracking Via Part-Based Correlation Particle Filter", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486439/14jQfRmTc4g", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e864", "title": "SINT++: Robust Visual Tracking via Adversarial Positive Instance Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e864/17D45VsBTVt", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545658", "title": "Representing a Partially Observed Non-Rigid 3D Human Using Eigen-Texture and Eigen-Deformation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545658/17D45XuDNE6", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093533", "title": "Robust Template-Based Non-Rigid Motion Tracking Using Local Coordinate Regularization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093533/1jPbs0rPdC0", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CakMgEqtIQ", "title": "2021 2nd Asia Symposium on Signal Processing (ASSP)", "acronym": "assp", "groupId": "1846224", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1CakRc0Q3jW", "doi": "10.1109/ASSP54407.2021.00012", "title": "Application of Color Block Code in Image Scaling", "normalizedTitle": "Application of Color Block Code in Image Scaling", "abstract": "Aiming at the high cost of embedding annotation watermark in a narrow small area and the information distortion caused by the change of annotation watermark image resolution, this paper proposes a color block code technology, which uses location information and color code to form recognizable graphics, which can not only simplify the annotation graphics, but also ensure the recognition efficiency. First, the constituent elements of color block code are designed, and then the coding and decoding method of color block code is proposed. Experiments show that color block code has high anti-scaling and anti-interference, and can be widely used in the labeling of small object surface and low resolution image.", "abstracts": [ { "abstractType": "Regular", "content": "Aiming at the high cost of embedding annotation watermark in a narrow small area and the information distortion caused by the change of annotation watermark image resolution, this paper proposes a color block code technology, which uses location information and color code to form recognizable graphics, which can not only simplify the annotation graphics, but also ensure the recognition efficiency. First, the constituent elements of color block code are designed, and then the coding and decoding method of color block code is proposed. Experiments show that color block code has high anti-scaling and anti-interference, and can be widely used in the labeling of small object surface and low resolution image.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aiming at the high cost of embedding annotation watermark in a narrow small area and the information distortion caused by the change of annotation watermark image resolution, this paper proposes a color block code technology, which uses location information and color code to form recognizable graphics, which can not only simplify the annotation graphics, but also ensure the recognition efficiency. First, the constituent elements of color block code are designed, and then the coding and decoding method of color block code is proposed. Experiments show that color block code has high anti-scaling and anti-interference, and can be widely used in the labeling of small object surface and low resolution image.", "fno": "988300a020", "keywords": [ "Block Codes", "Decoding", "Image Coding", "Image Colour Analysis", "Image Recognition", "Image Resolution", "Image Watermarking", "Annotation Watermark Image Resolution", "Color Block Code Technology", "Decoding Method", "Image Scaling", "Information Distortion", "Recognizable Graphics", "Annotation Graphics", "Recognition Efficiency", "Small Object Surface", "Low Resolution Image", "Printing", "Graphics", "Codes", "Image Recognition", "Image Resolution", "Image Color Analysis", "Annotations", "QR Code", "Color Block Code", "Low Resolution", "Image Scaling", "Color Recognition", "Data Verification" ], "authors": [ { "affiliation": "Network and Information Technology Centre, Beijing University of Technology,Beijing,China", "fullName": "Hao Wang", "givenName": "Hao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Medical Engineering Division, Beijing Friendship Hospital,Beijing,China", "fullName": "Yu Bai", "givenName": "Yu", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Technology,Information Department,Beijing,China", "fullName": "Jie Liu", "givenName": "Jie", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Technology,Information Department,Beijing,China", "fullName": "Guangmin Sun", "givenName": "Guangmin", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "Network and Information Technology Centre, Beijing University of Technology,Beijing,China", "fullName": "Yanjun Zhang", "givenName": "Yanjun", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Technology,Information Department,Beijing,China", "fullName": "Jie Li", "givenName": "Jie", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "assp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "20-27", "year": "2021", "issn": null, "isbn": "978-1-7281-9883-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "988300a013", "articleId": "1CakRFL1Vp6", "__typename": "AdjacentArticleType" }, "next": { "fno": "988300a028", "articleId": "1CakWrkQI2k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2004/8484/3/01326488", "title": "Color image appearance model applied to printing of watermarked images", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326488/12OmNAnMuLl", "parentPublication": { "id": "proceedings/icassp/2004/8484/3", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmamh/2007/3065/0/30650003", "title": "A Color Watermarking Scheme Based on Block-SVD and Arnold Transformation", "doi": null, "abstractUrl": "/proceedings-article/dmamh/2007/30650003/12OmNBSSVoO", "parentPublication": { "id": "proceedings/dmamh/2007/3065/0", "title": "Digital Media and its Application in Museum &amp; Heritage/Digital Media and its Application in Museum &amp; Heritage, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2007/3122/0/3122a942", "title": "A New Robust Watermarking Scheme for Color Image in Spatial Domain", "doi": null, "abstractUrl": "/proceedings-article/sitis/2007/3122a942/12OmNCzsKEQ", "parentPublication": { "id": "proceedings/sitis/2007/3122/0", "title": "2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a799", "title": "A Novel Color Watermarking Algorithm Based on Block SVD", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a799/12OmNrYCXK6", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciic/2010/4152/0/4152a136", "title": "Bit Plane Index Based Fragile Watermarking Scheme for Authenticating Color Image", "doi": null, "abstractUrl": "/proceedings-article/iciic/2010/4152a136/12OmNvlPkFs", "parentPublication": { "id": "proceedings/iciic/2010/4152/0", "title": "Integrated Intelligent Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2014/4053/0/06806024", "title": "Color image recovery system from printed gray image", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2014/06806024/12OmNwE9OCZ", "parentPublication": { "id": "proceedings/ssiai/2014/4053/0", "title": "2014 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2002/7402/4/05745401", "title": "A data hiding method for few-color images", "doi": null, "abstractUrl": "/proceedings-article/icassp/2002/05745401/12OmNzVGcEq", "parentPublication": { "id": "proceedings/icassp/2002/7402/4", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isecs/2009/3643/1/3643a213", "title": "A Blind Watermarking Algorithm Based on Block DCT for Dual Color Images", "doi": null, "abstractUrl": "/proceedings-article/isecs/2009/3643a213/12OmNzaQo8s", "parentPublication": { "id": "proceedings/isecs/2009/3643/2", "title": "Electronic Commerce and Security, International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2022/6812/0/681200a380", "title": "NSCT-DWT-SVD Composite Digital Watermarking Algorithm based on QR Code", "doi": null, "abstractUrl": "/proceedings-article/cipae/2022/681200a380/1KExMNPgbrW", "parentPublication": { "id": "proceedings/cipae/2022/6812/0", "title": "2022 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2022/6357/0/635700a173", "title": "Research on Color Block Recognition and Restoration Algorithm of Magic Cube Robot", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2022/635700a173/1LRkSolDYac", "parentPublication": { "id": "proceedings/isaiee/2022/6357/0", "title": "2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hVlMKUehkk", "doi": "10.1109/ICCV.2019.00892", "title": "Guided Super-Resolution As Pixel-to-Pixel Transformation", "normalizedTitle": "Guided Super-Resolution As Pixel-to-Pixel Transformation", "abstract": "Guided super-resolution is a unifying framework for several computer vision tasks where the inputs are a low-resolution source image of some target quantity (e.g., perspective depth acquired with a time-of-flight camera) and a high-resolution guide image from a different domain (e.g., a grey-scale image from a conventional camera); and the target output is a high-resolution version of the source (in our example, a high-res depth map). The standard way of looking at this problem is to formulate it as a super-resolution task, i.e., the source image is upsampled to the target resolution, while transferring the missing high-frequency details from the guide. Here, we propose to turn that interpretation on its head and instead see it as a pixel-to-pixel mapping of the guide image to the domain of the source image. The pixel-wise mapping is parametrised as a multi-layer perceptron, whose weights are learned by minimising the discrepancies between the source image and the downsampled target image. Importantly, our formulation makes it possible to regularise only the mapping function, while avoiding regularisation of the outputs; thus producing crisp, natural-looking images. The proposed method is unsupervised, using only the specific source and guide images to fit the mapping. We evaluate our method on two different tasks, super-resolution of depth maps and of tree height maps. In both cases, we clearly outperform recent baselines in quantitative comparisons, while delivering visually much sharper outputs.", "abstracts": [ { "abstractType": "Regular", "content": "Guided super-resolution is a unifying framework for several computer vision tasks where the inputs are a low-resolution source image of some target quantity (e.g., perspective depth acquired with a time-of-flight camera) and a high-resolution guide image from a different domain (e.g., a grey-scale image from a conventional camera); and the target output is a high-resolution version of the source (in our example, a high-res depth map). The standard way of looking at this problem is to formulate it as a super-resolution task, i.e., the source image is upsampled to the target resolution, while transferring the missing high-frequency details from the guide. Here, we propose to turn that interpretation on its head and instead see it as a pixel-to-pixel mapping of the guide image to the domain of the source image. The pixel-wise mapping is parametrised as a multi-layer perceptron, whose weights are learned by minimising the discrepancies between the source image and the downsampled target image. Importantly, our formulation makes it possible to regularise only the mapping function, while avoiding regularisation of the outputs; thus producing crisp, natural-looking images. The proposed method is unsupervised, using only the specific source and guide images to fit the mapping. We evaluate our method on two different tasks, super-resolution of depth maps and of tree height maps. In both cases, we clearly outperform recent baselines in quantitative comparisons, while delivering visually much sharper outputs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Guided super-resolution is a unifying framework for several computer vision tasks where the inputs are a low-resolution source image of some target quantity (e.g., perspective depth acquired with a time-of-flight camera) and a high-resolution guide image from a different domain (e.g., a grey-scale image from a conventional camera); and the target output is a high-resolution version of the source (in our example, a high-res depth map). The standard way of looking at this problem is to formulate it as a super-resolution task, i.e., the source image is upsampled to the target resolution, while transferring the missing high-frequency details from the guide. Here, we propose to turn that interpretation on its head and instead see it as a pixel-to-pixel mapping of the guide image to the domain of the source image. The pixel-wise mapping is parametrised as a multi-layer perceptron, whose weights are learned by minimising the discrepancies between the source image and the downsampled target image. Importantly, our formulation makes it possible to regularise only the mapping function, while avoiding regularisation of the outputs; thus producing crisp, natural-looking images. The proposed method is unsupervised, using only the specific source and guide images to fit the mapping. We evaluate our method on two different tasks, super-resolution of depth maps and of tree height maps. In both cases, we clearly outperform recent baselines in quantitative comparisons, while delivering visually much sharper outputs.", "fno": "480300i828", "keywords": [ "Computer Vision", "Image Resolution", "Multilayer Perceptrons", "Guided Super Resolution", "Pixel To Pixel Transformation", "Computer Vision Tasks", "Low Resolution Source Image", "Time Of Flight Camera", "High Resolution Guide Image", "Depth Map", "Super Resolution Task", "Pixel To Pixel Mapping", "Pixel Wise Mapping", "Downsampled Target Image", "Mapping Function", "Natural Looking Images", "Multilayer Perceptron", "Tree Height Maps", "Spatial Resolution", "Task Analysis", "Cameras", "Standards", "Computer Vision", "Vegetation" ], "authors": [ { "affiliation": "ETHZ", "fullName": "Riccardo De Lutio", "givenName": "Riccardo De", "surname": "Lutio", "__typename": "ArticleAuthorType" }, { "affiliation": "ETHZ", "fullName": "Stefano D'aronco", "givenName": "Stefano", "surname": "D'aronco", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zurich", "fullName": "Jan Dirk Wegner", "givenName": "Jan Dirk", "surname": "Wegner", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH", "fullName": "Konrad Schindler", "givenName": "Konrad", "surname": "Schindler", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "8828-8836", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "480300i818", "articleId": "1hVlybNqL9S", "__typename": "AdjacentArticleType" }, "next": { "fno": "480300i837", "articleId": "1hQqx7hSwEg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ised/2014/6965/0/6965a215", "title": "A Survey -- Super Resolution Techniques for Multiple, Single, and Stereo Images", "doi": null, "abstractUrl": "/proceedings-article/ised/2014/6965a215/12OmNrJiCXk", "parentPublication": { "id": "proceedings/ised/2014/6965/0", "title": "2014 Fifth International Symposium on Electronic System Design (ISED)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2015/8667/0/07168365", "title": "Directional Super-Resolution by Means of Coded Sampling and Guided Upsampling", "doi": null, "abstractUrl": "/proceedings-article/iccp/2015/07168365/12OmNrNh0Fp", "parentPublication": { "id": "proceedings/iccp/2015/8667/0", "title": "2015 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2014/4717/0/06890540", "title": "Super resolution for multiview mixed resolution images in transform-domain", "doi": null, "abstractUrl": "/proceedings-article/icmew/2014/06890540/12OmNweBUQm", "parentPublication": { "id": "proceedings/icmew/2014/4717/0", "title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d586", "title": "Hyperspectral Super-Resolution by Coupled Spectral Unmixing", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d586/12OmNxbmSDc", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032f449", "title": "Pixel Recursive Super Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f449/12OmNyKrHhC", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2017/2937/0/2937a500", "title": "Hyper-spectral Image Super-resolution Using Non-negative Spectral Representation with Data-Guided Sparsity", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a500/12OmNyvoX82", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b933", "title": "Jittered Exposures for Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b933/17D45VVho3k", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e862", "title": "EvIntSR-Net: Event Guided Multiple Latent Frames Reconstruction and Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e862/1BmG5NkgY0M", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b853", "title": "An Epipolar Volume Autoencoder With Adversarial Loss for Deep Light Field Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b853/1iTvlh1qLGU", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093399", "title": "Component Attention Guided Face Super-Resolution Network: CAGFace", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093399/1jPbzBQruqQ", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirr", "title": "Computer Science and Software Engineering, International Conference on", "acronym": "csse", "groupId": "1002553", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwErpsP", "doi": "10.1109/CSSE.2008.1100", "title": "Study on Feature Extraction Method Based on Parallel Coordinate Plots", "normalizedTitle": "Study on Feature Extraction Method Based on Parallel Coordinate Plots", "abstract": "A novel feature extraction method based on parallel coordinate plots was presented. Observing the parallel coordinate plots, discovered that using the distance of one point to others on one dimensionality to measurement the classify performance of the variable, can express the fact classify performance more impersonally. The Euclidean distance or module matrix and the relative distance matrix were given. And the distance ratio of every sample point to other sorts and it to its own sort has more classify information. We achieved better performance when experiment on data which has poor statistical performance.", "abstracts": [ { "abstractType": "Regular", "content": "A novel feature extraction method based on parallel coordinate plots was presented. Observing the parallel coordinate plots, discovered that using the distance of one point to others on one dimensionality to measurement the classify performance of the variable, can express the fact classify performance more impersonally. The Euclidean distance or module matrix and the relative distance matrix were given. And the distance ratio of every sample point to other sorts and it to its own sort has more classify information. We achieved better performance when experiment on data which has poor statistical performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A novel feature extraction method based on parallel coordinate plots was presented. Observing the parallel coordinate plots, discovered that using the distance of one point to others on one dimensionality to measurement the classify performance of the variable, can express the fact classify performance more impersonally. The Euclidean distance or module matrix and the relative distance matrix were given. And the distance ratio of every sample point to other sorts and it to its own sort has more classify information. We achieved better performance when experiment on data which has poor statistical performance.", "fno": "3336a949", "keywords": [ "Pattern Recognition", "Multivariate Information", "Feature Extraction", "Parallel Coordinate Plots Pcp" ], "authors": [ { "affiliation": null, "fullName": "Cui Jianxin", "givenName": "Cui", "surname": "Jianxin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hong Wenxue", "givenName": "Hong", "surname": "Wenxue", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gao Haibo", "givenName": "Gao", "surname": "Haibo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cui Jianxin", "givenName": "Cui", "surname": "Jianxin", "__typename": "ArticleAuthorType" } ], "idPrefix": "csse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "949-952", "year": "2008", "issn": null, "isbn": "978-0-7695-3336-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3336a945", "articleId": "12OmNs5rkXv", "__typename": "AdjacentArticleType" }, "next": { "fno": "3336a953", "articleId": "12OmNwoPtoH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a078", "title": "A Scatterplots Selection Technique for Multi-dimensional Data Visualization Combining with Parallel Coordinate Plots", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a078/12OmNARRYtP", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031609", "title": "Making many-to-many parallel coordinate plots scalable by asymmetric biclustering", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031609/12OmNrHjqNa", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2013/5049/0/5049a059", "title": "Arrangement of Low-Dimensional Parallel Coordinate Plots for High-Dimensional Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a059/12OmNy1SFKZ", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2009/3641/0/3641a240", "title": "Research on Optimizing Embedding Space Dimension in Network Coordinate System", "doi": null, "abstractUrl": "/proceedings-article/icis/2009/3641a240/12OmNyQphbO", "parentPublication": { "id": "proceedings/icis/2009/3641/0", "title": "Computer and Information Science, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2003/2001/0/20010063", "title": "Combining Parallel Coordinates with the Reorderable Matrix", "doi": null, "abstractUrl": "/proceedings-article/cmv/2003/20010063/12OmNz4SOtr", "parentPublication": { "id": "proceedings/cmv/2003/2001/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192696", "title": "Orientation-Enhanced Parallel Coordinate Plots", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192696/13rRUwkxc5q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/09/06171180", "title": "Scalable Multivariate Volume Visualization and Analysis Based on Dimension Projection and Parallel Coordinates", "doi": null, "abstractUrl": "/journal/tg/2012/09/06171180/13rRUwwJWFL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060980", "title": "Matching Visual Saliency to Confidence in Plots of Uncertain Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060980/13rRUxZRbnY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0717", "title": "Enabling Automatic Clutter Reduction in Parallel Coordinate Plots", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0717/13rRUxly8SO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E301", "title": "Rotation Coordinate Descent for Fast Globally Optimal Rotation Averaging", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E301/1yeKW0qo5r2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4Ix", "title": "2010 International Conference on Technologies and Applications of Artificial Intelligence", "acronym": "taai", "groupId": "1800268", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNAle6nn", "doi": "10.1109/TAAI.2010.31", "title": "Virtual Doctor System (VDS): Framework on Reasoning Issues: Ontology Based Reasoning for Virtual Doctor System", "normalizedTitle": "Virtual Doctor System (VDS): Framework on Reasoning Issues: Ontology Based Reasoning for Virtual Doctor System", "abstract": "Human computer Interaction based on emotional modelling and physical views, collectively; has been investigated and reported in this paper. Two types of ontology have been presented to formalize a patient state: mental ontology reflecting the patient mental behavior due to certain disorder and physical ontology reflecting the observed physical behavior exhibited through disorder. These two types of ontologies have been mapped and aligned for reasoning using a simple Bayesian Network for causal reasoning to define what we call as simple case diagnosis. We have constructed an integrated computerized model which reflects a human diagnostician as computer model and through it; an integrated interaction between that model and the real human user (patient) is utilized for 1st stage diagnosis purposes.", "abstracts": [ { "abstractType": "Regular", "content": "Human computer Interaction based on emotional modelling and physical views, collectively; has been investigated and reported in this paper. Two types of ontology have been presented to formalize a patient state: mental ontology reflecting the patient mental behavior due to certain disorder and physical ontology reflecting the observed physical behavior exhibited through disorder. These two types of ontologies have been mapped and aligned for reasoning using a simple Bayesian Network for causal reasoning to define what we call as simple case diagnosis. We have constructed an integrated computerized model which reflects a human diagnostician as computer model and through it; an integrated interaction between that model and the real human user (patient) is utilized for 1st stage diagnosis purposes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human computer Interaction based on emotional modelling and physical views, collectively; has been investigated and reported in this paper. Two types of ontology have been presented to formalize a patient state: mental ontology reflecting the patient mental behavior due to certain disorder and physical ontology reflecting the observed physical behavior exhibited through disorder. These two types of ontologies have been mapped and aligned for reasoning using a simple Bayesian Network for causal reasoning to define what we call as simple case diagnosis. We have constructed an integrated computerized model which reflects a human diagnostician as computer model and through it; an integrated interaction between that model and the real human user (patient) is utilized for 1st stage diagnosis purposes.", "fno": "4253a129", "keywords": [ "Medical Diagnosis", "Knowledge Based Reasoning", "Cognitive Model", "Human Interaction" ], "authors": [ { "affiliation": null, "fullName": "Hamido Fujita", "givenName": "Hamido", "surname": "Fujita", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jun Hakura", "givenName": "Jun", "surname": "Hakura", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Masaki Kurematsu", "givenName": "Masaki", "surname": "Kurematsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "taai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-11-01T00:00:00", "pubType": "proceedings", "pages": "129-136", "year": "2010", "issn": null, "isbn": "978-0-7695-4253-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4253a124", "articleId": "12OmNrJRP58", "__typename": "AdjacentArticleType" }, "next": { "fno": "4253a137", "articleId": "12OmNBgz4zD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2009/3575/0/3575a128", "title": "An Ontology-Based Distributed Case-Based Reasoning for Virtual Enterprises", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575a128/12OmNrGsDsZ", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240059", "title": "Interpersonal Scenarios: Virtual \\approx Real?", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240059/12OmNwDACqI", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/2/3507b631", "title": "Employing Ontology to Build the Engine Fault Diagnosis Expert System", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507b631/12OmNxR5UEX", "parentPublication": { "id": "proceedings/csie/2009/3507/2", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/5/3507e318", "title": "Prediagnosis Doctor Simulation Using Case-Based Techniques", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507e318/12OmNxvNZUq", "parentPublication": { "id": "proceedings/csie/2009/3507/6", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060999", "title": "Mental Models, Visual Reasoning and Interaction in Information Visualization: A Top-down Perspective", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060999/13rRUyYBlgx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493425", "title": "Gamified Knowledge Encoding: Knowledge Training Using Game Mechanics", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493425/14tNJmk14YO", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904772", "title": "Combining Clinical Data and Domain Knowledge for Analyzing Mental Disorder Concept Relatedness and Usage", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904772/1f8N7FJoPFm", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2020/2316/0/231600a359", "title": "Application of Virtual Reality Technology in Psychotherapy", "doi": null, "abstractUrl": "/proceedings-article/ichci/2020/231600a359/1tuA7SajLOw", "parentPublication": { "id": "proceedings/ichci/2020/2316/0", "title": "2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2021/4106/0/410600a088", "title": "Exploring the multi-touch simulation of learning performance, mental models and potential behavior clusters in science concepts learning", "doi": null, "abstractUrl": "/proceedings-article/icalt/2021/410600a088/1vK0023lbzi", "parentPublication": { "id": "proceedings/icalt/2021/4106/0", "title": "2021 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2021/3225/0/322500a173", "title": "Detecting Mental Workload in Virtual Reality Using EEG Spectral Data: A Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/aivr/2021/322500a173/1zxLujKqBMs", "parentPublication": { "id": "proceedings/aivr/2021/3225/0", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTYC8P", "title": "2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI-CC)", "acronym": "icci-cc", "groupId": "1000097", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdL7pB", "doi": "10.1109/COGINF.2011.6016123", "title": "Applying qualitative reasoning to a driver's cognitive mental load", "normalizedTitle": "Applying qualitative reasoning to a driver's cognitive mental load", "abstract": "In this paper, we explore applying qualitative reasoning to a driver's mental state in real driving situations so as to develop a working load for intelligent transportation systems. We identify the cognitive state that determines whether a driver will be ready to operate a device in car navigation. In order to identify the driver's cognitive state, we will measure eye movements during car-driving situations. We can acquire data for the various actions of a car driver, in particular braking, acceleration, and steering angles from our experiment car. We constructed a driver cognitive mental load using the framework of qualitative reasoning. We checked the response of our model by qualitative simulation. We also verified the model using real data collected by driving an actual car. The results indicated that our model could represent the change in the cognitive mental load based on measurable data. This means that the framework of this paper will be useful for designing user interfaces for next-generation systems that actively employ user situations.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we explore applying qualitative reasoning to a driver's mental state in real driving situations so as to develop a working load for intelligent transportation systems. We identify the cognitive state that determines whether a driver will be ready to operate a device in car navigation. In order to identify the driver's cognitive state, we will measure eye movements during car-driving situations. We can acquire data for the various actions of a car driver, in particular braking, acceleration, and steering angles from our experiment car. We constructed a driver cognitive mental load using the framework of qualitative reasoning. We checked the response of our model by qualitative simulation. We also verified the model using real data collected by driving an actual car. The results indicated that our model could represent the change in the cognitive mental load based on measurable data. This means that the framework of this paper will be useful for designing user interfaces for next-generation systems that actively employ user situations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we explore applying qualitative reasoning to a driver's mental state in real driving situations so as to develop a working load for intelligent transportation systems. We identify the cognitive state that determines whether a driver will be ready to operate a device in car navigation. In order to identify the driver's cognitive state, we will measure eye movements during car-driving situations. We can acquire data for the various actions of a car driver, in particular braking, acceleration, and steering angles from our experiment car. We constructed a driver cognitive mental load using the framework of qualitative reasoning. We checked the response of our model by qualitative simulation. We also verified the model using real data collected by driving an actual car. The results indicated that our model could represent the change in the cognitive mental load based on measurable data. This means that the framework of this paper will be useful for designing user interfaces for next-generation systems that actively employ user situations.", "fno": "06016123", "keywords": [ "Driver Information Systems", "Inference Mechanisms", "User Interfaces", "Qualitative Reasoning", "Intelligent Transportation System", "Car Navigation", "Car Driving Situation", "Steering Angle", "Qualitative Simulation", "User Interface Design", "Next Generation System", "Load Modeling", "Vehicles", "Cognition", "Data Models", "Roads", "Biomedical Measurements", "Biological System Modeling", "Cognitive Mental Load", "Qualitative Reasoning", "Cognitive Qualitative Simulation", "QSIM", "Man Machine System", "Cognition", "Action", "Perception", "Eye Movement", "Saccade", "Fixation", "Driving Data" ], "authors": [ { "affiliation": "Denso IT Laboratory, Japan", "fullName": "Shinichiro Sega", "givenName": "Shinichiro", "surname": "Sega", "__typename": "ArticleAuthorType" }, { "affiliation": "Denso IT Laboratory, Japan", "fullName": "Hirotoshi Iwasaki", "givenName": "Hirotoshi", "surname": "Iwasaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Akita National College of Tech., Japan", "fullName": "Hironori Hiraishi", "givenName": "Hironori", "surname": "Hiraishi", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Science, Japan", "fullName": "Fumio Mizoguchi", "givenName": "Fumio", "surname": "Mizoguchi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci-cc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "67-74", "year": "2011", "issn": null, "isbn": "978-1-4577-1695-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06016122", "articleId": "12OmNvk7JZi", "__typename": "AdjacentArticleType" }, "next": { "fno": "06016124", "articleId": "12OmNzUPpro", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccicc/2014/6081/0/06921470", "title": "A new approach to detecting distracted car drivers using eye-movement data", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2014/06921470/12OmNB9KHwq", "parentPublication": { "id": "proceedings/iccicc/2014/6081/0", "title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccats/2015/8211/0/8211a066", "title": "Measurement of a Driver's Mental State Using a 4K Driving Simulator", "doi": null, "abstractUrl": "/proceedings-article/ccats/2015/8211a066/12OmNvAS4rU", "parentPublication": { "id": "proceedings/ccats/2015/8211/0", "title": "2015 International Conference on Computer Application Technologies (CCATS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2013/4932/0/4932b039", "title": "Study on Accidents of Military Driver's Self-Mistakes", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932b039/12OmNx4gUxj", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2014/6081/0/06921469", "title": "Extracting tendency and stability from time series and random forest for classifying a car driver's cognitive load", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2014/06921469/12OmNxWcHiq", "parentPublication": { "id": "proceedings/iccicc/2014/6081/0", "title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2017/0771/0/08109772", "title": "Detecting driver's visual attention area by using vehicle-mounted device", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2017/08109772/12OmNzICEDp", "parentPublication": { "id": "proceedings/icci*cc/2017/0771/0", "title": "2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2016/7258/0/07552966", "title": "Driver confusion status detection using recurrent neural networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2016/07552966/12OmNzl3WNK", "parentPublication": { "id": "proceedings/icme/2016/7258/0", "title": "2016 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2022/04/09787341", "title": "aiMSE: Toward an AI-Based Online Mental Status Examination", "doi": null, "abstractUrl": "/magazine/pc/2022/04/09787341/1DSugMbCpgY", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a155", "title": "Estimation of Older Driver&#x0027;s Cognitive Performance and Workload Using Features of Eye movement and Pupil Response on Test Routes", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a155/1KaFOAL4SAw", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2019/1419/0/09146043", "title": "Experience-based analysis and modeling for cognitive vehicle data", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2019/09146043/1lFJcaz9LcQ", "parentPublication": { "id": "proceedings/icci*cc/2019/1419/0", "title": "2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seams/2021/0289/0/028900a090", "title": "Maintaining driver attentiveness in shared-control autonomous driving", "doi": null, "abstractUrl": "/proceedings-article/seams/2021/028900a090/1tB9buOMwP6", "parentPublication": { "id": "proceedings/seams/2021/0289/0/", "title": "2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwbcJ3u", "title": "Computing, Control and Industrial Engineering, International Conference on", "acronym": "ccie", "groupId": "1800073", "volume": "2", "displayVolume": "2", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFaLnr", "doi": "10.1109/CCIE.2010.195", "title": "Mental Fixation in Product Design", "normalizedTitle": "Mental Fixation in Product Design", "abstract": "Mental fixation in product design is proved by experiment. In experiment, three groups of participants are given same design task and different example design. The experiment results show that many features of the example design are incorporated into the designs generated by each group, which proves the existence of mental fixation in product design. The possible cognitive mechanisms causing mental fixation are also discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Mental fixation in product design is proved by experiment. In experiment, three groups of participants are given same design task and different example design. The experiment results show that many features of the example design are incorporated into the designs generated by each group, which proves the existence of mental fixation in product design. The possible cognitive mechanisms causing mental fixation are also discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mental fixation in product design is proved by experiment. In experiment, three groups of participants are given same design task and different example design. The experiment results show that many features of the example design are incorporated into the designs generated by each group, which proves the existence of mental fixation in product design. The possible cognitive mechanisms causing mental fixation are also discussed.", "fno": "4026b311", "keywords": [ "Mental Fixation", "Cognitive Mechanism", "Design Experiment" ], "authors": [ { "affiliation": null, "fullName": "Zhang Lujun", "givenName": "Zhang", "surname": "Lujun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhang Chunping", "givenName": "Zhang", "surname": "Chunping", "__typename": "ArticleAuthorType" } ], "idPrefix": "ccie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "311-314", "year": "2010", "issn": null, "isbn": "978-0-7695-4026-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4026b307", "articleId": "12OmNqFrGLY", "__typename": "AdjacentArticleType" }, "next": { "fno": "4026b315", "articleId": "12OmNAi6vRc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2010/6261/0/05673620", "title": "Work in progress -- Understanding design fixation: A sunk cost perspective on innovation", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673620/12OmNvTBB2w", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142848", "title": "Understanding physical models in design cognition: A triangulation of qualitative and laboratory studies", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142848/12OmNvk7JME", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ontoract/2008/3542/0/3542a018", "title": "Towards Ontologies for Technology in Mental Health Interventions", "doi": null, "abstractUrl": "/proceedings-article/ontoract/2008/3542a018/12OmNvk7JMT", "parentPublication": { "id": "proceedings/ontoract/2008/3542/0", "title": "Ontologies in Interactive Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2012/4740/0/06227689", "title": "Implementing Mental Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2012/06227689/12OmNwM6A07", "parentPublication": { "id": "proceedings/spw/2012/4740/0", "title": "2012 IEEE Symposium on Security and Privacy Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2009/4715/0/05350810", "title": "Enhancing student innovation: Physical models in the idea generation process", "doi": null, "abstractUrl": "/proceedings-article/fie/2009/05350810/12OmNx3ZjbD", "parentPublication": { "id": "proceedings/fie/2009/4715/0", "title": "2009 39th IEEE Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300049", "title": "Mental Registration of 2D and 3D Visualizations (An Empirical Study)", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300049/12OmNx8fiah", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isbim/2008/3560/1/3560a453", "title": "The Negative Effects of Information Technology on Employees' Mental Health and Their Solutions", "doi": null, "abstractUrl": "/proceedings-article/isbim/2008/3560a453/12OmNy5zsmH", "parentPublication": { "id": "proceedings/isbim/2008/3560/1", "title": "2008 International Seminar on Business and Information Management (ISBIM 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccm/2008/3290/1/3290a490", "title": "Study on Cognitive Decision Support Based on Learning and Improvement of Mental Models", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a490/12OmNyY4rnR", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2022/5908/0/09953847", "title": "Mental Health Indices as Biomarkers for Assistive Mental Healthcare in University Students", "doi": null, "abstractUrl": "/proceedings-article/acii/2022/09953847/1IAK1Wicicg", "parentPublication": { "id": "proceedings/acii/2022/5908/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a076", "title": "Fixation and Creativity in Data Visualization Design: Experiences and Perspectives of Practitioners", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a076/1yXuiT4GCbK", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgooiYzVba", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "acronym": "cccm", "groupId": "1002423", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNyY4rnR", "doi": "10.1109/CCCM.2008.148", "title": "Study on Cognitive Decision Support Based on Learning and Improvement of Mental Models", "normalizedTitle": "Study on Cognitive Decision Support Based on Learning and Improvement of Mental Models", "abstract": "Although researchers have put forward many theories, models, and built up some computer-based tools for decision making, entrepreneurs play an extremely important role in the process of decision making. Entrepreneurs' mental models are of great significance to their cognition and decision behaviors when they are faced with complex decision problems. Based on a lot of experiments, behavioral scientists have revealed us some cognitive biases in human being's mental models, such as overconfidence, representative bias, framing dependent effect, herd effect, mental accounting, sunk cost effect, etc. This paper analyses the role of entrepreneurs' mental models in decision making and the influence of cognitive biases on mental models. As an individual, the entrepreneur has a hierarchical knowledge system which consists of inherent knowledge at the inner layer, tacit or implicit knowledge at the second layer and explicit knowledge at the outer layer. The knowledge at the three layers and their interaction determine an entrepreneur’s mental model. We conducted an experiment to study the influence of explicit learning on individuals’ decision behaviors. The experiment result shows that explicit learning can change a decision maker’s knowledge system to a certain degree and his/her mental model varies accordingly. However such change might not always be stable. Finally, we propose a framework of cognitive decision support based on decision maker’s learning and the improvement of his/her mental models.", "abstracts": [ { "abstractType": "Regular", "content": "Although researchers have put forward many theories, models, and built up some computer-based tools for decision making, entrepreneurs play an extremely important role in the process of decision making. Entrepreneurs' mental models are of great significance to their cognition and decision behaviors when they are faced with complex decision problems. Based on a lot of experiments, behavioral scientists have revealed us some cognitive biases in human being's mental models, such as overconfidence, representative bias, framing dependent effect, herd effect, mental accounting, sunk cost effect, etc. This paper analyses the role of entrepreneurs' mental models in decision making and the influence of cognitive biases on mental models. As an individual, the entrepreneur has a hierarchical knowledge system which consists of inherent knowledge at the inner layer, tacit or implicit knowledge at the second layer and explicit knowledge at the outer layer. The knowledge at the three layers and their interaction determine an entrepreneur’s mental model. We conducted an experiment to study the influence of explicit learning on individuals’ decision behaviors. The experiment result shows that explicit learning can change a decision maker’s knowledge system to a certain degree and his/her mental model varies accordingly. However such change might not always be stable. Finally, we propose a framework of cognitive decision support based on decision maker’s learning and the improvement of his/her mental models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although researchers have put forward many theories, models, and built up some computer-based tools for decision making, entrepreneurs play an extremely important role in the process of decision making. Entrepreneurs' mental models are of great significance to their cognition and decision behaviors when they are faced with complex decision problems. Based on a lot of experiments, behavioral scientists have revealed us some cognitive biases in human being's mental models, such as overconfidence, representative bias, framing dependent effect, herd effect, mental accounting, sunk cost effect, etc. This paper analyses the role of entrepreneurs' mental models in decision making and the influence of cognitive biases on mental models. As an individual, the entrepreneur has a hierarchical knowledge system which consists of inherent knowledge at the inner layer, tacit or implicit knowledge at the second layer and explicit knowledge at the outer layer. The knowledge at the three layers and their interaction determine an entrepreneur’s mental model. We conducted an experiment to study the influence of explicit learning on individuals’ decision behaviors. The experiment result shows that explicit learning can change a decision maker’s knowledge system to a certain degree and his/her mental model varies accordingly. However such change might not always be stable. Finally, we propose a framework of cognitive decision support based on decision maker’s learning and the improvement of his/her mental models.", "fno": "3290a490", "keywords": [ "Mental Model", "Knowledge", "Learning", "Cognitive Decision Support" ], "authors": [ { "affiliation": null, "fullName": "Yinghong Zhong", "givenName": "Yinghong", "surname": "Zhong", "__typename": "ArticleAuthorType" } ], "idPrefix": "cccm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-08-01T00:00:00", "pubType": "proceedings", "pages": "490-494", "year": "2008", "issn": null, "isbn": "978-0-7695-3290-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3290a481", "articleId": "12OmNvjgWC8", "__typename": "AdjacentArticleType" }, "next": { "fno": "3290a495", "articleId": "12OmNxyDZdI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/1995/6945/0/69450082", "title": "Managerial learning: a neglected dimension in decision support systems", "doi": null, "abstractUrl": "/proceedings-article/hicss/1995/69450082/12OmNAiFI8R", "parentPublication": { "id": "proceedings/hicss/1995/6945/0", "title": "28th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892a965", "title": "Mental Modeler: A Fuzzy-Logic Cognitive Mapping Modeling Tool for Adaptive Environmental Management", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892a965/12OmNrHSD4r", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a876", "title": "A Model of Cognition-Driven Decision Process for Business Intelligence", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a876/12OmNvpw7h5", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2012/4740/0/06227689", "title": "Implementing Mental Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2012/06227689/12OmNwM6A07", "parentPublication": { "id": "proceedings/spw/2012/4740/0", "title": "2012 IEEE Symposium on Security and Privacy Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2009/3933/0/3933a179", "title": "Cognitive Maps in Transport Behavior", "doi": null, "abstractUrl": "/proceedings-article/micai/2009/3933a179/12OmNxETar2", "parentPublication": { "id": "proceedings/micai/2009/3933/0", "title": "2009 Eighth Mexican International Conference on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892a263", "title": "The Effect of Shared Mental Models on Consensus", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892a263/12OmNxFaLn0", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fitme/2008/3480/0/3480a516", "title": "The Framework of Total Decision Support Based on Knowledge Management", "doi": null, "abstractUrl": "/proceedings-article/fitme/2008/3480a516/12OmNxVV615", "parentPublication": { "id": "proceedings/fitme/2008/3480/0", "title": "Future Information Technology and Management Engineering, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504c958", "title": "Decision Support in Evaluating the Impacts of Mental Disorders on Work Ability", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504c958/12OmNzBOhys", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/04076482", "title": "Knowledge Management in Decision Making: Instance-Based Cognitive Mapping", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/04076482/17D45XeKgtC", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b493", "title": "Development of Mental Model in Understanding Users' Thought Processes for the Evaluation and Functional Enhancement of Clinical Decision Support Systems", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b493/18jXDdLQc3C", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNARRYtB", "title": "Proceedings Twelfth International Conference on Information Networking (ICOIN-12)", "acronym": "icoin", "groupId": "1000363", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNzayNv0", "doi": "10.1109/ICOIN.1998.648379", "title": "Behavior of Agents Based on Mental States", "normalizedTitle": "Behavior of Agents Based on Mental States", "abstract": "Abstract: In multiagent systems, agents communicate with each other to satisfy an entire goal of the systems. To achieve this goal, an agent has to determine its behavior based on its situation in the operational environment. In previous works, an agent using information of external environment has been proposed. However, it is required to utilize various information with respect to each agent to realize a flexible communication among various agents. In this paper, we propose a basic framework of agent communication based on the internal information of an agent, called mental states, and also demonstrate an experimental result of the behavior which evaluates agents with mental states.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: In multiagent systems, agents communicate with each other to satisfy an entire goal of the systems. To achieve this goal, an agent has to determine its behavior based on its situation in the operational environment. In previous works, an agent using information of external environment has been proposed. However, it is required to utilize various information with respect to each agent to realize a flexible communication among various agents. In this paper, we propose a basic framework of agent communication based on the internal information of an agent, called mental states, and also demonstrate an experimental result of the behavior which evaluates agents with mental states.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: In multiagent systems, agents communicate with each other to satisfy an entire goal of the systems. To achieve this goal, an agent has to determine its behavior based on its situation in the operational environment. In previous works, an agent using information of external environment has been proposed. However, it is required to utilize various information with respect to each agent to realize a flexible communication among various agents. In this paper, we propose a basic framework of agent communication based on the internal information of an agent, called mental states, and also demonstrate an experimental result of the behavior which evaluates agents with mental states.", "fno": "72250199", "keywords": [ "Agent Communication", "Mental States", "Negotiation", "Multiagent Systems" ], "authors": [ { "affiliation": null, "fullName": "Takashi Katoh", "givenName": "Takashi", "surname": "Katoh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hideki Hara", "givenName": "Hideki", "surname": "Hara", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tetsuo Kinoshita", "givenName": "Tetsuo", "surname": "Kinoshita", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kenji Sugawara", "givenName": "Kenji", "surname": "Sugawara", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Norio Shiratori", "givenName": "Norio", "surname": "Shiratori", "__typename": "ArticleAuthorType" } ], "idPrefix": "icoin", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-01-01T00:00:00", "pubType": "proceedings", "pages": "0199", "year": "1998", "issn": null, "isbn": "0-8186-7225-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "72250193", "articleId": "12OmNqBtiHT", "__typename": "AdjacentArticleType" }, "next": { "fno": "picoin199800753", "articleId": "12OmNzzP5Al", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1wV1w1mndYY", "title": "2021 2nd International Conference on Artificial Intelligence and Education (ICAIE)", "acronym": "icaie", "groupId": "1800165", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wV1IEr7vTW", "doi": "10.1109/ICAIE53562.2021.00149", "title": "Design and implementation of measurement system based on mental health education", "normalizedTitle": "Design and implementation of measurement system based on mental health education", "abstract": "With the appearance of more and more mental health problems, mental health education has been paid more and more attention by people. In order to popularize the knowledge of mental health education, colleges and universities have opened courses of mental health education, and psychological counseling rooms have been set up to carry out mental health education. With the great popularity of computers, the ability to apply computer technology to all walks of life is constantly improving. Various platforms built by computers to measure psychological problems are welcomed by people. Therefore I developed an online psychometric system based on DW. This system includes six modules, such as Love test, Personality test, Social test, Successful test, Personality test, Heterogeneous test. Users can choose different aspects to measure their own psychological problems, analyze and evaluate their own psychological problems, and then find out the problem and solve the problem, so as to help us become a healthy person. From the perspective of school education, it is meaningful and valuable for students to conduct self-assessment of mental health and reduce the burden of mental health education for schools.", "abstracts": [ { "abstractType": "Regular", "content": "With the appearance of more and more mental health problems, mental health education has been paid more and more attention by people. In order to popularize the knowledge of mental health education, colleges and universities have opened courses of mental health education, and psychological counseling rooms have been set up to carry out mental health education. With the great popularity of computers, the ability to apply computer technology to all walks of life is constantly improving. Various platforms built by computers to measure psychological problems are welcomed by people. Therefore I developed an online psychometric system based on DW. This system includes six modules, such as Love test, Personality test, Social test, Successful test, Personality test, Heterogeneous test. Users can choose different aspects to measure their own psychological problems, analyze and evaluate their own psychological problems, and then find out the problem and solve the problem, so as to help us become a healthy person. From the perspective of school education, it is meaningful and valuable for students to conduct self-assessment of mental health and reduce the burden of mental health education for schools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the appearance of more and more mental health problems, mental health education has been paid more and more attention by people. In order to popularize the knowledge of mental health education, colleges and universities have opened courses of mental health education, and psychological counseling rooms have been set up to carry out mental health education. With the great popularity of computers, the ability to apply computer technology to all walks of life is constantly improving. Various platforms built by computers to measure psychological problems are welcomed by people. Therefore I developed an online psychometric system based on DW. This system includes six modules, such as Love test, Personality test, Social test, Successful test, Personality test, Heterogeneous test. Users can choose different aspects to measure their own psychological problems, analyze and evaluate their own psychological problems, and then find out the problem and solve the problem, so as to help us become a healthy person. From the perspective of school education, it is meaningful and valuable for students to conduct self-assessment of mental health and reduce the burden of mental health education for schools.", "fno": "249200a680", "keywords": [ "Computer Aided Instruction", "Educational Institutions", "Health Care", "Internet", "Psychometric Testing", "Mental Health Education", "Psychological Problems", "Mental Health Problems", "Computer Technology", "Online Psychometric System", "Measurement System", "Computers", "Employee Welfare", "Education", "Measurement Uncertainty", "Mental Health", "Cognition", "Grammar", "Mental Health", "Education", "Measurement", "System", "Development" ], "authors": [ { "affiliation": "Jiangxi University of Chinese Medicine,Nanchang,China", "fullName": "MengLi Zhu", "givenName": "MengLi", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Jiangxi University of Chinese Medicine,Nanchang,China", "fullName": "ZhiFang He", "givenName": "ZhiFang", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "icaie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "680-683", "year": "2021", "issn": null, "isbn": "978-1-6654-2492-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "249200a675", "articleId": "1wV1y8j8akg", "__typename": "AdjacentArticleType" }, "next": { "fno": "249200a684", "articleId": "1wV1Dzo4J4k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itme/2015/8302/0/8302a723", "title": "Using Information Technology to Improve the Mental Health Education of University Students", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a723/12OmNARRYyQ", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2021/7874/0/787400a106", "title": "College Students&#x0027; Mental Health Education System Based on Data Mining Technology", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2021/787400a106/1BByqLyGwp2", "parentPublication": { "id": "proceedings/isaiee/2021/7874/0", "title": "2021 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a621", "title": "Application of Virtual Reality Technology in Mental Health Education", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a621/1BQiynC3R9m", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900a513", "title": "An Empirical Study Based on the Analysis of Spss Technology in Group Psychological Counseling to Promote the Mental Health of Community Residents", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900a513/1C8FVyqlIVa", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2022/9109/0/910900a050", "title": "Research on the Early Warning System of College Students&#x0027; Mental Health Based on Big Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2022/910900a050/1HYv44AseTm", "parentPublication": { "id": "proceedings/iccnea/2022/9109/0", "title": "2022 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600b019", "title": "Application of Computer Technology in College Students' Mental Health Education", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600b019/1KpBTgiBxu0", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2020/5668/0/566800a129", "title": "The Effect of Arts Education on the Mental Health of Teenagers", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2020/566800a129/1sQKh0ldDC8", "parentPublication": { "id": "proceedings/isaiee/2020/5668/0", "title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b696", "title": "Research on Innovative Ways of Mental Health Education for Vocational Students under the Internet Background", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b696/1tzz8vdcTgQ", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a065", "title": "Timeliness in Group Counseling of Mental Health Education Curriculum in Computer Information Technology", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a065/1wHKhnNfkrK", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscipt/2021/4137/0/413700a670", "title": "The timeliness of Computer Information Technology in Mental Health Education", "doi": null, "abstractUrl": "/proceedings-article/iscipt/2021/413700a670/1zzpvHmxNFm", "parentPublication": { "id": "proceedings/iscipt/2021/4137/0", "title": "2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQYteY", "title": "2017 IEEE 13th International Conference on e-Science (e-Science)", "acronym": "e-science", "groupId": "1001511", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNA14AhT", "doi": "10.1109/eScience.2017.83", "title": "ERMRest: A Collaborative Data Catalog with Fine Grain Access Control", "normalizedTitle": "ERMRest: A Collaborative Data Catalog with Fine Grain Access Control", "abstract": "Creating and maintaining an accurate description of data assets and the relationships between assets is a critical aspect of making data findable, accessible, interoperable, and reusable (FAIR). Typically, such metadata are created and maintained in a data catalog by a curator as part of data publication. However, allowing metadata to be created and maintained by data producers as the data is generated rather then waiting for publication can have significant advantages in terms of productivity and repeatability. The responsibilities for metadata management need not fall on any one individual, but rather may be delegated to appropriate members of a collaboration, enabling participants to edit or maintain specific attributes, to describe relationships between data elements, or to correct errors. To support such collaborative data editing, we have created ERMrest, a relational data service for the Web that enables the creation, evolution and navigation of complex models used to describe and structure diverse file or relational data objects. A key capability of ERMRest is its ability to control operations down to the level of individual data elements, i.e. fine-grained access control, so that many different modes of data-oriented collaboration can be supported. In this paper we introduce ERMRest and describe its fine-grained access control capabilities that support collaborative editing. ERMrest is in daily use in many data driven collaborations and we describe a sample policy that is based on a common biocuration pattern.", "abstracts": [ { "abstractType": "Regular", "content": "Creating and maintaining an accurate description of data assets and the relationships between assets is a critical aspect of making data findable, accessible, interoperable, and reusable (FAIR). Typically, such metadata are created and maintained in a data catalog by a curator as part of data publication. However, allowing metadata to be created and maintained by data producers as the data is generated rather then waiting for publication can have significant advantages in terms of productivity and repeatability. The responsibilities for metadata management need not fall on any one individual, but rather may be delegated to appropriate members of a collaboration, enabling participants to edit or maintain specific attributes, to describe relationships between data elements, or to correct errors. To support such collaborative data editing, we have created ERMrest, a relational data service for the Web that enables the creation, evolution and navigation of complex models used to describe and structure diverse file or relational data objects. A key capability of ERMRest is its ability to control operations down to the level of individual data elements, i.e. fine-grained access control, so that many different modes of data-oriented collaboration can be supported. In this paper we introduce ERMRest and describe its fine-grained access control capabilities that support collaborative editing. ERMrest is in daily use in many data driven collaborations and we describe a sample policy that is based on a common biocuration pattern.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Creating and maintaining an accurate description of data assets and the relationships between assets is a critical aspect of making data findable, accessible, interoperable, and reusable (FAIR). Typically, such metadata are created and maintained in a data catalog by a curator as part of data publication. However, allowing metadata to be created and maintained by data producers as the data is generated rather then waiting for publication can have significant advantages in terms of productivity and repeatability. The responsibilities for metadata management need not fall on any one individual, but rather may be delegated to appropriate members of a collaboration, enabling participants to edit or maintain specific attributes, to describe relationships between data elements, or to correct errors. To support such collaborative data editing, we have created ERMrest, a relational data service for the Web that enables the creation, evolution and navigation of complex models used to describe and structure diverse file or relational data objects. A key capability of ERMRest is its ability to control operations down to the level of individual data elements, i.e. fine-grained access control, so that many different modes of data-oriented collaboration can be supported. In this paper we introduce ERMRest and describe its fine-grained access control capabilities that support collaborative editing. ERMrest is in daily use in many data driven collaborations and we describe a sample policy that is based on a common biocuration pattern.", "fno": "08109188", "keywords": [ "Authorisation", "Data Handling", "Groupware", "Internet", "Meta Data", "Open Systems", "User Interfaces", "Data Elements", "Collaborative Data Editing", "ER Mrest", "Relational Data Service", "Relational Data Objects", "ERM Rest", "Data Oriented Collaboration", "Fine Grained Access Control Capabilities", "Collaborative Data Catalog", "Data Assets", "Data Publication", "Metadata Management", "Findable Accessible Interoperable And Reusable", "FAIR", "Collaboration", "Access Control", "Metadata", "Aggregates", "Complexity Theory", "Manuals", "Access Control", "Web Services", "Databases", "Collaboration Tools", "E Science" ], "authors": [ { "affiliation": "Viterbi Sch. of Eng., Univ. of Southern California, Marina del Rey, CA, USA", "fullName": "Karl Czajkowski", "givenName": "Karl", "surname": "Czajkowski", "__typename": "ArticleAuthorType" }, { "affiliation": "Viterbi Sch. of Eng., Univ. of Southern California, Marina del Rey, CA, USA", "fullName": "Carl Kesselman", "givenName": "Carl", "surname": "Kesselman", "__typename": "ArticleAuthorType" }, { "affiliation": "Viterbi Sch. of Eng., Univ. of Southern California, Marina del Rey, CA, USA", "fullName": "Robert Schuler", "givenName": "Robert", "surname": "Schuler", "__typename": "ArticleAuthorType" } ], "idPrefix": "e-science", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "510-517", "year": "2017", "issn": null, "isbn": "978-1-5386-2686-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08109187", "articleId": "12OmNxWLTGo", "__typename": "AdjacentArticleType" }, "next": { "fno": "08109189", "articleId": "12OmNzn38QU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdcsw/2017/3292/0/6173a238", "title": "A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2017/6173a238/12OmNBQ2VZS", "parentPublication": { "id": "proceedings/icdcsw/2017/3292/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2004/2056/0/01265358", "title": "An indexing standard for sharing health education multimedia resources: the health education assets library (HEAL) metadata schema", "doi": null, "abstractUrl": "/proceedings-article/hicss/2004/01265358/12OmNqzcvDF", "parentPublication": { "id": "proceedings/hicss/2004/2056/0", "title": "37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2003/2113/0/21130033", "title": "A Metadata Catalog Service for Data Intensive Applications", "doi": null, "abstractUrl": "/proceedings-article/sc/2003/21130033/12OmNvSKNJQ", "parentPublication": { "id": "proceedings/sc/2003/2113/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2006/2507/8/250780209a", "title": "Enhancing Decision Making with Process Metadata: Theoretical Framework, Research Tool, and Exploratory Examination", "doi": null, "abstractUrl": "/proceedings-article/hicss/2006/250780209a/12OmNviZlji", "parentPublication": { "id": "proceedings/hicss/2006/2507/8", "title": "Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/superc/2003/695/0/01592936", "title": "A Metadata Catalog Service for Data Intensive Applications", "doi": null, "abstractUrl": "/proceedings-article/superc/2003/01592936/12OmNwB2dSV", "parentPublication": { "id": "proceedings/superc/2003/695/0", "title": "ACM/IEEE SC 2003 Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2017/3861/0/07991616", "title": "Towards a Cross-Canadian Digital Library Platform", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2017/07991616/12OmNxuo0gZ", "parentPublication": { "id": "proceedings/jcdl/2017/3861/0", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363784", "title": "LabBook: Metadata-driven social collaborative data analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363784/12OmNzzxusQ", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icftic/2022/2195/0/10075097", "title": "Industrial multi-link collaborative data sharing method based on blockchain", "doi": null, "abstractUrl": "/proceedings-article/icftic/2022/10075097/1LRld7Y3EMU", "parentPublication": { "id": "proceedings/icftic/2022/2195/0", "title": "2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2003/2113/0/01592936", "title": "A Metadata Catalog Service for Data Intensive Applications", "doi": null, "abstractUrl": "/proceedings-article/sc/2003/01592936/1MEX3J8WBFK", "parentPublication": { "id": "proceedings/sc/2003/2113/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4good/2021/1366/0/136600a011", "title": "Making the Invisible Visible: Risks and Benefits of Disclosing Metadata in Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis4good/2021/136600a011/1yNiRLiy36g", "parentPublication": { "id": "proceedings/vis4good/2021/1366/0", "title": "2021 IEEE Workshop on Visualization for Social Good (VIS4Good)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvAiSpb", "title": "Computer Vision, IEEE International Conference on", "acronym": "iccv", "groupId": "1000149", "volume": "1", "displayVolume": "2", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNzV70xY", "doi": "10.1109/ICCV.2001.937498", "title": "Segmentation with pairwise attraction and repulsion", "normalizedTitle": "Segmentation with pairwise attraction and repulsion", "abstract": "We propose a method of image segmentation by integrating pairwise attraction and directional repulsion derived from local grouping and figure-ground cues. These two kinds of pairwise relationships are encoded in the real and imaginary parts of an Hermitian graph weight matrix, through which we can directly generalize the normalized cuts criterion. With bi-graph constructions, this method can be readily extended to handle nondirectional repulsion that captures dissimilarity. We demonstrate the use of repulsion in image segmentation with relative depth cues, which allows segmentation and figure-ground segregation to be computed simultaneously. As a general mechanism to represent the dual measures of attraction and repulsion, this method can also be employed to solve other constraint satisfaction and optimization problems.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a method of image segmentation by integrating pairwise attraction and directional repulsion derived from local grouping and figure-ground cues. These two kinds of pairwise relationships are encoded in the real and imaginary parts of an Hermitian graph weight matrix, through which we can directly generalize the normalized cuts criterion. With bi-graph constructions, this method can be readily extended to handle nondirectional repulsion that captures dissimilarity. We demonstrate the use of repulsion in image segmentation with relative depth cues, which allows segmentation and figure-ground segregation to be computed simultaneously. As a general mechanism to represent the dual measures of attraction and repulsion, this method can also be employed to solve other constraint satisfaction and optimization problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a method of image segmentation by integrating pairwise attraction and directional repulsion derived from local grouping and figure-ground cues. These two kinds of pairwise relationships are encoded in the real and imaginary parts of an Hermitian graph weight matrix, through which we can directly generalize the normalized cuts criterion. With bi-graph constructions, this method can be readily extended to handle nondirectional repulsion that captures dissimilarity. We demonstrate the use of repulsion in image segmentation with relative depth cues, which allows segmentation and figure-ground segregation to be computed simultaneously. As a general mechanism to represent the dual measures of attraction and repulsion, this method can also be employed to solve other constraint satisfaction and optimization problems.", "fno": "00937498", "keywords": [ "Image Segmentation", "Constraint Theory", "Image Segmentation", "Pairwise Attraction", "Directional Repulsion", "Local Grouping", "Figure Ground Cues", "Bi Graph Constructions", "Dissimilarity", "Constraint Satisfaction", "Image Segmentation", "Cognitive Robotics", "Gratings", "Constraint Optimization", "Cognition", "Visual Perception", "Visual System", "Data Mining", "Computer Errors", "Bayesian Methods" ], "authors": [ { "affiliation": "Robotics Inst., Carnegie Mellon Univ., Pittsburgh, PA, USA", "fullName": "S.X. Yu", "givenName": "S.X.", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Shi", "givenName": "J.", "surname": "Shi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "52,53,54,55,56,57,58", "year": "2001", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00937497", "articleId": "12OmNxdm4I1", "__typename": "AdjacentArticleType" }, "next": { "fno": "00937499", "articleId": "12OmNqzcvI8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icinis/2009/3852/0/3852a482", "title": "Soft Control for Swarm Systems with Simple Attraction and Repulsion Functions", "doi": null, "abstractUrl": "/proceedings-article/icinis/2009/3852a482/12OmNANTAuj", "parentPublication": { "id": "proceedings/icinis/2009/3852/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2001/1272/2/127220025", "title": "Unsupervised Face Recognition from Image Sequences Based on Clustering with Attraction and Repulsion", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2001/127220025/12OmNvRU0kl", "parentPublication": { "id": "proceedings/cvpr/2001/1272/2", "title": "Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2015/0322/0/07429431", "title": "Change of Behavior on Swarm Robotics Using Repulsion and Attraction", "doi": null, "abstractUrl": "/proceedings-article/micai/2015/07429431/12OmNvzJG2m", "parentPublication": { "id": "proceedings/micai/2015/0322/0", "title": "2015 Fourteenth Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2010/6984/0/05540210", "title": "Finding dots: Segmentation as popping out regions from boundaries", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2010/05540210/12OmNwtWfHm", "parentPublication": { "id": "proceedings/cvpr/2010/6984/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851a174", "title": "Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851a174/12OmNwwMf4c", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/114310052", "title": "Segmentation with Pairwise Attraction and Repulsion", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/114310052/12OmNxdm4Ds", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciap/2007/2877/0/28770023", "title": "Integrating Boundary Information in Pairwise Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iciap/2007/28770023/12OmNxwWoTJ", "parentPublication": { "id": "proceedings/iciap/2007/2877/0", "title": "2007 14th International Conference on Image Analysis and Processing - ICIAP 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/07/ttp2013071690", "title": "Learning Full Pairwise Affinities for Spectral Segmentation", "doi": null, "abstractUrl": "/journal/tp/2013/07/ttp2013071690/13rRUzp02pq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c570", "title": "Stochastic Attraction-Repulsion Embedding for Large Scale Image Localization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c570/1hQqqWRn8xa", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a671", "title": "Robust Motion Segmentation From Pairwise Matches", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a671/1hVlSgC9izC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbV00", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNzcPAAT", "doi": "10.1109/CVPR.2012.6247993", "title": "Small sample scene categorization from perceptual relations", "normalizedTitle": "Small sample scene categorization from perceptual relations", "abstract": "This paper addresses the problem of scene categorization while arguing that better and more accurate results can be obtained by endowing the computational process with perceptual relations between scene categories. We first describe a psychophysical paradigm that probes human scene categorization, extracts perceptual relations between scene categories, and suggests that these perceptual relations do not always conform the semantic structure between categories. We then incorporate the obtained perceptual findings into a computational classification scheme, which takes inter-class relationships into account to obtain better scene categorization regardless of the particular descriptors with which scenes are represented. We present such improved classification results using several popular descriptors, we discuss why the contribution of inter-class perceptual relations is particularly pronounced for under-sampled training sets, and we argue that this mechanism may explain the ability of the human visual system to perform well under similar conditions. Finally, we introduce an online experimental system for obtaining perceptual relations for large collections of scene categories.", "abstracts": [ { "abstractType": "Regular", "content": "This paper addresses the problem of scene categorization while arguing that better and more accurate results can be obtained by endowing the computational process with perceptual relations between scene categories. We first describe a psychophysical paradigm that probes human scene categorization, extracts perceptual relations between scene categories, and suggests that these perceptual relations do not always conform the semantic structure between categories. We then incorporate the obtained perceptual findings into a computational classification scheme, which takes inter-class relationships into account to obtain better scene categorization regardless of the particular descriptors with which scenes are represented. We present such improved classification results using several popular descriptors, we discuss why the contribution of inter-class perceptual relations is particularly pronounced for under-sampled training sets, and we argue that this mechanism may explain the ability of the human visual system to perform well under similar conditions. Finally, we introduce an online experimental system for obtaining perceptual relations for large collections of scene categories.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper addresses the problem of scene categorization while arguing that better and more accurate results can be obtained by endowing the computational process with perceptual relations between scene categories. We first describe a psychophysical paradigm that probes human scene categorization, extracts perceptual relations between scene categories, and suggests that these perceptual relations do not always conform the semantic structure between categories. We then incorporate the obtained perceptual findings into a computational classification scheme, which takes inter-class relationships into account to obtain better scene categorization regardless of the particular descriptors with which scenes are represented. We present such improved classification results using several popular descriptors, we discuss why the contribution of inter-class perceptual relations is particularly pronounced for under-sampled training sets, and we argue that this mechanism may explain the ability of the human visual system to perform well under similar conditions. Finally, we introduce an online experimental system for obtaining perceptual relations for large collections of scene categories.", "fno": "343P3A32", "keywords": [ "Object Recognition", "Computer Vision", "Feature Extraction", "Image Classification", "Scene Recognition", "Small Sample Scene Categorization", "Computational Process", "Perceptual Relation Extraction", "Computational Classification Scheme", "Interclass Relationships", "Undersampled Training Sets", "Human Visual System", "Online Experimental System", "Biological Vision", "Machine Vision", "Visualization", "Training", "Humans", "Road Transportation", "Accuracy", "Semantics", "Complexity Theory" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Ben-Gurion Univ., Beer-Sheva, Israel", "fullName": "O. Ben-Shahar", "givenName": "O.", "surname": "Ben-Shahar", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Ben-Gurion Univ., Beer-Sheva, Israel", "fullName": "I. Kadar", "givenName": "I.", "surname": "Kadar", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "2711-2718", "year": "2012", "issn": "1063-6919", "isbn": "978-1-4673-1226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "342P3A31", "articleId": "12OmNsbGvE6", "__typename": "AdjacentArticleType" }, "next": { "fno": "344P3A33", "articleId": "12OmNBt3qj0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2009/3823/1/3823a356", "title": "SVM Based Hybrid Moment Features for Natural Scene Categorization", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823a356/12OmNA14A7o", "parentPublication": { "id": "cse/2009/3823/1", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a502", "title": "Learning Localized Perceptual Similarity Metrics for Interactive Categorization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a502/12OmNAXglKj", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2015/8332/0/8332a309", "title": "Multi-label Object Categorization Using Histograms of Global Relations", "doi": null, "abstractUrl": "/proceedings-article/3dv/2015/8332a309/12OmNqIzgXY", "parentPublication": { "id": "proceedings/3dv/2015/8332/0", "title": "2015 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2012/4558/0/06528212", "title": "Spatial feature evaluation for aerial scene analysis", "doi": null, "abstractUrl": "/proceedings-article/aipr/2012/06528212/12OmNwfKjaI", "parentPublication": { "id": "proceedings/aipr/2012/4558/0", "title": "2012 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/1/3119a588", "title": "Feature Selection for Scene Categorization Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119a588/12OmNxV4ivO", "parentPublication": { "id": "proceedings/cisp/2008/3119/1", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762a463", "title": "An Integrative Codebook for Natural Scene Categorization", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762a463/12OmNxd4tlw", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mue/2008/3134/0/3134a407", "title": "SVM-Based Video Scene Classification and Segmentation", "doi": null, "abstractUrl": "/proceedings-article/mue/2008/3134a407/12OmNyjLoOW", "parentPublication": { "id": "proceedings/mue/2008/3134/0", "title": "Multimedia and Ubiquitous Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/3/81833460", "title": "Video perceptual distortion measure: two-dimensional versus three-dimensional approaches", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81833460/12OmNypIYDA", "parentPublication": { "id": "proceedings/icip/1997/8183/3", "title": "Proceedings of International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2012/07/ttp2012071394", "title": "Toward Holistic Scene Understanding: Feedback Enabled Cascaded Classification Models", "doi": null, "abstractUrl": "/journal/tp/2012/07/ttp2012071394/13rRUEgarkG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/08/ttp2011081489", "title": "CENTRIST: A Visual Descriptor for Scene Categorization", "doi": null, "abstractUrl": "/journal/tp/2011/08/ttp2011081489/13rRUxCitzF", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCaLEny", "title": "2009 International Joint Conference on Computational Sciences and Optimization", "acronym": "cso", "groupId": "1002829", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNvrvjaN", "doi": "10.1109/CSO.2009.46", "title": "Multi-coordinates Scene Management in Space Information Visualization System", "normalizedTitle": "Multi-coordinates Scene Management in Space Information Visualization System", "abstract": "Space information visualization system involves much more simulate object. The coordinate referenced by the motion of each simulate object are different. A hierarchical design was proposed for different space coordinate system using coordinate Tree. Different objects in multi-coordinates can be displayed in one scene. Scene Graph Management was realized using layer construction. The display of vast scope scene was realized using multi-perspective and multi-window method.", "abstracts": [ { "abstractType": "Regular", "content": "Space information visualization system involves much more simulate object. The coordinate referenced by the motion of each simulate object are different. A hierarchical design was proposed for different space coordinate system using coordinate Tree. Different objects in multi-coordinates can be displayed in one scene. Scene Graph Management was realized using layer construction. The display of vast scope scene was realized using multi-perspective and multi-window method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Space information visualization system involves much more simulate object. The coordinate referenced by the motion of each simulate object are different. A hierarchical design was proposed for different space coordinate system using coordinate Tree. Different objects in multi-coordinates can be displayed in one scene. Scene Graph Management was realized using layer construction. The display of vast scope scene was realized using multi-perspective and multi-window method.", "fno": "3605c309", "keywords": [ "Information Visualization", "Scene Management", "Multi Coordinates", "Conversion Between Coordinates" ], "authors": [ { "affiliation": null, "fullName": "Junlan Nie", "givenName": "Junlan", "surname": "Nie", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanfen Wang", "givenName": "Yanfen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dongliang Guo", "givenName": "Dongliang", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "cso", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-04-01T00:00:00", "pubType": "proceedings", "pages": "309-311", "year": "2009", "issn": null, "isbn": "978-0-7695-3605-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3605c306", "articleId": "12OmNyoiZ9W", "__typename": "AdjacentArticleType" }, "next": { "fno": "3605c312", "articleId": "12OmNBZYTp9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/165P2A15", "title": "Dynamic scene understanding: The role of orientation features in space and time in scene classification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/165P2A15/12OmNBV9Ikj", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/1/3570a094", "title": "Scene Matching Algorithm Evaluation Based on Multi-core Parallel Computing Technology", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570a094/12OmNvkYxce", "parentPublication": { "id": "proceedings/wcse/2009/3570/1", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336d162", "title": "Design and Implementation of Real-Time 3D Campus Scene Simulation Management System Based on Vega", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336d162/12OmNxVV5XM", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2012/4899/0/4899a052", "title": "A Scene Division Method for Overlapping Splicing in Multi-channel Display", "doi": null, "abstractUrl": "/proceedings-article/icdh/2012/4899a052/12OmNy68EOL", "parentPublication": { "id": "proceedings/icdh/2012/4899/0", "title": "4th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2011/4584/0/4584b169", "title": "Multi-Level Kernel Machine for Scene Image Classification", "doi": null, "abstractUrl": "/proceedings-article/cis/2011/4584b169/12OmNyFU7bt", "parentPublication": { "id": "proceedings/cis/2011/4584/0", "title": "2011 Seventh International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cimca/2008/3514/0/3514a732", "title": "Multi-semantic Scene Classification Based on Region of Interest", "doi": null, "abstractUrl": "/proceedings-article/cimca/2008/3514a732/12OmNySG3O6", "parentPublication": { "id": "proceedings/cimca/2008/3514/0", "title": "2008 International Conference on Computational Intelligence for Modelling Control &amp; Automation (CIMCA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imvip/2009/3796/0/3796a001", "title": "Estimating 3D Scene Flow from Multiple 2D Optical Flows", "doi": null, "abstractUrl": "/proceedings-article/imvip/2009/3796a001/12OmNyv7mez", "parentPublication": { "id": "proceedings/imvip/2009/3796/0", "title": "International Machine Vision and Image Processing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061001", "title": "Scattering Points in Parallel Coordinates", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061001/13rRUxNW1TQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061017", "title": "Pargnostics: Screen-Space Metrics for Parallel Coordinates", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061017/13rRUxYINf6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d769", "title": "Camera Relocalization by Exploiting Multi-View Constraints for Scene Coordinates Regression", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d769/1i5mAJ0scuc", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyNQSGF", "title": "Knowledge and Systems Engineering, International Conference on", "acronym": "kse", "groupId": "1003010", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNAObbM1", "doi": "10.1109/KSE.2010.30", "title": "Integration of CAM Systems into Multi-axes Computerized Numerical Control Machines", "normalizedTitle": "Integration of CAM Systems into Multi-axes Computerized Numerical Control Machines", "abstract": "A solution for integrating CAM (Computer - Aided Manufacturing) systems into multi-axis nutating table CNC (Computerized Numerical Control ) machines is presented in this paper. The strategy of the method is to build a CL data processing algorithm. Thus, the CL data in ISO format produced by every CAMs can be transformed and translated into G-codes files (Numerical Control files) for controlling CNC machines. An implementation of the integration and real tests performing on industrial 5-axis DMU 50e CNC machine at Dong Anh Mechanical Comp. are carried out to verify the research results.", "abstracts": [ { "abstractType": "Regular", "content": "A solution for integrating CAM (Computer - Aided Manufacturing) systems into multi-axis nutating table CNC (Computerized Numerical Control ) machines is presented in this paper. The strategy of the method is to build a CL data processing algorithm. Thus, the CL data in ISO format produced by every CAMs can be transformed and translated into G-codes files (Numerical Control files) for controlling CNC machines. An implementation of the integration and real tests performing on industrial 5-axis DMU 50e CNC machine at Dong Anh Mechanical Comp. are carried out to verify the research results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A solution for integrating CAM (Computer - Aided Manufacturing) systems into multi-axis nutating table CNC (Computerized Numerical Control ) machines is presented in this paper. The strategy of the method is to build a CL data processing algorithm. Thus, the CL data in ISO format produced by every CAMs can be transformed and translated into G-codes files (Numerical Control files) for controlling CNC machines. An implementation of the integration and real tests performing on industrial 5-axis DMU 50e CNC machine at Dong Anh Mechanical Comp. are carried out to verify the research results.", "fno": "4213a119", "keywords": [ "CAM CNC Integration", "Multi Axis CNC Machine", "Postprocessor" ], "authors": [ { "affiliation": null, "fullName": "Chu Anh My", "givenName": "Chu Anh", "surname": "My", "__typename": "ArticleAuthorType" } ], "idPrefix": "kse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "119-124", "year": "2010", "issn": null, "isbn": "978-0-7695-4213-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4213a113", "articleId": "12OmNrFkeRp", "__typename": "AdjacentArticleType" }, "next": { "fno": "4213a125", "articleId": "12OmNC3FGoT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itcs/2009/3688/2/3688b213", "title": "5-Axis A-Spline Iterpolation Function and Its Realization Strategy", "doi": null, "abstractUrl": "/proceedings-article/itcs/2009/3688b213/12OmNApu5Cy", "parentPublication": { "id": "proceedings/itcs/2009/3688/2", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1991/2163/0/00131792", "title": "Four-axis CAM module for NC machining of rotational-free surfaces", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00131792/12OmNB9bvq3", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/3/3583c175", "title": "Algorithm for Surface Directly Interpolated Used in 5-Axis Computer Numerical Controlled System", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583c175/12OmNBUAvYi", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/1/3557a300", "title": "Kinematics Modeling and Post-Processing Method of Five-Axis CNC Machine", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557a300/12OmNBpmDR4", "parentPublication": { "id": "proceedings/etcs/2009/3557/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/3/3507c216", "title": "A Computer Numerical Controlled System with NURBS Interpolator", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507c216/12OmNCctfhg", "parentPublication": { "id": "proceedings/csie/2009/3507/3", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcs/2009/3688/2/3688b237", "title": "An Intelligent Controller Based on Constant Cutting Force for 5-Axis Milling", "doi": null, "abstractUrl": "/proceedings-article/itcs/2009/3688b237/12OmNqzLHQa", "parentPublication": { "id": "proceedings/itcs/2009/3688/2", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2008/3172/0/3172a269", "title": "A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) Systems", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2008/3172a269/12OmNro0I1j", "parentPublication": { "id": "proceedings/icdcs/2008/3172/0", "title": "2008 The 28th International Conference on Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2010/4286/1/4286a152", "title": "A Unified Framework of Postprocessor for Multi-axis Machine Tools", "doi": null, "abstractUrl": "/proceedings-article/icdma/2010/4286a152/12OmNx4gUjU", "parentPublication": { "id": "proceedings/icdma/2010/4286/1", "title": "2010 International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/1/4296a804", "title": "Cutting Path Planning for Surface Impellers", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296a804/12OmNzTYBWt", "parentPublication": { "id": "proceedings/icmtma/2011/4296/1", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2008/3357/2/3357c025", "title": "Multi Axis Linear Interpolator Design with PIC Microprocessor", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357c025/12OmNzdoMZC", "parentPublication": { "id": "icicta/2008/3357/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwt5shB", "title": "2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "acronym": "percom", "groupId": "1000551", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNvjyxHz", "doi": "10.1109/PERCOM.2015.7146504", "title": "Placer++: Semantic place labels beyond the visit", "normalizedTitle": "Placer++: Semantic place labels beyond the visit", "abstract": "Place labeling is the process of giving semantic labels to locations, such as home, work, and school. For a particular person, these labels can be computed automatically based on features of that person's visits to these locations. A previous system called Placer used the person's demographic data and the timing of their visits to label places with a learned decision tree. We developed Placer++ as a more accurate labeler, augmenting Placer's features of individual visits with (1) labeled visits from other people and (2) features about the sequence of the individual's visits. In processing sequences, we adopt structural learning techniques to take into account the relationships between visits. Accuracy increased by 8.85 percentage points over the baseline of Placer. We describe and justify the features and present our experiments on government diary data.", "abstracts": [ { "abstractType": "Regular", "content": "Place labeling is the process of giving semantic labels to locations, such as home, work, and school. For a particular person, these labels can be computed automatically based on features of that person's visits to these locations. A previous system called Placer used the person's demographic data and the timing of their visits to label places with a learned decision tree. We developed Placer++ as a more accurate labeler, augmenting Placer's features of individual visits with (1) labeled visits from other people and (2) features about the sequence of the individual's visits. In processing sequences, we adopt structural learning techniques to take into account the relationships between visits. Accuracy increased by 8.85 percentage points over the baseline of Placer. We describe and justify the features and present our experiments on government diary data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Place labeling is the process of giving semantic labels to locations, such as home, work, and school. For a particular person, these labels can be computed automatically based on features of that person's visits to these locations. A previous system called Placer used the person's demographic data and the timing of their visits to label places with a learned decision tree. We developed Placer++ as a more accurate labeler, augmenting Placer's features of individual visits with (1) labeled visits from other people and (2) features about the sequence of the individual's visits. In processing sequences, we adopt structural learning techniques to take into account the relationships between visits. Accuracy increased by 8.85 percentage points over the baseline of Placer. We describe and justify the features and present our experiments on government diary data.", "fno": "07146504", "keywords": [ "Labeling", "Accuracy", "Business", "Decision Trees", "Classification Algorithms", "Conferences", "Pervasive Computing", "PSRC", "Semantic Place Labels", "Locations" ], "authors": [ { "affiliation": "Microsoft Research, Microsoft Corporation, Redmond, WA USA", "fullName": "John Krumm", "givenName": "John", "surname": "Krumm", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, Microsoft Corporation, Redmond, WA USA", "fullName": "Dany Rouhana", "givenName": "Dany", "surname": "Rouhana", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, Microsoft Corporation, Redmond, WA USA", "fullName": "Ming-Wei Chang", "givenName": "Ming-Wei", "surname": "Chang", "__typename": "ArticleAuthorType" } ], "idPrefix": "percom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "11-19", "year": "2015", "issn": null, "isbn": "978-1-4799-8033-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07146503", "articleId": "12OmNvRU0sL", "__typename": "AdjacentArticleType" }, "next": { "fno": "07146505", "articleId": "12OmNBNM98n", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wisa/2013/3218/0/06778631", "title": "Detecting Image Spam Based on K-Labels Propagation Model", "doi": null, "abstractUrl": "/proceedings-article/wisa/2013/06778631/12OmNrHB1X7", "parentPublication": { "id": "proceedings/wisa/2013/3218/0", "title": "2013 10th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118b613", "title": "Graph Cut Based Continuous Stereo Matching Using Locally Shared Labels", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118b613/12OmNxwWoTF", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126496", "title": "Structured class-labels in random forests for semantic image labelling", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126496/12OmNxxNbUp", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/04/06636289", "title": "Active Learning without Knowing Individual Instance Labels: A Pairwise Label Homogeneity Query Approach", "doi": null, "abstractUrl": "/journal/tk/2014/04/06636289/13rRUNvgziW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258049", "title": "LSTM for septic shock: Adding unreliable labels to reliable predictions", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258049/17D45VObpRH", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i688", "title": "Iterative Learning with Open-set Noisy Labels", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i688/17D45VVho4T", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2022/02/09713942", "title": "Robust Federated Learning With Noisy Labels", "doi": null, "abstractUrl": "/magazine/ex/2022/02/09713942/1AZLqvEGdTG", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2019/6741/0/674100a236", "title": "Robust (Deep) Learning Framework Against Dirty Labels and Beyond", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2019/674100a236/1hVm1DIa94k", "parentPublication": { "id": "proceedings/tps-isa/2019/6741/0", "title": "2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100a577", "title": "Adjacency Labelling for Planar Graphs (and Beyond)", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100a577/1qyxyY8SyWs", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552249", "title": "Rapid Labels: Point-Feature Labeling on GPU", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552249/1xicaqbwmA0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": null, "article": { "id": "12OmNwDAC5A", "doi": "10.1109/IHMSC.2009.11", "title": "Research on Tracking Optimization Strategy of Three-Axis Tacking Equipment Based on Particle Swarm Optimization", "normalizedTitle": "Research on Tracking Optimization Strategy of Three-Axis Tacking Equipment Based on Particle Swarm Optimization", "abstract": "Three-axis tracking equipment can solve the question of blind region existing in azimuth -elevation tracking equipment. And it can track the target in the whole-space. However, the relationship of measurement value and space position is more-to-one, which makes for the variety of tracking strategy and the complexity of pilot system. The existing switch strategy restricts the improvement of tracking precision of three-axis tracking equipment. If the current angles and the detect errors are known, the solution of angle increment can be transformed to a question of optimization based on the movement analysis of three-axis tracking equipment. And the angle increment of different initial condition can be solved by particle swarm optimization. The difference of three-axis tracking equipment and azimuth-elevation tracking equipment was analyzed. The validity of this tracking strategy and analytic method was validated by simulation results.", "abstracts": [ { "abstractType": "Regular", "content": "Three-axis tracking equipment can solve the question of blind region existing in azimuth -elevation tracking equipment. And it can track the target in the whole-space. However, the relationship of measurement value and space position is more-to-one, which makes for the variety of tracking strategy and the complexity of pilot system. The existing switch strategy restricts the improvement of tracking precision of three-axis tracking equipment. If the current angles and the detect errors are known, the solution of angle increment can be transformed to a question of optimization based on the movement analysis of three-axis tracking equipment. And the angle increment of different initial condition can be solved by particle swarm optimization. The difference of three-axis tracking equipment and azimuth-elevation tracking equipment was analyzed. The validity of this tracking strategy and analytic method was validated by simulation results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Three-axis tracking equipment can solve the question of blind region existing in azimuth -elevation tracking equipment. And it can track the target in the whole-space. However, the relationship of measurement value and space position is more-to-one, which makes for the variety of tracking strategy and the complexity of pilot system. The existing switch strategy restricts the improvement of tracking precision of three-axis tracking equipment. If the current angles and the detect errors are known, the solution of angle increment can be transformed to a question of optimization based on the movement analysis of three-axis tracking equipment. And the angle increment of different initial condition can be solved by particle swarm optimization. The difference of three-axis tracking equipment and azimuth-elevation tracking equipment was analyzed. The validity of this tracking strategy and analytic method was validated by simulation results.", "fno": "3752a014", "keywords": [ "Three Axis", "Tracking Stratrgy", "Particle Swarm Optimization" ], "authors": [ { "affiliation": null, "fullName": "Zhang Daxing", "givenName": "Zhang", "surname": "Daxing", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jia Jianyuan", "givenName": "Jia", "surname": "Jianyuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Weidong", "givenName": "Wang", "surname": "Weidong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jia Wei", "givenName": "Jia", "surname": "Wei", "__typename": "ArticleAuthorType" } ], "idPrefix": "ihmsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "14-17", "year": "2009", "issn": null, "isbn": "978-0-7695-3752-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3752a010", "articleId": "12OmNzTH0V0", "__typename": "AdjacentArticleType" }, "next": { "fno": "3752a018", "articleId": "12OmNCfSqTv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2018/2290/0/08343236", "title": "Effective object tracking framework using weight adjustment of particle swarm optimization", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343236/12OmNApcu8u", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457471", "title": "A particle swarm optimization approach for multi-objects tracking in crowded scene", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457471/12OmNBZYTo6", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2009/3859/1/3859a083", "title": "Research on Objective Tracking of Mean Shift Algorithm Based on Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859a083/12OmNBcAGKM", "parentPublication": { "id": "proceedings/iita/2009/3859/1", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457581", "title": "Multi-object tracking via species based particle swarm optimization", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457581/12OmNBh8gVW", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icma/2010/4293/0/4293a143", "title": "GPU-based Optimization of Tool Path Planning in 5-Axis Flank Milling", "doi": null, "abstractUrl": "/proceedings-article/icma/2010/4293a143/12OmNCyTypd", "parentPublication": { "id": "proceedings/icma/2010/4293/0", "title": "2010 International Conference on Manufacturing Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2009/3899/0/3899a628", "title": "Equipment Possession Quantity Modeling and Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a628/12OmNwFid3M", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2017/3588/0/3588a107", "title": "3D Object Tracking in RGB-D Images Using Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/svr/2017/3588a107/12OmNyLiuDa", "parentPublication": { "id": "proceedings/svr/2017/3588/0", "title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2009/3718/0/3718a418", "title": "Object Tracking via Multi-region Covariance and Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/avss/2009/3718a418/12OmNzT7OpB", "parentPublication": { "id": "proceedings/avss/2009/3718/0", "title": "2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/1/3804a255", "title": "Cutting Parameter Optimization Based on Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804a255/12OmNznCl3C", "parentPublication": { "id": "proceedings/icicta/2009/3804/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/act/2009/3915/0/05376517", "title": "Particle Swarm Optimization Aided Kalman Filter for Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/act/2009/05376517/13bd1fdV4lt", "parentPublication": { "id": "proceedings/act/2009/3915/0", "title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwENvd", "title": "Fourth Aerospace Computer Security Applications", "acronym": "acsac", "groupId": "1001901", "volume": "0", "displayVolume": "0", "year": "1988", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdbV0T", "doi": "10.1109/ACSAC.1988.113436", "title": "Dual labels revisited (computer security)", "normalizedTitle": "Dual labels revisited (computer security)", "abstract": "The utility and need for trusted labels used for functions other than access control is discussed. The author shows that information labels serve functions separate and distinct from that of sensitivity labels. In some instances, they function in capacities that are beyond the abilities of standard single-label-based systems. It is also shown that attempting to incorporate the marking function into sensitivity labels is not a trivial task, and that this provides added weight to the argument that markings should be incorporated in labels separate from sensitivity labels. It is noted how the existence of the floating information labels in the CMW (compartmented mode workstation) provides users with the ability to remain at a single security level and manipulate data of a lower security level, and how the information labels will ensure that the data is properly labeled.<>", "abstracts": [ { "abstractType": "Regular", "content": "The utility and need for trusted labels used for functions other than access control is discussed. The author shows that information labels serve functions separate and distinct from that of sensitivity labels. In some instances, they function in capacities that are beyond the abilities of standard single-label-based systems. It is also shown that attempting to incorporate the marking function into sensitivity labels is not a trivial task, and that this provides added weight to the argument that markings should be incorporated in labels separate from sensitivity labels. It is noted how the existence of the floating information labels in the CMW (compartmented mode workstation) provides users with the ability to remain at a single security level and manipulate data of a lower security level, and how the information labels will ensure that the data is properly labeled.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The utility and need for trusted labels used for functions other than access control is discussed. The author shows that information labels serve functions separate and distinct from that of sensitivity labels. In some instances, they function in capacities that are beyond the abilities of standard single-label-based systems. It is also shown that attempting to incorporate the marking function into sensitivity labels is not a trivial task, and that this provides added weight to the argument that markings should be incorporated in labels separate from sensitivity labels. It is noted how the existence of the floating information labels in the CMW (compartmented mode workstation) provides users with the ability to remain at a single security level and manipulate data of a lower security level, and how the information labels will ensure that the data is properly labeled.", "fno": "00113436", "keywords": [ "Security Of Data", "Workstations", "Dual Labels", "Trusted Labels", "Sensitivity Labels", "Standard Single Label Based Systems", "Marking Function", "Floating Information Labels", "CMW", "Compartmented Mode Workstation", "Single Security Level", "Lower Security Level", "Computer Security", "Access Control", "Information Security", "Terminology", "Data Security", "Workstations", "Labeling", "Books" ], "authors": [ { "affiliation": "Mitre Corp., Bedford, MA, USA", "fullName": "R.D. Graubart", "givenName": "R.D.", "surname": "Graubart", "__typename": "ArticleAuthorType" } ], "idPrefix": "acsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1988-01-01T00:00:00", "pubType": "proceedings", "pages": "167,168,169,170,171,172", "year": "1988", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00113435", "articleId": "12OmNz5JCe4", "__typename": "AdjacentArticleType" }, "next": { "fno": "00113437", "articleId": "12OmNxw5B8V", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csac/1992/3115/0/00228225", "title": "A comparison of trusted X security policies, architectures, and interoperability", "doi": null, "abstractUrl": "/proceedings-article/csac/1992/00228225/12OmNCykm7S", "parentPublication": { "id": "proceedings/csac/1992/3115/0", "title": "Proceedings Eighth Annual Computer Security Application Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csac/1994/6795/0/00367299", "title": "Using security models to investigate CMW design and implementation", "doi": null, "abstractUrl": "/proceedings-article/csac/1994/00367299/12OmNwseERq", "parentPublication": { "id": "proceedings/csac/1994/6795/0", "title": "Tenth Annual Computer Security Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/1987/0771/0/07710023", "title": "Exploiting the Dual Nature of Sensitivity Labels", "doi": null, "abstractUrl": "/proceedings-article/sp/1987/07710023/12OmNwwMf4Y", "parentPublication": { "id": "proceedings/sp/1987/0771/0", "title": "1987 IEEE Symposium on Security and Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csac/1990/2105/0/00143778", "title": "A prototype for Trusted X labeling policies", "doi": null, "abstractUrl": "/proceedings-article/csac/1990/00143778/12OmNxR5UTm", "parentPublication": { "id": "proceedings/csac/1990/2105/0", "title": "1990 Proceedings of the Sixth Annual Computer Security Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/1988/0895/0/00113422", "title": "Implementation design for a kernelized trusted DBMS", "doi": null, "abstractUrl": "/proceedings-article/acsac/1988/00113422/12OmNy5R3CE", "parentPublication": { "id": "proceedings/acsac/1988/0895/0", "title": "Fourth Aerospace Computer Security Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csac/1994/6795/0/00367307", "title": "A secure Email gateway (building an RCAS external interface)", "doi": null, "abstractUrl": "/proceedings-article/csac/1994/00367307/12OmNzBOhOa", "parentPublication": { "id": "proceedings/csac/1994/6795/0", "title": "Tenth Annual Computer Security Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1990/06/e0608", "title": "Compartmented Mode Workstation: Prototype Highlights", "doi": null, "abstractUrl": "/journal/ts/1990/06/e0608/13rRUx0gegV", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1995/05/k0839", "title": "Enriching the Expressive Power of Security Labels", "doi": null, "abstractUrl": "/journal/tk/1995/05/k0839/13rRUyY28YI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200h386", "title": "Weakly Supervised Segmentation of Small Buildings with Point Labels", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200h386/1BmFbFiX4qY", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2020/3497/0/349700a346", "title": "Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products", "doi": null, "abstractUrl": "/proceedings-article/sp/2020/349700a346/1j2LfHnkRPy", "parentPublication": { "id": "proceedings/sp/2020/3497/0/", "title": "2020 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqIhFPm", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNx0RIRl", "doi": "10.1109/JCDL.2014.6970174", "title": "Representing topics labels for exploring digital libraries", "normalizedTitle": "Representing topics labels for exploring digital libraries", "abstract": "Topic models have been shown to be a useful way of representing the content of large document collections, for example via visualisation interfaces (topic browsers). These systems enable users to explore collections by way of latent topics. A standard way to represent a topic is using a set of keywords, i.e. the top-n words with highest marginal probability within the topic. However, alternative topic representations have been proposed, including textual and image labels. In this paper, we compare different topic representations, i.e. sets of topic words, textual phrases and images, in a document retrieval task. We asked participants to retrieve relevant documents based on pre-defined queries within a fixed time limit, presenting topics in one of the following modalities: (1) sets of keywords, (2) textual labels, and (3) image labels. Our results show that textual labels are easier for users to interpret than keywords and image labels. Moreover, the precision of retrieved documents for textual and image labels is comparable to the precision achieved by representing topics using sets of keywords, demonstrating that labelling methods are an effective alternative topic representation.", "abstracts": [ { "abstractType": "Regular", "content": "Topic models have been shown to be a useful way of representing the content of large document collections, for example via visualisation interfaces (topic browsers). These systems enable users to explore collections by way of latent topics. A standard way to represent a topic is using a set of keywords, i.e. the top-n words with highest marginal probability within the topic. However, alternative topic representations have been proposed, including textual and image labels. In this paper, we compare different topic representations, i.e. sets of topic words, textual phrases and images, in a document retrieval task. We asked participants to retrieve relevant documents based on pre-defined queries within a fixed time limit, presenting topics in one of the following modalities: (1) sets of keywords, (2) textual labels, and (3) image labels. Our results show that textual labels are easier for users to interpret than keywords and image labels. Moreover, the precision of retrieved documents for textual and image labels is comparable to the precision achieved by representing topics using sets of keywords, demonstrating that labelling methods are an effective alternative topic representation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topic models have been shown to be a useful way of representing the content of large document collections, for example via visualisation interfaces (topic browsers). These systems enable users to explore collections by way of latent topics. A standard way to represent a topic is using a set of keywords, i.e. the top-n words with highest marginal probability within the topic. However, alternative topic representations have been proposed, including textual and image labels. In this paper, we compare different topic representations, i.e. sets of topic words, textual phrases and images, in a document retrieval task. We asked participants to retrieve relevant documents based on pre-defined queries within a fixed time limit, presenting topics in one of the following modalities: (1) sets of keywords, (2) textual labels, and (3) image labels. Our results show that textual labels are easier for users to interpret than keywords and image labels. Moreover, the precision of retrieved documents for textual and image labels is comparable to the precision achieved by representing topics using sets of keywords, demonstrating that labelling methods are an effective alternative topic representation.", "fno": "06970174", "keywords": [ "Labeling", "Encyclopedias", "Electronic Publishing", "Internet", "Visualization", "Feature Extraction", "Evaluation", "Topic Model", "Information Retrieval" ], "authors": [ { "affiliation": "Computer Science, University of Sheffield, UK", "fullName": "Nikolaos Aletras", "givenName": "Nikolaos", "surname": "Aletras", "__typename": "ArticleAuthorType" }, { "affiliation": "Computing and Information Systems, The University of Melbourne, Australia", "fullName": "Timothy Baldwin", "givenName": "Timothy", "surname": "Baldwin", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Philosophy, King's College, London, UK", "fullName": "Jey Han Lau", "givenName": "Jey Han", "surname": "Lau", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science, University of Sheffield, UK", "fullName": "Mark Stevenson", "givenName": "Mark", "surname": "Stevenson", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "239-248", "year": "2014", "issn": null, "isbn": "978-1-4799-5569-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06970173", "articleId": "12OmNAkWvzp", "__typename": "AdjacentArticleType" }, "next": { "fno": "06970175", "articleId": "12OmNCu4ncf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2016/0662/0/0662a063", "title": "Semantic Tagging Using Topic Models Exploiting Wikipedia Category Network", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a063/12OmNANBZqe", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2018/4210/0/421001a045", "title": "Fast Top-k Area Topics Extraction with Knowledge Base", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a045/12OmNAmmuPO", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2014/4003/0/4003a273", "title": "Ontology-Based Text Classification into Dynamically Defined Topics", "doi": null, "abstractUrl": "/proceedings-article/icsc/2014/4003a273/12OmNC4eSCf", "parentPublication": { "id": "proceedings/icsc/2014/4003/0", "title": "2014 IEEE International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2016/2109/0/07495629", "title": "From user graph to Topics Graph: Towards twitter followee recommendation based on knowledge graphs", "doi": null, "abstractUrl": "/proceedings-article/icdew/2016/07495629/12OmNqBbHUp", "parentPublication": { "id": "proceedings/icdew/2016/2109/0", "title": "2016 IEEE 32nd International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2015/8128/0/8128a378", "title": "Modeling Both Coarse-Grained and Fine-Grained Topics in Massive Text Data", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2015/8128a378/12OmNwDACwV", "parentPublication": { "id": "proceedings/bigdataservice/2015/8128/0", "title": "2015 IEEE First International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2017/6543/0/6543a411", "title": "Source-LDA: Enhancing Probabilistic Topic Models Using Prior Knowledge Sources", "doi": null, "abstractUrl": "/proceedings-article/icde/2017/6543a411/12OmNx4gUui", "parentPublication": { "id": "proceedings/icde/2017/6543/0", "title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2016/3635/0/3635a207", "title": "Topical Sequence Profiling", "doi": null, "abstractUrl": "/proceedings-article/dexa/2016/3635a207/12OmNxGj9KQ", "parentPublication": { "id": "proceedings/dexa/2016/3635/0", "title": "2016 27th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2013/1050/0/06642458", "title": "Clustering and summarization topics of subject knowledge through analyzing internal links of Wikipedia", "doi": null, "abstractUrl": "/proceedings-article/iri/2013/06642458/12OmNxwENL8", "parentPublication": { "id": "proceedings/iri/2013/1050/0", "title": "2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2015/7303/0/07072827", "title": "Detection of POI boundaries through geographical topics", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2015/07072827/12OmNyQ7FTl", "parentPublication": { "id": "proceedings/bigcomp/2015/7303/0", "title": "2015 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671943", "title": "How Inclusive Are Wikipedia&#x2019;s Hyperlinks in Articles Covering Polarizing Topics?", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671943/1A8hrUqFqco", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBaT60w", "title": "2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)", "acronym": "fg", "groupId": "1000065", "volume": "1", "displayVolume": "1", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx7ov52", "doi": "10.1109/FG.2015.7163083", "title": "Improved weak labels using contextual cues for person identification in videos", "normalizedTitle": "Improved weak labels using contextual cues for person identification in videos", "abstract": "Fully automatic person identification in TV series has been achieved by obtaining weak labels from subtitles and transcripts [11]. In this paper, we revisit the problem of matching subtitles with face tracks to obtain more assignments and more accurate weak labels. We perform a detailed analysis of the state-of-the-art showing the types of errors during the assignment and providing insights into their cause. We then propose to model the problem of assigning names to face tracks as a joint optimization problem. Using negative constraints between co-occurring pairs of tracks and positive constraints from track threads, we are able to significantly improve the speaker assignment performance. This directly influences the identification performance on all face tracks. We also propose a new feature to determine whether a tracked face is speaking and show further improvements in performance while being computationally more efficient.", "abstracts": [ { "abstractType": "Regular", "content": "Fully automatic person identification in TV series has been achieved by obtaining weak labels from subtitles and transcripts [11]. In this paper, we revisit the problem of matching subtitles with face tracks to obtain more assignments and more accurate weak labels. We perform a detailed analysis of the state-of-the-art showing the types of errors during the assignment and providing insights into their cause. We then propose to model the problem of assigning names to face tracks as a joint optimization problem. Using negative constraints between co-occurring pairs of tracks and positive constraints from track threads, we are able to significantly improve the speaker assignment performance. This directly influences the identification performance on all face tracks. We also propose a new feature to determine whether a tracked face is speaking and show further improvements in performance while being computationally more efficient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fully automatic person identification in TV series has been achieved by obtaining weak labels from subtitles and transcripts [11]. In this paper, we revisit the problem of matching subtitles with face tracks to obtain more assignments and more accurate weak labels. We perform a detailed analysis of the state-of-the-art showing the types of errors during the assignment and providing insights into their cause. We then propose to model the problem of assigning names to face tracks as a joint optimization problem. Using negative constraints between co-occurring pairs of tracks and positive constraints from track threads, we are able to significantly improve the speaker assignment performance. This directly influences the identification performance on all face tracks. We also propose a new feature to determine whether a tracked face is speaking and show further improvements in performance while being computationally more efficient.", "fno": "07163083", "keywords": [ "Face", "Tracking", "Mouth", "Videos", "Labeling", "TV", "Joints" ], "authors": [ { "affiliation": "Karlsruhe Inst. of Technol., Karlsruhe, Germany", "fullName": "Makarand Tapaswi", "givenName": "Makarand", "surname": "Tapaswi", "__typename": "ArticleAuthorType" }, { "affiliation": "Karlsruhe Inst. of Technol., Karlsruhe, Germany", "fullName": "Martin Bauml", "givenName": "Martin", "surname": "Bauml", "__typename": "ArticleAuthorType" }, { "affiliation": "Karlsruhe Inst. of Technol., Karlsruhe, Germany", "fullName": "Rainer Stiefelhagen", "givenName": "Rainer", "surname": "Stiefelhagen", "__typename": "ArticleAuthorType" } ], "idPrefix": "fg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-05-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2015", "issn": null, "isbn": "978-1-4799-6026-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07163082", "articleId": "12OmNrF2DKc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07163084", "articleId": "12OmNBTJIAN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2016/0641/0/07477560", "title": "Naming TV characters by watching and analyzing dialogs", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477560/12OmNAsBFHv", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/336P3A25", "title": "“Knock! Knock! Who is it?” probabilistic person identification in TV-series", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/336P3A25/12OmNwF0BMx", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126415", "title": "Unsupervised metric learning for face identification in TV video", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126415/12OmNx4Q6M7", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460551", "title": "Unsupervised people organization and its application on individual retrieval from videos", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460551/12OmNzVXNOb", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2015/6026/1/07163140", "title": "Where is my friend? — Person identification in social networks", "doi": null, "abstractUrl": "/proceedings-article/fg/2015/07163140/12OmNzXnNu2", "parentPublication": { "id": "proceedings/fg/2015/6026/5", "title": "2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/03/07450177", "title": "Learning from Weak and Noisy Labels for Semantic Segmentation", "doi": null, "abstractUrl": "/journal/tp/2017/03/07450177/13rRUB7a1h7", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/04/08590759", "title": "Automated Video Face Labelling for Films and TV Material", "doi": null, "abstractUrl": "/journal/tp/2020/04/08590759/17D45WK5AmB", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i897", "title": "Weak Adaptation Learning: Addressing Cross-domain Data Insufficiency with Weak Annotator", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i897/1BmL9xSVCWA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d184", "title": "Weakly Supervised Cell-Instance Segmentation with Two Types of Weak Labels by Single Instance Pasting", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d184/1L8qBidfo9q", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006371", "title": "ClusterClean: a Weak Semi-Supervised Approach for Cleaning Data Labels", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006371/1hJsgpaqIvu", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qmfHK8AjMQ", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qmgdfy35XW", "doi": "10.1109/BIBM49941.2020.9313302", "title": "Cost-Quality Adaptive Active Learning for Chinese Clinical Named Entity Recognition", "normalizedTitle": "Cost-Quality Adaptive Active Learning for Chinese Clinical Named Entity Recognition", "abstract": "Clinical Named Entity Recognition (CNER) aims to automatically identity clinical terminologies in Electronic Health Records (EHRs), which is a fundamental and crucial step for clinical research. To train a high-performance model for CNER, it usually requires a large number of EHRs with high-quality labels. However, labeling EHRs, especially Chinese EHRs, is time-consuming and expensive. One effective solution to this issue is active learning, where a model asks labelers to annotate data which is beneficial to model performance improvement. Conventional active learning assumes a single labeler that always replies noiseless answers to queried labels. However, in real settings, multiple labelers provide diverse quality of annotation with varied cost and labelers with low overall annotation quality can still assign correct labels for some specific instances. In this paper, we propose a Cost-Quality Adaptive Active Learning (CQAAL) approach for CNER in Chinese EHRs, which maintains a balance between the annotation quality, labeling cost and the informativeness of selected instances. Specifically, our proposed CQAAL method selects cost-effective instance-labeler pairs to achieve better annotation quality with lower cost in an adaptive manner. Computational results on the CCKS2017 dataset demonstrate the superiority and effectiveness of CQAAL.", "abstracts": [ { "abstractType": "Regular", "content": "Clinical Named Entity Recognition (CNER) aims to automatically identity clinical terminologies in Electronic Health Records (EHRs), which is a fundamental and crucial step for clinical research. To train a high-performance model for CNER, it usually requires a large number of EHRs with high-quality labels. However, labeling EHRs, especially Chinese EHRs, is time-consuming and expensive. One effective solution to this issue is active learning, where a model asks labelers to annotate data which is beneficial to model performance improvement. Conventional active learning assumes a single labeler that always replies noiseless answers to queried labels. However, in real settings, multiple labelers provide diverse quality of annotation with varied cost and labelers with low overall annotation quality can still assign correct labels for some specific instances. In this paper, we propose a Cost-Quality Adaptive Active Learning (CQAAL) approach for CNER in Chinese EHRs, which maintains a balance between the annotation quality, labeling cost and the informativeness of selected instances. Specifically, our proposed CQAAL method selects cost-effective instance-labeler pairs to achieve better annotation quality with lower cost in an adaptive manner. Computational results on the CCKS2017 dataset demonstrate the superiority and effectiveness of CQAAL.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clinical Named Entity Recognition (CNER) aims to automatically identity clinical terminologies in Electronic Health Records (EHRs), which is a fundamental and crucial step for clinical research. To train a high-performance model for CNER, it usually requires a large number of EHRs with high-quality labels. However, labeling EHRs, especially Chinese EHRs, is time-consuming and expensive. One effective solution to this issue is active learning, where a model asks labelers to annotate data which is beneficial to model performance improvement. Conventional active learning assumes a single labeler that always replies noiseless answers to queried labels. However, in real settings, multiple labelers provide diverse quality of annotation with varied cost and labelers with low overall annotation quality can still assign correct labels for some specific instances. In this paper, we propose a Cost-Quality Adaptive Active Learning (CQAAL) approach for CNER in Chinese EHRs, which maintains a balance between the annotation quality, labeling cost and the informativeness of selected instances. Specifically, our proposed CQAAL method selects cost-effective instance-labeler pairs to achieve better annotation quality with lower cost in an adaptive manner. Computational results on the CCKS2017 dataset demonstrate the superiority and effectiveness of CQAAL.", "fno": "09313302", "keywords": [ "Learning Artificial Intelligence", "Medical Information Systems", "Natural Language Processing", "Model Performance Improvement", "Conventional Active Learning", "Single Labeler", "Queried Labels", "Multiple Labelers", "Annotation Quality", "Cost Quality Adaptive Active Learning Approach", "CNER", "Chinese EH Rs", "Chinese Clinical Named Entity Recognition", "Identity Clinical Terminologies", "Electronic Health Records", "Fundamental Step", "Clinical Research", "High Performance Model", "High Quality Labels", "Labeling EH Rs", "CQAAL Method", "Cost Effective Instance Labeler Pairs", "CCKS 2017 Dataset", "Annotations", "Uncertainty", "Labeling", "Task Analysis", "Entropy", "Manuals", "Neural Networks", "Active Learning", "Clinical Named Entity Recognition", "Electronic Health Records" ], "authors": [ { "affiliation": "East China University of Science and Technology,School of Information Science and Engineering,Shanghai,China,200237", "fullName": "Tingting Cai", "givenName": "Tingting", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": "East China University of Science and Technology,School of Information Science and Engineering,Shanghai,China,200237", "fullName": "Yangming Zhou", "givenName": "Yangming", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "East China University of Science and Technology,School of Information Science and Engineering,Shanghai,China,200237", "fullName": "Hong Zheng", "givenName": "Hong", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "528-533", "year": "2020", "issn": null, "isbn": "978-1-7281-6215-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09313128", "articleId": "1qmfU3mPuQ8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09313408", "articleId": "1qmgczsSgkU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmi/2002/1834/0/18340253", "title": "Improved Named Entity Translation and Bilingual Named Entity Extraction", "doi": null, "abstractUrl": "/proceedings-article/icmi/2002/18340253/12OmNrNh0Fr", "parentPublication": { "id": "proceedings/icmi/2002/1834/0", "title": "Proceedings Fourth IEEE International Conference on Multimodal Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905a858", "title": "Self-Taught Active Learning from Crowds", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905a858/12OmNvAiSbD", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840d000", "title": "Active Visual Recognition with Expertise Estimation in Crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840d000/12OmNxQOjyU", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a639", "title": "Active Learning from Multiple Noisy Labelers with Varied Costs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a639/12OmNzUPpnN", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/04/06636289", "title": "Active Learning without Knowing Individual Instance Labels: A Pairwise Label Homogeneity Query Approach", "doi": null, "abstractUrl": "/journal/tk/2014/04/06636289/13rRUNvgziW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2017/04/07892023", "title": "An Online Learning Approach to Improving the Quality of Crowd-Sourcing", "doi": null, "abstractUrl": "/journal/nt/2017/04/07892023/13rRUyoyhLh", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500d411", "title": "DG-Labeler and DGL-MOTS Dataset: Boost the Autonomous Driving Perception", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500d411/1B13HYSNMUo", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/faiml/2022/7364/0/736400a097", "title": "Named Entity Annotation Corpus for Commercial Opportunity Mining", "doi": null, "abstractUrl": "/proceedings-article/faiml/2022/736400a097/1IUELALaHHa", "parentPublication": { "id": "proceedings/faiml/2022/7364/0", "title": "2022 International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983406", "title": "Clinical named-entity recognition: A short comparison", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983406/1hgudWFsNLG", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378052", "title": "Pattern-enhanced Named Entity Recognition with Distant Supervision", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378052/1s6503XcLfO", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIl3sZ", "title": "2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)", "acronym": "ccem", "groupId": "1801957", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxbmSGc", "doi": "10.1109/CCEM.2017.19", "title": "User Behaviour Anomaly Detection in Multidimensional Data", "normalizedTitle": "User Behaviour Anomaly Detection in Multidimensional Data", "abstract": "User Anomaly Detection, an important aspect of User Behaviour Analysis, is used to find anomalous user events from the event and network traffic log data. Traditional security mechanisms are not able to detect new/unknown types of anomalies as they do not incorporate contextual and behavioural aspects of the data for analysis. User Behaviour Anomaly Detection (UBAD) employs user behavioural patterns in context thereby achieving a higher detection rate. Log data employed for UBAD has multiple dimensions. With increase in dimensions (attributes), data gets sparse and the detection of anomalies becomes increasingly complex. For this reason, the single dimensional algorithms proposed for anomaly detection based on clustering, proximity and dimensional reduction do not work well on higher dimension data. OLAP based data analysis techniques provide efficient data slicing and aggregation operations crucial for multidimensional analytics along with multiscale visualisation for exploratory discovery. In this paper, an effective multidimensional process for UBAD is developed to detect anomalies using multi-dimensional statistical tests. An integral part of the process is the development of an OLAP Cube data model for event log data. The statistical efficiency of the UBAD process for different dimensions is investigated. On a real-life event log data, it is shown that the statistical efficiency of detection improves with the increased dimensionality of the tests: the true negative rate and the true positive rate show marked improvement. It is deduced that the computationally more expensive higher dimensional tests need to be employed in order to achieve better anomaly detection.", "abstracts": [ { "abstractType": "Regular", "content": "User Anomaly Detection, an important aspect of User Behaviour Analysis, is used to find anomalous user events from the event and network traffic log data. Traditional security mechanisms are not able to detect new/unknown types of anomalies as they do not incorporate contextual and behavioural aspects of the data for analysis. User Behaviour Anomaly Detection (UBAD) employs user behavioural patterns in context thereby achieving a higher detection rate. Log data employed for UBAD has multiple dimensions. With increase in dimensions (attributes), data gets sparse and the detection of anomalies becomes increasingly complex. For this reason, the single dimensional algorithms proposed for anomaly detection based on clustering, proximity and dimensional reduction do not work well on higher dimension data. OLAP based data analysis techniques provide efficient data slicing and aggregation operations crucial for multidimensional analytics along with multiscale visualisation for exploratory discovery. In this paper, an effective multidimensional process for UBAD is developed to detect anomalies using multi-dimensional statistical tests. An integral part of the process is the development of an OLAP Cube data model for event log data. The statistical efficiency of the UBAD process for different dimensions is investigated. On a real-life event log data, it is shown that the statistical efficiency of detection improves with the increased dimensionality of the tests: the true negative rate and the true positive rate show marked improvement. It is deduced that the computationally more expensive higher dimensional tests need to be employed in order to achieve better anomaly detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "User Anomaly Detection, an important aspect of User Behaviour Analysis, is used to find anomalous user events from the event and network traffic log data. Traditional security mechanisms are not able to detect new/unknown types of anomalies as they do not incorporate contextual and behavioural aspects of the data for analysis. User Behaviour Anomaly Detection (UBAD) employs user behavioural patterns in context thereby achieving a higher detection rate. Log data employed for UBAD has multiple dimensions. With increase in dimensions (attributes), data gets sparse and the detection of anomalies becomes increasingly complex. For this reason, the single dimensional algorithms proposed for anomaly detection based on clustering, proximity and dimensional reduction do not work well on higher dimension data. OLAP based data analysis techniques provide efficient data slicing and aggregation operations crucial for multidimensional analytics along with multiscale visualisation for exploratory discovery. In this paper, an effective multidimensional process for UBAD is developed to detect anomalies using multi-dimensional statistical tests. An integral part of the process is the development of an OLAP Cube data model for event log data. The statistical efficiency of the UBAD process for different dimensions is investigated. On a real-life event log data, it is shown that the statistical efficiency of detection improves with the increased dimensionality of the tests: the true negative rate and the true positive rate show marked improvement. It is deduced that the computationally more expensive higher dimensional tests need to be employed in order to achieve better anomaly detection.", "fno": "2450a003", "keywords": [ "Data Visualisation", "Security Of Data", "Multidimensional Data", "Anomalous User Events", "Incorporate Contextual Aspects", "Behavioural Aspects", "UBAD", "User Behavioural Patterns", "Higher Detection Rate", "Log Data", "Higher Dimension Data", "Aggregation Operations", "OLAP Cube Data Model", "User Anomaly Detection", "OLAP Based Data Analysis Techniques", "Anomaly Detection", "Security", "Data Models", "Data Analysis", "Big Data", "Clustering Algorithms", "User Behavior Anomaly Detection", "UBAD", "Anomaly Detection", "Security Analytics", "Data Analytics", "Statistical Test", "OLAP", "Multidimensional", "Data Cube", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "T. S. Prarthana", "givenName": "T. S.", "surname": "Prarthana", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "N. D. Gangadhar", "givenName": "N. D.", "surname": "Gangadhar", "__typename": "ArticleAuthorType" } ], "idPrefix": "ccem", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "3-10", "year": "2017", "issn": null, "isbn": "978-1-5386-2450-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2450z011", "articleId": "12OmNvDZEQQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "2450a011", "articleId": "12OmNA0dMMr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/qsic/2009/3828/0/3828a123", "title": "ADAM: Web Anomaly Detection Assistant Based on Feature Matrix", "doi": null, "abstractUrl": "/proceedings-article/qsic/2009/3828a123/12OmNyYDDCz", "parentPublication": { "id": "proceedings/qsic/2009/3828/0", "title": "Quality Software, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscmi/2016/3696/0/3696a094", "title": "Anomaly Detection Guidelines for Data Streams in Big Data", "doi": null, "abstractUrl": "/proceedings-article/iscmi/2016/3696a094/12OmNzxgHsi", "parentPublication": { "id": "proceedings/iscmi/2016/3696/0", "title": "2016 3rd International Conference on Soft Computing & Machine Intelligence (ISCMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005687", "title": "Visual Anomaly Detection in Event Sequence Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005687/1hJs7AGCWuA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069140", "title": "Anomaly Detection on Big Data in Financial Markets", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069140/1j9xXiZ8kla", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/03/09080109", "title": "Urban Anomaly Analytics: Description, Detection, and Prediction", "doi": null, "abstractUrl": "/journal/bd/2022/03/09080109/1jozXyy1Rxm", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b196", "title": "Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b196/1r54AAonPsA", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377757", "title": "Anomaly Detection in Edge Nodes using Sparsity Profile", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377757/1s64azrgPZu", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378327", "title": "MBead: Semi-supervised Multilabel Behaviour Anomaly Detection on Multivariate Temporal Sensory Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378327/1s657lrUJEc", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600b448", "title": "Semi-Supervised Log-Based Anomaly Detection via Probabilistic Label Estimation", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600b448/1sEXpv5Ynug", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccns/2021/2711/0/271100a098", "title": "Anomaly Detection with Partially Observed Anomaly Types", "doi": null, "abstractUrl": "/proceedings-article/ccns/2021/271100a098/1xIOHzCf4Uo", "parentPublication": { "id": "proceedings/ccns/2021/2711/0", "title": "2021 2nd International Conference on Computer Communication and Network Security (CCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBRbknG", "title": "2007 7th International Conference on Intelligent Systems Design and Applications", "acronym": "isda", "groupId": "1001454", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNzcPAD4", "doi": "10.1109/ISDA.2007.51", "title": "Construction and Analysis of Evolving Data Summaries: An Application on Web Usage Data", "normalizedTitle": "Construction and Analysis of Evolving Data Summaries: An Application on Web Usage Data", "abstract": "Taking the temporal dimension into account during the analysis of Web usage data has become a necessity since the way a site is visited may well evolve due to modifications in the structure and content of the site, or even due to changes in the behavior of certain user groups. Consequently, the models associated with these behaviors must be continuously updated. One solution to this problem is to update these models using summaries obtained by means of an evolutionary approach based on clustering methods. To do this, we carry out various clustering strategies that are applied on time sub-periods. We compare the results obtained using this method with those reached by traditional global analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Taking the temporal dimension into account during the analysis of Web usage data has become a necessity since the way a site is visited may well evolve due to modifications in the structure and content of the site, or even due to changes in the behavior of certain user groups. Consequently, the models associated with these behaviors must be continuously updated. One solution to this problem is to update these models using summaries obtained by means of an evolutionary approach based on clustering methods. To do this, we carry out various clustering strategies that are applied on time sub-periods. We compare the results obtained using this method with those reached by traditional global analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Taking the temporal dimension into account during the analysis of Web usage data has become a necessity since the way a site is visited may well evolve due to modifications in the structure and content of the site, or even due to changes in the behavior of certain user groups. Consequently, the models associated with these behaviors must be continuously updated. One solution to this problem is to update these models using summaries obtained by means of an evolutionary approach based on clustering methods. To do this, we carry out various clustering strategies that are applied on time sub-periods. We compare the results obtained using this method with those reached by traditional global analysis.", "fno": "29760377", "keywords": [ "Data Analysis", "Evolutionary Computation", "Internet", "Pattern Clustering", "Data Summaries Construction", "Data Summaries Analysis", "Evolving Data Summaries", "Web Usage Data", "Temporal Dimension", "Evolutionary Approach", "Clustering Method", "Global Analysis", "Data Analysis", "Data Mining", "Iterative Algorithms", "Clustering Algorithms", "Partitioning Algorithms", "Navigation", "Intelligent Systems", "System Analysis And Design", "Clustering Methods", "Statistical Analysis" ], "authors": [ { "affiliation": "INRIA-Rocquencourt, Le Chesnay", "fullName": "Alzennyr da Silva", "givenName": "Alzennyr", "surname": "da Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "INRIA-Rocquencourt, Le Chesnay", "fullName": "Yves Lechevallier", "givenName": "Yves", "surname": "Lechevallier", "__typename": "ArticleAuthorType" }, { "affiliation": "INRIA-Rocquencourt, Le Chesnay", "fullName": "Fabrice Rossi", "givenName": "Fabrice", "surname": "Rossi", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro de Informatica - CIn / UFPEAv. Prof. Luiz Freire, s/n, CDU50740-540 Recife, Brazil", "fullName": "Francisco de Carvalho", "givenName": "Francisco de", "surname": "Carvalho", "__typename": "ArticleAuthorType" } ], "idPrefix": "isda", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "377-380", "year": "2007", "issn": "2164-7143", "isbn": "0-7695-2976-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29760303", "articleId": "12OmNAnMuyQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "29760309", "articleId": "12OmNyen1rY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/apsec/2014/7425/1/07091324", "title": "Learning Summaries of Recursive Functions", "doi": null, "abstractUrl": "/proceedings-article/apsec/2014/07091324/12OmNAT0mOs", "parentPublication": { "id": "proceedings/apsec/2014/7425/1", "title": "2014 21st Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2006/0366/0/04036756", "title": "Generating Expressive Summaries for Speech and Musical Audio using Self-Similarity Clues", "doi": null, "abstractUrl": "/proceedings-article/icme/2006/04036756/12OmNCbCrUo", "parentPublication": { "id": "proceedings/icme/2006/0366/0", "title": "2006 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837975", "title": "Mining Summaries for Knowledge Graph Search", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837975/12OmNCdBDLO", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113128", "title": "Comparing Twitter Summarization Algorithms for Multiple Post Summaries", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113128/12OmNrNh0Re", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836645", "title": "Scalable Online-Offline Stream Clustering in Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836645/12OmNwnYG0N", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2000/0909/0/09090352", "title": "Support based measures applied to ice hockey scoring summaries", "doi": null, "abstractUrl": "/proceedings-article/ictai/2000/09090352/12OmNzlUKKE", "parentPublication": { "id": "proceedings/ictai/2000/0909/0", "title": "Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a470", "title": "Construction of Clinical Pathway Generation from Nursing Records and Discharge Summaries", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a470/18jXJwoJa8g", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifip-networking/2018/08/0/08696427", "title": "NEST: Efficient Transport of Data Summaries over Named Data Networks", "doi": null, "abstractUrl": "/proceedings-article/ifip-networking/2018/08696427/19wB7CsFy6c", "parentPublication": { "id": "proceedings/ifip-networking/2018/08/0", "title": "2018 IFIP Networking Conference (IFIP Networking) and Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a333", "title": "Clinical Pathway Generation from Order Histories and Discharge Summaries", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a333/1gAwXtOLtrW", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09211768", "title": "Joint Representation Learning and Clustering: A Framework for Grouping Partial Multiview Data", "doi": null, "abstractUrl": "/journal/tk/2022/08/09211768/1nB9RT1mLNC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1aDSOMTGCIw", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1aDSXAHcalO", "doi": "10.1109/ICDE.2019.00156", "title": "Modeling Multidimensional User Preferences for Collaborative Filtering", "normalizedTitle": "Modeling Multidimensional User Preferences for Collaborative Filtering", "abstract": "A popular idea in collaborative filtering is to map users and items to latent vectors in the same Euclidean space and make recommendations based on their inner products. The idea of user/item clustering has also been exploited. However, the possibility of obtaining latent user and item feature vectors from user/item clusters has not been investigated. In this paper, we propose such a method for implicit feedback data. We cluster users along multiple latent dimensions, with each latent dimension being defined by a distinct subset of items. User clustering along a latent dimension results in two soft groups of users: those who have a tendency to consume the corresponding items and those who do not. The first group is called a taste group. As there are multiple latent dimensions, we get multiple taste groups. We map users and items to latent feature vectors based on the taste groups such that the vector for a user tells us what tastes she possesses, and the vector for an item tells us how popular it is for users with various tastes. We call the method Multidimensional User Clustering for Collaborative Filter (MUC-CF). In comparison with other methods, MUC-CF leads to more meaningful latent factors and hence its recommendations are easier to explain. MUC-CF is also scalable and in empirical evaluations, it outperforms state-of-the-art baselines.", "abstracts": [ { "abstractType": "Regular", "content": "A popular idea in collaborative filtering is to map users and items to latent vectors in the same Euclidean space and make recommendations based on their inner products. The idea of user/item clustering has also been exploited. However, the possibility of obtaining latent user and item feature vectors from user/item clusters has not been investigated. In this paper, we propose such a method for implicit feedback data. We cluster users along multiple latent dimensions, with each latent dimension being defined by a distinct subset of items. User clustering along a latent dimension results in two soft groups of users: those who have a tendency to consume the corresponding items and those who do not. The first group is called a taste group. As there are multiple latent dimensions, we get multiple taste groups. We map users and items to latent feature vectors based on the taste groups such that the vector for a user tells us what tastes she possesses, and the vector for an item tells us how popular it is for users with various tastes. We call the method Multidimensional User Clustering for Collaborative Filter (MUC-CF). In comparison with other methods, MUC-CF leads to more meaningful latent factors and hence its recommendations are easier to explain. MUC-CF is also scalable and in empirical evaluations, it outperforms state-of-the-art baselines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A popular idea in collaborative filtering is to map users and items to latent vectors in the same Euclidean space and make recommendations based on their inner products. The idea of user/item clustering has also been exploited. However, the possibility of obtaining latent user and item feature vectors from user/item clusters has not been investigated. In this paper, we propose such a method for implicit feedback data. We cluster users along multiple latent dimensions, with each latent dimension being defined by a distinct subset of items. User clustering along a latent dimension results in two soft groups of users: those who have a tendency to consume the corresponding items and those who do not. The first group is called a taste group. As there are multiple latent dimensions, we get multiple taste groups. We map users and items to latent feature vectors based on the taste groups such that the vector for a user tells us what tastes she possesses, and the vector for an item tells us how popular it is for users with various tastes. We call the method Multidimensional User Clustering for Collaborative Filter (MUC-CF). In comparison with other methods, MUC-CF leads to more meaningful latent factors and hence its recommendations are easier to explain. MUC-CF is also scalable and in empirical evaluations, it outperforms state-of-the-art baselines.", "fno": "747400b618", "keywords": [ "Collaborative Filtering", "Data Mining", "Pattern Clustering", "Recommender Systems", "Collaborative Filtering", "Item Feature Vectors", "Multiple Latent Dimensions", "Multiple Taste Groups", "Latent Feature Vectors", "Item Clustering", "Multidimensional User Preferences", "Multidimensional User Clustering", "Motion Pictures", "Prediction Algorithms", "Clustering Algorithms", "Collaboration", "Filtering", "Data Models", "Computer Science", "Multidimensional Clustering Recommender Systems Collaborative Filtering Implicit Feedback" ], "authors": [ { "affiliation": "The Hong Kong University of Science and Technology", "fullName": "Farhan Khawar", "givenName": "Farhan", "surname": "Khawar", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology", "fullName": "Nevin L. Zhang", "givenName": "Nevin L.", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "1618-1621", "year": "2019", "issn": null, "isbn": "978-1-5386-7474-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "747400b614", "articleId": "1aDSUYg6bmM", "__typename": "AdjacentArticleType" }, "next": { "fno": "747400b622", "articleId": "1aDSYfm5KwM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2014/4143/1/4143a340", "title": "Improving Collaborative Filtering Based Recommenders Using Topic Modelling", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143a340/12OmNBUAvYr", "parentPublication": { "id": "wi-iat/2014/4143/1", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2009/4830/0/05255130", "title": "A Time-context-Based Collaborative Filtering Algorithm", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255130/12OmNBl6EHl", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2014/6572/0/6572a379", "title": "SBMF: Similarity-Based Matrix Factorization for Collaborative Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a379/12OmNrkjVib", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2012/4750/0/4750a080", "title": "A Collaborative Filtering Algorithm Based on User Activity Level", "doi": null, "abstractUrl": "/proceedings-article/bife/2012/4750a080/12OmNylbotB", "parentPublication": { "id": "proceedings/bife/2012/4750/0", "title": "2012 Fifth International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsacw/2012/4758/0/4758a284", "title": "Performance Comparison of Combined Collaborative Filtering Algorithms for Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2012/4758a284/12OmNzvhvBd", "parentPublication": { "id": "proceedings/compsacw/2012/4758/0", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/09/07468552", "title": "Improving Collaborative Recommendation via User-Item Subgroups", "doi": null, "abstractUrl": "/journal/tk/2016/09/07468552/13rRUwghd9v", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/04/07305793", "title": "Domain-Sensitive Recommendation with User-Item Subgroup Analysis", "doi": null, "abstractUrl": "/journal/tk/2016/04/07305793/13rRUxBa56D", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a144", "title": "Collaborative Filtering Hybrid Recommendation Algorithm based on Optimal Weight", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a144/1FUVQjyAJK8", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2019/1651/0/08935705", "title": "Maximal Information Based Similarity Measure for Collaborative Filtering", "doi": null, "abstractUrl": "/proceedings-article/snpd/2019/08935705/1fThfDLiDrq", "parentPublication": { "id": "proceedings/snpd/2019/1651/0", "title": "2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412376", "title": "Probabilistic Latent Factor Model for Collaborative Filtering with Bayesian Inference", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412376/1tmiyRUp6KI", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gjRFGp9Sus", "title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "acronym": "mlbdbi", "groupId": "1834885", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gjRHE1HUSk", "doi": "10.1109/MLBDBI48998.2019.00050", "title": "Multi-Dimensional Visualization Analysis of China's Big Data Research from 2012 to 2019", "normalizedTitle": "Multi-Dimensional Visualization Analysis of China's Big Data Research from 2012 to 2019", "abstract": "Big data is a research hotspot in various fields currently. This paper obtains research literature on big data from 2012 to 2019 based on the CNKI database. It uses Citespace and other software to study topics, grants-in-aid, research authors, subject distribution, journal sources, keyword clustering and other dimensions to draw big data research maps, visually analyze big data literature, and form 7 big data research topics such as \"#0 Big data\".", "abstracts": [ { "abstractType": "Regular", "content": "Big data is a research hotspot in various fields currently. This paper obtains research literature on big data from 2012 to 2019 based on the CNKI database. It uses Citespace and other software to study topics, grants-in-aid, research authors, subject distribution, journal sources, keyword clustering and other dimensions to draw big data research maps, visually analyze big data literature, and form 7 big data research topics such as \"#0 Big data\".", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Big data is a research hotspot in various fields currently. This paper obtains research literature on big data from 2012 to 2019 based on the CNKI database. It uses Citespace and other software to study topics, grants-in-aid, research authors, subject distribution, journal sources, keyword clustering and other dimensions to draw big data research maps, visually analyze big data literature, and form 7 big data research topics such as \"#0 Big data\".", "fno": "509400a225", "keywords": [ "Big Data", "Data Analysis", "Data Visualisation", "Pattern Clustering", "Big Data", "Multidimensional Visualization Analysis", "CNKI Database", "Citespace", "Journal Sources", "Keyword Clustering", "Big Data", "Software", "Data Mining", "Data Visualization", "Libraries", "Education", "Big Data", "Visualization", "Cluster" ], "authors": [ { "affiliation": "Foshan Polytechnic", "fullName": "Wei Zhang", "givenName": "Wei", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Foshan Polytechnic", "fullName": "Liling Li", "givenName": "Liling", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "mlbdbi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "225-228", "year": "2019", "issn": null, "isbn": "978-1-7281-5094-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "509400a220", "articleId": "1gjRHR8nuh2", "__typename": "AdjacentArticleType" }, "next": { "fno": "509400a229", "articleId": "1gjRFWvt6Xm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigdata-congress/2015/7278/0/07207228", "title": "Meta Data: Big Data Research Evolving across Disciplines, Players, and Topics", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207228/12OmNxwENJ8", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2017/0629/0/0629a262", "title": "Exploring Deep Integration of Information Technology and China's Higher Education in the Era of Big Data", "doi": null, "abstractUrl": "/proceedings-article/eitt/2017/0629a262/12OmNylboxr", "parentPublication": { "id": "proceedings/eitt/2017/0629/0", "title": "2017 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a419", "title": "Research on the construction of public sports service intelligence platform based on big data analysis", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a419/1CJgnhWTt4c", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2022/3197/0/319700a187", "title": "Visualization Research of Big Data in Higher Education Based on the Web of Science", "doi": null, "abstractUrl": "/proceedings-article/cecit/2022/319700a187/1M66GnoNaOA", "parentPublication": { "id": "proceedings/cecit/2022/3197/0", "title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a570", "title": "The Application of Big Data in Cyberspace: A Survey", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a570/1cI5TAEK7S0", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdie/2020/5900/0/09150210", "title": "Research Status of Big Data and Education Informatization in China &#x2014; Study Based on Biliometric and Content Analysis (2010&#x2013;2019)", "doi": null, "abstractUrl": "/proceedings-article/icbdie/2020/09150210/1lPGLzHGeJy", "parentPublication": { "id": "proceedings/icbdie/2020/5900/0", "title": "2020 International Conference on Big Data and Informatization Education (ICBDIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2021/01/09372350", "title": "Guest Editorial: Scholarly Big Data", "doi": null, "abstractUrl": "/journal/ec/2021/01/09372350/1rNPLRE82By", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a207", "title": "Current Situation and Countermeasure Analysis of Big Data Network Public Opinion Research in China and Abroad Based on Bibliometrics : &#x2014;Taking the study of Internet public opinion in universities as an example", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a207/1tROzbIm5uU", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2020/2261/0/226100a117", "title": "The Core Competencies of Chinese College Students Based on Big Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/icise/2020/226100a117/1tnYedEfDXO", "parentPublication": { "id": "proceedings/icise/2020/2261/0", "title": "2020 International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdie/2021/3870/0/387000a465", "title": "Publication volume of major databases related to ideological and political education: using big data and Internet technologies", "doi": null, "abstractUrl": "/proceedings-article/icbdie/2021/387000a465/1uCidZNE4TK", "parentPublication": { "id": "proceedings/icbdie/2021/3870/0", "title": "2021 2nd International Conference on Big Data and Informatization Education (ICBDIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwnczS", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNC8uRCK", "doi": "10.1109/INFVIS.1996.559224", "title": "Dual multiresolution HyperSlice for multivariate data visualization", "normalizedTitle": "Dual multiresolution HyperSlice for multivariate data visualization", "abstract": "We present a new multiresolution visualization design which allows a user to control the physical data resolution as well as the logical display resolution of multivariate data. A system prototype is described which uses the HyperSlice representation. The notion of space projection in multivariate data is introduced. This process is coupled with wavelets to form a powerful tool for very large data visualization.", "abstracts": [ { "abstractType": "Regular", "content": "We present a new multiresolution visualization design which allows a user to control the physical data resolution as well as the logical display resolution of multivariate data. A system prototype is described which uses the HyperSlice representation. The notion of space projection in multivariate data is introduced. This process is coupled with wavelets to form a powerful tool for very large data visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a new multiresolution visualization design which allows a user to control the physical data resolution as well as the logical display resolution of multivariate data. A system prototype is described which uses the HyperSlice representation. The notion of space projection in multivariate data is introduced. This process is coupled with wavelets to form a powerful tool for very large data visualization.", "fno": "76680074", "keywords": [ "Data Visualisation Hyper Slice Representation Multivariate Data Visualization Multiresolution Visualization Design Data Resolution Logical Display Resolution System Prototype Space Projection Wavelets Very Large Data Visualization" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., New Hampshire Univ., Durham, NH, USA", "fullName": "Pak Chung Wong", "givenName": "Pak Chung", "surname": "Wong", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., New Hampshire Univ., Durham, NH, USA", "fullName": "A.H. Crabb", "givenName": "A.H.", "surname": "Crabb", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., New Hampshire Univ., Durham, NH, USA", "fullName": "R.D. Bergeron", "givenName": "R.D.", "surname": "Bergeron", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-10-01T00:00:00", "pubType": "proceedings", "pages": "74", "year": "1996", "issn": null, "isbn": "0-8186-7668-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "76680072", "articleId": "12OmNCesr2B", "__typename": "AdjacentArticleType" }, "next": { "fno": "76680077", "articleId": "12OmNzYeAPb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1995/7187/0/71870271", "title": "High Dimensional Brushing for Interactive Exploration of Multivariate Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870271/12OmNBdJ5iK", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1997/8262/0/82620111", "title": "Multivariate visualization using metric scaling", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1997/82620111/12OmNqOwQJt", "parentPublication": { "id": "proceedings/ieee-vis/1997/8262/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660022", "title": "Query-Driven Visualization of Large Data Sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660022/12OmNvAAtDg", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dagstuhl/1997/0503/0/05030314", "title": "Perceptual Benchmarking for Multivariate Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/dagstuhl/1997/05030314/12OmNwJPMVt", "parentPublication": { "id": "proceedings/dagstuhl/1997/0503/0", "title": "Dagstuhl '97 - Scientific Visualization Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2012/4670/0/4670a737", "title": "Enhancing Fault Localization via Multivariate Visualization", "doi": null, "abstractUrl": "/proceedings-article/icst/2012/4670a737/12OmNxd4to6", "parentPublication": { "id": "proceedings/icst/2012/4670/0", "title": "2012 IEEE Fifth International Conference on Software Testing, Verification and Validation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061053", "title": "Visualization of Diversity in Large Multivariate Data Sets", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061053/13rRUwd9CG0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/09/06171180", "title": "Scalable Multivariate Volume Visualization and Analysis Based on Dimension Projection and Parallel Coordinates", "doi": null, "abstractUrl": "/journal/tg/2012/09/06171180/13rRUwwJWFL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122114", "title": "Evaluation of Multivariate Visualization on a Multivariate Task", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122114/13rRUxBa55Z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122310", "title": "Flexible Linked Axes for Multivariate Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122310/13rRUxD9h54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061459", "title": "Brushing of Attribute Clouds for the Visualization of Multivariate Data", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061459/13rRUxly8Xz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzvQI1I", "title": "Parallel Architectures, Algorithms, and Networks, International Symposium on", "acronym": "ispan", "groupId": "1000536", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGRGhZ", "doi": "10.1109/I-SPAN.2008.39", "title": "Three-Dimensional Layout of On-Chip Tree-Based Networks", "normalizedTitle": "Three-Dimensional Layout of On-Chip Tree-Based Networks", "abstract": "Three-dimensional Network-on-Chip (3-D NoC) is an emerging research area exploring the network architecture of 3-D ICs that stack several smaller wafers or dice for reducing wire length and wire delay. Various network topologies such as meshes, tori, and trees have been used for NoCs. In particular, much attention has been focused on tree-based topologies, such as Fat Trees and Fat H-Tree, because of their relatively short hop-count that enables lower latency communication compared to meshes or tori. However, since on-chip tree-based networks in their 2-D layouts have long wire links around the root, they generate serious wire delay, posing severe problems to modern VLSI design. In this paper, we propose a 3-D layout scheme of trees including Fat Trees and Fat H-Tree for 3-D ICs in order to resolve the trees' intrinsic disadvantage. The 3-D layouts are compared with the original 2-D layouts in terms of network logic area, wire length, wire delay, number of repeaters inserted, and energy consumption. Evaluation results show that 1) total wire length is reduced by 25.0% to 50.0%; 2) wire delay is improved and repeater buffers that consume considerable energy can be removed; 3) flit transmission energy is reduced by up to 47.0%; 4) area overhead is at most 7.8%, which compares favorably to those for 3-D mesh and torus.", "abstracts": [ { "abstractType": "Regular", "content": "Three-dimensional Network-on-Chip (3-D NoC) is an emerging research area exploring the network architecture of 3-D ICs that stack several smaller wafers or dice for reducing wire length and wire delay. Various network topologies such as meshes, tori, and trees have been used for NoCs. In particular, much attention has been focused on tree-based topologies, such as Fat Trees and Fat H-Tree, because of their relatively short hop-count that enables lower latency communication compared to meshes or tori. However, since on-chip tree-based networks in their 2-D layouts have long wire links around the root, they generate serious wire delay, posing severe problems to modern VLSI design. In this paper, we propose a 3-D layout scheme of trees including Fat Trees and Fat H-Tree for 3-D ICs in order to resolve the trees' intrinsic disadvantage. The 3-D layouts are compared with the original 2-D layouts in terms of network logic area, wire length, wire delay, number of repeaters inserted, and energy consumption. Evaluation results show that 1) total wire length is reduced by 25.0% to 50.0%; 2) wire delay is improved and repeater buffers that consume considerable energy can be removed; 3) flit transmission energy is reduced by up to 47.0%; 4) area overhead is at most 7.8%, which compares favorably to those for 3-D mesh and torus.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Three-dimensional Network-on-Chip (3-D NoC) is an emerging research area exploring the network architecture of 3-D ICs that stack several smaller wafers or dice for reducing wire length and wire delay. Various network topologies such as meshes, tori, and trees have been used for NoCs. In particular, much attention has been focused on tree-based topologies, such as Fat Trees and Fat H-Tree, because of their relatively short hop-count that enables lower latency communication compared to meshes or tori. However, since on-chip tree-based networks in their 2-D layouts have long wire links around the root, they generate serious wire delay, posing severe problems to modern VLSI design. In this paper, we propose a 3-D layout scheme of trees including Fat Trees and Fat H-Tree for 3-D ICs in order to resolve the trees' intrinsic disadvantage. The 3-D layouts are compared with the original 2-D layouts in terms of network logic area, wire length, wire delay, number of repeaters inserted, and energy consumption. Evaluation results show that 1) total wire length is reduced by 25.0% to 50.0%; 2) wire delay is improved and repeater buffers that consume considerable energy can be removed; 3) flit transmission energy is reduced by up to 47.0%; 4) area overhead is at most 7.8%, which compares favorably to those for 3-D mesh and torus.", "fno": "3125a281", "keywords": [ "Network On Chip", "Fat Tree", "Fat H Tree", "3 D IC" ], "authors": [ { "affiliation": null, "fullName": "Hiroki Matsutani", "givenName": "Hiroki", "surname": "Matsutani", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michihiro Koibuchi", "givenName": "Michihiro", "surname": "Koibuchi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. Frank Hsu", "givenName": "D. Frank", "surname": "Hsu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hideharu Amano", "givenName": "Hideharu", "surname": "Amano", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispan", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-05-01T00:00:00", "pubType": "proceedings", "pages": "281-288", "year": "2008", "issn": null, "isbn": "978-0-7695-3125-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3125a275", "articleId": "12OmNzUgdgS", "__typename": "AdjacentArticleType" }, "next": { "fno": "3125a289", "articleId": "12OmNqzu6TY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2007/0909/0/04227999", "title": "Performance, Cost, and Energy Evaluation of Fat H-Tree: A Cost-Efficient Tree-Based On-Chip Network", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2007/04227999/12OmNAOKnXh", "parentPublication": { "id": "proceedings/ipdps/2007/0909/0", "title": "2007 IEEE International Parallel and Distributed Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2010/4254/0/4254a403", "title": "Three Diamentional Object Used for Data Security", "doi": null, "abstractUrl": "/proceedings-article/cicn/2010/4254a403/12OmNyFU7b8", "parentPublication": { "id": "proceedings/cicn/2010/4254/0", "title": "Computational Intelligence and Communication Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2012/4655/0/4655a642", "title": "Three-Dimensional Location Measurement System Constructed by Dual Cameras", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a642/12OmNySXF2J", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvlsid/2011/4447/0/4447a357", "title": "Design and Evaluation of Mesh-of-Tree Based Network-on-Chip for Two- and Three-Dimensional Integrated Circuits", "doi": null, "abstractUrl": "/proceedings-article/isvlsid/2011/4447a357/12OmNyqRnrf", "parentPublication": { "id": "proceedings/isvlsid/2011/4447/0", "title": "2011 IEEE Computer Society Annual Symposium on VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2011/4531/0/4531a163", "title": "Simulation of Infiniband Networks and Effciency Calculation on Non-blocking Fully Populated Fat-Tree Topology", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2011/4531a163/12OmNzRZpYA", "parentPublication": { "id": "proceedings/3pgcic/2011/4531/0", "title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78220915", "title": "Using Three-Dimensional Features to Improve Terrain Classification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78220915/12OmNzt0Itv", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrais/1993/1363/0/00380780", "title": "ASPECT: audio spatial environment for communication As a three dimensional auditory interaction tool", "doi": null, "abstractUrl": "/proceedings-article/vrais/1993/00380780/12OmNzuIjsl", "parentPublication": { "id": "proceedings/vrais/1993/1363/0", "title": "Virtual Reality Annual International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2000/06/00902261", "title": "System-level performance evaluation of three-dimensional integrated circuits", "doi": null, "abstractUrl": "/journal/si/2000/06/00902261/13rRUIIVli8", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/dt/1998/01/d1016", "title": "Rothko: A Three-Dimensional FPGA", "doi": null, "abstractUrl": "/magazine/dt/1998/01/d1016/13rRUIJcWhm", "parentPublication": { "id": "mags/dt", "title": "IEEE Design & Test of Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2009/08/ttd2009081126", "title": "Fat H-Tree: A Cost-Efficient Tree-Based On-Chip Network", "doi": null, "abstractUrl": "/journal/td/2009/08/ttd2009081126/13rRUwbs1Sa", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZX", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNs5rl6Q", "doi": "10.1109/BIBM.2013.6732549", "title": "IPEDX: An exact algorithm for pedigree reconstruction using genotype data", "normalizedTitle": "IPEDX: An exact algorithm for pedigree reconstruction using genotype data", "abstract": "The problem of inference of family trees, or pedigree reconstruction, for a group of individuals has attracted lots of attentions recently. Various methods have been proposed to automate the process of pedigree reconstruction given the genotypes or haplotypes of a set of individuals. The state-of-the-art method IPED is able to reconstruct large pedigrees with reasonable accuracy. However, the algorithm is shown to be an approximate algorithm. In this work, we proposed an exact method IPEDX, where two dynamic programming algorithms are developed to compute inheritance paths between ancestors and descendants as well as exact paths between extant individuals, respectively. Then IPEDX reconstructs the pedigrees utilizing the outputs of the two algorithms. Experiments show that as an exact algorithm, IPEDX generally achieves better results than IPED does. It does require longer computation time but is still very efficient for pedigrees which have a large number of generations.", "abstracts": [ { "abstractType": "Regular", "content": "The problem of inference of family trees, or pedigree reconstruction, for a group of individuals has attracted lots of attentions recently. Various methods have been proposed to automate the process of pedigree reconstruction given the genotypes or haplotypes of a set of individuals. The state-of-the-art method IPED is able to reconstruct large pedigrees with reasonable accuracy. However, the algorithm is shown to be an approximate algorithm. In this work, we proposed an exact method IPEDX, where two dynamic programming algorithms are developed to compute inheritance paths between ancestors and descendants as well as exact paths between extant individuals, respectively. Then IPEDX reconstructs the pedigrees utilizing the outputs of the two algorithms. Experiments show that as an exact algorithm, IPEDX generally achieves better results than IPED does. It does require longer computation time but is still very efficient for pedigrees which have a large number of generations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The problem of inference of family trees, or pedigree reconstruction, for a group of individuals has attracted lots of attentions recently. Various methods have been proposed to automate the process of pedigree reconstruction given the genotypes or haplotypes of a set of individuals. The state-of-the-art method IPED is able to reconstruct large pedigrees with reasonable accuracy. However, the algorithm is shown to be an approximate algorithm. In this work, we proposed an exact method IPEDX, where two dynamic programming algorithms are developed to compute inheritance paths between ancestors and descendants as well as exact paths between extant individuals, respectively. Then IPEDX reconstructs the pedigrees utilizing the outputs of the two algorithms. Experiments show that as an exact algorithm, IPEDX generally achieves better results than IPED does. It does require longer computation time but is still very efficient for pedigrees which have a large number of generations.", "fno": "06732549", "keywords": [ "Approximation Algorithms", "Accuracy", "Heuristic Algorithms", "Genetics", "Error Analysis", "Approximation Methods", "Bioinformatics" ], "authors": [ { "affiliation": "IBM T.J. Watson Research, Yorktown Heights, NY", "fullName": "Dan He", "givenName": "Dan", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "UCLA Computer Science Dept., Los Angeles, CA 90095", "fullName": "Eleazar Eskin", "givenName": "Eleazar", "surname": "Eskin", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "517-520", "year": "2013", "issn": null, "isbn": "978-1-4799-1309-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06732548", "articleId": "12OmNAsBFK9", "__typename": "AdjacentArticleType" }, "next": { "fno": "06732550", "articleId": "12OmNxETaoJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/biovis/2011/0003/0/119126paterson", "title": "Evaluating the VIPER pedigree visualisation: Detecting inheritance inconsistencies in genotyped pedigrees", "doi": null, "abstractUrl": "/proceedings-article/biovis/2011/119126paterson/12OmNwFRp7K", "parentPublication": { "id": "proceedings/biovis/2011/0003/0", "title": "2011 IEEE Symposium on Biological Data Visualization (BioVis).", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2012/1320/0/06182643", "title": "A fast and practical approach to genotype phasing and imputation on a pedigree with erroneous and incomplete information", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2012/06182643/12OmNyRPgsU", "parentPublication": { "id": "proceedings/iccabs/2012/1320/0", "title": "2012 IEEE 2nd International Conference on Computational Advances in Bio and medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/263", "title": "Poster: High-performance computing for mapping disease-related genes", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/263/12OmNz5JBUF", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/04/06175009", "title": "Efficient Genotype Elimination via Adaptive Allele Consolidation", "doi": null, "abstractUrl": "/journal/tb/2012/04/06175009/13rRUIIVliV", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07447733", "title": "Algorithms for Pedigree Comparison", "doi": null, "abstractUrl": "/journal/tb/2018/02/07447733/13rRUILtJpC", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2006/03/n0252", "title": "Finding Consistent Gene Transmission Patterns on Large and Complex Pedigrees", "doi": null, "abstractUrl": "/journal/tb/2006/03/n0252/13rRUwI5TPr", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/01/ttb2012010012", "title": "An Efficient Algorithm for Haplotype Inference on Pedigrees with Recombinations and Mutations", "doi": null, "abstractUrl": "/journal/tb/2012/01/ttb2012010012/13rRUwbs1QZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/05/07888513", "title": "IPED2: Inheritance Path Based Pedigree Reconstruction Algorithm for Complicated Pedigrees", "doi": null, "abstractUrl": "/journal/tb/2017/05/07888513/13rRUx0xPtY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/02/ttb2012020499", "title": "Mutation Region Detection for Closely Related Individuals without a Known Pedigree", "doi": null, "abstractUrl": "/journal/tb/2012/02/ttb2012020499/13rRUxASuEt", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/06/ttb2012061582", "title": "A fast and practical approach to genotype phasing and imputation on a pedigree with erroneous and incomplete information", "doi": null, "abstractUrl": "/journal/tb/2012/06/ttb2012061582/13rRUxlgya7", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxH9X7w", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNwHz0a5", "doi": "10.1109/INFOVIS.2005.22", "title": "Interactive Visualization of Genealogical Graphs", "normalizedTitle": "Interactive Visualization of Genealogical Graphs", "abstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual-tree, a subgraph formed by the union of two trees. Dual-trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual-tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag.", "abstracts": [ { "abstractType": "Regular", "content": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual-tree, a subgraph formed by the union of two trees. Dual-trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual-tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual-tree, a subgraph formed by the union of two trees. Dual-trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual-tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag.", "fno": "27900003", "keywords": [ "Genealogy", "Genealogies", "Family Trees", "Kinship", "Multitrees", "Graph Drawing", "Graph Theory", "Graph Browsing And Navigation" ], "authors": [ { "affiliation": "University of Toronto", "fullName": "Michael J. McGuffin", "givenName": "Michael J.", "surname": "McGuffin", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Toronto", "fullName": "Ravin Balakrishnan", "givenName": "Ravin", "surname": "Balakrishnan", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-10-01T00:00:00", "pubType": "proceedings", "pages": "3", "year": "2005", "issn": "1522-404x", "isbn": "0-7803-9464-x", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01532139", "articleId": "12OmNy6HQQZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "01532140", "articleId": "12OmNyjccAB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2001/1342/0/13420059", "title": "Visualization of State Transition Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2001/13420059/12OmNCd2rWp", "parentPublication": { "id": "proceedings/ieee-infovis/2001/1342/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790199", "title": "Interactive Visualization of Small World Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790199/12OmNCgrDcT", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532124", "title": "Interactive visualization of genealogical graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532124/12OmNwNeYCA", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880258", "title": "Visualizing Weighted Edges in Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880258/12OmNwNwzIW", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1994/5090/2/00323270", "title": "Efficient parallel algorithms on chordal graphs with a sparse tree representation", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323270/12OmNx3Zjj2", "parentPublication": { "id": "proceedings/hicss/1994/5090/2", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126219", "title": "Directed graphs and rectangular layouts", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126219/12OmNy3RRw8", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532124", "title": "Interactive visualization of genealogical graphs", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532124/12OmNySG3Nn", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2005/02/k0190", "title": "Mining Closed and Maximal Frequent Subtrees from Databases of Labeled Rooted Trees", "doi": null, "abstractUrl": "/journal/tk/2005/02/k0190/13rRUILc8fo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/04/v0319", "title": "Interactive Visualization of State Transition Systems", "doi": null, "abstractUrl": "/journal/tg/2002/04/v0319/13rRUwbaqUF", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061082", "title": "Visualization of Graph Products", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061082/13rRUx0xPmX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxH9X7w", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNwNeYCA", "doi": "10.1109/INFVIS.2005.1532124", "title": "Interactive visualization of genealogical graphs", "normalizedTitle": "Interactive visualization of genealogical graphs", "abstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "abstracts": [ { "abstractType": "Regular", "content": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "fno": "01532124", "keywords": [ "Computational Geometry", "Data Visualisation", "Trees Mathematics", "Interactive Visualization", "Genealogical Graph", "Family Tree Visualization", "Graph Theoretic Analysis", "Graph Drawing", "Graphical Representation", "Dual Tree", "Smoothly Animated Transition", "Automatic Camera Framing", "Subtrees Rotation", "Graph Browsing", "Graph Navigation", "Visualization", "Tree Graphs", "Graph Theory", "Computer Science", "Software Prototyping", "Animation", "Cameras", "Mice", "Chromium", "Computer Graphics" ], "authors": [ { "affiliation": null, "fullName": "M.J. McGuffin", "givenName": "M.J.", "surname": "McGuffin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "R. Balakrishnan", "givenName": "R.", "surname": "Balakrishnan", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "16,17,18,19,20,21,22,23", "year": "2005", "issn": "1522-404X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01532123", "articleId": "12OmNwErptK", "__typename": "AdjacentArticleType" }, "next": { "fno": "01532125", "articleId": "12OmNxiKrYZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2004/8779/0/87790199", "title": "Interactive Visualization of Small World Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790199/12OmNCgrDcT", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221745", "title": "TreePi: A Novel Graph Indexing Method", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221745/12OmNvUaNh1", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532131", "title": "Dynamic visualization of graphs with extended labels", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532131/12OmNwDACtv", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900003", "title": "Interactive Visualization of Genealogical Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900003/12OmNwHz0a5", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532131", "title": "Dynamic visualization of graphs with extended labels", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532131/12OmNwtn3ww", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1994/5090/2/00323270", "title": "Efficient parallel algorithms on chordal graphs with a sparse tree representation", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323270/12OmNx3Zjj2", "parentPublication": { "id": "proceedings/hicss/1994/5090/2", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571364", "title": "An Interactive Visualization Framework for Time-Series of Web Graphs in a 3D Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571364/12OmNx6g6mj", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532124", "title": "Interactive visualization of genealogical graphs", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532124/12OmNySG3Nn", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532129", "title": "Elastic hierarchies: combining treemaps and node-link diagrams", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532129/12OmNzYwcax", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d837", "title": "SONGs: Self-Organizing Neural Graphs", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d837/1KxUI598Rz2", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC17hWl", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "acronym": "infvis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNySG3Nn", "doi": "10.1109/INFVIS.2005.1532124", "title": "Interactive visualization of genealogical graphs", "normalizedTitle": "Interactive visualization of genealogical graphs", "abstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "abstracts": [ { "abstractType": "Regular", "content": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The general problem of visualizing \"family trees\", or genealogical graphs, in 2D, is considered. A graph theoretic analysis is given, which identifies why genealogical graphs can be difficult to draw. This motivates some novel graphical representations, including one based on a dual tree, a subgraph formed by the union of two trees. Dual trees can be drawn in various styles, including an indented outline style, and allow users to browse general multitrees in addition to genealogical graphs, by transitioning between different dual tree views. A software prototype for such browsing is described, that supports smoothly animated transitions, automatic camera framing, rotation of subtrees, and a novel interaction technique for expanding or collapsing subtrees to any depth with a single mouse drag", "fno": "01532124", "keywords": [ "Computational Geometry", "Data Visualisation", "Trees Mathematics", "Interactive Visualization", "Genealogical Graph", "Family Tree Visualization", "Graph Theoretic Analysis", "Graph Drawing", "Graphical Representation", "Dual Tree", "Smoothly Animated Transition", "Automatic Camera Framing", "Subtrees Rotation", "Graph Browsing", "Graph Navigation", "Visualization", "Tree Graphs", "Graph Theory", "Computer Science", "Software Prototyping", "Animation", "Cameras", "Mice", "Chromium", "Computer Graphics" ], "authors": [ { "affiliation": null, "fullName": "M.J. McGuffin", "givenName": "M.J.", "surname": "McGuffin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "R. Balakrishnan", "givenName": "R.", "surname": "Balakrishnan", "__typename": "ArticleAuthorType" } ], "idPrefix": "infvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "16,17,18,19,20,21,22,23", "year": "2005", "issn": "1522-404X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01532123", "articleId": "12OmNx6g6cA", "__typename": "AdjacentArticleType" }, "next": { "fno": "01532125", "articleId": "12OmNCwlakc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2004/8779/0/87790199", "title": "Interactive Visualization of Small World Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790199/12OmNCgrDcT", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221745", "title": "TreePi: A Novel Graph Indexing Method", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221745/12OmNvUaNh1", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532131", "title": "Dynamic visualization of graphs with extended labels", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532131/12OmNwDACtv", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900003", "title": "Interactive Visualization of Genealogical Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900003/12OmNwHz0a5", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532124", "title": "Interactive visualization of genealogical graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532124/12OmNwNeYCA", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532131", "title": "Dynamic visualization of graphs with extended labels", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532131/12OmNwtn3ww", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1994/5090/2/00323270", "title": "Efficient parallel algorithms on chordal graphs with a sparse tree representation", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323270/12OmNx3Zjj2", "parentPublication": { "id": "proceedings/hicss/1994/5090/2", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571364", "title": "An Interactive Visualization Framework for Time-Series of Web Graphs in a 3D Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571364/12OmNx6g6mj", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532129", "title": "Elastic hierarchies: combining treemaps and node-link diagrams", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532129/12OmNzYwcax", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d837", "title": "SONGs: Self-Organizing Neural Graphs", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d837/1KxUI598Rz2", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzl3WWZ", "title": "2013 17th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdGnwO", "doi": "10.1109/IV.2013.56", "title": "Extending the H-Tree Layout Pedigree: An Evaluation", "normalizedTitle": "Extending the H-Tree Layout Pedigree: An Evaluation", "abstract": "Visualizing large family structures is becoming increasingly important, as more genealogical data becomes available. A space-filling h-tree layout pedigree has been recently proposed to make better use of the available space than traditional representations. In a previous paper we applauded the technique's usage of available space but remarked that it makes generation identification difficult and does not allow navigating to descendants of represented individuals. A set of extensions was proposed to help overcome these limitations and a preliminary evaluation suggested that those extensions enhance the original technique. This paper presents a more thorough evaluation carried out to assess if and how the proposed extensions improve the original h-tree layout pedigree technique. Results suggest that these extensions improve user performance on some tasks, effectively provide new functionality, and generally enhance user experience.", "abstracts": [ { "abstractType": "Regular", "content": "Visualizing large family structures is becoming increasingly important, as more genealogical data becomes available. A space-filling h-tree layout pedigree has been recently proposed to make better use of the available space than traditional representations. In a previous paper we applauded the technique's usage of available space but remarked that it makes generation identification difficult and does not allow navigating to descendants of represented individuals. A set of extensions was proposed to help overcome these limitations and a preliminary evaluation suggested that those extensions enhance the original technique. This paper presents a more thorough evaluation carried out to assess if and how the proposed extensions improve the original h-tree layout pedigree technique. Results suggest that these extensions improve user performance on some tasks, effectively provide new functionality, and generally enhance user experience.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualizing large family structures is becoming increasingly important, as more genealogical data becomes available. A space-filling h-tree layout pedigree has been recently proposed to make better use of the available space than traditional representations. In a previous paper we applauded the technique's usage of available space but remarked that it makes generation identification difficult and does not allow navigating to descendants of represented individuals. A set of extensions was proposed to help overcome these limitations and a preliminary evaluation suggested that those extensions enhance the original technique. This paper presents a more thorough evaluation carried out to assess if and how the proposed extensions improve the original h-tree layout pedigree technique. Results suggest that these extensions improve user performance on some tasks, effectively provide new functionality, and generally enhance user experience.", "fno": "5049a422", "keywords": [ "Genealogy", "Pedigree Visualization", "H Tree Layout", "Evaluation", "Information Visualization" ], "authors": [ { "affiliation": null, "fullName": "Joao Miguel Santos", "givenName": "Joao Miguel", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Beatriz Sousa Santos", "givenName": "Beatriz Sousa", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paulo Dias", "givenName": "Paulo", "surname": "Dias", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Samuel Silva", "givenName": "Samuel", "surname": "Silva", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carlos Ferreira", "givenName": "Carlos", "surname": "Ferreira", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "422-427", "year": "2013", "issn": "1550-6037", "isbn": "978-0-7695-5049-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5049a416", "articleId": "12OmNAJVcBN", "__typename": "AdjacentArticleType" }, "next": { "fno": "5049a428", "articleId": "12OmNylKAQ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/glsv/1992/2610/0/00218362", "title": "Quadtree interconnection network layout", "doi": null, "abstractUrl": "/proceedings-article/glsv/1992/00218362/12OmNBOUxt2", "parentPublication": { "id": "proceedings/glsv/1992/2610/0", "title": "Proceedings of the Second Great Lakes Symposium on VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2012/0227/1/06495146", "title": "Extending Linear Relaxation for User Interface Layout", "doi": null, "abstractUrl": "/proceedings-article/ictai/2012/06495146/12OmNBp52E2", "parentPublication": { "id": "proceedings/ictai/2012/0227/1", "title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2003/2001/0/20010014", "title": "Smooth Structural Zooming of h-v Inclusion Tree Layouts", "doi": null, "abstractUrl": "/proceedings-article/cmv/2003/20010014/12OmNvDqsBX", "parentPublication": { "id": "proceedings/cmv/2003/2001/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/glsv/1991/2170/0/00143938", "title": "I/O bound binary tree layout", "doi": null, "abstractUrl": "/proceedings-article/glsv/1991/00143938/12OmNwCsdOH", "parentPublication": { "id": "proceedings/glsv/1991/2170/0", "title": "Proceedings First Great Lakes Symposium on VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a024", "title": "Implementation and Evaluation of an Enhanced H-tree Layout Pedigree Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a024/12OmNxE2mWP", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/glsv/1991/2170/0/00143936", "title": "Area efficient binary tree layout", "doi": null, "abstractUrl": "/proceedings-article/glsv/1991/00143936/12OmNxzMnW8", "parentPublication": { "id": "proceedings/glsv/1991/2170/0", "title": "Proceedings First Great Lakes Symposium on VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/1999/5417/1/00749247", "title": "Mobile Internet telephony: mobile extensions to H.323", "doi": null, "abstractUrl": "/proceedings-article/infcom/1999/00749247/12OmNyOq54y", "parentPublication": { "id": "proceedings/infcom/1999/5417/2", "title": "Proceedings of INFOCOM'99: Conference on Computer Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2009/08/ttd2009081126", "title": "Fat H-Tree: A Cost-Efficient Tree-Based On-Chip Network", "doi": null, "abstractUrl": "/journal/td/2009/08/ttd2009081126/13rRUwbs1Sa", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061063", "title": "PedVis: A Structured, Space-Efficient Technique for Pedigree Visualization", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061063/13rRUy0qnGg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a659", "title": "Immersive Pedigree Graph Visualisations", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a659/1tnY3QRjZJK", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9X06PlzG0", "title": "2021 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9X1JvPYeQ", "doi": "10.1109/ICKG52313.2021.00038", "title": "A Scheme for Kinship Reasoning based on Ontology", "normalizedTitle": "A Scheme for Kinship Reasoning based on Ontology", "abstract": "With the rapid development of artificial intelligence and semantic networks, knowledge graphs have received extensive attention in various application domains. As a domain knowledge graph, a genealogical knowledge graph has significant research value in the family blood, family culture, and medical genetic analysis. However, as the identical relationship often has different names and complex relationships such as divorce, remarriage, and polygamy, the reasoning based on the genealogical knowledge graph is a challenging task. In response to this problem, we propose a scheme for kinship reasoning in the genealogical knowledge graph. First, based on real genealogical revision experiences, a character ontology framework in the genealogical knowledge graph is defined, and basic kinship reasoning rules are designed. Then, given different definitions of kinship in different surnames, the solution of custom reasoning rules is integrated into the reasoning framework. In addition, aiming at complex relationships in family trees, such as multiple generations of ancestors and multiple wives, a series of inference optimization methods are proposed. Finally, we implement this scheme in the Huapu system, and the experimental results conducted on a real genealogical dataset demonstrate the effectiveness and practicality of our proposed scheme.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid development of artificial intelligence and semantic networks, knowledge graphs have received extensive attention in various application domains. As a domain knowledge graph, a genealogical knowledge graph has significant research value in the family blood, family culture, and medical genetic analysis. However, as the identical relationship often has different names and complex relationships such as divorce, remarriage, and polygamy, the reasoning based on the genealogical knowledge graph is a challenging task. In response to this problem, we propose a scheme for kinship reasoning in the genealogical knowledge graph. First, based on real genealogical revision experiences, a character ontology framework in the genealogical knowledge graph is defined, and basic kinship reasoning rules are designed. Then, given different definitions of kinship in different surnames, the solution of custom reasoning rules is integrated into the reasoning framework. In addition, aiming at complex relationships in family trees, such as multiple generations of ancestors and multiple wives, a series of inference optimization methods are proposed. Finally, we implement this scheme in the Huapu system, and the experimental results conducted on a real genealogical dataset demonstrate the effectiveness and practicality of our proposed scheme.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid development of artificial intelligence and semantic networks, knowledge graphs have received extensive attention in various application domains. As a domain knowledge graph, a genealogical knowledge graph has significant research value in the family blood, family culture, and medical genetic analysis. However, as the identical relationship often has different names and complex relationships such as divorce, remarriage, and polygamy, the reasoning based on the genealogical knowledge graph is a challenging task. In response to this problem, we propose a scheme for kinship reasoning in the genealogical knowledge graph. First, based on real genealogical revision experiences, a character ontology framework in the genealogical knowledge graph is defined, and basic kinship reasoning rules are designed. Then, given different definitions of kinship in different surnames, the solution of custom reasoning rules is integrated into the reasoning framework. In addition, aiming at complex relationships in family trees, such as multiple generations of ancestors and multiple wives, a series of inference optimization methods are proposed. Finally, we implement this scheme in the Huapu system, and the experimental results conducted on a real genealogical dataset demonstrate the effectiveness and practicality of our proposed scheme.", "fno": "385800a222", "keywords": [ "Genetics", "Inference Mechanisms", "Ontologies Artificial Intelligence", "Semantic Networks", "Genealogical Knowledge Graph", "Basic Kinship Reasoning Rules", "Domain Knowledge Graph", "Artificial Intelligence", "Semantic Network", "Character Ontology Framework", "Family Trees", "Inference Optimization", "Huapu System", "Knowledge Engineering", "Conferences", "Semantics", "Optimization Methods", "Ontologies", "Genetics", "Cognition", "Genealogy Relation Reasoning", "Jena", "Kinship Ontology Model", "Inference Rule" ], "authors": [ { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data,Ministry of Education", "fullName": "Ru Chen", "givenName": "Ru", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data,Ministry of Education", "fullName": "Guliu Liu", "givenName": "Guliu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Yangzhou University,School of Information Engineering", "fullName": "Yi Zhu", "givenName": "Yi", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Mininglamp Academy of Sciences, Mininglamp Technology", "fullName": "Xindong Wu", "givenName": "Xindong", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "222-229", "year": "2021", "issn": null, "isbn": "978-1-6654-3858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "385800a214", "articleId": "1A9X3XD6Kha", "__typename": "AdjacentArticleType" }, "next": { "fno": "385800a230", "articleId": "1A9X7mXt5ja", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363363", "title": "A Rule-Based Ontology Reasoning System for Context-Aware Building Energy Management", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363363/12OmNyv7lZN", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2018/6916/0/691601a148", "title": "Investigating Plausible Reasoning Over Knowledge Graphs for Semantics-Based Health Data Analytics", "doi": null, "abstractUrl": "/proceedings-article/wetice/2018/691601a148/17D45WaTkdS", "parentPublication": { "id": "proceedings/wetice/2018/6916/0", "title": "2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a206", "title": "A Cross-age Kinship Verification Scheme Using Face Age Transfer Model", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a206/1BYIKw4p488", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a288", "title": "Criminal Investigation with Augmented Ontology and Link Prediction", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a288/1LFKPnjBxLO", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a252", "title": "Ontology Modeling for Probabilistic Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a252/1LFKQd5YMTu", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0/649700a090", "title": "GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2022/649700a090/1LKwpL4AyoE", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0", "title": "2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102823", "title": "Graph-Based Kinship Reasoning Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102823/1kwrbtQ5uEw", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09409650", "title": "Knowledge Graph for China&#x0027;s Genealogy<xref rid=\"fn1\" ref-type=\"fn\"><sup>1</sup></xref><fn id=\"fn1\"><label>1.</label><p>A shorter version of this paper won the Best Paper Award at IEEE ICKG 2020 (the 11th IEEE International Conference on Knowledge Graph, ickg 2020.bigke.org).</p></fn>", "doi": null, "abstractUrl": "/journal/tk/2023/01/09409650/1sXjuqQx3gs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b356", "title": "Explicit Knowledge Incorporation for Visual Reasoning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b356/1yeIZpl7gDm", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscipt/2021/4137/0/413700a587", "title": "Distributed dynamic semantic query and reasoning for graph data", "doi": null, "abstractUrl": "/proceedings-article/iscipt/2021/413700a587/1zzpuMm0E00", "parentPublication": { "id": "proceedings/iscipt/2021/4137/0", "title": "2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwd2X6", "title": "2013 IEEE International Conference on Software Maintenance (ICSM)", "acronym": "icsm", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBhZ4iz", "doi": "10.1109/ICSM.2013.79", "title": "gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis", "normalizedTitle": "gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis", "abstract": "Understanding the evolution of code clones is important for both developers and researchers to understand the maintenance implications of clones and to design robust clone management systems. Generally, a study of clone evolution starts with extracting clone genealogies across multiple versions of a program and classifying them according to their change patterns. Although these tasks are straightforward for exact clones, extracting the history of near-miss clones and classifying their change patterns automatically is challenging due to the potential diverse variety of clone fragments even in the same clone class. In this tool demonstration paper we describe the design and implementation of a near-miss clone genealogy extractor, gCad, that can extract and classify both exact and near-miss clone genealogies. Developers and researchers can compute a wide range of popular metrics regarding clone evolution by simply post processing the gCad results. gCad scales well to large subject systems, works for different granularities of clones, and adapts easily to popular clone detection tools.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding the evolution of code clones is important for both developers and researchers to understand the maintenance implications of clones and to design robust clone management systems. Generally, a study of clone evolution starts with extracting clone genealogies across multiple versions of a program and classifying them according to their change patterns. Although these tasks are straightforward for exact clones, extracting the history of near-miss clones and classifying their change patterns automatically is challenging due to the potential diverse variety of clone fragments even in the same clone class. In this tool demonstration paper we describe the design and implementation of a near-miss clone genealogy extractor, gCad, that can extract and classify both exact and near-miss clone genealogies. Developers and researchers can compute a wide range of popular metrics regarding clone evolution by simply post processing the gCad results. gCad scales well to large subject systems, works for different granularities of clones, and adapts easily to popular clone detection tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding the evolution of code clones is important for both developers and researchers to understand the maintenance implications of clones and to design robust clone management systems. Generally, a study of clone evolution starts with extracting clone genealogies across multiple versions of a program and classifying them according to their change patterns. Although these tasks are straightforward for exact clones, extracting the history of near-miss clones and classifying their change patterns automatically is challenging due to the potential diverse variety of clone fragments even in the same clone class. In this tool demonstration paper we describe the design and implementation of a near-miss clone genealogy extractor, gCad, that can extract and classify both exact and near-miss clone genealogies. Developers and researchers can compute a wide range of popular metrics regarding clone evolution by simply post processing the gCad results. gCad scales well to large subject systems, works for different granularities of clones, and adapts easily to popular clone detection tools.", "fno": "4981a488", "keywords": [ "Cloning", "XML", "Measurement", "Maintenance Engineering", "Detectors", "Educational Institutions", "Clone Evolution", "Type 3 Clones", "Clone Genealogy" ], "authors": [ { "affiliation": "Univ. of Texas at Austin, Austin, TX, USA", "fullName": "Ripon K. Saha", "givenName": "Ripon K.", "surname": "Saha", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Saskatchewan, Saskatoon, SK, Canada", "fullName": "Chanchal K. Roy", "givenName": "Chanchal K.", "surname": "Roy", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Saskatchewan, Saskatoon, SK, Canada", "fullName": "Kevin A. Schneider", "givenName": "Kevin A.", "surname": "Schneider", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "488-491", "year": "2013", "issn": "1063-6773", "isbn": "978-0-7695-4981-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4981a484", "articleId": "12OmNyTfgbW", "__typename": "AdjacentArticleType" }, "next": { "fno": "4981a492", "articleId": "12OmNz6iOmu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsm/2012/2313/0/06405285", "title": "Models are code too: Near-miss clone detection for Simulink models", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405285/12OmNAqU4Wz", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2012/4783/0/4783a074", "title": "Evolution of Near-Miss Clones", "doi": null, "abstractUrl": "/proceedings-article/scam/2012/4783a074/12OmNBPc8sf", "parentPublication": { "id": "proceedings/scam/2012/4783/0", "title": "2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2013/2931/0/06671325", "title": "An approach to clone detection in behavioural models", "doi": null, "abstractUrl": "/proceedings-article/wcre/2013/06671325/12OmNBVrjjI", "parentPublication": { "id": "proceedings/wcre/2013/2931/0", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624022", "title": "An empirical study of the fault-proneness of clone mutation and clone migration", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624022/12OmNqG0SPj", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726742", "title": "Unifying clone analysis and refactoring activity advancement towards C# applications", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726742/12OmNqIzhaN", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2011/1948/0/06079770", "title": "On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems", "doi": null, "abstractUrl": "/proceedings-article/wcre/2011/06079770/12OmNwDACag", "parentPublication": { "id": "proceedings/wcre/2011/1948/0", "title": "2011 18th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2011/0663/0/06080796", "title": "An automatic framework for extracting and classifying near-miss clone genealogies", "doi": null, "abstractUrl": "/proceedings-article/icsm/2011/06080796/12OmNykCcf6", "parentPublication": { "id": "proceedings/icsm/2011/0663/0", "title": "2011 27th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2011/4381/0/4381a295", "title": "Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2011/4381a295/12OmNynJMCG", "parentPublication": { "id": "proceedings/iceccs/2011/4381/0", "title": "Engineering of Complex Computer Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsc/2012/1794/0/06227873", "title": "Near-miss model clone detection for Simulink models", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2012/06227873/12OmNzDeh7Z", "parentPublication": { "id": "proceedings/iwsc/2012/1794/0", "title": "2012 6th International Workshop on Software Clones (IWSC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2016/9002/0/9002a353", "title": "Predicting Consistent Clone Change", "doi": null, "abstractUrl": "/proceedings-article/issre/2016/9002a353/12OmNzt0IuK", "parentPublication": { "id": "proceedings/issre/2016/9002/0", "title": "2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdDFCX", "title": "2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNvDqsRg", "doi": "10.1109/ISSRE.2013.6698911", "title": "Predicting defects using change genealogies", "normalizedTitle": "Predicting defects using change genealogies", "abstract": "When analyzing version histories, researchers traditionally focused on single events: e.g. the change that causes a bug, the fix that resolves an issue. Sometimes however, there are indirect effects that count: Changing a module may lead to plenty of follow-up modifications in other places, making the initial change having an impact on those later changes. To this end, we group changes into change genealogies, graphs of changes reflecting their mutual dependencies and influences and develop new metrics to capture the spatial and temporal influence of changes. In this paper, we show that change genealogies offer good classification models when identifying defective source files: With a median precision of 73% and a median recall of 76%, change genealogy defect prediction models not only show better classification accuracies as models based on code complexity, but can also outperform classification models based on code dependency network metrics.", "abstracts": [ { "abstractType": "Regular", "content": "When analyzing version histories, researchers traditionally focused on single events: e.g. the change that causes a bug, the fix that resolves an issue. Sometimes however, there are indirect effects that count: Changing a module may lead to plenty of follow-up modifications in other places, making the initial change having an impact on those later changes. To this end, we group changes into change genealogies, graphs of changes reflecting their mutual dependencies and influences and develop new metrics to capture the spatial and temporal influence of changes. In this paper, we show that change genealogies offer good classification models when identifying defective source files: With a median precision of 73% and a median recall of 76%, change genealogy defect prediction models not only show better classification accuracies as models based on code complexity, but can also outperform classification models based on code dependency network metrics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When analyzing version histories, researchers traditionally focused on single events: e.g. the change that causes a bug, the fix that resolves an issue. Sometimes however, there are indirect effects that count: Changing a module may lead to plenty of follow-up modifications in other places, making the initial change having an impact on those later changes. To this end, we group changes into change genealogies, graphs of changes reflecting their mutual dependencies and influences and develop new metrics to capture the spatial and temporal influence of changes. In this paper, we show that change genealogies offer good classification models when identifying defective source files: With a median precision of 73% and a median recall of 76%, change genealogy defect prediction models not only show better classification accuracies as models based on code complexity, but can also outperform classification models based on code dependency network metrics.", "fno": "06698911", "keywords": [ "Software Engineering", "Data Mining", "Predictive Models", "Software Qual Ity" ], "authors": [ { "affiliation": "Microsoft Research Cambridge, UK", "fullName": "Kim Herzig", "givenName": "Kim", "surname": "Herzig", "__typename": "ArticleAuthorType" }, { "affiliation": "Saarland University Saarbrücken Germany", "fullName": "Sascha Just", "givenName": "Sascha", "surname": "Just", "__typename": "ArticleAuthorType" }, { "affiliation": "Saarland University Saarbrücken Germany", "fullName": "Andreas Rau", "givenName": "Andreas", "surname": "Rau", "__typename": "ArticleAuthorType" }, { "affiliation": "Saarland University Saarbrücken Germany", "fullName": "Andreas Zeller", "givenName": "Andreas", "surname": "Zeller", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-11-01T00:00:00", "pubType": "proceedings", "pages": "118-127", "year": "2013", "issn": null, "isbn": "978-1-4799-2366-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06698910", "articleId": "12OmNrJRPao", "__typename": "AdjacentArticleType" }, "next": { "fno": "06698912", "articleId": "12OmNy6Zs1a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sbes/2015/9272/0/9272a100", "title": "Predicting Change Propagation from Repository Information", "doi": null, "abstractUrl": "/proceedings-article/sbes/2015/9272a100/12OmNAiFI9n", "parentPublication": { "id": "proceedings/sbes/2015/9272/0", "title": "2015 29th Brazilian Symposium on Software Engineering (SBES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2004/2213/0/22130284", "title": "Predicting Change Propagation in Software Systems", "doi": null, "abstractUrl": "/proceedings-article/icsm/2004/22130284/12OmNvAS4qG", "parentPublication": { "id": "proceedings/icsm/2004/2213/0", "title": "20th IEEE International Conference on Software Maintenance, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2010/4178/0/4178a087", "title": "Evaluating Code Clone Genealogies at Release Level: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/scam/2010/4178a087/12OmNx8wToK", "parentPublication": { "id": "proceedings/scam/2010/4178/0", "title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115680", "title": "Predicting relevance of change recommendations", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115680/12OmNxUv6dE", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2007/2950/0/29500031", "title": "Predicting Defects and Changes with Import Relations", "doi": null, "abstractUrl": "/proceedings-article/msr/2007/29500031/12OmNzXFoKk", "parentPublication": { "id": "proceedings/msr/2007/2950/0", "title": "Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcip/2009/3699/2/3699b189", "title": "Change Detection from Remote Sensing Imageries Using Spectral Change Vector Analysis", "doi": null, "abstractUrl": "/proceedings-article/apcip/2009/3699b189/12OmNzYwc8D", "parentPublication": { "id": "proceedings/apcip/2009/3699/1", "title": "Information Processing, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a033", "title": "Change Propagation in Process Models Using Behavioural Profiles", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a033/12OmNzYwcgF", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2016/9002/0/9002a353", "title": "Predicting Consistent Clone Change", "doi": null, "abstractUrl": "/proceedings-article/issre/2016/9002a353/12OmNzt0IuK", "parentPublication": { "id": "proceedings/issre/2016/9002/0", "title": "2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2000/07/e0653", "title": "Predicting Fault Incidence Using Software Change History", "doi": null, "abstractUrl": "/journal/ts/2000/07/e0653/13rRUxZRbpL", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2020/11/08493303", "title": "How Well Do Change Sequences Predict Defects? Sequence Learning from Software Changes", "doi": null, "abstractUrl": "/journal/ts/2020/11/08493303/14qdcRChuAy", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Yts", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8OumA", "doi": "10.1109/HICSS.2015.116", "title": "SenseCluster for Exploring Large Data Repositories", "normalizedTitle": "SenseCluster for Exploring Large Data Repositories", "abstract": "Exploring and making sense of large data repositories has become a daunting task. This is especially the case for end users who often have limited access to the data due to the complexity of the retrieval process and limited availability of IT support for developing custom queries and reports based on the data. Consequently, traditional interfaces are no longer meeting these requirements. Instead, novel interfaces are required to fully support the sense making process. In this paper, we followed a design science approach and introduced a query clustering system (Sense Cluster) that could serve as a quick exploration tool for making better sense of large data repositories. We also present an evaluation of the effectiveness of our artifact using cognitive walkthroughs.", "abstracts": [ { "abstractType": "Regular", "content": "Exploring and making sense of large data repositories has become a daunting task. This is especially the case for end users who often have limited access to the data due to the complexity of the retrieval process and limited availability of IT support for developing custom queries and reports based on the data. Consequently, traditional interfaces are no longer meeting these requirements. Instead, novel interfaces are required to fully support the sense making process. In this paper, we followed a design science approach and introduced a query clustering system (Sense Cluster) that could serve as a quick exploration tool for making better sense of large data repositories. We also present an evaluation of the effectiveness of our artifact using cognitive walkthroughs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Exploring and making sense of large data repositories has become a daunting task. This is especially the case for end users who often have limited access to the data due to the complexity of the retrieval process and limited availability of IT support for developing custom queries and reports based on the data. Consequently, traditional interfaces are no longer meeting these requirements. Instead, novel interfaces are required to fully support the sense making process. In this paper, we followed a design science approach and introduced a query clustering system (Sense Cluster) that could serve as a quick exploration tool for making better sense of large data repositories. We also present an evaluation of the effectiveness of our artifact using cognitive walkthroughs.", "fno": "7367a938", "keywords": [ "Data Visualization", "Human Computer Interaction", "Analytical Models", "Big Data", "Data Models", "Navigation" ], "authors": [ { "affiliation": null, "fullName": "Yousra Harb", "givenName": "Yousra", "surname": "Harb", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Surendra Sarnikar", "givenName": "Surendra", "surname": "Sarnikar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Omar F. El-Gayar", "givenName": "Omar F.", "surname": "El-Gayar", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2015-01-01T00:00:00", "pubType": "proceedings", "pages": "938-947", "year": "2015", "issn": "1530-1605", "isbn": "978-1-4799-7367-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7367a928", "articleId": "12OmNzd7bez", "__typename": "AdjacentArticleType" }, "next": { "fno": "7367a948", "articleId": "12OmNwwd2PS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/compsac/2012/4736/0/4736a085", "title": "Investigating Human Factors through Amassing Large-Scale OSS Repositories", "doi": null, "abstractUrl": "/proceedings-article/compsac/2012/4736a085/12OmNAOKnY4", "parentPublication": { "id": "proceedings/compsac/2012/4736/0", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/advcomp/2008/3369/0/3369a045", "title": "Enabling Digital Repositories on the Grid", "doi": null, "abstractUrl": "/proceedings-article/advcomp/2008/3369a045/12OmNAq3hG8", "parentPublication": { "id": "proceedings/advcomp/2008/3369/0", "title": "Advanced Engineering Computing and Applications in Sciences, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2013/5056/0/5056a193", "title": "DevNet: Exploring Developer Collaboration in Heterogeneous Networks of Bug Repositories", "doi": null, "abstractUrl": "/proceedings-article/esem/2013/5056a193/12OmNvJXeyY", "parentPublication": { "id": "proceedings/esem/2013/5056/0", "title": "2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2007/3064/0/04426887", "title": "User-Oriented Querying over Repositories of Data and Provenance", "doi": null, "abstractUrl": "/proceedings-article/e-science/2007/04426887/12OmNwEJ10w", "parentPublication": { "id": "proceedings/e-science/2007/3064/0", "title": "2007 3rd IEEE International Conference on e-Science and Grid Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmedia/2009/3693/0/3693a130", "title": "Parameterized User-Centered Design for Interacting with Multimedia Repositories", "doi": null, "abstractUrl": "/proceedings-article/mmedia/2009/3693a130/12OmNwbcJ5O", "parentPublication": { "id": "proceedings/mmedia/2009/3693/0", "title": "Advances in Multimedia, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr-wcre/2014/3752/0/06747208", "title": "in*Bug: Visual analytics of bug repositories", "doi": null, "abstractUrl": "/proceedings-article/csmr-wcre/2014/06747208/12OmNyKJijS", "parentPublication": { "id": "proceedings/csmr-wcre/2014/3752/0", "title": "2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2009/03/tth2009030123", "title": "Putting Haptics into the Ambience", "doi": null, "abstractUrl": "/journal/th/2009/03/tth2009030123/13rRUNvyakW", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2018/03/07968298", "title": "End-User Development for Interactive Data Analytics: Uncertainty, Correlation and User Confidence", "doi": null, "abstractUrl": "/journal/ta/2018/03/07968298/13rRUxASuRb", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2021/0969/0/09686822", "title": "A Model for Computing Temporal Eligibility Criteria on Large and Diverse Data Repositories", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2021/09686822/1AsbaBPKX84", "parentPublication": { "id": "proceedings/aiccsa/2021/0969/0", "title": "2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904446", "title": "Exploring Interactions with Printed Data Visualizations in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904446/1H0GdhG1Ef6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwnH4QU", "title": "2011 27th IEEE International Conference on Software Maintenance (ICSM)", "acronym": "icsm", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNykCcf6", "doi": "10.1109/ICSM.2011.6080796", "title": "An automatic framework for extracting and classifying near-miss clone genealogies", "normalizedTitle": "An automatic framework for extracting and classifying near-miss clone genealogies", "abstract": "Extracting code clone genealogies across multiple versions of a program and classifying them according to their change patterns underlies the study of code clone evolution. While there are a few studies in the area, the approaches do not handle near-miss clones well and the associated tools are often computationally expensive. To address these limitations, we present a framework for automatically extracting both exact and near-miss clone genealogies across multiple versions of a program and for identifying their change patterns using a few key similarity factors. We have developed a prototype clone genealogy extractor, applied it to three open source projects including the Linux Kernel, and evaluated its accuracy in terms of precision and recall. Our experience shows that the prototype is scalable, adaptable to different clone detection tools, and can automatically identify evolution patterns of both exact and near-miss clones by constructing their genealogies.", "abstracts": [ { "abstractType": "Regular", "content": "Extracting code clone genealogies across multiple versions of a program and classifying them according to their change patterns underlies the study of code clone evolution. While there are a few studies in the area, the approaches do not handle near-miss clones well and the associated tools are often computationally expensive. To address these limitations, we present a framework for automatically extracting both exact and near-miss clone genealogies across multiple versions of a program and for identifying their change patterns using a few key similarity factors. We have developed a prototype clone genealogy extractor, applied it to three open source projects including the Linux Kernel, and evaluated its accuracy in terms of precision and recall. Our experience shows that the prototype is scalable, adaptable to different clone detection tools, and can automatically identify evolution patterns of both exact and near-miss clones by constructing their genealogies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Extracting code clone genealogies across multiple versions of a program and classifying them according to their change patterns underlies the study of code clone evolution. While there are a few studies in the area, the approaches do not handle near-miss clones well and the associated tools are often computationally expensive. To address these limitations, we present a framework for automatically extracting both exact and near-miss clone genealogies across multiple versions of a program and for identifying their change patterns using a few key similarity factors. We have developed a prototype clone genealogy extractor, applied it to three open source projects including the Linux Kernel, and evaluated its accuracy in terms of precision and recall. Our experience shows that the prototype is scalable, adaptable to different clone detection tools, and can automatically identify evolution patterns of both exact and near-miss clones by constructing their genealogies.", "fno": "06080796", "keywords": [], "authors": [ { "affiliation": "Department of Computer Science, University of Saskatchewan, Canada", "fullName": "Ripon K. Saha", "givenName": "Ripon K.", "surname": "Saha", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Saskatchewan, Canada", "fullName": "Chanchal K. Roy", "givenName": "Chanchal K.", "surname": "Roy", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Saskatchewan, Canada", "fullName": "Kevin A. Schneider", "givenName": "Kevin A.", "surname": "Schneider", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "293-302", "year": "2011", "issn": null, "isbn": "978-1-4577-0663-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06080795", "articleId": "12OmNAYGlBz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06080797", "articleId": "12OmNvjgWSP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsm/2012/2313/0/06405285", "title": "Models are code too: Near-miss clone detection for Simulink models", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405285/12OmNAqU4Wz", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2012/4783/0/4783a074", "title": "Evolution of Near-Miss Clones", "doi": null, "abstractUrl": "/proceedings-article/scam/2012/4783a074/12OmNBPc8sf", "parentPublication": { "id": "proceedings/scam/2012/4783/0", "title": "2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2013/4981/0/4981a488", "title": "gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsm/2013/4981a488/12OmNBhZ4iz", "parentPublication": { "id": "proceedings/icsm/2013/4981/0", "title": "2013 IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2009/4897/0/05306301", "title": "Detection and analysis of near-miss software clones", "doi": null, "abstractUrl": "/proceedings-article/icsm/2009/05306301/12OmNCwlagx", "parentPublication": { "id": "proceedings/icsm/2009/4897/0", "title": "2009 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624022", "title": "An empirical study of the fault-proneness of clone mutation and clone migration", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624022/12OmNqG0SPj", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2011/1948/0/06079770", "title": "On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems", "doi": null, "abstractUrl": "/proceedings-article/wcre/2011/06079770/12OmNwDACag", "parentPublication": { "id": "proceedings/wcre/2011/1948/0", "title": "2011 18th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2010/4178/0/4178a087", "title": "Evaluating Code Clone Genealogies at Release Level: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/scam/2010/4178a087/12OmNx8wToK", "parentPublication": { "id": "proceedings/scam/2010/4178/0", "title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2011/4381/0/4381a295", "title": "Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2011/4381a295/12OmNynJMCG", "parentPublication": { "id": "proceedings/iceccs/2011/4381/0", "title": "Engineering of Complex Computer Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsc/2012/1794/0/06227873", "title": "Near-miss model clone detection for Simulink models", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2012/06227873/12OmNzDeh7Z", "parentPublication": { "id": "proceedings/iwsc/2012/1794/0", "title": "2012 6th International Workshop on Software Clones (IWSC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2016/9002/0/9002a353", "title": "Predicting Consistent Clone Change", "doi": null, "abstractUrl": "/proceedings-article/issre/2016/9002a353/12OmNzt0IuK", "parentPublication": { "id": "proceedings/issre/2016/9002/0", "title": "2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18jXBfoaK52", "doi": "10.1109/ICDMW.2018.00079", "title": "GenERes: A Genealogical Entity Resolution System", "normalizedTitle": "GenERes: A Genealogical Entity Resolution System", "abstract": "Entity resolution is the problem of identifying and linking different manifestations of the same real-world object. This is an important step for many databases to ensure a clean version of the data and to leverage the information from multiple views of the same entity. At Ancestry, we have many manifestations of the same person in our databases. For example, the same person may be found in multiple family trees, or a person may have multiple types of records which refer to him or her, such as birth, marriage, or death records. The ability to resolve entities helps us unlock powerful genealogical discoveries for our users. To resolve these entities, we have developed a robust, scalable machine learning method which works across many different types of genealogical content as well as time and place. We find substantial improvements over a previous rule-based system and demonstrate how a machine-learning-related approach can also allow for interpretability. While we focus our example within the realm of genealogical data and historical records, we provide a model architecture and some learnings which should be applicable to many entity resolution domains.", "abstracts": [ { "abstractType": "Regular", "content": "Entity resolution is the problem of identifying and linking different manifestations of the same real-world object. This is an important step for many databases to ensure a clean version of the data and to leverage the information from multiple views of the same entity. At Ancestry, we have many manifestations of the same person in our databases. For example, the same person may be found in multiple family trees, or a person may have multiple types of records which refer to him or her, such as birth, marriage, or death records. The ability to resolve entities helps us unlock powerful genealogical discoveries for our users. To resolve these entities, we have developed a robust, scalable machine learning method which works across many different types of genealogical content as well as time and place. We find substantial improvements over a previous rule-based system and demonstrate how a machine-learning-related approach can also allow for interpretability. While we focus our example within the realm of genealogical data and historical records, we provide a model architecture and some learnings which should be applicable to many entity resolution domains.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Entity resolution is the problem of identifying and linking different manifestations of the same real-world object. This is an important step for many databases to ensure a clean version of the data and to leverage the information from multiple views of the same entity. At Ancestry, we have many manifestations of the same person in our databases. For example, the same person may be found in multiple family trees, or a person may have multiple types of records which refer to him or her, such as birth, marriage, or death records. The ability to resolve entities helps us unlock powerful genealogical discoveries for our users. To resolve these entities, we have developed a robust, scalable machine learning method which works across many different types of genealogical content as well as time and place. We find substantial improvements over a previous rule-based system and demonstrate how a machine-learning-related approach can also allow for interpretability. While we focus our example within the realm of genealogical data and historical records, we provide a model architecture and some learnings which should be applicable to many entity resolution domains.", "fno": "928800a495", "keywords": [ "Database Management Systems", "Learning Artificial Intelligence", "Genealogical Entity Resolution System", "Databases", "Robust Machine Learning Method", "Scalable Machine Learning Method", "Genealogical Content", "Machine Learning Related Approach", "Genealogical Data", "Gen E Res", "Genealogical Discoveries", "Feature Extraction", "Data Models", "Databases", "Machine Learning Algorithms", "Task Analysis", "Data Mining", "Labeling", "Entity Resolution", "Record Linking", "Genealogy", "Data Matching", "Duplicate Detection" ], "authors": [ { "affiliation": null, "fullName": "Tyler Folkman", "givenName": "Tyler", "surname": "Folkman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rey Furner", "givenName": "Rey", "surname": "Furner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Drew Pearson", "givenName": "Drew", "surname": "Pearson", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "495-501", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800a487", "articleId": "18jXHAEh3WM", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800a502", "articleId": "18jXHfcZxOE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdew/2010/6522/0/05452698", "title": "Towards better entity resolution techniques for Web document collections", "doi": null, "abstractUrl": "/proceedings-article/icdew/2010/05452698/12OmNAOsMK0", "parentPublication": { "id": "proceedings/icdew/2010/6522/0", "title": "2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2012/4747/0/4747a294", "title": "Joint Entity Resolution", "doi": null, "abstractUrl": "/proceedings-article/icde/2012/4747a294/12OmNwIHopv", "parentPublication": { "id": "proceedings/icde/2012/4747/0", "title": "2012 IEEE 28th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/01/06807749", "title": "Rule-Based Method for Entity Resolution", "doi": null, "abstractUrl": "/journal/tk/2015/01/06807749/13rRUy0HYRW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/11/08316959", "title": "Rule-Based Entity Resolution on Database with Hidden Temporal Information", "doi": null, "abstractUrl": "/journal/tk/2018/11/08316959/147pbJDwi2I", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/05/08637043", "title": "Efficient Entity Resolution on Heterogeneous Records", "doi": null, "abstractUrl": "/journal/tk/2020/05/08637043/17D45W2Wyy0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2022/1015/0/101500a575", "title": "Named entity recognition of TCM electronic medical records based on the ALBERT-BiLSTM-CRF model", "doi": null, "abstractUrl": "/proceedings-article/itme/2022/101500a575/1M4rv0mD960", "parentPublication": { "id": "proceedings/itme/2022/1015/0", "title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/escience/2019/2451/0/245100a126", "title": "Active Learning Yields Better Training Data for Scientific Named Entity Recognition", "doi": null, "abstractUrl": "/proceedings-article/escience/2019/245100a126/1ike0rKEaHK", "parentPublication": { "id": "proceedings/escience/2019/2451/0", "title": "2019 15th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/03/09079896", "title": "Unsupervised Entity Resolution With Blocking and Graph Algorithms", "doi": null, "abstractUrl": "/journal/tk/2022/03/09079896/1joA03y9hhC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09130070", "title": "Gradual Machine Learning for Entity Resolution", "doi": null, "abstractUrl": "/journal/tk/2022/04/09130070/1l58YEZ9WU0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b250", "title": "ERGAN: Generative Adversarial Networks for Entity Resolution", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b250/1r54zgao5lS", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1n2nh6feFVe", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "acronym": "ickg", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1n2njeOLdrq", "doi": "10.1109/ICBK50248.2020.00077", "title": "PZXG: A Genealogy Data Service Platform for Kinship Management and Application", "normalizedTitle": "PZXG: A Genealogy Data Service Platform for Kinship Management and Application", "abstract": "Genealogy is one of the three kinds of historical literatures which are valuable to historical research and humanities research. However, traditionally, it is hard to build and revise a genealogy. And it is even impossible to manage and query the genealogy efficiently. In this paper, we proposed PZXG, which is a genealogy data service platform, to solve these issues. Firstly, for structured and unstructured genealogy data, we employ relational database, graph database and distributed file system to store them respectively. Secondly, depending on the hybrid data model of genealogy data, various management features like data acquisition, kin seeking, genealogy exhibition and automatic typesetting are provided. Then in order to extract knowledge from genealogy data, the features of routine statistics and query, root tracing, correlation analysis and data visualization in genealogical data are discussed, and several methods and ideas of text mining for genealogical text are given. Finally, two more urgent research points in the genealogical data management platform are suggested: extracting structural information from unstructured genealogy data and construction of genealogy-specific text language model.", "abstracts": [ { "abstractType": "Regular", "content": "Genealogy is one of the three kinds of historical literatures which are valuable to historical research and humanities research. However, traditionally, it is hard to build and revise a genealogy. And it is even impossible to manage and query the genealogy efficiently. In this paper, we proposed PZXG, which is a genealogy data service platform, to solve these issues. Firstly, for structured and unstructured genealogy data, we employ relational database, graph database and distributed file system to store them respectively. Secondly, depending on the hybrid data model of genealogy data, various management features like data acquisition, kin seeking, genealogy exhibition and automatic typesetting are provided. Then in order to extract knowledge from genealogy data, the features of routine statistics and query, root tracing, correlation analysis and data visualization in genealogical data are discussed, and several methods and ideas of text mining for genealogical text are given. Finally, two more urgent research points in the genealogical data management platform are suggested: extracting structural information from unstructured genealogy data and construction of genealogy-specific text language model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Genealogy is one of the three kinds of historical literatures which are valuable to historical research and humanities research. However, traditionally, it is hard to build and revise a genealogy. And it is even impossible to manage and query the genealogy efficiently. In this paper, we proposed PZXG, which is a genealogy data service platform, to solve these issues. Firstly, for structured and unstructured genealogy data, we employ relational database, graph database and distributed file system to store them respectively. Secondly, depending on the hybrid data model of genealogy data, various management features like data acquisition, kin seeking, genealogy exhibition and automatic typesetting are provided. Then in order to extract knowledge from genealogy data, the features of routine statistics and query, root tracing, correlation analysis and data visualization in genealogical data are discussed, and several methods and ideas of text mining for genealogical text are given. Finally, two more urgent research points in the genealogical data management platform are suggested: extracting structural information from unstructured genealogy data and construction of genealogy-specific text language model.", "fno": "09194511", "keywords": [ "Data Acquisition", "Data Mining", "Data Visualisation", "Document Handling", "Humanities", "Relational Databases", "Text Analysis", "Genealogy Data Service Platform", "Historical Research", "Humanities Research", "Structured Genealogy Data", "Unstructured Genealogy Data", "Hybrid Data Model", "Data Acquisition", "Genealogy Exhibition", "Correlation Analysis", "Data Visualization", "Genealogical Text", "Genealogical Data Management Platform", "Genealogy Specific Text Language Model", "Data Models", "Biographies", "Data Acquisition", "Optical Character Recognition Software", "Data Mining", "Typesetting", "Computer Architecture", "Genealogy Data", "Service Platform", "Kinship", "Management" ], "authors": [ { "affiliation": "Wuhan University,School of Computer Science,Wuhan,China", "fullName": "Yuwei Peng", "givenName": "Yuwei", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University,School of Computer Science,Wuhan,China", "fullName": "Huan Jiang", "givenName": "Huan", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University,School of Computer Science,Wuhan,China", "fullName": "Rongrong Li", "givenName": "Rongrong", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan University,School of Computer Science,Wuhan,China", "fullName": "Zhiyong Peng", "givenName": "Zhiyong", "surname": "Peng", "__typename": "ArticleAuthorType" } ], "idPrefix": "ickg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "505-512", "year": "2020", "issn": null, "isbn": "978-1-7281-8156-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09194549", "articleId": "1n2nnwgxP44", "__typename": "AdjacentArticleType" }, "next": { "fno": "09194508", "articleId": "1n2nhtjzomk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2017/2684/0/08115611", "title": "Mining structures from massive text data: Will it help software engineering?", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115611/12OmNvzJGce", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2018/3346/0/3346a127", "title": "Green Interaction for Extracting Family Information from OCR'd Books", "doi": null, "abstractUrl": "/proceedings-article/das/2018/3346a127/12OmNwGZNHV", "parentPublication": { "id": "proceedings/das/2018/3346/0", "title": "2018 13th IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670f249", "title": "Strategic Network Formation in a Location-Based Social Network: A Topic Modeling Approach", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670f249/12OmNwNwzCm", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2012/4467/0/06404474", "title": "Image retrieval in the unstructured data management system AUDR", "doi": null, "abstractUrl": "/proceedings-article/e-science/2012/06404474/12OmNz5apM6", "parentPublication": { "id": "proceedings/e-science/2012/4467/0", "title": "2012 IEEE 8th International Conference on E-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/03/08307265", "title": "Lineage: Visualizing Multivariate Clinical Data in Genealogy Graphs", "doi": null, "abstractUrl": "/journal/tg/2019/03/08307265/17D45Xbl4Qj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a206", "title": "A Cross-age Kinship Verification Scheme Using Face Age Transfer Model", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a206/1BYIKw4p488", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194537", "title": "Knowledge Fragment Cleaning in a Genealogy Knowledge Graph", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194537/1n2nhUjJxwQ", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194559", "title": "Knowledge Graph for China&#x2019;s Genealogy", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194559/1n2niFJSEP6", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194565", "title": "Web Log Analysis in Genealogy System", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194565/1n2nkYFcfra", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09409650", "title": "Knowledge Graph for China&#x0027;s Genealogy<xref rid=\"fn1\" ref-type=\"fn\"><sup>1</sup></xref><fn id=\"fn1\"><label>1.</label><p>A shorter version of this paper won the Best Paper Award at IEEE ICKG 2020 (the 11th IEEE International Conference on Knowledge Graph, ickg 2020.bigke.org).</p></fn>", "doi": null, "abstractUrl": "/journal/tk/2023/01/09409650/1sXjuqQx3gs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1n2nh6feFVe", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "acronym": "ickg", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1n2nkYFcfra", "doi": "10.1109/ICBK50248.2020.00081", "title": "Web Log Analysis in Genealogy System", "normalizedTitle": "Web Log Analysis in Genealogy System", "abstract": "A large amount of log data is generated every moment in many real-world applications. System logs, mobile application logs, web logs etc., all of which contain rich information and can be analyzed for valuable information. At the same time, genealogy attracts more and more attention in recent decades, especially for Chinese. People utilize the genealogy system to seek roots, find source of family, build a family tree and so on. Due to the complexity of genealogy data and specific features of genealogy system, how to extract and analyze the valued genealogy information effectively is a huge challenge. Motivated by this, we propose a novel analysis method using web logs in genealogy system for drawing user profile and providing personalized recommendations. More specifically, firstly, all web logs are extracted from genealogy system based on the enhanced logs which record the behaviors and data of user. Secondly, the extracted logs are formatted for analysis, and we analyze the logs to extract various user-related attributes for drawing user profile. Finally, personalized recommendations like interested people and family tree are provided for each user in system. The high availability and effectiveness of our proposed method is verified on genealogy system-Huapu system.", "abstracts": [ { "abstractType": "Regular", "content": "A large amount of log data is generated every moment in many real-world applications. System logs, mobile application logs, web logs etc., all of which contain rich information and can be analyzed for valuable information. At the same time, genealogy attracts more and more attention in recent decades, especially for Chinese. People utilize the genealogy system to seek roots, find source of family, build a family tree and so on. Due to the complexity of genealogy data and specific features of genealogy system, how to extract and analyze the valued genealogy information effectively is a huge challenge. Motivated by this, we propose a novel analysis method using web logs in genealogy system for drawing user profile and providing personalized recommendations. More specifically, firstly, all web logs are extracted from genealogy system based on the enhanced logs which record the behaviors and data of user. Secondly, the extracted logs are formatted for analysis, and we analyze the logs to extract various user-related attributes for drawing user profile. Finally, personalized recommendations like interested people and family tree are provided for each user in system. The high availability and effectiveness of our proposed method is verified on genealogy system-Huapu system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A large amount of log data is generated every moment in many real-world applications. System logs, mobile application logs, web logs etc., all of which contain rich information and can be analyzed for valuable information. At the same time, genealogy attracts more and more attention in recent decades, especially for Chinese. People utilize the genealogy system to seek roots, find source of family, build a family tree and so on. Due to the complexity of genealogy data and specific features of genealogy system, how to extract and analyze the valued genealogy information effectively is a huge challenge. Motivated by this, we propose a novel analysis method using web logs in genealogy system for drawing user profile and providing personalized recommendations. More specifically, firstly, all web logs are extracted from genealogy system based on the enhanced logs which record the behaviors and data of user. Secondly, the extracted logs are formatted for analysis, and we analyze the logs to extract various user-related attributes for drawing user profile. Finally, personalized recommendations like interested people and family tree are provided for each user in system. The high availability and effectiveness of our proposed method is verified on genealogy system-Huapu system.", "fno": "09194565", "keywords": [ "Internet", "Mobile Computing", "Recommender Systems", "Genealogy Information", "Web Log Analysis", "Log Data", "System Logs", "Mobile Application Logs", "Genealogy Data", "Genealogy System", "Huapu System", "Data Mining", "Databases", "Data Visualization", "Tools", "Big Data", "Feature Extraction", "Knowledge Engineering", "Genealogy System", "Web Log Parse", "Web Log Analyze", "User Profile", "Personalized Recommendation" ], "authors": [ { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology),Ministry of Education,China", "fullName": "Xiaojian Liu", "givenName": "Xiaojian", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology),Ministry of Education,China", "fullName": "Yi Zhu", "givenName": "Yi", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology),Ministry of Education,China", "fullName": "Shengwei Ji", "givenName": "Shengwei", "surname": "Ji", "__typename": "ArticleAuthorType" } ], "idPrefix": "ickg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "536-543", "year": "2020", "issn": null, "isbn": "978-1-7281-8156-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09194559", "articleId": "1n2niFJSEP6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09194500", "articleId": "1n2nlCmu4iA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2013/5004/0/5004a601", "title": "Research of Analysis of User Behavior Based on Web Log", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a601/12OmNxR5UFu", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2013/5026/0/5026a595", "title": "Incremental Mining of System Log Format", "doi": null, "abstractUrl": "/proceedings-article/scc/2013/5026a595/12OmNyL0TMa", "parentPublication": { "id": "proceedings/scc/2013/5026/0", "title": "2013 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/5/09815020", "title": "Mining Generalized Query Patterns from Web Logs", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/09815020/12OmNyoiZew", "parentPublication": { "id": "proceedings/hicss/2001/0981/5", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2018/6871/0/687101b052", "title": "LogLens: A Real-Time Log Analysis System", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2018/687101b052/12OmNz6iOyK", "parentPublication": { "id": "proceedings/icdcs/2018/6871/0", "title": "2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2015/9473/0/9473a200", "title": "Performance Evaluation of a MapReduce Hadoop-Based Implementation for Processing Large Virtual Campus Log Files", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2015/9473a200/12OmNzt0IID", "parentPublication": { "id": "proceedings/3pgcic/2015/9473/0", "title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/03/08307265", "title": "Lineage: Visualizing Multivariate Clinical Data in Genealogy Graphs", "doi": null, "abstractUrl": "/journal/tg/2019/03/08307265/17D45Xbl4Qj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2018/8319/0/831900a571", "title": "A Big Data Analytics Framework for HPC Log Data: Three Case Studies Using the Titan Supercomputer Log", "doi": null, "abstractUrl": "/proceedings-article/cluster/2018/831900a571/17D45Xi9rW0", "parentPublication": { "id": "proceedings/cluster/2018/8319/0", "title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194537", "title": "Knowledge Fragment Cleaning in a Genealogy Knowledge Graph", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194537/1n2nhUjJxwQ", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194513", "title": "An Abnormal Data Analysis and Processing Method for Genealogy Graph Databases", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194513/1n2nml2T3Og", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/09/09442364", "title": "LogAssist: Assisting Log Analysis Through Log Summarization", "doi": null, "abstractUrl": "/journal/ts/2022/09/09442364/1tV542sGZi0", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNs0C9PV", "doi": "10.1109/IV.2009.108", "title": "Visual Graph Comparison", "normalizedTitle": "Visual Graph Comparison", "abstract": "Researchers and analysts in many fields are sometimes confronted with the task of comparing and contrasting two similar but different graphs or networks. This paper presents a technique and prototype tool to support the visual comparison of graphs and the interactive reconciliation of candidate graphs into a single reference graph. Given two input graphs and a set of similarities between nodes, the Semantic Graph Visualiser (SGV) computes a merged graph and allows the analyst to visually compare and contrast the two input graphs. In a specific example, given two differing models of essentially the same business process derived from different sources, a process engineer can visually compare them and reconcile them into a single reference model.", "abstracts": [ { "abstractType": "Regular", "content": "Researchers and analysts in many fields are sometimes confronted with the task of comparing and contrasting two similar but different graphs or networks. This paper presents a technique and prototype tool to support the visual comparison of graphs and the interactive reconciliation of candidate graphs into a single reference graph. Given two input graphs and a set of similarities between nodes, the Semantic Graph Visualiser (SGV) computes a merged graph and allows the analyst to visually compare and contrast the two input graphs. In a specific example, given two differing models of essentially the same business process derived from different sources, a process engineer can visually compare them and reconcile them into a single reference model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Researchers and analysts in many fields are sometimes confronted with the task of comparing and contrasting two similar but different graphs or networks. This paper presents a technique and prototype tool to support the visual comparison of graphs and the interactive reconciliation of candidate graphs into a single reference graph. Given two input graphs and a set of similarities between nodes, the Semantic Graph Visualiser (SGV) computes a merged graph and allows the analyst to visually compare and contrast the two input graphs. In a specific example, given two differing models of essentially the same business process derived from different sources, a process engineer can visually compare them and reconcile them into a single reference model.", "fno": "3733a062", "keywords": [ "Graph Drawing", "Graph Comparison", "Visual", "Side By Side", "Node Equivalence Matrix", "Merge Graph", "Business Process Models" ], "authors": [ { "affiliation": null, "fullName": "Keith Andrews", "givenName": "Keith", "surname": "Andrews", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Martin Wohlfahrt", "givenName": "Martin", "surname": "Wohlfahrt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gerhard Wurzinger", "givenName": "Gerhard", "surname": "Wurzinger", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "62-67", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a057", "articleId": "12OmNyXMQbs", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a173", "articleId": "12OmNzhELm1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2011/4477/0/4477a561", "title": "Efficient Graph Comparison and Visualization Using GPU", "doi": null, "abstractUrl": "/proceedings-article/cse/2011/4477a561/12OmNALCNrV", "parentPublication": { "id": "proceedings/cse/2011/4477/0", "title": "2011 14th IEEE International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1998/8712/0/87120032", "title": "A Graph Rewriting Programming Language for Graph Drawing", "doi": null, "abstractUrl": "/proceedings-article/vl/1998/87120032/12OmNB7LvGY", "parentPublication": { "id": "proceedings/vl/1998/8712/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wpdrts/1995/7099/0/70990113", "title": "Drawing execution graphs by parsing", "doi": null, "abstractUrl": "/proceedings-article/wpdrts/1995/70990113/12OmNro0IcA", "parentPublication": { "id": "proceedings/wpdrts/1995/7099/0", "title": "Parallel and Distributed Real-Time Systems, Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialcom/2010/4211/0/4211a193", "title": "Graph Comparison Using Fine Structure Analysis", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2010/4211a193/12OmNvTjZWa", "parentPublication": { "id": "proceedings/socialcom/2010/4211/0", "title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/04/ttg2008040900", "title": "GrouseFlocks: Steerable Exploration of Graph Hierarchy Space", "doi": null, "abstractUrl": "/journal/tg/2008/04/ttg2008040900/13rRUwInv4i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1998/11/t1297", "title": "Interactive Orthogonal Graph Drawing", "doi": null, "abstractUrl": "/journal/tc/1998/11/t1297/13rRUwfZBZo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061082", "title": "Visualization of Graph Products", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061082/13rRUx0xPmX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2000/01/v0024", "title": "Graph Visualization and Navigation in Information Visualization: A Survey", "doi": null, "abstractUrl": "/journal/tg/2000/01/v0024/13rRUxNW1TM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a051", "title": "dGG, dRNG, DSC: New Degree-based Shape-based Faithfulness Metrics for Large and Complex Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a051/1E2wj8PptTi", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/5555/01/10093949", "title": "Splitting Vertices in 2-Layer Graph Drawings", "doi": null, "abstractUrl": "/magazine/cg/5555/01/10093949/1M80M7nF2Mg", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNrY3LCy", "doi": "10.1109/IV.2009.30", "title": "An Heuristic for the Construction of Intersection Graphs", "normalizedTitle": "An Heuristic for the Construction of Intersection Graphs", "abstract": "Most methods for generating Euler diagrams describe the detection of the general structure of the final drawing as the first step. This information is generally encoded using a graph, where nodes are the regions to be represented and edges represent adjacency. A planar drawing of this graph will then indicate how to draw the sets in order to depict all the set intersections.In this paper we present an heuristic to construct this structure, the intersection graph. The final Euler diagram can be constructed by drawing the sets boundaries around the nodes of the intersection graph, either manually or automatically.", "abstracts": [ { "abstractType": "Regular", "content": "Most methods for generating Euler diagrams describe the detection of the general structure of the final drawing as the first step. This information is generally encoded using a graph, where nodes are the regions to be represented and edges represent adjacency. A planar drawing of this graph will then indicate how to draw the sets in order to depict all the set intersections.In this paper we present an heuristic to construct this structure, the intersection graph. The final Euler diagram can be constructed by drawing the sets boundaries around the nodes of the intersection graph, either manually or automatically.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most methods for generating Euler diagrams describe the detection of the general structure of the final drawing as the first step. This information is generally encoded using a graph, where nodes are the regions to be represented and edges represent adjacency. A planar drawing of this graph will then indicate how to draw the sets in order to depict all the set intersections.In this paper we present an heuristic to construct this structure, the intersection graph. The final Euler diagram can be constructed by drawing the sets boundaries around the nodes of the intersection graph, either manually or automatically.", "fno": "3733a673", "keywords": [ "Euler Diagrams", "Overlapping Clustering" ], "authors": [ { "affiliation": null, "fullName": "Paolo Simonetto", "givenName": "Paolo", "surname": "Simonetto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Auber", "givenName": "David", "surname": "Auber", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "673-678", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a667", "articleId": "12OmNzAohQD", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a679", "articleId": "12OmNyUWR7R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2009/4876/0/05295268", "title": "Changing euler diagram properties by edge transformation of euler dual graphs", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2009/05295268/12OmNAIdBQa", "parentPublication": { "id": "proceedings/vlhcc/2009/4876/0", "title": "2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wowmom/2011/0352/0/05986170", "title": "Communication and security in random intersection graphs models", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2011/05986170/12OmNzn38Od", "parentPublication": { "id": "proceedings/wowmom/2011/0352/0", "title": "2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1999/0409/0/04090319", "title": "Finding Double Euler Trails of Planar Graphs in Linear Time", "doi": null, "abstractUrl": "/proceedings-article/focs/1999/04090319/12OmNzvz6NW", "parentPublication": { "id": "proceedings/focs/1999/0409/0", "title": "40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09187569", "title": "Distributed Hypergraph Processing Using Intersection Graphs", "doi": null, "abstractUrl": "/journal/tk/2022/07/09187569/1mVFlr5j4Aw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa6ff", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "acronym": "iiai-aai", "groupId": "1801921", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNB7LvK1", "doi": "10.1109/IIAI-AAI.2017.150", "title": "Word Cloud of Online Hotel Reviews in Myanmar for Customer Satisfaction Analysis", "normalizedTitle": "Word Cloud of Online Hotel Reviews in Myanmar for Customer Satisfaction Analysis", "abstract": "This co-research project between Chiang Mai University and Mandalay University aims to examine the satisfied and unsatisfied of hotel customers by utilizing a word cloud approach to evaluate online reviews. An online commends of 682 hotel guests were collected from TripAdvisor.com for 6 luxury hotels in Mandalay region, Myanmar. The results revealed some common features that are identified in both satisfied and dissatisfied of customer comments; including hotel decoration, staff service skills, room amenities and traditional cuisines. Instead, the findings illustrated that dissatisfied customers mentioned frequently on a cleanliness of rooms and a poor of the Internet signal. Therefore, this articles findings suggest some greater managerial implications pertaining to understanding of customer satisfaction level through the utilization of world cloud technique via review online platforms for hotel industry in Myanmar.", "abstracts": [ { "abstractType": "Regular", "content": "This co-research project between Chiang Mai University and Mandalay University aims to examine the satisfied and unsatisfied of hotel customers by utilizing a word cloud approach to evaluate online reviews. An online commends of 682 hotel guests were collected from TripAdvisor.com for 6 luxury hotels in Mandalay region, Myanmar. The results revealed some common features that are identified in both satisfied and dissatisfied of customer comments; including hotel decoration, staff service skills, room amenities and traditional cuisines. Instead, the findings illustrated that dissatisfied customers mentioned frequently on a cleanliness of rooms and a poor of the Internet signal. Therefore, this articles findings suggest some greater managerial implications pertaining to understanding of customer satisfaction level through the utilization of world cloud technique via review online platforms for hotel industry in Myanmar.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This co-research project between Chiang Mai University and Mandalay University aims to examine the satisfied and unsatisfied of hotel customers by utilizing a word cloud approach to evaluate online reviews. An online commends of 682 hotel guests were collected from TripAdvisor.com for 6 luxury hotels in Mandalay region, Myanmar. The results revealed some common features that are identified in both satisfied and dissatisfied of customer comments; including hotel decoration, staff service skills, room amenities and traditional cuisines. Instead, the findings illustrated that dissatisfied customers mentioned frequently on a cleanliness of rooms and a poor of the Internet signal. Therefore, this articles findings suggest some greater managerial implications pertaining to understanding of customer satisfaction level through the utilization of world cloud technique via review online platforms for hotel industry in Myanmar.", "fno": "0621a447", "keywords": [ "Cloud Computing", "Customer Satisfaction", "Hotel Industry", "Internet", "Myanmar", "Co Research Project", "Chiang Mai University", "Mandalay University", "Hotel Customers", "Word Cloud Approach", "Mandalay Region", "Staff Service Skills", "Room Amenities", "Traditional Cuisines", "Customer Satisfaction Level", "Luxury Hotels", "Hotel Decoration", "Online Hotel Reviews Evaluation", "Internet Signal", "Room Cleanliness", "Customer Satisfaction Analysis", "Hotel Industry", "Customer Satisfaction", "Social Network Services", "Text Mining", "Media", "Internet", "Industries", "Myanmar", "Hotels", "Online Review", "Customer Satisfaction", "World Cloud" ], "authors": [ { "affiliation": null, "fullName": "Vimolboon Cherapanukorn", "givenName": "Vimolboon", "surname": "Cherapanukorn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Phasit Charoenkwan", "givenName": "Phasit", "surname": "Charoenkwan", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiai-aai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "447-452", "year": "2017", "issn": null, "isbn": "978-1-5386-0621-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0621a441", "articleId": "12OmNwNwzGq", "__typename": "AdjacentArticleType" }, "next": { "fno": "0621a453", "articleId": "12OmNyRxFqC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciii/2011/4523/1/4523a193", "title": "Empirical Analysis on Hotel Online Booking Consumer's Satisfaction with E-service of Website", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523a193/12OmNvjQ8P6", "parentPublication": { "id": "proceedings/iciii/2011/4523/1", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcss/2011/4421/0/4421a145", "title": "Fairness is in the Eye of the Beholder: How Personality Traits Affect Perceived Fairness and Satisfaction in Hotel Service", "doi": null, "abstractUrl": "/proceedings-article/ijcss/2011/4421a145/12OmNvrvj9g", "parentPublication": { "id": "proceedings/ijcss/2011/4421/0", "title": "Service Sciences, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2018/5114/0/511401a104", "title": "Analysis and Design of Five-Star Hotel Management Information System Based on UML", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2018/511401a104/12OmNxvO00I", "parentPublication": { "id": "proceedings/icmtma/2018/5114/0", "title": "2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2017/0621/0/0621a029", "title": "Kansei Engineering with Online Review Mining for Hotel Service Development", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2017/0621a029/12OmNy3iFvt", "parentPublication": { "id": "proceedings/iiai-aai/2017/0621/0", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2018/7016/1/701601a149", "title": "The Reason Behind the Rating: Text Mining of Online Hotel Reviews", "doi": null, "abstractUrl": "/proceedings-article/cbi/2018/701601a149/13l5NXDXuaW", "parentPublication": { "id": "cbi/2018/7016/1", "title": "2018 IEEE 20th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ica/2018/8180/0/08460040", "title": "Aspect Level Opinion Mining for Hotel Reviews in Myanmar Language", "doi": null, "abstractUrl": "/proceedings-article/ica/2018/08460040/13xI8B3IkXS", "parentPublication": { "id": "proceedings/ica/2018/8180/0", "title": "2018 IEEE International Conference on Agents (ICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2018/5886/0/08477231", "title": "Enhanced Sentiment Classification for Informal Myanmar Text of Restaurant Reviews", "doi": null, "abstractUrl": "/proceedings-article/sera/2018/08477231/144U9b5Ngl3", "parentPublication": { "id": "proceedings/sera/2018/5886/0", "title": "2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2019/4691/0/469100a223", "title": "Analysis of Hotel Customer Satisfaction in Heilongjiang Province Based on OTA Data", "doi": null, "abstractUrl": "/proceedings-article/aiam/2019/469100a223/1gysCggcuCQ", "parentPublication": { "id": "proceedings/aiam/2019/4691/0", "title": "2019 International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2020/9553/0/955300a435", "title": "Mining Customer Satisfaction on B2B Online Platforms using Service Quality and Web Usage Metrics", "doi": null, "abstractUrl": "/proceedings-article/apsec/2020/955300a435/1rCgFaRJyeI", "parentPublication": { "id": "proceedings/apsec/2020/9553/0", "title": "2020 27th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icecem/2021/1025/0/102500a189", "title": "Analysis and Empirical Study on Influencing Factors of Hotel Customer Satisfaction based on Regression Models", "doi": null, "abstractUrl": "/proceedings-article/icecem/2021/102500a189/1zpF3qnec3m", "parentPublication": { "id": "proceedings/icecem/2021/1025/0", "title": "2021 International Conference on E-Commerce and E-Management (ICECEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC17hWj", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "acronym": "wi-iat", "groupId": "1001411", "volume": "3", "displayVolume": "3", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBtCCE5", "doi": "10.1109/WI-IAT.2012.78", "title": "Integration of Opinion into Customer Analysis Model", "normalizedTitle": "Integration of Opinion into Customer Analysis Model", "abstract": "As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly. In order to enhance customer satisfaction and their shopping experiences, it has become important to analysis customers reviews to extract opinions on the products that they buy. Thus, Opinion Mining is getting more important than before especially in doing analysis and forecasting about customers' behavior for businesses purpose. The right decision in producing new products or services based on data about customers' characteristics means profit for organization/company. This paper proposes a new architecture for Opinion Mining, which uses a multidimensional model to integrate customers' characteristics and their comments about products (or services). The key step to achieve this objective is to transfer comments (opinions) to a fact table that includes several dimensions, such as, customers, products, time and locations. This research presents a comprehensive way to calculate customers' orientation for all possible products' attributes.", "abstracts": [ { "abstractType": "Regular", "content": "As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly. In order to enhance customer satisfaction and their shopping experiences, it has become important to analysis customers reviews to extract opinions on the products that they buy. Thus, Opinion Mining is getting more important than before especially in doing analysis and forecasting about customers' behavior for businesses purpose. The right decision in producing new products or services based on data about customers' characteristics means profit for organization/company. This paper proposes a new architecture for Opinion Mining, which uses a multidimensional model to integrate customers' characteristics and their comments about products (or services). The key step to achieve this objective is to transfer comments (opinions) to a fact table that includes several dimensions, such as, customers, products, time and locations. This research presents a comprehensive way to calculate customers' orientation for all possible products' attributes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly. In order to enhance customer satisfaction and their shopping experiences, it has become important to analysis customers reviews to extract opinions on the products that they buy. Thus, Opinion Mining is getting more important than before especially in doing analysis and forecasting about customers' behavior for businesses purpose. The right decision in producing new products or services based on data about customers' characteristics means profit for organization/company. This paper proposes a new architecture for Opinion Mining, which uses a multidimensional model to integrate customers' characteristics and their comments about products (or services). The key step to achieve this objective is to transfer comments (opinions) to a fact table that includes several dimensions, such as, customers, products, time and locations. This research presents a comprehensive way to calculate customers' orientation for all possible products' attributes.", "fno": "4880c164", "keywords": [ "Frequent Feature", "Opinion Mining", "Data Cube", "OLAP", "Unstructured Data", "Structured Data" ], "authors": [ { "affiliation": null, "fullName": "Mohd Ridzwan Yaakub", "givenName": "Mohd Ridzwan", "surname": "Yaakub", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuefeng Li", "givenName": "Yuefeng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Abdulmohsen Algarni", "givenName": "Abdulmohsen", "surname": "Algarni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bo Peng", "givenName": "Bo", "surname": "Peng", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "164-168", "year": "2012", "issn": null, "isbn": "978-1-4673-6057-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4880c159", "articleId": "12OmNqI04Q4", "__typename": "AdjacentArticleType" }, "next": { "fno": "4880c169", "articleId": "12OmNBqdrfG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2011/4409/0/4409a089", "title": "AQA: Aspect-based Opinion Question Answering", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a089/12OmNrJAe9F", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/1/3865a068", "title": "Finer Granularity Clustering for Opinion Mining", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865a068/12OmNrJRP91", "parentPublication": { "id": "proceedings/iscid/2009/3865/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2011/4409/0/4409a115", "title": "Detecting General Opinions from Customer Surveys", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a115/12OmNs0TKSF", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2011/4518/0/4518a090", "title": "Integration of Opinion into Customer Analysis Model", "doi": null, "abstractUrl": "/proceedings-article/icebe/2011/4518a090/12OmNvpewaj", "parentPublication": { "id": "proceedings/icebe/2011/4518/0", "title": "2011 IEEE 8th International Conference on e-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wism/2009/3817/0/3817a149", "title": "An Opinion-Tree Based Flexible Opinion Mining Model", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a149/12OmNwErpJO", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2009/3929/0/3929a235", "title": "Blog Hotness Evaluation Model Based on Text Opinion Analysis", "doi": null, "abstractUrl": "/proceedings-article/dasc/2009/3929a235/12OmNzT7OAl", "parentPublication": { "id": "proceedings/dasc/2009/3929/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2011/01/tta2011010037", "title": "Aspect-Based Opinion Polling from Customer Reviews", "doi": null, "abstractUrl": "/journal/ta/2011/01/tta2011010037/13rRUxC0SUx", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2020/04/08328845", "title": "Tracking Dynamics of Opinion Behaviors with a Content-Based Sequential Opinion Influence Model", "doi": null, "abstractUrl": "/journal/ta/2020/04/08328845/13rRUxDItfJ", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2010/03/mex2010030074", "title": "AI and Opinion Mining", "doi": null, "abstractUrl": "/magazine/ex/2010/03/mex2010030074/13rRUxYIMQV", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061109", "title": "OpinionSeer: Interactive Visualization of Hotel Customer Feedback", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061109/13rRUyuegh7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJiaV", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNscxj5C", "doi": "10.1109/ICPR.2010.432", "title": "Visualization of Customer Flow in an Office Complex over a Long Period", "normalizedTitle": "Visualization of Customer Flow in an Office Complex over a Long Period", "abstract": "In facility management, analysis of customer trajectories in office complexes is considered critical. In this paper, we propose a novel approach for the visualization of customer flow in an office complex over a long period of time. We expressed the variation in the trajectories with respect to time by using a mixture model; this was used for the visualization of the trajectory flows. The effectiveness of our approach was evaluated from the results of the customer flow analysis experiments that were conducted in an office complex.", "abstracts": [ { "abstractType": "Regular", "content": "In facility management, analysis of customer trajectories in office complexes is considered critical. In this paper, we propose a novel approach for the visualization of customer flow in an office complex over a long period of time. We expressed the variation in the trajectories with respect to time by using a mixture model; this was used for the visualization of the trajectory flows. The effectiveness of our approach was evaluated from the results of the customer flow analysis experiments that were conducted in an office complex.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In facility management, analysis of customer trajectories in office complexes is considered critical. In this paper, we propose a novel approach for the visualization of customer flow in an office complex over a long period of time. We expressed the variation in the trajectories with respect to time by using a mixture model; this was used for the visualization of the trajectory flows. The effectiveness of our approach was evaluated from the results of the customer flow analysis experiments that were conducted in an office complex.", "fno": "4109b747", "keywords": [ "Visualization Of Customer Flow", "Office Complex", "EM Algorithm", "AIC" ], "authors": [ { "affiliation": null, "fullName": "Masaki Onishi", "givenName": "Masaki", "surname": "Onishi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ikushi Yoda", "givenName": "Ikushi", "surname": "Yoda", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "1747-1750", "year": "2010", "issn": "1051-4651", "isbn": "978-0-7695-4109-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4109b743", "articleId": "12OmNzaQoFm", "__typename": "AdjacentArticleType" }, "next": { "fno": "4109b751", "articleId": "12OmNs0TKSw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isads/1995/7087/0/70870316", "title": "The role of personal communications in distributed office environments", "doi": null, "abstractUrl": "/proceedings-article/isads/1995/70870316/12OmNAXglPs", "parentPublication": { "id": "proceedings/isads/1995/7087/0", "title": "Proceedings ISADS 95. Second International Symposium on Autonomous Decentralized Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1994/5090/4/00323452", "title": "User enhanceability for fast response to changing office needs", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323452/12OmNBtl1Gg", "parentPublication": { "id": "proceedings/hicss/1994/5090/4", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1995/3018/0/30181073", "title": "The Customer Service Office simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/1995/30181073/12OmNCdk2Io", "parentPublication": { "id": "proceedings/wsc/1995/3018/0", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2009/3705/0/3705a652", "title": "Visual Analysis of Customer Data in Commercial Banks", "doi": null, "abstractUrl": "/proceedings-article/bife/2009/3705a652/12OmNrJ11uQ", "parentPublication": { "id": "proceedings/bife/2009/3705/0", "title": "2009 International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iitaw/2009/3860/0/3860a322", "title": "Workflow Automation and Management in the Real Estate Office Automation System", "doi": null, "abstractUrl": "/proceedings-article/iitaw/2009/3860a322/12OmNvSbBOh", "parentPublication": { "id": "proceedings/iitaw/2009/3860/0", "title": "2009 Third International Symposium on Intelligent Information Technology Application Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2015/7644/0/7644b022", "title": "The Research of the Property Service Enterprise's Innovation Based on the Customer Relationship Management Theory", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644b022/12OmNx5Yv65", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2010/4303/2/4303b200", "title": "Workflow Exception Handling Technology Based on Office Affairs", "doi": null, "abstractUrl": "/proceedings-article/wcse/2010/4303b200/12OmNxGj9QZ", "parentPublication": { "id": "proceedings/wcse/2010/4303/2", "title": "2010 Second World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07841055", "title": "Giving voice to office customers: Best practices in how office handles verbatim text feedback", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07841055/12OmNxQOjCS", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmcsn/2012/4738/0/4738a371", "title": "The Study of Multi-task Tracking and Evaluation Model Based on Group Enterprise Collaboration Office Platform", "doi": null, "abstractUrl": "/proceedings-article/cmcsn/2012/4738a371/12OmNxRWIbu", "parentPublication": { "id": "proceedings/cmcsn/2012/4738/0", "title": "Computing, Measurement, Control and Sensor Network, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcss/2012/4731/0/4731a115", "title": "Does Back-Office Employee Satisfaction Affect Customer Satisfaction? An Empirical Examination", "doi": null, "abstractUrl": "/proceedings-article/ijcss/2012/4731a115/12OmNybfr9O", "parentPublication": { "id": "proceedings/ijcss/2012/4731/0", "title": "Service Sciences, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBscCYp", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNvrvjeW", "doi": "10.1109/ICDMW.2015.72", "title": "Proposal of LDA-Based Sentiment Visualization of Hotel Reviews", "normalizedTitle": "Proposal of LDA-Based Sentiment Visualization of Hotel Reviews", "abstract": "With the growth of user generated contents (UGC), it is important to know consumers' opinions about features or deficiencies of products quickly. Such information is important not only for companies, but also for consumers. Keyword-based visualization and clustering are effective methods to observe summary of opinions. In order to decrease users' effort in examining vast amount of UGC, we proposed an interactive visualization system that presents sentiment words with aspects based on natural language processing and sentiment lexicon. This paper also proposes to apply latent Dirichlet allocation (LDA) to cluster reviews into several topics in order to improve understandability of visualization. This paper explains the developed system with case studies.", "abstracts": [ { "abstractType": "Regular", "content": "With the growth of user generated contents (UGC), it is important to know consumers' opinions about features or deficiencies of products quickly. Such information is important not only for companies, but also for consumers. Keyword-based visualization and clustering are effective methods to observe summary of opinions. In order to decrease users' effort in examining vast amount of UGC, we proposed an interactive visualization system that presents sentiment words with aspects based on natural language processing and sentiment lexicon. This paper also proposes to apply latent Dirichlet allocation (LDA) to cluster reviews into several topics in order to improve understandability of visualization. This paper explains the developed system with case studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the growth of user generated contents (UGC), it is important to know consumers' opinions about features or deficiencies of products quickly. Such information is important not only for companies, but also for consumers. Keyword-based visualization and clustering are effective methods to observe summary of opinions. In order to decrease users' effort in examining vast amount of UGC, we proposed an interactive visualization system that presents sentiment words with aspects based on natural language processing and sentiment lexicon. This paper also proposes to apply latent Dirichlet allocation (LDA) to cluster reviews into several topics in order to improve understandability of visualization. This paper explains the developed system with case studies.", "fno": "8493a687", "keywords": [ "Data Visualization", "Feature Extraction", "Sentiment Analysis", "Resource Management", "Data Mining", "User Generated Content", "Information Visualization", "Latent Dirichlet Allocation", "Sentiment Analysis" ], "authors": [ { "affiliation": null, "fullName": "Yu-Sheng Chen", "givenName": "Yu-Sheng", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lieu-Hen Chen", "givenName": "Lieu-Hen", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yasufumi Takama", "givenName": "Yasufumi", "surname": "Takama", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "687-693", "year": "2015", "issn": "2375-9259", "isbn": "978-1-4673-8493-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8493a680", "articleId": "12OmNwDSduT", "__typename": "AdjacentArticleType" }, "next": { "fno": "8493a694", "articleId": "12OmNvnOwvb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aina/2016/1858/0/1858a053", "title": "Sentiment Analysis and Classification for Software as a Service Reviews", "doi": null, "abstractUrl": "/proceedings-article/aina/2016/1858a053/12OmNBCZnPT", "parentPublication": { "id": "proceedings/aina/2016/1858/0", "title": "2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07870986", "title": "A Negation Handling Technique for Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07870986/12OmNrY3LAH", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892d119", "title": "Mining Online User-Generated Content: Using Sentiment Analysis Technique to Study Hotel Service Quality", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892d119/12OmNro0Ihl", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2017/5507/0/07960005", "title": "Aspect based sentiment analysis in social media with classifier ensembles", "doi": null, "abstractUrl": "/proceedings-article/icis/2017/07960005/12OmNwtn3Cs", "parentPublication": { "id": "proceedings/icis/2017/5507/0", "title": "2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a265", "title": "Leveraging Sentiment Analysis for Topic Detection", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a265/12OmNyO8tM6", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2009/3689/0/3689a330", "title": "Intelligent Advertising for User Generated Content through Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/asonam/2009/3689a330/12OmNyvGylw", "parentPublication": { "id": "proceedings/asonam/2009/3689/0", "title": "2009 International Conference on Advances in Social Network Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2006/2507/3/250730053b", "title": "Sentiment Classification for Movie Reviews in Chinese by Improved Semantic Oriented Approach", "doi": null, "abstractUrl": "/proceedings-article/hicss/2006/250730053b/12OmNz4Bdtd", "parentPublication": { "id": "proceedings/hicss/2006/2507/3", "title": "Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09723597", "title": "Multi-Level Attention Map Network for Multimodal Sentiment Analysis", "doi": null, "abstractUrl": "/journal/tk/2023/05/09723597/1BocGvqxTgc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a001", "title": "Retrieving Users&#x2019; Opinions on Social Media with Multimodal Aspect-Based Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a001/1LFKPTmRfpu", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073424", "title": "Semantic Role Labeling for Opinion Target Extraction from Chinese Social Network", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073424/1jjAfXIeapq", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBrDqEt", "title": "2013 IEEE Seventh International Conference on Semantic Computing", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxdDFEG", "doi": "10.1109/ICSC.2013.65", "title": "A Distant Supervision Method for Product Aspect Extraction from Customer Reviews", "normalizedTitle": "A Distant Supervision Method for Product Aspect Extraction from Customer Reviews", "abstract": "In this paper, we describe a distant supervision approach for the task of detecting product aspect mentions in customer reviews (e.g., in hotel reviews, we want to associate the aspect ``sleep quality\" to a sentence such as \"We both slept like rocks.\"). Detecting such aspects represents an important subtask of aspect-oriented review mining systems, which aim at automatically generating structured summaries of customer opinions. The main advantage of the proposed method is that it allows for the high accuracy of a supervised approach and at the same time avoids the costs of manually labeling a training set. We show how to exploit the inherent structure of customer reviews to automatically gather large amounts of labeled data. Our experimental results show that the method achieves a performance as good as a traditional, fully supervised approach.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we describe a distant supervision approach for the task of detecting product aspect mentions in customer reviews (e.g., in hotel reviews, we want to associate the aspect ``sleep quality\" to a sentence such as \"We both slept like rocks.\"). Detecting such aspects represents an important subtask of aspect-oriented review mining systems, which aim at automatically generating structured summaries of customer opinions. The main advantage of the proposed method is that it allows for the high accuracy of a supervised approach and at the same time avoids the costs of manually labeling a training set. We show how to exploit the inherent structure of customer reviews to automatically gather large amounts of labeled data. Our experimental results show that the method achieves a performance as good as a traditional, fully supervised approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we describe a distant supervision approach for the task of detecting product aspect mentions in customer reviews (e.g., in hotel reviews, we want to associate the aspect ``sleep quality\" to a sentence such as \"We both slept like rocks.\"). Detecting such aspects represents an important subtask of aspect-oriented review mining systems, which aim at automatically generating structured summaries of customer opinions. The main advantage of the proposed method is that it allows for the high accuracy of a supervised approach and at the same time avoids the costs of manually labeling a training set. We show how to exploit the inherent structure of customer reviews to automatically gather large amounts of labeled data. Our experimental results show that the method achieves a performance as good as a traditional, fully supervised approach.", "fno": "5119a339", "keywords": [ "Distant Supervision", "Review Mining", "Sentiment Analysis" ], "authors": [ { "affiliation": null, "fullName": "Juergen Bross", "givenName": "Juergen", "surname": "Bross", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "339-346", "year": "2013", "issn": null, "isbn": "978-0-7695-5119-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5119a334", "articleId": "12OmNButq85", "__typename": "AdjacentArticleType" }, "next": { "fno": "5119a347", "articleId": "12OmNwNOaQR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2017/3013/0/3013a212", "title": "Aspect Extraction and Aspect Terms Expansion in Chinese Reviews Using Cluster Semi-Supervised Expansion Model", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013a212/12OmNC0guxL", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a727", "title": "Aspect Sentiment Model for Micro Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a727/12OmNCzb9zN", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905a816", "title": "Semantic Aspect Discovery for Online Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905a816/12OmNqyUUC3", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicc-itoe/2010/5634/0/05439192", "title": "E-Commerce Reviews Management System Based on Online Customer Reviews Mining", "doi": null, "abstractUrl": "/proceedings-article/cicc-itoe/2010/05439192/12OmNymjN27", "parentPublication": { "id": "proceedings/cicc-itoe/2010/5634/0", "title": "2010 International Conference on Innovative Computing &amp; Communication and 2010 Asia-Pacific Conference on Information Technology &amp; Ocean Engineering, (CICC-ITOE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a373", "title": "Dataset Construction via Attention for Aspect Term Extraction with Distant Supervision", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a373/12OmNz6iOM8", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2011/01/tta2011010037", "title": "Aspect-Based Opinion Polling from Customer Reviews", "doi": null, "abstractUrl": "/journal/ta/2011/01/tta2011010037/13rRUxC0SUx", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2018/5163/0/08641050", "title": "Aspect Extraction from Bangla Reviews using Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2018/08641050/17PYElTugk9", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2018/5163/0", "title": "2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcd/2022/6582/0/09900513", "title": "Modeling Customer Satisfaction based on Kano Model from Online Reviews: Focused on Deep Learning Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/bcd/2022/09900513/1H44f6OHITS", "parentPublication": { "id": "proceedings/bcd/2022/6582/0", "title": "2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a270", "title": "Sentilyzer: Aspect-Oriented Sentiment Analysis of Product Reviews", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a270/1gjRpZlWoco", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asew/2020/8128/0/812800a138", "title": "Roman Urdu Reviews Dataset for Aspect Based Opinion Mining", "doi": null, "abstractUrl": "/proceedings-article/asew/2020/812800a138/1qyxNv3qCFW", "parentPublication": { "id": "proceedings/asew/2020/8128/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPPJ", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "acronym": "wi-iat", "groupId": "1001411", "volume": "3", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzcxZbs", "doi": "10.1109/WI-IAT.2010.196", "title": "Mining Customer Feedbacks for Actionable Intelligence", "normalizedTitle": "Mining Customer Feedbacks for Actionable Intelligence", "abstract": "Mining consumer-generated text can provide business intelligence to organizations by extracting important knowledge trapped in the form of opinions, thoughts, and ideas expressed by their employees and customers on various aspects relevant to business. The key challenge here is to extract and organize relevant information from noisy text in order to effectively transform it to actionable intelligence. However, there is no formal framework to guide this analytical task. In this work, we present a system that is suitable for purpose-driven mining of free-text customer feedback to convert the knowledge gained to actionable intelligence.", "abstracts": [ { "abstractType": "Regular", "content": "Mining consumer-generated text can provide business intelligence to organizations by extracting important knowledge trapped in the form of opinions, thoughts, and ideas expressed by their employees and customers on various aspects relevant to business. The key challenge here is to extract and organize relevant information from noisy text in order to effectively transform it to actionable intelligence. However, there is no formal framework to guide this analytical task. In this work, we present a system that is suitable for purpose-driven mining of free-text customer feedback to convert the knowledge gained to actionable intelligence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mining consumer-generated text can provide business intelligence to organizations by extracting important knowledge trapped in the form of opinions, thoughts, and ideas expressed by their employees and customers on various aspects relevant to business. The key challenge here is to extract and organize relevant information from noisy text in order to effectively transform it to actionable intelligence. However, there is no formal framework to guide this analytical task. In this work, we present a system that is suitable for purpose-driven mining of free-text customer feedback to convert the knowledge gained to actionable intelligence.", "fno": "4191c239", "keywords": [ "Text Mining", "Actionable Intelligence", "Ontology", "Opinion Mining", "Fuzzy Clustering", "Noisy Text" ], "authors": [ { "affiliation": null, "fullName": "Lipika Dey", "givenName": "Lipika", "surname": "Dey", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sk Mirajul Haque", "givenName": "Sk Mirajul", "surname": "Haque", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nidhi Raj", "givenName": "Nidhi", "surname": "Raj", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "239-242", "year": "2010", "issn": null, "isbn": "978-0-7695-4191-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4191c235", "articleId": "12OmNASraLV", "__typename": "AdjacentArticleType" }, "next": { "fno": "4191c243", "articleId": "12OmNy50giI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/srii/2011/4371/0/4371a384", "title": "Analyzing Opinion Formation in Online Social Networks: Mining Services for Online Market Research", "doi": null, "abstractUrl": "/proceedings-article/srii/2011/4371a384/12OmNAXxXhp", "parentPublication": { "id": "proceedings/srii/2011/4371/0", "title": "Annual SRII Global Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2016/4795/0/4795a131", "title": "Bayesian Network-Based Approach for Mining Actionable Behavioral Rules", "doi": null, "abstractUrl": "/proceedings-article/skg/2016/4795a131/12OmNAio71i", "parentPublication": { "id": "proceedings/skg/2016/4795/0", "title": "2016 12th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscbi/2014/7551/0/07119533", "title": "Business Intelligence & Geo Tracking - A Novel Mining Technique to Identify Alerts and Pattern Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscbi/2014/07119533/12OmNApLGMs", "parentPublication": { "id": "proceedings/iscbi/2014/7551/0", "title": "2014 2nd International Symposium on Computational and Business Intelligence (ISCBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997b456", "title": "Text Mining Based on Domain Ontology", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997b456/12OmNB1eJxz", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2008/3503/0/3503a154", "title": "Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2008/3503a154/12OmNqC2v4r", "parentPublication": { "id": "proceedings/icdmw/2008/3503/0", "title": "2008 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/09/ttk2010091299", "title": "Flexible Frameworks for Actionable Knowledge Discovery", "doi": null, "abstractUrl": "/journal/tk/2010/09/ttk2010091299/13rRUNvgz4J", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/06/ttk2010060755", "title": "Domain-Driven Data Mining: Challenges and Prospects", "doi": null, "abstractUrl": "/journal/tk/2010/06/ttk2010060755/13rRUxlgy44", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2006/04/f4012", "title": "Data Mining and Predictive Analytics in Public Safety and Security", "doi": null, "abstractUrl": "/magazine/it/2006/04/f4012/13rRUy3xYbW", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a516", "title": "A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a516/1rgGkPq4FtS", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cTI8geedm8", "title": "2019 IEEE World Congress on Services (SERVICES)", "acronym": "services", "groupId": "1800492", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cTIa2AdqDe", "doi": "10.1109/SERVICES.2019.00042", "title": "Visualization System for Analyzing Customer Comments in Marketing Research Support System", "normalizedTitle": "Visualization System for Analyzing Customer Comments in Marketing Research Support System", "abstract": "Amusement parks are complex facilities with various attractions and shops, and many events for entertainment, making it a very difficult target for marketing research. Therefore, we proposed and built an opinion collection system using smartphones to efficiently collect user's opinions for improvement. In this paper, we propose and construct an opinion analysis and visualization system to support the grasping the situation of the amusement park, the planning of improvement. It is difficult for marketing researchers to extract important opinions from a large number of opinions. To cope with this problem, we propose a method to visualize emotional information of opinion on a map. The method classifies emotions for opinions based on Plutchik's wheel of emotions. The evaluation result by questionnaires is 4.75 on average out of 5 scales. The result shows that the proposed system can support the action of proposing business ideas.", "abstracts": [ { "abstractType": "Regular", "content": "Amusement parks are complex facilities with various attractions and shops, and many events for entertainment, making it a very difficult target for marketing research. Therefore, we proposed and built an opinion collection system using smartphones to efficiently collect user's opinions for improvement. In this paper, we propose and construct an opinion analysis and visualization system to support the grasping the situation of the amusement park, the planning of improvement. It is difficult for marketing researchers to extract important opinions from a large number of opinions. To cope with this problem, we propose a method to visualize emotional information of opinion on a map. The method classifies emotions for opinions based on Plutchik's wheel of emotions. The evaluation result by questionnaires is 4.75 on average out of 5 scales. The result shows that the proposed system can support the action of proposing business ideas.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Amusement parks are complex facilities with various attractions and shops, and many events for entertainment, making it a very difficult target for marketing research. Therefore, we proposed and built an opinion collection system using smartphones to efficiently collect user's opinions for improvement. In this paper, we propose and construct an opinion analysis and visualization system to support the grasping the situation of the amusement park, the planning of improvement. It is difficult for marketing researchers to extract important opinions from a large number of opinions. To cope with this problem, we propose a method to visualize emotional information of opinion on a map. The method classifies emotions for opinions based on Plutchik's wheel of emotions. The evaluation result by questionnaires is 4.75 on average out of 5 scales. The result shows that the proposed system can support the action of proposing business ideas.", "fno": "385100a141", "keywords": [ "Data Analysis", "Data Visualisation", "Emotion Recognition", "Entertainment", "Marketing Data Processing", "Amusement Park", "Complex Facilities", "Opinion Collection System", "Opinion Analysis", "Visualization System", "Marketing Researchers", "Important Opinions", "Marketing Research Support System", "Customer Comment Analysis", "Emotional Information Visualization", "Plutchik Wheel Of Emotions", "Emotion Classification", "Business Ideas", "Sentiment Analysis", "Data Visualization", "Dictionaries", "Wheels", "Proposals", "Image Color Analysis", "Marketing", "Sentiment Analysis", "Support System", "Visualization", "Caption Evaluation Method" ], "authors": [ { "affiliation": "Meiji University", "fullName": "Keita Arai", "givenName": "Keita", "surname": "Arai", "__typename": "ArticleAuthorType" }, { "affiliation": "Meiji University", "fullName": "Yoshitaka Sakurai", "givenName": "Yoshitaka", "surname": "Sakurai", "__typename": "ArticleAuthorType" }, { "affiliation": "Bunri University of Hospitality", "fullName": "Eriko Sakurai", "givenName": "Eriko", "surname": "Sakurai", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Denki University", "fullName": "Setsuo Tsuruta", "givenName": "Setsuo", "surname": "Tsuruta", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Ilmenau", "fullName": "Rainer Knauf", "givenName": "Rainer", "surname": "Knauf", "__typename": "ArticleAuthorType" } ], "idPrefix": "services", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "141-146", "year": "2019", "issn": null, "isbn": "978-1-7281-3851-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "385100a135", "articleId": "1cTIdZesmkM", "__typename": "AdjacentArticleType" }, "next": { "fno": "385100a147", "articleId": "1cTIche84CY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ficloud/2015/8103/0/8103a693", "title": "Social Opinion Mining: An Approach for Italian Language", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2015/8103a693/12OmNBQ2VUV", "parentPublication": { "id": "proceedings/ficloud/2015/8103/0", "title": "2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2014/5057/0/06906802", "title": "A Study on Sentiment Computing and Classification of Sina Weibo with Word2vec", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2014/06906802/12OmNC2fGvV", "parentPublication": { "id": "proceedings/bigdata-congress/2014/5057/0", "title": "2014 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/la-web/2012/4839/0/4839a040", "title": "Taking the Pulse of Political Emotions in Latin America Based on Social Web Streams", "doi": null, "abstractUrl": "/proceedings-article/la-web/2012/4839a040/12OmNrMZpjP", "parentPublication": { "id": "proceedings/la-web/2012/4839/0", "title": "Web Congress, Latin American", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2011/4409/0/4409a115", "title": "Detecting General Opinions from Customer Surveys", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a115/12OmNs0TKSF", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2017/5573/0/5573a140", "title": "An Explorative Study on Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/wccct/2017/5573a140/12OmNy5zspj", "parentPublication": { "id": "proceedings/wccct/2017/5573/0", "title": "2017 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2014/5618/0/5618a050", "title": "The Role of Text Pre-processing in Opinion Mining on a Social Media Language Dataset", "doi": null, "abstractUrl": "/proceedings-article/bracis/2014/5618a050/12OmNyen1ra", "parentPublication": { "id": "proceedings/bracis/2014/5618/0", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2015/7947/0/07346694", "title": "Emotion analysis of Twitter using opinion mining", "doi": null, "abstractUrl": "/proceedings-article/ic3/2015/07346694/12OmNzvhvJk", "parentPublication": { "id": "proceedings/ic3/2015/7947/0", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2013/03/mex2013030019", "title": "Retrieving Product Features and Opinions from Customer Reviews", "doi": null, "abstractUrl": "/magazine/ex/2013/03/mex2013030019/13rRUxAATcN", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2011/01/tta2011010037", "title": "Aspect-Based Opinion Polling from Customer Reviews", "doi": null, "abstractUrl": "/journal/ta/2011/01/tta2011010037/13rRUxC0SUx", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2022/6265/0/626500a396", "title": "Evolution Analysis of Network Public Opinion Theme Based on LDA Model", "doi": null, "abstractUrl": "/proceedings-article/icaml/2022/626500a396/1LkfBPNBt9m", "parentPublication": { "id": "proceedings/icaml/2022/6265/0", "title": "2022 4th International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }