data
dict |
|---|
{
"proceeding": {
"id": "12OmNC1oT6n",
"title": "Multimedia Information Networking and Security, International Conference on",
"acronym": "mines",
"groupId": "1003021",
"volume": "1",
"displayVolume": "1",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzZmZoE",
"doi": "10.1109/MINES.2009.159",
"title": "A Novel Anomaly Detection Approach for Executable Program Security",
"normalizedTitle": "A Novel Anomaly Detection Approach for Executable Program Security",
"abstract": "Anomaly detection of executable program is a security detection solution that examines whether security violation issues exist in programs. The paper presents a novel anomaly detection approach for executable program security (ADEPS), which monitors program executions and detects anomalous program behaviors. Through reverse analysis of executable program, critical behavior monitoring points can be extracted from binary code sequences and memory space. A hybrid neural network model is proposed to detect abnormal attacks and classify detected attacks from actual program behaviors. The experimental results demonstrate that the proposed approach can effectively and accurately perform anomaly detection.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Anomaly detection of executable program is a security detection solution that examines whether security violation issues exist in programs. The paper presents a novel anomaly detection approach for executable program security (ADEPS), which monitors program executions and detects anomalous program behaviors. Through reverse analysis of executable program, critical behavior monitoring points can be extracted from binary code sequences and memory space. A hybrid neural network model is proposed to detect abnormal attacks and classify detected attacks from actual program behaviors. The experimental results demonstrate that the proposed approach can effectively and accurately perform anomaly detection.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Anomaly detection of executable program is a security detection solution that examines whether security violation issues exist in programs. The paper presents a novel anomaly detection approach for executable program security (ADEPS), which monitors program executions and detects anomalous program behaviors. Through reverse analysis of executable program, critical behavior monitoring points can be extracted from binary code sequences and memory space. A hybrid neural network model is proposed to detect abnormal attacks and classify detected attacks from actual program behaviors. The experimental results demonstrate that the proposed approach can effectively and accurately perform anomaly detection.",
"fno": "3843a422",
"keywords": [
"Anomaly Detection",
"Executable Program",
"Reverse Analysis",
"Neural Network"
],
"authors": [
{
"affiliation": null,
"fullName": "Wei Pan",
"givenName": "Wei",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Weihua Li",
"givenName": "Weihua",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wanxin Zhao",
"givenName": "Wanxin",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mines",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "422-426",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3843-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3843a417",
"articleId": "12OmNBZYTq3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3843a427",
"articleId": "12OmNAqCtNC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csse/2008/3336/3/3336e986",
"title": "Using Density-Based Incremental Clustering for Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336e986/12OmNBqdr8T",
"parentPublication": {
"id": "proceedings/csse/2008/3336/3",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2016/0990/0/0990a638",
"title": "Detecting Packed Executable File: Supervised or Anomaly Detection Method?",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2016/0990a638/12OmNvjQ95h",
"parentPublication": {
"id": "proceedings/ares/2016/0990/0",
"title": "2016 11th International Conference on Availability, Reliability and Security (ARES )",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/prdc/2005/2492/0/24920200",
"title": "Anomaly Detection with High Deviations for System Security",
"doi": null,
"abstractUrl": "/proceedings-article/prdc/2005/24920200/12OmNx6xHr9",
"parentPublication": {
"id": "proceedings/prdc/2005/2492/0",
"title": "Proceedings. 11th Pacific Rim International Symposium on Dependable Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icciis/2010/4260/0/4260a113",
"title": "Bayesian Statistical Inference in Machine Learning Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icciis/2010/4260a113/12OmNylKAKa",
"parentPublication": {
"id": "proceedings/icciis/2010/4260/0",
"title": "Communications and Intelligence Information Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/it/2013/01/mit2013010008",
"title": "An Overview of Anomaly Detection",
"doi": null,
"abstractUrl": "/magazine/it/2013/01/mit2013010008/13rRUy08Mxf",
"parentPublication": {
"id": "mags/it",
"title": "IT Professional",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/1979/03/01702622",
"title": "Detection of Data Flow Anomaly Through Program Instrumentation",
"doi": null,
"abstractUrl": "/journal/ts/1979/03/01702622/13rRUyYBli6",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0/751800a528",
"title": "Hardware Performance Counters for Embedded Software Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2018/751800a528/17D45WUj90X",
"parentPublication": {
"id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0",
"title": "2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005989",
"title": "ACE – An Anomaly Contribution Explainer for Cyber-Security Applications",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005989/1hJsxWWqKac",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0/09123047",
"title": "Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2020/09123047/1kTB1EuScVi",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0",
"title": "2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isctt/2020/8575/0/857500a439",
"title": "Research on Anomaly Detection Method Based on DBSCAN Clustering Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/isctt/2020/857500a439/1rHePkujlWo",
"parentPublication": {
"id": "proceedings/isctt/2020/8575/0",
"title": "2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G9DtzCwrjW",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G9E4T1kx7W",
"doi": "10.1109/ICME52920.2022.9859873",
"title": "Detecting Anomalous Events from Unlabeled Videos via Temporal Masked Auto-Encoding",
"normalizedTitle": "Detecting Anomalous Events from Unlabeled Videos via Temporal Masked Auto-Encoding",
"abstract": "Unsupervised video anomaly detection (UVAD) intends to discern anomalous events from fully unlabeled videos. However, existing UVAD methods suffer from poor performance. Inspired by recent masked autoencoder (MAE) [1], we propose Temporal Masked Auto-Encoding (TMAE) as an effective end-to-end UVAD method. Specifically, we first denote video events by spatial-temporal cubes (STCs), which are built by temporally consecutive foreground patches from unlabeled videos. Then, half of patches in an STC are masked along the temporal dimension, while a vision transformer (ViT) is trained to exploit unmasked patches to predict masked patches. The rare and unusual nature of anomaly will result in a poorer prediction for anomalous events, which enables us to discriminate anomalies from unlabeled videos and compute the anomaly scores. Furthermore, to utilize motion clues in videos, we also propose to apply TMAE on optical flow, which can further boost performance. Experiments show that TMAE significantly outperforms existing UVAD methods by a notable margin (3.9%–6.6% AUC).",
"abstracts": [
{
"abstractType": "Regular",
"content": "Unsupervised video anomaly detection (UVAD) intends to discern anomalous events from fully unlabeled videos. However, existing UVAD methods suffer from poor performance. Inspired by recent masked autoencoder (MAE) [1], we propose Temporal Masked Auto-Encoding (TMAE) as an effective end-to-end UVAD method. Specifically, we first denote video events by spatial-temporal cubes (STCs), which are built by temporally consecutive foreground patches from unlabeled videos. Then, half of patches in an STC are masked along the temporal dimension, while a vision transformer (ViT) is trained to exploit unmasked patches to predict masked patches. The rare and unusual nature of anomaly will result in a poorer prediction for anomalous events, which enables us to discriminate anomalies from unlabeled videos and compute the anomaly scores. Furthermore, to utilize motion clues in videos, we also propose to apply TMAE on optical flow, which can further boost performance. Experiments show that TMAE significantly outperforms existing UVAD methods by a notable margin (3.9%–6.6% AUC).",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Unsupervised video anomaly detection (UVAD) intends to discern anomalous events from fully unlabeled videos. However, existing UVAD methods suffer from poor performance. Inspired by recent masked autoencoder (MAE) [1], we propose Temporal Masked Auto-Encoding (TMAE) as an effective end-to-end UVAD method. Specifically, we first denote video events by spatial-temporal cubes (STCs), which are built by temporally consecutive foreground patches from unlabeled videos. Then, half of patches in an STC are masked along the temporal dimension, while a vision transformer (ViT) is trained to exploit unmasked patches to predict masked patches. The rare and unusual nature of anomaly will result in a poorer prediction for anomalous events, which enables us to discriminate anomalies from unlabeled videos and compute the anomaly scores. Furthermore, to utilize motion clues in videos, we also propose to apply TMAE on optical flow, which can further boost performance. Experiments show that TMAE significantly outperforms existing UVAD methods by a notable margin (3.9%–6.6% AUC).",
"fno": "09859873",
"keywords": [
"Feature Extraction",
"Image Motion Analysis",
"Image Sequences",
"Learning Artificial Intelligence",
"Object Detection",
"Video Signal Processing",
"Recent Masked Autoencoder",
"Temporal Masked Auto Encoding",
"TMAE",
"Effective End To End UVAD Method",
"Video Events",
"Spatial Temporal Cubes",
"Temporally Consecutive Foreground Patches",
"Temporal Dimension",
"Unmasked Patches",
"Masked Patches",
"Anomalous Events",
"Existing UVAD Methods",
"Unsupervised Video Anomaly Detection",
"Fully Unlabeled Videos",
"Streaming Media",
"Transformers",
"Optical Flow",
"Anomaly Detection",
"Unsupervised Video Anomaly Detection",
"Masked Autoencoder"
],
"authors": [
{
"affiliation": "National University of Defense Technology,China",
"fullName": "Jingtao Hu",
"givenName": "Jingtao",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,China",
"fullName": "Guang Yu",
"givenName": "Guang",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,China",
"fullName": "Siqi Wang",
"givenName": "Siqi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,China",
"fullName": "En Zhu",
"givenName": "En",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,China",
"fullName": "Zhiping Cai",
"givenName": "Zhiping",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Zhejiang Normal University,China",
"fullName": "Xinzhong Zhu",
"givenName": "Xinzhong",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8563-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09859977",
"articleId": "1G9EvhcDsyI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09859885",
"articleId": "1G9DPUH4qw8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isms/2013/4963/0/4963a252",
"title": "Scene Modeling-Based Anomaly Detection for Intelligent Transport System",
"doi": null,
"abstractUrl": "/proceedings-article/isms/2013/4963a252/12OmNroijo8",
"parentPublication": {
"id": "proceedings/isms/2013/4963/0",
"title": "Intelligent Systems, Modelling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2011/0394/0/05995475",
"title": "Improving classifiers with unlabeled weakly-related videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2011/05995475/12OmNyuPL1v",
"parentPublication": {
"id": "proceedings/cvpr/2011/0394/0",
"title": "CVPR 2011",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2022/0915/0/091500b908",
"title": "FastAno: Fast Anomaly Detection via Spatio-temporal Patch Transformation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500b908/1B13oPa0MDe",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200n3526",
"title": "Learning to Track Objects from Unlabeled Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200n3526/1BmIoq5GX1m",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ec/2023/01/09861244",
"title": "A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs",
"doi": null,
"abstractUrl": "/journal/ec/2023/01/09861244/1FUYF3G2WYw",
"parentPublication": {
"id": "trans/ec",
"title": "IEEE Transactions on Emerging Topics in Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859607",
"title": "TCA-VAD: Temporal Context Alignment Network for Weakly Supervised Video Anomly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859607/1G9Eed59knS",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859927",
"title": "Object-Guided and Motion-Refined Attention Network for Video Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859927/1G9EyLdF2MM",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600o4648",
"title": "Masked Feature Prediction for Self-Supervised Visual Pre-Training",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600o4648/1H1imKKnn7a",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600t9291",
"title": "Point-BERT: Pre-training 3D Point Cloud Transformers with Masked Point Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600t9291/1H1mPsA11XW",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956507",
"title": "Multi-Contextual Predictions with Vision Transformer for Video Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956507/1IHqByyzBe0",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1feblxPnruU",
"title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)",
"acronym": "wi",
"groupId": "1001411",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1febnpPm49y",
"doi": null,
"title": "Detecting Anomalous Behaviour from Textual Content in Financial Records",
"normalizedTitle": "Detecting Anomalous Behaviour from Textual Content in Financial Records",
"abstract": "Most financial institutions mainly use numerical statistics to detect anomalous (malpractice) activity. The textual content in financial records however contains precious information which to date has not been effectively used for detection of anomalous behaviors by users because these are often unintelligible, cluttered with abbreviations, numbers and symbols, which makes it difficult to build a framework system that can coherently understand and draw conclusions. Rule-based techniques have been proposed but such systems are easy to elude, as they are difficult to generalize and do not scale up. The work presented in this paper differs from previous work in that we exclusively base anomalous activities on text (excluding numerical values) in financial records and treat this as a classification problem for a deep learning network. We propose four solutions using deep learning techniques on textual data to distinguish between normal with anomalous behaviors of the users. The results of our experiments convincingly show that use of the textual content in financial records yields greater accuracy in anomalous behavior detection. They also suggest that deep learning is a viable and effective solution for real time anomaly detection by financial institutions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Most financial institutions mainly use numerical statistics to detect anomalous (malpractice) activity. The textual content in financial records however contains precious information which to date has not been effectively used for detection of anomalous behaviors by users because these are often unintelligible, cluttered with abbreviations, numbers and symbols, which makes it difficult to build a framework system that can coherently understand and draw conclusions. Rule-based techniques have been proposed but such systems are easy to elude, as they are difficult to generalize and do not scale up. The work presented in this paper differs from previous work in that we exclusively base anomalous activities on text (excluding numerical values) in financial records and treat this as a classification problem for a deep learning network. We propose four solutions using deep learning techniques on textual data to distinguish between normal with anomalous behaviors of the users. The results of our experiments convincingly show that use of the textual content in financial records yields greater accuracy in anomalous behavior detection. They also suggest that deep learning is a viable and effective solution for real time anomaly detection by financial institutions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Most financial institutions mainly use numerical statistics to detect anomalous (malpractice) activity. The textual content in financial records however contains precious information which to date has not been effectively used for detection of anomalous behaviors by users because these are often unintelligible, cluttered with abbreviations, numbers and symbols, which makes it difficult to build a framework system that can coherently understand and draw conclusions. Rule-based techniques have been proposed but such systems are easy to elude, as they are difficult to generalize and do not scale up. The work presented in this paper differs from previous work in that we exclusively base anomalous activities on text (excluding numerical values) in financial records and treat this as a classification problem for a deep learning network. We propose four solutions using deep learning techniques on textual data to distinguish between normal with anomalous behaviors of the users. The results of our experiments convincingly show that use of the textual content in financial records yields greater accuracy in anomalous behavior detection. They also suggest that deep learning is a viable and effective solution for real time anomaly detection by financial institutions.",
"fno": "08909570",
"keywords": [
"Financial Data Processing",
"Learning Artificial Intelligence",
"Security Of Data",
"Text Analysis",
"Textual Content",
"Rule Based Techniques",
"Base Anomalous Activities",
"Deep Learning Network",
"Deep Learning Techniques",
"Textual Data",
"Financial Records",
"Anomalous Behavior Detection",
"Financial Institutions",
"Deep Learning",
"Feature Extraction",
"Neural Networks",
"Semantics",
"Training",
"Graphics Processing Units",
"Anomaly Detection",
"Finance",
"Neural Networks",
"Anomaly Detection",
"Text Tagging"
],
"authors": [
{
"affiliation": "Dept. of Computer Science and Software Engineering Concordia University,Montreal,Canada",
"fullName": "Jerry G. Thomas",
"givenName": "Jerry G.",
"surname": "Thomas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Computer Science and Software Engineering Concordia University,Montreal,Canada",
"fullName": "Sudhir P. Mudur",
"givenName": "Sudhir P.",
"surname": "Mudur",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Computer Science and Software Engineering Concordia University,Montreal,Canada",
"fullName": "Nematollaah Shiri",
"givenName": "Nematollaah",
"surname": "Shiri",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-10-01T00:00:00",
"pubType": "proceedings",
"pages": "373-377",
"year": "2019",
"issn": null,
"isbn": "978-1-4503-6934-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08909404",
"articleId": "1febmNs6jSM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08909469",
"articleId": "1febqMpp58Q",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpads/2011/4576/0/4576a149",
"title": "Sorting Large Multifield Records on a GPU",
"doi": null,
"abstractUrl": "/proceedings-article/icpads/2011/4576a149/12OmNqH9hnW",
"parentPublication": {
"id": "proceedings/icpads/2011/4576/0",
"title": "Parallel and Distributed Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icci-cc/2011/1695/0/06016154",
"title": "Deep textual semantics acquisition based on the activation of domain knowledge",
"doi": null,
"abstractUrl": "/proceedings-article/icci-cc/2011/06016154/12OmNwE9OkM",
"parentPublication": {
"id": "proceedings/icci-cc/2011/1695/0",
"title": "2011 10th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI-CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2018/4210/0/421001a722",
"title": "Detecting Pyramid Scheme Accounts with Time Series Financial Transactions",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2018/421001a722/12OmNzd7blP",
"parentPublication": {
"id": "proceedings/dsc/2018/4210/0",
"title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2018/9294/0/08639413",
"title": "Human Behaviour Recognition Using Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2018/08639413/17PYEmo8Wne",
"parentPublication": {
"id": "proceedings/avss/2018/9294/0",
"title": "2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2021/0126/0/09669861",
"title": "Textual Data Augmentation for Patient Outcomes Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2021/09669861/1A9VLuIIXOo",
"parentPublication": {
"id": "proceedings/bibm/2021/0126/0",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995541",
"title": "Sequential pattern detection for identifying courses of treatment and anomalous claim behaviour in medical insurance",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995541/1JC2w5Ayop2",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/bd/2022/02/08950124",
"title": "Visual Analytics of Anomalous User Behaviors: A Survey",
"doi": null,
"abstractUrl": "/journal/bd/2022/02/08950124/1gKwHIY8sAo",
"parentPublication": {
"id": "trans/bd",
"title": "IEEE Transactions on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2021/03/09272840",
"title": "Anomalous Event Sequence Detection",
"doi": null,
"abstractUrl": "/magazine/ex/2021/03/09272840/1p6aQYYP55e",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/2022/08/09409670",
"title": "Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation",
"doi": null,
"abstractUrl": "/journal/ts/2022/08/09409670/1sXjGQWgWis",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b002",
"title": "Stock Market Trend Forecasting Based on Multiple Textual Features: A Deep Learning Method",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b002/1zw6fst33kA",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1jVQDli79II",
"title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)",
"acronym": "ssiai",
"groupId": "1000345",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1jVQE1pyMog",
"doi": "10.1109/SSIAI49293.2020.9094600",
"title": "Identifying forest thinning using anomalous change detection on synthetic aperture radar data",
"normalizedTitle": "Identifying forest thinning using anomalous change detection on synthetic aperture radar data",
"abstract": "We apply anomalous change detection (ACD) to synthetic aperture radar (SAR) data to detect forest thinning at the Valles Caldera in New Mexico. By applying ACD across dimensions other than temporal, we establish baselines for change detection. Application of ACD across different polarizations highlights anomalous relationships associated with different types of scattering mechanisms. We also introduce a metric for distinguishing between anomalies consistently present in data over time and more subtle changes which may be obscured by these anomalies. This is especially useful for analyzing SAR backscatter intensity, which can be dominated by the presence of topographic features that are not of interest.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We apply anomalous change detection (ACD) to synthetic aperture radar (SAR) data to detect forest thinning at the Valles Caldera in New Mexico. By applying ACD across dimensions other than temporal, we establish baselines for change detection. Application of ACD across different polarizations highlights anomalous relationships associated with different types of scattering mechanisms. We also introduce a metric for distinguishing between anomalies consistently present in data over time and more subtle changes which may be obscured by these anomalies. This is especially useful for analyzing SAR backscatter intensity, which can be dominated by the presence of topographic features that are not of interest.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We apply anomalous change detection (ACD) to synthetic aperture radar (SAR) data to detect forest thinning at the Valles Caldera in New Mexico. By applying ACD across dimensions other than temporal, we establish baselines for change detection. Application of ACD across different polarizations highlights anomalous relationships associated with different types of scattering mechanisms. We also introduce a metric for distinguishing between anomalies consistently present in data over time and more subtle changes which may be obscured by these anomalies. This is especially useful for analyzing SAR backscatter intensity, which can be dominated by the presence of topographic features that are not of interest.",
"fno": "09094600",
"keywords": [
"Geophysical Signal Processing",
"Radar Imaging",
"Remote Sensing By Radar",
"Synthetic Aperture Radar",
"Anomalous Change Detection",
"Synthetic Aperture Radar Data",
"ACD",
"Forest Thinning",
"SAR Backscatter Intensity",
"Synthetic Aperture Radar",
"Backscatter",
"Gold",
"Forestry",
"Scattering",
"Vegetation",
"Standards",
"Remote Sensing",
"Synthetic Aperture Radar",
"Interferometric Synthetic Aperture Radar",
"Change Detection"
],
"authors": [
{
"affiliation": "Los Alamos National Laboratory,Space Data Science and Systems Group Intelligence and Space Research Division,Los Alamos,NM,USA,87545",
"fullName": "Elena C. Reinisch",
"givenName": "Elena C.",
"surname": "Reinisch",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Los Alamos National Laboratory,Space Data Science and Systems Group Intelligence and Space Research Division,Los Alamos,NM,USA,87545",
"fullName": "James Theiler",
"givenName": "James",
"surname": "Theiler",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Los Alamos National Laboratory,Space Data Science and Systems Group Intelligence and Space Research Division,Los Alamos,NM,USA,87545",
"fullName": "Amanda Ziemann",
"givenName": "Amanda",
"surname": "Ziemann",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ssiai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-03-01T00:00:00",
"pubType": "proceedings",
"pages": "38-41",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-5745-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09094610",
"articleId": "1jVQFjzfPHO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09094603",
"articleId": "1jVQEmC59L2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aipr/2010/8833/0/05759703",
"title": "Classification of levees using polarimetric Synthetic Aperture Radar (SAR) imagery",
"doi": null,
"abstractUrl": "/proceedings-article/aipr/2010/05759703/12OmNBDyAcg",
"parentPublication": {
"id": "proceedings/aipr/2010/8833/0",
"title": "2010 IEEE 39th Applied Imagery Pattern Recognition Workshop (AIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1991/0003/0/00151025",
"title": "Phase restoration in synthetic aperture radar imaging",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1991/00151025/12OmNBuL1c1",
"parentPublication": {
"id": "proceedings/icassp/1991/0003/0",
"title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cccm/2008/3290/2/3290b462",
"title": "Simulation of Barrage-Type Jamming for Synthetic Aperture Radars",
"doi": null,
"abstractUrl": "/proceedings-article/cccm/2008/3290b462/12OmNvA1hdz",
"parentPublication": {
"id": "proceedings/cccm/2008/3290/3",
"title": "Computing, Communication, Control and Management, ISECS International Colloquium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1997/8183/1/81831845",
"title": "A statistical tomographic approach to synthetic aperture radar image reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1997/81831845/12OmNvpewaM",
"parentPublication": {
"id": "proceedings/icip/1997/8183/1",
"title": "Image Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpp/1996/7623/2/76232124",
"title": "(R) Parallel Processors for Synthetic Aperture Radar Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/icpp/1996/76232124/12OmNy3Agsw",
"parentPublication": {
"id": "proceedings/icpp/1996/7623/2",
"title": "Proceedings of the 1996 ICPP Workshop on Challenges for Parallel Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2015/6759/0/07301309",
"title": "Road segmentation using multipass single-pol synthetic aperture radar imagery",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2015/07301309/12OmNzE54zK",
"parentPublication": {
"id": "proceedings/cvprw/2015/6759/0",
"title": "2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipps/1996/7255/0/72550716",
"title": "Parallel Synthetic Aperture Radar Processing on Workstation Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ipps/1996/72550716/12OmNzVGcQU",
"parentPublication": {
"id": "proceedings/ipps/1996/7255/0",
"title": "Parallel Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/1/3962a153",
"title": "A Modified SPECAN Algorithm for Synthetic Aperture Radar Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962a153/12OmNzb7Zl8",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/1",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2005/05/i0793",
"title": "Multiregion Level-Set Partitioning of Synthetic Aperture Radar Images",
"doi": null,
"abstractUrl": "/journal/tp/2005/05/i0793/13rRUIJuxwk",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssiai/2020/5745/0/09094592",
"title": "Feature Augmentation Improves Anomalous Change Detection for Human Activity Identification in Synthetic Aperture Radar Imagery",
"doi": null,
"abstractUrl": "/proceedings-article/ssiai/2020/09094592/1jVQEMMAjfO",
"parentPublication": {
"id": "proceedings/ssiai/2020/5745/0",
"title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1qmfDJ9xfUc",
"title": "2020 30th International Telecommunication Networks and Applications Conference (ITNAC)",
"acronym": "itnac",
"groupId": "1002497",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1qmfEluwd8s",
"doi": "10.1109/ITNAC50341.2020.9315029",
"title": "Detecting Network Intrusion through Anomalous Packet Identification",
"normalizedTitle": "Detecting Network Intrusion through Anomalous Packet Identification",
"abstract": "Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Rule based intrusion detection depends on the attack signature database which has to be constantly updated, requiring time and efforts. Anomaly based intrusion detection through unsupervised methods does not require comparing with attack signatures. However, detecting anomalous behaviour is a complex task. In this paper, we have proposed an unsupervised approach for anomalous network traffic identification by combining dimensionality reduction with sub-space clustering. Our approach takes the attribute values from network traffics as input, performs principal component analysis on them, and then applies density-based clustering on each possible three dimensional sub-spaces to rank the outliers. Results show that our proposed approach detects a wide range of anomalous network session which included instances of intrusive sessions too. The evaluation of this approach showed significant accuracy and faster detection with a zero false negative rate, implying that no instance of the listed attacks went undetected.",
"fno": "09315029",
"keywords": [
"Pattern Clustering",
"Principal Component Analysis",
"Security Of Data",
"Telecommunication Traffic",
"Network Intrusion Detection",
"Anomalous Packet Identification",
"Rule Based Intrusion Detection",
"Attack Signature Database",
"Anomaly Based Intrusion Detection",
"Unsupervised Methods",
"Attack Signatures",
"Anomalous Network Traffic Identification",
"Subspace Clustering",
"Network Traffics",
"Principal Component Analysis",
"Dimensionality Reduction",
"Anomaly Detection",
"Servers",
"Communications Technology",
"Clustering Algorithms",
"Feature Extraction",
"NIDS",
"Unsupervised Learning",
"PCA",
"Density Based Clustering"
],
"authors": [
{
"affiliation": "Bangladesh University of Engineering and Technology,Department of Computer Science and Engineering,Bangladesh",
"fullName": "Tanjim Munir Dipon",
"givenName": "Tanjim",
"surname": "Munir Dipon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Bangladesh University of Engineering and Technology,Department of Computer Science and Engineering,Bangladesh",
"fullName": "Md. Shohrab Hossain",
"givenName": "Md. Shohrab",
"surname": "Hossain",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Marshall University,Weisberg Division of Computer Science,Huntington,WV,USA",
"fullName": "Husnu S. Narman",
"givenName": "Husnu S.",
"surname": "Narman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "itnac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8827-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09315049",
"articleId": "1qmfFvP6N9K",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09315007",
"articleId": "1qmfEEtWkG4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/srds/2012/2397/0/4784a001",
"title": "Detecting Anomalous User Behaviors in Workflow-Driven Web Applications",
"doi": null,
"abstractUrl": "/proceedings-article/srds/2012/4784a001/12OmNCbCrYq",
"parentPublication": {
"id": "proceedings/srds/2012/2397/0",
"title": "2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciii/2010/4279/4/4279d404",
"title": "Expert System Based Intrusion Detection System",
"doi": null,
"abstractUrl": "/proceedings-article/iciii/2010/4279d404/12OmNqBtiQd",
"parentPublication": {
"id": "proceedings/iciii/2010/4279/4",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icetet/2008/3267/0/3267b272",
"title": "Network Intrusion Detection System (NIDS)",
"doi": null,
"abstractUrl": "/proceedings-article/icetet/2008/3267b272/12OmNvF83r0",
"parentPublication": {
"id": "proceedings/icetet/2008/3267/0",
"title": "Emerging Trends in Engineering & Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mvhi/2010/4009/0/4009a476",
"title": "An Efficient Intrusion Detection Approach Based on Hidden Markov Model and Rough Set",
"doi": null,
"abstractUrl": "/proceedings-article/mvhi/2010/4009a476/12OmNyrqzBW",
"parentPublication": {
"id": "proceedings/mvhi/2010/4009/0",
"title": "Machine Vision and Human-machine Interface, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wetice/2008/3315/0/3315a263",
"title": "Defusing Intrusion Capabilities by Collaborative Anomalous Trust",
"doi": null,
"abstractUrl": "/proceedings-article/wetice/2008/3315a263/12OmNzhnaeY",
"parentPublication": {
"id": "proceedings/wetice/2008/3315/0",
"title": "2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0/806900a137",
"title": "A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2022/806900a137/1EykJBDTgL6",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0",
"title": "2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859873",
"title": "Detecting Anomalous Events from Unlabeled Videos via Temporal Masked Auto-Encoding",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859873/1G9E4T1kx7W",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi/2019/6934/0/08909570",
"title": "Detecting Anomalous Behaviour from Textual Content in Financial Records",
"doi": null,
"abstractUrl": "/proceedings-article/wi/2019/08909570/1febnpPm49y",
"parentPublication": {
"id": "proceedings/wi/2019/6934/0",
"title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn-s/2020/7260/0/726000a081",
"title": "Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection",
"doi": null,
"abstractUrl": "/proceedings-article/dsn-s/2020/726000a081/1m3ouSqlmVy",
"parentPublication": {
"id": "proceedings/dsn-s/2020/7260/0",
"title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnp/2020/6992/0/09259349",
"title": "Poster: Speeding Up Network Intrusion Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icnp/2020/09259349/1oUCKbysstG",
"parentPublication": {
"id": "proceedings/icnp/2020/6992/0",
"title": "2020 IEEE 28th International Conference on Network Protocols (ICNP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCaLEnp",
"title": "Multimedia Information Networking and Security, International Conference on",
"acronym": "mines",
"groupId": "1003021",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAqCtPQ",
"doi": "10.1109/MINES.2011.145",
"title": "A Customizable Ranking Method for Digital Evidence Search through Interestingness Injection",
"normalizedTitle": "A Customizable Ranking Method for Digital Evidence Search through Interestingness Injection",
"abstract": "Digital evidence search is one of the key issues in digital forensics. Current forensic search tools just present the results without a kind of grouping or inappropriate filtering. So a criminal investigator has to spend a lot of time in order to find documents related to the investigation among the searched results. If the interestingness of the crime investigator is injected into the system, the system can rank the search hits according to it and present the most relevant results to him. In this paper we present a customizable ranking method through injecting the interestingness of crime investigator to improve the performance of digital evidence search in email forensics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Digital evidence search is one of the key issues in digital forensics. Current forensic search tools just present the results without a kind of grouping or inappropriate filtering. So a criminal investigator has to spend a lot of time in order to find documents related to the investigation among the searched results. If the interestingness of the crime investigator is injected into the system, the system can rank the search hits according to it and present the most relevant results to him. In this paper we present a customizable ranking method through injecting the interestingness of crime investigator to improve the performance of digital evidence search in email forensics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Digital evidence search is one of the key issues in digital forensics. Current forensic search tools just present the results without a kind of grouping or inappropriate filtering. So a criminal investigator has to spend a lot of time in order to find documents related to the investigation among the searched results. If the interestingness of the crime investigator is injected into the system, the system can rank the search hits according to it and present the most relevant results to him. In this paper we present a customizable ranking method through injecting the interestingness of crime investigator to improve the performance of digital evidence search in email forensics.",
"fno": "06103774",
"keywords": [
"Document Handling",
"Law",
"Search Problems",
"Customizable Ranking Method",
"Digital Evidence Search",
"Interestingness Injection",
"Digital Forensics",
"Criminal Investigator",
"Email Forensics",
"Electronic Mail",
"Digital Forensics",
"Algorithm Design And Analysis",
"Web Search",
"Receivers",
"Digital Evidence Search",
"Email Forensics",
"Email Metadata",
"Information Retrieval",
"Interestingness Injection",
"Ranking"
],
"authors": [
{
"affiliation": null,
"fullName": "K. Venkata Krishna",
"givenName": "K. Venkata",
"surname": "Krishna",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "A. Kalpana",
"givenName": "A.",
"surname": "Kalpana",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "T. Velayutham",
"givenName": "T.",
"surname": "Velayutham",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "K. Indira",
"givenName": "K.",
"surname": "Indira",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "M.D. Kesari",
"givenName": "M.D.",
"surname": "Kesari",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mines",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-11-01T00:00:00",
"pubType": "proceedings",
"pages": "288-291",
"year": "2011",
"issn": "2162-8998",
"isbn": "978-0-7695-4559-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4559a292",
"articleId": "12OmNvmowOR",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4559a297",
"articleId": "12OmNxAlA6J",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bwcca/2011/4532/0/4532a399",
"title": "Hash-Algorithms Output for Digital Evidence in Computer Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/bwcca/2011/4532a399/12OmNBdJ5hr",
"parentPublication": {
"id": "proceedings/bwcca/2011/4532/0",
"title": "2011 International Conference on Broadband and Wireless Computing, Communication and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/collaboratecom/2013/92/0/06679965",
"title": "Towards comprehensive and collaborative forensics on email evidence",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2013/06679965/12OmNCbCrY5",
"parentPublication": {
"id": "proceedings/collaboratecom/2013/92/0",
"title": "2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2011/4485/0/4485a758",
"title": "A Discussion of Visualization Techniques for the Analysis of Digital Evidence",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2011/4485a758/12OmNCzb9xX",
"parentPublication": {
"id": "proceedings/ares/2011/4485/0",
"title": "2011 Sixth International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/2/3843b494",
"title": "Inference Model of Digital Evidence Based on cFSA",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843b494/12OmNvkYx7Y",
"parentPublication": {
"id": "proceedings/mines/2009/3843/2",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icgciot/2015/7910/0/07380677",
"title": "Search model for searching the evidence in digital forensic analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icgciot/2015/07380677/12OmNvo67Cr",
"parentPublication": {
"id": "proceedings/icgciot/2015/7910/0",
"title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ncm/2008/3322/1/3322a528",
"title": "New Digital Forensics Investigation Procedure Model",
"doi": null,
"abstractUrl": "/proceedings-article/ncm/2008/3322a528/12OmNxA3Z9g",
"parentPublication": {
"id": "proceedings/ncm/2008/3322/1",
"title": "Networked Computing and Advanced Information Management, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2009/3564/0/3564b012",
"title": "Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2009/3564b012/12OmNyUWR6m",
"parentPublication": {
"id": "proceedings/ares/2009/3564/0",
"title": "2009 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icinis/2013/2809/0/2809a033",
"title": "Research and Implementation of Digital Evidence Enforcement Protection Program",
"doi": null,
"abstractUrl": "/proceedings-article/icinis/2013/2809a033/12OmNyuy9KV",
"parentPublication": {
"id": "proceedings/icinis/2013/2809/0",
"title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asiajcis/2014/5733/0/07023253",
"title": "Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image",
"doi": null,
"abstractUrl": "/proceedings-article/asiajcis/2014/07023253/12OmNzC5SLi",
"parentPublication": {
"id": "proceedings/asiajcis/2014/5733/0",
"title": "2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029510",
"title": "Privileged Data Within Digital Evidence",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029510/17D45WK5ArY",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0",
"title": "2017 IEEE Trustcom/BigDataSE/ICESS",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBaT619",
"title": "2015 10th International Conference on Availability, Reliability and Security (ARES)",
"acronym": "ares",
"groupId": "1001707",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBIFmvy",
"doi": "10.1109/ARES.2015.32",
"title": "Gradually Improving the Forensic Process",
"normalizedTitle": "Gradually Improving the Forensic Process",
"abstract": "At the time of writing, one of the most pressing problems for forensic investigators is the huge amount of data to analyze per case. Not only the number of devices increases due to the advancing computerization of every days life, but also the storage capacity of each and every device raises into multi-terabyte storage requirements per case for forensic working images. In this paper we improve the standardized forensic process by proposing to use file deduplication across devices as well as file white listing rigorously in investigations, to reduce the amount of data that needs to be stored for analysis as early as during data acquisition. These improvements happen in an automatic fashion and completely transparent to the forensic investigator. They furthermore be added without negative effects to the chain of custody or artefact validity in court, and are evaluated in a realistic use case.",
"abstracts": [
{
"abstractType": "Regular",
"content": "At the time of writing, one of the most pressing problems for forensic investigators is the huge amount of data to analyze per case. Not only the number of devices increases due to the advancing computerization of every days life, but also the storage capacity of each and every device raises into multi-terabyte storage requirements per case for forensic working images. In this paper we improve the standardized forensic process by proposing to use file deduplication across devices as well as file white listing rigorously in investigations, to reduce the amount of data that needs to be stored for analysis as early as during data acquisition. These improvements happen in an automatic fashion and completely transparent to the forensic investigator. They furthermore be added without negative effects to the chain of custody or artefact validity in court, and are evaluated in a realistic use case.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "At the time of writing, one of the most pressing problems for forensic investigators is the huge amount of data to analyze per case. Not only the number of devices increases due to the advancing computerization of every days life, but also the storage capacity of each and every device raises into multi-terabyte storage requirements per case for forensic working images. In this paper we improve the standardized forensic process by proposing to use file deduplication across devices as well as file white listing rigorously in investigations, to reduce the amount of data that needs to be stored for analysis as early as during data acquisition. These improvements happen in an automatic fashion and completely transparent to the forensic investigator. They furthermore be added without negative effects to the chain of custody or artefact validity in court, and are evaluated in a realistic use case.",
"fno": "6590a404",
"keywords": [
"Forensics",
"Smart Phones",
"Metadata",
"NIST",
"Portable Computers",
"Software",
"File Whitelisting",
"Digital Forensics",
"Forensic Process",
"File Deduplication"
],
"authors": [
{
"affiliation": null,
"fullName": "Sebastian Neuner",
"givenName": "Sebastian",
"surname": "Neuner",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Martin Mulazzani",
"givenName": "Martin",
"surname": "Mulazzani",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sebastian Schrittwieser",
"givenName": "Sebastian",
"surname": "Schrittwieser",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Edgar Weippl",
"givenName": "Edgar",
"surname": "Weippl",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ares",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-08-01T00:00:00",
"pubType": "proceedings",
"pages": "404-410",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-6590-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "6590a397",
"articleId": "12OmNzn38X0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "6590a411",
"articleId": "12OmNy50g3X",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icisa/2010/5942/0/05480346",
"title": "A Forensic Model on Deleted-File Verification for Securing Digital Evidence",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2010/05480346/12OmNBEYzPi",
"parentPublication": {
"id": "proceedings/icisa/2010/5942/0",
"title": "2010 International Conference on Information Science and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imccc/2016/1195/0/07774829",
"title": "The Forensic Analysis of WeChat Message",
"doi": null,
"abstractUrl": "/proceedings-article/imccc/2016/07774829/12OmNC1Guhc",
"parentPublication": {
"id": "proceedings/imccc/2016/1195/0",
"title": "2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imf/2015/9902/0/07195805",
"title": "What is Essential Data in Digital Forensic Analysis?",
"doi": null,
"abstractUrl": "/proceedings-article/imf/2015/07195805/12OmNCdBDMT",
"parentPublication": {
"id": "proceedings/imf/2015/9902/0",
"title": "2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mass/2014/6036/0/6036a725",
"title": "Automated Forensic Data Acquisition in the Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2014/6036a725/12OmNqIQS5O",
"parentPublication": {
"id": "proceedings/mass/2014/6036/0",
"title": "2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2012/4745/0/4745a682",
"title": "A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2012/4745a682/12OmNvEQsdP",
"parentPublication": {
"id": "proceedings/trustcom/2012/4745/0",
"title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363340",
"title": "The Evidentiary Value of Link Files in Linux File System to Digital Forensic Investigation",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363340/12OmNwpoFCU",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2015/6590/0/6590a556",
"title": "Overview of the Forensic Investigation of Cloud Services",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2015/6590a556/12OmNy3iFr7",
"parentPublication": {
"id": "proceedings/ares/2015/6590/0",
"title": "2015 10th International Conference on Availability, Reliability and Security (ARES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363337",
"title": "Counterfeiting and Defending the Digital Forensic Process",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363337/12OmNz5JBQY",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029502",
"title": "Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029502/17D45Wt3Exe",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0",
"title": "2017 IEEE Trustcom/BigDataSE/ICESS",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pst/2022/7398/0/09851972",
"title": "Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pst/2022/09851972/1FWmkX0kgEg",
"parentPublication": {
"id": "proceedings/pst/2022/7398/0",
"title": "2022 19th Annual International Conference on Privacy, Security & Trust (PST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCfAPBA",
"title": "2012 IEEE 36th Annual Computer Software and Applications Conference Workshops",
"acronym": "compsacw",
"groupId": "1800173",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBKEyuw",
"doi": "10.1109/COMPSACW.2012.44",
"title": "Cloud Log Forensics Metadata Analysis",
"normalizedTitle": "Cloud Log Forensics Metadata Analysis",
"abstract": "The increase in the quantity and questionable quality of the forensic information retrieved from the current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses the question of what kind of information is desired from virtual machine (VM) hosted operating systems (OS) investigated by a cloud forensic examiner. The authors gives an overview of the information that exists on current VM OS by looking at it's kernel hypervisor logs and discusses the shortcomings. An examination of the role that the VM kernel hypervisor logs provide as OS metadata in cloud investigations is also presented.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The increase in the quantity and questionable quality of the forensic information retrieved from the current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses the question of what kind of information is desired from virtual machine (VM) hosted operating systems (OS) investigated by a cloud forensic examiner. The authors gives an overview of the information that exists on current VM OS by looking at it's kernel hypervisor logs and discusses the shortcomings. An examination of the role that the VM kernel hypervisor logs provide as OS metadata in cloud investigations is also presented.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The increase in the quantity and questionable quality of the forensic information retrieved from the current virtualized data cloud system architectures has made it extremely difficult for law enforcement to resolve criminal activities within these logical domains. This paper poses the question of what kind of information is desired from virtual machine (VM) hosted operating systems (OS) investigated by a cloud forensic examiner. The authors gives an overview of the information that exists on current VM OS by looking at it's kernel hypervisor logs and discusses the shortcomings. An examination of the role that the VM kernel hypervisor logs provide as OS metadata in cloud investigations is also presented.",
"fno": "4758a194",
"keywords": [
"Virtual Machine Monitors",
"Cloud Computing",
"File Systems",
"Digital Forensics",
"Kernel",
"Forensics",
"Hypervisor",
"Cloud",
"Metadata",
"Logs"
],
"authors": [
{
"affiliation": null,
"fullName": "Sean Thorpe",
"givenName": "Sean",
"surname": "Thorpe",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Indrajit Ray",
"givenName": "Indrajit",
"surname": "Ray",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tyrone Grandison",
"givenName": "Tyrone",
"surname": "Grandison",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Abbie Barbir",
"givenName": "Abbie",
"surname": "Barbir",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsacw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-07-01T00:00:00",
"pubType": "proceedings",
"pages": "194-199",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-2714-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4758a188",
"articleId": "12OmNwCJOS5",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4758a200",
"articleId": "12OmNvwkuld",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isdea/2013/4893/0/06454779",
"title": "A Log Based Approach to Make Digital Forensics Easier on Cloud Computing",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2013/06454779/12OmNAGw17a",
"parentPublication": {
"id": "proceedings/isdea/2013/4893/0",
"title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mass/2014/6036/0/6036a725",
"title": "Automated Forensic Data Acquisition in the Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2014/6036a725/12OmNqIQS5O",
"parentPublication": {
"id": "proceedings/mass/2014/6036/0",
"title": "2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2016/0990/0/0990a355",
"title": "A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2016/0990a355/12OmNqOffy6",
"parentPublication": {
"id": "proceedings/ares/2016/0990/0",
"title": "2016 11th International Conference on Availability, Reliability and Security (ARES )",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc/2016/4297/0/07828420",
"title": "A Proactive Forensics Approach for Virtual Machines via Dynamic and Static Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc/2016/07828420/12OmNrGsDlt",
"parentPublication": {
"id": "proceedings/hpcc/2016/4297/0",
"title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcsw/2013/3248/0/5023a039",
"title": "A Method to Automatically Filter Log Evidences for Intrusion Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/icdcsw/2013/5023a039/12OmNsdo6qQ",
"parentPublication": {
"id": "proceedings/icdcsw/2013/3248/0",
"title": "2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eisic/2013/5062/0/06657169",
"title": "Cloud Forensics: A Technical Approach to Virtual Machine Acquisition",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2013/06657169/12OmNx3HIc9",
"parentPublication": {
"id": "proceedings/eisic/2013/5062/0",
"title": "2013 European Intelligence and Security Informatics Conference (EISIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/services/2013/5024/0/5024a075",
"title": "Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs",
"doi": null,
"abstractUrl": "/proceedings-article/services/2013/5024a075/12OmNylKB2o",
"parentPublication": {
"id": "proceedings/services/2013/5024/0",
"title": "2013 IEEE World Congress on Services (SERVICES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/cc/2017/03/07420687",
"title": "ForenVisor: A Tool for Acquiring and Preserving Reliable Data in Cloud Live Forensics",
"doi": null,
"abstractUrl": "/journal/cc/2017/03/07420687/13rRUB7a13c",
"parentPublication": {
"id": "trans/cc",
"title": "IEEE Transactions on Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cd/2015/04/mcd2015040060",
"title": "A Cloud-Focused Mobile Forensics Methodology",
"doi": null,
"abstractUrl": "/magazine/cd/2015/04/mcd2015040060/13rRUx0Pqrz",
"parentPublication": {
"id": "mags/cd",
"title": "IEEE Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/su/2021/02/08355685",
"title": "CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics",
"doi": null,
"abstractUrl": "/journal/su/2021/02/08355685/1ugDODizHBS",
"parentPublication": {
"id": "trans/su",
"title": "IEEE Transactions on Sustainable Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwp74rg",
"title": "2015 European Intelligence and Security Informatics Conference (EISIC)",
"acronym": "eisic",
"groupId": "1800545",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBrV1PH",
"doi": "10.1109/EISIC.2015.26",
"title": "The Value of Metadata in Digital Forensics",
"normalizedTitle": "The Value of Metadata in Digital Forensics",
"abstract": "Metadata is not visible when viewing data in a number of forms such as a word document or an image. It is, however, an important consideration in the discovery of information for use in digital forensic investigations. Different types of documents and files have a number of formats and types of metadata, which can be used to discover the properties of a file, document or network activity. Moreover, Metadata is useful in many circumstances, where it can provide collaboration evidence of between groups of people, because some of them are not aware of which type of information is stored within their document. Thus, the digital forensics investigator can access to this hidden document information. In legal cases, the identification of relevant digital evidence is crucial for supporting the case, verification and an examination existing legal argument forms. In this work, we show how to use the different formats and types of metadata in order to validate the legal argument for relevant evidence.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Metadata is not visible when viewing data in a number of forms such as a word document or an image. It is, however, an important consideration in the discovery of information for use in digital forensic investigations. Different types of documents and files have a number of formats and types of metadata, which can be used to discover the properties of a file, document or network activity. Moreover, Metadata is useful in many circumstances, where it can provide collaboration evidence of between groups of people, because some of them are not aware of which type of information is stored within their document. Thus, the digital forensics investigator can access to this hidden document information. In legal cases, the identification of relevant digital evidence is crucial for supporting the case, verification and an examination existing legal argument forms. In this work, we show how to use the different formats and types of metadata in order to validate the legal argument for relevant evidence.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Metadata is not visible when viewing data in a number of forms such as a word document or an image. It is, however, an important consideration in the discovery of information for use in digital forensic investigations. Different types of documents and files have a number of formats and types of metadata, which can be used to discover the properties of a file, document or network activity. Moreover, Metadata is useful in many circumstances, where it can provide collaboration evidence of between groups of people, because some of them are not aware of which type of information is stored within their document. Thus, the digital forensics investigator can access to this hidden document information. In legal cases, the identification of relevant digital evidence is crucial for supporting the case, verification and an examination existing legal argument forms. In this work, we show how to use the different formats and types of metadata in order to validate the legal argument for relevant evidence.",
"fno": "8657a182",
"keywords": [
"Metadata",
"Digital Forensics",
"File Systems",
"XML",
"Europe",
"Investigator",
"Metadata",
"Digital Evidence",
"Digital Forensics",
"Legal Practitioner"
],
"authors": [
{
"affiliation": null,
"fullName": "Fahad Alanazi",
"givenName": "Fahad",
"surname": "Alanazi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Andrew Jones",
"givenName": "Andrew",
"surname": "Jones",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "eisic",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-09-01T00:00:00",
"pubType": "proceedings",
"pages": "182-182",
"year": "2015",
"issn": null,
"isbn": "978-1-4799-8657-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "8657a181",
"articleId": "12OmNC3FGa9",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "8657a183",
"articleId": "12OmNwseEYF",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/compsacw/2012/4758/0/4758a194",
"title": "Cloud Log Forensics Metadata Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/compsacw/2012/4758a194/12OmNBKEyuw",
"parentPublication": {
"id": "proceedings/compsacw/2012/4758/0",
"title": "2012 IEEE 36th Annual Computer Software and Applications Conference Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2015/0478/0/07507093",
"title": "Database auditing and forensics: Exploration and evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2015/07507093/12OmNvk7JXG",
"parentPublication": {
"id": "proceedings/aiccsa/2015/0478/0",
"title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363340",
"title": "The Evidentiary Value of Link Files in Linux File System to Digital Forensic Investigation",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363340/12OmNwpoFCU",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/4/3336g677",
"title": "Metadata Management Based on Set-Top Box in Digital Broadcasting Environments",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336g677/12OmNwpoFFA",
"parentPublication": {
"id": "csse/2008/3336/4",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccgi/2008/3275/0/3275a056",
"title": "Metadata Extraction from Semi-structured Email Documents",
"doi": null,
"abstractUrl": "/proceedings-article/iccgi/2008/3275a056/12OmNwtn3DP",
"parentPublication": {
"id": "proceedings/iccgi/2008/3275/0",
"title": "Computing in the Global Information Technology, International Multi-Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2015/7581/0/07406300",
"title": "Enhanced Processing of METS/MODS Library Metadata in CouchDB",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2015/07406300/12OmNzvz6MD",
"parentPublication": {
"id": "proceedings/dexa/2015/7581/0",
"title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/re/2018/7418/0/741800a124",
"title": "Automated Extraction of Semantic Legal Metadata using Natural Language Processing",
"doi": null,
"abstractUrl": "/proceedings-article/re/2018/741800a124/17D45WLdYQj",
"parentPublication": {
"id": "proceedings/re/2018/7418/0",
"title": "2018 IEEE 26th International Requirements Engineering Conference (RE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2019/01/08674170",
"title": "Recent Advancements in Digital Forensics, Part 2",
"doi": null,
"abstractUrl": "/magazine/sp/2019/01/08674170/18GGoSAPeg0",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsiot/2019/7417/0/741700a093",
"title": "Relativism Digital Forensics Investigations Model: A Case for the Emerging Economies",
"doi": null,
"abstractUrl": "/proceedings-article/icsiot/2019/741700a093/1iTuHwWsAVy",
"parentPublication": {
"id": "proceedings/icsiot/2019/7417/0",
"title": "2019 International Conference on Cyber Security and Internet of Things (ICSIoT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900b042",
"title": "Forensic Analysis of Video Files Using Metadata",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900b042/1yJYo0uZ5AY",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyugyQs",
"title": "2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)",
"acronym": "compsac",
"groupId": "1000143",
"volume": "3",
"displayVolume": "3",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC8MsrX",
"doi": "10.1109/COMPSAC.2015.164",
"title": "A Technique for Measuring Data Persistence Using the Ext4 File System Journal",
"normalizedTitle": "A Technique for Measuring Data Persistence Using the Ext4 File System Journal",
"abstract": "In this paper, we propose a method of measuring data persistence using the Ext4 journal. Digital Forensic tools and techniques are commonly used to extract data from media. A great deal of research has been dedicated to the recovery of deleted data, however, there is a lack of information on quantifying the chance that an investigator will be successful in this endeavor. To that end, we suggest the file system journal be used as a source to gather empirical evidence of data persistence, which can later be used to formulate the probability of recovering deleted data under various conditions. Knowing this probability can help investigators decide where to best invest their resources. We have implemented a proof of concept system that interrogates the Ext4 file system journal and logs relevant data. We then detail how this information can be used to track the reuse of data blocks from the examination of file system metadata structures. This preliminary design contributes a novel method of tracking deleted data persistence that can be used to generate the information necessary to formulate probability models regarding the full and/or partial recovery of deleted data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we propose a method of measuring data persistence using the Ext4 journal. Digital Forensic tools and techniques are commonly used to extract data from media. A great deal of research has been dedicated to the recovery of deleted data, however, there is a lack of information on quantifying the chance that an investigator will be successful in this endeavor. To that end, we suggest the file system journal be used as a source to gather empirical evidence of data persistence, which can later be used to formulate the probability of recovering deleted data under various conditions. Knowing this probability can help investigators decide where to best invest their resources. We have implemented a proof of concept system that interrogates the Ext4 file system journal and logs relevant data. We then detail how this information can be used to track the reuse of data blocks from the examination of file system metadata structures. This preliminary design contributes a novel method of tracking deleted data persistence that can be used to generate the information necessary to formulate probability models regarding the full and/or partial recovery of deleted data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we propose a method of measuring data persistence using the Ext4 journal. Digital Forensic tools and techniques are commonly used to extract data from media. A great deal of research has been dedicated to the recovery of deleted data, however, there is a lack of information on quantifying the chance that an investigator will be successful in this endeavor. To that end, we suggest the file system journal be used as a source to gather empirical evidence of data persistence, which can later be used to formulate the probability of recovering deleted data under various conditions. Knowing this probability can help investigators decide where to best invest their resources. We have implemented a proof of concept system that interrogates the Ext4 file system journal and logs relevant data. We then detail how this information can be used to track the reuse of data blocks from the examination of file system metadata structures. This preliminary design contributes a novel method of tracking deleted data persistence that can be used to generate the information necessary to formulate probability models regarding the full and/or partial recovery of deleted data.",
"fno": "6564c018",
"keywords": [
"File Systems",
"Media",
"Metadata",
"Data Mining",
"Digital Forensics",
"Data Structures",
"Operating Systems",
"Persistence Measurement",
"Ext 4",
"File System Forensics",
"Digital Forensics",
"Journal",
"Data Persistence",
"Data Recovery"
],
"authors": [
{
"affiliation": null,
"fullName": "Kevin D. Fairbanks",
"givenName": "Kevin D.",
"surname": "Fairbanks",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-07-01T00:00:00",
"pubType": "proceedings",
"pages": "18-23",
"year": "2015",
"issn": "0730-3157",
"isbn": "978-1-4673-6564-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "6564c017",
"articleId": "12OmNApcudf",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "6564c024",
"articleId": "12OmNAsk4BB",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ispass/2017/3890/0/07975268",
"title": "PMAL: Enabling lightweight adaptation of legacy file systems on persistent memory systems",
"doi": null,
"abstractUrl": "/proceedings-article/ispass/2017/07975268/12OmNAXPxZ5",
"parentPublication": {
"id": "proceedings/ispass/2017/3890/0",
"title": "2017 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictcs/2017/0527/0/0527a072",
"title": "A New Technique for File Carving on Hadoop Ecosystem",
"doi": null,
"abstractUrl": "/proceedings-article/ictcs/2017/0527a072/12OmNB1eJA2",
"parentPublication": {
"id": "proceedings/ictcs/2017/0527/0",
"title": "2017 International Conference on New Trends in Computing Sciences (ICTCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn/2017/0542/0/0542a073",
"title": "Reducing the “Tax” of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices",
"doi": null,
"abstractUrl": "/proceedings-article/dsn/2017/0542a073/12OmNBh8gVk",
"parentPublication": {
"id": "proceedings/dsn/2017/0542/0",
"title": "2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccd/2017/2254/0/2254a057",
"title": "A Cost-Efficient NVM-Based Journaling Scheme for File Systems",
"doi": null,
"abstractUrl": "/proceedings-article/iccd/2017/2254a057/12OmNqH9hsL",
"parentPublication": {
"id": "proceedings/iccd/2017/2254/0",
"title": "2017 IEEE 35th International Conference on Computer Design (ICCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdata-congress/2016/2622/0/07584936",
"title": "SD-HDFS: Secure Deletion in Hadoop Distributed File System",
"doi": null,
"abstractUrl": "/proceedings-article/bigdata-congress/2016/07584936/12OmNy4IF6J",
"parentPublication": {
"id": "proceedings/bigdata-congress/2016/2622/0",
"title": "2016 IEEE International Congress on Big Data (BigData Congress)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccc/2016/2657/0/2657a055",
"title": "Reviewing and Evaluating Existing File Carving Techniques for JPEG Files",
"doi": null,
"abstractUrl": "/proceedings-article/ccc/2016/2657a055/12OmNzBOhBu",
"parentPublication": {
"id": "proceedings/ccc/2016/2657/0",
"title": "2016 Cybersecurity and Cyberforensics Conference (CCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitcs/2015/6537/0/07292924",
"title": "A Phase of Deleted File Recovery for Digital Forensics Research in Tizen",
"doi": null,
"abstractUrl": "/proceedings-article/icitcs/2015/07292924/12OmNzEVRVM",
"parentPublication": {
"id": "proceedings/icitcs/2015/6537/0",
"title": "2015 5th International Conference on IT Convergence and Security (ICITCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snapi/2010/4025/0/4025a051",
"title": "BabuDB: Fast and Efficient File System Metadata Storage",
"doi": null,
"abstractUrl": "/proceedings-article/snapi/2010/4025a051/12OmNzxyiDE",
"parentPublication": {
"id": "proceedings/snapi/2010/4025/0",
"title": "Storage Network Architecture and Parallel I/Os, IEEE International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2019/03/08466031",
"title": "Optimizing File Systems with a Write-Efficient Journaling Scheme on Non-Volatile Memory",
"doi": null,
"abstractUrl": "/journal/tc/2019/03/08466031/17D45XeKgno",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006067",
"title": "Comparative Study of Wear-leveling in Solid-State Drive with NTFS File System",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006067/1hJsBk0hDOg",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBC8AAJ",
"title": "2016 IEEE Trustcom/BigDataSE/ISPA",
"acronym": "trustcom-bigdatase-i-spa",
"groupId": "1800729",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqBbHCN",
"doi": "10.1109/TrustCom.2016.0160",
"title": "Forensic Analysis of Email on Android Volatile Memory",
"normalizedTitle": "Forensic Analysis of Email on Android Volatile Memory",
"abstract": "With the popularity of smart phones and the emergence of the mobile office mode, the traditional email forensics that works for computer has been already unable to satisfy the demands of reality, so forensic work needs to be expanded to a range of mobile devices, such as mobile phone, tablet, etc. In this paper, we will focus on examining if we can discover email-related information in the volatile memory of the mobile phone. Specifically, we choose Android mobile as a research focus, and two Chinese mainstream Android email applications—MailMaster and QQMail are as email client to the experimental test. Finally, we not only sort out the email-related information stored in the volatile memory, but also identify the patterns of the information saved in the memory. Moreover, based on these patterns, we also develop a tool named EmailFinder that can automatically extract the email-related information from memory dump. It can be utilized as a forensic tool on Android phones to assist forensic investigators retrieve email-related evidence from memory dump.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the popularity of smart phones and the emergence of the mobile office mode, the traditional email forensics that works for computer has been already unable to satisfy the demands of reality, so forensic work needs to be expanded to a range of mobile devices, such as mobile phone, tablet, etc. In this paper, we will focus on examining if we can discover email-related information in the volatile memory of the mobile phone. Specifically, we choose Android mobile as a research focus, and two Chinese mainstream Android email applications—MailMaster and QQMail are as email client to the experimental test. Finally, we not only sort out the email-related information stored in the volatile memory, but also identify the patterns of the information saved in the memory. Moreover, based on these patterns, we also develop a tool named EmailFinder that can automatically extract the email-related information from memory dump. It can be utilized as a forensic tool on Android phones to assist forensic investigators retrieve email-related evidence from memory dump.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the popularity of smart phones and the emergence of the mobile office mode, the traditional email forensics that works for computer has been already unable to satisfy the demands of reality, so forensic work needs to be expanded to a range of mobile devices, such as mobile phone, tablet, etc. In this paper, we will focus on examining if we can discover email-related information in the volatile memory of the mobile phone. Specifically, we choose Android mobile as a research focus, and two Chinese mainstream Android email applications—MailMaster and QQMail are as email client to the experimental test. Finally, we not only sort out the email-related information stored in the volatile memory, but also identify the patterns of the information saved in the memory. Moreover, based on these patterns, we also develop a tool named EmailFinder that can automatically extract the email-related information from memory dump. It can be utilized as a forensic tool on Android phones to assist forensic investigators retrieve email-related evidence from memory dump.",
"fno": "07847043",
"keywords": [
"Smart Phones",
"Electronic Mail",
"Forensics",
"Kernel",
"Data Mining",
"Mobile Communication",
"Email Related Information",
"Email Forensics",
"Volatile Memory",
"Email Client",
"Patterns"
],
"authors": [
{
"affiliation": null,
"fullName": "Long Chen",
"givenName": "Long",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yue Mao",
"givenName": "Yue",
"surname": "Mao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "trustcom-bigdatase-i-spa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-08-01T00:00:00",
"pubType": "proceedings",
"pages": "945-951",
"year": "2016",
"issn": "2324-9013",
"isbn": "978-1-5090-3205-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07847042",
"articleId": "12OmNvkGW56",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07847044",
"articleId": "12OmNscfHYD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/imf/2014/4330/0/06824082",
"title": "Post-Mortem Memory Analysis of Cold-Booted Android Devices",
"doi": null,
"abstractUrl": "/proceedings-article/imf/2014/06824082/12OmNAQJzNl",
"parentPublication": {
"id": "proceedings/imf/2014/4330/0",
"title": "2014 Eighth International Conference on IT Security Incident Management & IT Forensics (IMF)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2016/0990/0/0990a321",
"title": "Identification and Analysis of Email and Contacts Artefacts on iOS and OS X",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2016/0990a321/12OmNB06l2G",
"parentPublication": {
"id": "proceedings/ares/2016/0990/0",
"title": "2016 11th International Conference on Availability, Reliability and Security (ARES )",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/collaboratecom/2013/92/0/06679965",
"title": "Towards comprehensive and collaborative forensics on email evidence",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2013/06679965/12OmNCbCrY5",
"parentPublication": {
"id": "proceedings/collaboratecom/2013/92/0",
"title": "2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2009/3564/0/3564a995",
"title": "Enhancement of Forensic Computing Investigations through Memory Forensic Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2009/3564a995/12OmNwtn3u6",
"parentPublication": {
"id": "proceedings/ares/2009/3564/0",
"title": "2009 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pst/2014/3502/0/06890937",
"title": "A forensic analysis framework for recovering encryption keys and BB10 backup decryption",
"doi": null,
"abstractUrl": "/proceedings-article/pst/2014/06890937/12OmNyFCw2y",
"parentPublication": {
"id": "proceedings/pst/2014/3502/0",
"title": "2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/est/2015/9799/0/9799a013",
"title": "Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms",
"doi": null,
"abstractUrl": "/proceedings-article/est/2015/9799a013/12OmNyQYt6K",
"parentPublication": {
"id": "proceedings/est/2015/9799/0",
"title": "2015 Sixth International Conference on Emerging Security Technologies (EST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2018/3652/0/08390330",
"title": "Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2018/08390330/12OmNyUWR2A",
"parentPublication": {
"id": "proceedings/icnc/2018/3652/0",
"title": "2018 International Conference on Computing, Networking and Communications (ICNC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eisic/2013/5062/0/06657168",
"title": "Forensic Data Recovery from Android OS Devices: An Open Source Toolkit",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2013/06657168/12OmNybfqWB",
"parentPublication": {
"id": "proceedings/eisic/2013/5062/0",
"title": "2013 European Intelligence and Security Informatics Conference (EISIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccc/2016/2657/0/2657a048",
"title": "Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks",
"doi": null,
"abstractUrl": "/proceedings-article/ccc/2016/2657a048/12OmNzkMlMP",
"parentPublication": {
"id": "proceedings/ccc/2016/2657/0",
"title": "2016 Cybersecurity and Cyberforensics Conference (CCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wdfia/2008/3362/0/3362a046",
"title": "Forensic Value of Backscatter from Email Spam",
"doi": null,
"abstractUrl": "/proceedings-article/wdfia/2008/3362a046/12OmNzlUKf6",
"parentPublication": {
"id": "proceedings/wdfia/2008/3362/0",
"title": "Workshop on Digital Forensics and Incident Analysis, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNANkoaa",
"title": "2016 Cybersecurity and Cyberforensics Conference (CCC)",
"acronym": "ccc",
"groupId": "1815564",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwp74N3",
"doi": "10.1109/CCC.2016.18",
"title": "Windows Forensic Investigations Using PowerForensics Tool",
"normalizedTitle": "Windows Forensic Investigations Using PowerForensics Tool",
"abstract": "Digital forensic investigations has become an important field in this era due to the raise of cybercrimes. Therefore, most governments and companies found the urgent need to invest more in research related to digital forensic investigations. To perform digital forensic investigations covering extraction, analysis, and reporting of digital evidences, new methods and techniques are required. One of these methods used when applying digital forensics on a Windows operating system, is PowerShell. While PowerShell is mainly used to configure, manage and administrate the Windows operating system and other installed programs, this paper will also show that it could be used to collect forensic evidences from a Windows operating system. This paper will discuss Windows PowerShell functions and how they can be beneficiary to a digital forensic investigator. Moreover, the paper will focus on the tools and modules made specifically for forensic investigations. Subsequently, different digital forensic experiments will be conducted using PowerForensics tool in order to extract and identify different Windows forensic artifacts. The results are presented the capabilities of PowerForensics tool to extract forensic evidences from Windows operating system and provide an insight into its limitations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Digital forensic investigations has become an important field in this era due to the raise of cybercrimes. Therefore, most governments and companies found the urgent need to invest more in research related to digital forensic investigations. To perform digital forensic investigations covering extraction, analysis, and reporting of digital evidences, new methods and techniques are required. One of these methods used when applying digital forensics on a Windows operating system, is PowerShell. While PowerShell is mainly used to configure, manage and administrate the Windows operating system and other installed programs, this paper will also show that it could be used to collect forensic evidences from a Windows operating system. This paper will discuss Windows PowerShell functions and how they can be beneficiary to a digital forensic investigator. Moreover, the paper will focus on the tools and modules made specifically for forensic investigations. Subsequently, different digital forensic experiments will be conducted using PowerForensics tool in order to extract and identify different Windows forensic artifacts. The results are presented the capabilities of PowerForensics tool to extract forensic evidences from Windows operating system and provide an insight into its limitations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Digital forensic investigations has become an important field in this era due to the raise of cybercrimes. Therefore, most governments and companies found the urgent need to invest more in research related to digital forensic investigations. To perform digital forensic investigations covering extraction, analysis, and reporting of digital evidences, new methods and techniques are required. One of these methods used when applying digital forensics on a Windows operating system, is PowerShell. While PowerShell is mainly used to configure, manage and administrate the Windows operating system and other installed programs, this paper will also show that it could be used to collect forensic evidences from a Windows operating system. This paper will discuss Windows PowerShell functions and how they can be beneficiary to a digital forensic investigator. Moreover, the paper will focus on the tools and modules made specifically for forensic investigations. Subsequently, different digital forensic experiments will be conducted using PowerForensics tool in order to extract and identify different Windows forensic artifacts. The results are presented the capabilities of PowerForensics tool to extract forensic evidences from Windows operating system and provide an insight into its limitations.",
"fno": "2657a041",
"keywords": [
"Operating Systems",
"Data Mining",
"File Systems",
"Digital Forensics",
"Computers",
"Digital Investigation",
"Power Shell Forensics",
"Power Forensics",
"Windows Forensics",
"Winodws Artifact"
],
"authors": [
{
"affiliation": null,
"fullName": "Akram Barakat",
"givenName": "Akram",
"surname": "Barakat",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ali Hadi",
"givenName": "Ali",
"surname": "Hadi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ccc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-08-01T00:00:00",
"pubType": "proceedings",
"pages": "41-47",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-2657-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2657a035",
"articleId": "12OmNBubOXb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2657a048",
"articleId": "12OmNzkMlMP",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/est/2012/4791/0/4791a103",
"title": "User-Contributory Case-Based Reasoning for Digital Forensic Investigations",
"doi": null,
"abstractUrl": "/proceedings-article/est/2012/4791a103/12OmNBSSVlF",
"parentPublication": {
"id": "proceedings/est/2012/4791/0",
"title": "2012 Third International Conference on Emerging Security Technologies",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2012/4745/0/4745a682",
"title": "A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2012/4745a682/12OmNvEQsdP",
"parentPublication": {
"id": "proceedings/trustcom/2012/4745/0",
"title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sadfe/2010/4052/0/4052a033",
"title": "Formal Digital Investigation of Anti-forensic Attacks",
"doi": null,
"abstractUrl": "/proceedings-article/sadfe/2010/4052a033/12OmNwE9Ore",
"parentPublication": {
"id": "proceedings/sadfe/2010/4052/0",
"title": "2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363340",
"title": "The Evidentiary Value of Link Files in Linux File System to Digital Forensic Investigation",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363340/12OmNwpoFCU",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2009/3564/0/3564a995",
"title": "Enhancement of Forensic Computing Investigations through Memory Forensic Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2009/3564a995/12OmNwtn3u6",
"parentPublication": {
"id": "proceedings/ares/2009/3564/0",
"title": "2009 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/est/2015/9799/0/9799a013",
"title": "Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms",
"doi": null,
"abstractUrl": "/proceedings-article/est/2015/9799a013/12OmNyQYt6K",
"parentPublication": {
"id": "proceedings/est/2015/9799/0",
"title": "2015 Sixth International Conference on Emerging Security Technologies (EST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363337",
"title": "Counterfeiting and Defending the Digital Forensic Process",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363337/12OmNz5JBQY",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029499",
"title": "Enhanced Operating System Protection to Support Digital Forensic Investigations",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029499/17D45WZZ7Ee",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0",
"title": "2017 IEEE Trustcom/BigDataSE/ICESS",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276850",
"title": "A Forensic Investigation of the Robot Operating System",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276850/17D45Xcttnk",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0",
"title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smartiot/2021/4511/0/451100a001",
"title": "Forensic Tools for IoT Device Investigations in regards to Human Trafficking",
"doi": null,
"abstractUrl": "/proceedings-article/smartiot/2021/451100a001/1xDQbMoRMje",
"parentPublication": {
"id": "proceedings/smartiot/2021/4511/0",
"title": "2021 IEEE International Conference on Smart Internet of Things (SmartIoT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvA1hvi",
"title": "2009 International Conference on Availability, Reliability and Security",
"acronym": "ares",
"groupId": "1001707",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyUWR6m",
"doi": "10.1109/ARES.2009.120",
"title": "Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation",
"normalizedTitle": "Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation",
"abstract": "This paper focuses on establishing the need for new architectures on which to build visualisation systems that enhance computer forensic investigation of digital evidence. The issues surrounding processing of large quantities of digital evidence are established. In addition, the current state of visualisation and data analysis techniques for computer forensics are highlighted. This paper suggests need for new visualisation techniques in order to display data in familiar visual forms that facilitate efficient insight gaining into digital evidence. Visualisations techniques also require a source of processed data that contains context relevant information to present to an investigator. To this end this paper introduces the notion of data exploitation as a way to describe techniques that provide opportunistic data analysis across multiple sources of digital evidence. Data exploitation techniques provide normalisation techniques, event correlation, relationship extraction and investigative domain knowledge processing to occur across a set of evidence. This enables a visual representation of digital evidence to highlight relationships and events across many data sources, support an investigator throughout the entire data analysis process and enable an investigator to focus on the context of the current crime.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper focuses on establishing the need for new architectures on which to build visualisation systems that enhance computer forensic investigation of digital evidence. The issues surrounding processing of large quantities of digital evidence are established. In addition, the current state of visualisation and data analysis techniques for computer forensics are highlighted. This paper suggests need for new visualisation techniques in order to display data in familiar visual forms that facilitate efficient insight gaining into digital evidence. Visualisations techniques also require a source of processed data that contains context relevant information to present to an investigator. To this end this paper introduces the notion of data exploitation as a way to describe techniques that provide opportunistic data analysis across multiple sources of digital evidence. Data exploitation techniques provide normalisation techniques, event correlation, relationship extraction and investigative domain knowledge processing to occur across a set of evidence. This enables a visual representation of digital evidence to highlight relationships and events across many data sources, support an investigator throughout the entire data analysis process and enable an investigator to focus on the context of the current crime.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper focuses on establishing the need for new architectures on which to build visualisation systems that enhance computer forensic investigation of digital evidence. The issues surrounding processing of large quantities of digital evidence are established. In addition, the current state of visualisation and data analysis techniques for computer forensics are highlighted. This paper suggests need for new visualisation techniques in order to display data in familiar visual forms that facilitate efficient insight gaining into digital evidence. Visualisations techniques also require a source of processed data that contains context relevant information to present to an investigator. To this end this paper introduces the notion of data exploitation as a way to describe techniques that provide opportunistic data analysis across multiple sources of digital evidence. Data exploitation techniques provide normalisation techniques, event correlation, relationship extraction and investigative domain knowledge processing to occur across a set of evidence. This enables a visual representation of digital evidence to highlight relationships and events across many data sources, support an investigator throughout the entire data analysis process and enable an investigator to focus on the context of the current crime.",
"fno": "3564b012",
"keywords": [
"Computer Forensics",
"Visualisation",
"Data Exploitation",
"Visual Data Analysis",
"Digital Evidence"
],
"authors": [
{
"affiliation": null,
"fullName": "Grant Osborne",
"givenName": "Grant",
"surname": "Osborne",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Benjamin Turnbull",
"givenName": "Benjamin",
"surname": "Turnbull",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ares",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1012-1017",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3564-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3564b006",
"articleId": "12OmNwudQSC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3564b018",
"articleId": "12OmNxbW4Wg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/eisic/2015/8657/0/8657a182",
"title": "The Value of Metadata in Digital Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2015/8657a182/12OmNBrV1PH",
"parentPublication": {
"id": "proceedings/eisic/2015/8657/0",
"title": "2015 European Intelligence and Security Informatics Conference (EISIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2007/2928/0/29280321",
"title": "Animating and Interacting with Graphical Evidence : Bringing Courtrooms to Life with Virtual Reconstructions",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2007/29280321/12OmNrkBwIC",
"parentPublication": {
"id": "proceedings/cgiv/2007/2928/0",
"title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/2/3843b494",
"title": "Inference Model of Digital Evidence Based on cFSA",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843b494/12OmNvkYx7Y",
"parentPublication": {
"id": "proceedings/mines/2009/3843/2",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2010/3965/0/3965a629",
"title": "The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2010/3965a629/12OmNxdDFQp",
"parentPublication": {
"id": "proceedings/ares/2010/3965/0",
"title": "2010 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iitsi/2010/4020/0/4020a649",
"title": "Research on the Key Technology of Secure Computer Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/iitsi/2010/4020a649/12OmNyp9Mpx",
"parentPublication": {
"id": "proceedings/iitsi/2010/4020/0",
"title": "Intelligent Information Technology and Security Informatics, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsacw/2012/4758/0/4758a213",
"title": "Development of InfoVis Software for Digital Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/compsacw/2012/4758a213/12OmNyqRn3Q",
"parentPublication": {
"id": "proceedings/compsacw/2012/4758/0",
"title": "2012 IEEE 36th Annual Computer Software and Applications Conference Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itng/2015/8828/0/8828a163",
"title": "Data Warehousing Based Computer Forensics Investigation Framework",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2015/8828a163/12OmNyqiaVe",
"parentPublication": {
"id": "proceedings/itng/2015/8828/0",
"title": "2015 12th International Conference on Information Technology - New Generations (ITNG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2008/3102/0/3102b377",
"title": "Proposal for Efficient Searching and Presentation in Digital Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2008/3102b377/12OmNzFv4i2",
"parentPublication": {
"id": "proceedings/ares/2008/3102/0",
"title": "2008 Third International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wdfia/2008/3362/0/3362a021",
"title": "Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics",
"doi": null,
"abstractUrl": "/proceedings-article/wdfia/2008/3362a021/12OmNzG4gAK",
"parentPublication": {
"id": "proceedings/wdfia/2008/3362/0",
"title": "Workshop on Digital Forensics and Incident Analysis, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2008/3102/0/3102a026",
"title": "Finding Evidence of Antedating in Digital Investigations",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2008/3102a026/12OmNzV70ki",
"parentPublication": {
"id": "proceedings/ares/2008/3102/0",
"title": "2008 Third International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1mqcuTXwwOk",
"title": "2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)",
"acronym": "cscloud-edgecom",
"groupId": "1811044",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1mqcwBFGuc0",
"doi": "10.1109/CSCloud-EdgeCom49738.2020.00017",
"title": "Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator’s Guide",
"normalizedTitle": "Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator’s Guide",
"abstract": "Wearable technology, such as Fitbit devices, log a user’s daily activities, heart rate, calories burned, step count, and sleep activity. This information is valuable to digital forensic investigators as it may serve as evidence to a crime, to either support a suspect’s innocence or guilt. It is important for an investigator to find and analyze every piece of data for accuracy and integrity; however, there is no standard for conducting a forensic investigation for wearable technology. In this paper, we conduct a forensic analysis of two different Fitbit devices using open-source tools. It is the responsibility of the investigator to show how the data was obtained and to ensure that the data was not modified during the analysis. This paper will guide investigators in understanding what data is collected by a Fitbit device (specifically the Ionic smartwatch and Alta tracker), how to handle Fitbit devices, and how to extract and forensically analyze said devices using open-source tools, Autopsy Sleuth Kit and Bulk Extractor Viewer.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Wearable technology, such as Fitbit devices, log a user’s daily activities, heart rate, calories burned, step count, and sleep activity. This information is valuable to digital forensic investigators as it may serve as evidence to a crime, to either support a suspect’s innocence or guilt. It is important for an investigator to find and analyze every piece of data for accuracy and integrity; however, there is no standard for conducting a forensic investigation for wearable technology. In this paper, we conduct a forensic analysis of two different Fitbit devices using open-source tools. It is the responsibility of the investigator to show how the data was obtained and to ensure that the data was not modified during the analysis. This paper will guide investigators in understanding what data is collected by a Fitbit device (specifically the Ionic smartwatch and Alta tracker), how to handle Fitbit devices, and how to extract and forensically analyze said devices using open-source tools, Autopsy Sleuth Kit and Bulk Extractor Viewer.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Wearable technology, such as Fitbit devices, log a user’s daily activities, heart rate, calories burned, step count, and sleep activity. This information is valuable to digital forensic investigators as it may serve as evidence to a crime, to either support a suspect’s innocence or guilt. It is important for an investigator to find and analyze every piece of data for accuracy and integrity; however, there is no standard for conducting a forensic investigation for wearable technology. In this paper, we conduct a forensic analysis of two different Fitbit devices using open-source tools. It is the responsibility of the investigator to show how the data was obtained and to ensure that the data was not modified during the analysis. This paper will guide investigators in understanding what data is collected by a Fitbit device (specifically the Ionic smartwatch and Alta tracker), how to handle Fitbit devices, and how to extract and forensically analyze said devices using open-source tools, Autopsy Sleuth Kit and Bulk Extractor Viewer.",
"fno": "09170971",
"keywords": [
"Data Visualisation",
"Digital Forensics",
"File Organisation",
"Public Domain Software",
"Wearable Computers",
"Digital Forensic Analysis",
"Fitbit Wearable Technology",
"Investigator",
"Fitbit Device",
"User",
"Heart Rate",
"Step Count",
"Sleep Activity",
"Digital Forensic Investigators",
"Suspect",
"Forensic Investigation",
"Different Fitbit Devices",
"Open Source Tools",
"Heart Rate",
"Cloud Computing",
"Conferences",
"Autopsy",
"Digital Forensics",
"Layout",
"Data Mining",
"Digital Forensics",
"Wearable Technology",
"Digital Analysis",
"Application Forensics",
"Opensource",
"Fitbit"
],
"authors": [
{
"affiliation": "Information Security Institute Johns Hopkins University,Baltimore,USA",
"fullName": "Atheer Almogbil",
"givenName": "Atheer",
"surname": "Almogbil",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Security Institute Johns Hopkins University,Baltimore,USA",
"fullName": "Abdullah Alghofaili",
"givenName": "Abdullah",
"surname": "Alghofaili",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Security Institute Johns Hopkins University,Baltimore,USA",
"fullName": "Chelsea Deane",
"givenName": "Chelsea",
"surname": "Deane",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Security Institute Johns Hopkins University,Baltimore,USA",
"fullName": "Timothy Leschke",
"givenName": "Timothy",
"surname": "Leschke",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Cybersecurity Technologies King AbdulAziz City for Science & Technology,Riyadh,Saudi Arabia",
"fullName": "Atheer Almogbil",
"givenName": "Atheer",
"surname": "Almogbil",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "King Saud University,Information Systems Department,Riyadh,Saudi Arabia",
"fullName": "Abdullah Alghofaili",
"givenName": "Abdullah",
"surname": "Alghofaili",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cscloud-edgecom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-08-01T00:00:00",
"pubType": "proceedings",
"pages": "44-49",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-6550-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09170997",
"articleId": "1mqcwRC3L6E",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09170970",
"articleId": "1mqcyGAH7UI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ares/2015/6590/0/6590a404",
"title": "Gradually Improving the Forensic Process",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2015/6590a404/12OmNBIFmvy",
"parentPublication": {
"id": "proceedings/ares/2015/6590/0",
"title": "2015 10th International Conference on Availability, Reliability and Security (ARES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2009/3564/0/3564a995",
"title": "Enhancement of Forensic Computing Investigations through Memory Forensic Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2009/3564a995/12OmNwtn3u6",
"parentPublication": {
"id": "proceedings/ares/2009/3564/0",
"title": "2009 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2018/5395/0/539501a380",
"title": "An Application of Semantic Techniques for Forensic Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2018/539501a380/12OmNxA3Z0N",
"parentPublication": {
"id": "proceedings/waina/2018/5395/0",
"title": "2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iih-msp/2011/4517/0/4517a378",
"title": "Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers",
"doi": null,
"abstractUrl": "/proceedings-article/iih-msp/2011/4517a378/12OmNyNzhzo",
"parentPublication": {
"id": "proceedings/iih-msp/2011/4517/0",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b446",
"title": "A Forensic Investigation Framework for Smart Home Environment",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b446/17D45W9KVGs",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase/2018/4388/0",
"title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b664",
"title": "Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b664/17D45WwsQ5E",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase/2018/4388/0",
"title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/2022/02/09714097",
"title": "A Multilevel Collective Framework for Internet of Things Digital Forensic Investigation",
"doi": null,
"abstractUrl": "/magazine/co/2022/02/09714097/1AZLej2jOFy",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2020/9429/0/942900a510",
"title": "Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2020/942900a510/1mLMlUZYaYw",
"parentPublication": {
"id": "proceedings/cbms/2020/9429/0",
"title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cscloud-edgecom/2020/6550/0/09170981",
"title": "The Accuracy of GPS-Enabled Fitbit Activities as Evidence: A Digital Forensics Study",
"doi": null,
"abstractUrl": "/proceedings-article/cscloud-edgecom/2020/09170981/1mqcyyUFOMw",
"parentPublication": {
"id": "proceedings/cscloud-edgecom/2020/6550/0",
"title": "2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spw/2021/3732/0/373200a318",
"title": "Forensic Analysis of Fitbit Versa: Android vs iOS",
"doi": null,
"abstractUrl": "/proceedings-article/spw/2021/373200a318/1v56qeS7Ru0",
"parentPublication": {
"id": "proceedings/spw/2021/3732/0",
"title": "2021 IEEE Security and Privacy Workshops (SPW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1wzs0vrjyWQ",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1yJYo0uZ5AY",
"doi": "10.1109/CVPRW53098.2021.00115",
"title": "Forensic Analysis of Video Files Using Metadata",
"normalizedTitle": "Forensic Analysis of Video Files Using Metadata",
"abstract": "The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, brand of video recording device, the type of video editing tool, and other important evidence. In this paper, we focus on the metadata contained in the popular MP4 video wrapper/container. We describe our method for metadata extractor that uses the MP4’s tree structure. Our approach for analyzing the video metadata produces a more compact representation. We will describe how we construct features from the metadata and then use dimensionality reduction and nearest neighbor classification for forensic analysis of a video file. Our approach allows one to visually inspect the distribution of metadata features and make decisions. The experimental results confirm that the performance of our approach surpasses other methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, brand of video recording device, the type of video editing tool, and other important evidence. In this paper, we focus on the metadata contained in the popular MP4 video wrapper/container. We describe our method for metadata extractor that uses the MP4’s tree structure. Our approach for analyzing the video metadata produces a more compact representation. We will describe how we construct features from the metadata and then use dimensionality reduction and nearest neighbor classification for forensic analysis of a video file. Our approach allows one to visually inspect the distribution of metadata features and make decisions. The experimental results confirm that the performance of our approach surpasses other methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, brand of video recording device, the type of video editing tool, and other important evidence. In this paper, we focus on the metadata contained in the popular MP4 video wrapper/container. We describe our method for metadata extractor that uses the MP4’s tree structure. Our approach for analyzing the video metadata produces a more compact representation. We will describe how we construct features from the metadata and then use dimensionality reduction and nearest neighbor classification for forensic analysis of a video file. Our approach allows one to visually inspect the distribution of metadata features and make decisions. The experimental results confirm that the performance of our approach surpasses other methods.",
"fno": "489900b042",
"keywords": [
"Information Retrieval",
"Meta Data",
"Pattern Classification",
"Video Recording",
"Video Signal Processing",
"Forensic Analysis",
"Video File",
"Unprecedented Ease",
"Video Content",
"Manipulated Media",
"Video Editing Tool",
"Metadata Information",
"Video Manipulations",
"Video Recording Device",
"Metadata Extractor",
"MP 4 S Tree Structure",
"Video Metadata",
"Metadata Features",
"Dimensionality Reduction",
"Social Networking Online",
"Forensics",
"Metadata",
"Tools",
"Streaming Media",
"Media"
],
"authors": [
{
"affiliation": "Purdue University,Video and Image Processing Lab (VIPER), School of Electrical and Computer Engineering,West Lafayette,Indiana,USA",
"fullName": "Ziyue Xiang",
"givenName": "Ziyue",
"surname": "Xiang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Purdue University,Video and Image Processing Lab (VIPER), School of Electrical and Computer Engineering,West Lafayette,Indiana,USA",
"fullName": "János Horváth",
"givenName": "János",
"surname": "Horváth",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Purdue University,Video and Image Processing Lab (VIPER), School of Electrical and Computer Engineering,West Lafayette,Indiana,USA",
"fullName": "Sriram Baireddy",
"givenName": "Sriram",
"surname": "Baireddy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Politecnico di Milano,Informazione e Bioingegneria,Dipartimento di Elettronica,Milano,Italy",
"fullName": "Paolo Bestagini",
"givenName": "Paolo",
"surname": "Bestagini",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Politecnico di Milano,Informazione e Bioingegneria,Dipartimento di Elettronica,Milano,Italy",
"fullName": "Stefano Tubaro",
"givenName": "Stefano",
"surname": "Tubaro",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Purdue University,Video and Image Processing Lab (VIPER), School of Electrical and Computer Engineering,West Lafayette,Indiana,USA",
"fullName": "Edward J. Delp",
"givenName": "Edward J.",
"surname": "Delp",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1042-1051",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4899-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1yZ4pPypwOI",
"name": "pcvprw202148990-09523116s1-mm_489900b042.zip",
"size": "125 kB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvprw202148990-09523116s1-mm_489900b042.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "489900b032",
"articleId": "1yVA42eUHeg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "489900b052",
"articleId": "1yJYhCJ2ZjO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ism/2016/4571/0/4571a640",
"title": "RTP/RTCP Reception Hint Tracks for Video Call Recording and Playback",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2016/4571a640/12OmNqIhFPL",
"parentPublication": {
"id": "proceedings/ism/2016/4571/0",
"title": "2016 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2009/3557/2/3557d068",
"title": "A Novel Algorithm for Video Retrieval Using Video Metadata Information",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2009/3557d068/12OmNscOUbo",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2002/1695/2/169521031",
"title": "Video Editing Support System Based on Video Grammar and Content Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2002/169521031/12OmNyOq4SU",
"parentPublication": {
"id": "proceedings/icpr/2002/1695/2",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smap/2015/0242/0/07370092",
"title": "Short video metadata acquisition game",
"doi": null,
"abstractUrl": "/proceedings-article/smap/2015/07370092/12OmNyfdOWB",
"parentPublication": {
"id": "proceedings/smap/2015/0242/0",
"title": "2015 10th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2004/8603/1/01394118",
"title": "Content based editing of semantic video metadata",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394118/12OmNylKB5A",
"parentPublication": {
"id": "proceedings/icme/2004/8603/1",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/mu/2015/01/mmu2015010080",
"title": "The Green Metadata Standard for Energy-Efficient Video Consumption",
"doi": null,
"abstractUrl": "/magazine/mu/2015/01/mmu2015010080/13rRUygBwbp",
"parentPublication": {
"id": "mags/mu",
"title": "IEEE MultiMedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/2019/01/08344562",
"title": "Mobile Display Power Reduction for Video Using Standardized Metadata",
"doi": null,
"abstractUrl": "/journal/tm/2019/01/08344562/17D45X2fUFq",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2022/6124/0/612400a495",
"title": "Automated metadata extraction: challenges and opportunities",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2022/612400a495/1J6hyVZtdVS",
"parentPublication": {
"id": "proceedings/e-science/2022/6124/0",
"title": "2022 IEEE 18th International Conference on e-Science (e-Science)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wetice/2019/0676/0/067600a301",
"title": "Empirical Analysis of Semantic Metadata Extraction from Video Lecture Subtitles",
"doi": null,
"abstractUrl": "/proceedings-article/wetice/2019/067600a301/1cJ1rDSkKxG",
"parentPublication": {
"id": "proceedings/wetice/2019/0676/0",
"title": "2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900b701",
"title": "Editing like Humans: A Contextual, Multimodal Framework for Automated Video Editing",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900b701/1yXsBnK5gYw",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzX6ceh",
"title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)",
"acronym": "icde",
"groupId": "1000178",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBPtJEZ",
"doi": "10.1109/ICDE.2016.7498229",
"title": "Crowdsourced POI labelling: Location-aware result inference and Task Assignment",
"normalizedTitle": "Crowdsourced POI labelling: Location-aware result inference and Task Assignment",
"abstract": "Identifying the labels of points of interest (POIs), aka POI labelling, provides significant benefits in location-based services. However, the quality of raw labels manually added by users or generated by artificial algorithms cannot be guaranteed. Such low-quality labels decrease the usability and result in bad user experiences. In this paper, by observing that crowdsourcing is a best-fit for computer-hard tasks, we leverage crowdsourcing to improve the quality of POI labelling. To our best knowledge, this is the first work on crowdsourced POI labelling tasks. In particular, there are two sub-problems: (1) how to infer the correct labels for each POI based on workers' answers, and (2) how to effectively assign proper tasks to workers in order to make more accurate inference for next available workers. To address these two problems, we propose a framework consisting of an inference model and an online task assigner. The inference model measures the quality of a worker on a POI by elaborately exploiting (i) worker's inherent quality, (ii) the spatial distance between the worker and the POI, and (iii) the POI influence, which can provide reliable inference results once a worker submits an answer. As workers are dynamically coming, the online task assigner judiciously assigns proper tasks to them so as to benefit the inference. The inference model and task assigner work alternately to continuously improve the overall quality. We conduct extensive experiments on a real crowdsourcing platform, and the results on two real datasets show that our method significantly outperforms state-of-the-art approaches.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Identifying the labels of points of interest (POIs), aka POI labelling, provides significant benefits in location-based services. However, the quality of raw labels manually added by users or generated by artificial algorithms cannot be guaranteed. Such low-quality labels decrease the usability and result in bad user experiences. In this paper, by observing that crowdsourcing is a best-fit for computer-hard tasks, we leverage crowdsourcing to improve the quality of POI labelling. To our best knowledge, this is the first work on crowdsourced POI labelling tasks. In particular, there are two sub-problems: (1) how to infer the correct labels for each POI based on workers' answers, and (2) how to effectively assign proper tasks to workers in order to make more accurate inference for next available workers. To address these two problems, we propose a framework consisting of an inference model and an online task assigner. The inference model measures the quality of a worker on a POI by elaborately exploiting (i) worker's inherent quality, (ii) the spatial distance between the worker and the POI, and (iii) the POI influence, which can provide reliable inference results once a worker submits an answer. As workers are dynamically coming, the online task assigner judiciously assigns proper tasks to them so as to benefit the inference. The inference model and task assigner work alternately to continuously improve the overall quality. We conduct extensive experiments on a real crowdsourcing platform, and the results on two real datasets show that our method significantly outperforms state-of-the-art approaches.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Identifying the labels of points of interest (POIs), aka POI labelling, provides significant benefits in location-based services. However, the quality of raw labels manually added by users or generated by artificial algorithms cannot be guaranteed. Such low-quality labels decrease the usability and result in bad user experiences. In this paper, by observing that crowdsourcing is a best-fit for computer-hard tasks, we leverage crowdsourcing to improve the quality of POI labelling. To our best knowledge, this is the first work on crowdsourced POI labelling tasks. In particular, there are two sub-problems: (1) how to infer the correct labels for each POI based on workers' answers, and (2) how to effectively assign proper tasks to workers in order to make more accurate inference for next available workers. To address these two problems, we propose a framework consisting of an inference model and an online task assigner. The inference model measures the quality of a worker on a POI by elaborately exploiting (i) worker's inherent quality, (ii) the spatial distance between the worker and the POI, and (iii) the POI influence, which can provide reliable inference results once a worker submits an answer. As workers are dynamically coming, the online task assigner judiciously assigns proper tasks to them so as to benefit the inference. The inference model and task assigner work alternately to continuously improve the overall quality. We conduct extensive experiments on a real crowdsourcing platform, and the results on two real datasets show that our method significantly outperforms state-of-the-art approaches.",
"fno": "07498229",
"keywords": [
"Labeling",
"Crowdsourcing",
"Computational Modeling",
"Random Variables",
"Computer Science",
"Mobile Radio Mobility Management",
"Reliability"
],
"authors": [
{
"affiliation": "Department of Computer Science, Tsinghua National Laboratory for Information Science and Technology (TNList), Tsinghua University, Beijing, China",
"fullName": "Huiqi Hu",
"givenName": "Huiqi",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, The University of Hong Kong, China",
"fullName": "Yudian Zheng",
"givenName": "Yudian",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Science and Information Technology, RMIT University, Melbourne, Australia",
"fullName": "Zhifeng Bao",
"givenName": "Zhifeng",
"surname": "Bao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Tsinghua National Laboratory for Information Science and Technology (TNList), Tsinghua University, Beijing, China",
"fullName": "Guoliang Li",
"givenName": "Guoliang",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Tsinghua National Laboratory for Information Science and Technology (TNList), Tsinghua University, Beijing, China",
"fullName": "Jianhua Feng",
"givenName": "Jianhua",
"surname": "Feng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, The University of Hong Kong, China",
"fullName": "Reynold Cheng",
"givenName": "Reynold",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icde",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-05-01T00:00:00",
"pubType": "proceedings",
"pages": "61-72",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-2020-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07498228",
"articleId": "12OmNwswfZI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07498230",
"articleId": "12OmNCmGO0U",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2012/1226/0/06248096",
"title": "Structured Local Predictors for image labelling",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/06248096/12OmNAoDhYT",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icise/2016/2287/0/07486210",
"title": "Labelling Topics in Weibo Using Word Embedding and Graph-Based Method",
"doi": null,
"abstractUrl": "/proceedings-article/icise/2016/07486210/12OmNBQC874",
"parentPublication": {
"id": "proceedings/icise/2016/2287/0",
"title": "2016 International Conference on Information Systems Engineering (ICISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2015/9504/0/9504a937",
"title": "Quality Control for Crowdsourced Hierarchical Classification",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2015/9504a937/12OmNwAt1CS",
"parentPublication": {
"id": "proceedings/icdm/2015/9504/0",
"title": "2015 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2011/348/0/06011929",
"title": "Appropriate emotional labelling of non-acted speech using basic emotions, geneva emotion wheel and self assessment manikins",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2011/06011929/12OmNzYwc88",
"parentPublication": {
"id": "proceedings/icme/2011/348/0",
"title": "2011 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2017/6647/0/07892321",
"title": "Evaluation of labelling layout methods in augmented reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892321/12OmNzZWbHq",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2018/5520/0/552000b749",
"title": "Computing Crowd Consensus with Partial Agreement",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2018/552000b749/14Fq0WN5NUd",
"parentPublication": {
"id": "proceedings/icde/2018/5520/0",
"title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440116",
"title": "An Interactive Method to Improve Crowdsourced Annotations",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440116/17D45Xbl4OK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse-euc/2019/1664/0/166400a373",
"title": "A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing",
"doi": null,
"abstractUrl": "/proceedings-article/cse-euc/2019/166400a373/1fHkyswgcX6",
"parentPublication": {
"id": "proceedings/cse-euc/2019/1664/0",
"title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/08/09303417",
"title": "Learning Saliency From Single Noisy Labelling: A Robust Model Fitting Perspective",
"doi": null,
"abstractUrl": "/journal/tp/2021/08/09303417/1pLFs7cQRH2",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400a289",
"title": "CrowdRL: An End-to-End Reinforcement Learning Framework for Data Labelling",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400a289/1uGXBTTNuUM",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNykCcdi",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzd7bAt",
"doi": "10.1109/CVPRW.2016.27",
"title": "Grouper: Optimizing Crowdsourced Face Annotations",
"normalizedTitle": "Grouper: Optimizing Crowdsourced Face Annotations",
"abstract": "This study focuses on the problem of extracting consistent and accurate face bounding box annotations from crowdsourced workers. Aiming to provide benchmark datasets for facial recognition training and testing, we create a 'gold standard' set against which consolidated face bounding box annotations can be evaluated. An evaluation methodology based on scores for several features of bounding box annotations is presented and is shown to predict consolidation performance using information gathered from crowdsourced annotations. Based on this foundation, we present \"Grouper,\" a method leveraging density-based clustering to consolidate annotations by crowd workers. We demonstrate that the proposed consolidation scheme, which should be extensible to any number of region annotation consolidations, improves upon metadata released with the IARPA Janus Benchmark-A. Finally, we compare FR performance using the originally provided IJB-A annotations and Grouper and determine that similarity to the gold standard as measured by our evaluation metric does predict recognition performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This study focuses on the problem of extracting consistent and accurate face bounding box annotations from crowdsourced workers. Aiming to provide benchmark datasets for facial recognition training and testing, we create a 'gold standard' set against which consolidated face bounding box annotations can be evaluated. An evaluation methodology based on scores for several features of bounding box annotations is presented and is shown to predict consolidation performance using information gathered from crowdsourced annotations. Based on this foundation, we present \"Grouper,\" a method leveraging density-based clustering to consolidate annotations by crowd workers. We demonstrate that the proposed consolidation scheme, which should be extensible to any number of region annotation consolidations, improves upon metadata released with the IARPA Janus Benchmark-A. Finally, we compare FR performance using the originally provided IJB-A annotations and Grouper and determine that similarity to the gold standard as measured by our evaluation metric does predict recognition performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This study focuses on the problem of extracting consistent and accurate face bounding box annotations from crowdsourced workers. Aiming to provide benchmark datasets for facial recognition training and testing, we create a 'gold standard' set against which consolidated face bounding box annotations can be evaluated. An evaluation methodology based on scores for several features of bounding box annotations is presented and is shown to predict consolidation performance using information gathered from crowdsourced annotations. Based on this foundation, we present \"Grouper,\" a method leveraging density-based clustering to consolidate annotations by crowd workers. We demonstrate that the proposed consolidation scheme, which should be extensible to any number of region annotation consolidations, improves upon metadata released with the IARPA Janus Benchmark-A. Finally, we compare FR performance using the originally provided IJB-A annotations and Grouper and determine that similarity to the gold standard as measured by our evaluation metric does predict recognition performance.",
"fno": "1437a163",
"keywords": [
"Standards",
"Gold",
"Face",
"Measurement",
"Face Recognition",
"Guidelines",
"Conferences"
],
"authors": [
{
"affiliation": null,
"fullName": "Jocelyn C. Adams",
"givenName": "Jocelyn C.",
"surname": "Adams",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kristen C. Allen",
"givenName": "Kristen C.",
"surname": "Allen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tim Miller",
"givenName": "Tim",
"surname": "Miller",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nathan D. Kalka",
"givenName": "Nathan D.",
"surname": "Kalka",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Anil K. Jain",
"givenName": "Anil K.",
"surname": "Jain",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-06-01T00:00:00",
"pubType": "proceedings",
"pages": "163-170",
"year": "2016",
"issn": "2160-7516",
"isbn": "978-1-5090-1437-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "1437a155",
"articleId": "12OmNBgQFPL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "1437a171",
"articleId": "12OmNA0vnVI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/acpr/2017/3354/0/3354a753",
"title": "Crowdsourced Annotations as an Additional Form of Data Augmentation for CAD Development",
"doi": null,
"abstractUrl": "/proceedings-article/acpr/2017/3354a753/17D45WK5AjN",
"parentPublication": {
"id": "proceedings/acpr/2017/3354/0",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440116",
"title": "An Interactive Method to Improve Crowdsourced Annotations",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440116/17D45Xbl4OK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2021/0126/0/09669144",
"title": "CellDet: Dual-Task Cell Detection Network for IHC-Stained Image Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2021/09669144/1A9Wvp1ZM64",
"parentPublication": {
"id": "proceedings/bibm/2021/0126/0",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956584",
"title": "Image Grid Recognition and Regression for Fast and Accurate Face Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956584/1IHpsTXZyFy",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2022/6382/0/09959697",
"title": "FRIDA: Fisheye Re-Identification Dataset with Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2022/09959697/1Iz5b03wZna",
"parentPublication": {
"id": "proceedings/avss/2022/6382/0",
"title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600d739",
"title": "Learning Few-shot Segmentation from Bounding Box Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600d739/1L8qA7Qo15C",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300e979",
"title": "Multi-Task Self-Supervised Object Detection via Recycling of Bounding Box Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300e979/1gyrG0RIXBK",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300j507",
"title": "NOTE-RCNN: NOise Tolerant Ensemble RCNN for Semi-Supervised Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300j507/1hQqpTLgM1O",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900h613",
"title": "img2pose: Face Alignment and Detection via 6DoF, Face Pose Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900h613/1yeK4plxwKQ",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900f439",
"title": "BoxInst: High-Performance Instance Segmentation with Box Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900f439/1yeKLjmQenm",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBtl1Ax",
"title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)",
"acronym": "passat-socialcom",
"groupId": "1800612",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzdoMTW",
"doi": "10.1109/PASSAT/SocialCom.2011.193",
"title": "Incremental Relabeling for Active Learning with Noisy Crowdsourced Annotations",
"normalizedTitle": "Incremental Relabeling for Active Learning with Noisy Crowdsourced Annotations",
"abstract": "Crowd sourcing has become an popular approach for annotating the large quantities of data required to train machine learning algorithms. However, obtaining labels in this manner poses two important challenges. First, naively labeling all of the data can be prohibitively expensive. Second, a significant fraction of the annotations can be incorrect due to carelessness or limited domain expertise of crowd sourced workers. Active learning provides a natural formulation to address the former issue by affordably selecting an appropriate subset of instances to label. Unfortunately, most active learning strategies are myopic and sensitive to label noise, which leads to poorly trained classifiers. We propose an active learning method that is specifically designed to be robust to such noise. We present an application of our technique in the domain of activity recognition for eldercare and validate the proposed approach using both simulated and real-world experiments using Amazon Mechanical Turk.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Crowd sourcing has become an popular approach for annotating the large quantities of data required to train machine learning algorithms. However, obtaining labels in this manner poses two important challenges. First, naively labeling all of the data can be prohibitively expensive. Second, a significant fraction of the annotations can be incorrect due to carelessness or limited domain expertise of crowd sourced workers. Active learning provides a natural formulation to address the former issue by affordably selecting an appropriate subset of instances to label. Unfortunately, most active learning strategies are myopic and sensitive to label noise, which leads to poorly trained classifiers. We propose an active learning method that is specifically designed to be robust to such noise. We present an application of our technique in the domain of activity recognition for eldercare and validate the proposed approach using both simulated and real-world experiments using Amazon Mechanical Turk.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Crowd sourcing has become an popular approach for annotating the large quantities of data required to train machine learning algorithms. However, obtaining labels in this manner poses two important challenges. First, naively labeling all of the data can be prohibitively expensive. Second, a significant fraction of the annotations can be incorrect due to carelessness or limited domain expertise of crowd sourced workers. Active learning provides a natural formulation to address the former issue by affordably selecting an appropriate subset of instances to label. Unfortunately, most active learning strategies are myopic and sensitive to label noise, which leads to poorly trained classifiers. We propose an active learning method that is specifically designed to be robust to such noise. We present an application of our technique in the domain of activity recognition for eldercare and validate the proposed approach using both simulated and real-world experiments using Amazon Mechanical Turk.",
"fno": "06113206",
"keywords": [
"Learning Artificial Intelligence",
"Social Sciences Computing",
"Incremental Relabeling",
"Active Learning",
"Noisy Crowdsourced Annotations",
"Crowd Sourcing",
"Machine Learning",
"Activity Recognition",
"Eldercare",
"Amazon Mechanical Turk",
"Noise",
"Labeling",
"Training",
"Systematics",
"Accuracy",
"Robustness",
"Humans",
"Active Learning",
"Crowdsourcing",
"Activity Recognition"
],
"authors": [
{
"affiliation": null,
"fullName": "Liyue Zhao",
"givenName": "Liyue",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Gita Sukthankar",
"givenName": "Gita",
"surname": "Sukthankar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rahul Sukthankar",
"givenName": "Rahul",
"surname": "Sukthankar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "passat-socialcom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-10-01T00:00:00",
"pubType": "proceedings",
"pages": "728-733",
"year": "2011",
"issn": null,
"isbn": "978-1-4577-1931-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06113205",
"articleId": "12OmNwEJ0D0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06113207",
"articleId": "12OmNqEjhWW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2011/1101/0/06126395",
"title": "Actively selecting annotations among objects and attributes",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2011/06126395/12OmNBCZnTh",
"parentPublication": {
"id": "proceedings/iccv/2011/1101/0",
"title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460345",
"title": "Active transfer learning for multi-view head-pose classification",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460345/12OmNrIae8b",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2004/8603/1/01394127",
"title": "Multi-class active learning for video semantic feature extraction",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394127/12OmNvDqsKh",
"parentPublication": {
"id": "proceedings/icme/2004/8603/1",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460913",
"title": "Importance-weighted label prediction for active learning with noisy annotations",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460913/12OmNwDSduV",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2009/3992/0/05206705",
"title": "What's it going to cost you?: Predicting effort vs. informativeness for multi-label image annotations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206705/12OmNyp9Mhd",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ase/2016/3845/0/07582757",
"title": "Local-based active classification of test report to assist crowdsourced testing",
"doi": null,
"abstractUrl": "/proceedings-article/ase/2016/07582757/12OmNzd7c24",
"parentPublication": {
"id": "proceedings/ase/2016/3845/0",
"title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/03/07879314",
"title": "Collaborative Active Visual Recognition from Crowds: A Distributed Ensemble Approach",
"doi": null,
"abstractUrl": "/journal/tp/2018/03/07879314/13rRUwhpBFl",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/02/06823124",
"title": "Imbalanced Multiple Noisy Labeling",
"doi": null,
"abstractUrl": "/journal/tk/2015/02/06823124/13rRUxjQyvQ",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440116",
"title": "An Interactive Method to Improve Crowdsourced Annotations",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440116/17D45Xbl4OK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800i753",
"title": "State-Relabeling Adversarial Active Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800i753/1m3ohS91ZNC",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1AqwYO1eX72",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1AqxozQqwNi",
"doi": "10.1109/ICDM51629.2021.00065",
"title": "Truth Discovery in Sequence Labels from Crowds",
"normalizedTitle": "Truth Discovery in Sequence Labels from Crowds",
"abstract": "Annotation quality and quantity positively affect the learning performance of sequence labeling, a vital task in Natural Language Processing. Hiring domain experts to annotate a corpus is very costly in terms of money and time. Crowdsourcing platforms, such as Amazon Mechanical Turk (AMT), have been deployed to assist in this purpose. However, the annotations collected this way are prone to human errors due to the lack of expertise of the crowd workers. Existing literature in annotation aggregation assumes that annotations are independent and thus faces challenges when handling the sequential label aggregation tasks with complex dependencies. To conquer the challenges, we propose an optimization-based method that infers the ground truth labels using annotations provided by workers for sequential labeling tasks. The proposed Aggregation method for Sequential Labels from Crowds (AggSLC) jointly considers the characteristics of sequential labeling tasks, workers’ reliabilities, and advanced machine learning techniques. Theoretical analysis on the algorithm’s convergence further demonstrates that the proposed AggSLC halts after a finite number of iterations. We evaluate AggSLC on different crowdsourced datasets for Named Entity Recognition (NER) tasks and Information Extraction tasks in biomedical (PICO), as well as a simulated dataset. Our results show that the proposed method outperforms the state-of-the-art aggregation methods. To achieve insights into the framework, we study the effectiveness of AggSLC’s components through ablation studies.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Annotation quality and quantity positively affect the learning performance of sequence labeling, a vital task in Natural Language Processing. Hiring domain experts to annotate a corpus is very costly in terms of money and time. Crowdsourcing platforms, such as Amazon Mechanical Turk (AMT), have been deployed to assist in this purpose. However, the annotations collected this way are prone to human errors due to the lack of expertise of the crowd workers. Existing literature in annotation aggregation assumes that annotations are independent and thus faces challenges when handling the sequential label aggregation tasks with complex dependencies. To conquer the challenges, we propose an optimization-based method that infers the ground truth labels using annotations provided by workers for sequential labeling tasks. The proposed Aggregation method for Sequential Labels from Crowds (AggSLC) jointly considers the characteristics of sequential labeling tasks, workers’ reliabilities, and advanced machine learning techniques. Theoretical analysis on the algorithm’s convergence further demonstrates that the proposed AggSLC halts after a finite number of iterations. We evaluate AggSLC on different crowdsourced datasets for Named Entity Recognition (NER) tasks and Information Extraction tasks in biomedical (PICO), as well as a simulated dataset. Our results show that the proposed method outperforms the state-of-the-art aggregation methods. To achieve insights into the framework, we study the effectiveness of AggSLC’s components through ablation studies.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Annotation quality and quantity positively affect the learning performance of sequence labeling, a vital task in Natural Language Processing. Hiring domain experts to annotate a corpus is very costly in terms of money and time. Crowdsourcing platforms, such as Amazon Mechanical Turk (AMT), have been deployed to assist in this purpose. However, the annotations collected this way are prone to human errors due to the lack of expertise of the crowd workers. Existing literature in annotation aggregation assumes that annotations are independent and thus faces challenges when handling the sequential label aggregation tasks with complex dependencies. To conquer the challenges, we propose an optimization-based method that infers the ground truth labels using annotations provided by workers for sequential labeling tasks. The proposed Aggregation method for Sequential Labels from Crowds (AggSLC) jointly considers the characteristics of sequential labeling tasks, workers’ reliabilities, and advanced machine learning techniques. Theoretical analysis on the algorithm’s convergence further demonstrates that the proposed AggSLC halts after a finite number of iterations. We evaluate AggSLC on different crowdsourced datasets for Named Entity Recognition (NER) tasks and Information Extraction tasks in biomedical (PICO), as well as a simulated dataset. Our results show that the proposed method outperforms the state-of-the-art aggregation methods. To achieve insights into the framework, we study the effectiveness of AggSLC’s components through ablation studies.",
"fno": "239800a539",
"keywords": [
"Crowdsourcing",
"Data Aggregation",
"Learning Artificial Intelligence",
"Natural Language Processing",
"Crowdsourcing",
"PICO",
"Biomedical Dataset",
"Information Extraction",
"NER",
"Named Entity Recognition",
"Aggregation Method For Sequential Labels From Crowds",
"AMT",
"Annotation Quantity",
"Annotation Quality",
"Sequential Label Aggregation",
"Machine Learning",
"Agg SLC",
"Ground Truth Labels",
"Optimization",
"Annotation Aggregation",
"Crowd Workers",
"Amazon Mechanical Turk",
"Natural Language Processing",
"Sequence Labeling",
"Truth Discovery",
"Deep Learning",
"Machine Learning Algorithms",
"Annotations",
"Reliability Theory",
"Predictive Models",
"Natural Language Processing",
"Mathematical Models",
"Data Aggregation",
"Sequence Labeling",
"Crowdsourcing",
"Optimization"
],
"authors": [
{
"affiliation": "Iowa State University,Ames,Iowa,USA",
"fullName": "Nasim Sabetpour",
"givenName": "Nasim",
"surname": "Sabetpour",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lehigh University,Bethlehem,PA,USA",
"fullName": "Adithya Kulkarni",
"givenName": "Adithya",
"surname": "Kulkarni",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lehigh University,Bethlehem,PA,USA",
"fullName": "Sihong Xie",
"givenName": "Sihong",
"surname": "Xie",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Iowa State University,Ames,Iowa,USA",
"fullName": "Qi Li",
"givenName": "Qi",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "539-548",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2398-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "239800a529",
"articleId": "1Aqxdwduety",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "239800a549",
"articleId": "1Aqxp05tgn6",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icbk/2021/3858/0/385800a206",
"title": "Research on Crowdsourcing Truth Inference Method Based on Graph Embedding",
"doi": null,
"abstractUrl": "/proceedings-article/icbk/2021/385800a206/1A9X45iyR9e",
"parentPublication": {
"id": "proceedings/icbk/2021/3858/0",
"title": "2021 IEEE International Conference on Big Knowledge (ICBK)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2021/5841/0/584100a047",
"title": "Weakly Supervised Crowdsourcing Learning Based on Adversarial Consensus",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2021/584100a047/1EpLu9TlLj2",
"parentPublication": {
"id": "proceedings/csci/2021/5841/0",
"title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mdm/2022/5176/0/517600a109",
"title": "Multi-round Data Poisoning Attack and Defense against Truth Discovery in Crowdsensing Systems",
"doi": null,
"abstractUrl": "/proceedings-article/mdm/2022/517600a109/1G89EoLqk4o",
"parentPublication": {
"id": "proceedings/mdm/2022/5176/0",
"title": "2022 23rd IEEE International Conference on Mobile Data Management (MDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600o4627",
"title": "Debiased Learning from Naturally Imbalanced Pseudo-Labels",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600o4627/1H1iB9PfLig",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2022/9425/0/942500b545",
"title": "Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2022/942500b545/1LFMguQWkkE",
"parentPublication": {
"id": "proceedings/trustcom/2022/9425/0",
"title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2019/3888/0/08925466",
"title": "Unintentional affective priming during labeling may bias labels",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2019/08925466/1fHGBfUYXkY",
"parentPublication": {
"id": "proceedings/acii/2019/3888/0",
"title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl-hcc/2020/6901/0/09127248",
"title": "Bashon: A Hybrid Crowd-Machine Workflow for Shell Command Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/vl-hcc/2020/09127248/1lvPZCf1aNi",
"parentPublication": {
"id": "proceedings/vl-hcc/2020/6901/0",
"title": "2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aivr/2020/7463/0/746300a099",
"title": "Shooting Labels: 3D Semantic Labeling by Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/aivr/2020/746300a099/1qpzznqhVHW",
"parentPublication": {
"id": "proceedings/aivr/2020/7463/0",
"title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428220",
"title": "Toward Effective Automated Content Analysis via Crowdsourcing",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428220/1uilvjGCl1u",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcom/2021/4252/0/425200a204",
"title": "Hidden Markov based Truth Discovery for Multi-Agent Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/bigcom/2021/425200a204/1xlA30Zcezu",
"parentPublication": {
"id": "proceedings/bigcom/2021/4252/0",
"title": "2021 7th International Conference on Big Data Computing and Communications (BigCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1FwF6rOD2ec",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"acronym": "icde",
"groupId": "1000178",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1FwBGmelDwI",
"doi": "10.1109/ICDE53745.2022.00075",
"title": "Crowdsourced Fact Validation for Knowledge Bases",
"normalizedTitle": "Crowdsourced Fact Validation for Knowledge Bases",
"abstract": "In spite of its wide usage in various applications, existing construction methods for Knowledge Base (KB) are still on their way to obtaining 100% correct facts. Thus, employing crowd workers to validate a KB has been proposed to improve its reliability. Most of the existing works focus on devising games with proper incentives to engage workers in validating more facts, but rarely consider matching facts with proper workers. Facts have diverse domains (topics), which naturally require workers of different expertise. In addition, they also generally have different utilities, i.e., some are more heavily used than others. Thus, distinguishing the facts in terms of utility to give them different validation priorities is meaningful, especially when the budget is limited. To this end, we study the crowdsourced fact validation problem which considers worker domains and fact utilities, and find that with some reductions, it can be solved by the existing minimum cost network flow method. However, directly employing that method requires a huge time cost. We thereby propose an optimized network flow method which reduces the network complexity to save the time cost by properly grouping the facts. Furthermore, we propose an incremental validation method, which utilizes the previous results for validating an evolving KB. We finally conduct extensive experiments to demonstrate the effectiveness of the proposed methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In spite of its wide usage in various applications, existing construction methods for Knowledge Base (KB) are still on their way to obtaining 100% correct facts. Thus, employing crowd workers to validate a KB has been proposed to improve its reliability. Most of the existing works focus on devising games with proper incentives to engage workers in validating more facts, but rarely consider matching facts with proper workers. Facts have diverse domains (topics), which naturally require workers of different expertise. In addition, they also generally have different utilities, i.e., some are more heavily used than others. Thus, distinguishing the facts in terms of utility to give them different validation priorities is meaningful, especially when the budget is limited. To this end, we study the crowdsourced fact validation problem which considers worker domains and fact utilities, and find that with some reductions, it can be solved by the existing minimum cost network flow method. However, directly employing that method requires a huge time cost. We thereby propose an optimized network flow method which reduces the network complexity to save the time cost by properly grouping the facts. Furthermore, we propose an incremental validation method, which utilizes the previous results for validating an evolving KB. We finally conduct extensive experiments to demonstrate the effectiveness of the proposed methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In spite of its wide usage in various applications, existing construction methods for Knowledge Base (KB) are still on their way to obtaining 100% correct facts. Thus, employing crowd workers to validate a KB has been proposed to improve its reliability. Most of the existing works focus on devising games with proper incentives to engage workers in validating more facts, but rarely consider matching facts with proper workers. Facts have diverse domains (topics), which naturally require workers of different expertise. In addition, they also generally have different utilities, i.e., some are more heavily used than others. Thus, distinguishing the facts in terms of utility to give them different validation priorities is meaningful, especially when the budget is limited. To this end, we study the crowdsourced fact validation problem which considers worker domains and fact utilities, and find that with some reductions, it can be solved by the existing minimum cost network flow method. However, directly employing that method requires a huge time cost. We thereby propose an optimized network flow method which reduces the network complexity to save the time cost by properly grouping the facts. Furthermore, we propose an incremental validation method, which utilizes the previous results for validating an evolving KB. We finally conduct extensive experiments to demonstrate the effectiveness of the proposed methods.",
"fno": "088300a938",
"keywords": [
"Computational Complexity",
"Knowledge Based Systems",
"Network Theory Graphs",
"Optimisation",
"Personnel",
"Crowdsourced Fact Validation Problem",
"Fact Utilities",
"Minimum Cost Network Flow Method",
"Optimized Network Flow Method",
"Incremental Validation Method",
"Knowledge Bases",
"Construction Methods",
"Matching Facts",
"Validation Priorities",
"Network Complexity",
"Costs",
"Conferences",
"Knowledge Based Systems",
"Games",
"Data Engineering",
"Complexity Theory",
"Reliability",
"Fact Validation",
"Crowdsourcing",
"Knowledge Base"
],
"authors": [
{
"affiliation": "Sun Yat-sen University,Guangdong Key Laboratory of Big Data Analysis and Processing,Guangzhou,China",
"fullName": "Libin Zheng",
"givenName": "Libin",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "East China Normal University,Shanghai,China",
"fullName": "Peng Cheng",
"givenName": "Peng",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The Hong Kong University of Science and Technology,Hong Kong,China",
"fullName": "Lei Chen",
"givenName": "Lei",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sun Yat-sen University,Guangdong Key Laboratory of Big Data Analysis and Processing,Guangzhou,China",
"fullName": "Jianxing Yu",
"givenName": "Jianxing",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of New South Wales,Australia",
"fullName": "Xuemin Lin",
"givenName": "Xuemin",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sun Yat-sen University,Guangdong Key Laboratory of Big Data Analysis and Processing,Guangzhou,China",
"fullName": "Jian Yin",
"givenName": "Jian",
"surname": "Yin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icde",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-05-01T00:00:00",
"pubType": "proceedings",
"pages": "938-950",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-0883-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "088300a924",
"articleId": "1FwFDooH2PS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "088300a951",
"articleId": "1FwFxuW94LS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/caia/1990/2032/0/00089186",
"title": "A persistent store for large shared knowledge bases",
"doi": null,
"abstractUrl": "/proceedings-article/caia/1990/00089186/12OmNwNeYv6",
"parentPublication": {
"id": "proceedings/caia/1990/2032/0",
"title": "Sixth Conference on Artificial Intelligence for Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2016/3566/0/07839611",
"title": "Finding Inference Rules Using Graph Mining in Ontological Knowledge Bases",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2016/07839611/12OmNxEBz8z",
"parentPublication": {
"id": "proceedings/bracis/2016/3566/0",
"title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tai/1990/2084/0/00130437",
"title": "Validation of nonmonotonic knowledge-based systems",
"doi": null,
"abstractUrl": "/proceedings-article/tai/1990/00130437/12OmNz5s0NZ",
"parentPublication": {
"id": "proceedings/tai/1990/2084/0",
"title": "Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsm/2006/2354/0/04021373",
"title": "Source-Level Linkage: Adding Semantic Information to C++ Fact-bases",
"doi": null,
"abstractUrl": "/proceedings-article/icsm/2006/04021373/141AnpBjD8w",
"parentPublication": {
"id": "proceedings/icsm/2006/2354/0",
"title": "2006 22nd IEEE International Conference on Software Maintenance",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2018/5520/0/552000b168",
"title": "Robust Discovery of Positive and Negative Rules in Knowledge Bases",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2018/552000b168/14Fq103ccw0",
"parentPublication": {
"id": "proceedings/icde/2018/5520/0",
"title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440116",
"title": "An Interactive Method to Improve Crowdsourced Annotations",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440116/17D45Xbl4OK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icws/2022/8143/0/814300a425",
"title": "Knowledge Base 4.0: Using Crowdsourcing Services for Mimicking the Knowledge of Domain Experts",
"doi": null,
"abstractUrl": "/proceedings-article/icws/2022/814300a425/1GIuyqndREQ",
"parentPublication": {
"id": "proceedings/icws/2022/8143/0",
"title": "2022 IEEE International Conference on Web Services (ICWS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigmm/2022/5963/0/596300a029",
"title": "Question Answering over Knowledge Base with Variational Auto-Encoder",
"doi": null,
"abstractUrl": "/proceedings-article/bigmm/2022/596300a029/1JvaM7oR5Je",
"parentPublication": {
"id": "proceedings/bigmm/2022/5963/0",
"title": "2022 IEEE Eighth International Conference on Multimedia Big Data (BigMM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/10054477",
"title": "HOFD: An Outdated Fact Detector for Knowledge Bases",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/10054477/1L6H1HsmMZa",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2020/2903/0/09101535",
"title": "Outdated Fact Detection in Knowledge Bases",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2020/09101535/1kaMCfmZ4MU",
"parentPublication": {
"id": "proceedings/icde/2020/2903/0",
"title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1aDSOMTGCIw",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"acronym": "icde",
"groupId": "1000178",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1aDT16acAOk",
"doi": "10.1109/ICDE.2019.00208",
"title": "Learning Effective Embeddings From Crowdsourced Labels: An Educational Case Study",
"normalizedTitle": "Learning Effective Embeddings From Crowdsourced Labels: An Educational Case Study",
"abstract": "Learning representation has been proven to be helpful in numerous machine learning tasks. The success of the majority of existing representation learning approaches often requires a large amount of consistent and noise-free labels. However, labels are not accessible in many real-world scenarios and they are usually annotated by the crowds. In practice, the crowdsourced labels are usually inconsistent among crowd workers given their diverse expertise and the number of crowdsourced labels is very limited. Thus, directly adopting crowdsourced labels for existing representation learning algorithms is inappropriate and suboptimal. In this paper, we investigate the above problem and propose a novel framework of Representation Learning with crowdsourced Labels, i.e., \"RLL\", which learns representation of data with crowdsourced labels by jointly and coherently solving the challenges introduced by limited and inconsistent labels. The proposed representation learning framework is evaluated in two real-world education applications. The experimental results demonstrate the benefits of our approach on learning representation from limited labeled data from the crowds, and show RLL is able to outperform state-of-the-art baselines. Moreover, detailed experiments are conducted on RLL to fully understand its key components and the corresponding performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Learning representation has been proven to be helpful in numerous machine learning tasks. The success of the majority of existing representation learning approaches often requires a large amount of consistent and noise-free labels. However, labels are not accessible in many real-world scenarios and they are usually annotated by the crowds. In practice, the crowdsourced labels are usually inconsistent among crowd workers given their diverse expertise and the number of crowdsourced labels is very limited. Thus, directly adopting crowdsourced labels for existing representation learning algorithms is inappropriate and suboptimal. In this paper, we investigate the above problem and propose a novel framework of Representation Learning with crowdsourced Labels, i.e., \"RLL\", which learns representation of data with crowdsourced labels by jointly and coherently solving the challenges introduced by limited and inconsistent labels. The proposed representation learning framework is evaluated in two real-world education applications. The experimental results demonstrate the benefits of our approach on learning representation from limited labeled data from the crowds, and show RLL is able to outperform state-of-the-art baselines. Moreover, detailed experiments are conducted on RLL to fully understand its key components and the corresponding performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Learning representation has been proven to be helpful in numerous machine learning tasks. The success of the majority of existing representation learning approaches often requires a large amount of consistent and noise-free labels. However, labels are not accessible in many real-world scenarios and they are usually annotated by the crowds. In practice, the crowdsourced labels are usually inconsistent among crowd workers given their diverse expertise and the number of crowdsourced labels is very limited. Thus, directly adopting crowdsourced labels for existing representation learning algorithms is inappropriate and suboptimal. In this paper, we investigate the above problem and propose a novel framework of Representation Learning with crowdsourced Labels, i.e., \"RLL\", which learns representation of data with crowdsourced labels by jointly and coherently solving the challenges introduced by limited and inconsistent labels. The proposed representation learning framework is evaluated in two real-world education applications. The experimental results demonstrate the benefits of our approach on learning representation from limited labeled data from the crowds, and show RLL is able to outperform state-of-the-art baselines. Moreover, detailed experiments are conducted on RLL to fully understand its key components and the corresponding performance.",
"fno": "747400b922",
"keywords": [
"Crowdsourcing",
"Data Handling",
"Educational Administrative Data Processing",
"Learning Artificial Intelligence",
"Crowdsourced Labels",
"Learning Representation",
"Noise Free Labels",
"Representation Learning Algorithms",
"Representation Learning Framework",
"Machine Learning Tasks",
"Training",
"Crowdsourcing",
"Task Analysis",
"Machine Learning",
"Bayes Methods",
"Maximum Likelihood Estimation",
"Representation Learning",
"Education Data Mining",
"Crowdsourcing"
],
"authors": [
{
"affiliation": "TAL AI Lab",
"fullName": "Guowei Xu",
"givenName": "Guowei",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TAL AI Lab",
"fullName": "Wenbiao Ding",
"givenName": "Wenbiao",
"surname": "Ding",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Michigan State University",
"fullName": "Jiliang Tang",
"givenName": "Jiliang",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TAL AI Lab",
"fullName": "Songfan Yang",
"givenName": "Songfan",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TAL AI Lab",
"fullName": "Gale Yan Huang",
"givenName": "Gale Yan",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TAL AI Lab",
"fullName": "Zitao Liu",
"givenName": "Zitao",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icde",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-04-01T00:00:00",
"pubType": "proceedings",
"pages": "1922-1927",
"year": "2019",
"issn": null,
"isbn": "978-1-5386-7474-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "747400b910",
"articleId": "1aDSTGU4VOw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "747400b928",
"articleId": "1aDSVKHgfxm",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sose/2018/5207/0/520701a069",
"title": "Supporting Coordination in Crowdsourced Software Testing Services",
"doi": null,
"abstractUrl": "/proceedings-article/sose/2018/520701a069/12OmNAYXWIG",
"parentPublication": {
"id": "proceedings/sose/2018/5207/0",
"title": "2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2017/3800/0/3800a949",
"title": "Ranking from Crowdsourced Pairwise Comparisons via Smoothed Matrix Manifold Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2017/3800a949/12OmNvCRgkp",
"parentPublication": {
"id": "proceedings/icdmw/2017/3800/0",
"title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2016/0641/0/07477618",
"title": "A crowdsourced approach to student engagement recognition in e-learning environments",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2016/07477618/12OmNzRZpW2",
"parentPublication": {
"id": "proceedings/wacv/2016/0641/0",
"title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2019/10/08423686",
"title": "Max-Margin Majority Voting for Learning from Crowds",
"doi": null,
"abstractUrl": "/journal/tp/2019/10/08423686/13rRUNvyaaq",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2016/03/07159107",
"title": "Robust Subjective Visual Property Prediction from Crowdsourced Pairwise Labels",
"doi": null,
"abstractUrl": "/journal/tp/2016/03/07159107/13rRUwInvKJ",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2016/04/07345572",
"title": "Multi-Class Ground Truth Inference in Crowdsourcing with Clustering",
"doi": null,
"abstractUrl": "/journal/tk/2016/04/07345572/13rRUxcbnHH",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2019/08/08423205",
"title": "Ensemble Learning from Crowds",
"doi": null,
"abstractUrl": "/journal/tk/2019/08/08423205/17D45WaTknL",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbk/2021/3858/0/385800a023",
"title": "A Novel Homophily-aware Correction Approach for Crowdsourced Labels Using Information Entropy",
"doi": null,
"abstractUrl": "/proceedings-article/icbk/2021/385800a023/1A9X5CTYvks",
"parentPublication": {
"id": "proceedings/icbk/2021/3858/0",
"title": "2021 IEEE International Conference on Big Knowledge (ICBK)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09150307",
"title": "Zero-Shot Learning in the Presence of Hierarchically Coarsened Labels",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09150307/1lPHfBL97ri",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2022/06/09171289",
"title": "Representation Learning From Limited Educational Data With Crowdsourced Labels",
"doi": null,
"abstractUrl": "/journal/tk/2022/06/09171289/1mq8f87e6d2",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1fHkuWTT1cs",
"title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)",
"acronym": "cse-euc",
"groupId": "1002115",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1fHkyswgcX6",
"doi": "10.1109/CSE/EUC.2019.00077",
"title": "A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing",
"normalizedTitle": "A Subjectivity-Aware Algorithm for Label Aggregation in Crowdsourcing",
"abstract": "Crowdsourcing has already attracted a wide attention in the field of machine learning and its related fields. A large amount of labeled data can be obtained quickly and cheaply on crowdsourcing platforms. To deal with the problem that labels collected from crowds are usually noisy due to the low accuracy of non-expert online workers, we use quality control methods to improve the qualities of crowd data. Unfortunately, current quality control methods only consider the instance difficulty or the worker reliability to account for the variety of labels to the same instance, and these methods did not take subjectivity of workers into consideration which also effects the responses. In this paper, we present a novel subjectivity-aware algorithm for label aggregation, which also model the difficulty of instances and reliability of workers as latent parameters. This method is an EM-like algorithm, which not only infers the ground truth of the instances, but also simultaneously estimates the latent parameters. Experimental results on real-world datasets show that our method outperforms the state-of-the-art ground truth inference algorithms.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Crowdsourcing has already attracted a wide attention in the field of machine learning and its related fields. A large amount of labeled data can be obtained quickly and cheaply on crowdsourcing platforms. To deal with the problem that labels collected from crowds are usually noisy due to the low accuracy of non-expert online workers, we use quality control methods to improve the qualities of crowd data. Unfortunately, current quality control methods only consider the instance difficulty or the worker reliability to account for the variety of labels to the same instance, and these methods did not take subjectivity of workers into consideration which also effects the responses. In this paper, we present a novel subjectivity-aware algorithm for label aggregation, which also model the difficulty of instances and reliability of workers as latent parameters. This method is an EM-like algorithm, which not only infers the ground truth of the instances, but also simultaneously estimates the latent parameters. Experimental results on real-world datasets show that our method outperforms the state-of-the-art ground truth inference algorithms.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Crowdsourcing has already attracted a wide attention in the field of machine learning and its related fields. A large amount of labeled data can be obtained quickly and cheaply on crowdsourcing platforms. To deal with the problem that labels collected from crowds are usually noisy due to the low accuracy of non-expert online workers, we use quality control methods to improve the qualities of crowd data. Unfortunately, current quality control methods only consider the instance difficulty or the worker reliability to account for the variety of labels to the same instance, and these methods did not take subjectivity of workers into consideration which also effects the responses. In this paper, we present a novel subjectivity-aware algorithm for label aggregation, which also model the difficulty of instances and reliability of workers as latent parameters. This method is an EM-like algorithm, which not only infers the ground truth of the instances, but also simultaneously estimates the latent parameters. Experimental results on real-world datasets show that our method outperforms the state-of-the-art ground truth inference algorithms.",
"fno": "166400a373",
"keywords": [
"Crowdsourcing",
"Data Aggregation",
"Inference Mechanisms",
"Learning Artificial Intelligence",
"Quality Control",
"Label Aggregation",
"Machine Learning",
"EM Like Algorithm",
"Labeled Data",
"Ground Truth Inference Algorithms",
"Subjectivity Aware Algorithm",
"Worker Reliability",
"Quality Control Methods",
"Crowd Data",
"Nonexpert Online Workers",
"Crowdsourcing Platforms",
"Reliability",
"Crowdsourcing",
"Inference Algorithms",
"Labeling",
"Data Models",
"Noise Measurement",
"Animals",
"Crowdsourcing Quality Control Subjectivity Difficulty Reliability EM Algorithms"
],
"authors": [
{
"affiliation": "Nanjing University of Science and Technology, China",
"fullName": "Ming Wu",
"givenName": "Ming",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Science and Technology, China",
"fullName": "Qianmu Li",
"givenName": "Qianmu",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Science and Technology, China",
"fullName": "Shuo Wang",
"givenName": "Shuo",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Wuyi University, China",
"fullName": "Jun Hou",
"givenName": "Jun",
"surname": "Hou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cse-euc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-08-01T00:00:00",
"pubType": "proceedings",
"pages": "373-378",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-1664-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "166400a367",
"articleId": "1fHkypct1Ek",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "166400a379",
"articleId": "1fHkyMt0uGc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdcs/2017/1792/0/1792a933",
"title": "MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/2017/1792a933/12OmNBoNrqI",
"parentPublication": {
"id": "proceedings/icdcs/2017/1792/0",
"title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmu/2017/31/0/08330095",
"title": "Privacy-preserving and fine-grained data aggregation framework for crowdsourcing",
"doi": null,
"abstractUrl": "/proceedings-article/icmu/2017/08330095/12OmNy2rRS9",
"parentPublication": {
"id": "proceedings/icmu/2017/31/0",
"title": "2017 Tenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2017/6543/0/6543a071",
"title": "Maximizing Acceptance in Rejection-aware Spatial Crowdsourcing",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543a071/12OmNyO8tYw",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2018/5035/0/08622635",
"title": "Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2018/08622635/17D45XlyDuk",
"parentPublication": {
"id": "proceedings/big-data/2018/5035/0",
"title": "2018 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2020/11/08705317",
"title": "A Crowdsourcing Framework for Collecting Tabular Data",
"doi": null,
"abstractUrl": "/journal/tk/2020/11/08705317/19JpQ3xvDlm",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927903",
"title": "A Crowdsourcing Truth Inference Algorithm Based on Hypergraph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927903/1J4CyDr2SJ2",
"parentPublication": {
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0",
"title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2022/9425/0/942500b545",
"title": "Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2022/942500b545/1LFMguQWkkE",
"parentPublication": {
"id": "proceedings/trustcom/2022/9425/0",
"title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2021/05/08892650",
"title": "Multi-Label Truth Inference for Crowdsourcing Using Mixture Models",
"doi": null,
"abstractUrl": "/journal/tk/2021/05/08892650/1eJQZKNzrJS",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005518",
"title": "IProWA: A Novel Probabilistic Graphical Model for Crowdsourcing Aggregation",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005518/1hJsbdL760g",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/sc/2022/05/09416787",
"title": "Incentive Mechanism Design for Truth Discovery in Crowdsourcing With Copiers",
"doi": null,
"abstractUrl": "/journal/sc/2022/05/09416787/1t8VMSKaC8E",
"parentPublication": {
"id": "trans/sc",
"title": "IEEE Transactions on Services Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCbU3aV",
"title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAQJzUN",
"doi": "10.1109/BIBE.2014.16",
"title": "A New CPXR Based Logistic Regression Method and Clinical Prognostic Modeling Results Using the Method on Traumatic Brain Injury",
"normalizedTitle": "A New CPXR Based Logistic Regression Method and Clinical Prognostic Modeling Results Using the Method on Traumatic Brain Injury",
"abstract": "Prognostic modeling is central to medicine, as it is often used to predict patients' outcome and response to treatments and to identify important medical risk factors. Logistic regression is one of the most used approaches for clinical prediction modeling. Traumatic brain injury (TBI) is an important public health issue and a leading cause of death and disability worldwide. In this study, we adapt CPXR (Contrast Pattern Aided Regression, a recently introduced regression method), to develop a new logistic regression method called CPXR (Log), for general binary outcome prediction (including prognostic modeling), and we use the method to carry out prognostic modeling for TBI using admission time data. The models produced by CPXR (Log) achieved AUC as high as 0.93 and specificity as high as 0.97, much better than those reported by previous studies. Our method produced interpretable prediction models for diverse patient groups for TBI, which show that different kinds of patients should be evaluated differently for TBI outcome prediction and the odds ratios of some predictor variables differ significantly from those given by previous studies, such results can be valuable to physicians.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Prognostic modeling is central to medicine, as it is often used to predict patients' outcome and response to treatments and to identify important medical risk factors. Logistic regression is one of the most used approaches for clinical prediction modeling. Traumatic brain injury (TBI) is an important public health issue and a leading cause of death and disability worldwide. In this study, we adapt CPXR (Contrast Pattern Aided Regression, a recently introduced regression method), to develop a new logistic regression method called CPXR (Log), for general binary outcome prediction (including prognostic modeling), and we use the method to carry out prognostic modeling for TBI using admission time data. The models produced by CPXR (Log) achieved AUC as high as 0.93 and specificity as high as 0.97, much better than those reported by previous studies. Our method produced interpretable prediction models for diverse patient groups for TBI, which show that different kinds of patients should be evaluated differently for TBI outcome prediction and the odds ratios of some predictor variables differ significantly from those given by previous studies, such results can be valuable to physicians.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Prognostic modeling is central to medicine, as it is often used to predict patients' outcome and response to treatments and to identify important medical risk factors. Logistic regression is one of the most used approaches for clinical prediction modeling. Traumatic brain injury (TBI) is an important public health issue and a leading cause of death and disability worldwide. In this study, we adapt CPXR (Contrast Pattern Aided Regression, a recently introduced regression method), to develop a new logistic regression method called CPXR (Log), for general binary outcome prediction (including prognostic modeling), and we use the method to carry out prognostic modeling for TBI using admission time data. The models produced by CPXR (Log) achieved AUC as high as 0.93 and specificity as high as 0.97, much better than those reported by previous studies. Our method produced interpretable prediction models for diverse patient groups for TBI, which show that different kinds of patients should be evaluated differently for TBI outcome prediction and the odds ratios of some predictor variables differ significantly from those given by previous studies, such results can be valuable to physicians.",
"fno": "7502a283",
"keywords": [
"Predictive Models",
"Logistics",
"Data Models",
"Brain Models",
"Support Vector Machines",
"Brain Injuries",
"Prediction Error Characterization",
"Logistic Regression Algorithm",
"Prognostic Prediction Modeling",
"Clinical Outcome Prediction",
"Traumatic Brain Injury",
"Accuracy",
"AUC"
],
"authors": [
{
"affiliation": null,
"fullName": "Vahid Taslimitehrani",
"givenName": "Vahid",
"surname": "Taslimitehrani",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Guozhu Dong",
"givenName": "Guozhu",
"surname": "Dong",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibe",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-11-01T00:00:00",
"pubType": "proceedings",
"pages": "283-290",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-7502-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7502a277",
"articleId": "12OmNyUFfXL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7502a291",
"articleId": "12OmNApLGz8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2012/2216/0/06460066",
"title": "Online ICP forecast for patients with traumatic brain injury",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460066/12OmNBC8At9",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbec/2016/2132/0/07458967",
"title": "Effects of Mild Traumatic Brain Injury on Auditory Function in a Mouse Model",
"doi": null,
"abstractUrl": "/proceedings-article/sbec/2016/07458967/12OmNroij3b",
"parentPublication": {
"id": "proceedings/sbec/2016/2132/0",
"title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2018/6060/0/606001a059",
"title": "Machine Learning Applications to Epileptiform Activity Recognition in Rats after Traumatic Brain Injury",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2018/606001a059/12OmNvqEvRq",
"parentPublication": {
"id": "proceedings/cbms/2018/6060/0",
"title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2016/5473/0/07837970",
"title": "Patterns in Cognitive Rehabilitation of Traumatic Brain Injury Patients: A Text Mining Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2016/07837970/12OmNxWuiyI",
"parentPublication": {
"id": "proceedings/icdm/2016/5473/0",
"title": "2016 IEEE 16th International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209d245",
"title": "Automated Prediction of Glasgow Outcome Scale for Traumatic Brain Injury",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209d245/12OmNzZWbEr",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2018/7568/0/08705146",
"title": "Mobile traumatic brain injury assessment system",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2018/08705146/19RSHLZadqw",
"parentPublication": {
"id": "proceedings/isspit/2018/7568/0",
"title": "2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2018/9385/0/938500a091",
"title": "Detection and Classification of Epileptiform Activity in EEG of Rats After Traumatic Brain Injury",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2018/938500a091/19RSq2B1QM8",
"parentPublication": {
"id": "proceedings/sitis/2018/9385/0",
"title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2019/1867/0/08983159",
"title": "Midline Shift vs. Mid-Surface Shift: Correlation with Outcome of Traumatic Brain Injuries",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2019/08983159/1hgu7OWqKoE",
"parentPublication": {
"id": "proceedings/bibm/2019/1867/0",
"title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313568",
"title": "Pediatric Patient Traumatic Brain Injury Prediction<sup>1</sup>",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313568/1qmfXYaXGfK",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/annsim/2021/375/0/09552121",
"title": "Machine Learning of Diffusion Weighted Imaging for Prediction of Seizure Susceptibility Following Traumatic Brain Injury",
"doi": null,
"abstractUrl": "/proceedings-article/annsim/2021/09552121/1xsdEsiccBq",
"parentPublication": {
"id": "proceedings/annsim/2021/375/0",
"title": "2021 Annual Modeling and Simulation Conference (ANNSIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx6g6nT",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBUS75H",
"doi": "10.1109/BIBM.2017.8217684",
"title": "Temporal reflected logistic regression for probabilistic heart failure survival score prediction",
"normalizedTitle": "Temporal reflected logistic regression for probabilistic heart failure survival score prediction",
"abstract": "Heart failure (HF) has a highly variable annual mortality rate and there is an urgent need of determining patient prognosis to enable informed decision-making about heart failure treatment strategies. Existing survival risk prediction models either require features that limit their applicability or pose difficulties for parameter estimation as physicians have to use a limited set of variables with known hazard ratios published in literature. We propose a new model to predict the probabilistic survival score after HF diagnosis based on all clinical variables derived from the electronic health record (EHR). We formalize the parameter estimation problem by using the maximum likelihood estimation (MLE) principle and devise an effective and efficient algorithm to solve the optimization problem. Experimental results using EHR data of 234 HF patients validate the superiority of this new model in predicting prognosis over the currently used Seattle Heart Failure Model.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Heart failure (HF) has a highly variable annual mortality rate and there is an urgent need of determining patient prognosis to enable informed decision-making about heart failure treatment strategies. Existing survival risk prediction models either require features that limit their applicability or pose difficulties for parameter estimation as physicians have to use a limited set of variables with known hazard ratios published in literature. We propose a new model to predict the probabilistic survival score after HF diagnosis based on all clinical variables derived from the electronic health record (EHR). We formalize the parameter estimation problem by using the maximum likelihood estimation (MLE) principle and devise an effective and efficient algorithm to solve the optimization problem. Experimental results using EHR data of 234 HF patients validate the superiority of this new model in predicting prognosis over the currently used Seattle Heart Failure Model.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Heart failure (HF) has a highly variable annual mortality rate and there is an urgent need of determining patient prognosis to enable informed decision-making about heart failure treatment strategies. Existing survival risk prediction models either require features that limit their applicability or pose difficulties for parameter estimation as physicians have to use a limited set of variables with known hazard ratios published in literature. We propose a new model to predict the probabilistic survival score after HF diagnosis based on all clinical variables derived from the electronic health record (EHR). We formalize the parameter estimation problem by using the maximum likelihood estimation (MLE) principle and devise an effective and efficient algorithm to solve the optimization problem. Experimental results using EHR data of 234 HF patients validate the superiority of this new model in predicting prognosis over the currently used Seattle Heart Failure Model.",
"fno": "08217684",
"keywords": [
"Data Models",
"Predictive Models",
"Heart",
"Hazards",
"Optimization",
"Logistics",
"Probabilistic Logic",
"Temporal Models",
"Heart Failure HF Survival Score Prediction",
"Logistic Regression",
"Electronic Health Records"
],
"authors": [
{
"affiliation": "Department of Computer Science University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA",
"fullName": "Mingjie Qian",
"givenName": "Mingjie",
"surname": "Qian",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Weill Cornell Medicine, New York, NY 10065, USA",
"fullName": "Jyotishman Pathak",
"givenName": "Jyotishman",
"surname": "Pathak",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mayo Clinic, Rochester, MN 55905, USA",
"fullName": "Naveen L. Pereira",
"givenName": "Naveen L.",
"surname": "Pereira",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA",
"fullName": "Chengxiang Zhai",
"givenName": "Chengxiang",
"surname": "Zhai",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-11-01T00:00:00",
"pubType": "proceedings",
"pages": "410-416",
"year": "2017",
"issn": null,
"isbn": "978-1-5090-3050-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08217683",
"articleId": "12OmNx9nGDb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08217685",
"articleId": "12OmNy6ZrZj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ichi/2013/5089/0/5089a563",
"title": "Predictors of Readmission in Heart Failure Patients Vary by Cause of Readmission: Hospital-Level Cause-Specific Readmission Rates Show No Correlation",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2013/5089a563/12OmNB836Ms",
"parentPublication": {
"id": "proceedings/ichi/2013/5089/0",
"title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2017/1324/0/132401a285",
"title": "Predicting Heart Failure Patient Events by Exploiting Saliva and Breath Biomarkers Information",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2017/132401a285/12OmNqG0SPk",
"parentPublication": {
"id": "proceedings/bibe/2017/1324/0",
"title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217848",
"title": "Automatic methods to extract New York heart association classification from clinical notes",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217848/12OmNrMZpAC",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icppw/2016/2825/0/2825a426",
"title": "Identification of Heart Failure by Using Unstructured Data of Cardiac Patients",
"doi": null,
"abstractUrl": "/proceedings-article/icppw/2016/2825a426/12OmNxisQNc",
"parentPublication": {
"id": "proceedings/icppw/2016/2825/0",
"title": "2016 45th International Conference on Parallel Processing Workshops (ICPPW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2013/5089/0/5089a239",
"title": "Heart Failure Risk Models and Their Readiness for Clinical Practice",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2013/5089a239/12OmNyYDDJC",
"parentPublication": {
"id": "proceedings/ichi/2013/5089/0",
"title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2018/5488/0/08621518",
"title": "Estimating New York Heart Association Classification for Heart Failure Patients from Information in the Electronic Health Record",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2018/08621518/17D45WrVg5l",
"parentPublication": {
"id": "proceedings/bibm/2018/5488/0",
"title": "2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccs/2021/9445/0/944500a228",
"title": "Heart Disease Detection System Using Gradient Boosting Technique",
"doi": null,
"abstractUrl": "/proceedings-article/iccs/2021/944500a228/1DSyCtErtkI",
"parentPublication": {
"id": "proceedings/iccs/2021/9445/0",
"title": "2021 International Conference on Computing Sciences (ICCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2022/6845/0/684500a138",
"title": "Identify Cancer Patients at Risk for Heart Failure using Electronic Health Record and Genetic Data",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2022/684500a138/1GvdxlHkOBi",
"parentPublication": {
"id": "proceedings/ichi/2022/6845/0",
"title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313253",
"title": "Prediction of patients with heart failure after myocardial infarction",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313253/1qmg4F5p4eA",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icris/2020/1969/0/196900a636",
"title": "Study on survival prediction of patients with heart failure based on support vector machine algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/icris/2020/196900a636/1wG68SkMAms",
"parentPublication": {
"id": "proceedings/icris/2020/1969/0",
"title": "2020 International Conference on Robots & Intelligent System (ICRIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirC",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"acronym": "vast",
"groupId": "1001630",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45W2WyxO",
"doi": "10.1109/VAST.2017.8585720",
"title": "A Workflow for Visual Diagnostics of Binary Classifiers using Instance-Level Explanations",
"normalizedTitle": "A Workflow for Visual Diagnostics of Binary Classifiers using Instance-Level Explanations",
"abstract": "Human-in-the-loop data analysis applications necessitate greater transparency in machine learning models for experts to understand and trust their decisions. To this end, we propose a visual analytics workflow to help data scientists and domain experts explore, diagnose, and understand the decisions made by a binary classifier. The approach leverages “instance-level explanations”, measures of local feature relevance that explain single instances, and uses them to build a set of visual representations that guide the users in their investigation. The workflow is based on three main visual representations and steps: one based on aggregate statistics to see how data distributes across correct / incorrect decisions; one based on explanations to understand which features are used to make these decisions; and one based on raw data, to derive insights on potential root causes for the observed patterns. The workflow is derived from a long-term collaboration with a group of machine learning and healthcare professionals who used our method to make sense of machine learning models they developed. The case study from this collaboration demonstrates that the proposed workflow helps experts derive useful knowledge about the model and the phenomena it describes, thus experts can generate useful hypotheses on how a model can be improved.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Human-in-the-loop data analysis applications necessitate greater transparency in machine learning models for experts to understand and trust their decisions. To this end, we propose a visual analytics workflow to help data scientists and domain experts explore, diagnose, and understand the decisions made by a binary classifier. The approach leverages “instance-level explanations”, measures of local feature relevance that explain single instances, and uses them to build a set of visual representations that guide the users in their investigation. The workflow is based on three main visual representations and steps: one based on aggregate statistics to see how data distributes across correct / incorrect decisions; one based on explanations to understand which features are used to make these decisions; and one based on raw data, to derive insights on potential root causes for the observed patterns. The workflow is derived from a long-term collaboration with a group of machine learning and healthcare professionals who used our method to make sense of machine learning models they developed. The case study from this collaboration demonstrates that the proposed workflow helps experts derive useful knowledge about the model and the phenomena it describes, thus experts can generate useful hypotheses on how a model can be improved.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Human-in-the-loop data analysis applications necessitate greater transparency in machine learning models for experts to understand and trust their decisions. To this end, we propose a visual analytics workflow to help data scientists and domain experts explore, diagnose, and understand the decisions made by a binary classifier. The approach leverages “instance-level explanations”, measures of local feature relevance that explain single instances, and uses them to build a set of visual representations that guide the users in their investigation. The workflow is based on three main visual representations and steps: one based on aggregate statistics to see how data distributes across correct / incorrect decisions; one based on explanations to understand which features are used to make these decisions; and one based on raw data, to derive insights on potential root causes for the observed patterns. The workflow is derived from a long-term collaboration with a group of machine learning and healthcare professionals who used our method to make sense of machine learning models they developed. The case study from this collaboration demonstrates that the proposed workflow helps experts derive useful knowledge about the model and the phenomena it describes, thus experts can generate useful hypotheses on how a model can be improved.",
"fno": "08585720",
"keywords": [
"Data Analysis",
"Data Mining",
"Data Visualisation",
"Learning Artificial Intelligence",
"Pattern Classification",
"Statistical Analysis",
"Machine Learning Models",
"Visual Diagnostics",
"Binary Classifier",
"Instance Level Explanations",
"Visual Analytics Workflow",
"Data Scientists",
"Local Feature Relevance",
"Aggregate Statistics",
"Human In The Loop Data Analysis Applications",
"Visual Representations",
"Data Models",
"Analytical Models",
"Predictive Models",
"Machine Learning",
"Collaboration",
"Visual Analytics",
"Machine Learning",
"Interpretation",
"Visual Analytics"
],
"authors": [
{
"affiliation": "NYU Tandon School of Engineering",
"fullName": "Josua Krause",
"givenName": "Josua",
"surname": "Krause",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pacific Northwest National Laboratory",
"fullName": "Aritra Dasgupta",
"givenName": "Aritra",
"surname": "Dasgupta",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU School of Medicine",
"fullName": "Jordan Swartz",
"givenName": "Jordan",
"surname": "Swartz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU School of Medicine",
"fullName": "Yindalon Aphinyanaphongs",
"givenName": "Yindalon",
"surname": "Aphinyanaphongs",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU Tandon School of Engineering",
"fullName": "Enrico Bertini",
"givenName": "Enrico",
"surname": "Bertini",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vast",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-10-01T00:00:00",
"pubType": "proceedings",
"pages": "162-172",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-3163-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08585647",
"articleId": "17D45VTRouU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08585503",
"articleId": "17D45WHONqn",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200b036",
"title": "Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200b036/1BmEYixVeEg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200a662",
"title": "Exploiting Explanations for Model Inversion Attacks",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200a662/1BmIlHFBf20",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2022/2335/0/233500a111",
"title": "Why? Why not? When? Visual Explanations of Agent Behaviour in Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2022/233500a111/1E2wfmNqkPm",
"parentPublication": {
"id": "proceedings/pacificvis/2022/2335/0",
"title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2022/06/09861728",
"title": "<italic>SUBPLEX</italic>: A Visual Analytics Approach to Understand Local Model Explanations at the Subpopulation Level",
"doi": null,
"abstractUrl": "/magazine/cg/2022/06/09861728/1FWhZ4WX0Ji",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aitest/2022/8737/0/873700a103",
"title": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/aitest/2022/873700a103/1GZjWCUDVLO",
"parentPublication": {
"id": "proceedings/aitest/2022/8737/0",
"title": "2022 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400c000",
"title": "EXPLAINER: Entity Resolution Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400c000/1aDSY1XfQNW",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09229232",
"title": "DECE: Decision Explorer with Counterfactual Explanations for Machine Learning Models",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09229232/1o3nAe6qces",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09555810",
"title": "VBridge: Connecting the Dots Between Features and Data to Explain Healthcare Models",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09555810/1xlw2uJhEXe",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trex/2021/1817/0/181700a027",
"title": "Time Series Model Attribution Visualizations as Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/trex/2021/181700a027/1yQB55Tsbpm",
"parentPublication": {
"id": "proceedings/trex/2021/1817/0",
"title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2021/3335/0/333500a031",
"title": "AdViCE: Aggregated Visual Counterfactual Explanations for Machine Learning Model Validation",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2021/333500a031/1yXu7JvSbio",
"parentPublication": {
"id": "proceedings/vis/2021/3335/0",
"title": "2021 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1J6h4A8ldF6",
"title": "2022 IEEE Visualization and Visual Analytics (VIS)",
"acronym": "vis",
"groupId": "9973064",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1J6h9Nc827C",
"doi": "10.1109/VIS54862.2022.00019",
"title": "RMExplorer: A Visual Analytics Approach to Explore the Performance and the Fairness of Disease Risk Models on Population Subgroups",
"normalizedTitle": "RMExplorer: A Visual Analytics Approach to Explore the Performance and the Fairness of Disease Risk Models on Population Subgroups",
"abstract": "Disease risk models can identify high-risk patients and help clinicians provide more personalized care. However, risk models de-veloped on one dataset may not generalize across diverse subpop-ulations of patients in different datasets and may have unexpected performance. It is challenging for clinical researchers to inspect risk models across different subgroups without any tools. Therefore, we developed an interactive visualization system called RMExplorer (Risk Model Explorer) to enable interactive risk model assessment. Specifically, the system allows users to define subgroups of patients by selecting clinical, demographic, or other characteristics, to ex-plore the performance and fairness of risk models on the subgroups, and to understand the feature contributions to risk scores. To demonstrate the usefulness of the tool, we conduct a case study, where we use RMExplorer to explore three atrial fibrillation risk models by applying them to the UK Biobank dataset of 445,329 individuals. RMExplorer can help researchers to evaluate the performance and biases of risk models on subpopulations of interest in their data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Disease risk models can identify high-risk patients and help clinicians provide more personalized care. However, risk models de-veloped on one dataset may not generalize across diverse subpop-ulations of patients in different datasets and may have unexpected performance. It is challenging for clinical researchers to inspect risk models across different subgroups without any tools. Therefore, we developed an interactive visualization system called RMExplorer (Risk Model Explorer) to enable interactive risk model assessment. Specifically, the system allows users to define subgroups of patients by selecting clinical, demographic, or other characteristics, to ex-plore the performance and fairness of risk models on the subgroups, and to understand the feature contributions to risk scores. To demonstrate the usefulness of the tool, we conduct a case study, where we use RMExplorer to explore three atrial fibrillation risk models by applying them to the UK Biobank dataset of 445,329 individuals. RMExplorer can help researchers to evaluate the performance and biases of risk models on subpopulations of interest in their data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Disease risk models can identify high-risk patients and help clinicians provide more personalized care. However, risk models de-veloped on one dataset may not generalize across diverse subpop-ulations of patients in different datasets and may have unexpected performance. It is challenging for clinical researchers to inspect risk models across different subgroups without any tools. Therefore, we developed an interactive visualization system called RMExplorer (Risk Model Explorer) to enable interactive risk model assessment. Specifically, the system allows users to define subgroups of patients by selecting clinical, demographic, or other characteristics, to ex-plore the performance and fairness of risk models on the subgroups, and to understand the feature contributions to risk scores. To demonstrate the usefulness of the tool, we conduct a case study, where we use RMExplorer to explore three atrial fibrillation risk models by applying them to the UK Biobank dataset of 445,329 individuals. RMExplorer can help researchers to evaluate the performance and biases of risk models on subpopulations of interest in their data.",
"fno": "881200a050",
"keywords": [
"Data Analysis",
"Data Visualisation",
"Diseases",
"Graphical User Interfaces",
"Medical Computing",
"Patient Diagnosis",
"Patient Treatment",
"Atrial Fibrillation Risk Models",
"Disease Risk Models",
"High Risk Patients",
"Interactive Risk Model Assessment",
"Risk Model Explorer",
"RM Explorer System",
"UK Biobank Dataset",
"Visual Analytics Approach",
"Analytical Models",
"Biological System Modeling",
"Visual Analytics",
"Computational Modeling",
"Sociology",
"Data Visualization",
"Atrial Fibrillation",
"Visual Analytics",
"Health Informatics",
"Fairness",
"Subgroup Analysis",
"Explainability",
"Interpretability",
"Electronic Health Records",
"Human Centered Computing",
"Visualization"
],
"authors": [
{
"affiliation": "IBM Research",
"fullName": "Bum Chul Kwon",
"givenName": "Bum Chul",
"surname": "Kwon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research",
"fullName": "Uri Kartoun",
"givenName": "Uri",
"surname": "Kartoun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research",
"fullName": "Shaan Khurshid",
"givenName": "Shaan",
"surname": "Khurshid",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research",
"fullName": "Mikhail Yurochkin",
"givenName": "Mikhail",
"surname": "Yurochkin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Broad Institute",
"fullName": "Subha Maity",
"givenName": "Subha",
"surname": "Maity",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Deanna G Brockman",
"givenName": "Deanna G",
"surname": "Brockman",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Amit V Khera",
"givenName": "Amit V",
"surname": "Khera",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Patrick T Ellinor",
"givenName": "Patrick T",
"surname": "Ellinor",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Steven A Lubitz",
"givenName": "Steven A",
"surname": "Lubitz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research",
"fullName": "Kenney Ng",
"givenName": "Kenney",
"surname": "Ng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-10-01T00:00:00",
"pubType": "proceedings",
"pages": "50-54",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8812-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1J6h9HGEAE0",
"name": "pvis202288120-09973226s1-mm_881200a050.zip",
"size": "19.4 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pvis202288120-09973226s1-mm_881200a050.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "881200a045",
"articleId": "1J6h6YYG9sA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "881200a055",
"articleId": "1J6h7XhAuMo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibmw/2012/2746/0/06470244",
"title": "Intracavitary signal analysis for atrial fibrillation prediction",
"doi": null,
"abstractUrl": "/proceedings-article/bibmw/2012/06470244/12OmNyYm2Gk",
"parentPublication": {
"id": "proceedings/bibmw/2012/2746/0",
"title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2010/4257/0/4257a442",
"title": "BODY -- Buckets of Disease Symptoms for Disease Outbreak Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2010/4257a442/12OmNyvGymA",
"parentPublication": {
"id": "proceedings/icdmw/2010/4257/0",
"title": "2010 IEEE International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2008/3165/0/3165a530",
"title": "The Effects of Anti-Hypertensive Drugs Evaluated Using Markov Modelling for Northern Ireland Chronic Kidney Disease Patients",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2008/3165a530/12OmNzcPA9J",
"parentPublication": {
"id": "proceedings/cbms/2008/3165/0",
"title": "2008 21st IEEE International Symposium on Computer-Based Medical Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2018/6060/0/606001a298",
"title": "Population Health Management Exploiting Machine Learning Algorithms to Identify High-Risk Patients",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2018/606001a298/12OmNzcPAmd",
"parentPublication": {
"id": "proceedings/cbms/2018/6060/0",
"title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2013/02/mcs2013020079",
"title": "Visualizing intracardiac atrial fibrillation electrograms using spectral analysis",
"doi": null,
"abstractUrl": "/magazine/cs/2013/02/mcs2013020079/13rRUwInvOl",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2021/1658/0/165800b498",
"title": "Automated Classification of Atrial Fibrillation and Atrial Flutter in ECG Signals based on Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2021/165800b498/1BBztrYlKV2",
"parentPublication": {
"id": "proceedings/trustcom/2021/1658/0",
"title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995179",
"title": "Generalizable deep clustering based on Bi-LSTM with applications to sepsis and acute kidney disease populations",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995179/1JC35QpLSs8",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2019/9138/0/08904493",
"title": "Incorporating Intra-Operative Medication Information for Prediction of Post-Operative Atrial Fibrillation",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2019/08904493/1f8N6bqVzoI",
"parentPublication": {
"id": "proceedings/ichi/2019/9138/0",
"title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsecs-icocsim/2021/1407/0/140700a238",
"title": "The Neuropsychology Assessment for Identifying Dementia in Parkinson’s Disease Patients using a Deep Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/icsecs-icocsim/2021/140700a238/1wYlwWMG6wU",
"parentPublication": {
"id": "proceedings/icsecs-icocsim/2021/1407/0",
"title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vahc/2021/2067/0/206700a025",
"title": "Towards a Comprehensive Cohort Visualization of Patients with Inflammatory Bowel Disease",
"doi": null,
"abstractUrl": "/proceedings-article/vahc/2021/206700a025/1z0ylIsUKze",
"parentPublication": {
"id": "proceedings/vahc/2021/2067/0",
"title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1z0yj0F8T8A",
"title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)",
"acronym": "vahc",
"groupId": "1826204",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1z0ylclGF6E",
"doi": "10.1109/VAHC53616.2021.00006",
"title": "Communicating Performance of Regression Models Using Visualization in Pharmacovigilance",
"normalizedTitle": "Communicating Performance of Regression Models Using Visualization in Pharmacovigilance",
"abstract": "Statistical regression methods can help pharmaceutical organizations improve the quality of their pharmacovigilance by predicting the expected quantity of adverse events during a trial. However, the use of statistical techniques also changes the risk profile of any downstream tasks, due to bias and noise in the model's predictions. That risk profile must be clearly understood, documented, and communicated across many different stakeholders in a highly regulated environment. Aggregated performance metrics such as explained variance or mean average error fail to tell the whole story, making it difficult for subject matter experts to feel confident in deciding to use a model. In this work, we describe guidelines for communicating regression model performance for models deployed in predicting adverse events. First, we describe an interview study in which both data scientists and subject matter experts within a pharmaceutical organization describe their challenges in communicating and understanding regression performance. Based on the responses in this study, we develop guidelines for which visualizations to use to communicate performance, and use a publicly available trial safety database to demonstrate their use.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Statistical regression methods can help pharmaceutical organizations improve the quality of their pharmacovigilance by predicting the expected quantity of adverse events during a trial. However, the use of statistical techniques also changes the risk profile of any downstream tasks, due to bias and noise in the model's predictions. That risk profile must be clearly understood, documented, and communicated across many different stakeholders in a highly regulated environment. Aggregated performance metrics such as explained variance or mean average error fail to tell the whole story, making it difficult for subject matter experts to feel confident in deciding to use a model. In this work, we describe guidelines for communicating regression model performance for models deployed in predicting adverse events. First, we describe an interview study in which both data scientists and subject matter experts within a pharmaceutical organization describe their challenges in communicating and understanding regression performance. Based on the responses in this study, we develop guidelines for which visualizations to use to communicate performance, and use a publicly available trial safety database to demonstrate their use.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Statistical regression methods can help pharmaceutical organizations improve the quality of their pharmacovigilance by predicting the expected quantity of adverse events during a trial. However, the use of statistical techniques also changes the risk profile of any downstream tasks, due to bias and noise in the model's predictions. That risk profile must be clearly understood, documented, and communicated across many different stakeholders in a highly regulated environment. Aggregated performance metrics such as explained variance or mean average error fail to tell the whole story, making it difficult for subject matter experts to feel confident in deciding to use a model. In this work, we describe guidelines for communicating regression model performance for models deployed in predicting adverse events. First, we describe an interview study in which both data scientists and subject matter experts within a pharmaceutical organization describe their challenges in communicating and understanding regression performance. Based on the responses in this study, we develop guidelines for which visualizations to use to communicate performance, and use a publicly available trial safety database to demonstrate their use.",
"fno": "206700a006",
"keywords": [
"Data Analysis",
"Data Visualisation",
"Pharmaceutical Industry",
"Production Engineering Computing",
"Regression Analysis",
"Risk Profile",
"Aggregated Performance Metrics",
"Regression Model Performance",
"Pharmaceutical Organization",
"Pharmacovigilance",
"Statistical Regression",
"Visual Analytic Tools",
"Analytical Models",
"Visual Analytics",
"Organizations",
"Predictive Models",
"Safety",
"Visual Databases",
"Stakeholders",
"Visual Communication",
"Regression Models",
"Pharmacovigilance"
],
"authors": [
{
"affiliation": "Tufts University",
"fullName": "Ashley Suh",
"givenName": "Ashley",
"surname": "Suh",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tufts University",
"fullName": "Gabriel Appleby",
"givenName": "Gabriel",
"surname": "Appleby",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Data Science and AI Novartis Pharmaceuticals",
"fullName": "Erik W. Anderson",
"givenName": "Erik W.",
"surname": "Anderson",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Data Science and AI Novartis Pharmaceuticals",
"fullName": "Luca Finelli",
"givenName": "Luca",
"surname": "Finelli",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Data Science and AI Novartis Pharmaceuticals",
"fullName": "Dylan Cashman",
"givenName": "Dylan",
"surname": "Cashman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vahc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "6-13",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2067-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1z0yl9tIayc",
"name": "pvahc202120670-09623321s1-mm_206700a006.zip",
"size": "104 kB",
"location": "https://www.computer.org/csdl/api/v1/extra/pvahc202120670-09623321s1-mm_206700a006.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "206700a001",
"articleId": "1z0yltnU46I",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "206700a014",
"articleId": "1z0yjD3x1VC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2017/3050/0/08217892",
"title": "Automated classification of adverse events in pharmacovigilance",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217892/12OmNAolGOF",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493b402",
"title": "Towards Automatic Pharmacovigilance: Analysing Patient Reviews and Sentiment on Oncological Drugs",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493b402/12OmNwdbV2U",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217777",
"title": "Automated classification of adverse events in pharmacovigilance",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217777/12OmNxX3uxn",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2018/5520/0/552000b565",
"title": "MeDIAR: Multi-Drug Adverse Reactions Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2018/552000b565/14Fq0V7LOyF",
"parentPublication": {
"id": "proceedings/icde/2018/5520/0",
"title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08464305",
"title": "RegressionExplorer: Interactive Exploration of Logistic Regression Models with Subgroup Analysis",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08464305/17D45Xtvpee",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2022/8812/0/881200a035",
"title": "LineCap: Line Charts for Data Visualization Captioning Models",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2022/881200a035/1J6hb0AkF20",
"parentPublication": {
"id": "proceedings/vis/2022/8812/0",
"title": "2022 IEEE Visualization and Visual Analytics (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/10077087",
"title": "Are Metrics Enough? Guidelines for Communicating and Visualizing Predictive Models to Subject Matter Experts",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/10077087/1LFQ7zitdtK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2019/2607/2/260702a269",
"title": "Machine Learning-Based Modeling of Big Clinical Trials Data for Adverse Outcome Prediction: A Case Study of Death Events",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2019/260702a269/1cYiuJie15S",
"parentPublication": {
"id": "compsac/2019/2607/2",
"title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2020/9134/0/913400a344",
"title": "Comparison of four visual analytics techniques for the visualization of adverse drug event rates in clinical trials",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2020/913400a344/1rSRc4omAj6",
"parentPublication": {
"id": "proceedings/iv/2020/9134/0",
"title": "2020 24th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vds/2020/9284/0/928400a012",
"title": "LEGION: Visually compare modeling techniques for regression",
"doi": null,
"abstractUrl": "/proceedings-article/vds/2020/928400a012/1rk0bgtFLwY",
"parentPublication": {
"id": "proceedings/vds/2020/9284/0",
"title": "2020 IEEE Visualization in Data Science (VDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAQJzK8",
"title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"acronym": "vlhcc",
"groupId": "1001007",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBfqG6e",
"doi": "10.1109/VLHCC.2014.6883020",
"title": "A direct manipulation language for explaining algorithms",
"normalizedTitle": "A direct manipulation language for explaining algorithms",
"abstract": "Instructors typically explain algorithms in computer science by tracing their behavior, often on blackboards, sometimes with algorithm visualizations. Using blackboards can be tedious because they do not facilitate manipulation of the drawing, while visualizations often operate at the wrong level of abstraction or must be laboriously hand-coded for each algorithm. In response, we present a direct manipulation (DM) language for explaining algorithms by manipulating visualized data structures. The language maps DM gestures onto primitive program behaviors that occur in commonly taught algorithms. We performed an initial evaluation of the DM language on teaching assistants of an undergraduate algorithms class, who found the language easier to use and more helpful for explaining algorithms than a standard drawing application (GIMP).",
"abstracts": [
{
"abstractType": "Regular",
"content": "Instructors typically explain algorithms in computer science by tracing their behavior, often on blackboards, sometimes with algorithm visualizations. Using blackboards can be tedious because they do not facilitate manipulation of the drawing, while visualizations often operate at the wrong level of abstraction or must be laboriously hand-coded for each algorithm. In response, we present a direct manipulation (DM) language for explaining algorithms by manipulating visualized data structures. The language maps DM gestures onto primitive program behaviors that occur in commonly taught algorithms. We performed an initial evaluation of the DM language on teaching assistants of an undergraduate algorithms class, who found the language easier to use and more helpful for explaining algorithms than a standard drawing application (GIMP).",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Instructors typically explain algorithms in computer science by tracing their behavior, often on blackboards, sometimes with algorithm visualizations. Using blackboards can be tedious because they do not facilitate manipulation of the drawing, while visualizations often operate at the wrong level of abstraction or must be laboriously hand-coded for each algorithm. In response, we present a direct manipulation (DM) language for explaining algorithms by manipulating visualized data structures. The language maps DM gestures onto primitive program behaviors that occur in commonly taught algorithms. We performed an initial evaluation of the DM language on teaching assistants of an undergraduate algorithms class, who found the language easier to use and more helpful for explaining algorithms than a standard drawing application (GIMP).",
"fno": "06883020",
"keywords": [
"Data Structures",
"Algorithm Design And Analysis",
"Visualization",
"Vocabulary",
"Sorting",
"Data Visualization",
"Education"
],
"authors": [
{
"affiliation": "MIT CSAIL Cambridge, MA 02139",
"fullName": "Jeremy Scott",
"givenName": "Jeremy",
"surname": "Scott",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MIT CSAIL / University of Rochester Cambridge, MA 02139",
"fullName": "Philip J. Guo",
"givenName": "Philip J.",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MIT CSAIL Cambridge, MA 02139",
"fullName": "Randall Davis",
"givenName": "Randall",
"surname": "Davis",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vlhcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-07-01T00:00:00",
"pubType": "proceedings",
"pages": "45-48",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4035-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06883019",
"articleId": "12OmNyQYtjA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06883021",
"articleId": "12OmNqESuhO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hpcsa/2007/2813/0/04215571",
"title": "A Language-Independent API for Unstructured Mesh Access and Manipulation",
"doi": null,
"abstractUrl": "/proceedings-article/hpcsa/2007/04215571/12OmNC3Xhvz",
"parentPublication": {
"id": "proceedings/hpcsa/2007/2813/0",
"title": "21st International Symposium on High Performance Computing Systems and Applications (HPCS'07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eitt/2017/0629/0/0629a268",
"title": "Construction and Application of Foreign Language Teaching Aid System Based on Knowledge Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/eitt/2017/0629a268/12OmNvAAtqE",
"parentPublication": {
"id": "proceedings/eitt/2017/0629/0",
"title": "2017 International Conference of Educational Innovation through Technology (EITT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/1990/2055/0/00129849",
"title": "Algorithms for discrete function manipulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/1990/00129849/12OmNvAiSsQ",
"parentPublication": {
"id": "proceedings/iccad/1990/2055/0",
"title": "1990 IEEE International Conference on Computer-Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl/1994/6660/0/00363620",
"title": "DEAL-a language for depicting algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/vl/1994/00363620/12OmNx1qV3b",
"parentPublication": {
"id": "proceedings/vl/1994/6660/0",
"title": "Proceedings of 1994 IEEE Symposium on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2016/8942/0/8942a141",
"title": "A Rule-Based Approach for Animating Java Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2016/8942a141/12OmNxGAKZP",
"parentPublication": {
"id": "proceedings/iv/2016/8942/0",
"title": "2016 20th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2015/8454/0/07344263",
"title": "Vamonos: Embeddable visualizations of advanced algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2015/07344263/12OmNzmLxDO",
"parentPublication": {
"id": "proceedings/fie/2015/8454/0",
"title": "2015 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2008/05/ttk2008050589",
"title": "Explaining Classifications For Individual Instances",
"doi": null,
"abstractUrl": "/journal/tk/2008/05/ttk2008050589/13rRUxjQyvH",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2021/3176/0/09667024",
"title": "Explaining Face Presentation Attack Detection Using Natural Language",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2021/09667024/1A6BBW9IIrm",
"parentPublication": {
"id": "proceedings/fg/2021/3176/0",
"title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2019/1746/0/09028379",
"title": "Design Patterns for Sorting Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2019/09028379/1iffgNTxckM",
"parentPublication": {
"id": "proceedings/fie/2019/1746/0",
"title": "2019 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vissoft/2021/3144/0/314400a135",
"title": "Towards a JSON-based Algorithm Animation Language",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2021/314400a135/1yrHrXZvmRq",
"parentPublication": {
"id": "proceedings/vissoft/2021/3144/0",
"title": "2021 Working Conference on Software Visualization (VISSOFT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvmowTo",
"title": "2014 International Conference on Informatics, Electronics & Vision (ICIEV)",
"acronym": "iciev",
"groupId": "1802578",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCwlakV",
"doi": "10.1109/ICIEV.2014.6850838",
"title": "An adaptive ensemble classifier for mining complex noisy instances in data streams",
"normalizedTitle": "An adaptive ensemble classifier for mining complex noisy instances in data streams",
"abstract": "Real-time data streams classification is a challenging data mining task. In real-time streaming environments concepts of instances might change at any time such as weather predictions, astronomical and intrusion detection etc. To address this issue, we present an adaptive ensemble classifier for data streams classification, which uses a set of decision trees for mining complex noisy instances in data streams. The ensemble model updates automatically so that it represents the most recent concepts in data streams. In each iteration, the ensemble model generates a new training data from original training dataset, then builds a decision tree using new training data and assigns a weight to the tree based on its classification accuracy on original training instances. Also it updates the weight of training instances in training dataset. We tested the performance of the proposed ensemble classifier against that of existing C4.5 decision tree classifier using real benchmark datasets from UCI (University of California, Irvine) machine learning repository. The experimental results prove that the proposed ensemble classifier shows great flexibility and robustness in data streams classification.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Real-time data streams classification is a challenging data mining task. In real-time streaming environments concepts of instances might change at any time such as weather predictions, astronomical and intrusion detection etc. To address this issue, we present an adaptive ensemble classifier for data streams classification, which uses a set of decision trees for mining complex noisy instances in data streams. The ensemble model updates automatically so that it represents the most recent concepts in data streams. In each iteration, the ensemble model generates a new training data from original training dataset, then builds a decision tree using new training data and assigns a weight to the tree based on its classification accuracy on original training instances. Also it updates the weight of training instances in training dataset. We tested the performance of the proposed ensemble classifier against that of existing C4.5 decision tree classifier using real benchmark datasets from UCI (University of California, Irvine) machine learning repository. The experimental results prove that the proposed ensemble classifier shows great flexibility and robustness in data streams classification.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Real-time data streams classification is a challenging data mining task. In real-time streaming environments concepts of instances might change at any time such as weather predictions, astronomical and intrusion detection etc. To address this issue, we present an adaptive ensemble classifier for data streams classification, which uses a set of decision trees for mining complex noisy instances in data streams. The ensemble model updates automatically so that it represents the most recent concepts in data streams. In each iteration, the ensemble model generates a new training data from original training dataset, then builds a decision tree using new training data and assigns a weight to the tree based on its classification accuracy on original training instances. Also it updates the weight of training instances in training dataset. We tested the performance of the proposed ensemble classifier against that of existing C4.5 decision tree classifier using real benchmark datasets from UCI (University of California, Irvine) machine learning repository. The experimental results prove that the proposed ensemble classifier shows great flexibility and robustness in data streams classification.",
"fno": "06850838",
"keywords": [
"Training",
"Decision Trees",
"Accuracy",
"Data Mining",
"Data Models",
"Adaptation Models",
"Expert Systems",
"Single Classifier",
"Data Streams",
"Decision Tree",
"Ensemble Classifier",
"Multi Class Classification",
"Noisy Data"
],
"authors": [
{
"affiliation": "Department of Computer Science and Engineering, United International University, Bangladesh",
"fullName": "Md. Rejaul Karim",
"givenName": "Md. Rejaul",
"surname": "Karim",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Engineering, United International University, Bangladesh",
"fullName": "Dewan Md. Farid",
"givenName": "Dewan Md.",
"surname": "Farid",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciev",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-05-01T00:00:00",
"pubType": "proceedings",
"pages": "1-4",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-5179-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06850837",
"articleId": "12OmNCga1Tk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06850839",
"articleId": "12OmNs0C9BX",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdar/2013/4999/0/06628703",
"title": "Sorting-Based Dynamic Classifier Ensemble Selection",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628703/12OmNCctfda",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2013/0400/0/06572718",
"title": "A new approach of Boosting using decision tree classifier for classifying noisy data",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2013/06572718/12OmNrYlmPn",
"parentPublication": {
"id": "proceedings/iciev/2013/0400/0",
"title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itnac/2017/6796/0/08215412",
"title": "A new ensemble classifier for multivariate medical data",
"doi": null,
"abstractUrl": "/proceedings-article/itnac/2017/08215412/12OmNvAAthX",
"parentPublication": {
"id": "proceedings/itnac/2017/6796/0",
"title": "2017 27th International Telecommunication Networks and Applications Conference (ITNAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2014/4274/0/4274a716",
"title": "Incremental Ensemble Classifier Addressing Non-stationary Fast Data Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2014/4274a716/12OmNwc3wz2",
"parentPublication": {
"id": "proceedings/icdmw/2014/4274/0",
"title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2004/2142/0/21420305",
"title": "Dynamic Classifier Selection for Effective Mining from Noisy Data Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2004/21420305/12OmNxFJXBr",
"parentPublication": {
"id": "proceedings/icdm/2004/2142/0",
"title": "Fourth IEEE International Conference on Data Mining (ICDM'04)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aici/2009/3816/4/3816d360",
"title": "Mining Concept-Drifting and Noisy Data Streams Using Ensemble Classifiers",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2009/3816d360/12OmNywOWO5",
"parentPublication": {
"id": "proceedings/aici/2009/3816/4",
"title": "2009 International Conference on Artificial Intelligence and Computational Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2006/10/i1619",
"title": "Rotation Forest: A New Classifier Ensemble Method",
"doi": null,
"abstractUrl": "/journal/tp/2006/10/i1619/13rRUygT7o6",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09961859",
"title": "Incremental Weighted Ensemble for Data Streams with Concept Drift",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09961859/1Ixw1NFandu",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2022/08/09204849",
"title": "Reinforcement Online Active Learning Ensemble for Drifting Imbalanced Data Streams",
"doi": null,
"abstractUrl": "/journal/tk/2022/08/09204849/1nmdMZOfSvu",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2022/01/09238487",
"title": "Improved Ensemble Classification for Evolving Data Streams",
"doi": null,
"abstractUrl": "/magazine/ex/2022/01/09238487/1oa1FtCesuY",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqJ8tgY",
"title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)",
"acronym": "icse-c",
"groupId": "1002125",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqIzheQ",
"doi": "",
"title": "Prodirect Manipulation: Bidirectional Programming for the Masses",
"normalizedTitle": "Prodirect Manipulation: Bidirectional Programming for the Masses",
"abstract": "Software interfaces today generally fall at either end of a spectrum. On one end are programmable systems, which allow expert users (i.e. programmers) to write software artifacts that describe complex abstractions, but programs are disconnected from their eventual output. On the other end are domain-specific graphical user interfaces (GUIs), which allow end users (i.e. non-programmers) to easily create varied content but present insurmountable walls when a desired feature is not built-in. Both programmatic and direct manipulation have distinct strengths, but users must typically choose one over the other or use some ad-hoc combination of systems. Our goal, put simply, is to bridge this divide. We envision novel software systems that tightly couple programmatic and direct manipulation --- a combination we dub prodirect manipulation --- for a variety of use cases. This will require advances in a broad range of software engineering disciplines, from program analysis and program synthesis technology to user interface design and evaluation. In this extended abstract, we propose two general strategies --- real-time program synthesis and domain-specific synthesis of general-purpose programs --- that may prove fruitful for overcoming the technical challenges. We also discuss metrics that will be important in evaluating the usability and utility of prodirect manipulation systems.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Software interfaces today generally fall at either end of a spectrum. On one end are programmable systems, which allow expert users (i.e. programmers) to write software artifacts that describe complex abstractions, but programs are disconnected from their eventual output. On the other end are domain-specific graphical user interfaces (GUIs), which allow end users (i.e. non-programmers) to easily create varied content but present insurmountable walls when a desired feature is not built-in. Both programmatic and direct manipulation have distinct strengths, but users must typically choose one over the other or use some ad-hoc combination of systems. Our goal, put simply, is to bridge this divide. We envision novel software systems that tightly couple programmatic and direct manipulation --- a combination we dub prodirect manipulation --- for a variety of use cases. This will require advances in a broad range of software engineering disciplines, from program analysis and program synthesis technology to user interface design and evaluation. In this extended abstract, we propose two general strategies --- real-time program synthesis and domain-specific synthesis of general-purpose programs --- that may prove fruitful for overcoming the technical challenges. We also discuss metrics that will be important in evaluating the usability and utility of prodirect manipulation systems.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Software interfaces today generally fall at either end of a spectrum. On one end are programmable systems, which allow expert users (i.e. programmers) to write software artifacts that describe complex abstractions, but programs are disconnected from their eventual output. On the other end are domain-specific graphical user interfaces (GUIs), which allow end users (i.e. non-programmers) to easily create varied content but present insurmountable walls when a desired feature is not built-in. Both programmatic and direct manipulation have distinct strengths, but users must typically choose one over the other or use some ad-hoc combination of systems. Our goal, put simply, is to bridge this divide. We envision novel software systems that tightly couple programmatic and direct manipulation --- a combination we dub prodirect manipulation --- for a variety of use cases. This will require advances in a broad range of software engineering disciplines, from program analysis and program synthesis technology to user interface design and evaluation. In this extended abstract, we propose two general strategies --- real-time program synthesis and domain-specific synthesis of general-purpose programs --- that may prove fruitful for overcoming the technical challenges. We also discuss metrics that will be important in evaluating the usability and utility of prodirect manipulation systems.",
"fno": "4205a781",
"keywords": [
"Programming",
"Synchronization",
"Wheels",
"Visualization",
"Automobiles",
"Data Visualization",
"Bidirectional Programming",
"Prodirect Manipulation",
"Program Synthesis",
"End User Programming",
"Human Computer Interaction"
],
"authors": [
{
"affiliation": null,
"fullName": "Ravi Chugh",
"givenName": "Ravi",
"surname": "Chugh",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icse-c",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-05-01T00:00:00",
"pubType": "proceedings",
"pages": "781-784",
"year": "2016",
"issn": null,
"isbn": "978-1-4503-4205-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4205a777",
"articleId": "12OmNvlg8oO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4205a785",
"articleId": "12OmNqJq4qh",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vlhcc/2006/2586/0/25860157",
"title": "Can Direct Manipulation Lower the Barriers to Programming and Promote Positive Transfer to Textual Programming? An Experimental Study",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2006/25860157/12OmNAHmOrY",
"parentPublication": {
"id": "proceedings/vlhcc/2006/2586/0",
"title": "IEEE Symposium on Visual Languages and Human-Centric Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl/1993/3970/0/00269621",
"title": "Is it easier to write matrix manipulation programs visually or textually? An empirical study",
"doi": null,
"abstractUrl": "/proceedings-article/vl/1993/00269621/12OmNANTAyv",
"parentPublication": {
"id": "proceedings/vl/1993/3970/0",
"title": "Proceedings 1993 IEEE Symposium on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/1996/7240/0/72400208",
"title": "Tioga-2: A Direct Manipulation Database Visualization Environment",
"doi": null,
"abstractUrl": "/proceedings-article/icde/1996/72400208/12OmNCgrCUP",
"parentPublication": {
"id": "proceedings/icde/1996/7240/0",
"title": "Proceedings of the Twelfth International Conference on Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpc/2016/1428/0/07503733",
"title": "Synchronized static and dynamic visualization in a web-based programming environment",
"doi": null,
"abstractUrl": "/proceedings-article/icpc/2016/07503733/12OmNvk7K6j",
"parentPublication": {
"id": "proceedings/icpc/2016/1428/0",
"title": "2016 IEEE 24th International Conference on Program Comprehension (ICPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wvl/1989/2002/0/00077049",
"title": "Visualized and modeless programming environment for form manipulation language",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1989/00077049/12OmNwkR5Dd",
"parentPublication": {
"id": "proceedings/wvl/1989/2002/0",
"title": "1989 IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2011/1246/0/06070406",
"title": "End user robot programming via visual languages",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2011/06070406/12OmNxH9Xdr",
"parentPublication": {
"id": "proceedings/vlhcc/2011/1246/0",
"title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2016/0252/0/07739700",
"title": "End-user programming of visualisations",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2016/07739700/12OmNxwWouC",
"parentPublication": {
"id": "proceedings/vlhcc/2016/0252/0",
"title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2003/2030/0/20300077",
"title": "Interactive Protein Manipulation",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2003/20300077/12OmNzXFowr",
"parentPublication": {
"id": "proceedings/ieee-vis/2003/2030/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seams/2016/4187/0/4187a004",
"title": "Reusable Self-Adaptation through Bidirectional Programming",
"doi": null,
"abstractUrl": "/proceedings-article/seams/2016/4187a004/1D86mFQIcr6",
"parentPublication": {
"id": "proceedings/seams/2016/4187/0",
"title": "2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl-hcc/2022/4214/0/09833110",
"title": "An Integrative Human-Centered Architecture for Interactive Programming Assistants",
"doi": null,
"abstractUrl": "/proceedings-article/vl-hcc/2022/09833110/1FUSG6Q9w3e",
"parentPublication": {
"id": "proceedings/vl-hcc/2022/4214/0",
"title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBQ2VPe",
"title": "25th Annual International Computer Software and Applications Conference. COMPSAC 2001",
"acronym": "compsac",
"groupId": "1000143",
"volume": "0",
"displayVolume": "0",
"year": "2001",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvAAti6",
"doi": "10.1109/CMPSAC.2001.960612",
"title": "Automatic Generation of Database Instances for White-box Testing",
"normalizedTitle": "Automatic Generation of Database Instances for White-box Testing",
"abstract": "Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data manipulation commands, such as SQL. However relatively little study has been made in the testing of database application programs. In particular, few testing techniques explicitly consider the inclusion of database instances in the selection of test cases and the generation of test data input. In this paper, we study the generation of database instances that respect the semantics of SQL statements embedded in a database application program. The paper also describes a supporting tool which generates a set of constraints. These constraints collectively represent a property against which the program is tested. Database instances for program testing can be derived by solving the set of constraints using existing constraint solvers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data manipulation commands, such as SQL. However relatively little study has been made in the testing of database application programs. In particular, few testing techniques explicitly consider the inclusion of database instances in the selection of test cases and the generation of test data input. In this paper, we study the generation of database instances that respect the semantics of SQL statements embedded in a database application program. The paper also describes a supporting tool which generates a set of constraints. These constraints collectively represent a property against which the program is tested. Database instances for program testing can be derived by solving the set of constraints using existing constraint solvers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data manipulation commands, such as SQL. However relatively little study has been made in the testing of database application programs. In particular, few testing techniques explicitly consider the inclusion of database instances in the selection of test cases and the generation of test data input. In this paper, we study the generation of database instances that respect the semantics of SQL statements embedded in a database application program. The paper also describes a supporting tool which generates a set of constraints. These constraints collectively represent a property against which the program is tested. Database instances for program testing can be derived by solving the set of constraints using existing constraint solvers.",
"fno": "13720161",
"keywords": [
"Database Applications",
"Embedded SQL",
"Constraint Solving",
"Automatic Test Data Generation",
"Software Testing"
],
"authors": [
{
"affiliation": "Chinese Academy of Sciences",
"fullName": "Jian Zhang",
"givenName": "Jian",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chinese Academy of Sciences",
"fullName": "Chen Xu",
"givenName": "Chen",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "S.-C. Cheung",
"givenName": "S.-C.",
"surname": "Cheung",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsac",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2001-10-01T00:00:00",
"pubType": "proceedings",
"pages": "161",
"year": "2001",
"issn": "0730-3157",
"isbn": "0-7695-1372-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "pcompsac2001002097",
"articleId": "12OmNyvY9uU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "13720166",
"articleId": "12OmNwO5M02",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyRxFmg",
"title": "2009 International Conference on Advances in Social Network Analysis and Mining",
"acronym": "asonam",
"groupId": "1002866",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwoPtxN",
"doi": "10.1109/ASONAM.2009.47",
"title": "Browsing Unbounded Social, Linked Data Instances with User Perspectives",
"normalizedTitle": "Browsing Unbounded Social, Linked Data Instances with User Perspectives",
"abstract": "With the emerging uses of semantically enriched social data on the Web, linked data are expected to envision a next generation of the current web. As ‘web of data’, they are spread as pieces of data into the Web with links to related objects or concepts. Data instances distributed with URIs, those that enable identification and combination of data instances, can be consumed with shared data vocabularies. Easy and intuitive access to the data should be provided for data-centered uses of the Web. This paper introduces a linked data browser providing an intuitive view, especially helping casual users’ understanding of data instances and their relationships. The browser also satisfies the requirement of a generic browser: handling unexpected domains of data across the links. By adapting user’s perspectives captured during browsing, the browser enables users to view any types of linked data instances with different views pertinent to their intentions and types of data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the emerging uses of semantically enriched social data on the Web, linked data are expected to envision a next generation of the current web. As ‘web of data’, they are spread as pieces of data into the Web with links to related objects or concepts. Data instances distributed with URIs, those that enable identification and combination of data instances, can be consumed with shared data vocabularies. Easy and intuitive access to the data should be provided for data-centered uses of the Web. This paper introduces a linked data browser providing an intuitive view, especially helping casual users’ understanding of data instances and their relationships. The browser also satisfies the requirement of a generic browser: handling unexpected domains of data across the links. By adapting user’s perspectives captured during browsing, the browser enables users to view any types of linked data instances with different views pertinent to their intentions and types of data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the emerging uses of semantically enriched social data on the Web, linked data are expected to envision a next generation of the current web. As ‘web of data’, they are spread as pieces of data into the Web with links to related objects or concepts. Data instances distributed with URIs, those that enable identification and combination of data instances, can be consumed with shared data vocabularies. Easy and intuitive access to the data should be provided for data-centered uses of the Web. This paper introduces a linked data browser providing an intuitive view, especially helping casual users’ understanding of data instances and their relationships. The browser also satisfies the requirement of a generic browser: handling unexpected domains of data across the links. By adapting user’s perspectives captured during browsing, the browser enables users to view any types of linked data instances with different views pertinent to their intentions and types of data.",
"fno": "3689a352",
"keywords": [
"Linked Data",
"Data Visualization",
"User Perspective Adaptation"
],
"authors": [
{
"affiliation": null,
"fullName": "Hyun Namgoong",
"givenName": "Hyun",
"surname": "Namgoong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sungkwon Yang",
"givenName": "Sungkwon",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mina Song",
"givenName": "Mina",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hong-Gee Kim",
"givenName": "Hong-Gee",
"surname": "Kim",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "asonam",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-07-01T00:00:00",
"pubType": "proceedings",
"pages": "352-355",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3689-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3689a344",
"articleId": "12OmNxuFBnA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3689a356",
"articleId": "12OmNy5zsp9",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icws/2012/4752/0/4752a376",
"title": "Linked Context: A Linked Data Approach to Personalised Service Provisioning",
"doi": null,
"abstractUrl": "/proceedings-article/icws/2012/4752a376/12OmNASILZF",
"parentPublication": {
"id": "proceedings/icws/2012/4752/0",
"title": "2012 IEEE 19th International Conference on Web Services",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2013/2138/0/5070a128",
"title": "A Linked Data Perspective for Collaboration in Mashup Development",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2013/5070a128/12OmNAtK4hQ",
"parentPublication": {
"id": "proceedings/dexa/2013/2138/0",
"title": "2013 24th International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2011/4338/0/4338a035",
"title": "Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2011/4338a035/12OmNqI04Ph",
"parentPublication": {
"id": "proceedings/waina/2011/4338/0",
"title": "2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ic/2012/06/mic2012060068",
"title": "Linked Data in Drug Discovery",
"doi": null,
"abstractUrl": "/magazine/ic/2012/06/mic2012060068/13rRUx0xPQg",
"parentPublication": {
"id": "mags/ic",
"title": "IEEE Internet Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ic/2013/04/mic2013040072",
"title": "Linked Data in Government",
"doi": null,
"abstractUrl": "/magazine/ic/2013/04/mic2013040072/13rRUxASury",
"parentPublication": {
"id": "mags/ic",
"title": "IEEE Internet Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ic/2012/01/mic2012010024",
"title": "Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends",
"doi": null,
"abstractUrl": "/magazine/ic/2012/01/mic2012010024/13rRUxjyX0n",
"parentPublication": {
"id": "mags/ic",
"title": "IEEE Internet Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2009/05/mex2009050087",
"title": "The Emerging Web of Linked Data",
"doi": null,
"abstractUrl": "/magazine/ex/2009/05/mex2009050087/13rRUyeTVmq",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ic/2009/04/mic2009040068",
"title": "Exploiting Linked Data to Build Web Applications",
"doi": null,
"abstractUrl": "/magazine/ic/2009/04/mic2009040068/13rRUygT7bj",
"parentPublication": {
"id": "mags/ic",
"title": "IEEE Internet Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2018/7449/0/744900a189",
"title": "A Linked Data Browser with Recommendations",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2018/744900a189/17D45XdBRQz",
"parentPublication": {
"id": "proceedings/ictai/2018/7449/0",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2018/1360/0/136000a966",
"title": "Enrichment of Ontology Instances Using Linked Data and Supplemental String Data",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2018/136000a966/1gjRAXaXjAk",
"parentPublication": {
"id": "proceedings/csci/2018/1360/0",
"title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1kwqNHC4Fy0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1kwqQoNOhy0",
"doi": "10.1109/ICME46284.2020.9102793",
"title": "PS-RCNN: Detecting Secondary Human Instances in a Crowd via Primary Object Suppression",
"normalizedTitle": "PS-RCNN: Detecting Secondary Human Instances in a Crowd via Primary Object Suppression",
"abstract": "Detecting human bodies in highly crowded scenes is a challenging problem. Two main reasons result in such a problem: 1). weak visual cues of heavily occluded instances can hardly provide sufficient information for accurate detection; 2). heavily occluded instances are easier to be suppressed by Non-Maximum-Suppression (NMS). To address these two issues, we introduce a variant of two-stage detectors called PS-RCNN. PS-RCNN first detects slightly/none occluded objects by an R-CNN [1] module (referred as P-RCNN), and then suppress the detected instances by human-shaped masks so that the features of heavily occluded instances can stand out. After that, PS-RCNN utilizes another R-CNN module specialized in heavily occluded human detection (referred as S-RCNN) to detect the rest missed objects by P-RCNN. Final results are the ensemble of the outputs from these two RCNNs. Moreover, we introduce a High Resolution RoI Align (HRRA) module to retain as much of fine-grained features of visible parts of the heavily occluded humans as possible. Our PS-RCNN significantly improves recall and AP by 4.49% and 2.92% respectively on CrowdHuman [2], compared to the baseline. Similar improvements on Widerperson [3] are also achieved by the PS-RCNN.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Detecting human bodies in highly crowded scenes is a challenging problem. Two main reasons result in such a problem: 1). weak visual cues of heavily occluded instances can hardly provide sufficient information for accurate detection; 2). heavily occluded instances are easier to be suppressed by Non-Maximum-Suppression (NMS). To address these two issues, we introduce a variant of two-stage detectors called PS-RCNN. PS-RCNN first detects slightly/none occluded objects by an R-CNN [1] module (referred as P-RCNN), and then suppress the detected instances by human-shaped masks so that the features of heavily occluded instances can stand out. After that, PS-RCNN utilizes another R-CNN module specialized in heavily occluded human detection (referred as S-RCNN) to detect the rest missed objects by P-RCNN. Final results are the ensemble of the outputs from these two RCNNs. Moreover, we introduce a High Resolution RoI Align (HRRA) module to retain as much of fine-grained features of visible parts of the heavily occluded humans as possible. Our PS-RCNN significantly improves recall and AP by 4.49% and 2.92% respectively on CrowdHuman [2], compared to the baseline. Similar improvements on Widerperson [3] are also achieved by the PS-RCNN.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Detecting human bodies in highly crowded scenes is a challenging problem. Two main reasons result in such a problem: 1). weak visual cues of heavily occluded instances can hardly provide sufficient information for accurate detection; 2). heavily occluded instances are easier to be suppressed by Non-Maximum-Suppression (NMS). To address these two issues, we introduce a variant of two-stage detectors called PS-RCNN. PS-RCNN first detects slightly/none occluded objects by an R-CNN [1] module (referred as P-RCNN), and then suppress the detected instances by human-shaped masks so that the features of heavily occluded instances can stand out. After that, PS-RCNN utilizes another R-CNN module specialized in heavily occluded human detection (referred as S-RCNN) to detect the rest missed objects by P-RCNN. Final results are the ensemble of the outputs from these two RCNNs. Moreover, we introduce a High Resolution RoI Align (HRRA) module to retain as much of fine-grained features of visible parts of the heavily occluded humans as possible. Our PS-RCNN significantly improves recall and AP by 4.49% and 2.92% respectively on CrowdHuman [2], compared to the baseline. Similar improvements on Widerperson [3] are also achieved by the PS-RCNN.",
"fno": "09102793",
"keywords": [
"Convolutional Neural Nets",
"Feature Extraction",
"Object Detection",
"Nonmaximum Suppression",
"PS RCNN",
"R CNN Module",
"Human Detection",
"Human Instances",
"Object Suppression",
"Crowdhuman",
"High Resolution Roi Align",
"HRRA",
"Human Shaped Masks",
"Occluded Humans",
"Occluded Objects",
"Feature Extraction",
"Detectors",
"Visualization",
"Proposals",
"Standards",
"Biological System Modeling",
"Training",
"Human Body Detection",
"Crowded Scenes",
"PS RCNN",
"Human Shaped Mask"
],
"authors": [
{
"affiliation": "Waseda University",
"fullName": "Zheng Ge",
"givenName": "Zheng",
"surname": "Ge",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Waseda University",
"fullName": "Zequn Jie",
"givenName": "Zequn",
"surname": "Jie",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Waseda University",
"fullName": "Xin Huang",
"givenName": "Xin",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Waseda University",
"fullName": "Rong Xu",
"givenName": "Rong",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Waseda University",
"fullName": "Osamu Yoshie",
"givenName": "Osamu",
"surname": "Yoshie",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-1331-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09102929",
"articleId": "1kwrekns0gg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09102949",
"articleId": "1kwqZnGOidy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457d039",
"title": "A-Fast-RCNN: Hard Positive Generation via Adversary for Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457d039/12OmNAZfxGZ",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493b514",
"title": "Subspace Model Based Discriminative Instances Selection for Weakly Supervised Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493b514/12OmNB9KHvq",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457g469",
"title": "Learning Non-maximum Suppression",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457g469/12OmNxGAL7E",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g890",
"title": "Instances as Queries",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g890/1BmGoGRmmlO",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cniot/2022/6910/0/691000a212",
"title": "Human-Cascaded network for Robust Detection of Occluded Pedestrian",
"doi": null,
"abstractUrl": "/proceedings-article/cniot/2022/691000a212/1EOEg9ovlWU",
"parentPublication": {
"id": "proceedings/cniot/2022/6910/0",
"title": "2022 3rd International Conference on Computing, Networks and Internet of Things (CNIOT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300j507",
"title": "NOTE-RCNN: NOise Tolerant Ensemble RCNN for Semi-Supervised Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300j507/1hQqpTLgM1O",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300g667",
"title": "Multi-Adversarial Faster-RCNN for Unrestricted Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300g667/1hVlRZYCZTa",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300e966",
"title": "Mask-Guided Attention Network for Occluded Pedestrian Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300e966/1hVlj5DuYZG",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800n3427",
"title": "Temporal-Context Enhanced Detection of Heavily Occluded Pedestrians",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800n3427/1m3nDhEvVXG",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412038",
"title": "DualBox: Generating BBox Pair with Strong Correspondence via Occlusion Pattern Clustering and Proposal Refinement",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412038/1tmiSTBxdss",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lPGXn8hEiI",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1lPHf27V65a",
"doi": "10.1109/CVPRW50498.2020.00120",
"title": "Continual Learning of Object Instances",
"normalizedTitle": "Continual Learning of Object Instances",
"abstract": "We propose continual instance learning - a method that applies the concept of continual learning to the task of distinguishing instances of the same object category. We specifically focus on the car object, and incrementally learn to distinguish car instances from each other with metric learning. We begin our paper by evaluating current techniques. Establishing that catastrophic forgetting is evident in existing methods, we then propose two remedies. Firstly, we regularise metric learning via Normalised Cross-Entropy. Secondly, we augment existing models with synthetic data transfer. Our extensive experiments on three large-scale datasets, using two different architectures for five different continual learning methods, reveal that Normalised cross-entropy and synthetic transfer leads to less forgetting in existing techniques.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We propose continual instance learning - a method that applies the concept of continual learning to the task of distinguishing instances of the same object category. We specifically focus on the car object, and incrementally learn to distinguish car instances from each other with metric learning. We begin our paper by evaluating current techniques. Establishing that catastrophic forgetting is evident in existing methods, we then propose two remedies. Firstly, we regularise metric learning via Normalised Cross-Entropy. Secondly, we augment existing models with synthetic data transfer. Our extensive experiments on three large-scale datasets, using two different architectures for five different continual learning methods, reveal that Normalised cross-entropy and synthetic transfer leads to less forgetting in existing techniques.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We propose continual instance learning - a method that applies the concept of continual learning to the task of distinguishing instances of the same object category. We specifically focus on the car object, and incrementally learn to distinguish car instances from each other with metric learning. We begin our paper by evaluating current techniques. Establishing that catastrophic forgetting is evident in existing methods, we then propose two remedies. Firstly, we regularise metric learning via Normalised Cross-Entropy. Secondly, we augment existing models with synthetic data transfer. Our extensive experiments on three large-scale datasets, using two different architectures for five different continual learning methods, reveal that Normalised cross-entropy and synthetic transfer leads to less forgetting in existing techniques.",
"fno": "09150880",
"keywords": [
"Learning Artificial Intelligence",
"Object Detection",
"Traffic Engineering Computing",
"Object Instances",
"Continual Instance Learning",
"Object Category",
"Car Object",
"Car Instances",
"Metric Learning",
"Continual Learning Methods",
"Normalised Cross Entropy",
"Synthetic Data Transfer",
"Automobiles",
"Task Analysis",
"Measurement",
"Training",
"Data Models",
"Visualization",
"Companies"
],
"authors": [
{
"affiliation": "University of Amsterdam,The Netherlands",
"fullName": "Kishan Parshotam",
"givenName": "Kishan",
"surname": "Parshotam",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Amsterdam,The Netherlands",
"fullName": "Mert Kilickaya",
"givenName": "Mert",
"surname": "Kilickaya",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "907-914",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9360-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09150667",
"articleId": "1lPHw8oOHok",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09150851",
"articleId": "1lPH8MIA8rS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvprw/2018/6100/0/610000c112",
"title": "New Metrics and Experimental Paradigms for Continual Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000c112/17D45XH89pr",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600q6691",
"title": "Probing Representation Forgetting in Supervised and Unsupervised Continual Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600q6691/1H0OAetRnKo",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600a139",
"title": "Learning to Prompt for Continual Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600a139/1H1hEyrIrFm",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/10113287",
"title": "Variational Data-Free Knowledge Distillation for Continual Learning",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/10113287/1MNbFo1W1oI",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09150688",
"title": "What is Happening Inside a Continual Learning Model? - A Representation-Based Evaluation of Representational Forgetting -",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09150688/1lPHvM1UBR6",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/10/09477031",
"title": "Adaptive Progressive Continual Learning",
"doi": null,
"abstractUrl": "/journal/tp/2022/10/09477031/1v2M5k8mXDi",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900d644",
"title": "Class-Incremental Experience Replay for Continual Learning under Concept Drift",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900d644/1yVzO9ZFXUs",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900d477",
"title": "Insights from the Future for Continual Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900d477/1yVzRMtPsLS",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900d497",
"title": "Selective Replay Enhances Learning in Online Continual Analogical Reasoning",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900d497/1yVzWU09DQk",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900q6669",
"title": "Continual Learning via Bit-Level Information Preserving",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900q6669/1yeJUvyx8pq",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzahbR6",
"title": "2006 International Conference on Hybrid Information Technology",
"acronym": "ichit",
"groupId": "1001740",
"volume": "2",
"displayVolume": "2",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAYoKhU",
"doi": "10.1109/ICHIT.2006.191",
"title": "Performance Analysis of 2-tier Clustering",
"normalizedTitle": "Performance Analysis of 2-tier Clustering",
"abstract": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"fno": "267420542",
"keywords": [],
"authors": [
{
"affiliation": "Konkuk University",
"fullName": "JunWon Hwang",
"givenName": "JunWon",
"surname": "Hwang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yong-In Songdam College",
"fullName": "DooHeon Song",
"givenName": "DooHeon",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Konkuk University",
"fullName": "ChangHoon Lee",
"givenName": "ChangHoon",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ichit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-11-01T00:00:00",
"pubType": "proceedings",
"pages": "542-547",
"year": "2006",
"issn": null,
"isbn": "0-7695-2674-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04021275",
"articleId": "12OmNvDZEPO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04021276",
"articleId": "12OmNCd2rnv",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ichit/2006/2674/2/04021264",
"title": "Performance Analysis of 2-tier Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/ichit/2006/04021264/12OmNBQ2VP6",
"parentPublication": {
"id": "proceedings/ichit/2006/2674/2",
"title": "2006 International Conference on Hybrid Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcs/2006/2540/0/25400025",
"title": "Controlling Quality of Service in Multi-Tier Web Applications",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/2006/25400025/12OmNqzu6Jc",
"parentPublication": {
"id": "proceedings/icdcs/2006/2540/0",
"title": "26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/swste/2005/2335/0/23350023",
"title": "Robust Active Super Tier Systems",
"doi": null,
"abstractUrl": "/proceedings-article/swste/2005/23350023/12OmNwtn3yA",
"parentPublication": {
"id": "proceedings/swste/2005/2335/0",
"title": "Proceedings. IEEE International Conference on Software - Science, Technology and Engineering. SwSTE '05",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2010/6442/0/05470449",
"title": "Using the middle tier to understand cross-tier delay in a multi-tier application",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2010/05470449/12OmNx4gUjg",
"parentPublication": {
"id": "proceedings/ipdps/2010/6442/0",
"title": "2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2006/2701/0/270100953",
"title": "Multi-Tier Granule Mining for Representations of Multidimensional Association Rules",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2006/270100953/12OmNxQOjAf",
"parentPublication": {
"id": "proceedings/icdm/2006/2701/0",
"title": "Sixth International Conference on Data Mining (ICDM'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn/2007/2855/0/28550677",
"title": "Improving Recoverability in Multi-tier Storage Systems",
"doi": null,
"abstractUrl": "/proceedings-article/dsn/2007/28550677/12OmNyRPgsd",
"parentPublication": {
"id": "proceedings/dsn/2007/2855/0",
"title": "37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chinagrid/2010/7543/0/05563012",
"title": "A 2-Tier Clustering Algorithm with Map-Reduce",
"doi": null,
"abstractUrl": "/proceedings-article/chinagrid/2010/05563012/12OmNzUgd3K",
"parentPublication": {
"id": "proceedings/chinagrid/2010/7543/0",
"title": "2010 Fifth Annual ChinaGrid Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcs/2008/3250/0/3250a161",
"title": "High Performance Networks for the ATLAS Tier-1 @ TRIUMF",
"doi": null,
"abstractUrl": "/proceedings-article/hpcs/2008/3250a161/12OmNzcPAAx",
"parentPublication": {
"id": "proceedings/hpcs/2008/3250/0",
"title": "2008 22nd International Symposium on High Performance Computing Systems and Applications (HPCS '08)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2016/03/07080910",
"title": "ISP Service Tier Design",
"doi": null,
"abstractUrl": "/journal/nt/2016/03/07080910/13rRUwdIOXx",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/2020/03/08936528",
"title": "Inter-Tier Process-Variation-Aware Monolithic 3-D NoC Design Space Exploration",
"doi": null,
"abstractUrl": "/journal/si/2020/03/08936528/1fRz4YGZubC",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzahbR6",
"title": "2006 International Conference on Hybrid Information Technology",
"acronym": "ichit",
"groupId": "1001740",
"volume": "2",
"displayVolume": "2",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBQ2VP6",
"doi": "10.1109/ICHIT.2006.253659",
"title": "Performance Analysis of 2-tier Clustering",
"normalizedTitle": "Performance Analysis of 2-tier Clustering",
"abstract": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers for the clustering of a certain tier, to efficiently model web user clustering. The 2-tier clustering is algorithm-free and is efficient in cases of high uncertainty in tier information. Analysis has been conducted on the performance parameters, which is required to efficiently run the 2-tier clustering.",
"fno": "04021264",
"keywords": [
"Performance Analysis",
"Clustering Algorithms",
"Uncertainty",
"Information Analysis",
"Algorithm Design And Analysis",
"Web Pages",
"Information Technology",
"Computer Science",
"Data Engineering",
"Educational Institutions"
],
"authors": [
{
"affiliation": "Konkuk University",
"fullName": "Junwon Hwang",
"givenName": "Junwon",
"surname": "Hwang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yong-In Songdam College",
"fullName": "Dooheon Song",
"givenName": "Dooheon",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Konkuk University",
"fullName": "Changhoon Lee",
"givenName": "Changhoon",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ichit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-11-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2006",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "267420460",
"articleId": "12OmNylKAOt",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "267420467",
"articleId": "12OmNyTfgbU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipdps/2000/0574/0/05740663",
"title": "A Multi-Tier RAID Storage System with RAID1 and RAID5",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2000/05740663/12OmNAY79gW",
"parentPublication": {
"id": "proceedings/ipdps/2000/0574/0",
"title": "Parallel and Distributed Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichit/2006/2674/2/267420542",
"title": "Performance Analysis of 2-tier Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/ichit/2006/267420542/12OmNAYoKhU",
"parentPublication": {
"id": "proceedings/ichit/2006/2674/2",
"title": "2006 International Conference on Hybrid Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2010/4189/0/4189a164",
"title": "COTE: A Clustering Scheme with Optimal Tiers and Energy Efficiency in Wireless Sensor Networks",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2010/4189a164/12OmNrJRPdX",
"parentPublication": {
"id": "proceedings/skg/2010/4189/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2014/7100/0/07073214",
"title": "On the interplay between clustering and power control in multihop wireless networks",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2014/07073214/12OmNrkBwms",
"parentPublication": {
"id": "proceedings/aiccsa/2014/7100/0",
"title": "2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2006/2701/0/270100953",
"title": "Multi-Tier Granule Mining for Representations of Multidimensional Association Rules",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2006/270100953/12OmNxQOjAf",
"parentPublication": {
"id": "proceedings/icdm/2006/2701/0",
"title": "Sixth International Conference on Data Mining (ICDM'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chinagrid/2010/7543/0/05563012",
"title": "A 2-Tier Clustering Algorithm with Map-Reduce",
"doi": null,
"abstractUrl": "/proceedings-article/chinagrid/2010/05563012/12OmNzUgd3K",
"parentPublication": {
"id": "proceedings/chinagrid/2010/7543/0",
"title": "2010 Fifth Annual ChinaGrid Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcs/2008/3250/0/3250a161",
"title": "High Performance Networks for the ATLAS Tier-1 @ TRIUMF",
"doi": null,
"abstractUrl": "/proceedings-article/hpcs/2008/3250a161/12OmNzcPAAx",
"parentPublication": {
"id": "proceedings/hpcs/2008/3250/0",
"title": "2008 22nd International Symposium on High Performance Computing Systems and Applications (HPCS '08)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2009/06/05208212",
"title": "On bandwidth tiered service",
"doi": null,
"abstractUrl": "/journal/nt/2009/06/05208212/13rRUxDIted",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440035",
"title": "Clustrophile 2: Guided Visual Clustering Analysis",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440035/17D45WnnFYU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/2020/03/08936528",
"title": "Inter-Tier Process-Variation-Aware Monolithic 3-D NoC Design Space Exploration",
"doi": null,
"abstractUrl": "/journal/si/2020/03/08936528/1fRz4YGZubC",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNArbG3u",
"title": "Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE'04)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC8uRlz",
"doi": "10.1109/BIBE.2004.1317357",
"title": "A Method for Evaluating the Quality of String Dissimilarity Measures and Clustering Algorithms for EST Clustering",
"normalizedTitle": "A Method for Evaluating the Quality of String Dissimilarity Measures and Clustering Algorithms for EST Clustering",
"abstract": "We present a method for evaluating the suitability of different string dissimilarity measures and clustering algorithms for EST clustering, one of the main techniques used in transcriptome projects. The method comprises generating simulated ESTs with user-specified parameters, and then evaluating the quality of clusterings produced when different dissimilarity measures and different clustering algorithms are used. We implemented two tools to do this: ESTSim (EST Simulator), which generates simulated EST sequences from mRNAs/cDNAs using user-specified parameters, and ECLEST (Evaluator for CLusterings of ESTs), which computes and evaluates a clustering of a set of input ESTs, where the dissimilarity measure, the clustering algorithm, and the clustering validity index can be specified independently. We demonstrate the method on a sample of 699 cDNAs, generating approximately 16,000 simulated ESTs. We conducted two experiments and derived statistically significant results from this study comparing subword-based dissimilarity measures to alignment-based ones.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a method for evaluating the suitability of different string dissimilarity measures and clustering algorithms for EST clustering, one of the main techniques used in transcriptome projects. The method comprises generating simulated ESTs with user-specified parameters, and then evaluating the quality of clusterings produced when different dissimilarity measures and different clustering algorithms are used. We implemented two tools to do this: ESTSim (EST Simulator), which generates simulated EST sequences from mRNAs/cDNAs using user-specified parameters, and ECLEST (Evaluator for CLusterings of ESTs), which computes and evaluates a clustering of a set of input ESTs, where the dissimilarity measure, the clustering algorithm, and the clustering validity index can be specified independently. We demonstrate the method on a sample of 699 cDNAs, generating approximately 16,000 simulated ESTs. We conducted two experiments and derived statistically significant results from this study comparing subword-based dissimilarity measures to alignment-based ones.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a method for evaluating the suitability of different string dissimilarity measures and clustering algorithms for EST clustering, one of the main techniques used in transcriptome projects. The method comprises generating simulated ESTs with user-specified parameters, and then evaluating the quality of clusterings produced when different dissimilarity measures and different clustering algorithms are used. We implemented two tools to do this: ESTSim (EST Simulator), which generates simulated EST sequences from mRNAs/cDNAs using user-specified parameters, and ECLEST (Evaluator for CLusterings of ESTs), which computes and evaluates a clustering of a set of input ESTs, where the dissimilarity measure, the clustering algorithm, and the clustering validity index can be specified independently. We demonstrate the method on a sample of 699 cDNAs, generating approximately 16,000 simulated ESTs. We conducted two experiments and derived statistically significant results from this study comparing subword-based dissimilarity measures to alignment-based ones.",
"fno": "21730301",
"keywords": [
"String Similarity And Dissimilarity Measures",
"EST Clustering",
"Transcriptome",
"Simulated Data",
"Benchmarks"
],
"authors": [
{
"affiliation": "ETH Zurich",
"fullName": "Judith Zimmermann",
"givenName": "Judith",
"surname": "Zimmermann",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universit?t Bielefeld, Germany",
"fullName": "Zsuzsanna Lipt?",
"givenName": "Zsuzsanna",
"surname": "Lipt?",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of the Witwatersrand, South Africa",
"fullName": "Scott Hazelhurst",
"givenName": "Scott",
"surname": "Hazelhurst",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibe",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-05-01T00:00:00",
"pubType": "proceedings",
"pages": "301",
"year": "2004",
"issn": null,
"isbn": "0-7695-2173-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21730293",
"articleId": "12OmNs0TL1Y",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21730310",
"articleId": "12OmNwc3wyp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/1995/6921/0/69210052",
"title": "Implementation and testing of an automated EST processing and similarity analysis system",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/1995/69210052/12OmNwCaCpl",
"parentPublication": {
"id": "proceedings/hicss/1995/6921/0",
"title": "28th Hawaii International Conference on System Sciences (HICSS'95)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/socpar/2009/3879/0/3879a025",
"title": "A Review of Recent Alignment-Free Clustering Algorithms in Expressed Sequence Tag",
"doi": null,
"abstractUrl": "/proceedings-article/socpar/2009/3879a025/12OmNwErpsq",
"parentPublication": {
"id": "proceedings/socpar/2009/3879/0",
"title": "Soft Computing and Pattern Recognition, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpp/2002/1677/0/16770331",
"title": "Space and Time Efficient Parallel Algorithms and Software for EST Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icpp/2002/16770331/12OmNwwd2Qy",
"parentPublication": {
"id": "proceedings/icpp/2002/1677/0",
"title": "Proceedings International Conference on Parallel Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2005/9313/0/01577067",
"title": "BIO101 - EST sequence management and annotation system",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2005/01577067/12OmNx5Yvej",
"parentPublication": {
"id": "proceedings/isspit/2005/9313/0",
"title": "2005 IEEE International Symposium on Signal Processing and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbeb/2012/4706/0/4706b331",
"title": "Development of EST-SSR Primers and Genetic Realtionships Revealed in Tree Peony",
"doi": null,
"abstractUrl": "/proceedings-article/icbeb/2012/4706b331/12OmNxEjXWo",
"parentPublication": {
"id": "proceedings/icbeb/2012/4706/0",
"title": "Biomedical Engineering and Biotechnology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pcspa/2010/4180/0/4180a968",
"title": "EST Clustering in Large Dataset with MapReduce",
"doi": null,
"abstractUrl": "/proceedings-article/pcspa/2010/4180a968/12OmNyo1nQo",
"parentPublication": {
"id": "proceedings/pcspa/2010/4180/0",
"title": "Pervasive Computing, Signal Porcessing and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ie/2011/4452/0/4452a055",
"title": "Behavioural Pattern Identification in a Smart Home Using Binary Similarity and Dissimilarity Measures",
"doi": null,
"abstractUrl": "/proceedings-article/ie/2011/4452a055/12OmNyv7mcv",
"parentPublication": {
"id": "proceedings/ie/2011/4452/0",
"title": "Intelligent Environments, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2002/1573/2/15730185",
"title": "Parallel EST Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2002/15730185/12OmNzVoBzP",
"parentPublication": {
"id": "proceedings/ipdps/2002/1573/2",
"title": "Parallel and Distributed Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2008/01/ttp2008010076",
"title": "A Redundancy-Based Measure of Dissimilarity among Probability Distributions for Hierarchical Clustering Criteria",
"doi": null,
"abstractUrl": "/journal/tp/2008/01/ttp2008010076/13rRUNvgyXz",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2003/12/l1209",
"title": "Space and Time Efficient Parallel Algorithms and Software for EST Clustering",
"doi": null,
"abstractUrl": "/journal/td/2003/12/l1209/13rRUxly8X4",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCdk2Yv",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxb5hsP",
"doi": "10.1109/VISUAL.2000.885677",
"title": "H-BLOB: A Hierarchical Visual Clustering Method Using Implicit Surfaces",
"normalizedTitle": "H-BLOB: A Hierarchical Visual Clustering Method Using Implicit Surfaces",
"abstract": "In this paper, we present a new hierarchical clustering and visualization algorithm called H-BLOB, which groups and visualizes cluster hierarchies at multiple levels-of-detail. Our method is fundamentally different to conventional clustering algorithms, such as C-means, K-means, or linkage methods that are primarily designed to partition a collection of objects into subsets sharing similar attributes. These approaches usually lack an efficient level-of-detail strategy that breaks down the visual complexity of very large datasets for visualization. In contrast, our method combines grouping and visualization in a two stage process constructing a hierarchical setting. In the first stage a cluster tree is computed making use of an edge contraction operator. Exploiting the inherent hierarchical structure of this tree, a second stage visualizes the clusters by computing a hierarchy of implicit surfaces. We believe that H-BLOB is especially suited for the visualization of very large datasets and for visual decision making in information visualization. The versatility of the algorithm is demonstrated using examples from visual data mining.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present a new hierarchical clustering and visualization algorithm called H-BLOB, which groups and visualizes cluster hierarchies at multiple levels-of-detail. Our method is fundamentally different to conventional clustering algorithms, such as C-means, K-means, or linkage methods that are primarily designed to partition a collection of objects into subsets sharing similar attributes. These approaches usually lack an efficient level-of-detail strategy that breaks down the visual complexity of very large datasets for visualization. In contrast, our method combines grouping and visualization in a two stage process constructing a hierarchical setting. In the first stage a cluster tree is computed making use of an edge contraction operator. Exploiting the inherent hierarchical structure of this tree, a second stage visualizes the clusters by computing a hierarchy of implicit surfaces. We believe that H-BLOB is especially suited for the visualization of very large datasets and for visual decision making in information visualization. The versatility of the algorithm is demonstrated using examples from visual data mining.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present a new hierarchical clustering and visualization algorithm called H-BLOB, which groups and visualizes cluster hierarchies at multiple levels-of-detail. Our method is fundamentally different to conventional clustering algorithms, such as C-means, K-means, or linkage methods that are primarily designed to partition a collection of objects into subsets sharing similar attributes. These approaches usually lack an efficient level-of-detail strategy that breaks down the visual complexity of very large datasets for visualization. In contrast, our method combines grouping and visualization in a two stage process constructing a hierarchical setting. In the first stage a cluster tree is computed making use of an edge contraction operator. Exploiting the inherent hierarchical structure of this tree, a second stage visualizes the clusters by computing a hierarchy of implicit surfaces. We believe that H-BLOB is especially suited for the visualization of very large datasets and for visual decision making in information visualization. The versatility of the algorithm is demonstrated using examples from visual data mining.",
"fno": "64780006",
"keywords": [
"Clustering",
"Categorization",
"Partitioning",
"Information Visualization",
"Non Linear Dimensionality Reduction",
"Physics Based Graph Layout",
"Cluster Visualization",
"Multidimensional Information Visualization"
],
"authors": [
{
"affiliation": "ETH Zurich",
"fullName": "T.C. Sprenger",
"givenName": "T.C.",
"surname": "Sprenger",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zurich",
"fullName": "R. Brunella",
"givenName": "R.",
"surname": "Brunella",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zurich",
"fullName": "M.H. Gross",
"givenName": "M.H.",
"surname": "Gross",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-10-01T00:00:00",
"pubType": "proceedings",
"pages": "6",
"year": "2000",
"issn": "1070-2385",
"isbn": "0-7803-6478-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "64780005",
"articleId": "12OmNx8wTqW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "64780007",
"articleId": "12OmNxEjXXr",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-infovis/1999/0431/0/04310073",
"title": "Cushion Treemaps: Visualization of Hierarchical Information",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/1999/04310073/12OmNAle6om",
"parentPublication": {
"id": "proceedings/ieee-infovis/1999/0431/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1993/3940/0/00398875",
"title": "Implicit stream surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1993/00398875/12OmNAlvI2V",
"parentPublication": {
"id": "proceedings/visual/1993/3940/0",
"title": "Proceedings Visualization '93",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grc/2009/4830/0/05255062",
"title": "Hierarchical structure analysis and visualization of Japanese law networks based on morphological analysis and granular computing",
"doi": null,
"abstractUrl": "/proceedings-article/grc/2009/05255062/12OmNvSbBJ6",
"parentPublication": {
"id": "proceedings/grc/2009/4830/0",
"title": "2009 IEEE International Conference on Granular Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/1998/9093/0/90930121",
"title": "The Shape of Shakespeare: Visualizing Text using Implicit Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/1998/90930121/12OmNyz5JUP",
"parentPublication": {
"id": "proceedings/ieee-infovis/1998/9093/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2004/8779/0/87790057",
"title": "Steerable, Progressive Multidimensional Scaling",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2004/87790057/12OmNzV70oY",
"parentPublication": {
"id": "proceedings/ieee-infovis/2004/8779/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/05/v0741",
"title": "Hierarchical Edge Bundles: Visualization of Adjacency Relations in Hierarchical Data",
"doi": null,
"abstractUrl": "/journal/tg/2006/05/v0741/13rRUwjoNwT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2006/02/mcg2006020040",
"title": "Hierarchical Visualization of Network Intrusion Detection Data",
"doi": null,
"abstractUrl": "/magazine/cg/2006/02/mcg2006020040/13rRUx0Pqv3",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/06/07127031",
"title": "Blob Enhancement and Visualization for Improved Intracranial Aneurysm Detection",
"doi": null,
"abstractUrl": "/journal/tg/2016/06/07127031/13rRUxCitJg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2002/03/v0255",
"title": "Hierarchical Pixel Bar Charts",
"doi": null,
"abstractUrl": "/journal/tg/2002/03/v0255/13rRUyuegh1",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2003/2055/0/01249015",
"title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2003/01249015/18M76LncjTO",
"parentPublication": {
"id": "proceedings/ieee-infovis/2003/2055/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxzMnU0",
"title": "2011 15th International Conference on Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxveNLS",
"doi": "10.1109/IV.2011.41",
"title": "Visual Clustering of Spam Emails for DDoS Analysis",
"normalizedTitle": "Visual Clustering of Spam Emails for DDoS Analysis",
"abstract": "Networking attacks embedded in spam emails are increasingly becoming numerous and sophisticated in nature. Hence this has given a growing need for spam email analysis to identify these attacks. The use of these intrusion detection systems has given rise to other two issues, 1) the presentation and understanding of large amounts of spam emails, 2) the user-assisted input and quantified adjustment during the analysis process. In this paper we introduce a new analytical model that uses two coefficient vectors: 'density' and 'weight'for the analysis of spam email viruses and attacks. We then use a visual clustering method to classify and display the spam emails. The visualization allows users to interactively select and scale down the scope of views for better understanding of different types of the spam email attacks. The experiment shows that this new model with the clustering visualization can be effectively used for network security analysis.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Networking attacks embedded in spam emails are increasingly becoming numerous and sophisticated in nature. Hence this has given a growing need for spam email analysis to identify these attacks. The use of these intrusion detection systems has given rise to other two issues, 1) the presentation and understanding of large amounts of spam emails, 2) the user-assisted input and quantified adjustment during the analysis process. In this paper we introduce a new analytical model that uses two coefficient vectors: 'density' and 'weight'for the analysis of spam email viruses and attacks. We then use a visual clustering method to classify and display the spam emails. The visualization allows users to interactively select and scale down the scope of views for better understanding of different types of the spam email attacks. The experiment shows that this new model with the clustering visualization can be effectively used for network security analysis.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Networking attacks embedded in spam emails are increasingly becoming numerous and sophisticated in nature. Hence this has given a growing need for spam email analysis to identify these attacks. The use of these intrusion detection systems has given rise to other two issues, 1) the presentation and understanding of large amounts of spam emails, 2) the user-assisted input and quantified adjustment during the analysis process. In this paper we introduce a new analytical model that uses two coefficient vectors: 'density' and 'weight'for the analysis of spam email viruses and attacks. We then use a visual clustering method to classify and display the spam emails. The visualization allows users to interactively select and scale down the scope of views for better understanding of different types of the spam email attacks. The experiment shows that this new model with the clustering visualization can be effectively used for network security analysis.",
"fno": "06004024",
"keywords": [
"Computer Viruses",
"Pattern Clustering",
"Security Of Data",
"Unsolicited E Mail",
"Spam Emails",
"D Do S Analysis",
"Intrusion Detection Systems",
"Email Viruses",
"Visual Clustering Method",
"Network Security Analysis",
"Visualization",
"IP Networks",
"Servers",
"Computer Crime",
"Computer Viruses",
"Data Visualization",
"Spam Email",
"Network Security Analysis",
"Clustered Visualization",
"Information Visualization",
"Network Intrusion Detection",
"D Do S Attacks"
],
"authors": [
{
"affiliation": "Sch. of Software, Univ. of Technol., Sydney, NSW, Australia",
"fullName": "Mao Lin Huang",
"givenName": "Mao Lin",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sch. of Software, Univ. of Technol., Sydney, NSW, Australia",
"fullName": "Jinson Zhang",
"givenName": "Jinson",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sch. of Comput. & Math., Univ. of Western Sydney, Sydney, NSW, Australia",
"fullName": "Quang Vinh Nguyen",
"givenName": "Quang Vinh",
"surname": "Nguyen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sch. of Inf. & Commun. Technol., Griffith Univ., Griffith, NSW, Australia",
"fullName": "Junhu Wang",
"givenName": "Junhu",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-07-01T00:00:00",
"pubType": "proceedings",
"pages": "65-72",
"year": "2011",
"issn": "1550-6037",
"isbn": "978-1-4577-0868-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06004023",
"articleId": "12OmNwe2ICg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06004025",
"articleId": "12OmNzSQdqN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fgcn/2007/3048/1/30480408",
"title": "An Empirical Study of Spam and Spam Vulnerable email Accounts",
"doi": null,
"abstractUrl": "/proceedings-article/fgcn/2007/30480408/12OmNCvLXZZ",
"parentPublication": {
"id": "proceedings/fgcn/2007/3048/1",
"title": "2007 International Conference on Future Generation Communication and Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/saint/2010/4107/0/4107a257",
"title": "An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers",
"doi": null,
"abstractUrl": "/proceedings-article/saint/2010/4107a257/12OmNrH1PCB",
"parentPublication": {
"id": "proceedings/saint/2010/4107/0",
"title": "2010 10th IEEE/IPSJ International Symposium on Applications and the Internet",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2005/2432/0/24320223",
"title": "Spam Filtering based on Preference Ranking",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2005/24320223/12OmNwE9ORU",
"parentPublication": {
"id": "proceedings/cit/2005/2432/0",
"title": "The Fifth International Conference on Computer and Information Technology CIT 2005",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmc/2011/312/0/05931134",
"title": "Observation and Analysis on Spam Sending Behavior",
"doi": null,
"abstractUrl": "/proceedings-article/cmc/2011/05931134/12OmNwwd2Pe",
"parentPublication": {
"id": "proceedings/cmc/2011/312/0",
"title": "2011 Third International Conference on Communications and Mobile Computing (CMC 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ctc/2013/3076/0/3076a058",
"title": "Malicious Spam Emails Developments and Authorship Attribution",
"doi": null,
"abstractUrl": "/proceedings-article/ctc/2013/3076a058/12OmNx8fi7m",
"parentPublication": {
"id": "proceedings/ctc/2013/3076/0",
"title": "2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761828",
"title": "Combining visual and textual features for filtering spam emails",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761828/12OmNyFCvWH",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2013/5108/0/5108a657",
"title": "Classifying Spam Emails Using Text and Readability Features",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2013/5108a657/12OmNzmclJd",
"parentPublication": {
"id": "proceedings/icdm/2013/5108/0",
"title": "2013 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icissp/2015/135/0/07509934",
"title": "Clustering spam emails into campaigns",
"doi": null,
"abstractUrl": "/proceedings-article/icissp/2015/07509934/12OmNznkJZd",
"parentPublication": {
"id": "proceedings/icissp/2015/135/0",
"title": "2015 International Conference on Information Systems Security and Privacy (ICISSP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wetice/2020/6975/0/697500a193",
"title": "A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach",
"doi": null,
"abstractUrl": "/proceedings-article/wetice/2020/697500a193/1qROZVt3WWQ",
"parentPublication": {
"id": "proceedings/wetice/2020/6975/0",
"title": "2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoin/2021/9101/0/09334020",
"title": "A Comprehensive Review on Email Spam Classification using Machine Learning Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/icoin/2021/09334020/1qTrNbiNszu",
"parentPublication": {
"id": "proceedings/icoin/2021/9101/0",
"title": "2021 International Conference on Information Networking (ICOIN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrIJqwt",
"title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy5hRlB",
"doi": "10.1109/ICDMW.2013.99",
"title": "Optimal Correlation Clustering via MaxSAT",
"normalizedTitle": "Optimal Correlation Clustering via MaxSAT",
"abstract": "We introduce an extensible framework for correlation clustering by harnessing the Maximum satisfiability (MaxSAT) Boolean optimization paradigm. The approach is based on formulating the correlation clustering task in an exact fashion as MaxSAT, and then using a state-of-the-art MaxSAT solver for finding clusterings by solving the MaxSAT formulation. Our approach allows for finding optimal clusterings wrt the objective function of the problem, extends to constrained correlation clustering-by allowing for easy integration of user-defined domain knowledge in terms of hard constraints over the clusterings of interest-as well as overlapping correlation clustering. First experiments on the scalability of the approach are presented.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We introduce an extensible framework for correlation clustering by harnessing the Maximum satisfiability (MaxSAT) Boolean optimization paradigm. The approach is based on formulating the correlation clustering task in an exact fashion as MaxSAT, and then using a state-of-the-art MaxSAT solver for finding clusterings by solving the MaxSAT formulation. Our approach allows for finding optimal clusterings wrt the objective function of the problem, extends to constrained correlation clustering-by allowing for easy integration of user-defined domain knowledge in terms of hard constraints over the clusterings of interest-as well as overlapping correlation clustering. First experiments on the scalability of the approach are presented.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We introduce an extensible framework for correlation clustering by harnessing the Maximum satisfiability (MaxSAT) Boolean optimization paradigm. The approach is based on formulating the correlation clustering task in an exact fashion as MaxSAT, and then using a state-of-the-art MaxSAT solver for finding clusterings by solving the MaxSAT formulation. Our approach allows for finding optimal clusterings wrt the objective function of the problem, extends to constrained correlation clustering-by allowing for easy integration of user-defined domain knowledge in terms of hard constraints over the clusterings of interest-as well as overlapping correlation clustering. First experiments on the scalability of the approach are presented.",
"fno": "3143a750",
"keywords": [
"Encoding",
"Correlation",
"Linear Programming",
"Optimization",
"Proteins",
"Clustering Algorithms",
"Scalability",
"Maximum Satisfiability",
"Correlation Clustering"
],
"authors": [
{
"affiliation": null,
"fullName": "Jeremias Berg",
"givenName": "Jeremias",
"surname": "Berg",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Matti Jarvisalo",
"givenName": "Matti",
"surname": "Jarvisalo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "750-757",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-3142-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3143a742",
"articleId": "12OmNwdbVbP",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3143a758",
"articleId": "12OmNyNQSMG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ccbd/2016/3555/0/3555a001",
"title": "Multi-view Clustering via Co-regularized Nonnegative Matrix Factorization with Correlation Constraint",
"doi": null,
"abstractUrl": "/proceedings-article/ccbd/2016/3555a001/12OmNqJZgLT",
"parentPublication": {
"id": "proceedings/ccbd/2016/3555/0",
"title": "2016 7th International Conference on Cloud Computing and Big Data (CCBD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2017/3835/0/3835b117",
"title": "Crowdsourced Correlation Clustering with Relative Distance Comparisons",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2017/3835b117/12OmNvA1hgb",
"parentPublication": {
"id": "proceedings/icdm/2017/3835/0",
"title": "2017 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2013/02/ttk2013020325",
"title": "Clustering Large Probabilistic Graphs",
"doi": null,
"abstractUrl": "/journal/tk/2013/02/ttk2013020325/13rRUIM2VHm",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2012/06/ttk2012061002",
"title": "Document Clustering in Correlation Similarity Measure Space",
"doi": null,
"abstractUrl": "/journal/tk/2012/06/ttk2012061002/13rRUxcbnHF",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08257914",
"title": "Iterative matrix correlation for bisection clustering",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08257914/17D45W9KVHA",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2021/2427/0/242700a431",
"title": "LUCKe — Connecting Clustering and Correlation Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2021/242700a431/1AjSR5sNALS",
"parentPublication": {
"id": "proceedings/icdmw/2021/2427/0",
"title": "2021 International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2022/3418/0/341800a307",
"title": "Anomaly Detection via Correlation Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2022/341800a307/1BYIsFNVc6Q",
"parentPublication": {
"id": "proceedings/icsc/2022/3418/0",
"title": "2022 IEEE 16th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2022/6272/0/627200b078",
"title": "Qubit Mapping and Routing via MaxSAT",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2022/627200b078/1HMSzIljmUw",
"parentPublication": {
"id": "proceedings/micro/2022/6272/0",
"title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2022/5519/0/551900a651",
"title": "Correlation Clustering with Sherali-Adams",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2022/551900a651/1JtvKGj6Vuo",
"parentPublication": {
"id": "proceedings/focs/2022/5519/0",
"title": "2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400a208",
"title": "A Semi-Supervised Framework of Clustering Selection for De-Duplication",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400a208/1aDSVNYv2Fy",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KfQshha0dW",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "10020192",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KfRNJ45ri0",
"doi": "10.1109/BigData55660.2022.10020413",
"title": "Skew-Symmetric Adjacency Matrices for Clustering Directed Graphs",
"normalizedTitle": "Skew-Symmetric Adjacency Matrices for Clustering Directed Graphs",
"abstract": "Cut-based directed graph (digraph) clustering often focuses on finding dense within-cluster or sparse between-cluster connections, similar to cut-based undirected graph clustering. In contrast, for flow-based clusterings the edges between clusters tend to be oriented in one direction and have been found in migration data, food webs, and trade data. In this paper we introduce a spectral algorithm for finding flow-based clusterings. The proposed algorithm is based on recent work which uses complex-valued Hermitian matrices to represent digraphs. By establishing an algebraic relationship between a complex-valued Hermitian representation and an associated real-valued, skew-symmetric matrix the proposed algorithm produces clusterings while remaining completely in the real field. Our algorithm is more memory efficient, requires less computation, and provably preserves solution quality. We also show the algorithm can be easily implemented using standard computational building blocks, possesses better numerical properties, and loans itself to a natural interpretation via an objective function relaxation argument.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Cut-based directed graph (digraph) clustering often focuses on finding dense within-cluster or sparse between-cluster connections, similar to cut-based undirected graph clustering. In contrast, for flow-based clusterings the edges between clusters tend to be oriented in one direction and have been found in migration data, food webs, and trade data. In this paper we introduce a spectral algorithm for finding flow-based clusterings. The proposed algorithm is based on recent work which uses complex-valued Hermitian matrices to represent digraphs. By establishing an algebraic relationship between a complex-valued Hermitian representation and an associated real-valued, skew-symmetric matrix the proposed algorithm produces clusterings while remaining completely in the real field. Our algorithm is more memory efficient, requires less computation, and provably preserves solution quality. We also show the algorithm can be easily implemented using standard computational building blocks, possesses better numerical properties, and loans itself to a natural interpretation via an objective function relaxation argument.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Cut-based directed graph (digraph) clustering often focuses on finding dense within-cluster or sparse between-cluster connections, similar to cut-based undirected graph clustering. In contrast, for flow-based clusterings the edges between clusters tend to be oriented in one direction and have been found in migration data, food webs, and trade data. In this paper we introduce a spectral algorithm for finding flow-based clusterings. The proposed algorithm is based on recent work which uses complex-valued Hermitian matrices to represent digraphs. By establishing an algebraic relationship between a complex-valued Hermitian representation and an associated real-valued, skew-symmetric matrix the proposed algorithm produces clusterings while remaining completely in the real field. Our algorithm is more memory efficient, requires less computation, and provably preserves solution quality. We also show the algorithm can be easily implemented using standard computational building blocks, possesses better numerical properties, and loans itself to a natural interpretation via an objective function relaxation argument.",
"fno": "10020413",
"keywords": [
"Directed Graphs",
"Hermitian Matrices",
"Matrix Algebra",
"Pattern Clustering",
"Between Cluster Connections",
"Complex Valued Hermitian Representation",
"Digraph",
"Directed Graphs",
"Flow Based Clusterings",
"Hermitian Matrices",
"Skew Symmetric Adjacency Matrices",
"Skew Symmetric Matrix",
"Spectral Algorithm",
"Undirected Graph Clustering",
"Measurement",
"Memory Management",
"Clustering Algorithms",
"Directed Graphs",
"Focusing",
"Data Visualization",
"Big Data",
"Spectral Clustering",
"Digraph",
"Oriented Graph"
],
"authors": [
{
"affiliation": "Georgia Institute of Technology,School of Computational Science and Eng.,Atlanta,USA",
"fullName": "Koby Hayashi",
"givenName": "Koby",
"surname": "Hayashi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pacific Northwest National Lab,Richland,USA",
"fullName": "Sinan G. Aksoy",
"givenName": "Sinan G.",
"surname": "Aksoy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Georgia Institute of Technology,School of Computational Science and Eng.,Atlanta,USA",
"fullName": "Haesun Park",
"givenName": "Haesun",
"surname": "Park",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "555-564",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "10020422",
"articleId": "1KfShHjo3M4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "10020773",
"articleId": "1KfShVkgcVy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2008/3268/0/3268a038",
"title": "Visualization of Clustered Directed Acyclic Graphs without Node Overlapping",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a038/12OmNvsDHHu",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/1997/8197/0/81970548",
"title": "A 2-approximation algorithm for the directed multiway cut problem",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1997/81970548/12OmNybx22a",
"parentPublication": {
"id": "proceedings/focs/1997/8197/0",
"title": "Proceedings 38th Annual Symposium on Foundations of Computer Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/12/ttg2012122457",
"title": "Compressed Adjacency Matrices: Untangling Gene Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tg/2012/12/ttg2012122457/13rRUNvyakM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/1993/06/l0686",
"title": "On the Granularity and Clustering of Directed Acyclic Task Graphs",
"doi": null,
"abstractUrl": "/journal/td/1993/06/l0686/13rRUxE04t3",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/04/v0536",
"title": "Drawing Directed Graphs Using Quadratic Programming",
"doi": null,
"abstractUrl": "/journal/tg/2006/04/v0536/13rRUxZRbnT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671995",
"title": "cgSpan: Closed Graph-Based Substructure Pattern Mining",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671995/1A8jmmvJpfO",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2022/2055/0/205500a480",
"title": "Embeddings of Planar Quasimetrics into Directed ℓ<inf>1</inf> and Polylogarithmic Approximation for Directed Sparsest-Cut",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2022/205500a480/1BtfwvmJU2c",
"parentPublication": {
"id": "proceedings/focs/2022/2055/0",
"title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2022/2055/0/205500b147",
"title": "Minimum Cuts in Directed Graphs via Partial Sparsification",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2022/205500b147/1BtfxsqIX6w",
"parentPublication": {
"id": "proceedings/focs/2022/2055/0",
"title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b900",
"title": "Maximal Directed Quasi -Clique Mining",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b900/1FwByMnFMFG",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2022/03/09479723",
"title": "Resilient Real-Valued Consensus in Spite of Mobile Malicious Agents on Directed Graphs",
"doi": null,
"abstractUrl": "/journal/td/2022/03/09479723/1v65Rq9mkX6",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy314bx",
"title": "2017 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"acronym": "wacv",
"groupId": "1000040",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAQanur",
"doi": "10.1109/WACV.2017.136",
"title": "Writer Identification in Noisy Handwritten Documents",
"normalizedTitle": "Writer Identification in Noisy Handwritten Documents",
"abstract": "Identifying the writer of a handwritten document based on visual features is difficult, as evidenced by the limited number of subject matter experts proficient in forensic document analysis. Automating writer identification would be beneficial for such experts' workloads. Academic work in identifying writers has focused on clean benchmark datasets: plain white documents with uniform writing instruments. Solutions on this type of data have achieved hitin-top-10 accuracy rates reaching upwards of 98%. Unfortunately, transferring competitive techniques to handwritten documents with noise is nontrivial. This work highlights efforts in unconstrained writer identification in diverse conditions, including but not limited to lined and graph paper, coffee stains, stamps, and different writing implements. The proposed methodology blends both deep learning and traditional computer vision approaches, exploring deep convolutional neural networks (CNNs) for denoising in conjunction with hand-crafted descriptor features. Our identification algorithms are trained on existing clean datasets artificially augmented with noise, and we evaluate them on a commissioned dataset, which features a diverse but balanced set of writers, writing implements, and writing substrates (incorporating various types of noise). Experimenting with mixtures of segmentation methods, novel denoisers, specialized CNNs, and handcrafted features, we exceed the state of the art in writer identification of noisy handwritten documents by over 10%.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Identifying the writer of a handwritten document based on visual features is difficult, as evidenced by the limited number of subject matter experts proficient in forensic document analysis. Automating writer identification would be beneficial for such experts' workloads. Academic work in identifying writers has focused on clean benchmark datasets: plain white documents with uniform writing instruments. Solutions on this type of data have achieved hitin-top-10 accuracy rates reaching upwards of 98%. Unfortunately, transferring competitive techniques to handwritten documents with noise is nontrivial. This work highlights efforts in unconstrained writer identification in diverse conditions, including but not limited to lined and graph paper, coffee stains, stamps, and different writing implements. The proposed methodology blends both deep learning and traditional computer vision approaches, exploring deep convolutional neural networks (CNNs) for denoising in conjunction with hand-crafted descriptor features. Our identification algorithms are trained on existing clean datasets artificially augmented with noise, and we evaluate them on a commissioned dataset, which features a diverse but balanced set of writers, writing implements, and writing substrates (incorporating various types of noise). Experimenting with mixtures of segmentation methods, novel denoisers, specialized CNNs, and handcrafted features, we exceed the state of the art in writer identification of noisy handwritten documents by over 10%.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Identifying the writer of a handwritten document based on visual features is difficult, as evidenced by the limited number of subject matter experts proficient in forensic document analysis. Automating writer identification would be beneficial for such experts' workloads. Academic work in identifying writers has focused on clean benchmark datasets: plain white documents with uniform writing instruments. Solutions on this type of data have achieved hitin-top-10 accuracy rates reaching upwards of 98%. Unfortunately, transferring competitive techniques to handwritten documents with noise is nontrivial. This work highlights efforts in unconstrained writer identification in diverse conditions, including but not limited to lined and graph paper, coffee stains, stamps, and different writing implements. The proposed methodology blends both deep learning and traditional computer vision approaches, exploring deep convolutional neural networks (CNNs) for denoising in conjunction with hand-crafted descriptor features. Our identification algorithms are trained on existing clean datasets artificially augmented with noise, and we evaluate them on a commissioned dataset, which features a diverse but balanced set of writers, writing implements, and writing substrates (incorporating various types of noise). Experimenting with mixtures of segmentation methods, novel denoisers, specialized CNNs, and handcrafted features, we exceed the state of the art in writer identification of noisy handwritten documents by over 10%.",
"fno": "07926719",
"keywords": [
"Computer Vision",
"Document Image Processing",
"Feedforward Neural Nets",
"Handwriting Recognition",
"Image Denoising",
"Image Segmentation",
"Writer Identification",
"Noisy Handwritten Documents",
"Deep Learning",
"Computer Vision",
"Deep Convolutional Neural Networks",
"Denoising",
"Hand Crafted Descriptor Features",
"Segmentation Methods",
"CNN",
"Noise Reduction",
"Feature Extraction",
"Noise Measurement",
"Writing",
"Optical Character Recognition Software",
"Neural Networks",
"Training"
],
"authors": [
{
"affiliation": null,
"fullName": "Karl Ni",
"givenName": "Karl",
"surname": "Ni",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Patrick Callier",
"givenName": "Patrick",
"surname": "Callier",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bradley Hatch",
"givenName": "Bradley",
"surname": "Hatch",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wacv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1177-1186",
"year": "2017",
"issn": null,
"isbn": "978-1-5090-4822-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07926718",
"articleId": "12OmNvSbBm6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07926720",
"articleId": "12OmNqJ8thg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ncvpripg/2011/4599/0/4599a154",
"title": "Content Independent Writer Identification Using Occurrences of Writing Styles for Bangla Handwritings",
"doi": null,
"abstractUrl": "/proceedings-article/ncvpripg/2011/4599a154/12OmNBBQZsC",
"parentPublication": {
"id": "proceedings/ncvpripg/2011/4599/0",
"title": "Computer Vision, Pattern Recognition, Image Processing and Graphics, National Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwfhr/2002/1692/0/16920274",
"title": "Writer Identification By Writer?s Invariants",
"doi": null,
"abstractUrl": "/proceedings-article/iwfhr/2002/16920274/12OmNBzRNqk",
"parentPublication": {
"id": "proceedings/iwfhr/2002/1692/0",
"title": "Proceedings Eighth International Workshop on Frontiers in Handwriting Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2012/4661/0/4661a215",
"title": "Writer Identification of Bangla Handwritings by Radon Transform Projection Profile",
"doi": null,
"abstractUrl": "/proceedings-article/das/2012/4661a215/12OmNqGA58n",
"parentPublication": {
"id": "proceedings/das/2012/4661/0",
"title": "Document Analysis Systems, IAPR International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2012/4661/0/4661a145",
"title": "Writer Retrieval and Writer Identification Using Local Features",
"doi": null,
"abstractUrl": "/proceedings-article/das/2012/4661a145/12OmNqJHFAH",
"parentPublication": {
"id": "proceedings/das/2012/4661/0",
"title": "Document Analysis Systems, IAPR International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628679",
"title": "Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628679/12OmNrGb2dY",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209d050",
"title": "Writer Identification for Historical Arabic Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209d050/12OmNvAAtsP",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628841",
"title": "Discriminating Features for Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628841/12OmNvqEvNr",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2016/0981/0/0981a584",
"title": "DeepWriter: A Multi-stream Deep CNN for Text-Independent Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2016/0981a584/12OmNy2agJK",
"parentPublication": {
"id": "proceedings/icfhr/2016/0981/0",
"title": "2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/4/252140517",
"title": "An Off-line Chinese Writer Retrieval System Based on Text-sensitive Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/252140517/12OmNyqRnph",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/4",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2007/2822/1/28220108",
"title": "Writer Identification in Handwritten Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2007/28220108/12OmNzmLxSS",
"parentPublication": {
"id": "proceedings/icdar/2007/2822/1",
"title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzcxYVM",
"title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)",
"acronym": "icfhr",
"groupId": "1000298",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNApu5Lt",
"doi": "10.1109/ICFHR.2012.219",
"title": "ICFHR 2012 Competition on Writer Identification Challenge 1: Latin/Greek Documents",
"normalizedTitle": "ICFHR 2012 Competition on Writer Identification Challenge 1: Latin/Greek Documents",
"abstract": "Writer identification is important for forensic analysis, helping experts to deliberate on the authenticity of documents. The general objective of the ICFHR 2012 Writer Identification Contest is to record recent advances in the field of writer identification using established evaluation performance measures. Challenge 1 of the contest deals specifically with Latin scripts. The benchmarking dataset of challenge 1 of the contest was created with the help of 100 writers that were asked to copy four parts of text in two languages (English and Greek). This paper describes the contest details for this challenge including the evaluation measures used as well as the performance of the seven submitted methods along with a short description of each method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Writer identification is important for forensic analysis, helping experts to deliberate on the authenticity of documents. The general objective of the ICFHR 2012 Writer Identification Contest is to record recent advances in the field of writer identification using established evaluation performance measures. Challenge 1 of the contest deals specifically with Latin scripts. The benchmarking dataset of challenge 1 of the contest was created with the help of 100 writers that were asked to copy four parts of text in two languages (English and Greek). This paper describes the contest details for this challenge including the evaluation measures used as well as the performance of the seven submitted methods along with a short description of each method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Writer identification is important for forensic analysis, helping experts to deliberate on the authenticity of documents. The general objective of the ICFHR 2012 Writer Identification Contest is to record recent advances in the field of writer identification using established evaluation performance measures. Challenge 1 of the contest deals specifically with Latin scripts. The benchmarking dataset of challenge 1 of the contest was created with the help of 100 writers that were asked to copy four parts of text in two languages (English and Greek). This paper describes the contest details for this challenge including the evaluation measures used as well as the performance of the seven submitted methods along with a short description of each method.",
"fno": "06424500",
"keywords": [
"Digital Forensics",
"Handwriting Recognition",
"Text Analysis",
"ICFHR 2012",
"Writer Identification Competition",
"Forensic Analysis",
"Document Authentication",
"Latin Scripts",
"Benchmarking Dataset",
"Text Analysis",
"Evaluation Measures",
"Benchmark Testing",
"Educational Institutions",
"Accuracy",
"Laboratories",
"Image Edge Detection",
"Writing",
"Computer Science",
"Writer Identification",
"System Evaluation",
"Contest"
],
"authors": [
{
"affiliation": null,
"fullName": "G. Louloudis",
"givenName": "G.",
"surname": "Louloudis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Basilis Gatos",
"givenName": "Basilis",
"surname": "Gatos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "N. Stamatopoulos",
"givenName": "N.",
"surname": "Stamatopoulos",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icfhr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-09-01T00:00:00",
"pubType": "proceedings",
"pages": "829-834",
"year": "2012",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06424499",
"articleId": "12OmNvjyxTP",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06424501",
"articleId": "12OmNwJPMVg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aiccsa/2014/7100/0/07073272",
"title": "Using codebooks generated from text skeletonization for forensic writer identification",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2014/07073272/12OmNAYGlAq",
"parentPublication": {
"id": "proceedings/aiccsa/2014/7100/0",
"title": "2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628679",
"title": "Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628679/12OmNrGb2dY",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628841",
"title": "Discriminating Features for Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628841/12OmNvqEvNr",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2012/2262/0/06424498",
"title": "ICFHR 2012 Competition on Handwritten Document Image Binarization (H-DIBCO 2012)",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2012/06424498/12OmNwGZNSF",
"parentPublication": {
"id": "proceedings/icfhr/2012/2262/0",
"title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2012/2262/0/06424501",
"title": "ICFHR 2012 Competition on Writer Identification Challenge 2: Arabic Scripts",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2012/06424501/12OmNwJPMVg",
"parentPublication": {
"id": "proceedings/icfhr/2012/2262/0",
"title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981121",
"title": "ICFHR 2014 Competition on Handwritten Keyword Spotting (H-KWS 2014)",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981121/12OmNxXUhOV",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628843",
"title": "ICDAR 2013 Competition on Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628843/12OmNz4Bdq8",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2018/5875/0/587500a489",
"title": "ICFHR 2018 Competition on Handwritten Document Image Binarization (H-DIBCO 2018)",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2018/587500a489/17D45WaTkoF",
"parentPublication": {
"id": "proceedings/icfhr/2018/5875/0",
"title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2018/5875/0/587500a506",
"title": "ICFHR 2018 Competition on Multi-Script Writer Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2018/587500a506/17D45XDIXQH",
"parentPublication": {
"id": "proceedings/icfhr/2018/5875/0",
"title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2020/9966/0/996600a216",
"title": "ICFHR 2020 Competition on Image Retrieval for Historical Handwritten Fragments",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2020/996600a216/1p2VwbDLDq0",
"parentPublication": {
"id": "proceedings/icfhr/2020/9966/0",
"title": "2020 17th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBUAvV8",
"title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvSKO15",
"doi": "10.1109/ICDMW.2014.85",
"title": "Modeling of Writing and Thinking Process in Handwriting by Digital Pen Analysis",
"normalizedTitle": "Modeling of Writing and Thinking Process in Handwriting by Digital Pen Analysis",
"abstract": "In order to acquire infrequent events as new ideas and evaluate the ideas quantitatively, it is necessary to know how people create and refine ideas and to model creating and refining process. In this paper, we focused on relations between thinking time and writing time in handwriting, and proposed to model the relation by externalization, classification, relation, transportation and systematization, which are elements to make sentences. The relation depended on questions and formats of sheets. When sheets give participants the question answered by sentences, writing time become longer as thinking time is longer. On the other hand, if sheets give the question which could be answered only by words, writing time become shorter as thinking time is longer. We hypothesized that participants spent more time classifying, relating and transporting words in answering only by words than in answering by sentences. We could also confirm that when the same questions were given twice, writing time became longer and thinking time became shorter second time than first time. It was because enough externalizations were performed first time and participants spent less time externalizing second time.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to acquire infrequent events as new ideas and evaluate the ideas quantitatively, it is necessary to know how people create and refine ideas and to model creating and refining process. In this paper, we focused on relations between thinking time and writing time in handwriting, and proposed to model the relation by externalization, classification, relation, transportation and systematization, which are elements to make sentences. The relation depended on questions and formats of sheets. When sheets give participants the question answered by sentences, writing time become longer as thinking time is longer. On the other hand, if sheets give the question which could be answered only by words, writing time become shorter as thinking time is longer. We hypothesized that participants spent more time classifying, relating and transporting words in answering only by words than in answering by sentences. We could also confirm that when the same questions were given twice, writing time became longer and thinking time became shorter second time than first time. It was because enough externalizations were performed first time and participants spent less time externalizing second time.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to acquire infrequent events as new ideas and evaluate the ideas quantitatively, it is necessary to know how people create and refine ideas and to model creating and refining process. In this paper, we focused on relations between thinking time and writing time in handwriting, and proposed to model the relation by externalization, classification, relation, transportation and systematization, which are elements to make sentences. The relation depended on questions and formats of sheets. When sheets give participants the question answered by sentences, writing time become longer as thinking time is longer. On the other hand, if sheets give the question which could be answered only by words, writing time become shorter as thinking time is longer. We hypothesized that participants spent more time classifying, relating and transporting words in answering only by words than in answering by sentences. We could also confirm that when the same questions were given twice, writing time became longer and thinking time became shorter second time than first time. It was because enough externalizations were performed first time and participants spent less time externalizing second time.",
"fno": "4274a447",
"keywords": [
"Writing",
"Planning",
"Educational Institutions",
"Transportation",
"Conferences",
"Equations",
"Correlation",
"Meta Cognition",
"Cognition",
"Handwriting",
"Modeling"
],
"authors": [
{
"affiliation": null,
"fullName": "Kenshin Ikegami",
"givenName": "Kenshin",
"surname": "Ikegami",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yukio Ohsawa",
"givenName": "Yukio",
"surname": "Ohsawa",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-12-01T00:00:00",
"pubType": "proceedings",
"pages": "447-454",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4274-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4274a441",
"articleId": "12OmNxYtuaa",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4274a455",
"articleId": "12OmNzmclF0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fie/2009/4715/0/05350651",
"title": "Give it a \"TWIST!\": Turning writing into student thinking",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2009/05350651/12OmNAm4TIn",
"parentPublication": {
"id": "proceedings/fie/2009/4715/0",
"title": "2009 39th IEEE Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/1998/4762/3/00738684",
"title": "Integrating writing and critical thinking in a freshman design course",
"doi": null,
"abstractUrl": "/proceedings-article/fie/1998/00738684/12OmNwDACa0",
"parentPublication": {
"id": "proceedings/fie/1998/4762/3",
"title": "FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2017/3870/0/3870a411",
"title": "A Digital Tool for Argumentation Construction that Assists Users in Writing Argumentative Essays",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2017/3870a411/12OmNxEByYF",
"parentPublication": {
"id": "proceedings/icalt/2017/3870/0",
"title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2014/3922/0/07044234",
"title": "Critical thinking, peer-writing, and the importance of feedback",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2014/07044234/12OmNxw5Bvy",
"parentPublication": {
"id": "proceedings/fie/2014/3922/0",
"title": "2014 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2008/1969/0/04720651",
"title": "Innovation in linking and thinking: Critical thinking and writing skills of first-year engineering students in a learning community",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2008/04720651/12OmNy49sM5",
"parentPublication": {
"id": "proceedings/fie/2008/1969/0",
"title": "2008 38th Annual Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2022/6244/0/09962406",
"title": "Impact on Second Language Writing via an Intelligent Writing Assistant and Metacognitive Training",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2022/09962406/1IHohtYOxzO",
"parentPublication": {
"id": "proceedings/fie/2022/6244/0",
"title": "2022 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eitt/2018/9603/0/960300a077",
"title": "Analyzing Critical Thinking Elements in the Argument Structure of Non-English-Major Chinese Undergraduate Students' Writing",
"doi": null,
"abstractUrl": "/proceedings-article/eitt/2018/960300a077/1ap5kSWcD9S",
"parentPublication": {
"id": "proceedings/eitt/2018/9603/0",
"title": "2018 Seventh International Conference of Educational Innovation through Technology (EITT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2019/2607/2/260702a245",
"title": "A Pen-Grip Shaped Device for Estimating Writing Pressure and Altitude",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2019/260702a245/1cYisrOBFAc",
"parentPublication": {
"id": "compsac/2019/2607/2",
"title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2020/9966/0/996600a295",
"title": "Digitizing Handwriting with a Sensor Pen: A Writer-Independent Recognizer",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2020/996600a295/1p2VuWU6WgE",
"parentPublication": {
"id": "proceedings/icfhr/2020/9966/0",
"title": "2020 17th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2020/8961/0/09274065",
"title": "Developing Computational Thinking and Reading and Writing Skills through an Approach for Creating Games",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2020/09274065/1phRzK0yW2I",
"parentPublication": {
"id": "proceedings/fie/2020/8961/0",
"title": "2020 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNySXF2u",
"title": "Advanced Learning Technologies, IEEE International Conference on",
"acronym": "icalt",
"groupId": "1000009",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvlxJvw",
"doi": "10.1109/ICALT.2012.51",
"title": "Using a Text Mining Tool to Support Text Summarization",
"normalizedTitle": "Using a Text Mining Tool to Support Text Summarization",
"abstract": "This paper presents a mining tool that is able to extract graphs from texts, and proposes their use in helping students to write summaries. The text summarization method is based on the use of the graphs as graphic organizers, leading students to further reflect about the main ideas of the text before getting to the actual task of writing. An experiment carried out demonstrated that the tool helped students reflect about the main ideas of the text and supported the writing of the summaries.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a mining tool that is able to extract graphs from texts, and proposes their use in helping students to write summaries. The text summarization method is based on the use of the graphs as graphic organizers, leading students to further reflect about the main ideas of the text before getting to the actual task of writing. An experiment carried out demonstrated that the tool helped students reflect about the main ideas of the text and supported the writing of the summaries.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a mining tool that is able to extract graphs from texts, and proposes their use in helping students to write summaries. The text summarization method is based on the use of the graphs as graphic organizers, leading students to further reflect about the main ideas of the text before getting to the actual task of writing. An experiment carried out demonstrated that the tool helped students reflect about the main ideas of the text and supported the writing of the summaries.",
"fno": "4702a607",
"keywords": [
"Writing",
"Text Mining",
"Organizations",
"Educational Institutions",
"Visualization",
"Conferences",
"Writing",
"Text Mining",
"Text Summarization",
"Graphs"
],
"authors": [
{
"affiliation": null,
"fullName": "Eliseo Reategui",
"givenName": "Eliseo",
"surname": "Reategui",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Miriam Klemann",
"givenName": "Miriam",
"surname": "Klemann",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mateus David Finco",
"givenName": "Mateus David",
"surname": "Finco",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icalt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-07-01T00:00:00",
"pubType": "proceedings",
"pages": "607-609",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-1642-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4702a604",
"articleId": "12OmNro0HZ4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4702a610",
"articleId": "12OmNBCHMHL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ibica/2012/2838/0/06337691",
"title": "Qualitative Text Mining in Student's Service Learning Diary",
"doi": null,
"abstractUrl": "/proceedings-article/ibica/2012/06337691/12OmNAle6pu",
"parentPublication": {
"id": "proceedings/ibica/2012/2838/0",
"title": "2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/achi/2009/3529/0/3529a044",
"title": "Word Sequence Models for Single Text Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/achi/2009/3529a044/12OmNBSSV8U",
"parentPublication": {
"id": "proceedings/achi/2009/3529/0",
"title": "International Conference on Advances in Computer-Human Interaction",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/his/2009/3745/1/3745a142",
"title": "Sentence Features Fusion for Text Summarization Using Fuzzy Logic",
"doi": null,
"abstractUrl": "/proceedings-article/his/2009/3745a142/12OmNCm7BGy",
"parentPublication": {
"id": "proceedings/his/2009/3745/1",
"title": "Hybrid Intelligent Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2013/5261/0/06684853",
"title": "The use of text mining to build a pedagogical agent capable of mediating synchronous online discussions in the context of foreign language learning",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2013/06684853/12OmNqJ8t8V",
"parentPublication": {
"id": "proceedings/fie/2013/5261/0",
"title": "2013 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iacsit-sc/2009/3653/0/3653a145",
"title": "Swarm Based Text Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/iacsit-sc/2009/3653a145/12OmNxiKs32",
"parentPublication": {
"id": "proceedings/iacsit-sc/2009/3653/0",
"title": "Computer Science and Information Technology, International Association of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/synasc/2008/3523/0/3523a095",
"title": "Lexical Chains Segmentation in Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/synasc/2008/3523a095/12OmNyY4rjY",
"parentPublication": {
"id": "proceedings/synasc/2008/3523/0",
"title": "2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmc/2010/3989/1/3989a387",
"title": "Post-Processing of Automatic Text Summarization for Domain-Specific Documents",
"doi": null,
"abstractUrl": "/proceedings-article/cmc/2010/3989a387/12OmNylKAZM",
"parentPublication": {
"id": "proceedings/cmc/2010/3989/1",
"title": "Communications and Mobile Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2008/2357/0/04594651",
"title": "A hybrid approach to automatic text summarization",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2008/04594651/12OmNyuPKYP",
"parentPublication": {
"id": "proceedings/cit/2008/2357/0",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc/2011/4612/0/4612b184",
"title": "Fuzzy Genetic Semantic Based Text Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/dasc/2011/4612b184/12OmNzxPTH0",
"parentPublication": {
"id": "proceedings/dasc/2011/4612/0",
"title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2019/1746/0/09028526",
"title": "TopicSummary: A Tool for Analyzing Class Discussion Forums using Topic Based Summarizations",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2019/09028526/1iff95xsDNS",
"parentPublication": {
"id": "proceedings/fie/2019/1746/0",
"title": "2019 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwt5shv",
"title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"acronym": "trustcom",
"groupId": "1800729",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxEBz7L",
"doi": "10.1109/TrustCom.2013.202",
"title": "Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data",
"normalizedTitle": "Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data",
"abstract": "Nowadays privacy in ambient system is a real issue. Users will have to control their data more and more in the future. Current security systems don't support a strong constraint: policy writers are non-technical users and not security experts. We propose in this paper to use Decision Support techniques and more specifically Multi-Criteria Decision Analysis in the process of authorization policy writing. This research area provides techniques to inform and assist non-technical users to write their own authorization policies following the paradigm of Attribute-Based Access Control.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Nowadays privacy in ambient system is a real issue. Users will have to control their data more and more in the future. Current security systems don't support a strong constraint: policy writers are non-technical users and not security experts. We propose in this paper to use Decision Support techniques and more specifically Multi-Criteria Decision Analysis in the process of authorization policy writing. This research area provides techniques to inform and assist non-technical users to write their own authorization policies following the paradigm of Attribute-Based Access Control.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Nowadays privacy in ambient system is a real issue. Users will have to control their data more and more in the future. Current security systems don't support a strong constraint: policy writers are non-technical users and not security experts. We propose in this paper to use Decision Support techniques and more specifically Multi-Criteria Decision Analysis in the process of authorization policy writing. This research area provides techniques to inform and assist non-technical users to write their own authorization policies following the paradigm of Attribute-Based Access Control.",
"fno": "5022b639",
"keywords": [
"Decision Support Systems",
"Authorization",
"Context",
"Writing",
"Databases",
"Attribute Based Access Control",
"Privacy",
"Authorization Policy Writing",
"Decision Support System"
],
"authors": [
{
"affiliation": "IRIT, Univ. of Toulouse, Toulouse, France",
"fullName": "Arnaud Oglaza",
"givenName": "Arnaud",
"surname": "Oglaza",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IRIT, Univ. of Toulouse, Toulouse, France",
"fullName": "Romain Laborde",
"givenName": "Romain",
"surname": "Laborde",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IRIT, Univ. of Toulouse, Toulouse, France",
"fullName": "Pascale Zarate",
"givenName": "Pascale",
"surname": "Zarate",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "trustcom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1639-1644",
"year": "2013",
"issn": null,
"isbn": "978-0-7695-5022-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5022b633",
"articleId": "12OmNwtn3wB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5022b645",
"articleId": "12OmNzV70ld",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/compsac/2016/8845/2/8845b202",
"title": "An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2016/8845b202/12OmNBCqbIE",
"parentPublication": {
"id": "proceedings/compsac/2016/8845/1",
"title": "2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2005/2432/0/24320375",
"title": "Joint Management of Authorization for Dynamic Virtual Organization",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2005/24320375/12OmNBTJIN6",
"parentPublication": {
"id": "proceedings/cit/2005/2432/0",
"title": "The Fifth International Conference on Computer and Information Technology CIT 2005",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2011/1799/0/06120508",
"title": "Detection of Conflicts and Inconsistencies in Taxonomy-Based Authorization Policies",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2011/06120508/12OmNCxL9Sw",
"parentPublication": {
"id": "proceedings/bibm/2011/1799/0",
"title": "2011 IEEE International Conference on Bioinformatics and Biomedicine",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ast/2012/1821/0/06228997",
"title": "Testing of PolPA authorization systems",
"doi": null,
"abstractUrl": "/proceedings-article/ast/2012/06228997/12OmNrJ11GU",
"parentPublication": {
"id": "proceedings/ast/2012/1821/0",
"title": "Automation of Software Test, Second International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csf/2010/7510/0/05552647",
"title": "Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/csf/2010/05552647/12OmNvjyxMN",
"parentPublication": {
"id": "proceedings/csf/2010/7510/0",
"title": "2010 23rd IEEE Computer Security Foundations Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc/2011/4612/0/4612a037",
"title": "Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models",
"doi": null,
"abstractUrl": "/proceedings-article/dasc/2011/4612a037/12OmNyo1nMM",
"parentPublication": {
"id": "proceedings/dasc/2011/4612/0",
"title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scc/2016/2628/0/2628a403",
"title": "Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies",
"doi": null,
"abstractUrl": "/proceedings-article/scc/2016/2628a403/12OmNzQR1mW",
"parentPublication": {
"id": "proceedings/scc/2016/2628/0",
"title": "2016 IEEE International Conference on Services Computing (SCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2002/1668/0/16680446",
"title": "A Decentralized Authorization Mechanism for E-Business Applications",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2002/16680446/12OmNzwpUqm",
"parentPublication": {
"id": "proceedings/dexa/2002/1668/0",
"title": "Proceedings. 13th International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2020/9248/0/924800a187",
"title": "Static Extraction of Enforced Authorization Policies SeeAuthz",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2020/924800a187/1oFH0GriSME",
"parentPublication": {
"id": "proceedings/scam/2020/9248/0",
"title": "2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2021/2463/0/246300b202",
"title": "Mutual Secrecy of Attributes and Authorization Policies in Identity Federation",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2021/246300b202/1wLclEvBMGc",
"parentPublication": {
"id": "proceedings/compsac/2021/2463/0",
"title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwp74rr",
"title": "Proceedings of 1994 IEEE Frontiers in Education Conference - FIE '94",
"acronym": "fie",
"groupId": "1000297",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyRg4Bb",
"doi": "10.1109/FIE.1994.580649",
"title": "Holistic grading: an alternative approach",
"normalizedTitle": "Holistic grading: an alternative approach",
"abstract": "This paper describes a nontraditional approach to evaluating student writing: holistic grading. It involves much less time on the instructor's part and still yields a fair assessment of student writing. The rationale behind holistic assessment is to read a paper as an entire entity and to avoid dissecting it for details like spelling, punctuation, organization, etc. The paper is read and evaluated as a whole. Holistic assessment is used by many colleges and universities to evaluate final exams in lower-division writing classes.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper describes a nontraditional approach to evaluating student writing: holistic grading. It involves much less time on the instructor's part and still yields a fair assessment of student writing. The rationale behind holistic assessment is to read a paper as an entire entity and to avoid dissecting it for details like spelling, punctuation, organization, etc. The paper is read and evaluated as a whole. Holistic assessment is used by many colleges and universities to evaluate final exams in lower-division writing classes.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper describes a nontraditional approach to evaluating student writing: holistic grading. It involves much less time on the instructor's part and still yields a fair assessment of student writing. The rationale behind holistic assessment is to read a paper as an entire entity and to avoid dissecting it for details like spelling, punctuation, organization, etc. The paper is read and evaluated as a whole. Holistic assessment is used by many colleges and universities to evaluate final exams in lower-division writing classes.",
"fno": "00580649",
"keywords": [
"Education",
"Holistic Grading",
"Student Writing Evaluation",
"Lower Division Writing Classes",
"Final Exams Evaluation",
"Writing",
"Educational Institutions"
],
"authors": [
{
"affiliation": "Oregon Inst. of Technol., OR, USA",
"fullName": "M.A. Dyrud",
"givenName": "M.A.",
"surname": "Dyrud",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fie",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "721,722,723",
"year": "1994",
"issn": "0190-5848",
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00580648",
"articleId": "12OmNC8MsCV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00580650",
"articleId": "12OmNzZmZxS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fie/1998/4762/1/00736839",
"title": "A holistic assessment of writing in design",
"doi": null,
"abstractUrl": "/proceedings-article/fie/1998/00736839/12OmNBU1jLo",
"parentPublication": {
"id": "proceedings/fie/1998/4762/1",
"title": "FIE '98. 28th Annual Frontiers in Education Conference. Moving from 'Teacher-Centered' to 'Learner-Centered' Education. Conference Proceedings (Cat. No.98CH36214)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2011/468/0/06143030",
"title": "A gender analysis of student learning in physics",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2011/06143030/12OmNBpmDHE",
"parentPublication": {
"id": "proceedings/fie/2011/468/0",
"title": "2011 Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2005/9077/0/01612159",
"title": "Special session - writing: an active learning tool for majors and non-majors",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2005/01612159/12OmNviZlxj",
"parentPublication": {
"id": "proceedings/fie/2005/9077/0",
"title": "35th Annual Frontiers in Education",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2013/5261/0/06685054",
"title": "Writing groups in computer science research labs",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2013/06685054/12OmNwwuDUG",
"parentPublication": {
"id": "proceedings/fie/2013/5261/0",
"title": "2013 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2013/5009/0/5009a483",
"title": "Integrating Mobile Device and Collaborative Mind Map to Enhance Sixth Graders' Creative Writing Abilities",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2013/5009a483/12OmNx76TGT",
"parentPublication": {
"id": "proceedings/icalt/2013/5009/0",
"title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2013/5261/0/06684901",
"title": "Improving student writing through multiple peer feedback",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2013/06684901/12OmNxX3uou",
"parentPublication": {
"id": "proceedings/fie/2013/5261/0",
"title": "2013 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aina/2011/4337/0/4337a270",
"title": "Determining Writing Genre: Towards a Rubric-based Approach to Automated Essay Grading",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2011/4337a270/12OmNxwENJ7",
"parentPublication": {
"id": "proceedings/aina/2011/4337/0",
"title": "2011 IEEE International Conference on Advanced Information Networking and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2014/4038/0/4038a627",
"title": "Design and Evaluation of a Flipped Course Adopting the Holistic Flipped Classroom Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2014/4038a627/12OmNyv7mc7",
"parentPublication": {
"id": "proceedings/icalt/2014/4038/0",
"title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/1994/2413/0/00580650",
"title": "Grading technical papers during student conferences",
"doi": null,
"abstractUrl": "/proceedings-article/fie/1994/00580650/12OmNzZmZxS",
"parentPublication": {
"id": "proceedings/fie/1994/2413/0",
"title": "Proceedings of 1994 IEEE Frontiers in Education Conference - FIE '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccicc/2014/6081/0/06921453",
"title": "Using storytelling methods to improve emotion, motivation and attitude of students writing scientific papers and theses",
"doi": null,
"abstractUrl": "/proceedings-article/iccicc/2014/06921453/12OmNzwpUdJ",
"parentPublication": {
"id": "proceedings/iccicc/2014/6081/0",
"title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCvLY1Q",
"title": "Proceedings Sixth International Conference on Tools with Artificial Intelligence. TAI 94",
"acronym": "tai",
"groupId": "1000763",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyxFKbd",
"doi": "10.1109/TAI.1994.346488",
"title": "The evolution of intelligent writing assistants: trends and future prospects",
"normalizedTitle": "The evolution of intelligent writing assistants: trends and future prospects",
"abstract": "Since Writer's Workbench (Bell Telephone Laboratories, early 1980's), software for writing assistance and style checking has evolved over the last decade (1984-94) to become more intelligent and interactive. During this period the author has been involved in the development of several software packages and has monitored the growth and sophistication of software solutions. Today certain characteristics have become standard; yet challenges remain. The author discusses trends and suggests areas where we might expect continued future development. Today writers have a variety of useful but limited style and grammar checkers available for most computer systems. Some even come bundled with the current generation of enhanced word processors and are used by many writers. Another approach to writing assistance is suggested by online interactive group writing systems like MediaLink. Possibilities for combining the best features of current systems exist, but further improvements in the quality of the knowledge offered by automated writing assistants will depend on research advances in other areas of natural language processing. The author examines some of these problem areas and suggests approaches from ongoing NLP research that we can expect the writing assistants and style checkers of the future to include among their resources.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "Since Writer's Workbench (Bell Telephone Laboratories, early 1980's), software for writing assistance and style checking has evolved over the last decade (1984-94) to become more intelligent and interactive. During this period the author has been involved in the development of several software packages and has monitored the growth and sophistication of software solutions. Today certain characteristics have become standard; yet challenges remain. The author discusses trends and suggests areas where we might expect continued future development. Today writers have a variety of useful but limited style and grammar checkers available for most computer systems. Some even come bundled with the current generation of enhanced word processors and are used by many writers. Another approach to writing assistance is suggested by online interactive group writing systems like MediaLink. Possibilities for combining the best features of current systems exist, but further improvements in the quality of the knowledge offered by automated writing assistants will depend on research advances in other areas of natural language processing. The author examines some of these problem areas and suggests approaches from ongoing NLP research that we can expect the writing assistants and style checkers of the future to include among their resources.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Since Writer's Workbench (Bell Telephone Laboratories, early 1980's), software for writing assistance and style checking has evolved over the last decade (1984-94) to become more intelligent and interactive. During this period the author has been involved in the development of several software packages and has monitored the growth and sophistication of software solutions. Today certain characteristics have become standard; yet challenges remain. The author discusses trends and suggests areas where we might expect continued future development. Today writers have a variety of useful but limited style and grammar checkers available for most computer systems. Some even come bundled with the current generation of enhanced word processors and are used by many writers. Another approach to writing assistance is suggested by online interactive group writing systems like MediaLink. Possibilities for combining the best features of current systems exist, but further improvements in the quality of the knowledge offered by automated writing assistants will depend on research advances in other areas of natural language processing. The author examines some of these problem areas and suggests approaches from ongoing NLP research that we can expect the writing assistants and style checkers of the future to include among their resources.",
"fno": "00346488",
"keywords": [
"Word Processing",
"Knowledge Based Systems",
"Natural Language Interfaces",
"Multimedia Computing",
"Intelligent Writing Assistants",
"Future Prospects",
"Writing Assistance",
"Style Checking",
"Software Packages",
"Grammar Checkers",
"Enhanced Word Processors",
"Online Interactive Group Writing Systems",
"Media Link",
"Research Advances",
"Natural Language Processing",
"NLP Research",
"Style Checkers",
"Writing",
"Monitoring",
"Pattern Matching",
"Collaborative Work",
"Computer Science",
"Telephony",
"Laboratories",
"Software Packages",
"Microcomputers",
"Table Lookup"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci., South Carolina Univ., Columbia, SC, USA",
"fullName": "R.L. Oakman",
"givenName": "R.L.",
"surname": "Oakman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "tai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "233,234",
"year": "1994",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00346487",
"articleId": "12OmNwtWfMZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00346489",
"articleId": "12OmNxymodL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dexa/1998/8353/0/83530166",
"title": "Writing and Correcting Textual Scenarios for System Design",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/1998/83530166/12OmNB9t6kg",
"parentPublication": {
"id": "proceedings/dexa/1998/8353/0",
"title": "Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipcc/2009/4357/0/05428219",
"title": "Designing a medical writing course in a professional writing program: introducing undergraduates to the field",
"doi": null,
"abstractUrl": "/proceedings-article/ipcc/2009/05428219/12OmNBJeyHI",
"parentPublication": {
"id": "proceedings/ipcc/2009/4357/0",
"title": "International Professional Communication Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2017/3581/0/3581a363",
"title": "Hybrid Method for Multilingual Automatic Grouping of Writing Styles",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2017/3581a363/12OmNyoiZ4Z",
"parentPublication": {
"id": "proceedings/aiccsa/2017/3581/0",
"title": "2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2012/4661/0/4661a312",
"title": "Accent Detection in Handwriting Based on Writing Styles",
"doi": null,
"abstractUrl": "/proceedings-article/das/2012/4661a312/12OmNzC5Tsu",
"parentPublication": {
"id": "proceedings/das/2012/4661/0",
"title": "Document Analysis Systems, IAPR International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/1993/4960/0/00395640",
"title": "Cursivewriter: On-line cursive writing recognition system",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/1993/00395640/12OmNzCF4Wy",
"parentPublication": {
"id": "proceedings/icdar/1993/4960/0",
"title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sp/2012/4681/0/06234430",
"title": "Detecting Hoaxes, Frauds, and Deception in Writing Style Online",
"doi": null,
"abstractUrl": "/proceedings-article/sp/2012/06234430/12OmNzaQog1",
"parentPublication": {
"id": "proceedings/sp/2012/4681/0",
"title": "2012 IEEE Symposium on Security and Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/1996/07/r7049",
"title": "An Interactive Support Tool for Writing Multilingual Manuals",
"doi": null,
"abstractUrl": "/magazine/co/1996/07/r7049/13rRUxcKzRn",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAsk4yw",
"title": "2008 38th Annual Frontiers in Education Conference",
"acronym": "fie",
"groupId": "1000297",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzCF4SC",
"doi": "10.1109/FIE.2008.4720261",
"title": "Creating innovative writing instruction for Computer Science graduate students",
"normalizedTitle": "Creating innovative writing instruction for Computer Science graduate students",
"abstract": "This paper describes the Academic Writing Course offered in the Computer Science Department at the University of California, Satan Barbara. We conceived the course to go farther than a generic writing course, and developed an innovative curriculum that specifically addresses the rigorous demands on Computer Science graduate students to produce research papers for acceptance at the best conferences. We focus on how the course design and execution address the challenges we observe in student writing, including the selection of content for a text, the organization of the content, the use of appropriate details and transitions, the discussion of data, rhetorical positioning, and readability, as well as the daunting process of drafting, redrafting, and editing. We also provide a qualitative assessment of the coursepsilas impact based on feedback from student and faculty evaluations that suggests that students who attend the course are not only better writers but more effective collaborators with faculty advisors, and thus experience a smoother overall composing, editing, and submission process.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper describes the Academic Writing Course offered in the Computer Science Department at the University of California, Satan Barbara. We conceived the course to go farther than a generic writing course, and developed an innovative curriculum that specifically addresses the rigorous demands on Computer Science graduate students to produce research papers for acceptance at the best conferences. We focus on how the course design and execution address the challenges we observe in student writing, including the selection of content for a text, the organization of the content, the use of appropriate details and transitions, the discussion of data, rhetorical positioning, and readability, as well as the daunting process of drafting, redrafting, and editing. We also provide a qualitative assessment of the coursepsilas impact based on feedback from student and faculty evaluations that suggests that students who attend the course are not only better writers but more effective collaborators with faculty advisors, and thus experience a smoother overall composing, editing, and submission process.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper describes the Academic Writing Course offered in the Computer Science Department at the University of California, Satan Barbara. We conceived the course to go farther than a generic writing course, and developed an innovative curriculum that specifically addresses the rigorous demands on Computer Science graduate students to produce research papers for acceptance at the best conferences. We focus on how the course design and execution address the challenges we observe in student writing, including the selection of content for a text, the organization of the content, the use of appropriate details and transitions, the discussion of data, rhetorical positioning, and readability, as well as the daunting process of drafting, redrafting, and editing. We also provide a qualitative assessment of the coursepsilas impact based on feedback from student and faculty evaluations that suggests that students who attend the course are not only better writers but more effective collaborators with faculty advisors, and thus experience a smoother overall composing, editing, and submission process.",
"fno": "04720261",
"keywords": [
"Editing",
"Innovative Writing Instruction",
"Computer Science Graduate Student",
"Academic Writing Course",
"Innovative Curriculum",
"Course Design",
"Student Writing",
"Rhetorical Positioning",
"Readability",
"Drafting"
],
"authors": [
{
"affiliation": "Univ. of California, Santa Barbara, CA",
"fullName": "J.L. Kayfetz",
"givenName": "J.L.",
"surname": "Kayfetz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Univ. of California, Santa Barbara, CA",
"fullName": "K.C. Almeroth",
"givenName": "K.C.",
"surname": "Almeroth",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fie",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-10-01T00:00:00",
"pubType": "proceedings",
"pages": "T4F-1-T4F-6",
"year": "2008",
"issn": null,
"isbn": "978-1-4244-1969-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04720260",
"articleId": "12OmNBhpS8s",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04720262",
"articleId": "12OmNzb7Zi8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipcc/2005/9027/0/01494219",
"title": "The engineering-technical writing connection: a rubric for effective communication",
"doi": null,
"abstractUrl": "/proceedings-article/ipcc/2005/01494219/12OmNAYXWKv",
"parentPublication": {
"id": "proceedings/ipcc/2005/9027/0",
"title": "2005 IEEE International Professional Communication Conference (IPCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2007/1083/0/04417843",
"title": "A graduate course in faculty development",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2007/04417843/12OmNApu5sW",
"parentPublication": {
"id": "proceedings/fie/2007/1083/0",
"title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2008/1969/0/04720462",
"title": "Interactive learning modules for innovative pedagogy in circuits and electronics",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2008/04720462/12OmNqBbHQF",
"parentPublication": {
"id": "proceedings/fie/2008/1969/0",
"title": "2008 38th Annual Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2002/7444/3/7444f3h8",
"title": "Academic writing for international graduate students",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2002/7444f3h8/12OmNscxjan",
"parentPublication": {
"id": "proceedings/fie/2002/7444/3",
"title": "32nd Annual Frontiers in Education",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2006/0256/0/04117158",
"title": "Preparing Civil Engineering Students to Meet Workplace Writing Expectations",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2006/04117158/12OmNx7XH5x",
"parentPublication": {
"id": "proceedings/fie/2006/0256/0",
"title": "Proceedings. Frontiers in Education. 36th Annual Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2012/1353/0/06462525",
"title": "Work in progress: Using writing-to-learn methods to improve conceptual knowledge in engineering statics",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2012/06462525/12OmNxEjY1h",
"parentPublication": {
"id": "proceedings/fie/2012/1353/0",
"title": "2012 Frontiers in Education Conference Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2009/4715/0/05350872",
"title": "Innovative program and course outcomes' assessment tools",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2009/05350872/12OmNxGj9Zd",
"parentPublication": {
"id": "proceedings/fie/2009/4715/0",
"title": "2009 39th IEEE Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2010/6261/0/05673578",
"title": "Work in progress -- Retention and application of writing skills learned in Sophomore Clinic I",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2010/05673578/12OmNxQOjJr",
"parentPublication": {
"id": "proceedings/fie/2010/6261/0",
"title": "2010 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2011/4346/0/4346a314",
"title": "Improving Students' Satisfaction in a Massive Online Academic Writing Course",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2011/4346a314/12OmNxuXcxD",
"parentPublication": {
"id": "proceedings/icalt/2011/4346/0",
"title": "Advanced Learning Technologies, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2010/6261/0/05673269",
"title": "Changes in a first-year technical writing class to support student success and retention in engineering and applied sciences",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2010/05673269/12OmNyo1nXH",
"parentPublication": {
"id": "proceedings/fie/2010/6261/0",
"title": "2010 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNs0kyrv",
"title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"acronym": "iccicc",
"groupId": "1000097",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzwpUdJ",
"doi": "10.1109/ICCI-CC.2014.6921453",
"title": "Using storytelling methods to improve emotion, motivation and attitude of students writing scientific papers and theses",
"normalizedTitle": "Using storytelling methods to improve emotion, motivation and attitude of students writing scientific papers and theses",
"abstract": "We investigate how storytelling techniques might support students in writing final papers. We suggest a new structure and a new process for student paper production, borrowed from creative writing. We argue that adopting this approach might improve the quality of scientific student papers, increase the satisfaction of writing them and the pleasure of reading them. To test our assumptions we outline the application of the concept to a business informatics graduate course on research methods which accompanies writing a masters thesis. Finally, we position our ideas in the context of contemporary social network-based content creation and massive open online courses.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We investigate how storytelling techniques might support students in writing final papers. We suggest a new structure and a new process for student paper production, borrowed from creative writing. We argue that adopting this approach might improve the quality of scientific student papers, increase the satisfaction of writing them and the pleasure of reading them. To test our assumptions we outline the application of the concept to a business informatics graduate course on research methods which accompanies writing a masters thesis. Finally, we position our ideas in the context of contemporary social network-based content creation and massive open online courses.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We investigate how storytelling techniques might support students in writing final papers. We suggest a new structure and a new process for student paper production, borrowed from creative writing. We argue that adopting this approach might improve the quality of scientific student papers, increase the satisfaction of writing them and the pleasure of reading them. To test our assumptions we outline the application of the concept to a business informatics graduate course on research methods which accompanies writing a masters thesis. Finally, we position our ideas in the context of contemporary social network-based content creation and massive open online courses.",
"fno": "06921453",
"keywords": [
"Writing",
"Educational Institutions",
"Blogs",
"Business",
"Economics",
"Context",
"Course Design",
"Storytelling",
"Scientific Writing",
"Motivation",
"Research Methods"
],
"authors": [
{
"affiliation": "Berlin School of Economics and Law",
"fullName": "Marcus Birkenkrahe",
"givenName": "Marcus",
"surname": "Birkenkrahe",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccicc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-08-01T00:00:00",
"pubType": "proceedings",
"pages": "140-145",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-6081-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06921452",
"articleId": "12OmNyRxFI7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06921454",
"articleId": "12OmNxRnvVv",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipcc/2005/9027/0/01494219",
"title": "The engineering-technical writing connection: a rubric for effective communication",
"doi": null,
"abstractUrl": "/proceedings-article/ipcc/2005/01494219/12OmNAYXWKv",
"parentPublication": {
"id": "proceedings/ipcc/2005/9027/0",
"title": "2005 IEEE International Professional Communication Conference (IPCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2003/1877/0/18770726",
"title": "Writing Good Software Engineering Research Papers",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2003/18770726/12OmNAZOJZs",
"parentPublication": {
"id": "proceedings/icse/2003/1877/0",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2009/4715/0/05350651",
"title": "Give it a \"TWIST!\": Turning writing into student thinking",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2009/05350651/12OmNAm4TIn",
"parentPublication": {
"id": "proceedings/fie/2009/4715/0",
"title": "2009 39th IEEE Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2007/1083/0/04418001",
"title": "Work in progress - Instructor credibility: An analysis of engineering students' reflective writing for evidence of attitude shifts",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2007/04418001/12OmNBUS7ah",
"parentPublication": {
"id": "proceedings/fie/2007/1083/0",
"title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2007/1083/0/04417921",
"title": "Work in progress - student conference papers as a motivating tool",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2007/04417921/12OmNscfI1V",
"parentPublication": {
"id": "proceedings/fie/2007/1083/0",
"title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2013/5261/0/06685054",
"title": "Writing groups in computer science research labs",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2013/06685054/12OmNwwuDUG",
"parentPublication": {
"id": "proceedings/fie/2013/5261/0",
"title": "2013 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2013/5009/0/5009a483",
"title": "Integrating Mobile Device and Collaborative Mind Map to Enhance Sixth Graders' Creative Writing Abilities",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2013/5009a483/12OmNx76TGT",
"parentPublication": {
"id": "proceedings/icalt/2013/5009/0",
"title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2013/5261/0/06684901",
"title": "Improving student writing through multiple peer feedback",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2013/06684901/12OmNxX3uou",
"parentPublication": {
"id": "proceedings/fie/2013/5261/0",
"title": "2013 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2008/1969/0/04720261",
"title": "Creating innovative writing instruction for Computer Science graduate students",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2008/04720261/12OmNzCF4SC",
"parentPublication": {
"id": "proceedings/fie/2008/1969/0",
"title": "2008 38th Annual Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/1994/2413/0/00580650",
"title": "Grading technical papers during student conferences",
"doi": null,
"abstractUrl": "/proceedings-article/fie/1994/00580650/12OmNzZmZxS",
"parentPublication": {
"id": "proceedings/fie/1994/2413/0",
"title": "Proceedings of 1994 IEEE Frontiers in Education Conference - FIE '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "13xI8A66zF9",
"title": "2018 IEEE International Conference on Agents (ICA)",
"acronym": "ica",
"groupId": "1817885",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "13xI8ALy0Ec",
"doi": "10.1109/AGENTS.2018.8460004",
"title": "Autonomous Agents in Snake Game via Deep Reinforcement Learning",
"normalizedTitle": "Autonomous Agents in Snake Game via Deep Reinforcement Learning",
"abstract": "Since DeepMind pioneered a deep reinforcement learning (DRL) model to play the Atari games, DRL has become a commonly adopted method to enable the agents to learn complex control policies in various video games. However, similar approaches may still need to be improved when applied to more challenging scenarios, where reward signals are sparse and delayed. In this paper, we develop a refined DRL model to enable our autonomous agent to play the classical Snake Game, whose constraint gets stricter as the game progresses. Specifically, we employ a convolutional neural network (CNN) trained with a variant of Q-learning. Moreover, we propose a carefully designed reward mechanism to properly train the network, adopt a training gap strategy to temporarily bypass training after the location of the target changes, and introduce a dual experience replay method to categorize different experiences for better training efficacy. The experimental results show that our agent outperforms the baseline model and surpasses human-level performance in terms of playing the Snake Game.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Since DeepMind pioneered a deep reinforcement learning (DRL) model to play the Atari games, DRL has become a commonly adopted method to enable the agents to learn complex control policies in various video games. However, similar approaches may still need to be improved when applied to more challenging scenarios, where reward signals are sparse and delayed. In this paper, we develop a refined DRL model to enable our autonomous agent to play the classical Snake Game, whose constraint gets stricter as the game progresses. Specifically, we employ a convolutional neural network (CNN) trained with a variant of Q-learning. Moreover, we propose a carefully designed reward mechanism to properly train the network, adopt a training gap strategy to temporarily bypass training after the location of the target changes, and introduce a dual experience replay method to categorize different experiences for better training efficacy. The experimental results show that our agent outperforms the baseline model and surpasses human-level performance in terms of playing the Snake Game.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Since DeepMind pioneered a deep reinforcement learning (DRL) model to play the Atari games, DRL has become a commonly adopted method to enable the agents to learn complex control policies in various video games. However, similar approaches may still need to be improved when applied to more challenging scenarios, where reward signals are sparse and delayed. In this paper, we develop a refined DRL model to enable our autonomous agent to play the classical Snake Game, whose constraint gets stricter as the game progresses. Specifically, we employ a convolutional neural network (CNN) trained with a variant of Q-learning. Moreover, we propose a carefully designed reward mechanism to properly train the network, adopt a training gap strategy to temporarily bypass training after the location of the target changes, and introduce a dual experience replay method to categorize different experiences for better training efficacy. The experimental results show that our agent outperforms the baseline model and surpasses human-level performance in terms of playing the Snake Game.",
"fno": "08460004",
"keywords": [
"Games",
"Training",
"Autonomous Agents",
"Machine Learning",
"Learning Artificial Intelligence",
"Data Preprocessing",
"Computer Science",
"Deep Reinforcement Learning",
"Snake Game",
"Autonomous Agent",
"Experience Replay"
],
"authors": [
{
"affiliation": "Jilin University, College of Computer Science and Technology, Changchun, China",
"fullName": "Zhepei Wei",
"givenName": "Zhepei",
"surname": "Wei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly",
"fullName": "Di Wang",
"givenName": "Di",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Jilin University, College of Computer Science and Technology, Changchun, China",
"fullName": "Ming Zhang",
"givenName": "Ming",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly",
"fullName": "Ah-Hwee Tan",
"givenName": "Ah-Hwee",
"surname": "Tan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly",
"fullName": "Chunyan Miao",
"givenName": "Chunyan",
"surname": "Miao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Jilin University, College of Computer Science and Technology, Changchun, China",
"fullName": "You Zhou",
"givenName": "You",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ica",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-07-01T00:00:00",
"pubType": "proceedings",
"pages": "20-25",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-8180-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08460054",
"articleId": "13xI8AsfhNJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08460127",
"articleId": "13xI8AAc3rh",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cgames/2012/1120/0/S8004",
"title": "Modelling car drivers as believable autonomous agents for a traffic control training game",
"doi": null,
"abstractUrl": "/proceedings-article/cgames/2012/S8004/12OmNyoiZ4g",
"parentPublication": {
"id": "proceedings/cgames/2012/1120/0",
"title": "2012 17th International Conference on Computer Games (CGAMES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2017/4846/0/484601a155",
"title": "On the Development of an Autonomous Agent for a 3D First-Person Shooter Game Using Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2017/484601a155/12OmNz4SOqE",
"parentPublication": {
"id": "proceedings/sbgames/2017/4846/0",
"title": "2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2018/9605/0/960500a117",
"title": "Evaluating Competition in Training of Deep Reinforcement Learning Agents in First-Person Shooter Games",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2018/960500a117/17D45WaTkgt",
"parentPublication": {
"id": "proceedings/sbgames/2018/9605/0",
"title": "2018 17th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdicn/2022/8476/0/847600a373",
"title": "Exploring a Reinforcement Learning Agent with Improved Prioritized Experience Replay for a Confrontation Game",
"doi": null,
"abstractUrl": "/proceedings-article/bdicn/2022/847600a373/1CJgt3MPjyM",
"parentPublication": {
"id": "proceedings/bdicn/2022/8476/0",
"title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smartcomp/2022/8152/0/815200a192",
"title": "Scaling up Deep Reinforcement Learning for Intelligent Video Game Agents",
"doi": null,
"abstractUrl": "/proceedings-article/smartcomp/2022/815200a192/1F0gEGl7D6o",
"parentPublication": {
"id": "proceedings/smartcomp/2022/8152/0",
"title": "2022 IEEE International Conference on Smart Computing (SMARTCOMP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd-summer/2022/9637/0/963700a082",
"title": "Comparison of reinforcement learning in game AI",
"doi": null,
"abstractUrl": "/proceedings-article/snpd-summer/2022/963700a082/1La4Utd1a6Y",
"parentPublication": {
"id": "proceedings/snpd-summer/2022/9637/0",
"title": "2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ase/2019/2508/0/250800a772",
"title": "Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ase/2019/250800a772/1gysZSXw436",
"parentPublication": {
"id": "proceedings/ase/2019/2508/0",
"title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2019/5584/0/558400a377",
"title": "Exploration of Reinforcement Learning to Play Snake Game",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2019/558400a377/1jdDZDjA34c",
"parentPublication": {
"id": "proceedings/csci/2019/5584/0",
"title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2020/8432/0/843200a019",
"title": "AI4U: A Tool for Game Reinforcement Learning Experiments",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2020/843200a019/1pQIKRIg8QE",
"parentPublication": {
"id": "proceedings/sbgames/2020/8432/0",
"title": "2020 19th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2021/0189/0/018900a019",
"title": "Assessing the Robustness of Deep Q-Network Agents to Changes on Game Object Textures",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2021/018900a019/1zusr6LA20E",
"parentPublication": {
"id": "proceedings/sbgames/2021/0189/0",
"title": "2021 20th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBRbknT",
"title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)",
"acronym": "compsac",
"groupId": "1000143",
"volume": "1",
"displayVolume": "1",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "144U9bnXAFc",
"doi": "10.1109/COMPSAC.2018.00075",
"title": "Faster Deep Q-Learning Using Neural Episodic Control",
"normalizedTitle": "Faster Deep Q-Learning Using Neural Episodic Control",
"abstract": "The research on deep reinforcement learning which estimates Q-value by deep learning has been attracted the interest of researchers recently. In deep reinforcement learning, it is important to efficiently learn the experiences that an agent has collected by exploring environment. We propose NEC2DQN that improves learning speed of a poor sample efficiency algorithm such as DQN by using good one such as NEC at the beginning of learning. We show it is able to learn faster than Double DQN or N-step DQN in the experiments of Pong.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The research on deep reinforcement learning which estimates Q-value by deep learning has been attracted the interest of researchers recently. In deep reinforcement learning, it is important to efficiently learn the experiences that an agent has collected by exploring environment. We propose NEC2DQN that improves learning speed of a poor sample efficiency algorithm such as DQN by using good one such as NEC at the beginning of learning. We show it is able to learn faster than Double DQN or N-step DQN in the experiments of Pong.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The research on deep reinforcement learning which estimates Q-value by deep learning has been attracted the interest of researchers recently. In deep reinforcement learning, it is important to efficiently learn the experiences that an agent has collected by exploring environment. We propose NEC2DQN that improves learning speed of a poor sample efficiency algorithm such as DQN by using good one such as NEC at the beginning of learning. We show it is able to learn faster than Double DQN or N-step DQN in the experiments of Pong.",
"fno": "266601a486",
"keywords": [
"Neural Networks",
"Machine Learning",
"Convergence",
"Buffer Storage",
"Dictionaries",
"Feature Extraction",
"Learning Artificial Intelligence",
"Deep Reinforcement Learning",
"DQN",
"Neural Episodic Control",
"Sample Efficiency"
],
"authors": [
{
"affiliation": null,
"fullName": "Daichi Nishio",
"givenName": "Daichi",
"surname": "Nishio",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Satoshi Yamane",
"givenName": "Satoshi",
"surname": "Yamane",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-07-01T00:00:00",
"pubType": "proceedings",
"pages": "486-491",
"year": "2018",
"issn": "0730-3157",
"isbn": "978-1-5386-2667-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "266601a480",
"articleId": "144U9aneeUY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "266601a492",
"articleId": "17D45WwsQ4H",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccvw/2017/1034/0/1034b050",
"title": "Double-Task Deep Q-Learning with Multiple Views",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034b050/12OmNvAiSEx",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2018/4210/0/421001a781",
"title": "Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2018/421001a781/12OmNvkpkSa",
"parentPublication": {
"id": "proceedings/dsc/2018/4210/0",
"title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08454905",
"title": "DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08454905/17D45WnnFYf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2018/1229/0/122900a034",
"title": "Deep Recurrent Q-Network with Truncated History",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2018/122900a034/17D45WrVg2b",
"parentPublication": {
"id": "proceedings/taai/2018/1229/0",
"title": "2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956417",
"title": "Data-Efficient Deep Reinforcement Learning with Symmetric Consistency",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956417/1IHpaNqHimY",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2019/5094/0/509400a170",
"title": "Exploring Noise Deep Q Network Based on Cross-Connected",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2019/509400a170/1gjRI7DFqbC",
"parentPublication": {
"id": "proceedings/mlbdbi/2019/5094/0",
"title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicas/2019/6106/0/610600a763",
"title": "Traffic Signal Control with Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icicas/2019/610600a763/1iHUXjFQYYU",
"parentPublication": {
"id": "proceedings/icicas/2019/6106/0",
"title": "2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cibda/2020/9837/0/983700a450",
"title": "Graph Signal Sampling with Deep Q-Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cibda/2020/983700a450/1lO1KWUlhtu",
"parentPublication": {
"id": "proceedings/cibda/2020/9837/0",
"title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2020/9228/0/922800a669",
"title": "A State Representation Dueling Network for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2020/922800a669/1pP3ADgP7IQ",
"parentPublication": {
"id": "proceedings/ictai/2020/9228/0",
"title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b474",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b474/1zw61UfxeYo",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirB",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"acronym": "ictai",
"groupId": "1000763",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WnnFUV",
"doi": "10.1109/ICTAI.2018.00012",
"title": "Historical Best Q-Networks for Deep Reinforcement Learning",
"normalizedTitle": "Historical Best Q-Networks for Deep Reinforcement Learning",
"abstract": "The popular DQN algorithm is known to have some instability and variability which make its performance poor sometimes. In prior work, there is only one target network, the network that is updated by the latest learned Q-value estimate. In this paper, we present multiple target networks which are the extension to the Deep Q-Networks (DQN). Based on the previously learned Q-value estimate networks, we choose several networks that perform best in all previous networks as our auxiliary networks. We show that in order to solve the problem of determining which network is better, we use the score of each episode as a measure of the quality of the network. The key behind our method is that each auxiliary network has some states that it is good at handling and guides the agent to make the right choices. We apply our method to the Atari 2600 games from the OpenAI Gym. We find that DQN with auxiliary networks significantly improves the performance and the stability of games.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The popular DQN algorithm is known to have some instability and variability which make its performance poor sometimes. In prior work, there is only one target network, the network that is updated by the latest learned Q-value estimate. In this paper, we present multiple target networks which are the extension to the Deep Q-Networks (DQN). Based on the previously learned Q-value estimate networks, we choose several networks that perform best in all previous networks as our auxiliary networks. We show that in order to solve the problem of determining which network is better, we use the score of each episode as a measure of the quality of the network. The key behind our method is that each auxiliary network has some states that it is good at handling and guides the agent to make the right choices. We apply our method to the Atari 2600 games from the OpenAI Gym. We find that DQN with auxiliary networks significantly improves the performance and the stability of games.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The popular DQN algorithm is known to have some instability and variability which make its performance poor sometimes. In prior work, there is only one target network, the network that is updated by the latest learned Q-value estimate. In this paper, we present multiple target networks which are the extension to the Deep Q-Networks (DQN). Based on the previously learned Q-value estimate networks, we choose several networks that perform best in all previous networks as our auxiliary networks. We show that in order to solve the problem of determining which network is better, we use the score of each episode as a measure of the quality of the network. The key behind our method is that each auxiliary network has some states that it is good at handling and guides the agent to make the right choices. We apply our method to the Atari 2600 games from the OpenAI Gym. We find that DQN with auxiliary networks significantly improves the performance and the stability of games.",
"fno": "744900a006",
"keywords": [
"Learning Artificial Intelligence",
"Neural Nets",
"Q Learning Algorithm",
"Deep Neural Network",
"Deep Reinforcement Learning",
"DQN Algorithm",
"Learned Q Value Estimate Networks",
"Deep Q Networks",
"Games",
"Training",
"Decision Making",
"Neural Networks",
"Feature Extraction",
"Deep Reinforcement Learning",
"Multiple Target Networks",
"Deep Q Networks DQN",
"Deep Learning"
],
"authors": [
{
"affiliation": null,
"fullName": "Wenwu Yu",
"givenName": "Wenwu",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rui Wang",
"givenName": "Rui",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ruiying Li",
"givenName": "Ruiying",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jing Gao",
"givenName": "Jing",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaohui Hu",
"givenName": "Xiaohui",
"surname": "Hu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ictai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-11-01T00:00:00",
"pubType": "proceedings",
"pages": "6-11",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-7449-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "744900a001",
"articleId": "17D45VW8bqV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "744900a012",
"articleId": "17D45WaTkj8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/compsac/2018/2666/1/266601a486",
"title": "Faster Deep Q-Learning Using Neural Episodic Control",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2018/266601a486/144U9bnXAFc",
"parentPublication": {
"id": "proceedings/compsac/2018/2666/2",
"title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08546182",
"title": "Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08546182/17D45VTRoyu",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2018/1229/0/122900a034",
"title": "Deep Recurrent Q-Network with Truncated History",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2018/122900a034/17D45WrVg2b",
"parentPublication": {
"id": "proceedings/taai/2018/1229/0",
"title": "2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdicn/2022/8476/0/847600a398",
"title": "Towards Larger Receptive Field: Non-Local Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bdicn/2022/847600a398/1CJgdV1WYE0",
"parentPublication": {
"id": "proceedings/bdicn/2022/8476/0",
"title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a492",
"title": "A deep reinforcement learning method based on attentional memories",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a492/1FUUuLwM2o8",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/msn/2022/6457/0/645700a534",
"title": "Graded-Q Reinforcement Learning with Information-Enhanced State Encoder for Hierarchical Collaborative Multi-Vehicle Pursuit",
"doi": null,
"abstractUrl": "/proceedings-article/msn/2022/645700a534/1LUtM7TcyME",
"parentPublication": {
"id": "proceedings/msn/2022/6457/0",
"title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fcsit/2022/6353/0/635300a090",
"title": "Deep Reinforcement Learning for Two-Player DouDizhu",
"doi": null,
"abstractUrl": "/proceedings-article/fcsit/2022/635300a090/1Ml2boDj8SQ",
"parentPublication": {
"id": "proceedings/fcsit/2022/6353/0",
"title": "2022 Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2019/5094/0/509400a170",
"title": "Exploring Noise Deep Q Network Based on Cross-Connected",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2019/509400a170/1gjRI7DFqbC",
"parentPublication": {
"id": "proceedings/mlbdbi/2019/5094/0",
"title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2020/9228/0/922800a669",
"title": "A State Representation Dueling Network for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2020/922800a669/1pP3ADgP7IQ",
"parentPublication": {
"id": "proceedings/ictai/2020/9228/0",
"title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b474",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b474/1zw61UfxeYo",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirO",
"title": "2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"acronym": "taai",
"groupId": "1800268",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WrVg2b",
"doi": "10.1109/TAAI.2018.00017",
"title": "Deep Recurrent Q-Network with Truncated History",
"normalizedTitle": "Deep Recurrent Q-Network with Truncated History",
"abstract": "Reinforcement Learning is a kind of machine learning method which learns through agents' interaction with the environment. Deep Q-Network (DQN), which is a model of reinforcement learning based on deep neural networks, succeeded in learning human-level control policies on various kinds of Atari 2600 games with image pixel inputs. Because an input of DQN is the game frames of the last four steps, DQN had difficulty on mastering such games that need to remember events earlier than four steps in the past. To alleviate the problem, Deep Recurrent Q-Network (DRQN) and Deep Attention Recurrent Q-Network (DARQN) were proposed. In DRQN, the first fully-connected layer just after convolutional layers is replaced with an LSTM to incorporate past information. DARQN is a model with visual attention mechanisms on top of DRQN. We propose two new reinforcement learning models: Deep Recurrent Q-Network with Truncated History (T-DRQN) and Deep Attention Recurrent Q-Network with Truncated History (T-DARQN). T-DRQN uses a truncated history so that we can control the length of history to be considered. T-DARQN is a model with visual attention mechanism on top of T-DRQN. Experiments of our models on six games of Atari 2600 shows a level of performance between DQN and D(A) RQN. Furthermore, results show the necessity of using past information with a truncated length, rather than using only the current information or all of the past information.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Reinforcement Learning is a kind of machine learning method which learns through agents' interaction with the environment. Deep Q-Network (DQN), which is a model of reinforcement learning based on deep neural networks, succeeded in learning human-level control policies on various kinds of Atari 2600 games with image pixel inputs. Because an input of DQN is the game frames of the last four steps, DQN had difficulty on mastering such games that need to remember events earlier than four steps in the past. To alleviate the problem, Deep Recurrent Q-Network (DRQN) and Deep Attention Recurrent Q-Network (DARQN) were proposed. In DRQN, the first fully-connected layer just after convolutional layers is replaced with an LSTM to incorporate past information. DARQN is a model with visual attention mechanisms on top of DRQN. We propose two new reinforcement learning models: Deep Recurrent Q-Network with Truncated History (T-DRQN) and Deep Attention Recurrent Q-Network with Truncated History (T-DARQN). T-DRQN uses a truncated history so that we can control the length of history to be considered. T-DARQN is a model with visual attention mechanism on top of T-DRQN. Experiments of our models on six games of Atari 2600 shows a level of performance between DQN and D(A) RQN. Furthermore, results show the necessity of using past information with a truncated length, rather than using only the current information or all of the past information.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Reinforcement Learning is a kind of machine learning method which learns through agents' interaction with the environment. Deep Q-Network (DQN), which is a model of reinforcement learning based on deep neural networks, succeeded in learning human-level control policies on various kinds of Atari 2600 games with image pixel inputs. Because an input of DQN is the game frames of the last four steps, DQN had difficulty on mastering such games that need to remember events earlier than four steps in the past. To alleviate the problem, Deep Recurrent Q-Network (DRQN) and Deep Attention Recurrent Q-Network (DARQN) were proposed. In DRQN, the first fully-connected layer just after convolutional layers is replaced with an LSTM to incorporate past information. DARQN is a model with visual attention mechanisms on top of DRQN. We propose two new reinforcement learning models: Deep Recurrent Q-Network with Truncated History (T-DRQN) and Deep Attention Recurrent Q-Network with Truncated History (T-DARQN). T-DRQN uses a truncated history so that we can control the length of history to be considered. T-DARQN is a model with visual attention mechanism on top of T-DRQN. Experiments of our models on six games of Atari 2600 shows a level of performance between DQN and D(A) RQN. Furthermore, results show the necessity of using past information with a truncated length, rather than using only the current information or all of the past information.",
"fno": "122900a034",
"keywords": [
"Computer Games",
"Learning Artificial Intelligence",
"Recurrent Neural Nets",
"D A RQN",
"T DARQN",
"T DRQN",
"Reinforcement Learning Models",
"Visual Attention Mechanism",
"Deep Attention Recurrent Q Network",
"Deep Recurrent Q Network",
"Game Frames",
"Image Pixel Inputs",
"Atari 2600 Games",
"Human Level Control Policies",
"Deep Neural Networks",
"DQN",
"Deep Q Network",
"Machine Learning Method",
"Truncated History",
"Games",
"History",
"Visualization",
"Network Architecture",
"Feature Extraction",
"Degradation",
"Reinforcement Learning",
"Recurrent Neural Network",
"Attention Mechanism",
"DQN",
"DRQN",
"DARQN"
],
"authors": [
{
"affiliation": null,
"fullName": "Hyunwoo Oh",
"givenName": "Hyunwoo",
"surname": "Oh",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tomoyuki Kaneko",
"givenName": "Tomoyuki",
"surname": "Kaneko",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "taai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-11-01T00:00:00",
"pubType": "proceedings",
"pages": "34-39",
"year": "2018",
"issn": null,
"isbn": "978-1-7281-1229-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "122900a028",
"articleId": "17D45WZZ7BY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "122900a040",
"articleId": "17D45WIXbOD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wacv/2018/4886/0/488601a170",
"title": "Image2GIF: Generating Cinemagraphs Using Recurrent Deep Q-Networks",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2018/488601a170/12OmNBNM95H",
"parentPublication": {
"id": "proceedings/wacv/2018/4886/0",
"title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2017/1034/0/1034b050",
"title": "Double-Task Deep Q-Learning with Multiple Views",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034b050/12OmNvAiSEx",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2018/2666/1/266601a486",
"title": "Faster Deep Q-Learning Using Neural Episodic Control",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2018/266601a486/144U9bnXAFc",
"parentPublication": {
"id": "proceedings/compsac/2018/2666/2",
"title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2017/2652/0/2652a805",
"title": "Learning Motion Policy for Mobile Robots Using Deep Q-Learning",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2017/2652a805/17D45VTRoCd",
"parentPublication": {
"id": "proceedings/csci/2017/2652/0",
"title": "2017 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2018/7449/0/744900a006",
"title": "Historical Best Q-Networks for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2018/744900a006/17D45WnnFUV",
"parentPublication": {
"id": "proceedings/ictai/2018/7449/0",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08454905",
"title": "DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08454905/17D45WnnFYf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671662",
"title": "Multi-Temporal Abstraction with Time-Aware Deep Q-Learning for Septic Shock Prevention",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671662/1A8jg6WK5ck",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a492",
"title": "A deep reinforcement learning method based on attentional memories",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a492/1FUUuLwM2o8",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2019/5094/0/509400a170",
"title": "Exploring Noise Deep Q Network Based on Cross-Connected",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2019/509400a170/1gjRI7DFqbC",
"parentPublication": {
"id": "proceedings/mlbdbi/2019/5094/0",
"title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b474",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b474/1zw61UfxeYo",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1MeoElmyyEo",
"title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"acronym": "sitis",
"groupId": "10089803",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1MeoLxQJmKc",
"doi": "10.1109/SITIS57111.2022.00102",
"title": "Using Double Deep Q-Learning to learn Attitude Control of Fixed-Wing Aircraft",
"normalizedTitle": "Using Double Deep Q-Learning to learn Attitude Control of Fixed-Wing Aircraft",
"abstract": "These last few years have been big for the field of Reinforcement Learning. While is was long thought to be impossible for Reinforcement Learning to master complex environments, recent research has seen Reinforcement Learning agent master highly complex tasks like Atari Games, Go, Dota 2, Autonomous transportation among many others. This has sparked a new wave of interest into Reinforcement Learning, with most of that focus directed towards Deep Reinforcement Learning algorithms. This paper will explore the realm of aviation and apply Deep Reinforcement learning to it. To be more specific, we will train an agent with Double Deep Q-Learning to learn how to control the planes attitude control. The QPlane toolkit will be used for this, and we will utilize both simulators provided. The methodology and results will be presented in this paper.",
"abstracts": [
{
"abstractType": "Regular",
"content": "These last few years have been big for the field of Reinforcement Learning. While is was long thought to be impossible for Reinforcement Learning to master complex environments, recent research has seen Reinforcement Learning agent master highly complex tasks like Atari Games, Go, Dota 2, Autonomous transportation among many others. This has sparked a new wave of interest into Reinforcement Learning, with most of that focus directed towards Deep Reinforcement Learning algorithms. This paper will explore the realm of aviation and apply Deep Reinforcement learning to it. To be more specific, we will train an agent with Double Deep Q-Learning to learn how to control the planes attitude control. The QPlane toolkit will be used for this, and we will utilize both simulators provided. The methodology and results will be presented in this paper.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "These last few years have been big for the field of Reinforcement Learning. While is was long thought to be impossible for Reinforcement Learning to master complex environments, recent research has seen Reinforcement Learning agent master highly complex tasks like Atari Games, Go, Dota 2, Autonomous transportation among many others. This has sparked a new wave of interest into Reinforcement Learning, with most of that focus directed towards Deep Reinforcement Learning algorithms. This paper will explore the realm of aviation and apply Deep Reinforcement learning to it. To be more specific, we will train an agent with Double Deep Q-Learning to learn how to control the planes attitude control. The QPlane toolkit will be used for this, and we will utilize both simulators provided. The methodology and results will be presented in this paper.",
"fno": "649500a646",
"keywords": [
"Aerospace Components",
"Aircraft Control",
"Attitude Control",
"Control Engineering Computing",
"Deep Learning Artificial Intelligence",
"Multi Agent Systems",
"Reinforcement Learning",
"Autonomous Transportation",
"Deep Reinforcement Learning Algorithms",
"Double Deep Q Learning",
"Fixed Wing Aircraft",
"Planes Attitude Control",
"Q Plane Toolkit",
"Reinforcement Learning Agent Master",
"Deep Learning",
"Training",
"Q Learning",
"Attitude Control",
"Transportation",
"Games",
"Network Architecture",
"Reinforcement Learning",
"Deep Reinforcement Learning",
"Deep Learning",
"Double Deep Q Learning",
"Deep Q Learning",
"Q Learning",
"DQN",
"DDQN",
"Fixed Wing",
"Attitude Control"
],
"authors": [
{
"affiliation": "Purdue University Northwest,Hammond,USA",
"fullName": "David J. Richter",
"givenName": "David J.",
"surname": "Richter",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Purdue University Northwest,Hammond,USA",
"fullName": "Ricardo A. Calix",
"givenName": "Ricardo A.",
"surname": "Calix",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sitis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-10-01T00:00:00",
"pubType": "proceedings",
"pages": "646-651",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6495-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "649500a639",
"articleId": "1MeoGY1hhSw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "649500a653",
"articleId": "1MeoMA3clKU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2021/0126/0/09669667",
"title": "Automated Molecule Generation using Deep Q-Learning and Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2021/09669667/1A9Vk1TER2w",
"parentPublication": {
"id": "proceedings/bibm/2021/0126/0",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/synasc/2021/0650/0/065000a135",
"title": "Untangling Braids with Multi-Agent Q-Learning",
"doi": null,
"abstractUrl": "/proceedings-article/synasc/2021/065000a135/1ASJD5XEpTW",
"parentPublication": {
"id": "proceedings/synasc/2021/0650/0",
"title": "2021 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd/2021/0403/0/09704994",
"title": "Fuzzy Q-learning Control for Temperature Systems",
"doi": null,
"abstractUrl": "/proceedings-article/snpd/2021/09704994/1AUpjrcuBnG",
"parentPublication": {
"id": "proceedings/snpd/2021/0403/0",
"title": "2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdicn/2022/8476/0/847600a335",
"title": "Towards Accelerated and Robust Rreinforcement Learning with Transfer Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bdicn/2022/847600a335/1CJgstsaFiM",
"parentPublication": {
"id": "proceedings/bdicn/2022/8476/0",
"title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscv/2022/9558/0/09806077",
"title": "Drone path optimization in complex environment based on Q-learning algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/iscv/2022/09806077/1EBWpuk2w7u",
"parentPublication": {
"id": "proceedings/iscv/2022/9558/0",
"title": "2022 International Conference on Intelligent Systems and Computer Vision (ISCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscv/2022/9558/0/09806135",
"title": "Road Traffic: Deep Q-learning Agent Control Traffic lights in the intersection",
"doi": null,
"abstractUrl": "/proceedings-article/iscv/2022/09806135/1EBWqGvADOU",
"parentPublication": {
"id": "proceedings/iscv/2022/9558/0",
"title": "2022 International Conference on Intelligent Systems and Computer Vision (ISCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/01/09906971",
"title": "DashBot: Insight-Driven Dashboard Generation Based on Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/tg/2023/01/09906971/1H5EWMQX9ZK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2022/9007/0/900700a001",
"title": "Glyph-Based Visual Analysis of Q-Leaning Based Action Policy Ensembles on Racetrack",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2022/900700a001/1KaH3gMXIVq",
"parentPublication": {
"id": "proceedings/iv/2022/9007/0",
"title": "2022 26th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ctisc/2021/1868/0/186800a246",
"title": "Few-shot Aircraft Detection Based on Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ctisc/2021/186800a246/1wG6kemf9jq",
"parentPublication": {
"id": "proceedings/ctisc/2021/1868/0",
"title": "2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b474",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b474/1zw61UfxeYo",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1gjRFGp9Sus",
"title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"acronym": "mlbdbi",
"groupId": "1834885",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1gjRI7DFqbC",
"doi": "10.1109/MLBDBI48998.2019.00039",
"title": "Exploring Noise Deep Q Network Based on Cross-Connected",
"normalizedTitle": "Exploring Noise Deep Q Network Based on Cross-Connected",
"abstract": "Deep Q Network, which is a combination of CNN and Q-Learning, is an important turning point in deep reinforcement learning. DQN algorithm has achieved great success on the Atari 2600 game platform. However, in some complex game environments, on the one hand, CNN is not accurate enough to extract the original environment feature information points, which leads to unreasonable action strategy selection in the later stage of DQN; on the other hand, the local ε-perturbation strategy adopted by DQN can not be effectively explored on a large scale, resulting in the optimal strategy of action space perturbation. To solve these problems, a new exploratory noise deep Q network based on cross-connected is proposed. Firstly, the model is a six-layer network structure, which includes the input layer, three convolution layer, one full-connection layer and the output layer. The second convolution layer is connected to the full-connection layer, making full use of the characteristics of low-level. Secondly, parameter noise is introduced into the whole connection layer and output layer, which adds parameter noise to its weight and causes network output changes. According to the changes, a large number of new states are explored, more abundant samples are provided, and effective decision information is provided. Finally, the experimental results show that the effectiveness of the model is validated in multiple game environments of Atari 2600.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Deep Q Network, which is a combination of CNN and Q-Learning, is an important turning point in deep reinforcement learning. DQN algorithm has achieved great success on the Atari 2600 game platform. However, in some complex game environments, on the one hand, CNN is not accurate enough to extract the original environment feature information points, which leads to unreasonable action strategy selection in the later stage of DQN; on the other hand, the local ε-perturbation strategy adopted by DQN can not be effectively explored on a large scale, resulting in the optimal strategy of action space perturbation. To solve these problems, a new exploratory noise deep Q network based on cross-connected is proposed. Firstly, the model is a six-layer network structure, which includes the input layer, three convolution layer, one full-connection layer and the output layer. The second convolution layer is connected to the full-connection layer, making full use of the characteristics of low-level. Secondly, parameter noise is introduced into the whole connection layer and output layer, which adds parameter noise to its weight and causes network output changes. According to the changes, a large number of new states are explored, more abundant samples are provided, and effective decision information is provided. Finally, the experimental results show that the effectiveness of the model is validated in multiple game environments of Atari 2600.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Deep Q Network, which is a combination of CNN and Q-Learning, is an important turning point in deep reinforcement learning. DQN algorithm has achieved great success on the Atari 2600 game platform. However, in some complex game environments, on the one hand, CNN is not accurate enough to extract the original environment feature information points, which leads to unreasonable action strategy selection in the later stage of DQN; on the other hand, the local ε-perturbation strategy adopted by DQN can not be effectively explored on a large scale, resulting in the optimal strategy of action space perturbation. To solve these problems, a new exploratory noise deep Q network based on cross-connected is proposed. Firstly, the model is a six-layer network structure, which includes the input layer, three convolution layer, one full-connection layer and the output layer. The second convolution layer is connected to the full-connection layer, making full use of the characteristics of low-level. Secondly, parameter noise is introduced into the whole connection layer and output layer, which adds parameter noise to its weight and causes network output changes. According to the changes, a large number of new states are explored, more abundant samples are provided, and effective decision information is provided. Finally, the experimental results show that the effectiveness of the model is validated in multiple game environments of Atari 2600.",
"fno": "509400a170",
"keywords": [
"Computer Games",
"Convolutional Neural Nets",
"Learning Artificial Intelligence",
"Cross Connected",
"CNN",
"Q Learning",
"Deep Reinforcement Learning",
"DQN Algorithm",
"Atari 2600 Game Platform",
"Complex Game Environments",
"Local X 03 B 5 Perturbation Strategy",
"Optimal Strategy",
"Action Space Perturbation",
"Exploratory Noise",
"Six Layer Network Structure",
"Convolution Layer",
"Full Connection Layer",
"Parameter Noise",
"Network Output Changes",
"Multiple Game Environments",
"Action Strategy Selection",
"Environment Feature Information Points",
"Noise Deep Q Network",
"Reinforcement Learning",
"Convolution",
"Games",
"Feature Extraction",
"Neural Networks",
"Training",
"Data Mining",
"Q Learnin",
"Reinforcement Learning",
"Deep Q Network",
"Cross Connected",
"Noise Exploration"
],
"authors": [
{
"affiliation": "Changchun University of Science and Technology",
"fullName": "Xiaming Wu",
"givenName": "Xiaming",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Changchun University of Science and Technology",
"fullName": "Enzhi Chen",
"givenName": "Enzhi",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Changchun University of Science and Technology",
"fullName": "Mingqiu Li",
"givenName": "Mingqiu",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Changchun University of Science and Technology",
"fullName": "Chunyang Wang",
"givenName": "Chunyang",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mlbdbi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-11-01T00:00:00",
"pubType": "proceedings",
"pages": "170-175",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-5094-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "509400a166",
"articleId": "1gjRIRK441i",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "509400a176",
"articleId": "1gjRGwM9nos",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ictai/2018/7449/0/744900a006",
"title": "Historical Best Q-Networks for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2018/744900a006/17D45WnnFUV",
"parentPublication": {
"id": "proceedings/ictai/2018/7449/0",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08454905",
"title": "DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08454905/17D45WnnFYf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2018/1229/0/122900a034",
"title": "Deep Recurrent Q-Network with Truncated History",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2018/122900a034/17D45WrVg2b",
"parentPublication": {
"id": "proceedings/taai/2018/1229/0",
"title": "2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671662",
"title": "Multi-Temporal Abstraction with Time-Aware Deep Q-Learning for Septic Shock Prevention",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671662/1A8jg6WK5ck",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/netcit/2021/0070/0/007000a162",
"title": "The USV Path Planning Based on an Improved DQN Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/netcit/2021/007000a162/1BES31rbpaU",
"parentPublication": {
"id": "proceedings/netcit/2021/0070/0",
"title": "2021 International Conference on Networking, Communications and Information Technology (NetCIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a492",
"title": "A deep reinforcement learning method based on attentional memories",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a492/1FUUuLwM2o8",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859768",
"title": "Learn Effective Representation for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859768/1G9Eg3w38ys",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd-summer/2022/9637/0/963700a082",
"title": "Comparison of reinforcement learning in game AI",
"doi": null,
"abstractUrl": "/proceedings-article/snpd-summer/2022/963700a082/1La4Utd1a6Y",
"parentPublication": {
"id": "proceedings/snpd-summer/2022/9637/0",
"title": "2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nicoint/2019/4021/0/402100a120",
"title": "Self-Play for Training General Fighting Game AI",
"doi": null,
"abstractUrl": "/proceedings-article/nicoint/2019/402100a120/1grPmB2gkE0",
"parentPublication": {
"id": "proceedings/nicoint/2019/4021/0",
"title": "2019 Nicograph International (NicoInt)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b474",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b474/1zw61UfxeYo",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1pQIKkf0MSY",
"title": "2020 19th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"acronym": "sbgames",
"groupId": "1800056",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1pQILcDbo9q",
"doi": "10.1109/SBGames51465.2020.00015",
"title": "An Intelligent Agent Playing Generic Action Games based on Deep Reinforcement Learning with Memory Restrictions",
"normalizedTitle": "An Intelligent Agent Playing Generic Action Games based on Deep Reinforcement Learning with Memory Restrictions",
"abstract": "Among the topics that increasingly gained special attention in Computer Science recently, the evolution of Artificial Intelligence has been one of the most prominent subjects, especially when related to games. In this work we developed an intelligent agent with memory restrictions so to investigate its ability to learn playing multiple, different games without the need of being provided with specific details for each of the games. As a measure of quality of the agent, we used the difference between its score and the scores obtained by casual human players. Aiming to address the possibilities of using Deep Learning for General Game Playing in less powerful devices, we explicitly limited the amount of memory available for the agent, apart from the commonly used physical memory limit for most works in the area. For the abstraction of machine learning and image processing stages, we used the Keras and Gym libraries. As a result, we obtained an agent capable of playing multiple games without the need to provide rules in advance, but receiving at each moment only the game video frame, the current score and whether the current state represents an endgame. To assess the agent effectiveness, we submitted it to a set of Atari 2600™ games, where the scores obtained were compared to casual human players and discussed. In the conclusion, we show that promising results were obtained for these games even with memory limitations and finally a few improvements are proposed.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Among the topics that increasingly gained special attention in Computer Science recently, the evolution of Artificial Intelligence has been one of the most prominent subjects, especially when related to games. In this work we developed an intelligent agent with memory restrictions so to investigate its ability to learn playing multiple, different games without the need of being provided with specific details for each of the games. As a measure of quality of the agent, we used the difference between its score and the scores obtained by casual human players. Aiming to address the possibilities of using Deep Learning for General Game Playing in less powerful devices, we explicitly limited the amount of memory available for the agent, apart from the commonly used physical memory limit for most works in the area. For the abstraction of machine learning and image processing stages, we used the Keras and Gym libraries. As a result, we obtained an agent capable of playing multiple games without the need to provide rules in advance, but receiving at each moment only the game video frame, the current score and whether the current state represents an endgame. To assess the agent effectiveness, we submitted it to a set of Atari 2600™ games, where the scores obtained were compared to casual human players and discussed. In the conclusion, we show that promising results were obtained for these games even with memory limitations and finally a few improvements are proposed.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Among the topics that increasingly gained special attention in Computer Science recently, the evolution of Artificial Intelligence has been one of the most prominent subjects, especially when related to games. In this work we developed an intelligent agent with memory restrictions so to investigate its ability to learn playing multiple, different games without the need of being provided with specific details for each of the games. As a measure of quality of the agent, we used the difference between its score and the scores obtained by casual human players. Aiming to address the possibilities of using Deep Learning for General Game Playing in less powerful devices, we explicitly limited the amount of memory available for the agent, apart from the commonly used physical memory limit for most works in the area. For the abstraction of machine learning and image processing stages, we used the Keras and Gym libraries. As a result, we obtained an agent capable of playing multiple games without the need to provide rules in advance, but receiving at each moment only the game video frame, the current score and whether the current state represents an endgame. To assess the agent effectiveness, we submitted it to a set of Atari 2600™ games, where the scores obtained were compared to casual human players and discussed. In the conclusion, we show that promising results were obtained for these games even with memory limitations and finally a few improvements are proposed.",
"fno": "843200a029",
"keywords": [
"Computer Games",
"Learning Artificial Intelligence",
"Multi Agent Systems",
"Gym Libraries",
"Deep Reinforcement Learning",
"Physical Memory Limit",
"Memory Limitations",
"Atari 2600 Games",
"Game Video Frame",
"Machine Learning",
"General Game Playing",
"Deep Learning",
"Human Players",
"Multiple Games",
"Artificial Intelligence",
"Computer Science",
"Memory Restrictions",
"Intelligent Agent",
"Games",
"Artificial Intelligence",
"Reinforcement Learning",
"Machine Learning Algorithms",
"Adaptation Models",
"Heuristic Algorithms",
"Training",
"General Game Playing",
"Artificial Intelligence",
"Atari 2600 X 2122"
],
"authors": [
{
"affiliation": "Create IT,Lisbon,Portugal",
"fullName": "Lucas Antunes de Almeida",
"givenName": "Lucas Antunes",
"surname": "de Almeida",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Federal University of Pampa,Alegrete,Brazil",
"fullName": "Marcelo Resende Thielo",
"givenName": "Marcelo Resende",
"surname": "Thielo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sbgames",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-11-01T00:00:00",
"pubType": "proceedings",
"pages": "29-37",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8432-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "843200a019",
"articleId": "1pQIKRIg8QE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "843200a038",
"articleId": "1pQILVR530I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icalt/2016/9041/0/9041a153",
"title": "Towards a Generic UML Model to Support Designing Educational Role Playing Games",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2016/9041a153/12OmNzFv4iL",
"parentPublication": {
"id": "proceedings/icalt/2016/9041/0",
"title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2017/4846/0/484601a019",
"title": "A Methodology for Creating Generic Game Playing Agents for Board Games",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2017/484601a019/12OmNzmtWsR",
"parentPublication": {
"id": "proceedings/sbgames/2017/4846/0",
"title": "2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2018/5892/0/08466428",
"title": "Play games using Reinforcement Learning and Artificial Neural Networks with Experience Replay",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2018/08466428/13Jkrbn4CUN",
"parentPublication": {
"id": "proceedings/icis/2018/5892/0",
"title": "2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2015/03/07055252",
"title": "An Analytic and Psychometric Evaluation of Dynamic Game Adaption for Increasing Session-Level Retention in Casual Games",
"doi": null,
"abstractUrl": "/journal/ci/2015/03/07055252/13rRUwbs25q",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2010/01/05345847",
"title": "RL-DOT: A Reinforcement Learning NPC Team for Playing Domination Games",
"doi": null,
"abstractUrl": "/journal/ci/2010/01/05345847/13rRUzp02qB",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2018/7449/0/744900a320",
"title": "Baselines for Reinforcement Learning in Text Games",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2018/744900a320/17D45XfSEVi",
"parentPublication": {
"id": "proceedings/ictai/2018/7449/0",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2022/9221/0/922100c303",
"title": "Using Reinforcement Learning for Load Testing of Video Games",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2022/922100c303/1EmrTrsTLqg",
"parentPublication": {
"id": "proceedings/icse/2022/9221/0",
"title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsme/2020/5619/0/561900a692",
"title": "Regression Testing of Massively Multiplayer Online Role-Playing Games",
"doi": null,
"abstractUrl": "/proceedings-article/icsme/2020/561900a692/1oqKNobL9i8",
"parentPublication": {
"id": "proceedings/icsme/2020/5619/0",
"title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2020/8432/0/843200a054",
"title": "Drafting in Collectible Card Games via Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2020/843200a054/1pQIKOvhkFq",
"parentPublication": {
"id": "proceedings/sbgames/2020/8432/0",
"title": "2020 19th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800a714",
"title": "Formal Modeling of Reinforcement Learning with Many Agents through Repeated Local Interactions",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800a714/1zw631pHoZ2",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1zw5OvFfshW",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"acronym": "ictai",
"groupId": "1000763",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zw61UfxeYo",
"doi": "10.1109/ICTAI52525.2021.00234",
"title": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"normalizedTitle": "DHQN: a Stable Approach to Remove Target Network from Deep Q-learning Network",
"abstract": "As the first successful attempt to combine deep neural network and reinforcement learning, Deep Q-learning Network (DQN) draws a lot of attention from reinforcement learning researchers. One of the most important components of DQN is target network, which is used to stabilize learning process. When confront complex network structure, the existence of target network means extra memory resource to preserve the neural network weights and high computing cost to calculate target. Thus, we propose a Deep Hybrid Q-learning Network (DHQN) algorithm, which introduces an alternative approach, Random Hybrid Optimization (RHO), that can simplify DQN and attain a more stable and faster learning without a target network. We illustrate that RHO can decelerate divergence in the classical off-policy counterexample θ → 2θ problem. We also testify the effectiveness of DHQN in several control and Atari domains, which shows DHQN outperforms DQN without a target network and original DQN.",
"abstracts": [
{
"abstractType": "Regular",
"content": "As the first successful attempt to combine deep neural network and reinforcement learning, Deep Q-learning Network (DQN) draws a lot of attention from reinforcement learning researchers. One of the most important components of DQN is target network, which is used to stabilize learning process. When confront complex network structure, the existence of target network means extra memory resource to preserve the neural network weights and high computing cost to calculate target. Thus, we propose a Deep Hybrid Q-learning Network (DHQN) algorithm, which introduces an alternative approach, Random Hybrid Optimization (RHO), that can simplify DQN and attain a more stable and faster learning without a target network. We illustrate that RHO can decelerate divergence in the classical off-policy counterexample θ → 2θ problem. We also testify the effectiveness of DHQN in several control and Atari domains, which shows DHQN outperforms DQN without a target network and original DQN.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "As the first successful attempt to combine deep neural network and reinforcement learning, Deep Q-learning Network (DQN) draws a lot of attention from reinforcement learning researchers. One of the most important components of DQN is target network, which is used to stabilize learning process. When confront complex network structure, the existence of target network means extra memory resource to preserve the neural network weights and high computing cost to calculate target. Thus, we propose a Deep Hybrid Q-learning Network (DHQN) algorithm, which introduces an alternative approach, Random Hybrid Optimization (RHO), that can simplify DQN and attain a more stable and faster learning without a target network. We illustrate that RHO can decelerate divergence in the classical off-policy counterexample θ → 2θ problem. We also testify the effectiveness of DHQN in several control and Atari domains, which shows DHQN outperforms DQN without a target network and original DQN.",
"fno": "089800b474",
"keywords": [
"Deep Learning Artificial Intelligence",
"Image Processing",
"Neural Nets",
"DHQN",
"Deep Neural Network",
"Reinforcement Learning",
"Complex Network Structure",
"Neural Network Weights",
"Deep Hybrid Q Learning Network Algorithm",
"Target Network Removal",
"Random Hybrid Optimization",
"RHO",
"Atari Domain",
"Space Vehicles",
"Deep Learning",
"Q Learning",
"Neural Networks",
"Moon",
"Games",
"Power System Stability",
"Random Hybrid Optimization",
"Deep Reinforcement Learning",
"Target Network"
],
"authors": [
{
"affiliation": "Nanjing University,Nanjing,China",
"fullName": "Guang Yang",
"givenName": "Guang",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Posts and Telecommunications,Nanjing,China",
"fullName": "Yang Li",
"givenName": "Yang",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Posts and Telecommunications,Nanjing,China",
"fullName": "Di’an Fei",
"givenName": "Di’an",
"surname": "Fei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Posts and Telecommunications,Nanjing,China",
"fullName": "Tian Huang",
"givenName": "Tian",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Posts and Telecommunications,Nanjing,China",
"fullName": "Qingyun Li",
"givenName": "Qingyun",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanjing University of Posts and Telecommunications,Nanjing,China",
"fullName": "Xingguo Chen",
"givenName": "Xingguo",
"surname": "Chen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ictai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1474-1479",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-0898-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "089800b466",
"articleId": "1zw6d42xCmY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "089800b480",
"articleId": "1zw6hJOIDcs",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dsc/2018/4210/0/421001a781",
"title": "Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2018/421001a781/12OmNvkpkSa",
"parentPublication": {
"id": "proceedings/dsc/2018/4210/0",
"title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2018/7449/0/744900a006",
"title": "Historical Best Q-Networks for Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2018/744900a006/17D45WnnFUV",
"parentPublication": {
"id": "proceedings/ictai/2018/7449/0",
"title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2018/1229/0/122900a034",
"title": "Deep Recurrent Q-Network with Truncated History",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2018/122900a034/17D45WrVg2b",
"parentPublication": {
"id": "proceedings/taai/2018/1229/0",
"title": "2018 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671662",
"title": "Multi-Temporal Abstraction with Time-Aware Deep Q-Learning for Septic Shock Prevention",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671662/1A8jg6WK5ck",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/netcit/2021/0070/0/007000a162",
"title": "The USV Path Planning Based on an Improved DQN Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/netcit/2021/007000a162/1BES31rbpaU",
"parentPublication": {
"id": "proceedings/netcit/2021/0070/0",
"title": "2021 International Conference on Networking, Communications and Information Technology (NetCIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/euc/2021/0036/0/003600a125",
"title": "New Dynamic Switch Migration Technique Based on Deep Q-learning",
"doi": null,
"abstractUrl": "/proceedings-article/euc/2021/003600a125/1CalesKvPMI",
"parentPublication": {
"id": "proceedings/euc/2021/0036/0",
"title": "2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700b958",
"title": "Application of Deep Reinforcement Learning in Optimization of Traffic Signal Control",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700b958/1DND4bWIVbi",
"parentPublication": {
"id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0",
"title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2023/5719/0/10074301",
"title": "A Deep Q-Learning Connectivity-Aware Pheromone Mobility Model for Autonomous UAV Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2023/10074301/1LKwH1Xsldm",
"parentPublication": {
"id": "proceedings/icnc/2023/5719/0",
"title": "2023 International Conference on Computing, Networking and Communications (ICNC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2022/9744/0/974400b147",
"title": "Fully Parameterized Dueling Mixing Distributional Q-Leaning for Multi-Agent Cooperation",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2022/974400b147/1MrFWzEgMQ8",
"parentPublication": {
"id": "proceedings/ictai/2022/9744/0",
"title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2019/5094/0/509400a170",
"title": "Exploring Noise Deep Q Network Based on Cross-Connected",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2019/509400a170/1gjRI7DFqbC",
"parentPublication": {
"id": "proceedings/mlbdbi/2019/5094/0",
"title": "2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lgop1wsWMU",
"title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)",
"acronym": "compsac",
"groupId": "1000143",
"volume": "2",
"displayVolume": "2",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxcvh4o",
"doi": "10.1109/COMPSAC.2017.200",
"title": "Re-Structuring and Specific Similarity Computation of Electronic Medical Records",
"normalizedTitle": "Re-Structuring and Specific Similarity Computation of Electronic Medical Records",
"abstract": "Electronic medical records (EMRs) have high value for research, as they contain the patient's personal information, medical history, clinical examination, treatment process, and other information. Analysis based on EMRs can effectively assist doctors in clinical decision-making, provide data support for clinical research as well as personalized healthcare service for patients. We introduce a novel approach for EMR similarity computation by re-structuring and filtering some parts of physical examination result. Our approach is motivated by observations that it is easier to distinguish disease bias special part than bias the whole EMR which maybe contain some ineffective information. Assuming the check parts are independent, we split them and select effective parts. Then, we apply Deep NLP, converting the word to vectors which can be used to measure syntactic and semantic word similarities better. In addition, We replace traditional Euclidean distance with Word Mover's Distance(WMD), a novel distance function between text documents. Finally, KNN cluster is been used to evaluate the similarity between EMRs. Compared with traditional method such as LDA and LSI, our proposed method achieved higher recall value of disease classification problem.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Electronic medical records (EMRs) have high value for research, as they contain the patient's personal information, medical history, clinical examination, treatment process, and other information. Analysis based on EMRs can effectively assist doctors in clinical decision-making, provide data support for clinical research as well as personalized healthcare service for patients. We introduce a novel approach for EMR similarity computation by re-structuring and filtering some parts of physical examination result. Our approach is motivated by observations that it is easier to distinguish disease bias special part than bias the whole EMR which maybe contain some ineffective information. Assuming the check parts are independent, we split them and select effective parts. Then, we apply Deep NLP, converting the word to vectors which can be used to measure syntactic and semantic word similarities better. In addition, We replace traditional Euclidean distance with Word Mover's Distance(WMD), a novel distance function between text documents. Finally, KNN cluster is been used to evaluate the similarity between EMRs. Compared with traditional method such as LDA and LSI, our proposed method achieved higher recall value of disease classification problem.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Electronic medical records (EMRs) have high value for research, as they contain the patient's personal information, medical history, clinical examination, treatment process, and other information. Analysis based on EMRs can effectively assist doctors in clinical decision-making, provide data support for clinical research as well as personalized healthcare service for patients. We introduce a novel approach for EMR similarity computation by re-structuring and filtering some parts of physical examination result. Our approach is motivated by observations that it is easier to distinguish disease bias special part than bias the whole EMR which maybe contain some ineffective information. Assuming the check parts are independent, we split them and select effective parts. Then, we apply Deep NLP, converting the word to vectors which can be used to measure syntactic and semantic word similarities better. In addition, We replace traditional Euclidean distance with Word Mover's Distance(WMD), a novel distance function between text documents. Finally, KNN cluster is been used to evaluate the similarity between EMRs. Compared with traditional method such as LDA and LSI, our proposed method achieved higher recall value of disease classification problem.",
"fno": "0367b230",
"keywords": [
"Electronic Medical Records",
"Hospitals",
"Medical Diagnostic Imaging",
"Computational Modeling",
"Data Warehouses",
"History",
"Electronic Medical Records",
"Similarity Computation",
"Disease Classification",
"Word 2 Vec",
"Word Movers Distance"
],
"authors": [
{
"affiliation": null,
"fullName": "Yunxuan Zhang",
"givenName": "Yunxuan",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ziping He",
"givenName": "Ziping",
"surname": "He",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ji-Jiang Yang",
"givenName": "Ji-Jiang",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qing Wang",
"givenName": "Qing",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianqiang Li",
"givenName": "Jianqiang",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-07-01T00:00:00",
"pubType": "proceedings",
"pages": "230-235",
"year": "2017",
"issn": "0730-3157",
"isbn": "978-1-5386-0367-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "0367b215",
"articleId": "12OmNzBOi8S",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "0367b236",
"articleId": "12OmNxcdG2I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2014/5669/0/06999214",
"title": "A visual analysis approach to cohort study of electronic patient records",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2014/06999214/12OmNBBQZoW",
"parentPublication": {
"id": "proceedings/bibm/2014/5669/0",
"title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2013/1309/0/06732696",
"title": "An ontology-based approach for text mining of stroke electronic medical records",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2013/06732696/12OmNvCzFe6",
"parentPublication": {
"id": "proceedings/bibm/2013/1309/0",
"title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2011/9618/0/05718538",
"title": "An Ontology-Based Electronic Medical Record for Chronic Disease Management",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2011/05718538/12OmNvjgWWA",
"parentPublication": {
"id": "proceedings/hicss/2011/9618/0",
"title": "2011 44th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2008/1836/0/04497611",
"title": "Ontology-Aware Search on XML-based Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2008/04497611/12OmNy5zskH",
"parentPublication": {
"id": "proceedings/icde/2008/1836/0",
"title": "2008 IEEE 24th International Conference on Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2012/4736/0/4736a567",
"title": "Privacy-Preserving Data Publishing for Free Text Chinese Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2012/4736a567/12OmNypIYCO",
"parentPublication": {
"id": "proceedings/compsac/2012/4736/0",
"title": "2012 IEEE 36th Annual Computer Software and Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2013/4892/0/4892c585",
"title": "Towards a New Design Paradigm for Complex Electronic Medical Record Systems: Intuitive User Interfaces",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892c585/12OmNzw8jeT",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itme/2018/7744/0/774400a009",
"title": "A Feature-Enhanced Entity Recognition Method for Chinese Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/itme/2018/774400a009/17D45WnnFWL",
"parentPublication": {
"id": "proceedings/itme/2018/7744/0",
"title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2020/9724/0/972400a340",
"title": "Preparing legal electronic medical record case: A process analysis and improvement plan",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2020/972400a340/1pq9W8S5wyc",
"parentPublication": {
"id": "proceedings/dcabes/2020/9724/0",
"title": "2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313594",
"title": "ClinicNet: Clinical Practice Oriented Medical Representation Learning for Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313594/1qmfWcsZUjK",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2021/1685/0/168500a260",
"title": "Knowledge Graph Building from Real-world Multisource “Dirty” Clinical Electronic Medical Records for Intelligent Consultation Applications",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2021/168500a260/1ymJfo1ucH6",
"parentPublication": {
"id": "proceedings/icdh/2021/1685/0",
"title": "2021 IEEE International Conference on Digital Health (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAXxWQv",
"title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzmLxMP",
"doi": "10.1109/BIBM.2016.7822561",
"title": "Identifying patterns of associated-conditions through topic models of Electronic Medical Records",
"normalizedTitle": "Identifying patterns of associated-conditions through topic models of Electronic Medical Records",
"abstract": "Multiple adverse health conditions co-occurring in a patient are typically associated with poor prognosis and increased office or hospital visits. Developing methods to identify patterns of co-occurring conditions can assist in diagnosis. Thus, identifying patterns of association among co-occurring conditions is of growing interest. In this paper, we report preliminary results from a data-driven study, in which we apply a machine learning method, namely, topic modeling, to Electronic Medical Records (EMRs), aiming to identify patterns of associated conditions. Specifically, we use the well-established Latent Dirichlet Allocation (LDA), a method based on the idea that documents can be modeled as a mixture of latent topics, where each topic is a distribution over words. In our study, we adapt the LDA model to identify latent topics in patients' EMRs. We evaluate the performance of our method both qualitatively and quantitatively, and show that the obtained topics indeed align well with distinct medical phenomena characterized by co-occurring conditions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Multiple adverse health conditions co-occurring in a patient are typically associated with poor prognosis and increased office or hospital visits. Developing methods to identify patterns of co-occurring conditions can assist in diagnosis. Thus, identifying patterns of association among co-occurring conditions is of growing interest. In this paper, we report preliminary results from a data-driven study, in which we apply a machine learning method, namely, topic modeling, to Electronic Medical Records (EMRs), aiming to identify patterns of associated conditions. Specifically, we use the well-established Latent Dirichlet Allocation (LDA), a method based on the idea that documents can be modeled as a mixture of latent topics, where each topic is a distribution over words. In our study, we adapt the LDA model to identify latent topics in patients' EMRs. We evaluate the performance of our method both qualitatively and quantitatively, and show that the obtained topics indeed align well with distinct medical phenomena characterized by co-occurring conditions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Multiple adverse health conditions co-occurring in a patient are typically associated with poor prognosis and increased office or hospital visits. Developing methods to identify patterns of co-occurring conditions can assist in diagnosis. Thus, identifying patterns of association among co-occurring conditions is of growing interest. In this paper, we report preliminary results from a data-driven study, in which we apply a machine learning method, namely, topic modeling, to Electronic Medical Records (EMRs), aiming to identify patterns of associated conditions. Specifically, we use the well-established Latent Dirichlet Allocation (LDA), a method based on the idea that documents can be modeled as a mixture of latent topics, where each topic is a distribution over words. In our study, we adapt the LDA model to identify latent topics in patients' EMRs. We evaluate the performance of our method both qualitatively and quantitatively, and show that the obtained topics indeed align well with distinct medical phenomena characterized by co-occurring conditions.",
"fno": "07822561",
"keywords": [
"Vocabulary",
"Medical Diagnostic Imaging",
"Biological System Modeling",
"Medical Services",
"Probability Distribution",
"Electronic Medical Records",
"Resource Management",
"Co Occuring Conditions",
"Electronic Medical Records",
"Electronic Health Records",
"Topic Models",
"Latent Dirichlet Allocation",
"Jensen Shannon Divergence"
],
"authors": [
{
"affiliation": "Computational Biomedicine Lab, Computer and Information Sciences, University of Delaware, Newark, USA",
"fullName": "Moumita Bhattacharya",
"givenName": "Moumita",
"surname": "Bhattacharya",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Value Institute, Christiana Care Health System, Newark, DE, USA",
"fullName": "Claudine Jurkovitz",
"givenName": "Claudine",
"surname": "Jurkovitz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computational Biomedicine Lab, Computer and Information Sciences, University of Delaware, Newark, USA",
"fullName": "Hagit Shatkay",
"givenName": "Hagit",
"surname": "Shatkay",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-12-01T00:00:00",
"pubType": "proceedings",
"pages": "466-469",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-1611-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07822560",
"articleId": "12OmNzsJ7uJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07822562",
"articleId": "12OmNvTTccM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ichi/2015/9548/0/9548a243",
"title": "Simultaneous Prognosis and Exploratory Analysis of Multiple Chronic Conditions Using Clinical Notes",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2015/9548a243/12OmNBSSVrE",
"parentPublication": {
"id": "proceedings/ichi/2015/9548/0",
"title": "2015 International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2018/5377/0/537701a368",
"title": "Comparing Sex-Specific Association Networks of Chronic Medical Conditions",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2018/537701a368/12OmNwpGgJS",
"parentPublication": {
"id": "proceedings/ichi/2018/5377/0",
"title": "2018 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2017/0367/2/0367b230",
"title": "Re-Structuring and Specific Similarity Computation of Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2017/0367b230/12OmNxcvh4o",
"parentPublication": {
"id": "compsac/2017/0367/2",
"title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vahc/2017/3187/0/08387501",
"title": "A timeline-based framework for aggregating and summarizing electronic health records",
"doi": null,
"abstractUrl": "/proceedings-article/vahc/2017/08387501/12OmNyYDDIU",
"parentPublication": {
"id": "proceedings/vahc/2017/3187/0",
"title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2011/9618/0/05718496",
"title": "A Patient Profile Ontology in the Heterogeneous Domain of Complex and Chronic Health Conditions",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2011/05718496/12OmNzdoMGJ",
"parentPublication": {
"id": "proceedings/hicss/2011/9618/0",
"title": "2011 44th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2014/03/mex2014030014",
"title": "Time-to-Event Predictive Modeling for Chronic Conditions Using Electronic Health Records",
"doi": null,
"abstractUrl": "/magazine/ex/2014/03/mex2014030014/13rRUwj7crk",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmlde/2018/0404/0/040400a056",
"title": "Using Electronic Health Records and Machine Learning to Make Medical-Related Predictions from Non-Medical Data",
"doi": null,
"abstractUrl": "/proceedings-article/icmlde/2018/040400a056/17D45VsBU4Q",
"parentPublication": {
"id": "proceedings/icmlde/2018/0404/0",
"title": "2018 International Conference on Machine Learning and Data Engineering (iCMLDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itme/2018/7744/0/774400a009",
"title": "A Feature-Enhanced Entity Recognition Method for Chinese Electronic Medical Records",
"doi": null,
"abstractUrl": "/proceedings-article/itme/2018/774400a009/17D45WnnFWL",
"parentPublication": {
"id": "proceedings/itme/2018/7744/0",
"title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2020/9724/0/972400a340",
"title": "Preparing legal electronic medical record case: A process analysis and improvement plan",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2020/972400a340/1pq9W8S5wyc",
"parentPublication": {
"id": "proceedings/dcabes/2020/9724/0",
"title": "2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2021/1685/0/168500a260",
"title": "Knowledge Graph Building from Real-world Multisource “Dirty” Clinical Electronic Medical Records for Intelligent Consultation Applications",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2021/168500a260/1ymJfo1ucH6",
"parentPublication": {
"id": "proceedings/icdh/2021/1685/0",
"title": "2021 IEEE International Conference on Digital Health (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirC",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"acronym": "vast",
"groupId": "1001630",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45XwUAIq",
"doi": "10.1109/VAST.2017.8585721",
"title": "Understanding Hidden Memories of Recurrent Neural Networks",
"normalizedTitle": "Understanding Hidden Memories of Recurrent Neural Networks",
"abstract": "Recurrent neural networks (RNNs) have been successfully applied to various natural language processing (NLP) tasks and achieved better results than conventional methods. However, the lack of understanding of the mechanisms behind their effectiveness limits further improvements on their architectures. In this paper, we present a visual analytics method for understanding and comparing RNN models for NLP tasks. We propose a technique to explain the function of individual hidden state units based on their expected response to input texts. We then co-cluster hidden state units and words based on the expected response and visualize co-clustering results as memory chips and word clouds to provide more structured knowledge on RNNs' hidden states. We also propose a glyph-based sequence visualization based on aggregate information to analyze the behavior of an RNN's hidden state at the sentence-level. The usability and effectiveness of our method are demonstrated through case studies and reviews from domain experts.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recurrent neural networks (RNNs) have been successfully applied to various natural language processing (NLP) tasks and achieved better results than conventional methods. However, the lack of understanding of the mechanisms behind their effectiveness limits further improvements on their architectures. In this paper, we present a visual analytics method for understanding and comparing RNN models for NLP tasks. We propose a technique to explain the function of individual hidden state units based on their expected response to input texts. We then co-cluster hidden state units and words based on the expected response and visualize co-clustering results as memory chips and word clouds to provide more structured knowledge on RNNs' hidden states. We also propose a glyph-based sequence visualization based on aggregate information to analyze the behavior of an RNN's hidden state at the sentence-level. The usability and effectiveness of our method are demonstrated through case studies and reviews from domain experts.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recurrent neural networks (RNNs) have been successfully applied to various natural language processing (NLP) tasks and achieved better results than conventional methods. However, the lack of understanding of the mechanisms behind their effectiveness limits further improvements on their architectures. In this paper, we present a visual analytics method for understanding and comparing RNN models for NLP tasks. We propose a technique to explain the function of individual hidden state units based on their expected response to input texts. We then co-cluster hidden state units and words based on the expected response and visualize co-clustering results as memory chips and word clouds to provide more structured knowledge on RNNs' hidden states. We also propose a glyph-based sequence visualization based on aggregate information to analyze the behavior of an RNN's hidden state at the sentence-level. The usability and effectiveness of our method are demonstrated through case studies and reviews from domain experts.",
"fno": "08585721",
"keywords": [
"Data Visualisation",
"Learning Artificial Intelligence",
"Natural Language Processing",
"Pattern Clustering",
"Recurrent Neural Nets",
"Co Cluster Hidden State Units",
"Memory Chips",
"Glyph Based Sequence Visualization",
"Recurrent Neural Networks",
"Natural Language Processing Tasks",
"Visual Analytics Method",
"NLP Tasks",
"Individual Hidden State Units",
"RNN Models",
"Conventional Methods",
"Word Clouds",
"Recurrent Neural Networks",
"Analytical Models",
"Computer Architecture",
"Visual Analytics",
"Task Analysis",
"Machine Learning",
"Recurrent Neural Networks",
"Visual Analytics",
"Understanding Neural Model",
"Co Clustering"
],
"authors": [
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Yao Ming",
"givenName": "Yao",
"surname": "Ming",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Shaozu Cao",
"givenName": "Shaozu",
"surname": "Cao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Ruixiang Zhang",
"givenName": "Ruixiang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Zhen Li",
"givenName": "Zhen",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Yuanzhe Chen",
"givenName": "Yuanzhe",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Yangqiu Song",
"givenName": "Yangqiu",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Huamin Qu",
"givenName": "Huamin",
"surname": "Qu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vast",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-10-01T00:00:00",
"pubType": "proceedings",
"pages": "13-24",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-3163-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08585613",
"articleId": "17D45VTRowo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08585658",
"articleId": "17D45X2fUHt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ijcnn/2000/0619/2/06192271",
"title": "Refining Hidden Markov Models with Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ijcnn/2000/06192271/12OmNBQkx5N",
"parentPublication": {
"id": "proceedings/ijcnn/2000/0619/2",
"title": "Neural Networks, IEEE - INNS - ENNS International Joint Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2017/0733/0/0733a203",
"title": "RGB-D Scene Labeling with Multimodal Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2017/0733a203/12OmNx9FhTz",
"parentPublication": {
"id": "proceedings/cvprw/2017/0733/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851d620",
"title": "DAG-Recurrent Neural Networks for Scene Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851d620/12OmNylKAKw",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440842",
"title": "RetainVis: Visual Analytics with Interpretable and Interactive Recurrent Neural Networks on Electronic Medical Records",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440842/17D45XDIXWa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b816",
"title": "Scene Parsing Via Dense Recurrent Neural Networks With Attentional Selection",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b816/18j8K2p6JI4",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tase/2019/3342/0/334200a107",
"title": "Using Recurrent Neural Network to Predict Tactics for Proving Component Connector Properties in Coq",
"doi": null,
"abstractUrl": "/proceedings-article/tase/2019/334200a107/1fpNBUbY7dK",
"parentPublication": {
"id": "proceedings/tase/2019/3342/0",
"title": "2019 International Symposium on Theoretical Aspects of Software Engineering (TASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006257",
"title": "Restricted Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006257/1hJrPnExSCs",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2020/5697/0/09086238",
"title": "Visual Interpretation of Recurrent Neural Network on Multi-dimensional Time-series Forecast",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2020/09086238/1kuHkB4vMFG",
"parentPublication": {
"id": "proceedings/pacificvis/2020/5697/0",
"title": "2020 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/12/09420254",
"title": "Visual Analytics for RNN-Based Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900p5144",
"title": "Time Adaptive Recurrent Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900p5144/1yeJrFtyPq8",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1A9VchbY4Mw",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1A9VezpR2uI",
"doi": "10.1109/BIBM52615.2021.9669603",
"title": "Automatic detection of infectious diarrhea based on electronic medical records",
"normalizedTitle": "Automatic detection of infectious diarrhea based on electronic medical records",
"abstract": "In the prevention and control of infectious diseases, it is an ongoing challenge to locate risk groups as soon as possible and provide timely and reliable diagnoses to suspected patients. At present, the automatic diagnosis of infectious diseases based on Electronic Medical Records (EMRs) is still very limited, and most statistical models focus on predicting the epidemic trend of infectious diseases, ignoring the diagnosis and treatment of patients’ own diseases. In order to explore more effective infectious disease identification strategies, we have designed a complete set of automatic detection procedures for infectious diseases based on electronic medical records. Taking infectious diarrhea as an example, our model is able to give the diagnosis results of patients based on the rich symptom information in the EMRs in a timely and efficient manner. Results show that our proposed pipeline has achieved good performance in the automatic detection of infectious diarrhea, which can well assist doctors in infection identification and positioning of high-risk groups.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the prevention and control of infectious diseases, it is an ongoing challenge to locate risk groups as soon as possible and provide timely and reliable diagnoses to suspected patients. At present, the automatic diagnosis of infectious diseases based on Electronic Medical Records (EMRs) is still very limited, and most statistical models focus on predicting the epidemic trend of infectious diseases, ignoring the diagnosis and treatment of patients’ own diseases. In order to explore more effective infectious disease identification strategies, we have designed a complete set of automatic detection procedures for infectious diseases based on electronic medical records. Taking infectious diarrhea as an example, our model is able to give the diagnosis results of patients based on the rich symptom information in the EMRs in a timely and efficient manner. Results show that our proposed pipeline has achieved good performance in the automatic detection of infectious diarrhea, which can well assist doctors in infection identification and positioning of high-risk groups.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the prevention and control of infectious diseases, it is an ongoing challenge to locate risk groups as soon as possible and provide timely and reliable diagnoses to suspected patients. At present, the automatic diagnosis of infectious diseases based on Electronic Medical Records (EMRs) is still very limited, and most statistical models focus on predicting the epidemic trend of infectious diseases, ignoring the diagnosis and treatment of patients’ own diseases. In order to explore more effective infectious disease identification strategies, we have designed a complete set of automatic detection procedures for infectious diseases based on electronic medical records. Taking infectious diarrhea as an example, our model is able to give the diagnosis results of patients based on the rich symptom information in the EMRs in a timely and efficient manner. Results show that our proposed pipeline has achieved good performance in the automatic detection of infectious diarrhea, which can well assist doctors in infection identification and positioning of high-risk groups.",
"fno": "09669603",
"keywords": [
"Diseases",
"Electronic Health Records",
"Epidemics",
"Health Care",
"Medical Diagnostic Computing",
"Patient Diagnosis",
"Infectious Diseases",
"Automatic Diagnosis",
"Electronic Medical Records",
"Patients Diagnosis",
"Automatic Detection",
"Infectious Diarrhea",
"Epidemic Trend",
"Symptom Information",
"EMR",
"Sensitivity",
"Infectious Diseases",
"Pipelines",
"Medical Services",
"Predictive Models",
"Feature Extraction",
"Reliability",
"Electronic Medical Records",
"Infectious Diarrhea",
"Machine Learning",
"Automatic Disease Detection"
],
"authors": [
{
"affiliation": "Fudan University,School of Data Science,Shanghai,China",
"fullName": "Limin Zhao",
"givenName": "Limin",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TIANDAO FINTECH Company Limited,Zhejiang,China",
"fullName": "Xiang Li",
"givenName": "Xiang",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Municipal Center for Disease Control and Prevention,Shanghai,China",
"fullName": "Hao Pan",
"givenName": "Hao",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fudan University Research Institute of Intelligent and Complex Systems, Fudan University,School of Data Science,Shanghai,China",
"fullName": "Zhongyu Wei",
"givenName": "Zhongyu",
"surname": "Wei",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1927-1932",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-0126-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09669639",
"articleId": "1A9VPw6t80E",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09669519",
"articleId": "1A9VxbmFadW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2014/5669/0/06999373",
"title": "Comparative study among three different artificial neural networks to infectious diarrhea forecasting",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2014/06999373/12OmNsdo6sp",
"parentPublication": {
"id": "proceedings/bibm/2014/5669/0",
"title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/biomedcom/2012/4938/0/4938a028",
"title": "Emerging Infectious Disease: A Computational Multi-agent Model",
"doi": null,
"abstractUrl": "/proceedings-article/biomedcom/2012/4938a028/12OmNvBIROF",
"parentPublication": {
"id": "proceedings/biomedcom/2012/4938/0",
"title": "ASE/IEEE International Conference on BioMedical Computing (BioMedCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse-euc/2016/3593/0/07982318",
"title": "Infectious Disease Management Systems in the Gulf Region: The Current Status and Potential Impact",
"doi": null,
"abstractUrl": "/proceedings-article/cse-euc/2016/07982318/17D45XeKgnC",
"parentPublication": {
"id": "proceedings/cse-euc/2016/3593/0",
"title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi/2019/6934/0/08909649",
"title": "Sentinel Nodes Identification for Infectious Disease Surveillance on Temporal Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/wi/2019/08909649/1febnBdA3M4",
"parentPublication": {
"id": "proceedings/wi/2019/6934/0",
"title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2020/9724/0/972400a336",
"title": "Prevention and Control of Emerging Infectious Diseases in Human Populations",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2020/972400a336/1pq9YRuFAgo",
"parentPublication": {
"id": "proceedings/dcabes/2020/9724/0",
"title": "2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pmis/2021/3872/0/387200a396",
"title": "Research on Early Warning Index System of Infectious Diseases",
"doi": null,
"abstractUrl": "/proceedings-article/pmis/2021/387200a396/1t2n3xKlDgI",
"parentPublication": {
"id": "proceedings/pmis/2021/3872/0",
"title": "2021 International Conference on Public Management and Intelligent Society (PMIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900b364",
"title": "The impact of social and economic development on the spread of infectious respiratory diseases, push or constrain? Empirical research from China based on machine learning methods",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900b364/1t7mXHtJQyI",
"parentPublication": {
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0",
"title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/clei/2020/1560/0/156000a010",
"title": "A network-based analysis of medical information extracted from electronic medical records",
"doi": null,
"abstractUrl": "/proceedings-article/clei/2020/156000a010/1uOu3qzclqg",
"parentPublication": {
"id": "proceedings/clei/2020/1560/0",
"title": "2020 XLVI Latin American Computing Conference (CLEI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisce/2020/6406/0/640600a323",
"title": "Analysis of the relationship between intestinal infectious diseases and socioeconomic factors based on machine learning model",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2020/640600a323/1x3kDeDMNOM",
"parentPublication": {
"id": "proceedings/icisce/2020/6406/0",
"title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2021/0132/0/013200a519",
"title": "Accurate COVID-19 Health Outcome Prediction and Risk Factors Identification through an Innovative Machine Learning Framework Using Longitudinal Electronic Health Records",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2021/013200a519/1xIOSevwFry",
"parentPublication": {
"id": "proceedings/ichi/2021/0132/0",
"title": "2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1kmoNreKiTm",
"title": "2020 IEEE Pacific Visualization Symposium (PacificVis)",
"acronym": "pacificvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1kuHkB4vMFG",
"doi": "10.1109/PacificVis48177.2020.2785",
"title": "Visual Interpretation of Recurrent Neural Network on Multi-dimensional Time-series Forecast",
"normalizedTitle": "Visual Interpretation of Recurrent Neural Network on Multi-dimensional Time-series Forecast",
"abstract": "Recent attempts at utilizing visual analytics to interpret Recurrent Neural Networks (RNNs) mainly focus on natural language processing (NLP) tasks that take symbolic sequences as input. However, many real-world problems like environment pollution forecasting apply RNNs on sequences of multi-dimensional data where each dimension represents an individual feature with semantic meaning such as PM<inf>2.5</inf> and SO<inf>2</inf>. RNN interpretation on multi-dimensional sequences is challenging as users need to analyze what features are important at different time steps to better understand model behavior and gain trust in prediction. This requires effective and scalable visualization methods to reveal the complex many-to-many relations between hidden units and features. In this work, we propose a visual analytics system to interpret RNNs on multi-dimensional time-series forecasts. Specifically, to provide an overview to reveal the model mechanism, we propose a technique to estimate the hidden unit response by measuring how different feature selections affect the hidden unit output distribution. We then cluster the hidden units and features based on the response embedding vectors. Finally, we propose a visual analytics system which allows users to visually explore the model behavior from the global and individual levels. We demonstrate the effectiveness of our approach with case studies using air pollutant forecast applications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recent attempts at utilizing visual analytics to interpret Recurrent Neural Networks (RNNs) mainly focus on natural language processing (NLP) tasks that take symbolic sequences as input. However, many real-world problems like environment pollution forecasting apply RNNs on sequences of multi-dimensional data where each dimension represents an individual feature with semantic meaning such as PM<inf>2.5</inf> and SO<inf>2</inf>. RNN interpretation on multi-dimensional sequences is challenging as users need to analyze what features are important at different time steps to better understand model behavior and gain trust in prediction. This requires effective and scalable visualization methods to reveal the complex many-to-many relations between hidden units and features. In this work, we propose a visual analytics system to interpret RNNs on multi-dimensional time-series forecasts. Specifically, to provide an overview to reveal the model mechanism, we propose a technique to estimate the hidden unit response by measuring how different feature selections affect the hidden unit output distribution. We then cluster the hidden units and features based on the response embedding vectors. Finally, we propose a visual analytics system which allows users to visually explore the model behavior from the global and individual levels. We demonstrate the effectiveness of our approach with case studies using air pollutant forecast applications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recent attempts at utilizing visual analytics to interpret Recurrent Neural Networks (RNNs) mainly focus on natural language processing (NLP) tasks that take symbolic sequences as input. However, many real-world problems like environment pollution forecasting apply RNNs on sequences of multi-dimensional data where each dimension represents an individual feature with semantic meaning such as PM2.5 and SO2. RNN interpretation on multi-dimensional sequences is challenging as users need to analyze what features are important at different time steps to better understand model behavior and gain trust in prediction. This requires effective and scalable visualization methods to reveal the complex many-to-many relations between hidden units and features. In this work, we propose a visual analytics system to interpret RNNs on multi-dimensional time-series forecasts. Specifically, to provide an overview to reveal the model mechanism, we propose a technique to estimate the hidden unit response by measuring how different feature selections affect the hidden unit output distribution. We then cluster the hidden units and features based on the response embedding vectors. Finally, we propose a visual analytics system which allows users to visually explore the model behavior from the global and individual levels. We demonstrate the effectiveness of our approach with case studies using air pollutant forecast applications.",
"fno": "09086238",
"keywords": [
"Air Pollution",
"Data Analysis",
"Data Visualisation",
"Environmental Science Computing",
"Feature Selection",
"Natural Language Processing",
"Recurrent Neural Nets",
"Time Series",
"Hidden Unit Response",
"Hidden Unit Output Distribution",
"Visual Analytics System",
"Model Behavior",
"Air Pollutant Forecast Applications",
"Visual Interpretation",
"Recurrent Neural Network",
"Multidimensional Time Series Forecast",
"RN Ns",
"Natural Language Processing Tasks",
"Symbolic Sequences",
"Environment Pollution Forecasting",
"Multidimensional Sequences",
"Feature Selections",
"Analytical Models",
"Recurrent Neural Networks",
"Measurement Units",
"Visual Analytics",
"Semantics",
"Predictive Models",
"Natural Language Processing",
"Interpretable Machine Learning",
"Recurrent Neural Networks",
"Multi Dimensional Time Series",
"Air Pollutant Forecast"
],
"authors": [
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Qiaomu Shen",
"givenName": "Qiaomu",
"surname": "Shen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Visa Research",
"fullName": "Yanhong Wu",
"givenName": "Yanhong",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Yuzhe Jiang",
"givenName": "Yuzhe",
"surname": "Jiang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shenzhen Institutes of Advanced Technology",
"fullName": "Wei Zeng",
"givenName": "Wei",
"surname": "Zeng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Alexis K H LAU",
"givenName": "Alexis K H",
"surname": "LAU",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Delft University of Technology",
"fullName": "Anna Vianova",
"givenName": "Anna",
"surname": "Vianova",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hong Kong University of Science and Technology",
"fullName": "Huamin Qu",
"givenName": "Huamin",
"surname": "Qu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pacificvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "61-70",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-5697-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09086289",
"articleId": "1kuHnRNNrqw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09086293",
"articleId": "1kuHkNHF4xG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ichi/2016/6117/0/6117a093",
"title": "Predicting Clinical Events by Combining Static and Dynamic Information Using Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2016/6117a093/12OmNBBhN70",
"parentPublication": {
"id": "proceedings/ichi/2016/6117/0",
"title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981034",
"title": "Dropout Improves Recurrent Neural Networks for Handwriting Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981034/12OmNvAAtK8",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seaa/2018/7383/0/738300a268",
"title": "Considering Non-sequential Control Flows for Process Prediction with Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/seaa/2018/738300a268/17D45VsBU4A",
"parentPublication": {
"id": "proceedings/seaa/2018/7383/0",
"title": "2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440842",
"title": "RetainVis: Visual Analytics with Interpretable and Interactive Recurrent Neural Networks on Electronic Medical Records",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440842/17D45XDIXWa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2017/3163/0/08585721",
"title": "Understanding Hidden Memories of Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2017/08585721/17D45XwUAIq",
"parentPublication": {
"id": "proceedings/vast/2017/3163/0",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbase/2021/2709/0/270900a038",
"title": "Recurrent Neural Networks algorithms and applications",
"doi": null,
"abstractUrl": "/proceedings-article/icbase/2021/270900a038/1AH8m0sJTq0",
"parentPublication": {
"id": "proceedings/icbase/2021/2709/0",
"title": "2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09705076",
"title": "<italic>GNNLens</italic>: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09705076/1AIIbJW1goU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2021/2398/0/239800b078",
"title": "Recurrent Neural Networks Meet Context-Free Grammar: Two Birds with One Stone",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2021/239800b078/1AqxbgoUhbi",
"parentPublication": {
"id": "proceedings/icdm/2021/2398/0",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006257",
"title": "Restricted Recurrent Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006257/1hJrPnExSCs",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/12/09420254",
"title": "Visual Analytics for RNN-Based Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1rSR7vfukX6",
"title": "2020 24th International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1rSRdimCgJG",
"doi": "10.1109/IV51561.2020.00073",
"title": "Big Data Visualization and Visual Analytics of COVID-19 Data",
"normalizedTitle": "Big Data Visualization and Visual Analytics of COVID-19 Data",
"abstract": "In the current era of big data, a huge amount of data has been generated and collected from a wide variety of rich data sources. Embedded in these big data are useful information and valuable knowledge. An example is healthcare and epidemiological data such as data related to patients who suffered from epidemic diseases like the coronavirus disease 2019 (COVID-19). Knowledge discovered from these epidemiological data helps researchers, epidemiologists and policy makers to get a better understanding of the disease, which may inspire them to come up ways to detect, control and combat the disease. As “a picture is worth a thousand words”, having methods to visualize and visually analyze these big data makes it easily to comprehend the data and the discovered knowledge. In this paper, we present a big data visualization and visual analytics tool for visualizing and analyzing COVID-19 epidemiological data. The tool helps users to get a better understanding of information about the confirmed cases of COVID-19. Although this tool is designed for visualization and visual analytics of epidemiological data, it is applicable to visualization and visual analytics of big data from many other real-life applications and services.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the current era of big data, a huge amount of data has been generated and collected from a wide variety of rich data sources. Embedded in these big data are useful information and valuable knowledge. An example is healthcare and epidemiological data such as data related to patients who suffered from epidemic diseases like the coronavirus disease 2019 (COVID-19). Knowledge discovered from these epidemiological data helps researchers, epidemiologists and policy makers to get a better understanding of the disease, which may inspire them to come up ways to detect, control and combat the disease. As “a picture is worth a thousand words”, having methods to visualize and visually analyze these big data makes it easily to comprehend the data and the discovered knowledge. In this paper, we present a big data visualization and visual analytics tool for visualizing and analyzing COVID-19 epidemiological data. The tool helps users to get a better understanding of information about the confirmed cases of COVID-19. Although this tool is designed for visualization and visual analytics of epidemiological data, it is applicable to visualization and visual analytics of big data from many other real-life applications and services.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the current era of big data, a huge amount of data has been generated and collected from a wide variety of rich data sources. Embedded in these big data are useful information and valuable knowledge. An example is healthcare and epidemiological data such as data related to patients who suffered from epidemic diseases like the coronavirus disease 2019 (COVID-19). Knowledge discovered from these epidemiological data helps researchers, epidemiologists and policy makers to get a better understanding of the disease, which may inspire them to come up ways to detect, control and combat the disease. As “a picture is worth a thousand words”, having methods to visualize and visually analyze these big data makes it easily to comprehend the data and the discovered knowledge. In this paper, we present a big data visualization and visual analytics tool for visualizing and analyzing COVID-19 epidemiological data. The tool helps users to get a better understanding of information about the confirmed cases of COVID-19. Although this tool is designed for visualization and visual analytics of epidemiological data, it is applicable to visualization and visual analytics of big data from many other real-life applications and services.",
"fno": "913400a415",
"keywords": [
"Big Data",
"Data Analysis",
"Data Mining",
"Data Visualisation",
"Diseases",
"Epidemics",
"Visualizing Analyzing COVID 19",
"Visual Analytics Tool",
"Epidemiological Data",
"Rich Data Sources",
"COVID 19 Data",
"Big Data Visualization",
"COVID 19",
"Visual Analytics",
"Data Visualization",
"Medical Services",
"Big Data",
"Tools",
"Market Research",
"Big Data",
"Visualization",
"Visual Analytics",
"COVID 19",
"Epidemiological Data"
],
"authors": [
{
"affiliation": "University of Manitoba,Department of Computer Science,Winnipeg,Canada",
"fullName": "Carson K. Leung",
"givenName": "Carson K.",
"surname": "Leung",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Manitoba,Department of Computer Science,Winnipeg,Canada",
"fullName": "Yubo Chen",
"givenName": "Yubo",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Manitoba,Department of Computer Science,Winnipeg,Canada",
"fullName": "Calvin S.H. Hoi",
"givenName": "Calvin S.H.",
"surname": "Hoi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Manitoba,Department of Computer Science,Winnipeg,Canada",
"fullName": "Siyuan Shang",
"givenName": "Siyuan",
"surname": "Shang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Manitoba,Department of Computer Science,Winnipeg,Canada",
"fullName": "Yan Wen",
"givenName": "Yan",
"surname": "Wen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Calabria,iDEA Lab,Rende,CS,Italy",
"fullName": "Alfredo Cuzzocrea",
"givenName": "Alfredo",
"surname": "Cuzzocrea",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2020-09-01T00:00:00",
"pubType": "proceedings",
"pages": "415-420",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9134-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "913400a409",
"articleId": "1rSRd8jh960",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "913400a421",
"articleId": "1rSRd1tLD1K",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2021/1762/0/176200a372",
"title": "Smart Data Analytics on COVID-19 Data",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2021/176200a372/1AIMvf6gj3W",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2021/1762/0",
"title": "2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a985",
"title": "Analyzing COVID-19 Epidemiological Data",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a985/1BLnLffIJTa",
"parentPublication": {
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0",
"title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatase/2021/0038/0/003800a007",
"title": "Spatial-Temporal Data Science of COVID-19 Data",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatase/2021/003800a007/1BzUzE9BoPu",
"parentPublication": {
"id": "proceedings/bigdatase/2021/0038/0",
"title": "2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/datacom/2021/2071/0/207100a013",
"title": "Big Data Intelligence Solution for Health Analytics of COVID-19 Data with Spatial Hierarchy",
"doi": null,
"abstractUrl": "/proceedings-article/datacom/2021/207100a013/1C8GW3ST0hq",
"parentPublication": {
"id": "proceedings/datacom/2021/2071/0",
"title": "2021 IEEE 7th International Conference on Big Data Intelligence and Computing (DataCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927803",
"title": "OLAP over Big COVID-19 Data: A Real-Life Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927803/1J4CkbTsize",
"parentPublication": {
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0",
"title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatase/2020/1114/0/111400a014",
"title": "Big Data Science on COVID-19 Data",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatase/2020/111400a014/1r3p8qMK98s",
"parentPublication": {
"id": "proceedings/bigdatase/2020/1114/0",
"title": "2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09378407",
"title": "Machine Learning and OLAP on Big COVID-19 Data",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09378407/1s64Ppw1sB2",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900b370",
"title": "Spatial Data Science of COVID-19 Data",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900b370/1t7mY1I5glO",
"parentPublication": {
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0",
"title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a958",
"title": "Temporal Data Analytics on COVID-19 Data with Ubiquitous Computing",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a958/1ua4I0GzXiM",
"parentPublication": {
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0",
"title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2021/3827/0/382700a229",
"title": "A Visual Data Science Solution for Visualization and Visual Analytics of Big Sequential Data",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2021/382700a229/1y4oGJJ2HzW",
"parentPublication": {
"id": "proceedings/iv/2021/3827/0",
"title": "2021 25th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1xIOMBjN5EQ",
"title": "2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)",
"acronym": "ichi",
"groupId": "1803080",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1xIOMUQqhq0",
"doi": "10.1109/ICHI52183.2021.00034",
"title": "Interpretable Phenotyping for Electronic Health Records",
"normalizedTitle": "Interpretable Phenotyping for Electronic Health Records",
"abstract": "Datasets from Electronic Health Records (EHRs) are increasingly large and complex, creating challenges in their use for predictive modeling. The two major challenges are large-scale and high-dimensionality. One of the common way to address the large-scale challenge is through use of data phenotypes: clinically relevant characteristic groupings that can be expressed as logical queries (e.g., “senior patients with diabetes”). With the increasing use of machine learning across the continuum of care, phenotypes play an important role in modeling for population management, clinical trials, observational and interventional research, and quality measures. Yet, phenotype interpretation can often be difficult and require post-hoc clarifications from experienced clinicians. For example, detailed analysis may be needed to find that all patients in a a phenotype are diabetic seniors with complications from previous surgery. Moreover, the high-dimensionality problem is often addressed either separately or simultaneously with phenotyping by dimension reduction methods that may further hinder interpretability. In this paper, we introduce the notion of interpretable data phenotypes generated by an unsupervised learning technique. Methods are designed to disambiguate relative feature memberships, thus facilitating general clinical validation, and alleviating the problem of high-dimensionality. The empirical study applies the proposed unsupervised interpretable phenotyping method to a real world healthcare dataset (MIMIC), then uses hospital length of stay as a reference prediction task. The results demonstrate that the proposed method produces phenotypes with improved interpretability and without diminishing the quality of prediction results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Datasets from Electronic Health Records (EHRs) are increasingly large and complex, creating challenges in their use for predictive modeling. The two major challenges are large-scale and high-dimensionality. One of the common way to address the large-scale challenge is through use of data phenotypes: clinically relevant characteristic groupings that can be expressed as logical queries (e.g., “senior patients with diabetes”). With the increasing use of machine learning across the continuum of care, phenotypes play an important role in modeling for population management, clinical trials, observational and interventional research, and quality measures. Yet, phenotype interpretation can often be difficult and require post-hoc clarifications from experienced clinicians. For example, detailed analysis may be needed to find that all patients in a a phenotype are diabetic seniors with complications from previous surgery. Moreover, the high-dimensionality problem is often addressed either separately or simultaneously with phenotyping by dimension reduction methods that may further hinder interpretability. In this paper, we introduce the notion of interpretable data phenotypes generated by an unsupervised learning technique. Methods are designed to disambiguate relative feature memberships, thus facilitating general clinical validation, and alleviating the problem of high-dimensionality. The empirical study applies the proposed unsupervised interpretable phenotyping method to a real world healthcare dataset (MIMIC), then uses hospital length of stay as a reference prediction task. The results demonstrate that the proposed method produces phenotypes with improved interpretability and without diminishing the quality of prediction results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Datasets from Electronic Health Records (EHRs) are increasingly large and complex, creating challenges in their use for predictive modeling. The two major challenges are large-scale and high-dimensionality. One of the common way to address the large-scale challenge is through use of data phenotypes: clinically relevant characteristic groupings that can be expressed as logical queries (e.g., “senior patients with diabetes”). With the increasing use of machine learning across the continuum of care, phenotypes play an important role in modeling for population management, clinical trials, observational and interventional research, and quality measures. Yet, phenotype interpretation can often be difficult and require post-hoc clarifications from experienced clinicians. For example, detailed analysis may be needed to find that all patients in a a phenotype are diabetic seniors with complications from previous surgery. Moreover, the high-dimensionality problem is often addressed either separately or simultaneously with phenotyping by dimension reduction methods that may further hinder interpretability. In this paper, we introduce the notion of interpretable data phenotypes generated by an unsupervised learning technique. Methods are designed to disambiguate relative feature memberships, thus facilitating general clinical validation, and alleviating the problem of high-dimensionality. The empirical study applies the proposed unsupervised interpretable phenotyping method to a real world healthcare dataset (MIMIC), then uses hospital length of stay as a reference prediction task. The results demonstrate that the proposed method produces phenotypes with improved interpretability and without diminishing the quality of prediction results.",
"fno": "013200a161",
"keywords": [
"Diseases",
"Electronic Health Records",
"Geriatrics",
"Health Care",
"Hospitals",
"Medical Computing",
"Unsupervised Learning",
"Electronic Health Records",
"Predictive Modeling",
"Clinical Trials",
"Observational Research",
"Interventional Research",
"Phenotype Interpretation",
"Diabetic Seniors",
"Interpretable Data Phenotypes",
"General Clinical Validation",
"Unsupervised Interpretable Phenotyping",
"Population Management",
"EHR",
"Machine Learning",
"Unsupervised Learning",
"MIMIC",
"Healthcare Dataset",
"Hospitals",
"Sociology",
"MIMI Cs",
"Surgery",
"Predictive Models",
"Diabetes",
"Electronic Medical Records",
"EH Rs",
"High Dimensionality",
"Data Phenotyping",
"Unsupervised Learning",
"Interpretable Phenotyping"
],
"authors": [
{
"affiliation": "KenSci Inc,Seattle,WA,USA",
"fullName": "Christine Allen",
"givenName": "Christine",
"surname": "Allen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Washington,Center for Data Science, School of Engineering and Technology,Tacoma,WA,USA",
"fullName": "Juhua Hu",
"givenName": "Juhua",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "KenSci Inc,Seattle,WA,USA",
"fullName": "Vikas Kumar",
"givenName": "Vikas",
"surname": "Kumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "KenSci Inc,Seattle,WA,USA",
"fullName": "Muhammad Aurangzeb Ahmad",
"givenName": "Muhammad Aurangzeb",
"surname": "Ahmad",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Washington,Center for Data Science, School of Engineering and Technology,Tacoma,WA,USA",
"fullName": "Ankur Teredesai",
"givenName": "Ankur",
"surname": "Teredesai",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ichi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-08-01T00:00:00",
"pubType": "proceedings",
"pages": "161-170",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-0132-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "013200a153",
"articleId": "1xIOWNubm7e",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "013200a171",
"articleId": "1xIOVwAgorm",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2014/5669/0/06999230",
"title": "Health tracking framework for Hajj pilgrims using electronic health records for Hajj",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2014/06999230/12OmNAfy7K8",
"parentPublication": {
"id": "proceedings/bibm/2014/5669/0",
"title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2018/5377/0/537701a374",
"title": "Analyzing Patterns of Literature-Based Phenotyping Definitions for Text Mining Applications",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2018/537701a374/12OmNAle6QX",
"parentPublication": {
"id": "proceedings/ichi/2018/5377/0",
"title": "2018 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2017/4881/0/4881a214",
"title": "Granite: Diversified, Sparse Tensor Factorization for Electronic Health Record-Based Phenotyping",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2017/4881a214/12OmNBRsVCd",
"parentPublication": {
"id": "proceedings/ichi/2017/4881/0",
"title": "2017 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2014/4435/0/4435a267",
"title": "Electronic Health Records: A Survey of the Experiences and Expectations of Irish Dermatologists",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2014/4435a267/12OmNBhpRZ0",
"parentPublication": {
"id": "proceedings/cbms/2014/4435/0",
"title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2017/1710/0/1710a509",
"title": "Evaluating OpenEHR for Storing Computable Representations of Electronic Health Record Phenotyping Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2017/1710a509/12OmNxYtu98",
"parentPublication": {
"id": "proceedings/cbms/2017/1710/0",
"title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdcat/2016/4617/0/6005a079",
"title": "Towards Longitudinal Analysis of a Population's Electronic Health Records Using Factor Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/bdcat/2016/6005a079/12OmNzgwmMc",
"parentPublication": {
"id": "proceedings/bdcat/2016/4617/0",
"title": "2016 IEEE/ACM 3rd International Conference on Big Data Computing Applications and Technologies (BDCAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2019/01/08395074",
"title": "Natural Language Processing for EHR-Based Computational Phenotyping",
"doi": null,
"abstractUrl": "/journal/tb/2019/01/08395074/17D45X2fUFf",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2019/2286/0/228600a547",
"title": "Interpretable Patient Trajectories from Temporally Annotated Health Records",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2019/228600a547/1cdO4kedNGo",
"parentPublication": {
"id": "proceedings/cbms/2019/2286/0",
"title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2019/9138/0/08904604",
"title": "Extracting Phenotypes of Cancer Patients from Electronic Health Records",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2019/08904604/1f8NclAGCQ0",
"parentPublication": {
"id": "proceedings/ichi/2019/9138/0",
"title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2022/09/09261129",
"title": "Learning Inter-Modal Correspondence and Phenotypes From Multi-Modal Electronic Health Records",
"doi": null,
"abstractUrl": "/journal/tk/2022/09/09261129/1oNVil8ydB6",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirt",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WZZ7Du",
"doi": "10.1109/CVPR.2018.00140",
"title": "HashGAN: Deep Learning to Hash with Pair Conditional Wasserstein GAN",
"normalizedTitle": "HashGAN: Deep Learning to Hash with Pair Conditional Wasserstein GAN",
"abstract": "Deep learning to hash improves image retrieval performance by end-to-end representation learning and hash coding from training data with pairwise similarity information. Subject to the scarcity of similarity information that is often expensive to collect for many application domains, existing deep learning to hash methods may overfit the training data and result in substantial loss of retrieval quality. This paper presents HashGAN, a novel architecture for deep learning to hash, which learns compact binary hash codes from both real images and diverse images synthesized by generative models. The main idea is to augment the training data with nearly real images synthesized from a new Pair Conditional Wasserstein GAN (PC-WGAN) conditioned on the pairwise similarity information. Extensive experiments demonstrate that HashGAN can generate high-quality binary hash codes and yield state-of-the-art image retrieval performance on three benchmarks, NUS-WIDE, CIFAR-10, and MS-COCO.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Deep learning to hash improves image retrieval performance by end-to-end representation learning and hash coding from training data with pairwise similarity information. Subject to the scarcity of similarity information that is often expensive to collect for many application domains, existing deep learning to hash methods may overfit the training data and result in substantial loss of retrieval quality. This paper presents HashGAN, a novel architecture for deep learning to hash, which learns compact binary hash codes from both real images and diverse images synthesized by generative models. The main idea is to augment the training data with nearly real images synthesized from a new Pair Conditional Wasserstein GAN (PC-WGAN) conditioned on the pairwise similarity information. Extensive experiments demonstrate that HashGAN can generate high-quality binary hash codes and yield state-of-the-art image retrieval performance on three benchmarks, NUS-WIDE, CIFAR-10, and MS-COCO.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Deep learning to hash improves image retrieval performance by end-to-end representation learning and hash coding from training data with pairwise similarity information. Subject to the scarcity of similarity information that is often expensive to collect for many application domains, existing deep learning to hash methods may overfit the training data and result in substantial loss of retrieval quality. This paper presents HashGAN, a novel architecture for deep learning to hash, which learns compact binary hash codes from both real images and diverse images synthesized by generative models. The main idea is to augment the training data with nearly real images synthesized from a new Pair Conditional Wasserstein GAN (PC-WGAN) conditioned on the pairwise similarity information. Extensive experiments demonstrate that HashGAN can generate high-quality binary hash codes and yield state-of-the-art image retrieval performance on three benchmarks, NUS-WIDE, CIFAR-10, and MS-COCO.",
"fno": "642000b287",
"keywords": [
"Binary Codes",
"File Organisation",
"Image Denoising",
"Image Retrieval",
"Learning Artificial Intelligence",
"Hash GAN",
"Deep Learning",
"Pair Conditional Wasserstein GAN",
"End To End Representation Learning",
"Pairwise Similarity Information",
"Compact Binary Hash Codes",
"High Quality Binary Hash Codes",
"Image Retrieval Performance",
"Generative Models",
"Gallium Nitride",
"Generators",
"Quantization Signal",
"Training",
"Training Data",
"Generative Adversarial Networks"
],
"authors": [
{
"affiliation": null,
"fullName": "Yue Cao",
"givenName": "Yue",
"surname": "Cao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bin Liu",
"givenName": "Bin",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mingsheng Long",
"givenName": "Mingsheng",
"surname": "Long",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianmin Wang",
"givenName": "Jianmin",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1287-1296",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-6420-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "642000b277",
"articleId": "17D45Wuc33e",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "642000b297",
"articleId": "17D45W2Wyyk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2018/6420/0/642000d664",
"title": "Unsupervised Deep Generative Adversarial Hashing Network",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000d664/17D45XDIXXI",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000i183",
"title": "DeblurGAN: Blind Motion Deblurring Using Conditional Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000i183/17D45Xi9rW9",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2018/9385/0/938500a358",
"title": "Cross-Spectral Image Dehaze through a Dense Stacked Conditional GAN Based Approach",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2018/938500a358/19RSsCQrzAk",
"parentPublication": {
"id": "proceedings/sitis/2018/9385/0",
"title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300e831",
"title": "Wasserstein GAN With Quadratic Transport Cost",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300e831/1hVlJzejMaI",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300d333",
"title": "PFAGAN: An Aesthetics-Conditional GAN for Generating Photographic Fine Art",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300d333/1i5muBeiyGs",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600c371",
"title": "Face Synthesis and Recognition Using Disentangled Representation-Learning Wasserstein GAN",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600c371/1iTvl3KxDBS",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2019/5584/0/558400b021",
"title": "Abdomen MRI Synthesis Based on Conditional GAN",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2019/558400b021/1jdDW6L15Ek",
"parentPublication": {
"id": "proceedings/csci/2019/5584/0",
"title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/02/09117185",
"title": "Dynamic Facial Expression Generation on Hilbert Hypersphere With Conditional Wasserstein Generative Adversarial Nets",
"doi": null,
"abstractUrl": "/journal/tp/2022/02/09117185/1kGfN3QogZq",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800f283",
"title": "GAN Compression: Efficient Architectures for Interactive Conditional GANs",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800f283/1m3og8x4vra",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412202",
"title": "DFH-GAN: A Deep Face Hashing with Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412202/1tmjLtNfwlO",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirt",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45XacGkf",
"doi": "10.1109/CVPR.2018.00985",
"title": "ST-GAN: Spatial Transformer Generative Adversarial Networks for Image Compositing",
"normalizedTitle": "ST-GAN: Spatial Transformer Generative Adversarial Networks for Image Compositing",
"abstract": "We address the problem of finding realistic geometric corrections to a foreground object such that it appears natural when composited into a background image. To achieve this, we propose a novel Generative Adversarial Network (GAN) architecture that utilizes Spatial Transformer Networks (STNs) as the generator, which we call Spatial Transformer GANs (ST-GANs). ST-GANs seek image realism by operating in the geometric warp parameter space. In particular, we exploit an iterative STN warping scheme and propose a sequential training strategy that achieves better results compared to naive training of a single generator. One of the key advantages of ST-GAN is its applicability to high-resolution images indirectly since the predicted warp parameters are transferable between reference frames. We demonstrate our approach in two applications: (1) visualizing how indoor furniture (e.g. from product images) might be perceived in a room, (2) hallucinating how accessories like glasses would look when matched with real portraits.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We address the problem of finding realistic geometric corrections to a foreground object such that it appears natural when composited into a background image. To achieve this, we propose a novel Generative Adversarial Network (GAN) architecture that utilizes Spatial Transformer Networks (STNs) as the generator, which we call Spatial Transformer GANs (ST-GANs). ST-GANs seek image realism by operating in the geometric warp parameter space. In particular, we exploit an iterative STN warping scheme and propose a sequential training strategy that achieves better results compared to naive training of a single generator. One of the key advantages of ST-GAN is its applicability to high-resolution images indirectly since the predicted warp parameters are transferable between reference frames. We demonstrate our approach in two applications: (1) visualizing how indoor furniture (e.g. from product images) might be perceived in a room, (2) hallucinating how accessories like glasses would look when matched with real portraits.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We address the problem of finding realistic geometric corrections to a foreground object such that it appears natural when composited into a background image. To achieve this, we propose a novel Generative Adversarial Network (GAN) architecture that utilizes Spatial Transformer Networks (STNs) as the generator, which we call Spatial Transformer GANs (ST-GANs). ST-GANs seek image realism by operating in the geometric warp parameter space. In particular, we exploit an iterative STN warping scheme and propose a sequential training strategy that achieves better results compared to naive training of a single generator. One of the key advantages of ST-GAN is its applicability to high-resolution images indirectly since the predicted warp parameters are transferable between reference frames. We demonstrate our approach in two applications: (1) visualizing how indoor furniture (e.g. from product images) might be perceived in a room, (2) hallucinating how accessories like glasses would look when matched with real portraits.",
"fno": "642000j455",
"keywords": [
"Geometry",
"Image Registration",
"Image Resolution",
"Learning Artificial Intelligence",
"Object Detection",
"ST GAN",
"Spatial Transformer Generative Adversarial Networks",
"Image Compositing",
"Realistic Geometric Corrections",
"Background Image",
"Image Realism",
"Geometric Warp Parameter Space",
"Iterative STN Warping Scheme",
"Single Generator",
"High Resolution Images",
"Product Images",
"Generative Adversarial Network Architecture",
"Spatial Transformer Networks",
"Spatial Transformer GAN",
"Gallium Nitride",
"Training",
"Generators",
"Image Generation",
"Manifolds",
"Generative Adversarial Networks",
"Games"
],
"authors": [
{
"affiliation": null,
"fullName": "Chen-Hsuan Lin",
"givenName": "Chen-Hsuan",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ersin Yumer",
"givenName": "Ersin",
"surname": "Yumer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Oliver Wang",
"givenName": "Oliver",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Eli Shechtman",
"givenName": "Eli",
"surname": "Shechtman",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Simon Lucey",
"givenName": "Simon",
"surname": "Lucey",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-06-01T00:00:00",
"pubType": "proceedings",
"pages": "9455-9464",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-6420-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "642000j446",
"articleId": "17D45WrVg5a",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "642000j465",
"articleId": "17D45VsBTWS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2018/1737/0/08486440",
"title": "Densely Stacked Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486440/14jQfSnkWGs",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000f657",
"title": "DA-GAN: Instance-Level Image Translation by Deep Attention Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f657/17D45VObpNB",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545881",
"title": "MMGAN: Manifold-Matching Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440049",
"title": "GAN Lab: Understanding Complex Deep Generative Models using Interactive Visual Experimentation",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440049/17D45WUj91f",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000a821",
"title": "FaceID-GAN: Learning a Symmetry Three-Player GAN for Identity-Preserving Face Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000a821/17D45Xh13pk",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2019/1246/0/124600a866",
"title": "MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2019/124600a866/1cYhReGG1YA",
"parentPublication": {
"id": "proceedings/ipdps/2019/1246/0",
"title": "2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300h555",
"title": "Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300h555/1hQqnMgJzcQ",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300e501",
"title": "Seeing What a GAN Cannot Generate",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300e501/1hVlGKg2532",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/01/09149832",
"title": "Improving Generative Adversarial Networks With Local Coordinate Coding",
"doi": null,
"abstractUrl": "/journal/tp/2022/01/09149832/1lNXsekD4ha",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800h796",
"title": "MSG-GAN: Multi-Scale Gradients for Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800h796/1m3oneHfgTS",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cdOEoawzMQ",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cdOEExA8Vy",
"doi": "10.1109/ICME.2019.00171",
"title": "Resolving Intra-Class Imbalance for GAN-Based Image Augmentation",
"normalizedTitle": "Resolving Intra-Class Imbalance for GAN-Based Image Augmentation",
"abstract": "Advanced machine learning and deep learning techniques have increasingly improved accuracy of image classification. Most existing studies have investigated the data imbalance problem among classes to further enhance classification accuracy. However, less attention has been paid to data imbalance within every single class. In this work, we present AC-GAN (Actor-Critic Generative Adversarial Network), a data augmentation framework that explicitly considers heterogeneity of intra-class data. AC-GAN exploits a novel loss function to weigh the impacts of different subclasses of data in a class on GAN training. It hence can effectively generate fake data of both majority and minority subclasses, which help train a more accurate classifier. We use defect detection as an example application to evaluate our design. The results demonstrate that the intra-class distribution of fake data generated by our AC-GAN can be more similar to that of raw data. With balanced training for various subclasses, AC-GAN enhances classification accuracy for no matter uniformly or non-uniformly distributed intra-class data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Advanced machine learning and deep learning techniques have increasingly improved accuracy of image classification. Most existing studies have investigated the data imbalance problem among classes to further enhance classification accuracy. However, less attention has been paid to data imbalance within every single class. In this work, we present AC-GAN (Actor-Critic Generative Adversarial Network), a data augmentation framework that explicitly considers heterogeneity of intra-class data. AC-GAN exploits a novel loss function to weigh the impacts of different subclasses of data in a class on GAN training. It hence can effectively generate fake data of both majority and minority subclasses, which help train a more accurate classifier. We use defect detection as an example application to evaluate our design. The results demonstrate that the intra-class distribution of fake data generated by our AC-GAN can be more similar to that of raw data. With balanced training for various subclasses, AC-GAN enhances classification accuracy for no matter uniformly or non-uniformly distributed intra-class data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Advanced machine learning and deep learning techniques have increasingly improved accuracy of image classification. Most existing studies have investigated the data imbalance problem among classes to further enhance classification accuracy. However, less attention has been paid to data imbalance within every single class. In this work, we present AC-GAN (Actor-Critic Generative Adversarial Network), a data augmentation framework that explicitly considers heterogeneity of intra-class data. AC-GAN exploits a novel loss function to weigh the impacts of different subclasses of data in a class on GAN training. It hence can effectively generate fake data of both majority and minority subclasses, which help train a more accurate classifier. We use defect detection as an example application to evaluate our design. The results demonstrate that the intra-class distribution of fake data generated by our AC-GAN can be more similar to that of raw data. With balanced training for various subclasses, AC-GAN enhances classification accuracy for no matter uniformly or non-uniformly distributed intra-class data.",
"fno": "955200a970",
"keywords": [
"Image Classification",
"Image Colour Analysis",
"Learning Artificial Intelligence",
"Intra Class Imbalance",
"GAN Based Image Augmentation",
"Deep Learning Techniques",
"Image Classification",
"Data Imbalance Problem",
"AC GAN",
"Data Augmentation Framework",
"Intra Class Data",
"GAN Training",
"Intra Class Distribution",
"Machine Learning",
"Actor Critic Generative Adversarial Network",
"Generative Adversarial Networks",
"Gallium Nitride",
"Training",
"Generators",
"Data Models",
"Principal Component Analysis",
"Reinforcement Learning",
"Generative Adversarial Network",
"Data Imbalance",
"Image Augmentation"
],
"authors": [
{
"affiliation": "National Chiao Tung University",
"fullName": "Lijyun Huang",
"givenName": "Lijyun",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National Chiao Tung University",
"fullName": "Kate Ching-Ju Lin",
"givenName": "Kate Ching-Ju",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National Chiao Tung University",
"fullName": "Yu-Chee Tseng",
"givenName": "Yu-Chee",
"surname": "Tseng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-07-01T00:00:00",
"pubType": "proceedings",
"pages": "970-975",
"year": "2019",
"issn": null,
"isbn": "978-1-5386-9552-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "955200a964",
"articleId": "1cdOOjdSg24",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "955200a976",
"articleId": "1cdOQMV5ZHW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2018/3788/0/08545894",
"title": "Data Augmentation with Improved Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545894/17D45WKWnJc",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440049",
"title": "GAN Lab: Understanding Complex Deep Generative Models using Interactive Visual Experimentation",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440049/17D45WUj91f",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000a821",
"title": "FaceID-GAN: Learning a Symmetry Three-Player GAN for Identity-Preserving Face Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000a821/17D45Xh13pk",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b797",
"title": "Sem-GAN: Semantically-Consistent Image-to-Image Translation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b797/18j8I5ilLTq",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ic3/2019/3591/0/08844913",
"title": "Augmentation of Images through DCGANs",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2019/08844913/1dx8p29bv1e",
"parentPublication": {
"id": "proceedings/ic3/2019/3591/0",
"title": "2019 Twelfth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2019/3131/0/313100a729",
"title": "Synthesizing Diverse Lung Nodules Wherever Massively: 3D Multi-Conditional GAN-Based CT Image Augmentation for Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2019/313100a729/1ezRzUCreBa",
"parentPublication": {
"id": "proceedings/3dv/2019/3131/0",
"title": "2019 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093525",
"title": "FX-GAN: Self-Supervised GAN Learning via Feature Exchange",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093525/1jPbxvOsk6s",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2021/09/09146333",
"title": "LrGAN: A Compact and Energy Efficient PIM-Based Architecture for GAN Training",
"doi": null,
"abstractUrl": "/journal/tc/2021/09/09146333/1lFF1jOOaEU",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2020/4380/0/438000a864",
"title": "Generation of malicious webpage samples based on GAN",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2020/438000a864/1r54cGDIsw0",
"parentPublication": {
"id": "proceedings/trustcom/2020/4380/0",
"title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09411996",
"title": "IDA-GAN: A Novel Imbalanced Data Augmentation GAN",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09411996/1tmi3pPAjgA",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1h81oza1jwY",
"title": "2019 International Conference on Document Analysis and Recognition (ICDAR)",
"acronym": "icdar",
"groupId": "1000219",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1h81u6jDzSE",
"doi": "10.1109/ICDAR.2019.00037",
"title": "TH-GAN: Generative Adversarial Network Based Transfer Learning for Historical Chinese Character Recognition",
"normalizedTitle": "TH-GAN: Generative Adversarial Network Based Transfer Learning for Historical Chinese Character Recognition",
"abstract": "Historical Chinese character recognition faces problems including low image quality and lack of labeled training samples. We propose a generative adversarial network (GAN) based transfer learning method to ease these problems. The proposed TH-GAN architecture includes a discriminator and a generator. The network structure of the discriminator is based on a convolutional neural network (CNN). Inspired by Wasserstein GAN, the loss function of the discriminator aims to measure the probabilistic distribution distance of the generated images and the target images. The network structure of the generator is a CNN based encoder-decoder. The loss function of the generator aims to minimize the distribution distance between the real samples and the generated samples. In order to preserve the complex glyph structure of a historical Chinese character, a weighted mean squared error (MSE) criterion by incorporating both the edge and the skeleton information in the ground truth image is proposed as the weighted pixel loss in the generator. These loss functions are used for joint training of the discriminator and the generator. Experiments are conducted on two tasks to evaluate the performance of the proposed TH-GAN. The first task is carried out on style transfer mapping for multi-font printed traditional Chinese character samples. The second task is carried out on transfer learning for historical Chinese character samples by adding samples generated by TH-GAN. Experimental results show that the proposed TH-GAN is effective.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Historical Chinese character recognition faces problems including low image quality and lack of labeled training samples. We propose a generative adversarial network (GAN) based transfer learning method to ease these problems. The proposed TH-GAN architecture includes a discriminator and a generator. The network structure of the discriminator is based on a convolutional neural network (CNN). Inspired by Wasserstein GAN, the loss function of the discriminator aims to measure the probabilistic distribution distance of the generated images and the target images. The network structure of the generator is a CNN based encoder-decoder. The loss function of the generator aims to minimize the distribution distance between the real samples and the generated samples. In order to preserve the complex glyph structure of a historical Chinese character, a weighted mean squared error (MSE) criterion by incorporating both the edge and the skeleton information in the ground truth image is proposed as the weighted pixel loss in the generator. These loss functions are used for joint training of the discriminator and the generator. Experiments are conducted on two tasks to evaluate the performance of the proposed TH-GAN. The first task is carried out on style transfer mapping for multi-font printed traditional Chinese character samples. The second task is carried out on transfer learning for historical Chinese character samples by adding samples generated by TH-GAN. Experimental results show that the proposed TH-GAN is effective.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Historical Chinese character recognition faces problems including low image quality and lack of labeled training samples. We propose a generative adversarial network (GAN) based transfer learning method to ease these problems. The proposed TH-GAN architecture includes a discriminator and a generator. The network structure of the discriminator is based on a convolutional neural network (CNN). Inspired by Wasserstein GAN, the loss function of the discriminator aims to measure the probabilistic distribution distance of the generated images and the target images. The network structure of the generator is a CNN based encoder-decoder. The loss function of the generator aims to minimize the distribution distance between the real samples and the generated samples. In order to preserve the complex glyph structure of a historical Chinese character, a weighted mean squared error (MSE) criterion by incorporating both the edge and the skeleton information in the ground truth image is proposed as the weighted pixel loss in the generator. These loss functions are used for joint training of the discriminator and the generator. Experiments are conducted on two tasks to evaluate the performance of the proposed TH-GAN. The first task is carried out on style transfer mapping for multi-font printed traditional Chinese character samples. The second task is carried out on transfer learning for historical Chinese character samples by adding samples generated by TH-GAN. Experimental results show that the proposed TH-GAN is effective.",
"fno": "301400a178",
"keywords": [
"Convolutional Neural Nets",
"Document Image Processing",
"Feature Extraction",
"Gaussian Processes",
"Image Classification",
"Learning Artificial Intelligence",
"Mean Square Error Methods",
"Natural Language Processing",
"Optical Character Recognition",
"Statistical Distributions",
"Historical Chinese Character Recognition Faces Problems",
"Low Image Quality",
"Labeled Training Samples",
"Generative Adversarial Network Based Transfer Learning Method",
"TH GAN Architecture",
"Network Structure",
"Convolutional Neural Network",
"Wasserstein GAN",
"Loss Function",
"Probabilistic Distribution Distance",
"Target Images",
"CNN Based Encoder Decoder",
"Complex Glyph Structure",
"Weighted Mean Squared Error Criterion",
"Ground Truth Image",
"Weighted Pixel Loss",
"Style Transfer Mapping",
"Traditional Chinese Character Samples",
"Historical Chinese Character Samples",
"Generative Adversarial Networks",
"Task Analysis",
"Generators",
"Gallium Nitride",
"Training",
"Character Recognition",
"Image Synthesis",
"Generative Adversarial Network",
"Transfer Learning",
"Historical Chinese Character Recognition"
],
"authors": [
{
"affiliation": "Tsinghua University",
"fullName": "Junyang Cai",
"givenName": "Junyang",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tsinghua University",
"fullName": "Liangrui Peng",
"givenName": "Liangrui",
"surname": "Peng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tsinghua University",
"fullName": "Yejun Tang",
"givenName": "Yejun",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tsinghua University",
"fullName": "Changsong Liu",
"givenName": "Changsong",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Institute of Electronics Technology and Application",
"fullName": "Pengchao Li",
"givenName": "Pengchao",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdar",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-09-01T00:00:00",
"pubType": "proceedings",
"pages": "178-183",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-3014-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "301400a172",
"articleId": "1h81p5TQQGk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "301400a184",
"articleId": "1h81ug3onxS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2018/6420/0/642000i513",
"title": "Multi-agent Diverse Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000b498",
"title": "Duplex Generative Adversarial Network for Unsupervised Domain Adaptation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000b498/17D45WYQJ9i",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000a413",
"title": "Monocular Depth Prediction Using Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000a413/17D45XH89pp",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000a821",
"title": "FaceID-GAN: Learning a Symmetry Three-Player GAN for Identity-Preserving Face Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000a821/17D45Xh13pk",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/01/08744312",
"title": "A Framework of Composite Functional Gradient Methods for Generative Adversarial Models",
"doi": null,
"abstractUrl": "/journal/tp/2021/01/08744312/1bcHp9xXdoA",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093525",
"title": "FX-GAN: Self-Supervised GAN Learning via Feature Exchange",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093525/1jPbxvOsk6s",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800h796",
"title": "MSG-GAN: Multi-Scale Gradients for Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800h796/1m3oneHfgTS",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2020/9274/0/927400a001",
"title": "Why are Generative Adversarial Networks so Fascinating and Annoying?",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2020/927400a001/1p2VAkdrCXC",
"parentPublication": {
"id": "proceedings/sibgrapi/2020/9274/0",
"title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2020/9724/0/972400a198",
"title": "Research on GAN-based Container Code Images Generation Method",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2020/972400a198/1pq9ZoNHnxK",
"parentPublication": {
"id": "proceedings/dcabes/2020/9724/0",
"title": "2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2020/4380/0/438000a864",
"title": "Generation of malicious webpage samples based on GAN",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2020/438000a864/1r54cGDIsw0",
"parentPublication": {
"id": "proceedings/trustcom/2020/4380/0",
"title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1iTvczdcyc0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "8972688",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1iTvpf0gYfe",
"doi": "10.1109/CVPRW.2019.00086",
"title": "Weakly Supervised Object Discovery by Generative Adversarial & Ranking Networks",
"normalizedTitle": "Weakly Supervised Object Discovery by Generative Adversarial & Ranking Networks",
"abstract": "The deep generative adversarial networks (GAN) recently have been shown to be promising for different computer vision applications, like image editing, synthesizing high resolution images, generating videos, etc. These networks and the corresponding learning scheme can handle various visual space mappings. We approach GANs with a novel training method and learning objective, to discover multiple object instances for three cases: 1) synthesizing a picture of a specific object within a cluttered scene; 2) localizing different categories in images for weakly supervised object detection; and 3) improving object discovery in object detection pipelines. A crucial advantage of our method is that it learns a new deep similarity metric, to distinguish multiple objects in one image. We demonstrate that the network can act as an encoder-decoder generating parts of an image which contain an object, or as a modified deep CNN to represent images for object detection in supervised and weakly supervised scheme. Our ranking GAN offers a novel way to search through images for object specific patterns. We have conducted experiments for different scenarios and demonstrate the method performance for object synthesizing and weakly supervised object detection and classification using the MS-COCO and PASCAL VOC datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The deep generative adversarial networks (GAN) recently have been shown to be promising for different computer vision applications, like image editing, synthesizing high resolution images, generating videos, etc. These networks and the corresponding learning scheme can handle various visual space mappings. We approach GANs with a novel training method and learning objective, to discover multiple object instances for three cases: 1) synthesizing a picture of a specific object within a cluttered scene; 2) localizing different categories in images for weakly supervised object detection; and 3) improving object discovery in object detection pipelines. A crucial advantage of our method is that it learns a new deep similarity metric, to distinguish multiple objects in one image. We demonstrate that the network can act as an encoder-decoder generating parts of an image which contain an object, or as a modified deep CNN to represent images for object detection in supervised and weakly supervised scheme. Our ranking GAN offers a novel way to search through images for object specific patterns. We have conducted experiments for different scenarios and demonstrate the method performance for object synthesizing and weakly supervised object detection and classification using the MS-COCO and PASCAL VOC datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The deep generative adversarial networks (GAN) recently have been shown to be promising for different computer vision applications, like image editing, synthesizing high resolution images, generating videos, etc. These networks and the corresponding learning scheme can handle various visual space mappings. We approach GANs with a novel training method and learning objective, to discover multiple object instances for three cases: 1) synthesizing a picture of a specific object within a cluttered scene; 2) localizing different categories in images for weakly supervised object detection; and 3) improving object discovery in object detection pipelines. A crucial advantage of our method is that it learns a new deep similarity metric, to distinguish multiple objects in one image. We demonstrate that the network can act as an encoder-decoder generating parts of an image which contain an object, or as a modified deep CNN to represent images for object detection in supervised and weakly supervised scheme. Our ranking GAN offers a novel way to search through images for object specific patterns. We have conducted experiments for different scenarios and demonstrate the method performance for object synthesizing and weakly supervised object detection and classification using the MS-COCO and PASCAL VOC datasets.",
"fno": "250600a601",
"keywords": [
"Computer Vision",
"Convolutional Neural Nets",
"Image Representation",
"Learning Artificial Intelligence",
"Object Detection",
"Ranking Networks",
"Supervised Object Discovery",
"Deep Generative Adversarial Networks",
"Computer Vision Applications",
"Image Editing",
"High Resolution Images",
"Visual Space Mappings",
"Training Method",
"Learning Objective",
"Multiple Object Instances",
"Specific Object",
"Weakly Supervised Object Detection",
"Object Detection Pipelines",
"Deep Similarity Metric",
"Multiple Objects",
"Encoder Decoder Generating Parts",
"Modified Deep CNN",
"Ranking GAN",
"Object Specific Patterns",
"Object Synthesizing",
"PASCAL VOC Datasets",
"MS COCO Datasets",
"Gallium Nitride",
"Generators",
"Generative Adversarial Networks",
"Training",
"Object Detection",
"Pipelines",
"Detectors"
],
"authors": [
{
"affiliation": "ESAT-PSI, KU Leuven",
"fullName": "Ali Diba",
"givenName": "Ali",
"surname": "Diba",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CV:HCI, KIT",
"fullName": "Vivek Sharma",
"givenName": "Vivek",
"surname": "Sharma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CV:HCI, KIT",
"fullName": "Rainer Stiefelhagen",
"givenName": "Rainer",
"surname": "Stiefelhagen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CVL, ETH Zürich",
"fullName": "Luc Van Gool",
"givenName": "Luc",
"surname": "Van Gool",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-06-01T00:00:00",
"pubType": "proceedings",
"pages": "601-610",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-2506-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "250600a592",
"articleId": "1iTvq4h8JVK",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "250600a611",
"articleId": "1iTvlATV4t2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2018/1737/0/08486440",
"title": "Densely Stacked Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486440/14jQfSnkWGs",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000f764",
"title": "Generative Adversarial Learning Towards Fast Weakly Supervised Detection",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f764/17D45VObpPy",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545881",
"title": "MMGAN: Manifold-Matching Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigmm/2018/5321/0/08499105",
"title": "SegGAN: Semantic Segmentation with Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/bigmm/2018/08499105/17D45WHONn7",
"parentPublication": {
"id": "proceedings/bigmm/2018/5321/0",
"title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acpr/2017/3354/0/3354a115",
"title": "Deep Feature Similarity for Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/acpr/2017/3354a115/17D45Wuc39X",
"parentPublication": {
"id": "proceedings/acpr/2017/3354/0",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000d664",
"title": "Unsupervised Deep Generative Adversarial Hashing Network",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000d664/17D45XDIXXI",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000a413",
"title": "Monocular Depth Prediction Using Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000a413/17D45XH89pp",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000j455",
"title": "ST-GAN: Spatial Transformer Generative Adversarial Networks for Image Compositing",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000j455/17D45XacGkf",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800i204",
"title": "A U-Net Based Discriminator for Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800i204/1m3nCvUuTyU",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mipr/2020/4272/0/427200a314",
"title": "Face Aging with Conditional Generative Adversarial Network Guided by Ranking-CNN",
"doi": null,
"abstractUrl": "/proceedings-article/mipr/2020/427200a314/1mAa24QPsEU",
"parentPublication": {
"id": "proceedings/mipr/2020/4272/0",
"title": "2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1qRNrlo577W",
"title": "2020 IEEE Visualization Conference (VIS)",
"acronym": "vis",
"groupId": "1001944",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1qRNXYMwfBe",
"doi": "10.1109/VIS47514.2020.00060",
"title": "How Does Visualization Help People Learn Deep Learning? Evaluating GAN Lab with Observational Study and Log Analysis",
"normalizedTitle": "How Does Visualization Help People Learn Deep Learning? Evaluating GAN Lab with Observational Study and Log Analysis",
"abstract": "While a rapidly growing number of people want to learn artificial intelligence (AI) and deep learning, the increasing complexity of such models poses significant learning barriers. Recently, interactive visualizations, such as TensorFlow Playground and GAN Lab, have demonstrated success in lowering these barriers. However, there has been little work in evaluating these tools with human subjects. This paper presents two studies on evaluating GAN Lab, an interactive tool designed to help people learn how Generated Adversarial Networks (GANs) work. First, through an observational study, we investigate how the tool is used and what users learn from their usage. Second, we conduct a log analysis of the deployed tool to investigate how its visitors engage with GAN Lab. Based on the studies and our experience in developing and successfully deploying the tool, we provide design considerations and discuss further evaluation challenges for interactive educational tools for deep learning.",
"abstracts": [
{
"abstractType": "Regular",
"content": "While a rapidly growing number of people want to learn artificial intelligence (AI) and deep learning, the increasing complexity of such models poses significant learning barriers. Recently, interactive visualizations, such as TensorFlow Playground and GAN Lab, have demonstrated success in lowering these barriers. However, there has been little work in evaluating these tools with human subjects. This paper presents two studies on evaluating GAN Lab, an interactive tool designed to help people learn how Generated Adversarial Networks (GANs) work. First, through an observational study, we investigate how the tool is used and what users learn from their usage. Second, we conduct a log analysis of the deployed tool to investigate how its visitors engage with GAN Lab. Based on the studies and our experience in developing and successfully deploying the tool, we provide design considerations and discuss further evaluation challenges for interactive educational tools for deep learning.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "While a rapidly growing number of people want to learn artificial intelligence (AI) and deep learning, the increasing complexity of such models poses significant learning barriers. Recently, interactive visualizations, such as TensorFlow Playground and GAN Lab, have demonstrated success in lowering these barriers. However, there has been little work in evaluating these tools with human subjects. This paper presents two studies on evaluating GAN Lab, an interactive tool designed to help people learn how Generated Adversarial Networks (GANs) work. First, through an observational study, we investigate how the tool is used and what users learn from their usage. Second, we conduct a log analysis of the deployed tool to investigate how its visitors engage with GAN Lab. Based on the studies and our experience in developing and successfully deploying the tool, we provide design considerations and discuss further evaluation challenges for interactive educational tools for deep learning.",
"fno": "801400a266",
"keywords": [
"Computer Aided Instruction",
"Data Visualisation",
"Deep Learning Artificial Intelligence",
"Interactive Systems",
"Neural Nets",
"GAN Lab",
"Evaluation Challenges",
"Interactive Educational Tools",
"Deep Learning",
"Log Analysis",
"Artificial Intelligence",
"Interactive Visualizations",
"Interactive Tool",
"GA Ns",
"Generated Adversarial Networks",
"Tensor Flow Playground",
"Observational Study",
"Deep Learning",
"Visualization",
"Design Methodology",
"Learning Artificial Intelligence",
"Tools",
"Generative Adversarial Networks",
"Gallium Nitride",
"Human Centered Computing",
"Visualization",
"Visualization Design And Evaluation Methods"
],
"authors": [
{
"affiliation": "Oregon State University",
"fullName": "Minsuk Kahng",
"givenName": "Minsuk",
"surname": "Kahng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Georgia Institute of Technology",
"fullName": "Duen Horng Polo Chau",
"givenName": "Duen Horng Polo",
"surname": "Chau",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-10-01T00:00:00",
"pubType": "proceedings",
"pages": "266-270",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8014-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "801400a261",
"articleId": "1qRNPk9QQDe",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "801400a271",
"articleId": "1qRO63m88ne",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2018/6420/0/642000f657",
"title": "DA-GAN: Instance-Level Image Translation by Deep Attention Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f657/17D45VObpNB",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440049",
"title": "GAN Lab: Understanding Complex Deep Generative Models using Interactive Visual Experimentation",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440049/17D45WUj91f",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000a821",
"title": "FaceID-GAN: Learning a Symmetry Three-Player GAN for Identity-Preserving Face Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000a821/17D45Xh13pk",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2019/1246/0/124600a866",
"title": "MD-GAN: Multi-Discriminator Generative Adversarial Networks for Distributed Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2019/124600a866/1cYhReGG1YA",
"parentPublication": {
"id": "proceedings/ipdps/2019/1246/0",
"title": "2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093525",
"title": "FX-GAN: Self-Supervised GAN Learning via Feature Exchange",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093525/1jPbxvOsk6s",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2020/3079/0/307900a024",
"title": "Dual-Attention GAN for Large-Pose Face Frontalization",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2020/307900a024/1kecHPwIBLa",
"parentPublication": {
"id": "proceedings/fg/2020/3079/0/",
"title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09151060",
"title": "Triple-GAN: Progressive Face Aging with Triple Translation Loss",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09151060/1lPHg6ccqac",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/07/09339900",
"title": "Shape-Matching GAN++: Scale Controllable Dynamic Artistic Text Style Transfer",
"doi": null,
"abstractUrl": "/journal/tp/2022/07/09339900/1qL54N4119S",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2020/4380/0/438000a864",
"title": "Generation of malicious webpage samples based on GAN",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2020/438000a864/1r54cGDIsw0",
"parentPublication": {
"id": "proceedings/trustcom/2020/4380/0",
"title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2023/01/09353984",
"title": "Brain-Computer Interface for Generating Personally Attractive Images",
"doi": null,
"abstractUrl": "/journal/ta/2023/01/09353984/1r9YoKfih4A",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKiqH",
"title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)",
"acronym": "bdva",
"groupId": "1809805",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45Xtvpbq",
"doi": "10.1109/BDVA.2018.8533894",
"title": "Casual Visual Exploration of Large Bipartite Graphs Using Hierarchical Aggregation and Filtering",
"normalizedTitle": "Casual Visual Exploration of Large Bipartite Graphs Using Hierarchical Aggregation and Filtering",
"abstract": "Bipartite graphs are typically visualized using linked lists or matrices. However, these classic visualization techniques do not scale well with the number of nodes. Biclustering has been used to aggregate edges, but not to create linked lists with thousands of nodes. In this paper, we present a new casual exploration interface for large, weighted bipartite graphs, which allows for multi-scale exploration through hierarchical aggregation of nodes and edges using biclustering in linked lists. We demonstrate the usefulness of the technique using two data sets: a database of media advertising expenses of public authorities and author-keyword co-occurrences from the IEEE Visualization Publication collection. Through an insight-based study with lay users, we show that the biclustering interface leads to longer exploration times, more insights, and more unexpected findings than a baseline interface using only filtering. However, users also perceive the biclustering interface as more complex.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Bipartite graphs are typically visualized using linked lists or matrices. However, these classic visualization techniques do not scale well with the number of nodes. Biclustering has been used to aggregate edges, but not to create linked lists with thousands of nodes. In this paper, we present a new casual exploration interface for large, weighted bipartite graphs, which allows for multi-scale exploration through hierarchical aggregation of nodes and edges using biclustering in linked lists. We demonstrate the usefulness of the technique using two data sets: a database of media advertising expenses of public authorities and author-keyword co-occurrences from the IEEE Visualization Publication collection. Through an insight-based study with lay users, we show that the biclustering interface leads to longer exploration times, more insights, and more unexpected findings than a baseline interface using only filtering. However, users also perceive the biclustering interface as more complex.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Bipartite graphs are typically visualized using linked lists or matrices. However, these classic visualization techniques do not scale well with the number of nodes. Biclustering has been used to aggregate edges, but not to create linked lists with thousands of nodes. In this paper, we present a new casual exploration interface for large, weighted bipartite graphs, which allows for multi-scale exploration through hierarchical aggregation of nodes and edges using biclustering in linked lists. We demonstrate the usefulness of the technique using two data sets: a database of media advertising expenses of public authorities and author-keyword co-occurrences from the IEEE Visualization Publication collection. Through an insight-based study with lay users, we show that the biclustering interface leads to longer exploration times, more insights, and more unexpected findings than a baseline interface using only filtering. However, users also perceive the biclustering interface as more complex.",
"fno": "08533894",
"keywords": [
"Bipartite Graph",
"Data Visualization",
"Visualization",
"Clustering Algorithms",
"Partitioning Algorithms",
"Media",
"Advertising"
],
"authors": [
{
"affiliation": null,
"fullName": "Daniel Steinbock",
"givenName": "Daniel",
"surname": "Steinbock",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Eduard Groller",
"givenName": "Eduard",
"surname": "Groller",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Manuela Waldner",
"givenName": "Manuela",
"surname": "Waldner",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bdva",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-10",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-9194-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08533893",
"articleId": "17D45Wuc3a3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08533895",
"articleId": "17D45VN31ge",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipdps/2016/2140/0/2140a032",
"title": "Distributed-Memory Algorithms for Maximum Cardinality Matching in Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2016/2140a032/12OmNCyTyr5",
"parentPublication": {
"id": "proceedings/ipdps/2016/2140/0",
"title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2010/7846/0/05571375",
"title": "Drawing Clustered Bipartite Graphs in Multi-circular Style",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2010/05571375/12OmNvEhfYC",
"parentPublication": {
"id": "proceedings/iv/2010/7846/0",
"title": "2010 14th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2012/4675/0/4675a860",
"title": "Multithreaded Algorithms for Maximum Matching in Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2012/4675a860/12OmNvo67DD",
"parentPublication": {
"id": "proceedings/ipdps/2012/4675/0",
"title": "Parallel and Distributed Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2001/1342/0/13420159",
"title": "Case Study: Design and Assessment of an Enhanced Geographic Information System for Exploration of Multivariate Health Statistics",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2001/13420159/12OmNwM6A1U",
"parentPublication": {
"id": "proceedings/ieee-infovis/2001/1342/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdataservice/2017/6318/0/07944922",
"title": "Scaling Collaborative Filtering to Large–Scale Bipartite Rating Graphs Using Lenskit and Spark",
"doi": null,
"abstractUrl": "/proceedings-article/bigdataservice/2017/07944922/12OmNzahc5a",
"parentPublication": {
"id": "proceedings/bigdataservice/2017/6318/0",
"title": "2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1995/08/t1002",
"title": "Application of Bipartite Graphs for Achieving Race-Free State Assignments",
"doi": null,
"abstractUrl": "/journal/tc/1995/08/t1002/13rRUynHui5",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvisp/2021/0770/0/077000a259",
"title": "Complete Graphs and Bipartite Graphs in a Random Graph",
"doi": null,
"abstractUrl": "/proceedings-article/icvisp/2021/077000a259/1APq5FO8TBK",
"parentPublication": {
"id": "proceedings/icvisp/2021/0770/0",
"title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400b984",
"title": "IVLG: Interactive Visualization of Large Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400b984/1aDT3JxLWAE",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2019/4941/0/08933546",
"title": "Interactive Bicluster Aggregation in Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2019/08933546/1fTgJv5NwT6",
"parentPublication": {
"id": "proceedings/vis/2019/4941/0",
"title": "2019 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2020/9621/0/962100a412",
"title": "Edge-Weighted Online Bipartite Matching",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2020/962100a412/1qyxvL8VZcc",
"parentPublication": {
"id": "proceedings/focs/2020/9621/0",
"title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1FwF6rOD2ec",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"acronym": "icde",
"groupId": "1000178",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1FwFrrnHATC",
"doi": "10.1109/ICDE53745.2022.00187",
"title": "Maximal Balanced Signed Biclique Enumeration in Signed Bipartite Graphs",
"normalizedTitle": "Maximal Balanced Signed Biclique Enumeration in Signed Bipartite Graphs",
"abstract": "Maximal biclique enumeration is a fundamental problem in bipartite graph analysis, and can find numerous applications. However, previous studies only focus on unsigned bipartite graphs. Signed information, such as friend and enemy, naturally exists in real-world networks. It is critical to leverage signed information to better characterize biclique. To fill this gap, in this paper, we propose a novel biclique model, named balanced signed biclique, by leveraging the property of balance theory. Specifically, given a signed bipartite graph <tex>Z_$G$_Z</tex>, two positive integers <tex>Z_$\\tau_{U}, \\tau_{V}$_Z</tex>, a subgraph <tex>Z_$S=(U_{S},\\ V_{S},\\ E_{S})$_Z</tex> of <tex>Z_$G$_Z</tex> is a balanced signed biclique if <tex>Z_$i$_Z</tex>) <tex>Z_$S$_Z</tex> is a biclique without any unstable motif, i.e., unbalanced butterfly, and ii) <tex>Z_$\\vert U_{S}\\vert \\geq\\tau_{U}$_Z</tex> and <tex>Z_$\\vert V_{S}\\vert \\geq\\tau_{V}$_Z</tex>. In this paper, we aim to enumerate all the maximal balanced signed bicliques, which is proved to be NP-hard. Moreover, due to the unique features of signed bipartite graphs, the previous works cannot be applied to our problem directly. To construct a reasonable baseline, we extend the existing biclique enumeration framework for unsigned bipartite graphs and integrate the developed balanced bipartite graph property. To scale for larger networks, novel optimized strategies are proposed to overcome the three limitations in the baseline method. Extensive experi-ments are conducted on 8 real-world datasets to demonstrate the efficiency and effectiveness of proposed techniques and model. Compared with the baseline approach, the optimized algorithm can achieve up to 3 orders of magnitude speedup.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Maximal biclique enumeration is a fundamental problem in bipartite graph analysis, and can find numerous applications. However, previous studies only focus on unsigned bipartite graphs. Signed information, such as friend and enemy, naturally exists in real-world networks. It is critical to leverage signed information to better characterize biclique. To fill this gap, in this paper, we propose a novel biclique model, named balanced signed biclique, by leveraging the property of balance theory. Specifically, given a signed bipartite graph <tex>$G$</tex>, two positive integers <tex>$\\tau_{U}, \\tau_{V}$</tex>, a subgraph <tex>$S=(U_{S},\\ V_{S},\\ E_{S})$</tex> of <tex>$G$</tex> is a balanced signed biclique if <tex>$i$</tex>) <tex>$S$</tex> is a biclique without any unstable motif, i.e., unbalanced butterfly, and ii) <tex>$\\vert U_{S}\\vert \\geq\\tau_{U}$</tex> and <tex>$\\vert V_{S}\\vert \\geq\\tau_{V}$</tex>. In this paper, we aim to enumerate all the maximal balanced signed bicliques, which is proved to be NP-hard. Moreover, due to the unique features of signed bipartite graphs, the previous works cannot be applied to our problem directly. To construct a reasonable baseline, we extend the existing biclique enumeration framework for unsigned bipartite graphs and integrate the developed balanced bipartite graph property. To scale for larger networks, novel optimized strategies are proposed to overcome the three limitations in the baseline method. Extensive experi-ments are conducted on 8 real-world datasets to demonstrate the efficiency and effectiveness of proposed techniques and model. Compared with the baseline approach, the optimized algorithm can achieve up to 3 orders of magnitude speedup.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Maximal biclique enumeration is a fundamental problem in bipartite graph analysis, and can find numerous applications. However, previous studies only focus on unsigned bipartite graphs. Signed information, such as friend and enemy, naturally exists in real-world networks. It is critical to leverage signed information to better characterize biclique. To fill this gap, in this paper, we propose a novel biclique model, named balanced signed biclique, by leveraging the property of balance theory. Specifically, given a signed bipartite graph -, two positive integers -, a subgraph - of - is a balanced signed biclique if -) - is a biclique without any unstable motif, i.e., unbalanced butterfly, and ii) - and -. In this paper, we aim to enumerate all the maximal balanced signed bicliques, which is proved to be NP-hard. Moreover, due to the unique features of signed bipartite graphs, the previous works cannot be applied to our problem directly. To construct a reasonable baseline, we extend the existing biclique enumeration framework for unsigned bipartite graphs and integrate the developed balanced bipartite graph property. To scale for larger networks, novel optimized strategies are proposed to overcome the three limitations in the baseline method. Extensive experi-ments are conducted on 8 real-world datasets to demonstrate the efficiency and effectiveness of proposed techniques and model. Compared with the baseline approach, the optimized algorithm can achieve up to 3 orders of magnitude speedup.",
"fno": "088300b887",
"keywords": [
"Computational Complexity",
"Graph Theory",
"Maximal Balanced Signed Biclique Enumeration",
"Signed Bipartite Graphs",
"Maximal Biclique Enumeration",
"Bipartite Graph Analysis",
"Unsigned Bipartite Graphs",
"Signed Information",
"Biclique Model",
"Balance Theory",
"Maximal Balanced Signed Bicliques",
"Balanced Bipartite Graph Property",
"Biclique Enumeration Framework",
"NP Hard Problem",
"Conferences",
"Data Engineering",
"Bipartite Graph",
"Biclique",
"Signed Graph",
"NP Hard"
],
"authors": [
{
"affiliation": "East China Normal University,Shanghai,China",
"fullName": "Renjie Sun",
"givenName": "Renjie",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Zhejiang Gongshang University,Hangzhou,China",
"fullName": "Yanping Wu",
"givenName": "Yanping",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "East China Normal University,Shanghai,China",
"fullName": "Chen Chen",
"givenName": "Chen",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Zhejiang Gongshang University,Hangzhou,China",
"fullName": "Xiaoyang Wang",
"givenName": "Xiaoyang",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of New South Wales,Sydney,Australia",
"fullName": "Wenjie Zhang",
"givenName": "Wenjie",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of New South Wales,Sydney,Australia",
"fullName": "Xuemin Lin",
"givenName": "Xuemin",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icde",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-05-01T00:00:00",
"pubType": "proceedings",
"pages": "1887-1899",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-0883-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "088300b874",
"articleId": "1FwFa26ftwA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "088300b900",
"articleId": "1FwByMnFMFG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2017/5738/0/08031597",
"title": "Quasi-biclique edge concentration: A visual analytics method for biclustering",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2017/08031597/12OmNyQGSf7",
"parentPublication": {
"id": "proceedings/pacificvis/2017/5738/0",
"title": "2017 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2018/7649/0/764900a132",
"title": "Finding Maximum Edge Biclique in Bipartite Networks by Integer Programming",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2018/764900a132/17D45Wda7h6",
"parentPublication": {
"id": "proceedings/cse/2018/7649/0",
"title": "2018 IEEE International Conference on Computational Science and Engineering (CSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2022/8106/0/810600a661",
"title": "Scheduling on Uniform and Unrelated Machines with Bipartite Incompatibility Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2022/810600a661/1F1W4hP3sYg",
"parentPublication": {
"id": "proceedings/ipdps/2022/8106/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b483",
"title": "On Efficient Large Maximal Biplex Discovery (Extended abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b483/1FwBEiv8HCM",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b004",
"title": "Computing Maximum Structural Balanced Cliques in Signed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b004/1FwFJIKjbOM",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a898",
"title": "Maximum Biplex Search over Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a898/1FwFgG7iniE",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300c346",
"title": "On Maximising the Vertex Coverage for <tex>Z_${\\text{Top}}-k$_Z</tex> <tex>t-Bicliques</tex> in Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300c346/1FwFuCFcARG",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/09889176",
"title": "Finding the Maximum <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Balanced Biclique on Weighted Bipartite Graphs",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/09889176/1GDrnzNt5Re",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/09944191",
"title": "Efficient Maximum Edge-Weighted Biclique Search on Large Bipartite Graphs",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/09944191/1Ia7d5G9RUA",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/10121476",
"title": "Efficient Maximal Biclique Enumeration on Large Uncertain Bipartite Graphs",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/10121476/1MYNFoG81ws",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lPGxrsfiHC",
"title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"acronym": "ipdpsw",
"groupId": "1800044",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1lPGDwFrzFe",
"doi": "10.1109/IPDPSW50202.2020.00052",
"title": "Kronecker Graph Generation with Ground Truth for 4-Cycles and Dense Structure in Bipartite Graphs",
"normalizedTitle": "Kronecker Graph Generation with Ground Truth for 4-Cycles and Dense Structure in Bipartite Graphs",
"abstract": "We demonstrate nonstochastic Kronecker graph generators produce massive-scale bipartite graphs with ground truth global and local properties and discuss their use for validation of graph analytics. Given two small connected scale-free graphs with adjacency matrices A and B, their Kronecker product graph [1] has adjacency matrix C = A ⊗ B. We first demonstrate that having one factor A non-bipartite (alternatively, adding all self loops to a bipartite A) with other factor B bipartite ensures G<sub>C</sub> is bipartite and connected. Formulas for ground truth of many graph properties (including degree, diameter, and eccentricity) carry over directly from the general case presented in previous work [2], [3]. However, the analysis of higher-order structure and dense structure is different in bipartite graphs, as no odd-length cycles exist (including triangles) and the densest possible structures are bicliques. We derive formulas to give ground truth for 4-cycles (a.k.a. squares or butterflies) at every vertex and edge in G<sub>C</sub>. Additionally, we demonstrate that bipartite communities (dense vertex subsets) in the factors A, B yield dense bipartite communities in the Kronecker product C. We additionally discuss interesting properties of Kronecker product graphs revealed by the formulas an their impact on using them as benchmarks with ground truth for various complex analytics. For example, for connected A and B of nontrivial size, G<sub>C</sub> has 4-cycles at vertices/edges associated with vertices/edges in A and B that have none, making it difficult to generate graphs with ground truth bipartite generalizations of truss decomposition (e.g. the k-wing decomposition of [4]).",
"abstracts": [
{
"abstractType": "Regular",
"content": "We demonstrate nonstochastic Kronecker graph generators produce massive-scale bipartite graphs with ground truth global and local properties and discuss their use for validation of graph analytics. Given two small connected scale-free graphs with adjacency matrices A and B, their Kronecker product graph [1] has adjacency matrix C = A ⊗ B. We first demonstrate that having one factor A non-bipartite (alternatively, adding all self loops to a bipartite A) with other factor B bipartite ensures G<sub>C</sub> is bipartite and connected. Formulas for ground truth of many graph properties (including degree, diameter, and eccentricity) carry over directly from the general case presented in previous work [2], [3]. However, the analysis of higher-order structure and dense structure is different in bipartite graphs, as no odd-length cycles exist (including triangles) and the densest possible structures are bicliques. We derive formulas to give ground truth for 4-cycles (a.k.a. squares or butterflies) at every vertex and edge in G<sub>C</sub>. Additionally, we demonstrate that bipartite communities (dense vertex subsets) in the factors A, B yield dense bipartite communities in the Kronecker product C. We additionally discuss interesting properties of Kronecker product graphs revealed by the formulas an their impact on using them as benchmarks with ground truth for various complex analytics. For example, for connected A and B of nontrivial size, G<sub>C</sub> has 4-cycles at vertices/edges associated with vertices/edges in A and B that have none, making it difficult to generate graphs with ground truth bipartite generalizations of truss decomposition (e.g. the k-wing decomposition of [4]).",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We demonstrate nonstochastic Kronecker graph generators produce massive-scale bipartite graphs with ground truth global and local properties and discuss their use for validation of graph analytics. Given two small connected scale-free graphs with adjacency matrices A and B, their Kronecker product graph [1] has adjacency matrix C = A ⊗ B. We first demonstrate that having one factor A non-bipartite (alternatively, adding all self loops to a bipartite A) with other factor B bipartite ensures GC is bipartite and connected. Formulas for ground truth of many graph properties (including degree, diameter, and eccentricity) carry over directly from the general case presented in previous work [2], [3]. However, the analysis of higher-order structure and dense structure is different in bipartite graphs, as no odd-length cycles exist (including triangles) and the densest possible structures are bicliques. We derive formulas to give ground truth for 4-cycles (a.k.a. squares or butterflies) at every vertex and edge in GC. Additionally, we demonstrate that bipartite communities (dense vertex subsets) in the factors A, B yield dense bipartite communities in the Kronecker product C. We additionally discuss interesting properties of Kronecker product graphs revealed by the formulas an their impact on using them as benchmarks with ground truth for various complex analytics. For example, for connected A and B of nontrivial size, GC has 4-cycles at vertices/edges associated with vertices/edges in A and B that have none, making it difficult to generate graphs with ground truth bipartite generalizations of truss decomposition (e.g. the k-wing decomposition of [4]).",
"fno": "09150381",
"keywords": [
"Network Theory Graphs",
"Set Theory",
"Connected Scale Free Graphs",
"Kronecker Product Graph",
"Graph Properties",
"Higher Order Structure",
"Odd Length Cycles",
"Dense Vertex Subsets",
"B Yield Dense Bipartite Communities",
"Ground Truth Bipartite Generalizations",
"Kronecker Graph Generation",
"4 Cycles",
"Nonstochastic Kronecker Graph Generators",
"Massive Scale Bipartite Graphs",
"Graph Analytics",
"Bipartite Graph",
"Generators",
"Indexes",
"Software Engineering",
"Benchmark Testing",
"Data Analysis"
],
"authors": [
{
"affiliation": "University of Minnesota,School of Mathematics,Minneapolis,MN,USA",
"fullName": "Trevor Steil",
"givenName": "Trevor",
"surname": "Steil",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Carnegie Mellon University,Software Engineering Institute,Pittsburgh,PA,USA",
"fullName": "Scott McMillan",
"givenName": "Scott",
"surname": "McMillan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lawrence Livermore National Laboratory (LLNL),Center for Applied Scientific Computing (CASC),Livermore,CA,USA",
"fullName": "Geoffrey Sanders",
"givenName": "Geoffrey",
"surname": "Sanders",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lawrence Livermore National Laboratory (LLNL),Center for Applied Scientific Computing (CASC),Livermore,CA,USA",
"fullName": "Roger Pearce",
"givenName": "Roger",
"surname": "Pearce",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lawrence Livermore National Laboratory (LLNL),Center for Applied Scientific Computing (CASC),Livermore,CA,USA",
"fullName": "Benjamin Priest",
"givenName": "Benjamin",
"surname": "Priest",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipdpsw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-05-01T00:00:00",
"pubType": "proceedings",
"pages": "237-246",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7445-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09150480",
"articleId": "1lPGJ0wYfuw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09150349",
"articleId": "1lPGHp6xxHq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/synasc/2014/8447/0/07034667",
"title": "On Corank Two Edge-Bipartite Graphs and Simply Extended Euclidean Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/synasc/2014/07034667/12OmNAlvHNI",
"parentPublication": {
"id": "proceedings/synasc/2014/8447/0",
"title": "2014 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdata-congress/2014/5057/0/06906756",
"title": "Rectangle Counting in Large Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/bigdata-congress/2014/06906756/12OmNBtCCLP",
"parentPublication": {
"id": "proceedings/bigdata-congress/2014/5057/0",
"title": "2014 IEEE International Congress on Big Data (BigData Congress)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2014/5877/0/06921578",
"title": "Indexing bipartite memberships in web graphs",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2014/06921578/12OmNCw3z9d",
"parentPublication": {
"id": "proceedings/asonam/2014/5877/0",
"title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/is3c/2012/4655/0/4655a064",
"title": "An Algorithm for Determining Critical Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/is3c/2012/4655a064/12OmNqzcvJt",
"parentPublication": {
"id": "proceedings/is3c/2012/4655/0",
"title": "Computer, Consumer and Control, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2018/5555/0/555501a287",
"title": "On Large-Scale Graph Generation with Validation of Diverse Triangle Statistics at Edges and Vertices",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2018/555501a287/12OmNscfHVZ",
"parentPublication": {
"id": "proceedings/ipdpsw/2018/5555/0",
"title": "2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/5555/01/09761773",
"title": "Achieving Efficient and Privacy-Preserving (,)-Core Query over Bipartite Graphs in Cloud",
"doi": null,
"abstractUrl": "/journal/tq/5555/01/09761773/1CKMmPFPFSM",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2019/3510/0/555500a251",
"title": "Distributed Kronecker Graph Generation with Ground Truth of Many Graph Properties",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2019/555500a251/1c2bBeinDB6",
"parentPublication": {
"id": "proceedings/ipdpsw/2019/3510/0",
"title": "2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2020/9621/0/962100a412",
"title": "Edge-Weighted Online Bipartite Matching",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2020/962100a412/1qyxvL8VZcc",
"parentPublication": {
"id": "proceedings/focs/2020/9621/0",
"title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428269",
"title": "Truth Inference with Bipartite Attention Graph Neural Network from a Comprehensive View",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428269/1uimfVUT864",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aemcse/2021/1596/0/159600a842",
"title": "A Cross Iterative Algorithm for Mining Communities in Bipartite Network",
"doi": null,
"abstractUrl": "/proceedings-article/aemcse/2021/159600a842/1wcdrVOyVc4",
"parentPublication": {
"id": "proceedings/aemcse/2021/1596/0",
"title": "2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1n2nh6feFVe",
"title": "2020 IEEE International Conference on Knowledge Graph (ICKG)",
"acronym": "ickg",
"groupId": "1821544",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1n2nlmG0kFy",
"doi": "10.1109/ICBK50248.2020.00072",
"title": "Collaborative Adversarial Learning for Relational Learning on Multiple Bipartite Graphs",
"normalizedTitle": "Collaborative Adversarial Learning for Relational Learning on Multiple Bipartite Graphs",
"abstract": "Relational learning aims to make relation inference by exploiting the correlations among different types of entities. Exploring relational learning on multiple bipartite graphs has been receiving attention because of its popular applications such as recommendations. How to make efficient relation inference with few observed links is the main problem on multiple bipartite graphs. Most existing approaches attempt to solve the sparsity problem via learning shared representations to integrate knowledge from multi-source data for shared entities. However, they merely model the correlations from one aspect (e.g. distribution, representation), and cannot impose sufficient constraints on different relations of the shared entities. One effective way of modeling the multi-domain data is to learn the joint distribution of the shared entities across domains. In this paper, we propose Collaborative Adversarial Learning (CAL) that explicitly models the joint distribution of the shared entities across multiple bipartite graphs. The objective of CAL is formulated from a variational lower bound that maximizes the joint log-likelihoods of the observations. In particular, CAL consists of distribution-level and feature-level alignments for knowledge from multiple bipartite graphs. The two-level alignment acts as two different constraints on different relations of the shared entities and facilitates better knowledge transfer for relational learning on multiple bipartite graphs. Extensive experiments on two real-world datasets have shown that the proposed model outperforms the existing methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Relational learning aims to make relation inference by exploiting the correlations among different types of entities. Exploring relational learning on multiple bipartite graphs has been receiving attention because of its popular applications such as recommendations. How to make efficient relation inference with few observed links is the main problem on multiple bipartite graphs. Most existing approaches attempt to solve the sparsity problem via learning shared representations to integrate knowledge from multi-source data for shared entities. However, they merely model the correlations from one aspect (e.g. distribution, representation), and cannot impose sufficient constraints on different relations of the shared entities. One effective way of modeling the multi-domain data is to learn the joint distribution of the shared entities across domains. In this paper, we propose Collaborative Adversarial Learning (CAL) that explicitly models the joint distribution of the shared entities across multiple bipartite graphs. The objective of CAL is formulated from a variational lower bound that maximizes the joint log-likelihoods of the observations. In particular, CAL consists of distribution-level and feature-level alignments for knowledge from multiple bipartite graphs. The two-level alignment acts as two different constraints on different relations of the shared entities and facilitates better knowledge transfer for relational learning on multiple bipartite graphs. Extensive experiments on two real-world datasets have shown that the proposed model outperforms the existing methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Relational learning aims to make relation inference by exploiting the correlations among different types of entities. Exploring relational learning on multiple bipartite graphs has been receiving attention because of its popular applications such as recommendations. How to make efficient relation inference with few observed links is the main problem on multiple bipartite graphs. Most existing approaches attempt to solve the sparsity problem via learning shared representations to integrate knowledge from multi-source data for shared entities. However, they merely model the correlations from one aspect (e.g. distribution, representation), and cannot impose sufficient constraints on different relations of the shared entities. One effective way of modeling the multi-domain data is to learn the joint distribution of the shared entities across domains. In this paper, we propose Collaborative Adversarial Learning (CAL) that explicitly models the joint distribution of the shared entities across multiple bipartite graphs. The objective of CAL is formulated from a variational lower bound that maximizes the joint log-likelihoods of the observations. In particular, CAL consists of distribution-level and feature-level alignments for knowledge from multiple bipartite graphs. The two-level alignment acts as two different constraints on different relations of the shared entities and facilitates better knowledge transfer for relational learning on multiple bipartite graphs. Extensive experiments on two real-world datasets have shown that the proposed model outperforms the existing methods.",
"fno": "09194523",
"keywords": [
"Data Handling",
"Graph Theory",
"Learning Artificial Intelligence",
"Multiple Bipartite Graphs",
"Shared Entities",
"Relational Learning",
"Collaborative Adversarial Learning",
"CAL",
"Real World Datasets",
"Bipartite Graph",
"Correlation",
"Mathematical Model",
"Collaboration",
"Knowledge Transfer",
"Task Analysis",
"Fuses",
"Relational Learning",
"Bipartite Graph",
"Joint Distribution Matching",
"Cross Domain Recommendation"
],
"authors": [
{
"affiliation": "Shanghai Jiao Tong University,Cooperative Medianet Innovation Center,Shanghai,China",
"fullName": "Jingchao Su",
"givenName": "Jingchao",
"surname": "Su",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,Cooperative Medianet Innovation Center,Shanghai,China",
"fullName": "Xu Chen",
"givenName": "Xu",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,Cooperative Medianet Innovation Center,Shanghai,China",
"fullName": "Ya Zhang",
"givenName": "Ya",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mitsubishi Electric Research Laboratories,Cambridge,MA,USA",
"fullName": "Siheng Chen",
"givenName": "Siheng",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "StataCorp LLC,College Station,TX,USA",
"fullName": "Dan Lv",
"givenName": "Dan",
"surname": "Lv",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,Cooperative Medianet Innovation Center,Shanghai,China",
"fullName": "Chenyang Li",
"givenName": "Chenyang",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ickg",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-08-01T00:00:00",
"pubType": "proceedings",
"pages": "466-473",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8156-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09194501",
"articleId": "1n2njn1qox2",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09194467",
"articleId": "1n2niRlacqA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bigdata-congress/2014/5057/0/06906756",
"title": "Rectangle Counting in Large Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/bigdata-congress/2014/06906756/12OmNBtCCLP",
"parentPublication": {
"id": "proceedings/bigdata-congress/2014/5057/0",
"title": "2014 IEEE International Congress on Big Data (BigData Congress)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2014/5877/0/06921578",
"title": "Indexing bipartite memberships in web graphs",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2014/06921578/12OmNCw3z9d",
"parentPublication": {
"id": "proceedings/asonam/2014/5877/0",
"title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2011/0868/0/06004018",
"title": "Drawing Semi-bipartite Graphs in Anchor+Matrix Style",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2011/06004018/12OmNqJq4Ao",
"parentPublication": {
"id": "proceedings/iv/2011/0868/0",
"title": "2011 15th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2010/7846/0/05571375",
"title": "Drawing Clustered Bipartite Graphs in Multi-circular Style",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2010/05571375/12OmNvEhfYC",
"parentPublication": {
"id": "proceedings/iv/2010/7846/0",
"title": "2010 14th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csit/2015/7562/0/07358253",
"title": "On interval edge-colorings of bipartite graphs",
"doi": null,
"abstractUrl": "/proceedings-article/csit/2015/07358253/12OmNzUPpCq",
"parentPublication": {
"id": "proceedings/csit/2015/7562/0",
"title": "2015 Computer Science and Information Technologies (CSIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isise/2008/3494/2/3494b471",
"title": "Ordering Bipartite Graphs by their Minimal Energies",
"doi": null,
"abstractUrl": "/proceedings-article/isise/2008/3494b471/12OmNzWfoZp",
"parentPublication": {
"id": "proceedings/isise/2008/3494/2",
"title": "2008 International Symposium on Information Science and Engineering (ISISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300c333",
"title": "Efficient Computation of Cohesive Subgraphs in Uncertain Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300c333/1FwFmyiEg4E",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b887",
"title": "Maximal Balanced Signed Biclique Enumeration in Signed Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b887/1FwFrrnHATC",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/10/08423100",
"title": "The Effect of Edge Bundling and Seriation on Sensemaking of Biclusters in Bipartite Graphs",
"doi": null,
"abstractUrl": "/journal/tg/2019/10/08423100/1d3e5UbWqis",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400a085",
"title": "Efficient and Effective Community Search on Large-scale Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400a085/1uGXp3tCuPK",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwwMf3w",
"title": "2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images",
"acronym": "sibgrapi",
"groupId": "1000131",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBv2Ce3",
"doi": "10.1109/SIBGRAPI.2010.34",
"title": "How Far You Can Get Using Machine Learning Black-Boxes",
"normalizedTitle": "How Far You Can Get Using Machine Learning Black-Boxes",
"abstract": "Supervised Learning (SL) is a machine learning research area which aims at developing techniques able to take advantage from labeled training samples to make decisions over unseen examples. Recently, a lot of tools have been presented in order to perform machine learning in a more straightforward and transparent manner. However, one problem that is increasingly present in most of the SL problems being solved is that, sometimes, researchers do not completely understand what supervised learning is and, more often than not, publish results using machine learning black-boxes. In this paper, we shed light over the use of machine learning black-boxes and show researchers how far they can get using these out-of-the-box solutions instead of going deeper into the machinery of the classifiers. Here, we focus on one aspect of classifiers namely the way they compare examples in the feature space and show how a simple knowledge about the classifier's machinery can lift the results way beyond out-of-the-box machine learning solutions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Supervised Learning (SL) is a machine learning research area which aims at developing techniques able to take advantage from labeled training samples to make decisions over unseen examples. Recently, a lot of tools have been presented in order to perform machine learning in a more straightforward and transparent manner. However, one problem that is increasingly present in most of the SL problems being solved is that, sometimes, researchers do not completely understand what supervised learning is and, more often than not, publish results using machine learning black-boxes. In this paper, we shed light over the use of machine learning black-boxes and show researchers how far they can get using these out-of-the-box solutions instead of going deeper into the machinery of the classifiers. Here, we focus on one aspect of classifiers namely the way they compare examples in the feature space and show how a simple knowledge about the classifier's machinery can lift the results way beyond out-of-the-box machine learning solutions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Supervised Learning (SL) is a machine learning research area which aims at developing techniques able to take advantage from labeled training samples to make decisions over unseen examples. Recently, a lot of tools have been presented in order to perform machine learning in a more straightforward and transparent manner. However, one problem that is increasingly present in most of the SL problems being solved is that, sometimes, researchers do not completely understand what supervised learning is and, more often than not, publish results using machine learning black-boxes. In this paper, we shed light over the use of machine learning black-boxes and show researchers how far they can get using these out-of-the-box solutions instead of going deeper into the machinery of the classifiers. Here, we focus on one aspect of classifiers namely the way they compare examples in the feature space and show how a simple knowledge about the classifier's machinery can lift the results way beyond out-of-the-box machine learning solutions.",
"fno": "05720365",
"keywords": [
"Learning Artificial Intelligence",
"Pattern Classification",
"Machine Learning Black Boxes",
"Supervised Learning",
"Classifier Machinery",
"Machine Learning",
"Shape",
"Measurement",
"Pixel",
"Support Vector Machines",
"Accuracy",
"Kernel",
"Machine Learning Black Boxes",
"Metrics Space",
"Pattern Analysis",
"Support Vector Machines",
"Optimum Path Forest",
"Neural Networks",
"K Nearest Neighbors"
],
"authors": [
{
"affiliation": null,
"fullName": "Anderson Rocha",
"givenName": "Anderson",
"surname": "Rocha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Joao Paulo Papa",
"givenName": "Joao Paulo",
"surname": "Papa",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Luis A. A. Meira",
"givenName": "Luis A. A.",
"surname": "Meira",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sibgrapi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "193-200",
"year": "2010",
"issn": "1530-1834",
"isbn": "978-1-4244-8420-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05720364",
"articleId": "12OmNyywxA2",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05720366",
"articleId": "12OmNCgJebf",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2014/5209/0/5209d892",
"title": "A Spectral Graph Kernel and Its Application to Collective Activities Classification",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209d892/12OmNCyBXj8",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2010/4154/0/4154a444",
"title": "SeaLab Advanced Information Retrieval",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2010/4154a444/12OmNqBbHWb",
"parentPublication": {
"id": "proceedings/icsc/2010/4154/0",
"title": "2010 IEEE Fourth International Conference on Semantic Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2013/1293/0/06691730",
"title": "Nearest neighbor classification using bottom-k sketches",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2013/06691730/12OmNqESubB",
"parentPublication": {
"id": "proceedings/big-data/2013/1293/0",
"title": "2013 IEEE International Conference on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2014/4274/0/4274a101",
"title": "Active Learning with Nonparallel Support Vector Machine for Binary Classification",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2014/4274a101/12OmNvDqsOJ",
"parentPublication": {
"id": "proceedings/icdmw/2014/4274/0",
"title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2013/3142/0/3143a399",
"title": "Weighted Task Regularization for Multitask Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2013/3143a399/12OmNvSKNSt",
"parentPublication": {
"id": "proceedings/icdmw/2013/3142/0",
"title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tase/2014/5029/0/5029a114",
"title": "Branch Obfuscation Using \"Black Boxes\"",
"doi": null,
"abstractUrl": "/proceedings-article/tase/2014/5029a114/12OmNvoFjSA",
"parentPublication": {
"id": "proceedings/tase/2014/5029/0",
"title": "2014 Theoretical Aspects of Software Engineering Conference (TASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icstw/2014/5790/0/5790a237",
"title": "Techniques for Automatic Detection of Metamorphic Relations",
"doi": null,
"abstractUrl": "/proceedings-article/icstw/2014/5790a237/12OmNyKJidw",
"parentPublication": {
"id": "proceedings/icstw/2014/5790/0",
"title": "2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/case/2012/0430/0/06386411",
"title": "Impact characterization of multiple-points-defect on machine fault diagnosis",
"doi": null,
"abstractUrl": "/proceedings-article/case/2012/06386411/12OmNz6iOqo",
"parentPublication": {
"id": "proceedings/case/2012/0430/0",
"title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlsid/2019/0409/0/040900a531",
"title": "A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes",
"doi": null,
"abstractUrl": "/proceedings-article/vlsid/2019/040900a531/1a3wV6sePXq",
"parentPublication": {
"id": "proceedings/vlsid/2019/0409/0",
"title": "2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/it/2020/04/09143261",
"title": "Toward the Bleaching of the Black Boxes: Minimalist Machine Learning",
"doi": null,
"abstractUrl": "/magazine/it/2020/04/09143261/1lxmEv0Yn9S",
"parentPublication": {
"id": "mags/it",
"title": "IT Professional",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAGepXq",
"title": "Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000",
"acronym": "ictai",
"groupId": "1000763",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqBbHPc",
"doi": "10.1109/TAI.2000.889887",
"title": "Interpretation of self-organizing maps with fuzzy rules",
"normalizedTitle": "Interpretation of self-organizing maps with fuzzy rules",
"abstract": "Abstract: Exploration of large and high-dimensional data sets is one of the main problems in data analysis. Self-organizing maps (SOMs) can be used to map large data sets to a simpler; usually two-dimensional topological structure. This mapping is able to illustrate dependencies in the data in a very intuitive manner and allows fast location of clusters. However because of the black-box design of neural networks, it is difficult to get qualitative descriptions of the data. In our approach, we identify regions of interest in SOMs by using unsupervised clustering methods. Then we apply inductive learning methods to find fuzzy descriptions of these clusters. Through the combination of these methods, it is possible to use supervised machine learning methods to find simple and accurate linguistic descriptions of previously unknown clusters in the data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Abstract: Exploration of large and high-dimensional data sets is one of the main problems in data analysis. Self-organizing maps (SOMs) can be used to map large data sets to a simpler; usually two-dimensional topological structure. This mapping is able to illustrate dependencies in the data in a very intuitive manner and allows fast location of clusters. However because of the black-box design of neural networks, it is difficult to get qualitative descriptions of the data. In our approach, we identify regions of interest in SOMs by using unsupervised clustering methods. Then we apply inductive learning methods to find fuzzy descriptions of these clusters. Through the combination of these methods, it is possible to use supervised machine learning methods to find simple and accurate linguistic descriptions of previously unknown clusters in the data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Abstract: Exploration of large and high-dimensional data sets is one of the main problems in data analysis. Self-organizing maps (SOMs) can be used to map large data sets to a simpler; usually two-dimensional topological structure. This mapping is able to illustrate dependencies in the data in a very intuitive manner and allows fast location of clusters. However because of the black-box design of neural networks, it is difficult to get qualitative descriptions of the data. In our approach, we identify regions of interest in SOMs by using unsupervised clustering methods. Then we apply inductive learning methods to find fuzzy descriptions of these clusters. Through the combination of these methods, it is possible to use supervised machine learning methods to find simple and accurate linguistic descriptions of previously unknown clusters in the data.",
"fno": "09090304",
"keywords": [
"Self Organising Feature Maps Learning By Example Data Analysis Fuzzy Logic Self Organizing Maps Fuzzy Rules High Dimensional Data Sets Data Analysis Two Dimensional Topological Structure Neural Networks Unsupervised Clustering Methods Fuzzy Descriptions Supervised Machine Learning Methods Linguistic Descriptions"
],
"authors": [
{
"affiliation": "Software Competence Center, Hagenborg, Germany",
"fullName": "M. Drobics",
"givenName": "M.",
"surname": "Drobics",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Software Competence Center, Hagenborg, Germany",
"fullName": "W. Winiwater",
"givenName": "W.",
"surname": "Winiwater",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Software Competence Center, Hagenborg, Germany",
"fullName": "U. Bodenhofer",
"givenName": "U.",
"surname": "Bodenhofer",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ictai",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-11-01T00:00:00",
"pubType": "proceedings",
"pages": "0304",
"year": "2000",
"issn": null,
"isbn": "0-7695-0909-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09090298",
"articleId": "12OmNzFv4fV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09090312",
"articleId": "12OmNxE2mRp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwMXnv1",
"title": "2014 30th Symposium on Mass Storage Systems and Technologies (MSST)",
"acronym": "msst",
"groupId": "1000430",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy1SFRv",
"doi": "10.1109/MSST.2014.6855553",
"title": "Automatic generation of behavioral hard disk drive access time models",
"normalizedTitle": "Automatic generation of behavioral hard disk drive access time models",
"abstract": "Predicting access times is a crucial part of predicting hard disk drive performance. Existing approaches use white-box modeling and require intimate knowledge of the internal layout of the drive, which can take months to extract. Automatically learning this behavior is a much more desirable approach, requiring less expert knowledge, fewer assumptions, and less time. While previous research has created black-box models of hard disk drive performance, none have shown low per-request errors. A barrier to machine learning of access times has been the existence of periodic behavior with high, unknown frequencies. We identify these high frequencies with Fourier analysis and include them explicitly as input to the model. In this paper we focus on the simulation of access times for random read workloads within a single zone. We are able to automatically generate and tune request-level access time models with mean absolute error less than 0.15 ms. To our knowledge this is the first time such a fidelity has been achieved with modern disk drives using machine learning. We are confident that our approach forms the core for automatic generation of access time models that include other workloads and span across entire disk drives, but more work remains.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Predicting access times is a crucial part of predicting hard disk drive performance. Existing approaches use white-box modeling and require intimate knowledge of the internal layout of the drive, which can take months to extract. Automatically learning this behavior is a much more desirable approach, requiring less expert knowledge, fewer assumptions, and less time. While previous research has created black-box models of hard disk drive performance, none have shown low per-request errors. A barrier to machine learning of access times has been the existence of periodic behavior with high, unknown frequencies. We identify these high frequencies with Fourier analysis and include them explicitly as input to the model. In this paper we focus on the simulation of access times for random read workloads within a single zone. We are able to automatically generate and tune request-level access time models with mean absolute error less than 0.15 ms. To our knowledge this is the first time such a fidelity has been achieved with modern disk drives using machine learning. We are confident that our approach forms the core for automatic generation of access time models that include other workloads and span across entire disk drives, but more work remains.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Predicting access times is a crucial part of predicting hard disk drive performance. Existing approaches use white-box modeling and require intimate knowledge of the internal layout of the drive, which can take months to extract. Automatically learning this behavior is a much more desirable approach, requiring less expert knowledge, fewer assumptions, and less time. While previous research has created black-box models of hard disk drive performance, none have shown low per-request errors. A barrier to machine learning of access times has been the existence of periodic behavior with high, unknown frequencies. We identify these high frequencies with Fourier analysis and include them explicitly as input to the model. In this paper we focus on the simulation of access times for random read workloads within a single zone. We are able to automatically generate and tune request-level access time models with mean absolute error less than 0.15 ms. To our knowledge this is the first time such a fidelity has been achieved with modern disk drives using machine learning. We are confident that our approach forms the core for automatic generation of access time models that include other workloads and span across entire disk drives, but more work remains.",
"fno": "06855553",
"keywords": [
"Hard Disks",
"Neural Networks",
"Fourier Transforms",
"Data Models",
"Decision Trees",
"Genetic Algorithms",
"Time Frequency Analysis"
],
"authors": [
{
"affiliation": "University of California, Santa Cruz",
"fullName": "Adam Crume",
"givenName": "Adam",
"surname": "Crume",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, Santa Cruz",
"fullName": "Carlos Maltzahn",
"givenName": "Carlos",
"surname": "Maltzahn",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sandia National Laboratories",
"fullName": "Lee Ward",
"givenName": "Lee",
"surname": "Ward",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sandia National Laboratories",
"fullName": "Thomas Kroeger",
"givenName": "Thomas",
"surname": "Kroeger",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sandia National Laboratories",
"fullName": "Matthew Curry",
"givenName": "Matthew",
"surname": "Curry",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "msst",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1-11",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-5671-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06855552",
"articleId": "12OmNs59JKB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06855554",
"articleId": "12OmNB7LvFp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/nvmt/1998/4518/0/00723218",
"title": "Micro Drive-a pluggable one-inch disk drive for portable devices",
"doi": null,
"abstractUrl": "/proceedings-article/nvmt/1998/00723218/12OmNrNh0O0",
"parentPublication": {
"id": "proceedings/nvmt/1998/4518/0",
"title": "Seventh Biennial IEEE International Nonvolatile Memory Technology Conference. Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682064",
"title": "Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives",
"doi": null,
"abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682064/12OmNrnJ6YF",
"parentPublication": {
"id": "proceedings/greencom-ithingscpscom/2013/5046/0",
"title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mascots/2011/0468/0/06005374",
"title": "Evaluation of Applied Intra-disk Redundancy Schemes to Improve Single Disk Reliability",
"doi": null,
"abstractUrl": "/proceedings-article/mascots/2011/06005374/12OmNvAAtic",
"parentPublication": {
"id": "proceedings/mascots/2011/0468/0",
"title": "2011 IEEE 19th Annual International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icca/2003/7777/0/01595163",
"title": "Modeling and Analysis of Micro Hard Disk Drives",
"doi": null,
"abstractUrl": "/proceedings-article/icca/2003/01595163/12OmNwcUjWQ",
"parentPublication": {
"id": "proceedings/icca/2003/7777/0",
"title": "4th International Conference on Control and Automation. Final Program and Book of Abstracts",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snapi/2008/3408/0/3408a074",
"title": "DIG: Rapid Characterization of Modern Hard Disk Drive and Its Performance Implication",
"doi": null,
"abstractUrl": "/proceedings-article/snapi/2008/3408a074/12OmNwqx46e",
"parentPublication": {
"id": "proceedings/snapi/2008/3408/0",
"title": "2008 Fifth IEEE International Workshop on Storage Network Architecture and Parallel I/Os (SNAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/memsys/1997/3744/0/00581863",
"title": "Invar MEMS milliactuator for hard disk drive application",
"doi": null,
"abstractUrl": "/proceedings-article/memsys/1997/00581863/12OmNyoAA7W",
"parentPublication": {
"id": "proceedings/memsys/1997/3744/0",
"title": "Proceedings IEEE The Tenth Annual International Workshop on Micro Electro Mechanical Systems. An Investigation of Micro Structures, Sensors, Actuators, Machines and Robots",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grid/2009/5148/0/05353061",
"title": "PDC-NH: Popular data concentration on NAND flash and hard disk drive",
"doi": null,
"abstractUrl": "/proceedings-article/grid/2009/05353061/12OmNzT7OuJ",
"parentPublication": {
"id": "proceedings/grid/2009/5148/0",
"title": "2009 10th IEEE/ACM International Conference on Grid Computing (GRID)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2009/01/ttc2009010069",
"title": "Sensitivity-Based Optimization of Disk Architecture",
"doi": null,
"abstractUrl": "/journal/tc/2009/01/ttc2009010069/13rRUxASugO",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sp/2019/6660/0/666000a905",
"title": "Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone",
"doi": null,
"abstractUrl": "/proceedings-article/sp/2019/666000a905/1dlwks5EvZK",
"parentPublication": {
"id": "proceedings/sp/2019/6660/0",
"title": "2019 IEEE Symposium on Security and Privacy (SP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/candar/2020/8221/0/822100a181",
"title": "Performance Improvement of Hadoop ext4-based Disk I/O",
"doi": null,
"abstractUrl": "/proceedings-article/candar/2020/822100a181/1sA99hoakk8",
"parentPublication": {
"id": "proceedings/candar/2020/8221/0",
"title": "2020 Eighth International Symposium on Computing and Networking (CANDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy5hRde",
"title": "2015 IEEE/ACM 4th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE)",
"acronym": "raise",
"groupId": "1801570",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy7h38o",
"doi": "10.1109/RAISE.2015.11",
"title": "Black-Box Test Generation from Inferred Models",
"normalizedTitle": "Black-Box Test Generation from Inferred Models",
"abstract": "Automatically generating test inputs for components without source code (are 'black-box') and specification is challenging. One particularly interesting solution to this problem is to use Machine Learning algorithms to infer testable models from program executions in an iterative cycle. Although the idea has been around for over 30 years, there is little empirical information to inform the choice of suitable learning algorithms, or to show how good the resulting test sets are. This paper presents an openly available framework to facilitate experimentation in this area, and provides a proof-of-concept inference-driven testing framework, along with evidence of the efficacy of its test sets on three programs.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Automatically generating test inputs for components without source code (are 'black-box') and specification is challenging. One particularly interesting solution to this problem is to use Machine Learning algorithms to infer testable models from program executions in an iterative cycle. Although the idea has been around for over 30 years, there is little empirical information to inform the choice of suitable learning algorithms, or to show how good the resulting test sets are. This paper presents an openly available framework to facilitate experimentation in this area, and provides a proof-of-concept inference-driven testing framework, along with evidence of the efficacy of its test sets on three programs.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Automatically generating test inputs for components without source code (are 'black-box') and specification is challenging. One particularly interesting solution to this problem is to use Machine Learning algorithms to infer testable models from program executions in an iterative cycle. Although the idea has been around for over 30 years, there is little empirical information to inform the choice of suitable learning algorithms, or to show how good the resulting test sets are. This paper presents an openly available framework to facilitate experimentation in this area, and provides a proof-of-concept inference-driven testing framework, along with evidence of the efficacy of its test sets on three programs.",
"fno": "7064a019",
"keywords": [
"Testing",
"Inference Algorithms",
"Software",
"Decision Trees",
"Generators",
"Software Algorithms",
"Joining Processes",
"Testing",
"Model Inference"
],
"authors": [
{
"affiliation": null,
"fullName": "Petros Papadopoulos",
"givenName": "Petros",
"surname": "Papadopoulos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Neil Walkinshaw",
"givenName": "Neil",
"surname": "Walkinshaw",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "raise",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-05-01T00:00:00",
"pubType": "proceedings",
"pages": "19-24",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-7064-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7064a013",
"articleId": "12OmNA14Ab7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7064a025",
"articleId": "12OmNBBzoee",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ast/2015/7022/0/7022a033",
"title": "Automatic Test-Pattern Generation for Grey-Box Programs",
"doi": null,
"abstractUrl": "/proceedings-article/ast/2015/7022a033/12OmNBInLkJ",
"parentPublication": {
"id": "proceedings/ast/2015/7022/0",
"title": "2015 IEEE/ACM 10th International Workshop on Automation of Software Test (AST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itc/2000/6547/0/65470225",
"title": "Diagnostic Test Generation for Sequential Circuits",
"doi": null,
"abstractUrl": "/proceedings-article/itc/2000/65470225/12OmNqI04DW",
"parentPublication": {
"id": "proceedings/itc/2000/6547/0",
"title": "Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccd/1993/4230/0/00393321",
"title": "Test path generation and test scheduling for self-testable designs",
"doi": null,
"abstractUrl": "/proceedings-article/iccd/1993/00393321/12OmNqIzh7f",
"parentPublication": {
"id": "proceedings/iccd/1993/4230/0",
"title": "Proceedings of 1993 IEEE International Conference on Computer Design ICCD'93",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/test/1989/9999/0/00082370",
"title": "Design for testability and test generation for static redundancy system level fault-tolerant circuits",
"doi": null,
"abstractUrl": "/proceedings-article/test/1989/00082370/12OmNxFaLzs",
"parentPublication": {
"id": "proceedings/test/1989/9999/0",
"title": "1989 International Test Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icst/2017/6031/0/6031a253",
"title": "Uncertainty-Driven Black-Box Test Data Generation",
"doi": null,
"abstractUrl": "/proceedings-article/icst/2017/6031a253/12OmNxwncjZ",
"parentPublication": {
"id": "proceedings/icst/2017/6031/0",
"title": "2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2001/1372/0/13720489",
"title": "Requirement-Based Automated Black-Box Test Generation",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2001/13720489/12OmNyfdOJS",
"parentPublication": {
"id": "proceedings/compsac/2001/1372/0",
"title": "25th Annual International Computer Software and Applications Conference. COMPSAC 2001",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issre/1992/2975/0/00285854",
"title": "Analysis of large system black-box test data",
"doi": null,
"abstractUrl": "/proceedings-article/issre/1992/00285854/12OmNzTH10n",
"parentPublication": {
"id": "proceedings/issre/1992/2975/0",
"title": "Proceedings Third International Symposium on Software Reliability Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edtc/1994/5410/0/00326901",
"title": "Application of simple genetic algorithms to sequential circuit test generation",
"doi": null,
"abstractUrl": "/proceedings-article/edtc/1994/00326901/12OmNzVGcDf",
"parentPublication": {
"id": "proceedings/edtc/1994/5410/0",
"title": "Proceedings of European Design and Test Conference EDAC-ETC-EUROASIC",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/2016/04/07293669",
"title": "Black-Box String Test Case Generation through a Multi-Objective Optimization",
"doi": null,
"abstractUrl": "/journal/ts/2016/04/07293669/13rRUB6Sq2i",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issre/2021/2587/0/258700a231",
"title": "Black-Box and White-Box Test Case Generation for RESTful APIs: Enemies or Allies?",
"doi": null,
"abstractUrl": "/proceedings-article/issre/2021/258700a231/1AUp79BROTu",
"parentPublication": {
"id": "proceedings/issre/2021/2587/0",
"title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrkjVc0",
"title": "2015 IEEE 8th International Conference on Cloud Computing (CLOUD)",
"acronym": "cloud",
"groupId": "1002911",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzw8jc3",
"doi": "10.1109/CLOUD.2015.44",
"title": "Dynamic Memory and Core Scaling in Virtual Machines",
"normalizedTitle": "Dynamic Memory and Core Scaling in Virtual Machines",
"abstract": "The memory and core requirements of a virtual machine depend on the performance requirements of the applications hosted on it. In this paper, we propose algorithms for dynamic memory and core scaling using a combination of machine learning and feedback control techniques. These algorithms work for sequential and parallel applications such as scientific computations where speedup is the primary performance metric. Then we use these algorithms to address the simultaneous memory and core allocation problem, which is more complex due to possible correlation between these resource requirements. All these algorithms can be applied in a black box fashion without instrumenting the source code of applications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The memory and core requirements of a virtual machine depend on the performance requirements of the applications hosted on it. In this paper, we propose algorithms for dynamic memory and core scaling using a combination of machine learning and feedback control techniques. These algorithms work for sequential and parallel applications such as scientific computations where speedup is the primary performance metric. Then we use these algorithms to address the simultaneous memory and core allocation problem, which is more complex due to possible correlation between these resource requirements. All these algorithms can be applied in a black box fashion without instrumenting the source code of applications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The memory and core requirements of a virtual machine depend on the performance requirements of the applications hosted on it. In this paper, we propose algorithms for dynamic memory and core scaling using a combination of machine learning and feedback control techniques. These algorithms work for sequential and parallel applications such as scientific computations where speedup is the primary performance metric. Then we use these algorithms to address the simultaneous memory and core allocation problem, which is more complex due to possible correlation between these resource requirements. All these algorithms can be applied in a black box fashion without instrumenting the source code of applications.",
"fno": "7287a269",
"keywords": [
"Resource Management",
"Virtual Machining",
"Decision Trees",
"Heuristic Algorithms",
"Training",
"Predictive Models",
"Memory Management",
"Memory Scaling",
"Cloud Computing",
"Virtualization",
"Dynamic Resource Scaling",
"Core Scaling"
],
"authors": [
{
"affiliation": null,
"fullName": "Kapil Kumar",
"givenName": "Kapil",
"surname": "Kumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nehal J. Wani",
"givenName": "Nehal J.",
"surname": "Wani",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Suresh Purini",
"givenName": "Suresh",
"surname": "Purini",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cloud",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-06-01T00:00:00",
"pubType": "proceedings",
"pages": "269-276",
"year": "2015",
"issn": "2159-6190",
"isbn": "978-1-4673-7287-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7287a261",
"articleId": "12OmNyp9MjJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7287a277",
"articleId": "12OmNvqW6V1",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cloudcom/2013/5095/1/5095a218",
"title": "Maximizing Hypervisor Scalability Using Minimal Virtual Machines",
"doi": null,
"abstractUrl": "/proceedings-article/cloudcom/2013/5095a218/12OmNAndioA",
"parentPublication": {
"id": "proceedings/cloudcom/2013/5095/1",
"title": "2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloudcom/2013/5095/1/5095a452",
"title": "A Comparative Look at Adaptive Memory Management in Virtual Machines",
"doi": null,
"abstractUrl": "/proceedings-article/cloudcom/2013/5095a452/12OmNqAU6pd",
"parentPublication": {
"id": "proceedings/cloudcom/2013/5095/1",
"title": "2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rtcsa/2014/3953/0/06910521",
"title": "PUMA: Pseudo unified memory architecture for single-ISA heterogeneous multi-core systems",
"doi": null,
"abstractUrl": "/proceedings-article/rtcsa/2014/06910521/12OmNqBKUec",
"parentPublication": {
"id": "proceedings/rtcsa/2014/3953/0",
"title": "2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2014/5179/0/06850734",
"title": "Virtual Memory Streaming Technique for virtual machines (VMs) for rapid scaling and high performance in cloud environment",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2014/06850734/12OmNxYbSVJ",
"parentPublication": {
"id": "proceedings/iciev/2014/5179/0",
"title": "2014 International Conference on Informatics, Electronics & Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/candar/2015/9797/0/9797a613",
"title": "Dynamic Memory Allocation in Virtual Machines Based on Cache Hit Ratio",
"doi": null,
"abstractUrl": "/proceedings-article/candar/2015/9797a613/12OmNyUWQS2",
"parentPublication": {
"id": "proceedings/candar/2015/9797/0",
"title": "2015 Third International Symposium on Computing and Networking (CANDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1988/03/t0321",
"title": "Storage Management in Virtual Tree Machines",
"doi": null,
"abstractUrl": "/journal/tc/1988/03/t0321/13rRUwd9CF5",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2017/01/07120939",
"title": "High Performance and High Scalable Packet Classification Algorithm for Network Security Systems",
"doi": null,
"abstractUrl": "/journal/tq/2017/01/07120939/13rRUygT7zj",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloud/2018/7235/0/723501a285",
"title": "S-memV: Split Migration of Large-Memory Virtual Machines in IaaS Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/cloud/2018/723501a285/13xI8AQ5AJ3",
"parentPublication": {
"id": "proceedings/cloud/2018/7235/0",
"title": "2018 IEEE 11th International Conference on Cloud Computing (CLOUD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cluster/2018/8319/0/831900a164",
"title": "A Non-blocking Buddy System for Scalable Memory Allocation on Multi-core Machines",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2018/831900a164/17D45VW8brH",
"parentPublication": {
"id": "proceedings/cluster/2018/8319/0",
"title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300a833",
"title": "Transparent IDS Offloading for Split-Memory Virtual Machines",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300a833/1nkDeURtrpu",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1rSR7vfukX6",
"title": "2020 24th International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1rSRaUod7Es",
"doi": "10.1109/IV51561.2020.00052",
"title": "Interactive Visual Self-service Data Classification Approach to Democratize Machine Learning",
"normalizedTitle": "Interactive Visual Self-service Data Classification Approach to Democratize Machine Learning",
"abstract": "Although machine learning algorithms are progressively used in an expansive range of domains, the effective machine learning classifiers are often black-boxed, non-comprehensive to the end users and beyond their abilities to develop models themselves. To overcome this challenge, data visualization combined with self-service or democratized machine learning is proposed in the form of the Iterative Logical Classifier (ILC) algorithm with an added advantage of outperforming the accuracies of black-box machine learning classifiers on benchmark datasets. The algorithm is based on the concept of Shifted Paired Coordinates that allow 2-D visualization of n-D data without loss of n-D information.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Although machine learning algorithms are progressively used in an expansive range of domains, the effective machine learning classifiers are often black-boxed, non-comprehensive to the end users and beyond their abilities to develop models themselves. To overcome this challenge, data visualization combined with self-service or democratized machine learning is proposed in the form of the Iterative Logical Classifier (ILC) algorithm with an added advantage of outperforming the accuracies of black-box machine learning classifiers on benchmark datasets. The algorithm is based on the concept of Shifted Paired Coordinates that allow 2-D visualization of n-D data without loss of n-D information.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Although machine learning algorithms are progressively used in an expansive range of domains, the effective machine learning classifiers are often black-boxed, non-comprehensive to the end users and beyond their abilities to develop models themselves. To overcome this challenge, data visualization combined with self-service or democratized machine learning is proposed in the form of the Iterative Logical Classifier (ILC) algorithm with an added advantage of outperforming the accuracies of black-box machine learning classifiers on benchmark datasets. The algorithm is based on the concept of Shifted Paired Coordinates that allow 2-D visualization of n-D data without loss of n-D information.",
"fno": "913400a280",
"keywords": [
"Data Visualisation",
"Learning Artificial Intelligence",
"Pattern Classification",
"Interactive Visual Self Service Data Classification Approach",
"Machine Learning Algorithms",
"Effective Machine Learning Classifiers",
"End Users",
"Data Visualization",
"Democratized Machine Learning",
"Black Box Machine",
"Iterative Logical Classifier Algorithm",
"Visualization",
"Machine Learning Algorithms",
"Automation",
"Data Visualization",
"Machine Learning",
"Iterative Algorithms",
"Classification Algorithms",
"Self Service Machine Learning",
"Interactive Data Visualization",
"Logical Classifier",
"Auto ML"
],
"authors": [
{
"affiliation": "Central Washington University,Dept. of Computer Science,Ellensburg,Washington,USA",
"fullName": "Sridevi Narayana Wagle",
"givenName": "Sridevi Narayana",
"surname": "Wagle",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Central Washington University,Dept. of Computer Science,Ellensburg,Washington,USA",
"fullName": "Boris Kovalerchuk",
"givenName": "Boris",
"surname": "Kovalerchuk",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-09-01T00:00:00",
"pubType": "proceedings",
"pages": "280-285",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9134-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "913400a270",
"articleId": "1rSRbeF6VC8",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "913400a286",
"articleId": "1rSRe4p5eAE",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sibgrapi/2010/8420/0/05720365",
"title": "How Far You Can Get Using Machine Learning Black-Boxes",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2010/05720365/12OmNBv2Ce3",
"parentPublication": {
"id": "proceedings/sibgrapi/2010/8420/0",
"title": "2010 23rd SIBGRAPI Conference on Graphics, Patterns and Images",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2010/01/mcg2010010008",
"title": "Visual Classification: Expert Knowledge Guides Machine Learning",
"doi": null,
"abstractUrl": "/magazine/cg/2010/01/mcg2010010008/13rRUyfKIKB",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icci*cc/2021/2119/0/09811333",
"title": "An Interactive Approach to Bias Mitigation in Machine Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icci*cc/2021/09811333/1EJGHuCmPew",
"parentPublication": {
"id": "proceedings/icci*cc/2021/2119/0",
"title": "2021 IEEE 20th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/istm/2022/7116/0/711600a065",
"title": "Visualization of Machine Learning Dynamics in Tsetlin Machines",
"doi": null,
"abstractUrl": "/proceedings-article/istm/2022/711600a065/1HJzF7ZWhEI",
"parentPublication": {
"id": "proceedings/istm/2022/7116/0",
"title": "2022 International Symposium on the Tsetlin Machine (ISTM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2023/5719/0/10074542",
"title": "IP Transformation Initiatives to Generate Scalable Functional Verification Collaterals for Smart Reusability and Reduced Effort for Sign-off",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2023/10074542/1LKwG8VPuRW",
"parentPublication": {
"id": "proceedings/icnc/2023/5719/0",
"title": "2023 International Conference on Computing, Networking and Communications (ICNC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/01/08812988",
"title": "Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics",
"doi": null,
"abstractUrl": "/journal/tg/2020/01/08812988/1cOhCfAgaZO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-&-icivpr/2019/0786/0/08858538",
"title": "Tutorial 2: Visual Knowledge Discovery and Machine Learning",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-&-icivpr/2019/08858538/1dUmNW1N5uw",
"parentPublication": {
"id": "proceedings/iciev-&-icivpr/2019/0786/0",
"title": "2019 Joint 8th International Conference on Informatics, Electronics & Vision (ICIEV) and 2019 3rd International Conference on Imaging, Vision & Pattern Recognition (icIVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2020/06/09238590",
"title": "Challenges in Evaluating Interactive Visual Machine Learning Systems",
"doi": null,
"abstractUrl": "/magazine/cg/2020/06/09238590/1oa1K34H1Pq",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2021/3827/0/382700a189",
"title": "Full interpretable machine learning in 2D with inline coordinates",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2021/382700a189/1y4oKvJBQZy",
"parentPublication": {
"id": "proceedings/iv/2021/3827/0",
"title": "2021 25th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2021/3335/0/333500a031",
"title": "AdViCE: Aggregated Visual Counterfactual Explanations for Machine Learning Model Validation",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2021/333500a031/1yXu7JvSbio",
"parentPublication": {
"id": "proceedings/vis/2021/3335/0",
"title": "2021 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1tYs52F2A80",
"title": "2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)",
"acronym": "icstw",
"groupId": "1001791",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1tYs7UmMNUc",
"doi": "10.1109/ICSTW52544.2021.00019",
"title": "A Combinatorial Approach to Explaining Image Classifiers",
"normalizedTitle": "A Combinatorial Approach to Explaining Image Classifiers",
"abstract": "Machine Learning (ML) models, a core component to artificial intelligence systems, often come as a black box to the user, leading to the problem of interpretability. Explainable Artificial Intelligence (XAI) is key to providing confidence and trustworthiness for machine learning-based software systems. We observe a fundamental connection between XAI and software fault localization. In this paper, we present an approach that uses BEN, a combinatorial testing-based software fault localization approach, to produce explanations for decisions made by ML models.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Machine Learning (ML) models, a core component to artificial intelligence systems, often come as a black box to the user, leading to the problem of interpretability. Explainable Artificial Intelligence (XAI) is key to providing confidence and trustworthiness for machine learning-based software systems. We observe a fundamental connection between XAI and software fault localization. In this paper, we present an approach that uses BEN, a combinatorial testing-based software fault localization approach, to produce explanations for decisions made by ML models.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Machine Learning (ML) models, a core component to artificial intelligence systems, often come as a black box to the user, leading to the problem of interpretability. Explainable Artificial Intelligence (XAI) is key to providing confidence and trustworthiness for machine learning-based software systems. We observe a fundamental connection between XAI and software fault localization. In this paper, we present an approach that uses BEN, a combinatorial testing-based software fault localization approach, to produce explanations for decisions made by ML models.",
"fno": "445600a035",
"keywords": [
"Combinatorial Mathematics",
"Explanation",
"Image Classification",
"Learning Artificial Intelligence",
"Program Testing",
"Software Fault Tolerance",
"Explainable Artificial Intelligence",
"XAI",
"Trustworthiness",
"Machine Learning",
"Image Classifiers",
"Artificial Intelligence Systems",
"Black Box",
"Software Systems",
"BEN",
"Combinatorial Testing Based Software Fault Localization",
"Location Awareness",
"Software Testing",
"Conferences",
"Machine Learning",
"Software Systems",
"Explainability",
"Deep Learning",
"Software Testing",
"Debugging DNN Models",
"Explainable AI",
"Combinatorial Testing",
"Image Classifiers",
"Model Agnostic",
"Counterfactual Explanation",
"Instance Level Explanations"
],
"authors": [
{
"affiliation": "The University of Texas at Arlington,Department of Computer Science & Engineering,Arlington,USA",
"fullName": "Jaganmohan Chandrasekaran",
"givenName": "Jaganmohan",
"surname": "Chandrasekaran",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Texas at Arlington,Department of Computer Science & Engineering,Arlington,USA",
"fullName": "Yu Lei",
"givenName": "Yu",
"surname": "Lei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Texas at Arlington,Department of Computer Science & Engineering,Arlington,USA",
"fullName": "Raghu Kacker",
"givenName": "Raghu",
"surname": "Kacker",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National Institute of Standards and Technology,Information Technology Lab,Gaithersburg,USA",
"fullName": "D. Richard Kuhn",
"givenName": "D.",
"surname": "Richard Kuhn",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icstw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-04-01T00:00:00",
"pubType": "proceedings",
"pages": "35-43",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4456-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "445600a025",
"articleId": "1tYs9Infd8A",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "445600a044",
"articleId": "1tYs6xyYTza",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icstw/2015/1885/0/07107446",
"title": "BEN: A combinatorial testing-based fault localization tool",
"doi": null,
"abstractUrl": "/proceedings-article/icstw/2015/07107446/12OmNzuZUEL",
"parentPublication": {
"id": "proceedings/icstw/2015/1885/0",
"title": "2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2022/01/09693359",
"title": "Visual Analytics for Human-Centered Machine Learning",
"doi": null,
"abstractUrl": "/magazine/cg/2022/01/09693359/1As7zEHCGn6",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2022/2197/0/219700a226",
"title": "Explaining Anomalies in Industrial Multivariate Time-series Data with the help of eXplainable AI",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2022/219700a226/1BYIwtXCdwI",
"parentPublication": {
"id": "proceedings/bigcomp/2022/2197/0",
"title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0/806900a157",
"title": "Research on Face Recognition Algorithm Based on CNN and Image Super-resolution Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2022/806900a157/1EykGBLt3NK",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0",
"title": "2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aitest/2022/8737/0/873700a103",
"title": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/aitest/2022/873700a103/1GZjWCUDVLO",
"parentPublication": {
"id": "proceedings/aitest/2022/8737/0",
"title": "2022 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020248",
"title": "Towards XAI in the SOC – a user centric study of explainable alerts with SHAP and LIME",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020248/1KfRwTAE6dy",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2023/5719/0/10074246",
"title": "Shallow- and Deep- fake Image Manipulation Localization Using Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2023/10074246/1LKwCYkl89q",
"parentPublication": {
"id": "proceedings/icnc/2023/5719/0",
"title": "2023 International Conference on Computing, Networking and Communications (ICNC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icstw/2020/1075/0/09155831",
"title": "Combinatorial Methods for Explainable AI",
"doi": null,
"abstractUrl": "/proceedings-article/icstw/2020/09155831/1m1jp7wnAOI",
"parentPublication": {
"id": "proceedings/icstw/2020/1075/0",
"title": "2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/2021/10/09548017",
"title": "Explainable artificial intelligence and machine learning [Guest Editors’ introduction]",
"doi": null,
"abstractUrl": "/magazine/co/2021/10/09548017/1x9TJ21taBW",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/2022/06/09645355",
"title": "Recent Advances in Trustworthy Explainable Artificial Intelligence: Status, Challenges, and Perspectives",
"doi": null,
"abstractUrl": "/journal/ai/2022/06/09645355/1zc6Hmkb1xm",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyuPL0n",
"title": "2018 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"acronym": "bigcomp",
"groupId": "1803439",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvStcuR",
"doi": "10.1109/BigComp.2018.00148",
"title": "A Clustering Based Adaptive Sequence-to-Sequence Model for Dialogue Systems",
"normalizedTitle": "A Clustering Based Adaptive Sequence-to-Sequence Model for Dialogue Systems",
"abstract": "Dialogue systems which can communicate with people in natural language is popularly used in entertainments and language learning tools. As the development of deep neural networks, Sequence-to-Sequence models become the main stream models of conversation generation tasks which are the key part of dialogue systems, because Sequence-to-Sequence models is good at dealing with the tasks like machine translation and conversation generation whose input's length and output's length is unknown previously. However, recent works find that Sequence-to-Sequence models tend to respond in dull sentences. We propose a clustering based adaptive Sequence-to-Sequence model to improve the performance of dialogue systems. Different with previous models who treat all the dialogue data as input of a single model, we cluster the dialogue data and use several Sequence-to-Sequence models to train different cluster of data to catch different characteristic in different cluster. Our experiments show that our models can improve the performance of dialogue systems.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Dialogue systems which can communicate with people in natural language is popularly used in entertainments and language learning tools. As the development of deep neural networks, Sequence-to-Sequence models become the main stream models of conversation generation tasks which are the key part of dialogue systems, because Sequence-to-Sequence models is good at dealing with the tasks like machine translation and conversation generation whose input's length and output's length is unknown previously. However, recent works find that Sequence-to-Sequence models tend to respond in dull sentences. We propose a clustering based adaptive Sequence-to-Sequence model to improve the performance of dialogue systems. Different with previous models who treat all the dialogue data as input of a single model, we cluster the dialogue data and use several Sequence-to-Sequence models to train different cluster of data to catch different characteristic in different cluster. Our experiments show that our models can improve the performance of dialogue systems.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Dialogue systems which can communicate with people in natural language is popularly used in entertainments and language learning tools. As the development of deep neural networks, Sequence-to-Sequence models become the main stream models of conversation generation tasks which are the key part of dialogue systems, because Sequence-to-Sequence models is good at dealing with the tasks like machine translation and conversation generation whose input's length and output's length is unknown previously. However, recent works find that Sequence-to-Sequence models tend to respond in dull sentences. We propose a clustering based adaptive Sequence-to-Sequence model to improve the performance of dialogue systems. Different with previous models who treat all the dialogue data as input of a single model, we cluster the dialogue data and use several Sequence-to-Sequence models to train different cluster of data to catch different characteristic in different cluster. Our experiments show that our models can improve the performance of dialogue systems.",
"fno": "364901a775",
"keywords": [
"Interactive Systems",
"Natural Language Processing",
"Neural Nets",
"Pattern Clustering",
"Dialogue Systems",
"Clustering Based Adaptive Sequence To Sequence Model",
"Natural Language",
"Conversation Generation Tasks",
"Deep Neural Networks",
"Data Models",
"Task Analysis",
"Adaptation Models",
"Logic Gates",
"Recurrent Neural Networks",
"Speech Recognition",
"Dialogue Systems",
"Conversation Generation",
"A Clustering Based Adaptive Sequence To Sequence Model"
],
"authors": [
{
"affiliation": null,
"fullName": "Da Ren",
"givenName": "Da",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yi Cai",
"givenName": "Yi",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wai Hong Chan",
"givenName": "Wai Hong",
"surname": "Chan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zongxi Li",
"givenName": "Zongxi",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bigcomp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-01-01T00:00:00",
"pubType": "proceedings",
"pages": "775-781",
"year": "2018",
"issn": "2375-9356",
"isbn": "978-1-5386-3649-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "364901a771",
"articleId": "12OmNxbmSBb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "364901a783",
"articleId": "12OmNC8dgfc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/nbis/2016/0979/0/0979a464",
"title": "Related Word Recommendation Mechanism for Speech Dialogue System",
"doi": null,
"abstractUrl": "/proceedings-article/nbis/2016/0979a464/12OmNCga1Um",
"parentPublication": {
"id": "proceedings/nbis/2016/0979/0",
"title": "2016 19th International Conference on Network-Based Information Systems (NBiS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percomw/2010/6605/0/05470518",
"title": "OwlSpeak - adaptive spoken dialogue within Intelligent Environments",
"doi": null,
"abstractUrl": "/proceedings-article/percomw/2010/05470518/12OmNqGA4Y1",
"parentPublication": {
"id": "proceedings/percomw/2010/6605/0",
"title": "2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2002/7402/1/05743648",
"title": "Adaptive language models for spoken dialogue systems",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2002/05743648/12OmNyQpgR4",
"parentPublication": {
"id": "proceedings/icassp/2002/7402/1",
"title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2018/2666/1/266601a761",
"title": "Long Short-Term Memory Neural Networks for Artificial Dialogue Generation",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2018/266601a761/144U9aqDqtN",
"parentPublication": {
"id": "proceedings/compsac/2018/2666/2",
"title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956081",
"title": "Improving Persona Understanding for Persona-based Dialogue Generation with Diverse Knowledge Selection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956081/1IHoGhzlKTe",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2023/8263/0/826300a131",
"title": "A Graph-to-Sequence Model for Joint Intent Detection and Slot Filling",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2023/826300a131/1LFKSCyVanK",
"parentPublication": {
"id": "proceedings/icsc/2023/8263/0",
"title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cyberc/2022/3154/0/315400a240",
"title": "A Relation Enhanced Model For Abstractive Dialogue Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/cyberc/2022/315400a240/1M66lLveMCI",
"parentPublication": {
"id": "proceedings/cyberc/2022/3154/0",
"title": "2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cibda/2020/9837/0/983700a416",
"title": "Memory-Augmented Dialogue State Tracker in Task-Oriented Dialogue System",
"doi": null,
"abstractUrl": "/proceedings-article/cibda/2020/983700a416/1lO1J0nlM2Y",
"parentPublication": {
"id": "proceedings/cibda/2020/9837/0",
"title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisce/2020/9761/0/976100a245",
"title": "Multi-turn Dialogue System Based on Improved Seq2Seq Model",
"doi": null,
"abstractUrl": "/proceedings-article/cisce/2020/976100a245/1oUCVAQACiI",
"parentPublication": {
"id": "proceedings/cisce/2020/9761/0",
"title": "2020 International Conference on Communications, Information System and Computer Engineering (CISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icws/2021/1681/0/168100a335",
"title": "DGPF:A Dialogue Goal Planning Framework for Cognitive Service Conversational Bot",
"doi": null,
"abstractUrl": "/proceedings-article/icws/2021/168100a335/1yrHEJBV9uM",
"parentPublication": {
"id": "proceedings/icws/2021/1681/0",
"title": "2021 IEEE International Conference on Web Services (ICWS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1Ehs8VOTOko",
"title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)",
"acronym": "icse-seip",
"groupId": "1820885",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1EhsbBawG2s",
"doi": "10.1109/ICSE-SEIP55303.2022.9794112",
"title": "Counterfactual Explanations for Models of Code",
"normalizedTitle": "Counterfactual Explanations for Models of Code",
"abstract": "Machine learning (ML) models play an increasingly prevalent role in many software engineering tasks. However, because most models are now powered by opaque deep neural networks, it can be difficult for developers to understand why the model came to a certain conclusion and how to act upon the model's prediction. Motivated by this problem, this paper explores counterfactual explanations for models of source code. Such counterfactual explanations constitute minimal changes to the source code under which the model “changes its mind”. We integrate counterfactual explanation generation to models of source code in a real-world setting. We describe considerations that impact both the ability to find realistic and plausible counterfactual explanations, as well as the usefulness of such explanation to the developers that use the model. In a series of experiments we investigate the efficacy of our approach on three different models, each based on a BERT-like architecture operating over source code.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Machine learning (ML) models play an increasingly prevalent role in many software engineering tasks. However, because most models are now powered by opaque deep neural networks, it can be difficult for developers to understand why the model came to a certain conclusion and how to act upon the model's prediction. Motivated by this problem, this paper explores counterfactual explanations for models of source code. Such counterfactual explanations constitute minimal changes to the source code under which the model “changes its mind”. We integrate counterfactual explanation generation to models of source code in a real-world setting. We describe considerations that impact both the ability to find realistic and plausible counterfactual explanations, as well as the usefulness of such explanation to the developers that use the model. In a series of experiments we investigate the efficacy of our approach on three different models, each based on a BERT-like architecture operating over source code.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Machine learning (ML) models play an increasingly prevalent role in many software engineering tasks. However, because most models are now powered by opaque deep neural networks, it can be difficult for developers to understand why the model came to a certain conclusion and how to act upon the model's prediction. Motivated by this problem, this paper explores counterfactual explanations for models of source code. Such counterfactual explanations constitute minimal changes to the source code under which the model “changes its mind”. We integrate counterfactual explanation generation to models of source code in a real-world setting. We describe considerations that impact both the ability to find realistic and plausible counterfactual explanations, as well as the usefulness of such explanation to the developers that use the model. In a series of experiments we investigate the efficacy of our approach on three different models, each based on a BERT-like architecture operating over source code.",
"fno": "959000a125",
"keywords": [
"Learning Artificial Intelligence",
"Natural Language Processing",
"Neural Nets",
"Software Engineering",
"Source Code Software",
"Realistic Explanations",
"Source Code",
"Machine Learning Models",
"Software Engineering Tasks",
"Opaque Deep Neural Networks",
"Counterfactual Explanation Generation",
"BERT Like Architecture Operating",
"Codes",
"Perturbation Methods",
"Neural Networks",
"Prototypes",
"Predictive Models",
"Software",
"Task Analysis"
],
"authors": [
{
"affiliation": "TU Wien and Meta Platforms, Inc.,Austria",
"fullName": "Jürgen Cito",
"givenName": "Jürgen",
"surname": "Cito",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "UT Austin,U.S.A.",
"fullName": "Isil Dillig",
"givenName": "Isil",
"surname": "Dillig",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Meta Platforms, Inc.,U.S.A.",
"fullName": "Vijayaraghavan Murali",
"givenName": "Vijayaraghavan",
"surname": "Murali",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Meta Platforms, Inc.,U.S.A.",
"fullName": "Satish Chandra",
"givenName": "Satish",
"surname": "Chandra",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icse-seip",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-05-01T00:00:00",
"pubType": "proceedings",
"pages": "125-134",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9590-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "959000a115",
"articleId": "1Ehsguiq0a4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "959000a135",
"articleId": "1Ehsc4FFOec",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cscc/2021/2749/0/274900a120",
"title": "A Case Study of Interpretable Counterfactual Explanations for the Task of Predicting Student Academic Performance",
"doi": null,
"abstractUrl": "/proceedings-article/cscc/2021/274900a120/1A3hJ1VxKFO",
"parentPublication": {
"id": "proceedings/cscc/2021/2749/0",
"title": "2021 25th International Conference on Circuits, Systems, Communications and Computers (CSCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200b036",
"title": "Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200b036/1BmEYixVeEg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2023/02/09827583",
"title": "Explaining Black Box Drug Target Prediction Through Model Agnostic Counterfactual Samples",
"doi": null,
"abstractUrl": "/journal/tb/2023/02/09827583/1EWSqX96zF6",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/saner/2022/3786/0/378600a526",
"title": "Semantic Robustness of Models of Source Code",
"doi": null,
"abstractUrl": "/proceedings-article/saner/2022/378600a526/1FbT6LaU8ww",
"parentPublication": {
"id": "proceedings/saner/2022/3786/0",
"title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aitest/2022/8737/0/873700a103",
"title": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/aitest/2022/873700a103/1GZjWCUDVLO",
"parentPublication": {
"id": "proceedings/aitest/2022/8737/0",
"title": "2022 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09960739",
"title": "Explain the Explainer: Interpreting Model-Agnostic Counterfactual Explanations of a Deep Reinforcement Learning Agent",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09960739/1Ixw1BnABeo",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020866",
"title": "SG-CF: Shapelet-Guided Counterfactual Explanation for Time Series Classification",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020866/1KfT6GOdCNi",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800i978",
"title": "SCOUT: Self-Aware Discriminant Counterfactual Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800i978/1m3nF9S7iRq",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09229232",
"title": "DECE: Decision Explorer with Counterfactual Explanations for Machine Learning Models",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09229232/1o3nAe6qces",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b466",
"title": "DisCERN: Discovering Counterfactual Explanations using Relevance Features from Neighbourhoods",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b466/1zw6d42xCmY",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1GZwrRo4Qjm",
"title": "2022 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"acronym": "aitest",
"groupId": "1831724",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1GZjWCUDVLO",
"doi": "10.1109/AITest55621.2022.00023",
"title": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations",
"normalizedTitle": "DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations",
"abstract": "The profound black-box nature of Machine Learning (ML) based Artificial Intelligence (AI) systems leads to the problem of interpretability. Explainable Artificial Intelligence (XAI) tries to provide explanations to human users to understand the decisions made by ML-based systems. In this paper, we propose a software debugging-based approach called DeltaExplainer for generating counterfactual explanations for predictions made by ML models. The key insight of our approach is that the problem of XAI is similar to the problem of software debugging. We evaluate DeltaExplainer on eight ML models trained using real-world datasets. We compare DeltaExplainer to two state-of-the-art counterfactual explanation tools, i.e., DiCE and GeCo. Our experimental results suggest that the proposed approach can successfully generate counterfactual explanations and, in most cases, generate better explanations than DiCE and GeCo.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The profound black-box nature of Machine Learning (ML) based Artificial Intelligence (AI) systems leads to the problem of interpretability. Explainable Artificial Intelligence (XAI) tries to provide explanations to human users to understand the decisions made by ML-based systems. In this paper, we propose a software debugging-based approach called DeltaExplainer for generating counterfactual explanations for predictions made by ML models. The key insight of our approach is that the problem of XAI is similar to the problem of software debugging. We evaluate DeltaExplainer on eight ML models trained using real-world datasets. We compare DeltaExplainer to two state-of-the-art counterfactual explanation tools, i.e., DiCE and GeCo. Our experimental results suggest that the proposed approach can successfully generate counterfactual explanations and, in most cases, generate better explanations than DiCE and GeCo.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The profound black-box nature of Machine Learning (ML) based Artificial Intelligence (AI) systems leads to the problem of interpretability. Explainable Artificial Intelligence (XAI) tries to provide explanations to human users to understand the decisions made by ML-based systems. In this paper, we propose a software debugging-based approach called DeltaExplainer for generating counterfactual explanations for predictions made by ML models. The key insight of our approach is that the problem of XAI is similar to the problem of software debugging. We evaluate DeltaExplainer on eight ML models trained using real-world datasets. We compare DeltaExplainer to two state-of-the-art counterfactual explanation tools, i.e., DiCE and GeCo. Our experimental results suggest that the proposed approach can successfully generate counterfactual explanations and, in most cases, generate better explanations than DiCE and GeCo.",
"fno": "873700a103",
"keywords": [
"Learning Artificial Intelligence",
"Program Debugging",
"Delta Explainer",
"Software Debugging Approach",
"Counterfactual Explanations",
"Artificial Intelligence Systems",
"Explainable Artificial Intelligence",
"XAI",
"Human Users",
"ML Based Systems",
"Software Debugging Based Approach",
"ML Models",
"State Of The Art Counterfactual Explanation Tools",
"Di CE",
"Ge Co",
"Machine Learning",
"Predictive Models",
"Software Debugging",
"Testing",
"Explainable AI",
"Debugging",
"XAI",
"Delta Debugging",
"Counterfactuals"
],
"authors": [
{
"affiliation": "The University of Texas at Arlington,Dept. of Computer Science and Engineering,Arlington,Texas,USA,76019",
"fullName": "Sunny Shree",
"givenName": "Sunny",
"surname": "Shree",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Commonwealth Cyber Initiative (CCI), Virginia Tech,Arlington,Virginia,USA,22203",
"fullName": "Jaganmohan Chandrasekaran",
"givenName": "Jaganmohan",
"surname": "Chandrasekaran",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Texas at Arlington,Dept. of Computer Science and Engineering,Arlington,Texas,USA,76019",
"fullName": "Yu Lei",
"givenName": "Yu",
"surname": "Lei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technology Laboratory, National Institute of Standards and Technology,Gaithersburg,Maryland,USA,20899",
"fullName": "Raghu N. Kacker",
"givenName": "Raghu N.",
"surname": "Kacker",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technology Laboratory, National Institute of Standards and Technology,Gaithersburg,Maryland,USA,20899",
"fullName": "D. Richard Kuhn",
"givenName": "D. Richard",
"surname": "Kuhn",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "aitest",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-08-01T00:00:00",
"pubType": "proceedings",
"pages": "103-110",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8737-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "873700a095",
"articleId": "1GZwsoaKmLm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "873700a111",
"articleId": "1GZwucCJRC0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cscc/2021/2749/0/274900a120",
"title": "A Case Study of Interpretable Counterfactual Explanations for the Task of Predicting Student Academic Performance",
"doi": null,
"abstractUrl": "/proceedings-article/cscc/2021/274900a120/1A3hJ1VxKFO",
"parentPublication": {
"id": "proceedings/cscc/2021/2749/0",
"title": "2021 25th International Conference on Circuits, Systems, Communications and Computers (CSCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200b036",
"title": "Beyond Trivial Counterfactual Explanations with Diverse Valuable Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200b036/1BmEYixVeEg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2023/02/09827583",
"title": "Explaining Black Box Drug Target Prediction Through Model Agnostic Counterfactual Samples",
"doi": null,
"abstractUrl": "/journal/tb/2023/02/09827583/1EWSqX96zF6",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-seip/2022/9590/0/959000a125",
"title": "Counterfactual Explanations for Models of Code",
"doi": null,
"abstractUrl": "/proceedings-article/icse-seip/2022/959000a125/1EhsbBawG2s",
"parentPublication": {
"id": "proceedings/icse-seip/2022/9590/0",
"title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09960739",
"title": "Explain the Explainer: Interpreting Model-Agnostic Counterfactual Explanations of a Deep Reinforcement Learning Agent",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09960739/1Ixw1BnABeo",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020866",
"title": "SG-CF: Shapelet-Guided Counterfactual Explanation for Time Series Classification",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020866/1KfT6GOdCNi",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800i978",
"title": "SCOUT: Self-Aware Discriminant Counterfactual Explanations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800i978/1m3nF9S7iRq",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09229232",
"title": "DECE: Decision Explorer with Counterfactual Explanations for Machine Learning Models",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09229232/1o3nAe6qces",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2021/3335/0/333500a031",
"title": "AdViCE: Aggregated Visual Counterfactual Explanations for Machine Learning Model Validation",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2021/333500a031/1yXu7JvSbio",
"parentPublication": {
"id": "proceedings/vis/2021/3335/0",
"title": "2021 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b466",
"title": "DisCERN: Discovering Counterfactual Explanations using Relevance Features from Neighbourhoods",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b466/1zw6d42xCmY",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cTJfoCxsFa",
"title": "2019 IEEE International Congress on Internet of Things (ICIOT)",
"acronym": "iciot",
"groupId": "1821944",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cTJhjBiWZO",
"doi": "10.1109/ICIOT.2019.00029",
"title": "Forecasting Building Energy Consumption with Deep Learning: A Sequence to Sequence Approach",
"normalizedTitle": "Forecasting Building Energy Consumption with Deep Learning: A Sequence to Sequence Approach",
"abstract": "Energy Consumption has been continuously increasing due to the rapid expansion of high-density cities, and growth in the industrial and commercial sectors. To reduce the negative impact on the environment and improve sustainability, it is crucial to efficiently manage energy consumption. Internet of Things (IoT) devices, including widely used smart meters, have created possibilities for energy monitoring as well as for sensor based energy forecasting. Machine learning algorithms commonly used for energy forecasting such as feedforward neural networks are not well-suited for interpreting the time dimensionality of a signal. Consequently, this paper uses Recurrent Neural Networks (RNN) to capture time dependencies and proposes a novel energy load forecasting methodology based on sample generation and Sequence-to-Sequence (S2S) deep learning algorithm. The S2S architecture that is commonly used for language translation was adapted for energy load forecasting. Experiments focus on Gated Recurrent Unit (GRU) based S2S models and Long Short-Term Memory (LSTM) based S2S models. All models were trained and tested on one building-level electrical consumption dataset, with five-minute incremental data. Results showed that, on average, the GRU S2S models outperformed LSTM S2S, RNN S2S, and Deep Neural Network models, for short, medium, and long-term forecasting lengths.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Energy Consumption has been continuously increasing due to the rapid expansion of high-density cities, and growth in the industrial and commercial sectors. To reduce the negative impact on the environment and improve sustainability, it is crucial to efficiently manage energy consumption. Internet of Things (IoT) devices, including widely used smart meters, have created possibilities for energy monitoring as well as for sensor based energy forecasting. Machine learning algorithms commonly used for energy forecasting such as feedforward neural networks are not well-suited for interpreting the time dimensionality of a signal. Consequently, this paper uses Recurrent Neural Networks (RNN) to capture time dependencies and proposes a novel energy load forecasting methodology based on sample generation and Sequence-to-Sequence (S2S) deep learning algorithm. The S2S architecture that is commonly used for language translation was adapted for energy load forecasting. Experiments focus on Gated Recurrent Unit (GRU) based S2S models and Long Short-Term Memory (LSTM) based S2S models. All models were trained and tested on one building-level electrical consumption dataset, with five-minute incremental data. Results showed that, on average, the GRU S2S models outperformed LSTM S2S, RNN S2S, and Deep Neural Network models, for short, medium, and long-term forecasting lengths.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Energy Consumption has been continuously increasing due to the rapid expansion of high-density cities, and growth in the industrial and commercial sectors. To reduce the negative impact on the environment and improve sustainability, it is crucial to efficiently manage energy consumption. Internet of Things (IoT) devices, including widely used smart meters, have created possibilities for energy monitoring as well as for sensor based energy forecasting. Machine learning algorithms commonly used for energy forecasting such as feedforward neural networks are not well-suited for interpreting the time dimensionality of a signal. Consequently, this paper uses Recurrent Neural Networks (RNN) to capture time dependencies and proposes a novel energy load forecasting methodology based on sample generation and Sequence-to-Sequence (S2S) deep learning algorithm. The S2S architecture that is commonly used for language translation was adapted for energy load forecasting. Experiments focus on Gated Recurrent Unit (GRU) based S2S models and Long Short-Term Memory (LSTM) based S2S models. All models were trained and tested on one building-level electrical consumption dataset, with five-minute incremental data. Results showed that, on average, the GRU S2S models outperformed LSTM S2S, RNN S2S, and Deep Neural Network models, for short, medium, and long-term forecasting lengths.",
"fno": "271400a108",
"keywords": [
"Building Management Systems",
"Energy Consumption",
"Internet Of Things",
"Learning Artificial Intelligence",
"Load Forecasting",
"Power Engineering Computing",
"Power System Measurement",
"Recurrent Neural Nets",
"Sensor Fusion",
"Smart Meters",
"Energy Monitoring",
"Sensor Based Energy Forecasting",
"Energy Load Forecasting Methodology",
"Sequence To Sequence Deep Learning Algorithm",
"S 2 S Models",
"Building Energy Consumption",
"Internet Of Things",
"Smart Meters",
"Recurrent Neural Networks",
"Load Modeling",
"Predictive Models",
"Logic Gates",
"Energy Consumption",
"Forecasting",
"Neural Networks",
"Data Models",
"Deep Learning Energy Load Forecasting Recurrent Neural Networks Sequence To Sequence Gated Recurrent Units GRU Long Short Term Memory LSTM"
],
"authors": [
{
"affiliation": "Western University",
"fullName": "Ljubisa Sehovac",
"givenName": "Ljubisa",
"surname": "Sehovac",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Western University",
"fullName": "Cornelius Nesen",
"givenName": "Cornelius",
"surname": "Nesen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Western University",
"fullName": "Katarina Grolinger",
"givenName": "Katarina",
"surname": "Grolinger",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciot",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-07-01T00:00:00",
"pubType": "proceedings",
"pages": "108-116",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-2714-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "271400a091",
"articleId": "1cTJg3bbRYI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "271400a076",
"articleId": "1cTJg9vtvJS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icei/2018/4131/0/413101a146",
"title": "Energy Load Forecasting Using Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icei/2018/413101a146/12OmNzd7bDo",
"parentPublication": {
"id": "proceedings/icei/2018/4131/0",
"title": "2018 IEEE International Conference on Energy Internet (ICEI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/paap/2018/9403/0/940300a171",
"title": "Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework",
"doi": null,
"abstractUrl": "/proceedings-article/paap/2018/940300a171/19JE9MimPza",
"parentPublication": {
"id": "proceedings/paap/2018/9403/0",
"title": "2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icei/2021/0734/0/073400a079",
"title": "A Novel Forecasting Method for Short-term Load based on TCN-GRU Model",
"doi": null,
"abstractUrl": "/proceedings-article/icei/2021/073400a079/1APqcNv7Gw0",
"parentPublication": {
"id": "proceedings/icei/2021/0734/0",
"title": "2021 IEEE International Conference on Energy Internet (ICEI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700b490",
"title": "Microgrid Forecasting Using Multiple Deep learning Models",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700b490/1DNCM2MMvlK",
"parentPublication": {
"id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0",
"title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aqtr/2022/7933/0/09801969",
"title": "Efficient Load Forecasting Model Assessment for Embedded Building Energy Management Systems",
"doi": null,
"abstractUrl": "/proceedings-article/aqtr/2022/09801969/1Err6DUBhlK",
"parentPublication": {
"id": "proceedings/aqtr/2022/7933/0",
"title": "2022 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927829",
"title": "A Load Forecasting Approach Based on Graph Convolution Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927829/1J4CCdmwBSo",
"parentPublication": {
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0",
"title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a776",
"title": "Neural Network Architectures for Electricity Consumption Forecasting",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a776/1ehBIcN2KOI",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0",
"title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2020/6034/0/603400a542",
"title": "Forecasting Building Electricity Power Consumption Using Deep Learning Approach",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2020/603400a542/1jdDzl68s7u",
"parentPublication": {
"id": "proceedings/bigcomp/2020/6034/0",
"title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iisa/2020/2346/0/09284364",
"title": "Deep Learning Networks for Vectorized Energy Load Forecasting",
"doi": null,
"abstractUrl": "/proceedings-article/iisa/2020/09284364/1pttLMblheg",
"parentPublication": {
"id": "proceedings/iisa/2020/2346/0",
"title": "2020 11th International Conference on Information, Intelligence, Systems and Applications (IISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaie/2021/2492/0/249200a213",
"title": "Comparative Research on Electricity Consumption Forecast Based on Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icaie/2021/249200a213/1wV1EKQMedy",
"parentPublication": {
"id": "proceedings/icaie/2021/2492/0",
"title": "2021 2nd International Conference on Artificial Intelligence and Education (ICAIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1j9xA6zpSFi",
"title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"acronym": "sitis",
"groupId": "1002425",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1j9xAXNumTm",
"doi": "10.1109/SITIS.2019.00056",
"title": "Translation of Sign Language Glosses to Text Using Sequence-to-Sequence Attention Models",
"normalizedTitle": "Translation of Sign Language Glosses to Text Using Sequence-to-Sequence Attention Models",
"abstract": "This work deals with the problem of Sign Language Translation and more specifically with translating Glosses to text. We applied Sequence to Sequence models with attention mechanism to a parallel gloss to English corpus. This is the first work that used these models to translate American gloss sentences to English. We present our experiments on several network architectures with three different attention functions. The results are very promising and can be useful for the further implementation of a full sign language recognition system.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This work deals with the problem of Sign Language Translation and more specifically with translating Glosses to text. We applied Sequence to Sequence models with attention mechanism to a parallel gloss to English corpus. This is the first work that used these models to translate American gloss sentences to English. We present our experiments on several network architectures with three different attention functions. The results are very promising and can be useful for the further implementation of a full sign language recognition system.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This work deals with the problem of Sign Language Translation and more specifically with translating Glosses to text. We applied Sequence to Sequence models with attention mechanism to a parallel gloss to English corpus. This is the first work that used these models to translate American gloss sentences to English. We present our experiments on several network architectures with three different attention functions. The results are very promising and can be useful for the further implementation of a full sign language recognition system.",
"fno": "568600a296",
"keywords": [
"Language Translation",
"Natural Language Processing",
"Sign Language Recognition",
"Text Analysis",
"Attention Mechanism",
"Parallel Gloss",
"English Corpus",
"American Gloss Sentences",
"Attention Functions",
"Sign Language Recognition System",
"Sign Language Glosses",
"Sign Language Translation",
"Sequence To Sequence Attention Models",
"Assistive Technology",
"Gesture Recognition",
"Decoding",
"Vocabulary",
"Hidden Markov Models",
"Mathematical Model",
"Training",
"Sign Language Translation Gloss To Text SLT Sequence To Sequence Encoder Decoder Attention Mechanism GRU"
],
"authors": [
{
"affiliation": "University of Patras",
"fullName": "Nikolaos Arvanitis",
"givenName": "Nikolaos",
"surname": "Arvanitis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Patras",
"fullName": "Constantinos Constantinopoulos",
"givenName": "Constantinos",
"surname": "Constantinopoulos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Patras",
"fullName": "Dimitrios Kosmopoulos",
"givenName": "Dimitrios",
"surname": "Kosmopoulos",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sitis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-11-01T00:00:00",
"pubType": "proceedings",
"pages": "296-302",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-5686-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "568600a289",
"articleId": "1j9xDpo8CJy",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "568600a303",
"articleId": "1j9xCQfzhqo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457b610",
"title": "Recurrent Convolutional Neural Networks for Continuous Sign Language Recognition by Staged Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457b610/12OmNzuIjff",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000h784",
"title": "Neural Sign Language Translation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000h784/17D45Vw15sn",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200l1926",
"title": "Stochastic Transformer Networks with Linear Competing Units: Application to end-to-end SL Translation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200l1926/1BmFJGrFu2A",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600f110",
"title": "A Simple Multi-Modality Transfer Learning Baseline for Sign Language Translation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600f110/1H0Ocav48dG",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hdis/2022/9144/0/09991447",
"title": "Expanding Intra-class Difference and Boosting Frame-level Classification for Continuous Sign Language Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/hdis/2022/09991447/1JwQ15SJFMA",
"parentPublication": {
"id": "proceedings/hdis/2022/9144/0",
"title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csde/2022/5305/0/10089359",
"title": "Web-based Signing of English Text",
"doi": null,
"abstractUrl": "/proceedings-article/csde/2022/10089359/1M7L7g4Utby",
"parentPublication": {
"id": "proceedings/csde/2022/5305/0",
"title": "2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200b282",
"title": "Dynamic Pseudo Label Decoding for Continuous Sign Language Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200b282/1cdOIwJDn4k",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2020/3079/0/307900a009",
"title": "Neural Sign Language Translation by Learning Tokenization",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2020/307900a009/1kecHOFVdza",
"parentPublication": {
"id": "proceedings/fg/2020/3079/0/",
"title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800k0020",
"title": "Sign Language Transformers: Joint End-to-End Sign Language Recognition and Translation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800k0020/1m3osWJA3qU",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900b316",
"title": "Improving Sign Language Translation with Monolingual Data by Sign Back-Translation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900b316/1yeIZv2vRzG",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G9DtzCwrjW",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G9EqL5o4bm",
"doi": "10.1109/ICME52920.2022.9859878",
"title": "Searching Latent Sub-Goals in Hierarchical Reinforcement Learning as Riemannian Manifold Optimization",
"normalizedTitle": "Searching Latent Sub-Goals in Hierarchical Reinforcement Learning as Riemannian Manifold Optimization",
"abstract": "Hierarchical Reinforcement Learning (HRL) is promising to tackle the long-term sparse reward problem. However, goal conditioned HRL, which decomposes the goal into a series of sub-goals, suffers from sub-goal search inefficiency problems when the observation space is too large. This problem is more severe in a visual observation space, since its high latent dimensions, where the complete dynamics information is preserved, exponentially increase the difficulty of sub-goal search. In view of this, we propose to treat the latent space as a manifold, i.e., a Riemannian manifold. Assisted by the Riemannian manifold optimization, sub-goals can be efficiently searched in the higher-dimensional latent space, with the help of preserving the dynamics information efficiently. Experiments on a series of MuJoCo tasks with visual observation show that the proposed Riemannian manifold optimization, compared with the baseline that directly searches for sub-goals in bounded latent space, improves the success rate by 1.5 times on average. In much higher dimensions where the baseline no longer converges, the success rate of the proposed method is maintained.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Hierarchical Reinforcement Learning (HRL) is promising to tackle the long-term sparse reward problem. However, goal conditioned HRL, which decomposes the goal into a series of sub-goals, suffers from sub-goal search inefficiency problems when the observation space is too large. This problem is more severe in a visual observation space, since its high latent dimensions, where the complete dynamics information is preserved, exponentially increase the difficulty of sub-goal search. In view of this, we propose to treat the latent space as a manifold, i.e., a Riemannian manifold. Assisted by the Riemannian manifold optimization, sub-goals can be efficiently searched in the higher-dimensional latent space, with the help of preserving the dynamics information efficiently. Experiments on a series of MuJoCo tasks with visual observation show that the proposed Riemannian manifold optimization, compared with the baseline that directly searches for sub-goals in bounded latent space, improves the success rate by 1.5 times on average. In much higher dimensions where the baseline no longer converges, the success rate of the proposed method is maintained.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Hierarchical Reinforcement Learning (HRL) is promising to tackle the long-term sparse reward problem. However, goal conditioned HRL, which decomposes the goal into a series of sub-goals, suffers from sub-goal search inefficiency problems when the observation space is too large. This problem is more severe in a visual observation space, since its high latent dimensions, where the complete dynamics information is preserved, exponentially increase the difficulty of sub-goal search. In view of this, we propose to treat the latent space as a manifold, i.e., a Riemannian manifold. Assisted by the Riemannian manifold optimization, sub-goals can be efficiently searched in the higher-dimensional latent space, with the help of preserving the dynamics information efficiently. Experiments on a series of MuJoCo tasks with visual observation show that the proposed Riemannian manifold optimization, compared with the baseline that directly searches for sub-goals in bounded latent space, improves the success rate by 1.5 times on average. In much higher dimensions where the baseline no longer converges, the success rate of the proposed method is maintained.",
"fno": "09859878",
"keywords": [
"Convergence",
"Learning Artificial Intelligence",
"Optimisation",
"Searching Latent Sub Goals",
"Hierarchical Reinforcement Learning",
"Riemannian Manifold Optimization",
"Long Term Sparse Reward Problem",
"Goal Conditioned HRL",
"Sub Goal Search Inefficiency Problems",
"Visual Observation Space",
"High Latent Dimensions",
"Complete Dynamics Information",
"Higher Dimensional Latent Space",
"Visual Observation",
"Bounded Latent Space",
"Mu Jo Co Tasks",
"Manifolds",
"Visualization",
"Reinforcement Learning",
"Search Problems",
"Task Analysis",
"Optimization",
"Convergence",
"Hierarchical Reinforcement Learning",
"Manifold Optimization",
"Representation Learning"
],
"authors": [
{
"affiliation": "National University of Defense Technology,Science and Technology on Parallel and Distributed Laboratory,Hunan,China",
"fullName": "Sidun Liu",
"givenName": "Sidun",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,Science and Technology on Parallel and Distributed Laboratory,Hunan,China",
"fullName": "Peng Qiao",
"givenName": "Peng",
"surname": "Qiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,Science and Technology on Parallel and Distributed Laboratory,Hunan,China",
"fullName": "Yong Dou",
"givenName": "Yong",
"surname": "Dou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,Science and Technology on Parallel and Distributed Laboratory,Hunan,China",
"fullName": "Ruochun Jin",
"givenName": "Ruochun",
"surname": "Jin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8563-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09859587",
"articleId": "1G9EkAl0KXK",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09860000",
"articleId": "1G9EbeArYI0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fskd/2009/3735/5/3735e379",
"title": "Geodesic Discriminant Analysis on Curved Riemannian Manifold",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735e379/12OmNBK5m6D",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/5",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2011/0063/0/06130473",
"title": "Tracking visual and infrared objects using joint Riemannian manifold appearance and affine shape modeling",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2011/06130473/12OmNC3FGba",
"parentPublication": {
"id": "proceedings/iccvw/2011/0063/0",
"title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2014/4871/0/06918633",
"title": "Keynote lecture 2: “Riemannian manifolds, kernels and learning”",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2014/06918633/12OmNqOOrLe",
"parentPublication": {
"id": "proceedings/avss/2014/4871/0",
"title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2011/0063/0/06130415",
"title": "Bayesian online learning on Riemannian manifolds using a dual model with applications to video object tracking",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2011/06130415/12OmNwtn3wt",
"parentPublication": {
"id": "proceedings/iccvw/2011/0063/0",
"title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2008/05/ttp2008050796",
"title": "Riemannian Manifold Learning",
"doi": null,
"abstractUrl": "/journal/tp/2008/05/ttp2008050796/13rRUEgarkz",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2015/12/07063231",
"title": "Kernel Methods on Riemannian Manifolds with Gaussian RBF Kernels",
"doi": null,
"abstractUrl": "/journal/tp/2015/12/07063231/13rRUxCitEk",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0/439900a089",
"title": "Kernel Learning Method on Riemannian Manifold with Geodesic Distance Preservation",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2018/439900a089/17D45W1Oa5z",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0",
"title": "2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/12/08118100",
"title": "Cross Euclidean-to-Riemannian Metric Learning with Application to Face Recognition from Video",
"doi": null,
"abstractUrl": "/journal/tp/2018/12/08118100/17D45XvMccF",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600a949",
"title": "Filter Guided Manifold Optimization in the Autoencoder Latent Space",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600a949/1iTvffvAnPq",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800o4491",
"title": "Learning Weighted Submanifolds With Variational Autoencoders and Riemannian Variational Autoencoders",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800o4491/1m3ojswaXFS",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KBqPQkw71C",
"title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "10029378",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KBr6RsmA8g",
"doi": "10.1109/ICDMW58026.2022.00116",
"title": "Data-driven Kernel Subspace Clustering with Local Manifold Preservation",
"normalizedTitle": "Data-driven Kernel Subspace Clustering with Local Manifold Preservation",
"abstract": "Kernel-based subspace clustering methods that can reveal the nonlinear structure of data are an emerging research topic. While advances have been made, existing methods suffer from one or both of the following shortcomings: (1) the predefined kernel determines their performance; (2) they may be vulnerable in arbitrary manifold subspace. In this paper, we propose a novel data-driven kernel subspace clustering model with local manifold preservation, named DKLM. Specifically, DKLM provides an explicit data-driven kernel learning strategy for learning kernel directly from the self-representation of data while satisfying the adaptive-weighting. Based on the kernel, DKLM allows preserving the local manifold structure of data through a kernel local manifold term in nonlinear space and encourages acquiring an affinity matrix with the optimal block diagonal. Various experiments on both synthetic data and real-world data demonstrate the effectiveness of our method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Kernel-based subspace clustering methods that can reveal the nonlinear structure of data are an emerging research topic. While advances have been made, existing methods suffer from one or both of the following shortcomings: (1) the predefined kernel determines their performance; (2) they may be vulnerable in arbitrary manifold subspace. In this paper, we propose a novel data-driven kernel subspace clustering model with local manifold preservation, named DKLM. Specifically, DKLM provides an explicit data-driven kernel learning strategy for learning kernel directly from the self-representation of data while satisfying the adaptive-weighting. Based on the kernel, DKLM allows preserving the local manifold structure of data through a kernel local manifold term in nonlinear space and encourages acquiring an affinity matrix with the optimal block diagonal. Various experiments on both synthetic data and real-world data demonstrate the effectiveness of our method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Kernel-based subspace clustering methods that can reveal the nonlinear structure of data are an emerging research topic. While advances have been made, existing methods suffer from one or both of the following shortcomings: (1) the predefined kernel determines their performance; (2) they may be vulnerable in arbitrary manifold subspace. In this paper, we propose a novel data-driven kernel subspace clustering model with local manifold preservation, named DKLM. Specifically, DKLM provides an explicit data-driven kernel learning strategy for learning kernel directly from the self-representation of data while satisfying the adaptive-weighting. Based on the kernel, DKLM allows preserving the local manifold structure of data through a kernel local manifold term in nonlinear space and encourages acquiring an affinity matrix with the optimal block diagonal. Various experiments on both synthetic data and real-world data demonstrate the effectiveness of our method.",
"fno": "460900a876",
"keywords": [
"Learning Artificial Intelligence",
"Matrix Algebra",
"Pattern Clustering",
"Arbitrary Manifold Subspace",
"Data Driven Kernel Subspace Clustering",
"Emerging Research Topic",
"Explicit Data Driven Kernel Learning Strategy",
"Kernel Local Manifold Term",
"Kernel Based Subspace Clustering Methods",
"Local Manifold Preservation",
"Named DKLM",
"Novel Data Driven Kernel Subspace",
"Predefined Kernel",
"Real World Data",
"Synthetic Data",
"Manifolds",
"Adaptation Models",
"Analytical Models",
"Conferences",
"Clustering Methods",
"Data Mining",
"Kernel",
"Data Driven",
"Kernel Learning",
"Subspace Clustering",
"Nonlinear Self Representation",
"Local Manifold Structure"
],
"authors": [
{
"affiliation": "Université de Sherbrooke,Department of Computer Science,Sherbrooke,Canada",
"fullName": "Kunpeng Xu",
"givenName": "Kunpeng",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "College of Computer and Cyber Security, Fujian Normal University,Fuzhou,China",
"fullName": "Lifei Chen",
"givenName": "Lifei",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Université de Sherbrooke,Department of Computer Science,Sherbrooke,Canada",
"fullName": "Shengrui Wang",
"givenName": "Shengrui",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-11-01T00:00:00",
"pubType": "proceedings",
"pages": "876-884",
"year": "2022",
"issn": null,
"isbn": "979-8-3503-4609-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "460900a868",
"articleId": "1KBqS86RZ7y",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "460900a885",
"articleId": "1KBr5x30SOY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icde/2017/6543/0/6543a079",
"title": "Clustering with Adaptive Manifold Structure Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543a079/12OmNAoDijI",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851f157",
"title": "Kernel Sparse Subspace Clustering on Symmetric Positive Definite Manifolds",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851f157/12OmNBlFQUa",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi-t/2017/0619/0/0619a042",
"title": "Geometric Data Analysis Based on Manifold Learning with Applications for Image Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi-t/2017/0619a042/12OmNx8Ounr",
"parentPublication": {
"id": "proceedings/sibgrapi-t/2017/0619/0",
"title": "2017 30th SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2014/4761/0/06890178",
"title": "Local subspace video stabilization",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2014/06890178/12OmNzUPpna",
"parentPublication": {
"id": "proceedings/icme/2014/4761/0",
"title": "2014 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0/439900a089",
"title": "Kernel Learning Method on Riemannian Manifold with Geodesic Distance Preservation",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2018/439900a089/17D45W1Oa5z",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0",
"title": "2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2022/0915/0/091500b668",
"title": "Generalized Clustering and Multi-Manifold Learning with Geometric Structure Preservation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500b668/1B13oiDeNsQ",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2021/04/08968629",
"title": "Transformed Subspace Clustering",
"doi": null,
"abstractUrl": "/journal/tk/2021/04/08968629/1gQYtbfQGFW",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/bd/2022/03/09043722",
"title": "Multiple Riemannian Manifold-Valued Descriptors Based Image Set Classification With Multi-Kernel Metric Learning",
"doi": null,
"abstractUrl": "/journal/bd/2022/03/09043722/1ilQIFlCBmo",
"parentPublication": {
"id": "trans/bd",
"title": "IEEE Transactions on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2020/9638/0/963800a367",
"title": "Kernel Subspace Clustering with Block Diagonal Prior",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2020/963800a367/1rxhwTjuwDK",
"parentPublication": {
"id": "proceedings/mlbdbi/2020/9638/0",
"title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900e438",
"title": "Deep Spherical Manifold Gaussian Kernel for Unsupervised Domain Adaptation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900e438/1yVA2VWXV3W",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1jPbbHBGDHq",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"acronym": "wacv",
"groupId": "1000040",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1jPbybZAJsQ",
"doi": "10.1109/WACV45572.2020.9093338",
"title": "Charting the Right Manifold: Manifold Mixup for Few-shot Learning",
"normalizedTitle": "Charting the Right Manifold: Manifold Mixup for Few-shot Learning",
"abstract": "Few-shot learning algorithms aim to learn model parameters capable of adapting to unseen classes with the help of only a few labeled examples. A recent regularization technique - Manifold Mixup focuses on learning a general-purpose representation, robust to small changes in the data distribution. Since the goal of few-shot learning is closely linked to robust representation learning, we study Manifold Mixup in this problem setting. Self-supervised learning is another technique that learns semantically meaningful features, using only the inherent structure of the data. This work investigates the role of learning relevant feature manifold for few-shot tasks using self-supervision and regularization techniques. We observe that regularizing the feature manifold, enriched via self-supervised techniques, with Manifold Mixup significantly improves few-shot learning performance. We show that our proposed method S2M2 beats the current state-of-the-art accuracy on standard few-shot learning datasets like CIFAR-FS, CUB, mini-ImageNet and tiered-ImageNet by 3 - 8%. Through extensive experimentation, we show that the features learned using our approach generalize to complex few-shot evaluation tasks, cross-domain scenarios and are robust against slight changes to data distribution.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Few-shot learning algorithms aim to learn model parameters capable of adapting to unseen classes with the help of only a few labeled examples. A recent regularization technique - Manifold Mixup focuses on learning a general-purpose representation, robust to small changes in the data distribution. Since the goal of few-shot learning is closely linked to robust representation learning, we study Manifold Mixup in this problem setting. Self-supervised learning is another technique that learns semantically meaningful features, using only the inherent structure of the data. This work investigates the role of learning relevant feature manifold for few-shot tasks using self-supervision and regularization techniques. We observe that regularizing the feature manifold, enriched via self-supervised techniques, with Manifold Mixup significantly improves few-shot learning performance. We show that our proposed method S2M2 beats the current state-of-the-art accuracy on standard few-shot learning datasets like CIFAR-FS, CUB, mini-ImageNet and tiered-ImageNet by 3 - 8%. Through extensive experimentation, we show that the features learned using our approach generalize to complex few-shot evaluation tasks, cross-domain scenarios and are robust against slight changes to data distribution.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Few-shot learning algorithms aim to learn model parameters capable of adapting to unseen classes with the help of only a few labeled examples. A recent regularization technique - Manifold Mixup focuses on learning a general-purpose representation, robust to small changes in the data distribution. Since the goal of few-shot learning is closely linked to robust representation learning, we study Manifold Mixup in this problem setting. Self-supervised learning is another technique that learns semantically meaningful features, using only the inherent structure of the data. This work investigates the role of learning relevant feature manifold for few-shot tasks using self-supervision and regularization techniques. We observe that regularizing the feature manifold, enriched via self-supervised techniques, with Manifold Mixup significantly improves few-shot learning performance. We show that our proposed method S2M2 beats the current state-of-the-art accuracy on standard few-shot learning datasets like CIFAR-FS, CUB, mini-ImageNet and tiered-ImageNet by 3 - 8%. Through extensive experimentation, we show that the features learned using our approach generalize to complex few-shot evaluation tasks, cross-domain scenarios and are robust against slight changes to data distribution.",
"fno": "09093338",
"keywords": [
"Computer Vision",
"Convolutional Neural Nets",
"Learning Artificial Intelligence",
"Data Distribution",
"Robust Representation Learning",
"Self Supervised Learning",
"Semantically Meaningful Features",
"Relevant Feature Manifold",
"Few Shot Tasks",
"Self Supervision",
"Regularization Techniques",
"Self Supervised Techniques",
"Learning Performance",
"Few Shot Learning Datasets",
"Few Shot Evaluation Tasks",
"Few Shot Learning Algorithms",
"Regularization Technique",
"General Purpose Representation",
"Manifold Mixup",
"S 2 M 2",
"CIFAR FS",
"CUB",
"Mini Image Net",
"Tiered Image Net",
"Task Analysis",
"Manifolds",
"Training",
"Feature Extraction",
"Robustness",
"Neural Networks",
"Adaptation Models"
],
"authors": [
{
"affiliation": "IIT Hyderabad,India",
"fullName": "Puneet Mangla",
"givenName": "Puneet",
"surname": "Mangla",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Media and Data Science Research lab, Adobe",
"fullName": "Mayank Singh",
"givenName": "Mayank",
"surname": "Singh",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Media and Data Science Research lab, Adobe",
"fullName": "Abhishek Sinha",
"givenName": "Abhishek",
"surname": "Sinha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Media and Data Science Research lab, Adobe",
"fullName": "Nupur Kumari",
"givenName": "Nupur",
"surname": "Kumari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IIT Hyderabad,India",
"fullName": "Vineeth N Balasubramanian",
"givenName": "Vineeth N",
"surname": "Balasubramanian",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Media and Data Science Research lab, Adobe",
"fullName": "Balaji Krishnamurthy",
"givenName": "Balaji",
"surname": "Krishnamurthy",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wacv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-03-01T00:00:00",
"pubType": "proceedings",
"pages": "2207-2216",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-6553-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09093352",
"articleId": "1jPbpsOus4E",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09093336",
"articleId": "1jPbEY4dEas",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tp/5555/01/09737396",
"title": "Few-Shot Learning with a Strong Teacher",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/09737396/1BQibna3gm4",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/02/09749838",
"title": "Curvature-Adaptive Meta-Learning for Fast Adaptation to Manifold Data",
"doi": null,
"abstractUrl": "/journal/tp/2023/02/09749838/1CkdRdWn6AE",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600o4544",
"title": "Semi-Supervised Few-shot Learning via Multi-Factor Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600o4544/1H1lwrgtJ0k",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09916072",
"title": "Defensive Few-Shot Learning",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09916072/1HojxV3XlMk",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956733",
"title": "Task-adaptive Few-shot Learning on Sphere Manifold",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956733/1IHoNjsYn7O",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2019/3014/0/301400a799",
"title": "Manifold Mixup Improves Text Recognition with CTC Loss",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2019/301400a799/1h81xYsQOIM",
"parentPublication": {
"id": "proceedings/icdar/2019/3014/0",
"title": "2019 International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300i419",
"title": "Few-Shot Object Detection via Feature Reweighting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300i419/1hQqttqhLDq",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300b381",
"title": "Meta Module Generation for Fast Few-Shot Incremental Learning",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300b381/1i5mM6nW1Wg",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2180",
"title": "Few-Shot Class-Incremental Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2180/1m3o5dnxISQ",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2362",
"title": "Meta-Learning of Neural Architectures for Few-Shot Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2362/1m3odGas2C4",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1sDsTR3w96o",
"title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)",
"acronym": "icse-nier",
"groupId": "1820865",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1sDsWmJEc6c",
"doi": null,
"title": "Manifold for Machine Learning Assurance",
"normalizedTitle": "Manifold for Machine Learning Assurance",
"abstract": "The increasing use of machine-learning (ML) enabled systems in critical tasks fuels the quest for novel verification and validation techniques yet grounded in accepted system assurance principles. In traditional system development, model-based techniques have been widely adopted, where the central premise is that abstract models of the required system provide a sound basis for judging its implementation. We posit an analogous approach for ML systems using an ML technique that extracts from the high-dimensional training data implicitly describing the required system, a low-dimensional underlying structure-a manifold. It is then harnessed for a range of quality assurance tasks such as test adequacy measurement, test input generation, and runtime monitoring of the target ML system. The approach is built on variational autoencoder, an unsupervised method for learning a pair of mutually near-inverse functions between a given high-dimensional dataset and a low-dimensional representation. Preliminary experiments establish that the proposed manifold-based approach, for test adequacy drives diversity in test data, for test generation yields fault-revealing yet realistic test cases, and for run-time monitoring provides an independent means to assess trustability of the target system's output.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The increasing use of machine-learning (ML) enabled systems in critical tasks fuels the quest for novel verification and validation techniques yet grounded in accepted system assurance principles. In traditional system development, model-based techniques have been widely adopted, where the central premise is that abstract models of the required system provide a sound basis for judging its implementation. We posit an analogous approach for ML systems using an ML technique that extracts from the high-dimensional training data implicitly describing the required system, a low-dimensional underlying structure-a manifold. It is then harnessed for a range of quality assurance tasks such as test adequacy measurement, test input generation, and runtime monitoring of the target ML system. The approach is built on variational autoencoder, an unsupervised method for learning a pair of mutually near-inverse functions between a given high-dimensional dataset and a low-dimensional representation. Preliminary experiments establish that the proposed manifold-based approach, for test adequacy drives diversity in test data, for test generation yields fault-revealing yet realistic test cases, and for run-time monitoring provides an independent means to assess trustability of the target system's output.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The increasing use of machine-learning (ML) enabled systems in critical tasks fuels the quest for novel verification and validation techniques yet grounded in accepted system assurance principles. In traditional system development, model-based techniques have been widely adopted, where the central premise is that abstract models of the required system provide a sound basis for judging its implementation. We posit an analogous approach for ML systems using an ML technique that extracts from the high-dimensional training data implicitly describing the required system, a low-dimensional underlying structure-a manifold. It is then harnessed for a range of quality assurance tasks such as test adequacy measurement, test input generation, and runtime monitoring of the target ML system. The approach is built on variational autoencoder, an unsupervised method for learning a pair of mutually near-inverse functions between a given high-dimensional dataset and a low-dimensional representation. Preliminary experiments establish that the proposed manifold-based approach, for test adequacy drives diversity in test data, for test generation yields fault-revealing yet realistic test cases, and for run-time monitoring provides an independent means to assess trustability of the target system's output.",
"fno": "712600a097",
"keywords": [
"Data Handling",
"Learning Artificial Intelligence",
"Program Testing",
"Software Quality",
"Machine Learning Assurance",
"Model Based Techniques",
"ML Systems",
"High Dimensional Training Data",
"Quality Assurance Tasks",
"Low Dimensional Representation",
"Manifold Based Approach",
"Manifolds",
"Software Testing",
"Training Data",
"Machine Learning",
"Test Pattern Generators",
"Task Analysis",
"Monitoring",
"Machine Learning Testing",
"Neural Networks",
"Variational Autoencoder"
],
"authors": [
{
"affiliation": "University of Minnesota,Minneapolis,Minnesota",
"fullName": "Taejoon Byun",
"givenName": "Taejoon",
"surname": "Byun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota,Minneapolis,Minnesota",
"fullName": "Sanjai Rayadurgam",
"givenName": "Sanjai",
"surname": "Rayadurgam",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icse-nier",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-10-01T00:00:00",
"pubType": "proceedings",
"pages": "97-100",
"year": "2020",
"issn": null,
"isbn": "978-1-4503-7126-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "712600a093",
"articleId": "1sDsWcL8fFC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "712600a101",
"articleId": "1sDsUm7aTw4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/chase/2016/0943/0/0943a254",
"title": "Sensing from the Bottom: Smart Insole Enabled Patient Handling Activity Recognition Through Manifold Learning",
"doi": null,
"abstractUrl": "/proceedings-article/chase/2016/0943a254/12OmNqI04Zz",
"parentPublication": {
"id": "proceedings/chase/2016/0943/0",
"title": "2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2010/3987/2/3987b210",
"title": "Cliffor Manifold Learning Using Neighbor Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987b210/12OmNwnH4PA",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/2",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2016/4459/0/4459a985",
"title": "A Fast Manifold Learning Algorithm for Dimensionality Reduction",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2016/4459a985/12OmNwwd2IP",
"parentPublication": {
"id": "proceedings/ictai/2016/4459/0",
"title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2010/7029/0/05544598",
"title": "Ordinary preserving manifold analysis for human age estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2010/05544598/12OmNxdVgYT",
"parentPublication": {
"id": "proceedings/cvprw/2010/7029/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2008/05/ttp2008050796",
"title": "Riemannian Manifold Learning",
"doi": null,
"abstractUrl": "/journal/tp/2008/05/ttp2008050796/13rRUEgarkz",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2012/02/ttp2012020253",
"title": "Adaptive Manifold Learning",
"doi": null,
"abstractUrl": "/journal/tp/2012/02/ttp2012020253/13rRUx0xPJO",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2017/10/07984849",
"title": "Manifold Learning by Curved Cosine Mapping",
"doi": null,
"abstractUrl": "/journal/tk/2017/10/07984849/13rRUygT7nn",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2020/01/08542718",
"title": "A Transductive Transfer Learning Approach Based on Manifold Learning",
"doi": null,
"abstractUrl": "/magazine/cs/2020/01/08542718/17D45Vw15sf",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icst/2020/5778/0/09159051",
"title": "Callisto: Entropy-based Test Generation and Data Quality Assessment for Machine Learning Systems",
"doi": null,
"abstractUrl": "/proceedings-article/icst/2020/09159051/1m3oNLRbApa",
"parentPublication": {
"id": "proceedings/icst/2020/5778/0",
"title": "2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aitest/2020/6984/0/09176830",
"title": "Manifold-based Test Generation for Image Classifiers",
"doi": null,
"abstractUrl": "/proceedings-article/aitest/2020/09176830/1mA9Weczcsw",
"parentPublication": {
"id": "proceedings/aitest/2020/6984/0",
"title": "2020 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1tmhi3ly74c",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"acronym": "icpr",
"groupId": "1000545",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1tmiCQxgKE8",
"doi": "10.1109/ICPR48806.2021.9412987",
"title": "A Spectral Clustering on Grassmann Manifold via Double Low Rank Constraint",
"normalizedTitle": "A Spectral Clustering on Grassmann Manifold via Double Low Rank Constraint",
"abstract": "Data clustering is a fundamental topic in machine learning and data mining areas. In recent years, researchers have proposed a series of effective methods based on Low Rank Representation (LRR) which could explore low-dimension subspace structure embedded in original data effectively. The traditional LRR methods usually are designed for vectorial data from linear spaces with Euclidean distance. However, high-dimension data (such as video clip or imageset) are always considered as non-linear manifold data such as Grassmann manifold with non-linear metric. In addition, traditional LRR clustering method always adopt single nuclear norm as low rank constraint which would lead to suboptimal solution and decrease the clustering accuracy. In this paper, we proposed a new low rank method on Grassmann manifold for video or imageset data clustering task. In the proposed method, video or imageset data are formulated as sample data on Grassmann manifold first. And then a double low rank constraint is proposed by combining the nuclear norm and bilinear representation for better construct the representation matrix. The experimental results on several public datasets show that the proposed method outperforms the state-of-the-art clustering methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Data clustering is a fundamental topic in machine learning and data mining areas. In recent years, researchers have proposed a series of effective methods based on Low Rank Representation (LRR) which could explore low-dimension subspace structure embedded in original data effectively. The traditional LRR methods usually are designed for vectorial data from linear spaces with Euclidean distance. However, high-dimension data (such as video clip or imageset) are always considered as non-linear manifold data such as Grassmann manifold with non-linear metric. In addition, traditional LRR clustering method always adopt single nuclear norm as low rank constraint which would lead to suboptimal solution and decrease the clustering accuracy. In this paper, we proposed a new low rank method on Grassmann manifold for video or imageset data clustering task. In the proposed method, video or imageset data are formulated as sample data on Grassmann manifold first. And then a double low rank constraint is proposed by combining the nuclear norm and bilinear representation for better construct the representation matrix. The experimental results on several public datasets show that the proposed method outperforms the state-of-the-art clustering methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Data clustering is a fundamental topic in machine learning and data mining areas. In recent years, researchers have proposed a series of effective methods based on Low Rank Representation (LRR) which could explore low-dimension subspace structure embedded in original data effectively. The traditional LRR methods usually are designed for vectorial data from linear spaces with Euclidean distance. However, high-dimension data (such as video clip or imageset) are always considered as non-linear manifold data such as Grassmann manifold with non-linear metric. In addition, traditional LRR clustering method always adopt single nuclear norm as low rank constraint which would lead to suboptimal solution and decrease the clustering accuracy. In this paper, we proposed a new low rank method on Grassmann manifold for video or imageset data clustering task. In the proposed method, video or imageset data are formulated as sample data on Grassmann manifold first. And then a double low rank constraint is proposed by combining the nuclear norm and bilinear representation for better construct the representation matrix. The experimental results on several public datasets show that the proposed method outperforms the state-of-the-art clustering methods.",
"fno": "09412987",
"keywords": [
"Data Mining",
"Image Representation",
"Learning Artificial Intelligence",
"Matrix Algebra",
"Pattern Clustering",
"Spectral Clustering",
"Grassmann Manifold",
"Double Low Rank Constraint",
"Data Clustering",
"Low Rank Representation",
"Low Dimension Subspace Structure",
"Traditional LRR Methods",
"Vectorial Data",
"Linear Spaces",
"High Dimension Data",
"Video Clip",
"Nonlinear Manifold Data",
"Nonlinear Metric",
"Traditional LRR Clustering Method",
"Clustering Accuracy",
"Low Rank Method",
"Imageset Data",
"Sample Data",
"Nuclear Norm",
"Bilinear Representation",
"State Of The Art Clustering Methods",
"Manifolds",
"Measurement",
"Clustering Methods",
"Machine Learning",
"Euclidean Distance",
"Data Models",
"Data Mining"
],
"authors": [
{
"affiliation": "Dalian University of Technology,Faculty of Electronic Information and Electrical Engineering,Dalian,China,116024",
"fullName": "Xinglin Piao",
"givenName": "Xinglin",
"surname": "Piao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Key Laboratory of Multimedia and Intelligent Software Technology, Beijing Artificial Intelligence Institute, Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124",
"fullName": "Yongli Hu",
"givenName": "Yongli",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Sydney Business School,Business Analytics Discipline,Camperdown,NSW,Australia,2006",
"fullName": "Junbin Gao",
"givenName": "Junbin",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Key Laboratory of Multimedia and Intelligent Software Technology, Beijing Artificial Intelligence Institute, Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124",
"fullName": "Yanfeng Sun",
"givenName": "Yanfeng",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dalian University of Technology,Faculty of Electronic Information and Electrical Engineering,Dalian,China,116024",
"fullName": "Xin Yang",
"givenName": "Xin",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Key Laboratory of Multimedia and Intelligent Software Technology, Beijing Artificial Intelligence Institute, Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124",
"fullName": "Baocai Yin",
"givenName": "Baocai",
"surname": "Yin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-01-01T00:00:00",
"pubType": "proceedings",
"pages": "9392-9398",
"year": "2021",
"issn": "1051-4651",
"isbn": "978-1-7281-8808-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09412480",
"articleId": "1tmiAsUr7rO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09412638",
"articleId": "1tmib6StAB2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457d145",
"title": "Grassmannian Manifold Optimization Assisted Sparse Spectral Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457d145/12OmNClQ0AC",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2014/4985/0/06836088",
"title": "Unsupervised domain adaptation using parallel transport on Grassmann manifold",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2014/06836088/12OmNwtn3oS",
"parentPublication": {
"id": "proceedings/wacv/2014/4985/0",
"title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2017/0560/0/08026255",
"title": "Visual query compression with embedded transforms on Grassmann manifold",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2017/08026255/12OmNwwMf4i",
"parentPublication": {
"id": "proceedings/icmew/2017/0560/0",
"title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2013/2840/0/2840d511",
"title": "Efficient Higher-Order Clustering on the Grassmann Manifold",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2013/2840d511/12OmNx0RIZv",
"parentPublication": {
"id": "proceedings/iccv/2013/2840/0",
"title": "2013 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2017/2162/0/2162a105",
"title": "Structure Maintaining Discriminant Maps (SMDM) for Grassmann Manifold Dimensionality Reduction with Applications to the Image Set Classification",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2017/2162a105/12OmNzYwc78",
"parentPublication": {
"id": "proceedings/dcabes/2017/2162/0",
"title": "2017 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900e868",
"title": "Analysis of Temporal Tensor Datasets on Product Grassmann Manifold",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900e868/1G56lOg6kww",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995009",
"title": "A Multi-Graph Laplacian Regularized Low-Rank Representation method for cancer sample clustering with integrated TCGA data",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995009/1JC1R6GfxT2",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300m2067",
"title": "Double Nuclear Norm Based Low Rank Representation on Grassmann Manifolds for Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300m2067/1gyrY0C460E",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icii/2019/2977/0/297700a077",
"title": "Research on Image Data Clustering Algorithm Based on Low Rank Subspace Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icii/2019/297700a077/1jXvh37dmSI",
"parentPublication": {
"id": "proceedings/icii/2019/2977/0",
"title": "2019 IEEE International Conference on Industrial Internet (ICII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412242",
"title": "Low Rank Representation on Product Grassmann Manifolds for Multi-view Subspace Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412242/1tmikTAVIYM",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1wzs0vrjyWQ",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1yXsX4qLBNC",
"doi": "10.1109/CVPRW53098.2021.00498",
"title": "Learning low bending and low distortion manifold embeddings",
"normalizedTitle": "Learning low bending and low distortion manifold embeddings",
"abstract": "Autoencoders are a widespread tool in machine learning to transform high-dimensional data into a lower-dimensional representation which still exhibits the essential characteristics of the input. The encoder provides an embedding from the input data manifold into a latent space which may then be used for further processing. For instance, learning interpolation on the manifold may be simplified via the new manifold representation in latent space. The efficiency of such further processing heavily depends on the regularity and structure of the embedding. In this article, the embedding into latent space is regularized via a loss function that promotes an as isometric and as flat embedding as possible. The required training data comprises pairs of nearby points on the input manifold together with their local distance and their local Fréchet average. This regularity loss functional even allows to train the encoder on its own. The loss functional is computed via a Monte Carlo integration which is shown to be consistent with a geometric loss functional defined directly on the embedding map. Numerical tests are performed using image data that encodes different data manifolds. The results show that smooth manifold embeddings in latent space are obtained. These embeddings are regular enough such that interpolation between not too distant points on the manifold is well approximated by linear interpolation in latent space.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Autoencoders are a widespread tool in machine learning to transform high-dimensional data into a lower-dimensional representation which still exhibits the essential characteristics of the input. The encoder provides an embedding from the input data manifold into a latent space which may then be used for further processing. For instance, learning interpolation on the manifold may be simplified via the new manifold representation in latent space. The efficiency of such further processing heavily depends on the regularity and structure of the embedding. In this article, the embedding into latent space is regularized via a loss function that promotes an as isometric and as flat embedding as possible. The required training data comprises pairs of nearby points on the input manifold together with their local distance and their local Fréchet average. This regularity loss functional even allows to train the encoder on its own. The loss functional is computed via a Monte Carlo integration which is shown to be consistent with a geometric loss functional defined directly on the embedding map. Numerical tests are performed using image data that encodes different data manifolds. The results show that smooth manifold embeddings in latent space are obtained. These embeddings are regular enough such that interpolation between not too distant points on the manifold is well approximated by linear interpolation in latent space.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Autoencoders are a widespread tool in machine learning to transform high-dimensional data into a lower-dimensional representation which still exhibits the essential characteristics of the input. The encoder provides an embedding from the input data manifold into a latent space which may then be used for further processing. For instance, learning interpolation on the manifold may be simplified via the new manifold representation in latent space. The efficiency of such further processing heavily depends on the regularity and structure of the embedding. In this article, the embedding into latent space is regularized via a loss function that promotes an as isometric and as flat embedding as possible. The required training data comprises pairs of nearby points on the input manifold together with their local distance and their local Fréchet average. This regularity loss functional even allows to train the encoder on its own. The loss functional is computed via a Monte Carlo integration which is shown to be consistent with a geometric loss functional defined directly on the embedding map. Numerical tests are performed using image data that encodes different data manifolds. The results show that smooth manifold embeddings in latent space are obtained. These embeddings are regular enough such that interpolation between not too distant points on the manifold is well approximated by linear interpolation in latent space.",
"fno": "489900e411",
"keywords": [
"Distortion",
"Image Representation",
"Interpolation",
"Learning Artificial Intelligence",
"Monte Carlo Methods",
"Neural Nets",
"Regularity Loss",
"Encoder",
"Geometric Loss Functional",
"Embedding Map",
"Latent Space",
"Machine Learning",
"High Dimensional Data",
"Lower Dimensional Representation",
"Input Data Manifold",
"Manifold Representation",
"Flat Embedding",
"Low Bending Manifold Embedding Learning",
"Low Distortion Manifold Embedding Learning",
"Autoencoder",
"Learning Interpolation",
"Local Distance",
"Local Fre X 0301 Chet Average",
"Monte Carlo Integration",
"Linear Interpolation",
"Manifolds",
"Interpolation",
"Monte Carlo Methods",
"Conferences",
"Training Data",
"Transforms",
"Machine Learning"
],
"authors": [
{
"affiliation": "University of Münster,Münster,Germany",
"fullName": "Juliane Braunsmann",
"givenName": "Juliane",
"surname": "Braunsmann",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Bonn,Bonn,Germany",
"fullName": "Marko Rajković",
"givenName": "Marko",
"surname": "Rajković",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Bonn,Bonn,Germany",
"fullName": "Martin Rumpf",
"givenName": "Martin",
"surname": "Rumpf",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Münster,Münster,Germany",
"fullName": "Benedikt Wirth",
"givenName": "Benedikt",
"surname": "Wirth",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-06-01T00:00:00",
"pubType": "proceedings",
"pages": "4411-4419",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4899-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "489900e401",
"articleId": "1yVzKl8yjAI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "489900e420",
"articleId": "1yVA4JrlEB2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ictai/2005/2488/0/24880382",
"title": "Latent Process Model for Manifold Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2005/24880382/12OmNAle6US",
"parentPublication": {
"id": "proceedings/ictai/2005/2488/0",
"title": "17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209b167",
"title": "Manifold Alignment for Person Independent Appearance-Based Gaze Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209b167/12OmNBr4ePj",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2011/0529/0/05981795",
"title": "Joint gait-pose manifold for video-based human motion estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2011/05981795/12OmNzIUg2Q",
"parentPublication": {
"id": "proceedings/cvprw/2011/0529/0",
"title": "CVPR 2011 WORKSHOPS",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2022/0915/0/091500b668",
"title": "Generalized Clustering and Multi-Manifold Learning with Geometric Structure Preservation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500b668/1B13oiDeNsQ",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859878",
"title": "Searching Latent Sub-Goals in Hierarchical Reinforcement Learning as Riemannian Manifold Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859878/1G9EqL5o4bm",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600a949",
"title": "Filter Guided Manifold Optimization in the Autoencoder Latent Space",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600a949/1iTvffvAnPq",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/11/09436028",
"title": "Group-Wise Hub Identification by Learning Common Graph Embeddings on Grassmannian Manifold",
"doi": null,
"abstractUrl": "/journal/tp/2022/11/09436028/1tJs0zjfcmA",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09413328",
"title": "Interactive Style Space of Deep Features and Style Innovation",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09413328/1tmhyZvZ0iY",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428311",
"title": "Adversarial Adaptive Interpolation for Regularizing Representation Learning and Image Synthesis in Autoencoders",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428311/1uilGJk2pBm",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2021/0191/0/019100b107",
"title": "Deep Manifold Prior",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2021/019100b107/1yNhvk5s8YE",
"parentPublication": {
"id": "proceedings/iccvw/2021/0191/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzTH0Gt",
"title": "Parallel and Distributed Processing Symposium, International",
"acronym": "ipdps",
"groupId": "1000530",
"volume": "1",
"displayVolume": "2",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxGja8k",
"doi": "10.1109/IPDPS.2004.1303008",
"title": "SPEAR: A Hybrid Model for Speculative Pre-Execution",
"normalizedTitle": "SPEAR: A Hybrid Model for Speculative Pre-Execution",
"abstract": "Speculative pre-execution achieves efficient data prefetching by running additional prefetching threads on spare hardware contexts. Various implementations for speculative pre-execution have been proposed, including compiler-based static approaches and hardware-based dynamic approaches. A static approach defines the p-thread at compile time and executes it as a stand-alone running thread. Therefore, it cannot efficiently take the dynamic events into account and requires a higher fetch bandwidth. Conversely, a hardware approach is, by essence, able to dynamically use the runtime information. However, it requires more complex hardware and also lacks global program information on data and control flow. This paper proposes SPEAR (Speculative Pre-Execution Assisted by compileR), a pre-execution model which is a hybrid of the two approaches. It relies on a post-compiler to extract the p-thread code from program binaries and uses specially designed hardware to trigger the execution of the pthread. For this purpose, an automated software tool for pthread identification has been developed and a modified SMT model with the specially designed front-end is proposed.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Speculative pre-execution achieves efficient data prefetching by running additional prefetching threads on spare hardware contexts. Various implementations for speculative pre-execution have been proposed, including compiler-based static approaches and hardware-based dynamic approaches. A static approach defines the p-thread at compile time and executes it as a stand-alone running thread. Therefore, it cannot efficiently take the dynamic events into account and requires a higher fetch bandwidth. Conversely, a hardware approach is, by essence, able to dynamically use the runtime information. However, it requires more complex hardware and also lacks global program information on data and control flow. This paper proposes SPEAR (Speculative Pre-Execution Assisted by compileR), a pre-execution model which is a hybrid of the two approaches. It relies on a post-compiler to extract the p-thread code from program binaries and uses specially designed hardware to trigger the execution of the pthread. For this purpose, an automated software tool for pthread identification has been developed and a modified SMT model with the specially designed front-end is proposed.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Speculative pre-execution achieves efficient data prefetching by running additional prefetching threads on spare hardware contexts. Various implementations for speculative pre-execution have been proposed, including compiler-based static approaches and hardware-based dynamic approaches. A static approach defines the p-thread at compile time and executes it as a stand-alone running thread. Therefore, it cannot efficiently take the dynamic events into account and requires a higher fetch bandwidth. Conversely, a hardware approach is, by essence, able to dynamically use the runtime information. However, it requires more complex hardware and also lacks global program information on data and control flow. This paper proposes SPEAR (Speculative Pre-Execution Assisted by compileR), a pre-execution model which is a hybrid of the two approaches. It relies on a post-compiler to extract the p-thread code from program binaries and uses specially designed hardware to trigger the execution of the pthread. For this purpose, an automated software tool for pthread identification has been developed and a modified SMT model with the specially designed front-end is proposed.",
"fno": "213210075b",
"keywords": [],
"authors": [
{
"affiliation": "University of Southern California",
"fullName": "Won W. Ro",
"givenName": "Won W.",
"surname": "Ro",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California at Irvine",
"fullName": "Jean-Luc Gaudiot",
"givenName": "Jean-Luc",
"surname": "Gaudiot",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipdps",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-04-01T00:00:00",
"pubType": "proceedings",
"pages": "75b",
"year": "2004",
"issn": null,
"isbn": "0-7695-2132-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "213210075a",
"articleId": "12OmNARAnbU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "213210076a",
"articleId": "12OmNzVoBQC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx4gUtV",
"title": "2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)",
"acronym": "icdcs",
"groupId": "1000213",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxwENEc",
"doi": "10.1109/ICDCS.2018.00075",
"title": "Chronos: A Unifying Optimization Framework for Speculative Execution of Deadline-Critical MapReduce Jobs",
"normalizedTitle": "Chronos: A Unifying Optimization Framework for Speculative Execution of Deadline-Critical MapReduce Jobs",
"abstract": "Meeting desired application deadlines in cloud processing systems such as MapReduce is crucial as the nature of cloud applications is becoming increasingly mission-critical and deadline-sensitive. It has been shown that the execution times of MapReduce jobs are often adversely impacted by a few slow tasks, known as stragglers, which result in high latency and deadline violations. While a number of strategies have been developed in existing work to mitigate stragglers by launching speculative or clone task attempts, none of them provide a quantitative framework that optimizes the speculative execution for offering guaranteed Service Level Agreements (SLAs) to meet application deadlines. In this paper, we bring several speculative scheduling strategies together under a unifying optimization framework, called Chronos, which defines a new metric, Probability of Completion before Deadlines (PoCD), to measure the probability that MapReduce jobs meet their desired deadlines. We systematically analyze PoCD for popular strategies including Clone, Speculative-Restart, and Speculative-Resume, and quantify their PoCD in closed-form. The results illuminate an important tradeoff between PoCD and the cost of speculative execution, measured by the total (virtual) machine time required under different strategies. We propose an optimization problem to jointly optimize PoCD and execution cost in different strategies, and develop an algorithmic solution that is guaranteed to be optimal. Chronos is prototyped on Hadoop MapReduce and evaluated against three baseline strategies using both experiments and trace-driven simulations, and achieves 50% net utility increase with up to 80% PoCD and 88% cost improvements.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Meeting desired application deadlines in cloud processing systems such as MapReduce is crucial as the nature of cloud applications is becoming increasingly mission-critical and deadline-sensitive. It has been shown that the execution times of MapReduce jobs are often adversely impacted by a few slow tasks, known as stragglers, which result in high latency and deadline violations. While a number of strategies have been developed in existing work to mitigate stragglers by launching speculative or clone task attempts, none of them provide a quantitative framework that optimizes the speculative execution for offering guaranteed Service Level Agreements (SLAs) to meet application deadlines. In this paper, we bring several speculative scheduling strategies together under a unifying optimization framework, called Chronos, which defines a new metric, Probability of Completion before Deadlines (PoCD), to measure the probability that MapReduce jobs meet their desired deadlines. We systematically analyze PoCD for popular strategies including Clone, Speculative-Restart, and Speculative-Resume, and quantify their PoCD in closed-form. The results illuminate an important tradeoff between PoCD and the cost of speculative execution, measured by the total (virtual) machine time required under different strategies. We propose an optimization problem to jointly optimize PoCD and execution cost in different strategies, and develop an algorithmic solution that is guaranteed to be optimal. Chronos is prototyped on Hadoop MapReduce and evaluated against three baseline strategies using both experiments and trace-driven simulations, and achieves 50% net utility increase with up to 80% PoCD and 88% cost improvements.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Meeting desired application deadlines in cloud processing systems such as MapReduce is crucial as the nature of cloud applications is becoming increasingly mission-critical and deadline-sensitive. It has been shown that the execution times of MapReduce jobs are often adversely impacted by a few slow tasks, known as stragglers, which result in high latency and deadline violations. While a number of strategies have been developed in existing work to mitigate stragglers by launching speculative or clone task attempts, none of them provide a quantitative framework that optimizes the speculative execution for offering guaranteed Service Level Agreements (SLAs) to meet application deadlines. In this paper, we bring several speculative scheduling strategies together under a unifying optimization framework, called Chronos, which defines a new metric, Probability of Completion before Deadlines (PoCD), to measure the probability that MapReduce jobs meet their desired deadlines. We systematically analyze PoCD for popular strategies including Clone, Speculative-Restart, and Speculative-Resume, and quantify their PoCD in closed-form. The results illuminate an important tradeoff between PoCD and the cost of speculative execution, measured by the total (virtual) machine time required under different strategies. We propose an optimization problem to jointly optimize PoCD and execution cost in different strategies, and develop an algorithmic solution that is guaranteed to be optimal. Chronos is prototyped on Hadoop MapReduce and evaluated against three baseline strategies using both experiments and trace-driven simulations, and achieves 50% net utility increase with up to 80% PoCD and 88% cost improvements.",
"fno": "687101a718",
"keywords": [
"Cloud Computing",
"Data Handling",
"Optimisation",
"Parallel Processing",
"Probability",
"Quality Of Service",
"Resource Allocation",
"Unifying Optimization Framework",
"Speculative Execution",
"Deadline Critical Map Reduce Jobs",
"Cloud Processing Systems",
"Cloud Applications",
"Execution Times",
"Stragglers",
"Deadline Violations",
"Quantitative Framework",
"Speculative Scheduling Strategies",
"Speculative Resume",
"Optimization Problem",
"Execution Cost",
"Hadoop Map Reduce",
"Baseline Strategies",
"Mission Critical",
"Chronos",
"Po CD",
"Application Deadlines",
"Task Analysis",
"Cloning",
"Cloud Computing",
"Optimization",
"Quality Of Service",
"Measurement",
"Data Centers",
"Map Reduce",
"Straggler",
"Speculative Strategy",
"Po CD"
],
"authors": [
{
"affiliation": null,
"fullName": "Maotong Xu",
"givenName": "Maotong",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sultan Alamro",
"givenName": "Sultan",
"surname": "Alamro",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tian Lan",
"givenName": "Tian",
"surname": "Lan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Suresh Subramaniam",
"givenName": "Suresh",
"surname": "Subramaniam",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdcs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-07-01T00:00:00",
"pubType": "proceedings",
"pages": "718-729",
"year": "2018",
"issn": "2575-8411",
"isbn": "978-1-5386-6871-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "687101a706",
"articleId": "12OmNzVoBCO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "687101a730",
"articleId": "12OmNrAMF5V",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/acit-csi/2015/9642/0/9642a282",
"title": "Bipartite Matching Based Speculative Execution to Improve Cloud MapReduce Performance",
"doi": null,
"abstractUrl": "/proceedings-article/acit-csi/2015/9642a282/12OmNAXglKr",
"parentPublication": {
"id": "proceedings/acit-csi/2015/9642/0",
"title": "2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence (ACIT-CSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnp/2013/1270/0/06733646",
"title": "Resource optimization for speculative execution in a MapReduce Cluster",
"doi": null,
"abstractUrl": "/proceedings-article/icnp/2013/06733646/12OmNwdL7jR",
"parentPublication": {
"id": "proceedings/icnp/2013/1270/0",
"title": "2013 21st IEEE International Conference on Network Protocols (ICNP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsdis/2015/0214/0/0214a396",
"title": "On Understanding the Energy Impact of Speculative Execution in Hadoop",
"doi": null,
"abstractUrl": "/proceedings-article/dsdis/2015/0214a396/12OmNwl8GBK",
"parentPublication": {
"id": "proceedings/dsdis/2015/0214/0",
"title": "2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2017/3038/0/08204109",
"title": "Deadline-aware MapReduce scheduling with selective speculative execution",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2017/08204109/12OmNxETabX",
"parentPublication": {
"id": "proceedings/icccnt/2017/3038/0",
"title": "2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2012/4794/0/4794a072",
"title": "Preemptive Hadoop Jobs Scheduling under a Deadline",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2012/4794a072/12OmNxzMnRA",
"parentPublication": {
"id": "proceedings/skg/2012/4794/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smartcloud/2017/3684/0/3684a120",
"title": "Improving MapReduce Performance with Progress and Feedback Based Speculative Execution",
"doi": null,
"abstractUrl": "/proceedings-article/smartcloud/2017/3684a120/12OmNzcPAsP",
"parentPublication": {
"id": "proceedings/smartcloud/2017/3684/0",
"title": "2017 IEEE International Conference on Smart Cloud (SmartCloud)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2017/02/07466828",
"title": "Optimization for Speculative Execution in Big Data Processing Clusters",
"doi": null,
"abstractUrl": "/journal/td/2017/02/07466828/13rRUNvya92",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/cc/2018/01/07229311",
"title": "MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems",
"doi": null,
"abstractUrl": "/journal/cc/2018/01/07229311/13rRUxZ0o3w",
"parentPublication": {
"id": "trans/cc",
"title": "IEEE Transactions on Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2020/04/09099455",
"title": "Shuffle Scheduling for MapReduce Jobs Based on Periodic Network Status",
"doi": null,
"abstractUrl": "/journal/nt/2020/04/09099455/1k7onJrVdYY",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirp",
"title": "2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"acronym": "micro",
"groupId": "1000440",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WXIkFX",
"doi": "10.1109/MICRO.2018.00026",
"title": "Harmonizing Speculative and Non-Speculative Execution in Architectures for Ordered Parallelism",
"normalizedTitle": "Harmonizing Speculative and Non-Speculative Execution in Architectures for Ordered Parallelism",
"abstract": "Multicore systems should support both speculative and non-speculative parallelism. Speculative parallelism is easy to use and is crucial to scale many challenging applications, while non-speculative parallelism is more efficient and allows parallel irrevocable actions (e.g., parallel I/O). Unfortunately, prior techniques are far from this goal. Hardware transactional memory (HTM) systems support speculative (transactional) and non-speculative (non-transactional) work, but lack coordination mechanisms between the two, and are limited to unordered parallelism. Prior work has extended HTMs to avoid the limitations of speculative execution, e.g., through escape actions and open-nested transactions. But these mechanisms are incompatible with systems that exploit ordered parallelism, which parallelize a broader range of applications and are easier to use. We contribute two techniques that enable seamlessly composing and coordinating speculative and non-speculative work in the context of ordered parallelism: (i) a task-based execution model that efficiently coordinates concurrent speculative and non-speculative ordered tasks, allowing them to create tasks of either kind and to operate on shared data; and (ii) a safe way for speculative tasks to invoke software-managed speculative actions that avoid hardware version management and conflict detection. These contributions improve efficiency and enable new capabilities. Across several benchmarks, they allow the system to dynamically choose whether to execute tasks speculatively or non-speculatively, avoid needless conflicts among speculative tasks, and allow speculative tasks to safely invoke irrevocable actions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Multicore systems should support both speculative and non-speculative parallelism. Speculative parallelism is easy to use and is crucial to scale many challenging applications, while non-speculative parallelism is more efficient and allows parallel irrevocable actions (e.g., parallel I/O). Unfortunately, prior techniques are far from this goal. Hardware transactional memory (HTM) systems support speculative (transactional) and non-speculative (non-transactional) work, but lack coordination mechanisms between the two, and are limited to unordered parallelism. Prior work has extended HTMs to avoid the limitations of speculative execution, e.g., through escape actions and open-nested transactions. But these mechanisms are incompatible with systems that exploit ordered parallelism, which parallelize a broader range of applications and are easier to use. We contribute two techniques that enable seamlessly composing and coordinating speculative and non-speculative work in the context of ordered parallelism: (i) a task-based execution model that efficiently coordinates concurrent speculative and non-speculative ordered tasks, allowing them to create tasks of either kind and to operate on shared data; and (ii) a safe way for speculative tasks to invoke software-managed speculative actions that avoid hardware version management and conflict detection. These contributions improve efficiency and enable new capabilities. Across several benchmarks, they allow the system to dynamically choose whether to execute tasks speculatively or non-speculatively, avoid needless conflicts among speculative tasks, and allow speculative tasks to safely invoke irrevocable actions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Multicore systems should support both speculative and non-speculative parallelism. Speculative parallelism is easy to use and is crucial to scale many challenging applications, while non-speculative parallelism is more efficient and allows parallel irrevocable actions (e.g., parallel I/O). Unfortunately, prior techniques are far from this goal. Hardware transactional memory (HTM) systems support speculative (transactional) and non-speculative (non-transactional) work, but lack coordination mechanisms between the two, and are limited to unordered parallelism. Prior work has extended HTMs to avoid the limitations of speculative execution, e.g., through escape actions and open-nested transactions. But these mechanisms are incompatible with systems that exploit ordered parallelism, which parallelize a broader range of applications and are easier to use. We contribute two techniques that enable seamlessly composing and coordinating speculative and non-speculative work in the context of ordered parallelism: (i) a task-based execution model that efficiently coordinates concurrent speculative and non-speculative ordered tasks, allowing them to create tasks of either kind and to operate on shared data; and (ii) a safe way for speculative tasks to invoke software-managed speculative actions that avoid hardware version management and conflict detection. These contributions improve efficiency and enable new capabilities. Across several benchmarks, they allow the system to dynamically choose whether to execute tasks speculatively or non-speculatively, avoid needless conflicts among speculative tasks, and allow speculative tasks to safely invoke irrevocable actions.",
"fno": "624000a217",
"keywords": [
"Multiprocessing Systems",
"Parallel Programming",
"Transaction Processing",
"Hardware Transactional Memory",
"Multicore Systems",
"HTM",
"Speculative Parallelism",
"Nonspeculative Parallelism",
"Nonspeculative Execution",
"Software Managed Speculative Actions",
"Ordered Parallelism",
"Unordered Parallelism",
"Task Analysis",
"Parallel Processing",
"Synchronization",
"Hardware",
"Instruction Sets",
"Databases",
"Logic Gates",
"Multicore Speculative Parallelism Ordered Parallelism Fine Grain Parallelism Transactional Memory Thread Level Speculation Speculative Forwarding Synchronization"
],
"authors": [
{
"affiliation": null,
"fullName": "Mark C. Jeffrey",
"givenName": "Mark C.",
"surname": "Jeffrey",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Victor A. Ying",
"givenName": "Victor A.",
"surname": "Ying",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Suvinay Subramanian",
"givenName": "Suvinay",
"surname": "Subramanian",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hyun Ryong Lee",
"givenName": "Hyun Ryong",
"surname": "Lee",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Joel Emer",
"givenName": "Joel",
"surname": "Emer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Daniel Sanchez",
"givenName": "Daniel",
"surname": "Sanchez",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "micro",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-10-01T00:00:00",
"pubType": "proceedings",
"pages": "217-230",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-6240-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "624000a203",
"articleId": "17D45VsBU2h",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "624000a231",
"articleId": "17D45WaTkgK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cmc/2011/312/0/05931142",
"title": "Exploiting Speculative Thread-Level Parallelism Based on Transactional Memory",
"doi": null,
"abstractUrl": "/proceedings-article/cmc/2011/05931142/12OmNAZx8RC",
"parentPublication": {
"id": "proceedings/cmc/2011/312/0",
"title": "2011 Third International Conference on Communications and Mobile Computing (CMC 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-css-icess/2015/8937/0/07336149",
"title": "Efficiently Trigger Data Races through Speculative Execution",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-css-icess/2015/07336149/12OmNqAU6Ck",
"parentPublication": {
"id": "proceedings/hpcc-css-icess/2015/8937/0",
"title": "2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS) and 2015 IEEE 12th International Conf on Embedded Software and Systems (ICESS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-css-icess/2015/8937/0/07336379",
"title": "Shared Write Buffer to Support Speculative Execution",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-css-icess/2015/07336379/12OmNwErpuR",
"parentPublication": {
"id": "proceedings/hpcc-css-icess/2015/8937/0",
"title": "2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS) and 2015 IEEE 12th International Conf on Embedded Software and Systems (ICESS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icci/1993/4212/0/00315367",
"title": "Speculative parallelism in BaLinda Lisp",
"doi": null,
"abstractUrl": "/proceedings-article/icci/1993/00315367/12OmNwJPMYt",
"parentPublication": {
"id": "proceedings/icci/1993/4212/0",
"title": "Cognitive Informatics, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pact/2017/6764/0/6764a064",
"title": "SAM: Optimizing Multithreaded Cores for Speculative Parallelism",
"doi": null,
"abstractUrl": "/proceedings-article/pact/2017/6764a064/12OmNyQGSkn",
"parentPublication": {
"id": "proceedings/pact/2017/6764/0",
"title": "2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-css-icess/2014/6123/0/07056870",
"title": "A Dynamically Adaptive Approach for Speculative Loop Execution in SMT Architectures",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-css-icess/2014/07056870/12OmNyvGyjU",
"parentPublication": {
"id": "proceedings/hpcc-css-icess/2014/6123/0",
"title": "2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipps/1994/5602/0/0288304",
"title": "The effect of speculative execution on cache performance",
"doi": null,
"abstractUrl": "/proceedings-article/ipps/1994/0288304/12OmNywfKFQ",
"parentPublication": {
"id": "proceedings/ipps/1994/5602/0",
"title": "Parallel Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2016/3508/0/07783708",
"title": "Data-centric execution of speculative parallel programs",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2016/07783708/12OmNzlUKmi",
"parentPublication": {
"id": "proceedings/micro/2016/3508/0",
"title": "2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2017/4952/0/08686594",
"title": "WIREFRAME: Supporting Data-dependent Parallelism through Dependency Graph Execution in GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2017/08686594/19RRWuYCgNi",
"parentPublication": {
"id": "proceedings/micro/2017/4952/0",
"title": "2017 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2020/11/09159879",
"title": "Understanding Selective Delay as a Method for Efficient Secure Speculative Execution",
"doi": null,
"abstractUrl": "/journal/tc/2020/11/09159879/1m3mazORmJG",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNB8Cj8d",
"title": "2012 International Conference on Cyberworlds",
"acronym": "cw",
"groupId": "1000175",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqFJhMd",
"doi": "10.1109/CW.2012.25",
"title": "Leveraging UML and Concept Maps for Constructing Crisis Management Ontology",
"normalizedTitle": "Leveraging UML and Concept Maps for Constructing Crisis Management Ontology",
"abstract": "The main article focus is leveraging power of human-oriented modelling paradigms such as UML and concept maps frameworks for creating upper levels of crisis management ontology. Domain experts, which are involved in ontology creation process, usually are not comfortable with direct ontology creation. From the other side, ontology engineers may not know modelled domain as deeply as experts. Utilization of intermediate modelling techniques such as UML and concept maps removes gap between domain experts and ontology engineers. This work includes detailed research of workflow for transforming UML and concept maps model to OWL ontology which is ready for further formalization. Comparison of UML and concept maps workflows for creating upper levels of crisis ontology is provided.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The main article focus is leveraging power of human-oriented modelling paradigms such as UML and concept maps frameworks for creating upper levels of crisis management ontology. Domain experts, which are involved in ontology creation process, usually are not comfortable with direct ontology creation. From the other side, ontology engineers may not know modelled domain as deeply as experts. Utilization of intermediate modelling techniques such as UML and concept maps removes gap between domain experts and ontology engineers. This work includes detailed research of workflow for transforming UML and concept maps model to OWL ontology which is ready for further formalization. Comparison of UML and concept maps workflows for creating upper levels of crisis ontology is provided.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The main article focus is leveraging power of human-oriented modelling paradigms such as UML and concept maps frameworks for creating upper levels of crisis management ontology. Domain experts, which are involved in ontology creation process, usually are not comfortable with direct ontology creation. From the other side, ontology engineers may not know modelled domain as deeply as experts. Utilization of intermediate modelling techniques such as UML and concept maps removes gap between domain experts and ontology engineers. This work includes detailed research of workflow for transforming UML and concept maps model to OWL ontology which is ready for further formalization. Comparison of UML and concept maps workflows for creating upper levels of crisis ontology is provided.",
"fno": "4814a130",
"keywords": [
"Unified Modeling Language",
"OWL",
"Ontologies",
"Crisis Management",
"Humans",
"Standards",
"Electronic Mail",
"Collaborative Network Environments",
"UML",
"OWL",
"Ontologies",
"Crisis Management"
],
"authors": [
{
"affiliation": null,
"fullName": "Sergey Mescherin",
"givenName": "Sergey",
"surname": "Mescherin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Igor Kirillov",
"givenName": "Igor",
"surname": "Kirillov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stanislav Klimenko",
"givenName": "Stanislav",
"surname": "Klimenko",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-09-01T00:00:00",
"pubType": "proceedings",
"pages": "130-136",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-2736-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4814a122",
"articleId": "12OmNzwpU2O",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4814a137",
"articleId": "12OmNANkofQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ftdcs/2004/2118/0/21180222",
"title": "A Complexity Measure for Ontology Based on UML",
"doi": null,
"abstractUrl": "/proceedings-article/ftdcs/2004/21180222/12OmNBQ2VWo",
"parentPublication": {
"id": "proceedings/ftdcs/2004/2118/0",
"title": "10th IEEE International Workshop on Future Trends of Distributed Computing Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ecbs/2010/4005/0/4005a215",
"title": "UML-JMT: A Tool for Evaluating Performance Requirements",
"doi": null,
"abstractUrl": "/proceedings-article/ecbs/2010/4005a215/12OmNBQkx2f",
"parentPublication": {
"id": "proceedings/ecbs/2010/4005/0",
"title": "Engineering of Computer-Based Systems, IEEE International Conference on the",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sera/2006/2656/0/26560315",
"title": "Integration of Semantic Web Service and Component-Based Development for e-business environment",
"doi": null,
"abstractUrl": "/proceedings-article/sera/2006/26560315/12OmNCctfj6",
"parentPublication": {
"id": "proceedings/sera/2006/2656/0",
"title": "Fourth International Conference on Software Engineering Research, Management and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edocw/2010/7965/0/05629027",
"title": "Conceptual Maps as the First Step in an Ontology Construction Method",
"doi": null,
"abstractUrl": "/proceedings-article/edocw/2010/05629027/12OmNvA1h9l",
"parentPublication": {
"id": "proceedings/edocw/2010/7965/0",
"title": "2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2014/4003/0/4003a235",
"title": "A Semantic Mapping Representation and Generation Tool Using UML for System Engineers",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2014/4003a235/12OmNxG1yPu",
"parentPublication": {
"id": "proceedings/icsc/2014/4003/0",
"title": "2014 IEEE International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2015/7581/0/07406281",
"title": "A Situation Awareness Question Generator to Determine a Crisis Situation",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2015/07406281/12OmNzayNCq",
"parentPublication": {
"id": "proceedings/dexa/2015/7581/0",
"title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ghtc/2011/4595/0/4595a426",
"title": "Securing Crisis Maps in Conflict Zones",
"doi": null,
"abstractUrl": "/proceedings-article/ghtc/2011/4595a426/12OmNzwpU9i",
"parentPublication": {
"id": "proceedings/ghtc/2011/4595/0",
"title": "IEEE Global Humanitarian Technology Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2017/0443/0/08103474",
"title": "Visualizing OWL 2 using diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2017/08103474/17D45Vw15wn",
"parentPublication": {
"id": "proceedings/vlhcc/2017/0443/0",
"title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2019/6783/0/08665539",
"title": "Empathi: An Ontology for Emergency Managing and Planning About Hazard Crisis",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2019/08665539/18qcd51uXGE",
"parentPublication": {
"id": "proceedings/icsc/2019/6783/0",
"title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbi/2020/9926/1/09140231",
"title": "Case-Study-Based Review of Approaches for Transforming UML Class Diagrams to OWL and Vice Versa",
"doi": null,
"abstractUrl": "/proceedings-article/cbi/2020/09140231/1lu6Plredqw",
"parentPublication": {
"id": "cbi/2020/9926/1",
"title": "2020 IEEE 22nd Conference on Business Informatics (CBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy314bl",
"title": "2015 12th Web Information System and Application Conference (WISA)",
"acronym": "wisa",
"groupId": "1003022",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwLfMCc",
"doi": "10.1109/WISA.2015.25",
"title": "An Approach for Mapping Relational Database into Ontology",
"normalizedTitle": "An Approach for Mapping Relational Database into Ontology",
"abstract": "Sharing and reusing the big data in relational databases in a semantic way have become a big challenge. In this paper, we propose a new approach to enable semantic web applications to access relational databases (RDBs) and their contents by semantic methods. Domain ontologies can be used to formulate RDB schema and data in order to simplify the mapping of the underlying data sources. Our method consists of two main phases: building ontology from an RDB schema and the generation of ontology instances from an RDB data automatically. In the first phase, we studied different cases of RDB schema to be mapped into ontology represented in RDF(S)-OWL, while in the second phase, the mapping rules are used to transform RDB data to ontological instances represented in RDF triples. Our approach is demonstrated with examples and validated by ontology validator.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Sharing and reusing the big data in relational databases in a semantic way have become a big challenge. In this paper, we propose a new approach to enable semantic web applications to access relational databases (RDBs) and their contents by semantic methods. Domain ontologies can be used to formulate RDB schema and data in order to simplify the mapping of the underlying data sources. Our method consists of two main phases: building ontology from an RDB schema and the generation of ontology instances from an RDB data automatically. In the first phase, we studied different cases of RDB schema to be mapped into ontology represented in RDF(S)-OWL, while in the second phase, the mapping rules are used to transform RDB data to ontological instances represented in RDF triples. Our approach is demonstrated with examples and validated by ontology validator.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Sharing and reusing the big data in relational databases in a semantic way have become a big challenge. In this paper, we propose a new approach to enable semantic web applications to access relational databases (RDBs) and their contents by semantic methods. Domain ontologies can be used to formulate RDB schema and data in order to simplify the mapping of the underlying data sources. Our method consists of two main phases: building ontology from an RDB schema and the generation of ontology instances from an RDB data automatically. In the first phase, we studied different cases of RDB schema to be mapped into ontology represented in RDF(S)-OWL, while in the second phase, the mapping rules are used to transform RDB data to ontological instances represented in RDF triples. Our approach is demonstrated with examples and validated by ontology validator.",
"fno": "07396620",
"keywords": [
"Ontologies",
"Resource Description Framework",
"OWL",
"Data Models",
"Vocabulary",
"Relational Databases",
"Mapping Rule",
"Relational Database",
"Semantic Web Ontology",
"RDF S",
"OWL"
],
"authors": [
{
"affiliation": null,
"fullName": "Mohamed A. G. Hazber",
"givenName": "Mohamed A. G.",
"surname": "Hazber",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ruixuan Li",
"givenName": "Ruixuan",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yuxi Zhang",
"givenName": "Yuxi",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Guandong Xu",
"givenName": "Guandong",
"surname": "Xu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wisa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-09-01T00:00:00",
"pubType": "proceedings",
"pages": "120-125",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-9371-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07396619",
"articleId": "12OmNy5R3qX",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07396621",
"articleId": "12OmNy2agUR",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/collaboratecom/2014/043/0/07014568",
"title": "Automatic mapping rules and OWL ontology extraction for the OBDA Ontop",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2014/07014568/12OmNAXPy8M",
"parentPublication": {
"id": "proceedings/collaboratecom/2014/043/0",
"title": "2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2010/3987/1/3987a198",
"title": "Tool for Translating Relational Databases Schema into Ontology for Semantic Web",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987a198/12OmNAfy7Jl",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/1",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2008/2357/0/04594668",
"title": "Schemaless approach of mapping XML document into Relational Database",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2008/04594668/12OmNApcusl",
"parentPublication": {
"id": "proceedings/cit/2008/2357/0",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2013/3012/0/3012a186",
"title": "An R2RML-based Mapping System from Metal Materials Database to Ontology",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2013/3012a186/12OmNBOUxm5",
"parentPublication": {
"id": "proceedings/skg/2013/3012/0",
"title": "2013 Ninth International Conference on Semantics, Knowledge and Grids (SKG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wism/2010/4224/1/4224a335",
"title": "Towards Integration Rules of Mapping from Relational Databases to Semantic Web Ontology",
"doi": null,
"abstractUrl": "/proceedings-article/wism/2010/4224a335/12OmNBQ2VX2",
"parentPublication": {
"id": "proceedings/wism/2010/4224/1",
"title": "Web Information Systems and Mining, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2015/9808/0/9808a025",
"title": "Semantic SPARQL Query in a Relational Database Based on Ontology Construction",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2015/9808a025/12OmNrNh0Cr",
"parentPublication": {
"id": "proceedings/skg/2015/9808/0",
"title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/synasc/2011/4630/0/4630a175",
"title": "Mapping a Relational Database into a RDF Repository",
"doi": null,
"abstractUrl": "/proceedings-article/synasc/2011/4630a175/12OmNrNh0sE",
"parentPublication": {
"id": "proceedings/synasc/2011/4630/0",
"title": "2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chinagrid/2012/4816/0/4816a076",
"title": "Ontology Based Data Conversion from Spreadsheet to OWL",
"doi": null,
"abstractUrl": "/proceedings-article/chinagrid/2012/4816a076/12OmNwKGAog",
"parentPublication": {
"id": "proceedings/chinagrid/2012/4816/0",
"title": "2012 Seventh ChinaGrid Annual Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/music/2012/1956/0/4727a053",
"title": "Generating OWL Ontology from Relational Database",
"doi": null,
"abstractUrl": "/proceedings-article/music/2012/4727a053/12OmNzlD9bs",
"parentPublication": {
"id": "proceedings/music/2012/1956/0",
"title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd/2018/5889/0/08441102",
"title": "Study Relational Database Transformation to Ontology",
"doi": null,
"abstractUrl": "/proceedings-article/snpd/2018/08441102/13bd1gCd7Tf",
"parentPublication": {
"id": "proceedings/snpd/2018/5889/0",
"title": "2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBscCYx",
"title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)",
"acronym": "aina",
"groupId": "1000008",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwkzupp",
"doi": "10.1109/AINA.2017.144",
"title": "CODE+: Building Common Ontology from Community Knowledge",
"normalizedTitle": "CODE+: Building Common Ontology from Community Knowledge",
"abstract": "A domain ontology is an ontology that describes the fundamental knowledge of the domain, including the domain vocabulary, concepts, taxonomy, relations, properties, constraints, and axioms. The creation of a domain ontology may be done manually from scratch by domain experts or translated from existing knowledge sources. Our earlier work in [4] presented a framework on building an ontology by matching and merging existing domain ontologies. In this paper, we expand the framework to include different types of community knowledge representations in a common ontology. A common ontology is a domain ontology that is developed from community knowledge by gathering their commonality. To build a common ontology, we standardize different community data format using a schema mediation notation. We apply rule-based mapping and information extraction methodology, and we perform matching, clustering and merging, to collect common knowledge together. The evaluation shows that our proposed framework can build a valid and rich common ontology.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A domain ontology is an ontology that describes the fundamental knowledge of the domain, including the domain vocabulary, concepts, taxonomy, relations, properties, constraints, and axioms. The creation of a domain ontology may be done manually from scratch by domain experts or translated from existing knowledge sources. Our earlier work in [4] presented a framework on building an ontology by matching and merging existing domain ontologies. In this paper, we expand the framework to include different types of community knowledge representations in a common ontology. A common ontology is a domain ontology that is developed from community knowledge by gathering their commonality. To build a common ontology, we standardize different community data format using a schema mediation notation. We apply rule-based mapping and information extraction methodology, and we perform matching, clustering and merging, to collect common knowledge together. The evaluation shows that our proposed framework can build a valid and rich common ontology.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A domain ontology is an ontology that describes the fundamental knowledge of the domain, including the domain vocabulary, concepts, taxonomy, relations, properties, constraints, and axioms. The creation of a domain ontology may be done manually from scratch by domain experts or translated from existing knowledge sources. Our earlier work in [4] presented a framework on building an ontology by matching and merging existing domain ontologies. In this paper, we expand the framework to include different types of community knowledge representations in a common ontology. A common ontology is a domain ontology that is developed from community knowledge by gathering their commonality. To build a common ontology, we standardize different community data format using a schema mediation notation. We apply rule-based mapping and information extraction methodology, and we perform matching, clustering and merging, to collect common knowledge together. The evaluation shows that our proposed framework can build a valid and rich common ontology.",
"fno": "6029a562",
"keywords": [
"Ontologies",
"Merging",
"OWL",
"Information Retrieval",
"Data Mining",
"Ontology",
"Common Ontology",
"Matching",
"Merging"
],
"authors": [
{
"affiliation": null,
"fullName": "Dhomas Hatta Fudholi",
"givenName": "Dhomas Hatta",
"surname": "Fudholi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wenny Rahayu",
"givenName": "Wenny",
"surname": "Rahayu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Eric Pardede",
"givenName": "Eric",
"surname": "Pardede",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "aina",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-03-01T00:00:00",
"pubType": "proceedings",
"pages": "562-569",
"year": "2017",
"issn": "1550-445X",
"isbn": "978-1-5090-6029-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07920957",
"articleId": "12OmNzwHvhT",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07920959",
"articleId": "12OmNC1Guhk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iwsc/2013/6445/0/06613032",
"title": "Light-weight ontology alignment using best-match clone detection",
"doi": null,
"abstractUrl": "/proceedings-article/iwsc/2013/06613032/12OmNAle6ZK",
"parentPublication": {
"id": "proceedings/iwsc/2013/6445/0",
"title": "2013 7th International Workshop on Software Clones (IWSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/t4e/2014/6489/0/6489a189",
"title": "OntoBAeval: Ontology Based Automatic Evaluation of Free-Text Response",
"doi": null,
"abstractUrl": "/proceedings-article/t4e/2014/6489a189/12OmNqBbHDC",
"parentPublication": {
"id": "proceedings/t4e/2014/6489/0",
"title": "2014 IEEE Sixth International Conference on Technology for Education (T4E)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isms/2011/4336/0/4336a296",
"title": "An Ontology-Based Context Model for Building Context-Aware Services",
"doi": null,
"abstractUrl": "/proceedings-article/isms/2011/4336a296/12OmNrGsDse",
"parentPublication": {
"id": "proceedings/isms/2011/4336/0",
"title": "Intelligent Systems, Modelling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aina/2014/3630/0/3629a751",
"title": "CODE (Common Ontology DEvelopment): A Knowledge Integration Approach from Multiple Ontologies",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2014/3629a751/12OmNrJAdRC",
"parentPublication": {
"id": "proceedings/aina/2014/3630/0",
"title": "2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictcs/2017/0527/0/0527a223",
"title": "Building Domain Ontology: Experiences in Developing the Prophetic Ontology Form Quran and Hadith",
"doi": null,
"abstractUrl": "/proceedings-article/ictcs/2017/0527a223/12OmNxy4N2G",
"parentPublication": {
"id": "proceedings/ictcs/2017/0527/0",
"title": "2017 International Conference on New Trends in Computing Sciences (ICTCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2014/4143/1/4143a400",
"title": "An Ontology for Guiding Performance Testing",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2014/4143a400/12OmNyUFg1G",
"parentPublication": {
"id": "wi-iat/2014/4143/1",
"title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aina/2016/1858/0/1858b116",
"title": "Ontology-Based Information Extraction for Knowledge Enrichment and Validation",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2016/1858b116/12OmNyxXlvp",
"parentPublication": {
"id": "proceedings/aina/2016/1858/0",
"title": "2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wisa/2010/4193/0/4193a115",
"title": "Research on Semi-automatic Domain Ontology Construction",
"doi": null,
"abstractUrl": "/proceedings-article/wisa/2010/4193a115/12OmNzmclkM",
"parentPublication": {
"id": "proceedings/wisa/2010/4193/0",
"title": "Web Information Systems and Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/euros&pw/2022/9560/0/956000a423",
"title": "Building an Ontology for Cyber Defence Exercises",
"doi": null,
"abstractUrl": "/proceedings-article/euros&pw/2022/956000a423/1EygFAa10zK",
"parentPublication": {
"id": "proceedings/euros&pw/2022/9560/0",
"title": "2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10021134",
"title": "Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10021134/1KfTcY3WVQA",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx7ouZy",
"title": "2011 22nd International Workshop on Database and Expert Systems Applications",
"acronym": "dexa",
"groupId": "1000180",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzXnNwi",
"doi": "10.1109/DEXA.2011.12",
"title": "An Ontology-Based Approach to Adaptive Home Careflows",
"normalizedTitle": "An Ontology-Based Approach to Adaptive Home Careflows",
"abstract": "In the healthcare domain, a profusion of workflows are utilised and lots of implicit knowledge is used by domain experts in their daily activities. Ontologies can facilitate the personalized construction of care workflows (care flows) and guide their management in contingency cases, thus allowing them to deviate from their standard prescribed static definition. In this paper we propose a formalization of workflow to automatically adapt the process of homecare for elderly people. We use an ontology of Business Process Modeling Notations(BPMN) associated with both Actor and Case Profile Ontologies to dynamically build flexible care flows capable of guiding the continuity of care.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the healthcare domain, a profusion of workflows are utilised and lots of implicit knowledge is used by domain experts in their daily activities. Ontologies can facilitate the personalized construction of care workflows (care flows) and guide their management in contingency cases, thus allowing them to deviate from their standard prescribed static definition. In this paper we propose a formalization of workflow to automatically adapt the process of homecare for elderly people. We use an ontology of Business Process Modeling Notations(BPMN) associated with both Actor and Case Profile Ontologies to dynamically build flexible care flows capable of guiding the continuity of care.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the healthcare domain, a profusion of workflows are utilised and lots of implicit knowledge is used by domain experts in their daily activities. Ontologies can facilitate the personalized construction of care workflows (care flows) and guide their management in contingency cases, thus allowing them to deviate from their standard prescribed static definition. In this paper we propose a formalization of workflow to automatically adapt the process of homecare for elderly people. We use an ontology of Business Process Modeling Notations(BPMN) associated with both Actor and Case Profile Ontologies to dynamically build flexible care flows capable of guiding the continuity of care.",
"fno": "06059870",
"keywords": [
"Health Care",
"Ontologies Artificial Intelligence",
"Ontology Based Approach",
"Adaptive Home Careflows",
"Healthcare Domain",
"Implicit Knowledge",
"Care Workflows",
"Business Process Modeling Notations",
"Case Profile Ontologies",
"Ontologies",
"Adaptation Models",
"Business",
"OWL",
"Diseases",
"Senior Citizens",
"Careflow",
"Ontologies",
"Actor Profile",
"Case Profile",
"BPMN",
"E Health",
"Homecare"
],
"authors": [
{
"affiliation": null,
"fullName": "Abdel-Rahman Hani Tawil",
"givenName": "Abdel-Rahman Hani",
"surname": "Tawil",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Anousak Litnhouvongs",
"givenName": "Anousak",
"surname": "Litnhouvongs",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Quentin Chevalier",
"givenName": "Quentin",
"surname": "Chevalier",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Adel Taweel",
"givenName": "Adel",
"surname": "Taweel",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dexa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-08-01T00:00:00",
"pubType": "proceedings",
"pages": "522-526",
"year": "2011",
"issn": "1529-4188",
"isbn": "978-1-4577-0982-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06059869",
"articleId": "12OmNAXxXiZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06059871",
"articleId": "12OmNrIJquv",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2015/7367/0/7367d084",
"title": "Ontology Design for Supporting Decision Making in Self Care Homes",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2015/7367d084/12OmNy2ah0A",
"parentPublication": {
"id": "proceedings/hicss/2015/7367/0",
"title": "2015 48th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2014/4143/1/4143a149",
"title": "An Approach for Learning and Construction of Expressive Ontology from Text in Natural Language",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2014/4143a149/12OmNyQ7G68",
"parentPublication": {
"id": "wi-iat/2014/4143/1",
"title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2011/0982/0/06059866",
"title": "Paper Ontology-Driven Customization of Home-Care Workflows",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2011/06059866/12OmNywfKKN",
"parentPublication": {
"id": "proceedings/dexa/2011/0982/0",
"title": "2011 22nd International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/7/05360048",
"title": "Ontology Mapping Approach Based on Concept Dimensions",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/05360048/12OmNz5JC8n",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/7",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2014/6572/0/6572a122",
"title": "Ontology View Extraction: An Approach Based on Ontological Meta-properties",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2014/6572a122/12OmNzwpUk2",
"parentPublication": {
"id": "proceedings/ictai/2014/6572/0",
"title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/sc/2016/04/07056427",
"title": "OMI-DL: An Ontology Matching Framework",
"doi": null,
"abstractUrl": "/journal/sc/2016/04/07056427/13rRUxASusT",
"parentPublication": {
"id": "trans/sc",
"title": "IEEE Transactions on Services Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440124",
"title": "VIS4ML: An Ontology for Visual Analytics Assisted Machine Learning",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440124/17D45XfSETS",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icws/2019/2717/0/271700a237",
"title": "Crossover Service Fusion Approach Based on Microservice Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/icws/2019/271700a237/1cTJqicHPBm",
"parentPublication": {
"id": "proceedings/icws/2019/2717/0",
"title": "2019 IEEE International Conference on Web Services (ICWS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse-euc/2019/1664/0/166400a390",
"title": "KLog-Home: A Holistic Approach of In-Situ Monitoring in Elderly-Care Home",
"doi": null,
"abstractUrl": "/proceedings-article/cse-euc/2019/166400a390/1fHkxxYG8yk",
"parentPublication": {
"id": "proceedings/cse-euc/2019/1664/0",
"title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2018/1360/0/136000a907",
"title": "Internet of Things Home Healthcare: The Feasibility of Elderly Activity Monitoring",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2018/136000a907/1gjRy06OOuA",
"parentPublication": {
"id": "proceedings/csci/2018/1360/0",
"title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.