data
dict
{ "proceeding": { "id": "17D45VtKipZ", "title": "2018 IEEE International Congress on Big Data (BigData Congress)", "acronym": "bigdata-congress", "groupId": "1801789", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRoqX", "doi": "10.1109/BigDataCongress.2018.00039", "title": "An OWL Ontology for Supporting Semantic Services in Big Data Platforms", "normalizedTitle": "An OWL Ontology for Supporting Semantic Services in Big Data Platforms", "abstract": "In the last years, there was a growing interest in the use of Big Data models to support advanced data analysis functionalities. Many companies and organizations lack IT expertise and adequate budget to have benefits from them. In order to fill this gap, a model-based approach for Big Data Analytics-as-a-service (MBDAaaS) can be used. The proposed model, composed by declarative, procedural and deployment (sub) models, can be used to select a deployable set of services based on a set of user preferences shaping a Big Data Campaign (BDC). The deployment of a BDC requires that the selection of services has to be carried out on the basis of coherent and non conflictual user preferences. In this paper we propose an OWL ontology in order to solve this issue.", "abstracts": [ { "abstractType": "Regular", "content": "In the last years, there was a growing interest in the use of Big Data models to support advanced data analysis functionalities. Many companies and organizations lack IT expertise and adequate budget to have benefits from them. In order to fill this gap, a model-based approach for Big Data Analytics-as-a-service (MBDAaaS) can be used. The proposed model, composed by declarative, procedural and deployment (sub) models, can be used to select a deployable set of services based on a set of user preferences shaping a Big Data Campaign (BDC). The deployment of a BDC requires that the selection of services has to be carried out on the basis of coherent and non conflictual user preferences. In this paper we propose an OWL ontology in order to solve this issue.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the last years, there was a growing interest in the use of Big Data models to support advanced data analysis functionalities. Many companies and organizations lack IT expertise and adequate budget to have benefits from them. In order to fill this gap, a model-based approach for Big Data Analytics-as-a-service (MBDAaaS) can be used. The proposed model, composed by declarative, procedural and deployment (sub) models, can be used to select a deployable set of services based on a set of user preferences shaping a Big Data Campaign (BDC). The deployment of a BDC requires that the selection of services has to be carried out on the basis of coherent and non conflictual user preferences. In this paper we propose an OWL ontology in order to solve this issue.", "fno": "723201a228", "keywords": [ "Big Data", "Data Analysis", "Data Models", "Knowledge Representation Languages", "Ontologies Artificial Intelligence", "Semantic Web", "OWL Ontology", "Semantic Services", "Big Data Platforms", "Big Data Models", "Advanced Data Analysis Functionalities", "Big Data Analytics As A Service", "Deployable Set", "Big Data Campaign", "BDC", "Ontologies", "OWL", "Data Models", "Big Data", "Semantics", "Analytical Models", "Big Data As A Service", "Semantic Web Services", "Big Data Ontology" ], "authors": [ { "affiliation": null, "fullName": "Domenico Redavid", "givenName": "Domenico", "surname": "Redavid", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roberto Corizzo", "givenName": "Roberto", "surname": "Corizzo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Donato Malerba", "givenName": "Donato", "surname": "Malerba", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigdata-congress", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "228-231", "year": "2018", "issn": null, "isbn": "978-1-5386-7232-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "723201a224", "articleId": "17D45W9KVIl", "__typename": "AdjacentArticleType" }, "next": { "fno": "723201a232", "articleId": "17D45VObpO5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2016/0662/0/0662a096", "title": "An Innovative Statistical Tool for Automatic OWL-ERD Alignment", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a096/12OmNBZHihk", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2012/4816/0/4816a076", "title": "Ontology Based Data Conversion from Spreadsheet to OWL", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2012/4816a076/12OmNwKGAog", "parentPublication": { "id": "proceedings/chinagrid/2012/4816/0", "title": "2012 Seventh ChinaGrid Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2015/9371/0/07396620", "title": "An Approach for Mapping Relational Database into Ontology", "doi": null, "abstractUrl": "/proceedings-article/wisa/2015/07396620/12OmNwLfMCc", "parentPublication": { "id": "proceedings/wisa/2015/9371/0", "title": "2015 12th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004397", "title": "Pharmacological class data representation in the Web Ontology Language (OWL)", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004397/12OmNxVV5Zq", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2016/2622/0/07584932", "title": "GOMA: Supporting Big Data Analytics with a Goal-Oriented Approach", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2016/07584932/12OmNyKrHjm", "parentPublication": { "id": "proceedings/bigdata-congress/2016/2622/0", "title": "2016 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2015/7278/0/07207227", "title": "Using Semantics in Predictive Big Data Analytics", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207227/12OmNyuyack", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/music/2012/1956/0/4727a053", "title": "Generating OWL Ontology from Relational Database", "doi": null, "abstractUrl": "/proceedings-article/music/2012/4727a053/12OmNzlD9bs", "parentPublication": { "id": "proceedings/music/2012/1956/0", "title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2015/8128/0/8128a468", "title": "Philosophy of Big Data: Expanding the Human-Data Relation with Big Data Science Services", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2015/8128a468/12OmNzzfTmk", "parentPublication": { "id": "proceedings/bigdataservice/2015/8128/0", "title": "2015 IEEE First International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020589", "title": "Control System Design and Implementation Based on Big Data and Ontology", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020589/1KfS5is0gJq", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/01/08734006", "title": "Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data", "doi": null, "abstractUrl": "/journal/sc/2022/01/08734006/1aKtYNedaoM", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipY", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "acronym": "trustcom-bigdatase", "groupId": "1800729", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRoxB", "doi": "10.1109/TrustCom/BigDataSE.2018.00180", "title": "Learning and Applying Ontology for Machine Learning in Cyber Attack Detection", "normalizedTitle": "Learning and Applying Ontology for Machine Learning in Cyber Attack Detection", "abstract": "In cyber security, the ontology is invented to provide vocabulary in a generalized machine-processable language for downstream works such as attack detection. Meanwhile, machine learning (ML) as a promising intelligent field, is widely investigated to achieve the automation of these tasks. Existing ML-based methods suffer from confines of specific data and preprocessing, while applying ontology with machine learning methods is still rarely discussed. In this paper, 1) we propose a novel approach for automatic attack detection by generating ontology with deep learning through neural network embeddings; 2) we validate the learned ontology by comparing it with a manual ontology built by security expert, the results demonstrates that the latent representation learned with neural networks could serve as a novel ontology format so as to provide a generalized machine-processable language for downstream works, which is the intention of the ontology; 3) finally, we develop a platform to achieve the entire intelligent ontology learning and utilization for cyber attack detection. Our experimental results shows that our proposed ontology is promising to collaborate with machine learning based methods in order to improve the intelligent intrusion detection for cyber security.", "abstracts": [ { "abstractType": "Regular", "content": "In cyber security, the ontology is invented to provide vocabulary in a generalized machine-processable language for downstream works such as attack detection. Meanwhile, machine learning (ML) as a promising intelligent field, is widely investigated to achieve the automation of these tasks. Existing ML-based methods suffer from confines of specific data and preprocessing, while applying ontology with machine learning methods is still rarely discussed. In this paper, 1) we propose a novel approach for automatic attack detection by generating ontology with deep learning through neural network embeddings; 2) we validate the learned ontology by comparing it with a manual ontology built by security expert, the results demonstrates that the latent representation learned with neural networks could serve as a novel ontology format so as to provide a generalized machine-processable language for downstream works, which is the intention of the ontology; 3) finally, we develop a platform to achieve the entire intelligent ontology learning and utilization for cyber attack detection. Our experimental results shows that our proposed ontology is promising to collaborate with machine learning based methods in order to improve the intelligent intrusion detection for cyber security.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In cyber security, the ontology is invented to provide vocabulary in a generalized machine-processable language for downstream works such as attack detection. Meanwhile, machine learning (ML) as a promising intelligent field, is widely investigated to achieve the automation of these tasks. Existing ML-based methods suffer from confines of specific data and preprocessing, while applying ontology with machine learning methods is still rarely discussed. In this paper, 1) we propose a novel approach for automatic attack detection by generating ontology with deep learning through neural network embeddings; 2) we validate the learned ontology by comparing it with a manual ontology built by security expert, the results demonstrates that the latent representation learned with neural networks could serve as a novel ontology format so as to provide a generalized machine-processable language for downstream works, which is the intention of the ontology; 3) finally, we develop a platform to achieve the entire intelligent ontology learning and utilization for cyber attack detection. Our experimental results shows that our proposed ontology is promising to collaborate with machine learning based methods in order to improve the intelligent intrusion detection for cyber security.", "fno": "438801b309", "keywords": [ "Learning Artificial Intelligence", "Ontologies Artificial Intelligence", "Security Of Data", "Neural Network Embeddings", "Learned Ontology", "Manual Ontology", "Generalized Machine Processable Language", "Cyber Attack Detection", "Intelligent Intrusion Detection", "Cyber Security", "ML Based Methods", "Machine Learning Methods", "Automatic Attack Detection", "Deep Learning", "Intelligent Ontology Learning", "Ontologies", "Conferences", "Security", "Data Privacy", "Big Data", "Ontology", "Attack Detection", "Machine Learning", "Representation Learning", "Deep Learning" ], "authors": [ { "affiliation": null, "fullName": "Huangjie Zheng", "givenName": "Huangjie", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuchen Wang", "givenName": "Yuchen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chen Han", "givenName": "Chen", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fangjie Le", "givenName": "Fangjie", "surname": "Le", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ruan He", "givenName": "Ruan", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jialiang Lu", "givenName": "Jialiang", "surname": "Lu", "__typename": "ArticleAuthorType" } ], "idPrefix": "trustcom-bigdatase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "1309-1315", "year": "2018", "issn": "2324-9013", "isbn": "978-1-5386-4388-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "438801b303", "articleId": "17D45WK5ArZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "438801b316", "articleId": "17D45Xtvpem", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpads/2017/2129/0/212901a001", "title": "Event Description and Detection in Cyber-Physical Systems: An Ontology-Based Language and Approach", "doi": null, "abstractUrl": "/proceedings-article/icpads/2017/212901a001/12OmNvo67Et", "parentPublication": { "id": "proceedings/icpads/2017/2129/0", "title": "2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363310", "title": "A Cyber Security Ontology for BPMN-Security Extensions", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363310/12OmNynJMW8", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a627", "title": "Ontology Reduction Based on Axiomatic Cognitive Model for Ontology Learning", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a627/12OmNzxyiFJ", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b242", "title": "Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b242/17D45Vw15wg", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2019/6783/0/08665532", "title": "The Guitar Rendition Ontology for Teaching and Learning Support", "doi": null, "abstractUrl": "/proceedings-article/icsc/2019/08665532/18qccDvg8OQ", "parentPublication": { "id": "proceedings/icsc/2019/6783/0", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671893", "title": "On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671893/1A8jmuY0wuY", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&pw/2022/9560/0/956000a423", "title": "Building an Ontology for Cyber Defence Exercises", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2022/956000a423/1EygFAa10zK", "parentPublication": { "id": "proceedings/euros&pw/2022/9560/0", "title": "2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0/09123052", "title": "A Smart-Farming Ontology for Attribute Based Access Control", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2020/09123052/1kTB111Mkz6", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0", "title": "2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccma/2021/2567/0/256700a071", "title": "Cyber Threat Ontology and Adversarial Machine Learning Attacks: Analysis and Prediction Perturbance", "doi": null, "abstractUrl": "/proceedings-article/iccma/2021/256700a071/1xDQ5e7LRE4", "parentPublication": { "id": "proceedings/iccma/2021/2567/0", "title": "2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&pw/2021/1012/0/999900a249", "title": "Ontology-Based Scenario Modeling for Cyber Security Exercise", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2021/999900a249/1y63jjBIWCk", "parentPublication": { "id": "proceedings/euros&pw/2021/1012/0", "title": "2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oUCSFDYR9e", "title": "2020 International Conference on Communications, Information System and Computer Engineering (CISCE)", "acronym": "cisce", "groupId": "1832744", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oUCTata3VC", "doi": "10.1109/CISCE50729.2020.00065", "title": "Ontology Construction for Security Analysis of Network Nodes", "normalizedTitle": "Ontology Construction for Security Analysis of Network Nodes", "abstract": "Security related data in cyberspace is multi-source and heterogeneous, so it cannot be effectively used in network security analysis. To solve this problem, a network security ontology model for network node security analysis is proposed. The model reflects the security status of network nodes through three key sub domains: network assets, security information, defense strategy, and modeling concepts and relationships in a hierarchical and structured form. Ontology related language is used for query, and user-defined rules are used to enhance the reasoning ability of ontology, so as to assist network security analysis. Experiments and quality evaluation results show that the ontology model can integrate multi-source data, query and reason the network security status, and has higher quality evaluation than the same type of ontology.", "abstracts": [ { "abstractType": "Regular", "content": "Security related data in cyberspace is multi-source and heterogeneous, so it cannot be effectively used in network security analysis. To solve this problem, a network security ontology model for network node security analysis is proposed. The model reflects the security status of network nodes through three key sub domains: network assets, security information, defense strategy, and modeling concepts and relationships in a hierarchical and structured form. Ontology related language is used for query, and user-defined rules are used to enhance the reasoning ability of ontology, so as to assist network security analysis. Experiments and quality evaluation results show that the ontology model can integrate multi-source data, query and reason the network security status, and has higher quality evaluation than the same type of ontology.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Security related data in cyberspace is multi-source and heterogeneous, so it cannot be effectively used in network security analysis. To solve this problem, a network security ontology model for network node security analysis is proposed. The model reflects the security status of network nodes through three key sub domains: network assets, security information, defense strategy, and modeling concepts and relationships in a hierarchical and structured form. Ontology related language is used for query, and user-defined rules are used to enhance the reasoning ability of ontology, so as to assist network security analysis. Experiments and quality evaluation results show that the ontology model can integrate multi-source data, query and reason the network security status, and has higher quality evaluation than the same type of ontology.", "fno": "976100a292", "keywords": [ "Computer Network Security", "Ontologies Artificial Intelligence", "Network Node Security Analysis", "Network Assets", "Security Information", "Ontology Related Language", "Multisource Data", "Network Security Status", "Ontology Construction", "Quality Evaluation", "User Defined Rules", "Cyberspace", "Defense Strategy", "Ontologies", "Security", "Communication Networks", "Knowledge Engineering", "Analytical Models", "Cognition", "OWL", "Component", "Network Security", "Ontology", "Security Analysis", "Query", "Reasoning" ], "authors": [ { "affiliation": "National University of Defense Technology,College of Electromagnetic Countermeasure,Hefei,China", "fullName": "Kai Zhang", "givenName": "Kai", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology,College of Electromagnetic Countermeasure,Hefei,China", "fullName": "Jingju Liu", "givenName": "Jingju", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cisce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "292-297", "year": "2020", "issn": null, "isbn": "978-1-7281-9761-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "976100a288", "articleId": "1oUCXYKJMqY", "__typename": "AdjacentArticleType" }, "next": { "fno": "976100a298", "articleId": "1oUCWGAL7Zm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wiw/2016/4771/0/6039a088", "title": "Toward Performance-Oriented Ontology Debugging Support Using Heuristic Approaches and DL Reasoning", "doi": null, "abstractUrl": "/proceedings-article/wiw/2016/6039a088/12OmNAle6Ek", "parentPublication": { "id": "proceedings/wiw/2016/4771/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2012/2719/0/06337175", "title": "A Customizable Language Learning Support System Using Course-centered Ontology and Teaching Method Ontology", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2012/06337175/12OmNC8MsMH", "parentPublication": { "id": "proceedings/iiai-aai/2012/2719/0", "title": "2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a025", "title": "Semantic SPARQL Query in a Relational Database Based on Ontology Construction", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a025/12OmNrNh0Cr", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2010/7965/0/05629027", "title": "Conceptual Maps as the First Step in an Ontology Construction Method", "doi": null, "abstractUrl": "/proceedings-article/edocw/2010/05629027/12OmNvA1h9l", "parentPublication": { "id": "proceedings/edocw/2010/7965/0", "title": "2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2010/7901/0/05598078", "title": "Ontology-Based Model Driven Engineering for Safety Verification", "doi": null, "abstractUrl": "/proceedings-article/seaa/2010/05598078/12OmNwE9OI0", "parentPublication": { "id": "proceedings/seaa/2010/7901/0", "title": "2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a515", "title": "Ontology-Based Reasoning with Uncertain Context in a Smart Home: A Decision Network Approach", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a515/12OmNzYNN0E", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2022/3418/0/341800a151", "title": "Supporting Security Requirements Engineering through the Development of The Secure Development Ontology", "doi": null, "abstractUrl": "/proceedings-article/icsc/2022/341800a151/1BYInou9qGk", "parentPublication": { "id": "proceedings/icsc/2022/3418/0", "title": "2022 IEEE 16th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&pw/2022/9560/0/956000a423", "title": "Building an Ontology for Cyber Defence Exercises", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2022/956000a423/1EygFAa10zK", "parentPublication": { "id": "proceedings/euros&pw/2022/9560/0", "title": "2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021134", "title": "Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021134/1KfTcY3WVQA", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccbb/2018/1277/0/08756379", "title": "Research on Ontology-based Network Security Knowledge Map", "doi": null, "abstractUrl": "/proceedings-article/iccbb/2018/08756379/1bzYlzP0s24", "parentPublication": { "id": "proceedings/iccbb/2018/1277/0", "title": "2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zG33mA9r4A", "title": "2021 IEEE/ACM Workshop on Machine Learning in High Performance Computing Environments (MLHPC)", "acronym": "mlhpc", "groupId": "1834784", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zG33JSXH8Y", "doi": "10.1109/MLHPC54614.2021.00012", "title": "HPC Ontology: Towards a Unified Ontology for Managing Training Datasets and AI Models for High-Performance Computing", "normalizedTitle": "HPC Ontology: Towards a Unified Ontology for Managing Training Datasets and AI Models for High-Performance Computing", "abstract": "Machine learning (ML) techniques have been widely studied to address various challenges of productively and efficiently running large-scale scientific applications on heterogeneous supercomputers. However, it is extremely difficult to generate, access, and maintain training datasets and AI models to accelerate ML-based research. The Future of Research Communications and e-Scholarship has proposed the FAIR data principles describing Findability, Accessibility, Interoperability, and Reusability. In this paper, we present our ongoing work of designing an ontology for high-performance computing (named HPC ontology) in order to make training datasets and AI models FAIR. Our ontology provides controlled vocabularies, explicit semantics, and formal knowledge representations. Our design uses an extensible two-level pattern, capturing both high-level meta information and low-level data content for software, hardware, experiments, workflows, training datasets, AI models, and so on. Preliminary evaluation shows that HPC ontology is effective to annotate selected data and support a set of SPARQL queries.", "abstracts": [ { "abstractType": "Regular", "content": "Machine learning (ML) techniques have been widely studied to address various challenges of productively and efficiently running large-scale scientific applications on heterogeneous supercomputers. However, it is extremely difficult to generate, access, and maintain training datasets and AI models to accelerate ML-based research. The Future of Research Communications and e-Scholarship has proposed the FAIR data principles describing Findability, Accessibility, Interoperability, and Reusability. In this paper, we present our ongoing work of designing an ontology for high-performance computing (named HPC ontology) in order to make training datasets and AI models FAIR. Our ontology provides controlled vocabularies, explicit semantics, and formal knowledge representations. Our design uses an extensible two-level pattern, capturing both high-level meta information and low-level data content for software, hardware, experiments, workflows, training datasets, AI models, and so on. Preliminary evaluation shows that HPC ontology is effective to annotate selected data and support a set of SPARQL queries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Machine learning (ML) techniques have been widely studied to address various challenges of productively and efficiently running large-scale scientific applications on heterogeneous supercomputers. However, it is extremely difficult to generate, access, and maintain training datasets and AI models to accelerate ML-based research. The Future of Research Communications and e-Scholarship has proposed the FAIR data principles describing Findability, Accessibility, Interoperability, and Reusability. In this paper, we present our ongoing work of designing an ontology for high-performance computing (named HPC ontology) in order to make training datasets and AI models FAIR. Our ontology provides controlled vocabularies, explicit semantics, and formal knowledge representations. Our design uses an extensible two-level pattern, capturing both high-level meta information and low-level data content for software, hardware, experiments, workflows, training datasets, AI models, and so on. Preliminary evaluation shows that HPC ontology is effective to annotate selected data and support a set of SPARQL queries.", "fno": "112400a069", "keywords": [ "Learning Artificial Intelligence", "Ontologies Artificial Intelligence", "Open Systems", "Parallel Processing", "Unified Ontology", "Training Datasets", "AI Models", "High Performance Computing", "Machine Learning Techniques", "Large Scale Scientific Applications", "ML Based Research", "FAIR Data Principles", "High Level Meta Information", "Low Level Data Content", "HPC Ontology", "Formal Knowledge Representations", "Training", "Analytical Models", "Vocabulary", "Computational Modeling", "Semantics", "Machine Learning", "Ontologies", "Ontology", "HPC", "FAIR", "Datasets", "AI Models" ], "authors": [ { "affiliation": "Lawrence Livermore National Laboratory,Livermore,CA,USA,94550", "fullName": "Chunhua Liao", "givenName": "Chunhua", "surname": "Liao", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Livermore National Laboratory,Livermore,CA,USA,94550", "fullName": "Pei-Hung Lin", "givenName": "Pei-Hung", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook University,Stony Brook,NY,USA,11794", "fullName": "Gaurav Verma", "givenName": "Gaurav", "surname": "Verma", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Livermore National Laboratory,Livermore,CA,USA,94550", "fullName": "Tristan Vanderbruggen", "givenName": "Tristan", "surname": "Vanderbruggen", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory,Lemont,IL,USA,60439", "fullName": "Murali Emani", "givenName": "Murali", "surname": "Emani", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University,Raleigh,NC,USA,27695", "fullName": "Zifan Nan", "givenName": "Zifan", "surname": "Nan", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University,Raleigh,NC,USA,27695", "fullName": "Xipeng Shen", "givenName": "Xipeng", "surname": "Shen", "__typename": "ArticleAuthorType" } ], "idPrefix": "mlhpc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "69-80", "year": "2021", "issn": null, "isbn": "978-1-6654-1124-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "112400a058", "articleId": "1zG340j8QIo", "__typename": "AdjacentArticleType" }, "next": { "fno": "112400a081", "articleId": "1zG33CeDYNa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588838", "title": "An Ontology Pattern for Emergency Event Modeling", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588838/12OmNyshmHT", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0", "title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051969", "title": "UFOM: Unified fuzzy ontology matching", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051969/12OmNz5apIV", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2016/1858/0/1858b108", "title": "Leveraging Structural Information in Ontology Matching", "doi": null, "abstractUrl": "/proceedings-article/aina/2016/1858b108/12OmNzwpUcx", "parentPublication": { "id": "proceedings/aina/2016/1858/0", "title": "2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440124", "title": "VIS4ML: An Ontology for Visual Analytics Assisted Machine Learning", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440124/17D45XfSETS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2019/01/08662800", "title": "Towards AI-Powered Multiple Cloud Management", "doi": null, "abstractUrl": "/magazine/ic/2019/01/08662800/18cSD7lhvAA", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/transai/2022/7184/0/718400a128", "title": "Making Machine Learning Datasets and Models FAIR for HPC: A Methodology and Case Study", "doi": null, "abstractUrl": "/proceedings-article/transai/2022/718400a128/1Ip7MdfCkFy", "parentPublication": { "id": "proceedings/transai/2022/7184/0", "title": "2022 Fourth International Conference on Transdisciplinary AI (TransAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hust/2022/6349/0/634900a029", "title": "Interactive NLU-Powered Ontology-Based Workflow Synthesis for FAIR Support of HPC", "doi": null, "abstractUrl": "/proceedings-article/hust/2022/634900a029/1KnWz517hnO", "parentPublication": { "id": "proceedings/hust/2022/6349/0", "title": "2022 IEEE/ACM International Workshop on HPC User Support Tools (HUST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2021/9666/0/966600a047", "title": "HPC AI500 V2.0: The Methodology, Tools, and Metrics for Benchmarking HPC AI Systems", "doi": null, "abstractUrl": "/proceedings-article/cluster/2021/966600a047/1xFuZkpA4rS", "parentPublication": { "id": "proceedings/cluster/2021/9666/0", "title": "2021 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/transai/2021/3412/0/341200a092", "title": "FAIR Ontologies for Transparent and Accountable AI: A Hospital Adverse Incidents Vocabulary Case Study", "doi": null, "abstractUrl": "/proceedings-article/transai/2021/341200a092/1xNNyzuNjjy", "parentPublication": { "id": "proceedings/transai/2021/3412/0", "title": "2021 Third International Conference on Transdisciplinary AI (TransAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlhpc/2021/1124/0/112400a058", "title": "HPCFAIR: Enabling FAIR AI for HPC Applications", "doi": null, "abstractUrl": "/proceedings-article/mlhpc/2021/112400a058/1zG340j8QIo", "parentPublication": { "id": "proceedings/mlhpc/2021/1124/0", "title": "2021 IEEE/ACM Workshop on Machine Learning in High Performance Computing Environments (MLHPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCmpcMN", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "acronym": "fskd", "groupId": "1001615", "volume": "5", "displayVolume": "5", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwpGgKc", "doi": "10.1109/FSKD.2009.673", "title": "Research on Event Prediction Algorithm Based on Event Sequence Semantic", "normalizedTitle": "Research on Event Prediction Algorithm Based on Event Sequence Semantic", "abstract": "Event prediction in event stream is an important problem in temporal data mining. However, existing event prediction algorithms are based on string prediction in which a character represents an event or an event type, do not take into account event sequence semantic and can not predict for infrequent event sequences. In this paper, an event prediction algorithm based on event sequence semantic called SVClustering-SVR is proposed to predict probability of target event occurrence in event stream in appointed interval. We build a vector structure called semantic vector to express event sequence semantic, and then utilize the attributes of standardizing semantic vector and confidence of rule which is generated by event sequences and target event to form samples space. Finally, we use Support Vector Regression (SVR) to build prediction model. To improve the accuracy of prediction, we also define semantic distance between event sequences and cluster semantic vectors. SVClustering-SVR algorithm can predict for infrequent event sequences and those not appeared in training set. Experimental results show the effectiveness of SVClustering-SVR algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Event prediction in event stream is an important problem in temporal data mining. However, existing event prediction algorithms are based on string prediction in which a character represents an event or an event type, do not take into account event sequence semantic and can not predict for infrequent event sequences. In this paper, an event prediction algorithm based on event sequence semantic called SVClustering-SVR is proposed to predict probability of target event occurrence in event stream in appointed interval. We build a vector structure called semantic vector to express event sequence semantic, and then utilize the attributes of standardizing semantic vector and confidence of rule which is generated by event sequences and target event to form samples space. Finally, we use Support Vector Regression (SVR) to build prediction model. To improve the accuracy of prediction, we also define semantic distance between event sequences and cluster semantic vectors. SVClustering-SVR algorithm can predict for infrequent event sequences and those not appeared in training set. Experimental results show the effectiveness of SVClustering-SVR algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Event prediction in event stream is an important problem in temporal data mining. However, existing event prediction algorithms are based on string prediction in which a character represents an event or an event type, do not take into account event sequence semantic and can not predict for infrequent event sequences. In this paper, an event prediction algorithm based on event sequence semantic called SVClustering-SVR is proposed to predict probability of target event occurrence in event stream in appointed interval. We build a vector structure called semantic vector to express event sequence semantic, and then utilize the attributes of standardizing semantic vector and confidence of rule which is generated by event sequences and target event to form samples space. Finally, we use Support Vector Regression (SVR) to build prediction model. To improve the accuracy of prediction, we also define semantic distance between event sequences and cluster semantic vectors. SVClustering-SVR algorithm can predict for infrequent event sequences and those not appeared in training set. Experimental results show the effectiveness of SVClustering-SVR algorithm.", "fno": "3735e604", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Chuanfei Xu", "givenName": "Chuanfei", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shukuan Lin", "givenName": "Shukuan", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianzhong Qiao", "givenName": "Jianzhong", "surname": "Qiao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ge Yu", "givenName": "Ge", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tiancheng Zhang", "givenName": "Tiancheng", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "fskd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "604-608", "year": "2009", "issn": null, "isbn": "978-0-7695-3735-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3735e599", "articleId": "12OmNzn3918", "__typename": "AdjacentArticleType" }, "next": { "fno": "3735e609", "articleId": "12OmNxGSm7f", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpads/2017/2129/0/212901a796", "title": "Multi-attribute Event Modeling and Prediction over Event Streams from Sensors", "doi": null, "abstractUrl": "/proceedings-article/icpads/2017/212901a796/12OmNBEGYK1", "parentPublication": { "id": "proceedings/icpads/2017/2129/0", "title": "2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nwesp/2009/3821/0/3821a090", "title": "Implementing Discrete Event Calculus with Semantic Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/nwesp/2009/3821a090/12OmNBQ2VQ8", "parentPublication": { "id": "proceedings/nwesp/2009/3821/0", "title": "Next Generation Web Services Practices, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/1/3736a499", "title": "Grid Resource Prediction Based on Support Vector Regression and Genetic Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736a499/12OmNrkjVf9", "parentPublication": { "id": "proceedings/icnc/2009/3736/4", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a250", "title": "Top-(R%, K) Spatiotemporal Event Sequence Mining", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a250/12OmNxwncoM", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836788", "title": "A Graph-Based Approach to Spatiotemporal Event Sequence Mining", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836788/12OmNyGtjqH", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2006/2646/0/26460109", "title": "Semantic Event Detection using Conditional Random Fields", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2006/26460109/12OmNynsbvI", "parentPublication": { "id": "proceedings/cvprw/2006/2646/0", "title": "2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2008/3454/0/3454a625", "title": "Semantic Event Retrieval from Surveillance Video Databases", "doi": null, "abstractUrl": "/proceedings-article/ism/2008/3454a625/12OmNzC5SGD", "parentPublication": { "id": "proceedings/ism/2008/3454/0", "title": "2008 Tenth IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2023/2136/0/213600a253", "title": "Combining Event Segment Classification And Graph Self-Encoder For Event Prediction", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2023/213600a253/1MIhnWbGxS8", "parentPublication": { "id": "proceedings/bdicn/2023/2136/0", "title": "2023 2nd International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2021/03/09272840", "title": "Anomalous Event Sequence Detection", "doi": null, "abstractUrl": "/magazine/ex/2021/03/09272840/1p6aQYYP55e", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400b925", "title": "Hierarchical Tree-based Sequential Event Prediction with Application in the Aviation Accident Report", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400b925/1uGXJi4mCXe", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwGIcBY", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwncoM", "doi": "10.1109/ICDMW.2017.39", "title": "Top-(R%, K) Spatiotemporal Event Sequence Mining", "normalizedTitle": "Top-(R%, K) Spatiotemporal Event Sequence Mining", "abstract": "Spatiotemporal event sequences (STESs) are the ordered series of event types whose evolving region-based instances frequently follow each other in time and are located closeby. Previous studies on STES mining require significance and prevalence thresholds for the discovery, which is usually unknown to domain experts. As the quality of the discovered STESs is of great importance to the domain experts who use these algorithms, we introduce a novel class of STES mining algorithms to discover the most relevant STESs without significance and prevalence thresholds. Our algorithms discover the top-K most prevalent spatiotemporal event sequences from R% most significant follow relationships. In the experiments, we conducted a case study using solar event datasets, and compared the performance of the algorithms and the relevance of the discovered sequences.", "abstracts": [ { "abstractType": "Regular", "content": "Spatiotemporal event sequences (STESs) are the ordered series of event types whose evolving region-based instances frequently follow each other in time and are located closeby. Previous studies on STES mining require significance and prevalence thresholds for the discovery, which is usually unknown to domain experts. As the quality of the discovered STESs is of great importance to the domain experts who use these algorithms, we introduce a novel class of STES mining algorithms to discover the most relevant STESs without significance and prevalence thresholds. Our algorithms discover the top-K most prevalent spatiotemporal event sequences from R% most significant follow relationships. In the experiments, we conducted a case study using solar event datasets, and compared the performance of the algorithms and the relevance of the discovered sequences.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spatiotemporal event sequences (STESs) are the ordered series of event types whose evolving region-based instances frequently follow each other in time and are located closeby. Previous studies on STES mining require significance and prevalence thresholds for the discovery, which is usually unknown to domain experts. As the quality of the discovered STESs is of great importance to the domain experts who use these algorithms, we introduce a novel class of STES mining algorithms to discover the most relevant STESs without significance and prevalence thresholds. Our algorithms discover the top-K most prevalent spatiotemporal event sequences from R% most significant follow relationships. In the experiments, we conducted a case study using solar event datasets, and compared the performance of the algorithms and the relevance of the discovered sequences.", "fno": "3800a250", "keywords": [ "Data Mining", "Prevalence Thresholds", "Spatiotemporal Event Sequence Mining", "Region Based Instances", "STES Mining Algorithms", "Spatiotemporal Phenomena", "Trajectory", "Data Mining", "Semantics", "Indexes", "Geometry", "Conferences", "Spatiotemporal Knowledge Discovery", "Sequence Patterns", "Event Sequence Mining" ], "authors": [ { "affiliation": null, "fullName": "Berkay Aydin", "givenName": "Berkay", "surname": "Aydin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ahmet Kucuk", "givenName": "Ahmet", "surname": "Kucuk", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Soukaina Filali Boubrahimi", "givenName": "Soukaina Filali", "surname": "Boubrahimi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rafal A. Angryk", "givenName": "Rafal A.", "surname": "Angryk", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "250-257", "year": "2017", "issn": "2375-9259", "isbn": "978-1-5386-3800-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3800a242", "articleId": "12OmNB0X8ur", "__typename": "AdjacentArticleType" }, "next": { "fno": "3800a258", "articleId": "12OmNy2agQ5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2015/8493/0/8493a575", "title": "Spatiotemporal Frequent Pattern Mining on Solar Data: Current Algorithms and Future Directions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a575/12OmNBtCCAJ", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004398", "title": "Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004398/12OmNwbLVmL", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836788", "title": "A Graph-Based Approach to Spatiotemporal Event Sequence Mining", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836788/12OmNyGtjqH", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2017/6543/0/6543b455", "title": "Bringing Semantics to Spatiotemporal Data Mining: Challenges, Methods, and Applications", "doi": null, "abstractUrl": "/proceedings-article/icde/2017/6543b455/12OmNyRg4zx", "parentPublication": { "id": "proceedings/icde/2017/6543/0", "title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363777", "title": "Parallel in-memory trajectory-based spatiotemporal topological join", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363777/12OmNz5s0MH", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840969", "title": "Indexing spatiotemporal relations in solar event datasets", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840969/12OmNzG4gB1", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836793", "title": "A Pattern Growth-Based Approach for Mining Spatiotemporal Co-occurrence Patterns", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836793/12OmNzYeAUR", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08257954", "title": "Spatiotemporal range pattern queries on large-scale co-movement pattern datasets", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08257954/17D45WYQJ80", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b606", "title": "PriSTE: From Location Privacy to Spatiotemporal Event Privacy", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b606/1aDSXtIjSZq", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/08/08946543", "title": "Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services", "doi": null, "abstractUrl": "/journal/tk/2021/08/08946543/1gd8GFuEPde", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dPofs0eSGI", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-smartcity-dss", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dPoym8e7W8", "doi": "10.1109/HPCC/SmartCity/DSS.2019.00315", "title": "Topology-Aware Event Sequence Mining for Understanding HPC System Behavior and Detecting Anomalies", "normalizedTitle": "Topology-Aware Event Sequence Mining for Understanding HPC System Behavior and Detecting Anomalies", "abstract": "System logs provide invaluable resources for understanding system behavior and detecting anomalies on high performance computing (HPC) systems. As HPC systems continue to grow in both scale and complexity, the sheer volume of system logs and the complex interaction among system components make the traditional manual problem diagnosis and even automated line-by-line log analysis infeasible or ineffective. Sequence mining technologies aim to identify important patterns among a set of objects, which can help us discover regularity among events, detect anomalies, and predict events in HPC environments. The existing sequence mining algorithms are compute-intensive and inefficient to process the overwhelming number of system events which have complex interaction and dependency. In this paper, we present a novel, topology-aware sequence mining method (named TSM) and explore it for event analysis and anomaly detection on production HPC systems. TSM is resource-efficient and capable of producing long and complex event patterns from log messages, which makes TSM suitable for online monitoring and diagnosing of large-scale systems. We evaluate the performance of TSM using system logs collected from a production supercomputer. Experimental results show that TSM is highly efficient in identifying event sequences on single and multiple nodes without any prior knowledge. We apply verification functions and requirements and prove the correctness of the event patterns produced by TSM.", "abstracts": [ { "abstractType": "Regular", "content": "System logs provide invaluable resources for understanding system behavior and detecting anomalies on high performance computing (HPC) systems. As HPC systems continue to grow in both scale and complexity, the sheer volume of system logs and the complex interaction among system components make the traditional manual problem diagnosis and even automated line-by-line log analysis infeasible or ineffective. Sequence mining technologies aim to identify important patterns among a set of objects, which can help us discover regularity among events, detect anomalies, and predict events in HPC environments. The existing sequence mining algorithms are compute-intensive and inefficient to process the overwhelming number of system events which have complex interaction and dependency. In this paper, we present a novel, topology-aware sequence mining method (named TSM) and explore it for event analysis and anomaly detection on production HPC systems. TSM is resource-efficient and capable of producing long and complex event patterns from log messages, which makes TSM suitable for online monitoring and diagnosing of large-scale systems. We evaluate the performance of TSM using system logs collected from a production supercomputer. Experimental results show that TSM is highly efficient in identifying event sequences on single and multiple nodes without any prior knowledge. We apply verification functions and requirements and prove the correctness of the event patterns produced by TSM.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "System logs provide invaluable resources for understanding system behavior and detecting anomalies on high performance computing (HPC) systems. As HPC systems continue to grow in both scale and complexity, the sheer volume of system logs and the complex interaction among system components make the traditional manual problem diagnosis and even automated line-by-line log analysis infeasible or ineffective. Sequence mining technologies aim to identify important patterns among a set of objects, which can help us discover regularity among events, detect anomalies, and predict events in HPC environments. The existing sequence mining algorithms are compute-intensive and inefficient to process the overwhelming number of system events which have complex interaction and dependency. In this paper, we present a novel, topology-aware sequence mining method (named TSM) and explore it for event analysis and anomaly detection on production HPC systems. TSM is resource-efficient and capable of producing long and complex event patterns from log messages, which makes TSM suitable for online monitoring and diagnosing of large-scale systems. We evaluate the performance of TSM using system logs collected from a production supercomputer. Experimental results show that TSM is highly efficient in identifying event sequences on single and multiple nodes without any prior knowledge. We apply verification functions and requirements and prove the correctness of the event patterns produced by TSM.", "fno": "205800c270", "keywords": [ "Data Mining", "Large Scale Systems", "Parallel Machines", "Parallel Processing", "Anomaly Detection", "Production HPC Systems", "TSM", "Long Event Patterns", "Complex Event Patterns", "Log Messages", "Large Scale Systems", "Event Sequences", "Topology Aware Event Sequence Mining", "HPC System Behavior", "System Logs", "Invaluable Resources", "Detecting Anomalies", "High Performance Computing Systems", "Complex Interaction", "System Components", "Traditional Manual Problem Diagnosis", "Line By Line", "Sequence Mining Technologies", "HPC Environments", "Existing Sequence Mining Algorithms", "System Events", "Topology Aware Sequence Mining Method", "Event Analysis", "Complexity Theory", "Supercomputers", "Topology", "Conferences", "Anomaly Detection", "Production", "High Performance Computing Systems", "System Monitoring And Diagnosis", "Anomaly Detection", "Sequence Mining", "Event Patterns" ], "authors": [ { "affiliation": "University of North Texas", "fullName": "Zongze Li", "givenName": "Zongze", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Texas", "fullName": "Song Fu", "givenName": "Song", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "Sean Blanchard", "givenName": "Sean", "surname": "Blanchard", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "Michael Lang", "givenName": "Michael", "surname": "Lang", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-smartcity-dss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-08-01T00:00:00", "pubType": "proceedings", "pages": "2270-2277", "year": "2019", "issn": null, "isbn": "978-1-7281-2058-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "205800c261", "articleId": "1dPol8jhi3m", "__typename": "AdjacentArticleType" }, "next": { "fno": "205800c278", "articleId": "1dPot195FjW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsn/2018/5596/0/559601a107", "title": "Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC System", "doi": null, "abstractUrl": "/proceedings-article/dsn/2018/559601a107/12OmNAHW0Jg", "parentPublication": { "id": "proceedings/dsn/2018/5596/0", "title": "2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2018/5815/0/581501a392", "title": "A Comparative Study of Topology Design Approaches for HPC Interconnects", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2018/581501a392/12OmNAWYKBF", "parentPublication": { "id": "proceedings/ccgrid/2018/5815/0", "title": "2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2017/2326/0/2326a758", "title": "Big Data Meets HPC Log Analytics: Scalable Approach to Understanding Systems at Extreme Scale", "doi": null, "abstractUrl": "/proceedings-article/cluster/2017/2326a758/12OmNqIhFKY", "parentPublication": { "id": "proceedings/cluster/2017/2326/0", "title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2016/8776/0/8776a301", "title": "Suitability of the Random Topology for HPC Applications", "doi": null, "abstractUrl": "/proceedings-article/pdp/2016/8776a301/12OmNzdoMqW", "parentPublication": { "id": "proceedings/pdp/2016/8776/0", "title": "2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/collaboratecom/2013/92/0/06680025", "title": "Finding anomalies in windows event logs using standard deviation", "doi": null, "abstractUrl": "/proceedings-article/collaboratecom/2013/06680025/12OmNzfXay7", "parentPublication": { "id": "proceedings/collaboratecom/2013/92/0", "title": "2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2018/02/07444166", "title": "Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies", "doi": null, "abstractUrl": "/journal/tq/2018/02/07444166/13rRUwjXZTt", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2018/8319/0/831900a571", "title": "A Big Data Analytics Framework for HPC Log Data: Three Case Studies Using the Titan Supercomputer Log", "doi": null, "abstractUrl": "/proceedings-article/cluster/2018/831900a571/17D45Xi9rW0", "parentPublication": { "id": "proceedings/cluster/2018/8319/0", "title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400a781", "title": "Event Block Identification and Analysis for Effective Anomaly Detection to Build Reliable HPC Systems", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400a781/183rAdlATS1", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b095", "title": "Topology-Aware Node Allocation on Supercomputers with Hierarchical Network", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b095/1LSPrrWmSXe", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdsw/2020/2361/0/236100a015", "title": "Gauge: An Interactive Data-Driven Visualization Tool for HPC Application I/O Performance Analysis", "doi": null, "abstractUrl": "/proceedings-article/pdsw/2020/236100a015/1pZ14qg2XZu", "parentPublication": { "id": "proceedings/pdsw/2020/2361/0", "title": "2020 IEEE/ACM Fifth International Parallel Data Systems Workshop (PDSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4Ez", "title": "2007 11th International Database Engineering and Applications Symposium, IDEAS-07", "acronym": "ideas", "groupId": "1000182", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNwCJONM", "doi": "10.1109/IDEAS.2007.42", "title": "Streaming Random Forests", "normalizedTitle": "Streaming Random Forests", "abstract": "Many recent applications deal with data streams, conceptually endless sequences of data records, often arriving at high flow rates. Standard data-mining techniques typically assume that records can be accessed multiple times and so do not naturally extend to streaming data. Algorithms for mining streams must be able to extract all necessary information from records with only one, or perhaps a few, passes over the data. We present the Streaming Random Forests algorithm, an online and incremental stream classification algorithm that extends Breiman?s Random Forests algorithm. The Streaming Random Forests algorithm grows multiple decision trees, and classifies unlabelled records based on the plurality of tree votes. We evaluate the classification accuracy of the Streaming Random Forests algorithm on several datasets, and show that its accuracy is comparable to the standard Random Forest algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Many recent applications deal with data streams, conceptually endless sequences of data records, often arriving at high flow rates. Standard data-mining techniques typically assume that records can be accessed multiple times and so do not naturally extend to streaming data. Algorithms for mining streams must be able to extract all necessary information from records with only one, or perhaps a few, passes over the data. We present the Streaming Random Forests algorithm, an online and incremental stream classification algorithm that extends Breiman?s Random Forests algorithm. The Streaming Random Forests algorithm grows multiple decision trees, and classifies unlabelled records based on the plurality of tree votes. We evaluate the classification accuracy of the Streaming Random Forests algorithm on several datasets, and show that its accuracy is comparable to the standard Random Forest algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many recent applications deal with data streams, conceptually endless sequences of data records, often arriving at high flow rates. Standard data-mining techniques typically assume that records can be accessed multiple times and so do not naturally extend to streaming data. Algorithms for mining streams must be able to extract all necessary information from records with only one, or perhaps a few, passes over the data. We present the Streaming Random Forests algorithm, an online and incremental stream classification algorithm that extends Breiman?s Random Forests algorithm. The Streaming Random Forests algorithm grows multiple decision trees, and classifies unlabelled records based on the plurality of tree votes. We evaluate the classification accuracy of the Streaming Random Forests algorithm on several datasets, and show that its accuracy is comparable to the standard Random Forest algorithm.", "fno": "29470225", "keywords": [ "Data Mining", "Classification", "Decision Trees", "Data Stream Classification", "Random Forests" ], "authors": [ { "affiliation": "Queen's University, Canada", "fullName": "Hanady Abdulsalam", "givenName": "Hanady", "surname": "Abdulsalam", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen's University, Canada", "fullName": "David B. Skillicorn", "givenName": "David B.", "surname": "Skillicorn", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen's University, Canada", "fullName": "Patrick Martin", "givenName": "Patrick", "surname": "Martin", "__typename": "ArticleAuthorType" } ], "idPrefix": "ideas", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-09-01T00:00:00", "pubType": "proceedings", "pages": "225-232", "year": "2007", "issn": "1098-8068", "isbn": "0-7695-2947-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29470216", "articleId": "12OmNASraGR", "__typename": "AdjacentArticleType" }, "next": { "fno": "29470233", "articleId": "12OmNwGIcwY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icseng/2008/3331/0/3331a127", "title": "Random Forests Identification of Gas Turbine Faults", "doi": null, "abstractUrl": "/proceedings-article/icseng/2008/3331a127/12OmNAR1b1v", "parentPublication": { "id": "proceedings/icseng/2008/3331/0", "title": "Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457447", "title": "On-line Random Forests", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457447/12OmNCfSqSO", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a071", "title": "Confidence in Predictions from Random Tree Ensembles", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a071/12OmNvlPkzN", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2012/4711/0/4711a362", "title": "Human Detection Using Wavelet-Based CS-LBP and a Cascade of Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icme/2012/4711a362/12OmNwFzO2c", "parentPublication": { "id": "proceedings/icme/2012/4711/0", "title": "2012 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2008/3495/0/3495a121", "title": "Calibrating Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icmla/2008/3495a121/12OmNxwncFk", "parentPublication": { "id": "proceedings/icmla/2008/3495/0", "title": "2008 Seventh International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2014/7981/0/7981a774", "title": "An Improvement to Feature Selection of Random Forests on Spark", "doi": null, "abstractUrl": "/proceedings-article/cse/2014/7981a774/12OmNyeECGK", "parentPublication": { "id": "proceedings/cse/2014/7981/0", "title": "2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/01/ttk2011010022", "title": "Classification Using Streaming Random Forests", "doi": null, "abstractUrl": "/journal/tk/2011/01/ttk2011010022/13rRUxcbnCT", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940306", "title": "A Crowdsourcing Quality Prediction Model Based on Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940306/1gjRQi2l4pG", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/contie/2020/8342/0/834200a098", "title": "Classification of student success using Random Forest and Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/contie/2020/834200a098/1sZ2RvK1bvq", "parentPublication": { "id": "proceedings/contie/2020/8342/0", "title": "2020 3rd International Conference of Inclusive Technology and Education (CONTIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412014", "title": "On learning Random Forests for Random Forest-clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412014/1tmjr5IVIYM", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBDyAaZ", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwwMeXF", "doi": "10.1109/ICCV.2015.172", "title": "Deep Neural Decision Forests", "normalizedTitle": "Deep Neural Decision Forests", "abstract": "We present Deep Neural Decision Forests - a novel approach that unifies classification trees with the representation learning functionality known from deep convolutional networks, by training them in an end-to-end manner. To combine these two worlds, we introduce a stochastic and differentiable decision tree model, which steers the representation learning usually conducted in the initial layers of a (deep) convolutional network. Our model differs from conventional deep networks because a decision forest provides the final predictions and it differs from conventional decision forests since we propose a principled, joint and global optimization of split and leaf node parameters. We show experimental results on benchmark machine learning datasets like MNIST and ImageNet and find on-par or superior results when compared to state-of-the-art deep models. Most remarkably, we obtain Top5-Errors of only 7.84%/6.38% on ImageNet validation data when integrating our forests in a single-crop, single/seven model GoogLeNet architecture, respectively. Thus, even without any form of training data set augmentation we are improving on the 6.67% error obtained by the best GoogLeNet architecture (7 models, 144 crops).", "abstracts": [ { "abstractType": "Regular", "content": "We present Deep Neural Decision Forests - a novel approach that unifies classification trees with the representation learning functionality known from deep convolutional networks, by training them in an end-to-end manner. To combine these two worlds, we introduce a stochastic and differentiable decision tree model, which steers the representation learning usually conducted in the initial layers of a (deep) convolutional network. Our model differs from conventional deep networks because a decision forest provides the final predictions and it differs from conventional decision forests since we propose a principled, joint and global optimization of split and leaf node parameters. We show experimental results on benchmark machine learning datasets like MNIST and ImageNet and find on-par or superior results when compared to state-of-the-art deep models. Most remarkably, we obtain Top5-Errors of only 7.84%/6.38% on ImageNet validation data when integrating our forests in a single-crop, single/seven model GoogLeNet architecture, respectively. Thus, even without any form of training data set augmentation we are improving on the 6.67% error obtained by the best GoogLeNet architecture (7 models, 144 crops).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present Deep Neural Decision Forests - a novel approach that unifies classification trees with the representation learning functionality known from deep convolutional networks, by training them in an end-to-end manner. To combine these two worlds, we introduce a stochastic and differentiable decision tree model, which steers the representation learning usually conducted in the initial layers of a (deep) convolutional network. Our model differs from conventional deep networks because a decision forest provides the final predictions and it differs from conventional decision forests since we propose a principled, joint and global optimization of split and leaf node parameters. We show experimental results on benchmark machine learning datasets like MNIST and ImageNet and find on-par or superior results when compared to state-of-the-art deep models. Most remarkably, we obtain Top5-Errors of only 7.84%/6.38% on ImageNet validation data when integrating our forests in a single-crop, single/seven model GoogLeNet architecture, respectively. Thus, even without any form of training data set augmentation we are improving on the 6.67% error obtained by the best GoogLeNet architecture (7 models, 144 crops).", "fno": "8391b467", "keywords": [ "Vegetation", "Routing", "Decision Trees", "Optimization", "Training", "Stochastic Processes", "Computer Vision" ], "authors": [ { "affiliation": null, "fullName": "Peter Kontschieder", "givenName": "Peter", "surname": "Kontschieder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Madalina Fiterau", "givenName": "Madalina", "surname": "Fiterau", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio Criminisi", "givenName": "Antonio", "surname": "Criminisi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Samuel Rota Bulò", "givenName": "Samuel Rota", "surname": "Bulò", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "1467-1475", "year": "2015", "issn": "2380-7504", "isbn": "978-1-4673-8391-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8391b458", "articleId": "12OmNxVV5RR", "__typename": "AdjacentArticleType" }, "next": { "fno": "8391b476", "articleId": "12OmNylbotI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2014/5118/0/5118a081", "title": "Neural Decision Forests for Semantic Image Labelling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118a081/12OmNAtaS1q", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a968", "title": "Norm-Induced Entropies for Decision Forests", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a968/12OmNBEGYIf", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06239183", "title": "Randomized decision forests for static and dynamic hand shape classification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06239183/12OmNvpw7iJ", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/2007/2947/0/29470225", "title": "Streaming Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ideas/2007/29470225/12OmNwCJONM", "parentPublication": { "id": "proceedings/ideas/2007/2947/0", "title": "2007 11th International Database Engineering and Applications Symposium, IDEAS-07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2018/2335/0/233501a629", "title": "Investigating Deep Neural Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a629/12OmNx5piZT", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2018/6568/0/08470320", "title": "Classification of Primary Cilia in Microscopy Images Using Convolutional Neural Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2018/08470320/13WBGMIboGe", "parentPublication": { "id": "proceedings/ssiai/2018/6568/0", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a527", "title": "Random Forests with Stochastic Induction of Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a527/17D45Xq6dB5", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a399", "title": "Growing Deep Forests Efficiently with Soft Routing and Learned Connectivity", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a399/18jXIMmS6nC", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2020/1054/0/09191611", "title": "Discovering Drug-Drug and Drug-Disease Interactions Inducing Acute Kidney Injury Using Deep Rule Forests", "doi": null, "abstractUrl": "/proceedings-article/iri/2020/09191611/1n0IvmFF5f2", "parentPublication": { "id": "proceedings/iri/2020/1054/0", "title": "2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBDyAaZ", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx3Zj9L", "doi": "10.1109/ICCV.2015.431", "title": "Pairwise Conditional Random Forests for Facial Expression Recognition", "normalizedTitle": "Pairwise Conditional Random Forests for Facial Expression Recognition", "abstract": "Facial expression can be seen as the dynamic variation of one's appearance over time. Successful recognition thus involves finding representations of high-dimensional spatiotemporal patterns that can be generalized to unseen facial morphologies and variations of the expression dynamics. In this paper, we propose to learn Random Forests from heterogeneous derivative features (e.g. facial fiducial point movements or texture variations) upon pairs of images. Those forests are conditioned on the expression label of the first frame to reduce the variability of the ongoing expression transitions. When testing on a specific frame of a video, pairs are created between this frame and the previous ones. Predictions for each previous frame are used to draw trees from Pairwise Conditional Random Forests (PCRF) whose pairwise outputs are averaged over time to produce robust estimates. As such, PCRF appears as a natural extension of Random Forests to learn spatio-temporal patterns, that leads to significant improvements over standard Random Forests as well as state-of-the-art approaches on several facial expression benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "Facial expression can be seen as the dynamic variation of one's appearance over time. Successful recognition thus involves finding representations of high-dimensional spatiotemporal patterns that can be generalized to unseen facial morphologies and variations of the expression dynamics. In this paper, we propose to learn Random Forests from heterogeneous derivative features (e.g. facial fiducial point movements or texture variations) upon pairs of images. Those forests are conditioned on the expression label of the first frame to reduce the variability of the ongoing expression transitions. When testing on a specific frame of a video, pairs are created between this frame and the previous ones. Predictions for each previous frame are used to draw trees from Pairwise Conditional Random Forests (PCRF) whose pairwise outputs are averaged over time to produce robust estimates. As such, PCRF appears as a natural extension of Random Forests to learn spatio-temporal patterns, that leads to significant improvements over standard Random Forests as well as state-of-the-art approaches on several facial expression benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Facial expression can be seen as the dynamic variation of one's appearance over time. Successful recognition thus involves finding representations of high-dimensional spatiotemporal patterns that can be generalized to unseen facial morphologies and variations of the expression dynamics. In this paper, we propose to learn Random Forests from heterogeneous derivative features (e.g. facial fiducial point movements or texture variations) upon pairs of images. Those forests are conditioned on the expression label of the first frame to reduce the variability of the ongoing expression transitions. When testing on a specific frame of a video, pairs are created between this frame and the previous ones. Predictions for each previous frame are used to draw trees from Pairwise Conditional Random Forests (PCRF) whose pairwise outputs are averaged over time to produce robust estimates. As such, PCRF appears as a natural extension of Random Forests to learn spatio-temporal patterns, that leads to significant improvements over standard Random Forests as well as state-of-the-art approaches on several facial expression benchmarks.", "fno": "8391d783", "keywords": [ "Vegetation", "Training", "Radio Frequency", "Histograms", "Robustness", "Impurities", "Computer Vision" ], "authors": [ { "affiliation": null, "fullName": "Arnaud Dapogny", "givenName": "Arnaud", "surname": "Dapogny", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kevin Bailly", "givenName": "Kevin", "surname": "Bailly", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Séverine Dubuisson", "givenName": "Séverine", "surname": "Dubuisson", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "3783-3791", "year": "2015", "issn": "2380-7504", "isbn": "978-1-4673-8391-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8391d774", "articleId": "12OmNyKa6gY", "__typename": "AdjacentArticleType" }, "next": { "fno": "8391d792", "articleId": "12OmNBOCWw1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2018/2335/0/233501a629", "title": "Investigating Deep Neural Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a629/12OmNx5piZT", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/326P3A15", "title": "Real-time facial feature detection using conditional regression forests", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/326P3A15/12OmNxTVU2E", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130446", "title": "Facial expression recognition with temporal modeling of shapes", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130446/12OmNxWLTz8", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130440", "title": "4D facial expression recognition", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130440/12OmNzBOhzN", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2017/0563/0/08273631", "title": "Facial action unit intensity estimation and feature relevance visualization with random regression forests", "doi": null, "abstractUrl": "/proceedings-article/acii/2017/08273631/12OmNznCl32", "parentPublication": { "id": "proceedings/acii/2017/0563/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2014/02/06798723", "title": "Fully automated recognition of spontaneous facial expressions in videos using random forest classifiers", "doi": null, "abstractUrl": "/journal/ta/2014/02/06798723/13rRUwI5Uel", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2019/02/07934067", "title": "Dynamic Pose-Robust Facial Expression Recognition by Multi-View Pairwise Conditional Random Forests", "doi": null, "abstractUrl": "/journal/ta/2019/02/07934067/13rRUwjoNve", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2018/8000/0/800000a060", "title": "Efficient Expression Recognition Based on Shape-indexed Features", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2018/800000a060/17D45X7VTgH", "parentPublication": { "id": "proceedings/smartcloud/2018/8000/0", "title": "2018 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a294", "title": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a294/18j8JVMWmKQ", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqOffxL", "title": "2008 Seventh International Conference on Machine Learning and Applications", "acronym": "icmla", "groupId": "1001544", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwncFk", "doi": "10.1109/ICMLA.2008.107", "title": "Calibrating Random Forests", "normalizedTitle": "Calibrating Random Forests", "abstract": "When using the output of classifiers to calculate the expected utility of different alternatives in decision situations, the correctness of predicted class probabilities may be of crucial importance. However, even very accurate classifiers may output class probabilities of rather poor quality. One way of overcoming this problem is by means of calibration, i.e., mapping the original class probabilities to more accurate ones. Previous studies have however indicated that random forests are difficult to calibrate by standard calibration methods. In this work, a novel calibration method is introduced, which is based on a recent finding that probabilities predicted by forests of classification trees have a lower squared error compared to those predicted by forests of probability estimation trees (PETs). The novel calibration method is compared to the two standard methods, Platt scaling and isotonic regression, on 34 datasets from the UCI repository. The experiment shows that random forests of PETs calibrated by the novel method significantly outperform uncalibrated random forests of both PETs and classification trees, as well as random forests calibrated with the two standard methods, with respect to the squared error of predicted class probabilities.", "abstracts": [ { "abstractType": "Regular", "content": "When using the output of classifiers to calculate the expected utility of different alternatives in decision situations, the correctness of predicted class probabilities may be of crucial importance. However, even very accurate classifiers may output class probabilities of rather poor quality. One way of overcoming this problem is by means of calibration, i.e., mapping the original class probabilities to more accurate ones. Previous studies have however indicated that random forests are difficult to calibrate by standard calibration methods. In this work, a novel calibration method is introduced, which is based on a recent finding that probabilities predicted by forests of classification trees have a lower squared error compared to those predicted by forests of probability estimation trees (PETs). The novel calibration method is compared to the two standard methods, Platt scaling and isotonic regression, on 34 datasets from the UCI repository. The experiment shows that random forests of PETs calibrated by the novel method significantly outperform uncalibrated random forests of both PETs and classification trees, as well as random forests calibrated with the two standard methods, with respect to the squared error of predicted class probabilities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When using the output of classifiers to calculate the expected utility of different alternatives in decision situations, the correctness of predicted class probabilities may be of crucial importance. However, even very accurate classifiers may output class probabilities of rather poor quality. One way of overcoming this problem is by means of calibration, i.e., mapping the original class probabilities to more accurate ones. Previous studies have however indicated that random forests are difficult to calibrate by standard calibration methods. In this work, a novel calibration method is introduced, which is based on a recent finding that probabilities predicted by forests of classification trees have a lower squared error compared to those predicted by forests of probability estimation trees (PETs). The novel calibration method is compared to the two standard methods, Platt scaling and isotonic regression, on 34 datasets from the UCI repository. The experiment shows that random forests of PETs calibrated by the novel method significantly outperform uncalibrated random forests of both PETs and classification trees, as well as random forests calibrated with the two standard methods, with respect to the squared error of predicted class probabilities.", "fno": "3495a121", "keywords": [ "Random Forests", "Calibration", "Probability Estimation Trees", "Brier Score" ], "authors": [ { "affiliation": null, "fullName": "Henrik Boström", "givenName": "Henrik", "surname": "Boström", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmla", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "121-126", "year": "2008", "issn": null, "isbn": "978-0-7695-3495-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3495a115", "articleId": "12OmNyeWdJx", "__typename": "AdjacentArticleType" }, "next": { "fno": "3495a127", "articleId": "12OmNC3FGlJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icseng/2008/3331/0/3331a127", "title": "Random Forests Identification of Gas Turbine Faults", "doi": null, "abstractUrl": "/proceedings-article/icseng/2008/3331a127/12OmNAR1b1v", "parentPublication": { "id": "proceedings/icseng/2008/3331/0", "title": "Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459198", "title": "Semi-Supervised Random Forests", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459198/12OmNqBKU7i", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2007/3069/0/30690211", "title": "Estimating Class Probabilities in Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icmla/2007/30690211/12OmNqJq4qg", "parentPublication": { "id": "proceedings/icmla/2007/3069/0", "title": "2007 International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ihmsc/2010/4151/1/4151a034", "title": "Improve the Performance of Random Forests by Introducing Weight Update Technique", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2010/4151a034/12OmNvDI3Mn", "parentPublication": { "id": "proceedings/ihmsc/2010/4151/1", "title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/2007/2947/0/29470225", "title": "Streaming Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ideas/2007/29470225/12OmNwCJONM", "parentPublication": { "id": "proceedings/ideas/2007/2947/0", "title": "2007 11th International Database Engineering and Applications Symposium, IDEAS-07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2011/4484/0/4484a156", "title": "Keyword Annotation of Medical Image with Random Forest Classifier and Confidence Assigning", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2011/4484a156/12OmNy1SFBy", "parentPublication": { "id": "proceedings/cgiv/2011/4484/0", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/2/3736b214", "title": "Fault Diagnosis of Power Electronic Circuit Based on Random Forests Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736b214/12OmNyo1o1U", "parentPublication": { "id": "proceedings/icnc/2009/3736/2", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2009/3634/1/3634a285", "title": "Fault Diagnosis of Power Electronic Circuit Based on Random Forests Algorithm and AR Model", "doi": null, "abstractUrl": "/proceedings-article/icic/2009/3634a285/12OmNzdoN6c", "parentPublication": { "id": "icic/2009/3634/1", "title": "2009 Second International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940306", "title": "A Crowdsourcing Quality Prediction Model Based on Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940306/1gjRQi2l4pG", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412014", "title": "On learning Random Forests for Random Forest-clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412014/1tmjr5IVIYM", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwbcJ4l", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxxNbUp", "doi": "10.1109/ICCV.2011.6126496", "title": "Structured class-labels in random forests for semantic image labelling", "normalizedTitle": "Structured class-labels in random forests for semantic image labelling", "abstract": "In this paper we propose a simple and effective way to integrate structural information in random forests for semantic image labelling. By structural information we refer to the inherently available, topological distribution of object classes in a given image. Different object class labels will not be randomly distributed over an image but usually form coherently labelled regions. In this work we provide a way to incorporate this topological information in the popular random forest framework for performing low-level, unary classification. Our paper has several contributions: First, we show how random forests can be augmented with structured label information. In the second part, we introduce a novel data splitting function that exploits the joint distributions observed in the structured label space for learning typical label transitions between object classes. Finally, we provide two possibilities for integrating the structured output predictions into concise, semantic labellings. In our experiments on the challenging MSRC and CamVid databases, we compare our method to standard random forest and conditional random field classification results.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we propose a simple and effective way to integrate structural information in random forests for semantic image labelling. By structural information we refer to the inherently available, topological distribution of object classes in a given image. Different object class labels will not be randomly distributed over an image but usually form coherently labelled regions. In this work we provide a way to incorporate this topological information in the popular random forest framework for performing low-level, unary classification. Our paper has several contributions: First, we show how random forests can be augmented with structured label information. In the second part, we introduce a novel data splitting function that exploits the joint distributions observed in the structured label space for learning typical label transitions between object classes. Finally, we provide two possibilities for integrating the structured output predictions into concise, semantic labellings. In our experiments on the challenging MSRC and CamVid databases, we compare our method to standard random forest and conditional random field classification results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we propose a simple and effective way to integrate structural information in random forests for semantic image labelling. By structural information we refer to the inherently available, topological distribution of object classes in a given image. Different object class labels will not be randomly distributed over an image but usually form coherently labelled regions. In this work we provide a way to incorporate this topological information in the popular random forest framework for performing low-level, unary classification. Our paper has several contributions: First, we show how random forests can be augmented with structured label information. In the second part, we introduce a novel data splitting function that exploits the joint distributions observed in the structured label space for learning typical label transitions between object classes. Finally, we provide two possibilities for integrating the structured output predictions into concise, semantic labellings. In our experiments on the challenging MSRC and CamVid databases, we compare our method to standard random forest and conditional random field classification results.", "fno": "06126496", "keywords": [ "Image Classification", "Learning Artificial Intelligence", "Conditional Random Field Classification", "Standard Random Forest", "Cam Vid Databases", "MSRC Databases", "Label Transition Learning", "Joint Distributions", "Data Splitting Function", "Structured Label Information", "Unary Classification", "Structural Information", "Semantic Image Labelling", "Structured Class Labels", "Labeling", "Training", "Vegetation", "Training Data", "Joints", "Semantics", "Decision Trees" ], "authors": [ { "affiliation": "Institute for Computer Graphics and Vision, Graz University of Technology - Austria", "fullName": "Peter Kontschieder", "givenName": "Peter", "surname": "Kontschieder", "__typename": "ArticleAuthorType" }, { "affiliation": "Dipartimento di Scienze Ambientali, Informatica e Statistica, Università Ca' Foscari Venezia - Italy", "fullName": "Samuel Rota Bulò", "givenName": "Samuel Rota", "surname": "Bulò", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Computer Graphics and Vision, Graz University of Technology - Austria", "fullName": "Horst Bischof", "givenName": "Horst", "surname": "Bischof", "__typename": "ArticleAuthorType" }, { "affiliation": "Dipartimento di Scienze Ambientali, Informatica e Statistica, Università Ca' Foscari Venezia - Italy", "fullName": "Marcello Pelillo", "givenName": "Marcello", "surname": "Pelillo", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "2190-2197", "year": "2011", "issn": "1550-5499", "isbn": "978-1-4577-1101-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06126344", "articleId": "12OmNBtCCLA", "__typename": "AdjacentArticleType" }, "next": { "fno": "06126562", "articleId": "12OmNB06l3o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2013/2840/0/2840b841", "title": "Structured Forests for Fast Edge Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840b841/12OmNAkniTC", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118a081", "title": "Neural Decision Forests for Semantic Image Labelling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118a081/12OmNAtaS1q", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/2007/2947/0/29470225", "title": "Streaming Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ideas/2007/29470225/12OmNwCJONM", "parentPublication": { "id": "proceedings/ideas/2007/2947/0", "title": "2007 11th International Database Engineering and Applications Symposium, IDEAS-07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b467", "title": "Deep Neural Decision Forests", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b467/12OmNwwMeXF", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d783", "title": "Pairwise Conditional Random Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d783/12OmNx3Zj9L", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a417", "title": "Alternating Regression Forests for Object Detection and Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a417/12OmNzd7bjg", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/10/06784137", "title": "Structured Labels in Random Forests for Semantic Labelling and Object Detection", "doi": null, "abstractUrl": "/journal/tp/2014/10/06784137/13rRUxAAT8S", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/08/06975234", "title": "Fast Edge Detection Using Structured Forests", "doi": null, "abstractUrl": "/journal/tp/2015/08/06975234/13rRUy0HYSQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/09/07592407", "title": "Learn on Source, Refine on Target: A Model Transfer Learning Framework with Random Forests", "doi": null, "abstractUrl": "/journal/tp/2017/09/07592407/13rRUy3gn8L", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13WBGLOPCjN", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "acronym": "ssiai", "groupId": "1000345", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13WBGMIboGe", "doi": "10.1109/SSIAI.2018.8470320", "title": "Classification of Primary Cilia in Microscopy Images Using Convolutional Neural Random Forests", "normalizedTitle": "Classification of Primary Cilia in Microscopy Images Using Convolutional Neural Random Forests", "abstract": "Accurate detection and classification of primary cilia in microscopy images is an essential and fundamental task for many biological studies including diagnosis of primary ciliary dyskinesia. Manual detection and classification of individual primary cilia by visual inspection is time consuming, and prone to induce subjective bias. However, automation of this process is challenging as well, due to clutter, bleed-through, imaging noise, and the similar characteristics of the non-cilia candidates present within the image. We propose a convolutional neural random forest classifier that combines a convolutional neural network with random decision forests to classify the primary cilia in fluorescence microscopy images. We compare the performance of the proposed classifier with that of an unsupervised k-means classifier and a supervised multi-layer perceptron classifier on real data consisting of 8 representative cilia images, containing more than 2300 primary cilia using precision/recall rates, ROC curves, AUC, and Fβ-score for classification accuracy. Results show that our proposed classifier achieves better classification accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Accurate detection and classification of primary cilia in microscopy images is an essential and fundamental task for many biological studies including diagnosis of primary ciliary dyskinesia. Manual detection and classification of individual primary cilia by visual inspection is time consuming, and prone to induce subjective bias. However, automation of this process is challenging as well, due to clutter, bleed-through, imaging noise, and the similar characteristics of the non-cilia candidates present within the image. We propose a convolutional neural random forest classifier that combines a convolutional neural network with random decision forests to classify the primary cilia in fluorescence microscopy images. We compare the performance of the proposed classifier with that of an unsupervised k-means classifier and a supervised multi-layer perceptron classifier on real data consisting of 8 representative cilia images, containing more than 2300 primary cilia using precision/recall rates, ROC curves, AUC, and Fβ-score for classification accuracy. Results show that our proposed classifier achieves better classification accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Accurate detection and classification of primary cilia in microscopy images is an essential and fundamental task for many biological studies including diagnosis of primary ciliary dyskinesia. Manual detection and classification of individual primary cilia by visual inspection is time consuming, and prone to induce subjective bias. However, automation of this process is challenging as well, due to clutter, bleed-through, imaging noise, and the similar characteristics of the non-cilia candidates present within the image. We propose a convolutional neural random forest classifier that combines a convolutional neural network with random decision forests to classify the primary cilia in fluorescence microscopy images. We compare the performance of the proposed classifier with that of an unsupervised k-means classifier and a supervised multi-layer perceptron classifier on real data consisting of 8 representative cilia images, containing more than 2300 primary cilia using precision/recall rates, ROC curves, AUC, and Fβ-score for classification accuracy. Results show that our proposed classifier achieves better classification accuracy.", "fno": "08470320", "keywords": [ "Forestry", "Microscopy", "Vegetation", "Training", "Decision Trees", "Image Color Analysis", "Computer Architecture", "Image Classification", "Convolutional Neural Network", "Random Forests", "Primary Cilia", "Confocal Microscopy" ], "authors": [ { "affiliation": "School of Electrical and Computer Engineering, Cornell University, Ithaca, NY, USA", "fullName": "Sundaresh Ram", "givenName": "Sundaresh", "surname": "Ram", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA", "fullName": "Mohammed S. Majdi", "givenName": "Mohammed S.", "surname": "Majdi", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA", "fullName": "Jeffrey J. Rodríguez", "givenName": "Jeffrey J.", "surname": "Rodríguez", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Medicine, University of Utah, Salt Lake City, UT, USA", "fullName": "Yang Gao", "givenName": "Yang", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Physiology, University of Arizona, Tucson, AZ, USA", "fullName": "Heddwen L. Brooks", "givenName": "Heddwen L.", "surname": "Brooks", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssiai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "89-92", "year": "2018", "issn": "2473-3598", "isbn": "978-1-5386-6568-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08470313", "articleId": "13WBGNypAGd", "__typename": "AdjacentArticleType" }, "next": { "fno": "08470314", "articleId": "13WBGNxhc5W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visapp/2014/8133/1/07294875", "title": "General purpose segmentation for microorganisms in microscopy images", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07294875/12OmNBgQFIy", "parentPublication": { "id": "proceedings/visapp/2014/8133/1", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458182", "title": "Automatic Analysis of TUNEL assay Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458182/12OmNs5rl84", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/06909928", "title": "Dense Non-rigid Shape Correspondence Using Random Forests", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/06909928/12OmNxRWIcD", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460090", "title": "Watershed merge tree classification for electron microscopy image segmentation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460090/12OmNyYm2wU", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2016/3284/0/08010580", "title": "Confocal vessel structure segmentation with optimized feature bank and random forests", "doi": null, "abstractUrl": "/proceedings-article/aipr/2016/08010580/12OmNzAoi1m", "parentPublication": { "id": "proceedings/aipr/2016/3284/0", "title": "2016 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a527", "title": "Random Forests with Stochastic Induction of Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a527/17D45Xq6dB5", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400a196", "title": "DistForest: A Parallel Random Forest Training Framework Based on Supercomputer", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400a196/183rAdeMwKu", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a294", "title": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a294/18j8JVMWmKQ", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150418", "title": "Random Forests in Chapel", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150418/1lPGJUYSli0", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiqO", "title": "2018 IEEE International Conference on Smart Cloud (SmartCloud)", "acronym": "smartcloud", "groupId": "1817464", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45X7VTgH", "doi": "10.1109/SmartCloud.2018.00018", "title": "Efficient Expression Recognition Based on Shape-indexed Features", "normalizedTitle": "Efficient Expression Recognition Based on Shape-indexed Features", "abstract": "An efficient and accurate facial expression recognition method is proposed based on shape-indexed features and random decision forests. Different from traditional methods that extract features from image coordinate system, the proposed method extracts features based on the location of facial landmarks, which are simple but more robust against pose and inter-personal variations. Assisted with random decision forests that are efficient and less prone to over fitting than decision tree, this method achieves real-time expression recognition and the accuracy is superior over the state of the art.", "abstracts": [ { "abstractType": "Regular", "content": "An efficient and accurate facial expression recognition method is proposed based on shape-indexed features and random decision forests. Different from traditional methods that extract features from image coordinate system, the proposed method extracts features based on the location of facial landmarks, which are simple but more robust against pose and inter-personal variations. Assisted with random decision forests that are efficient and less prone to over fitting than decision tree, this method achieves real-time expression recognition and the accuracy is superior over the state of the art.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An efficient and accurate facial expression recognition method is proposed based on shape-indexed features and random decision forests. Different from traditional methods that extract features from image coordinate system, the proposed method extracts features based on the location of facial landmarks, which are simple but more robust against pose and inter-personal variations. Assisted with random decision forests that are efficient and less prone to over fitting than decision tree, this method achieves real-time expression recognition and the accuracy is superior over the state of the art.", "fno": "800000a060", "keywords": [ "Decision Trees", "Emotion Recognition", "Face Recognition", "Feature Extraction", "Facial Expression Recognition Method", "Image Coordinate System", "Real Time Expression Recognition", "Decision Tree", "Facial Landmarks", "Random Decision Forests", "Shape Indexed Features", "Feature Extraction", "Forestry", "Vegetation", "Face Recognition", "Face", "Training", "Decision Trees", "Expression Recognition Shape Indexed Feature Random Decision Forest" ], "authors": [ { "affiliation": null, "fullName": "Ying Wang", "givenName": "Ying", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guoying Zhang", "givenName": "Guoying", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "smartcloud", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-09-01T00:00:00", "pubType": "proceedings", "pages": "60-63", "year": "2018", "issn": null, "isbn": "978-1-5386-8000-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "800000a054", "articleId": "17D45Xq6dCq", "__typename": "AdjacentArticleType" }, "next": { "fno": "800000a064", "articleId": "17D45VTRoso", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisce/2017/3013/0/3013a326", "title": "Facial Expression Recognition Algorithm Based on Reverse Co-Salient Regions (RCSR) Features", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013a326/12OmNBiPRCb", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a199", "title": "Automatic 4D Facial Expression Recognition Using DCT Features", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a199/12OmNqNG3gL", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2013/5050/0/5050a520", "title": "Facial Expression Recognition Based on Gabor Wavelet Phase Features", "doi": null, "abstractUrl": "/proceedings-article/icig/2013/5050a520/12OmNqNXEmi", "parentPublication": { "id": "proceedings/icig/2013/5050/0", "title": "2013 Seventh International Conference on Image and Graphics (ICIG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760147", "title": "Human expression recognition based on facial features", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760147/12OmNs0TKHG", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771435", "title": "Expression recognition from 3D dynamic faces using robust spatio-temporal shape features", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771435/12OmNwE9OG5", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d783", "title": "Pairwise Conditional Random Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d783/12OmNx3Zj9L", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2018/2335/0/233501a629", "title": "Investigating Deep Neural Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a629/12OmNx5piZT", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2019/02/07934067", "title": "Dynamic Pose-Robust Facial Expression Recognition by Multi-View Pairwise Conditional Random Forests", "doi": null, "abstractUrl": "/journal/ta/2019/02/07934067/13rRUwjoNve", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2015/01/06998925", "title": "Automatic facial expression recognition using features of salient facial patches", "doi": null, "abstractUrl": "/journal/ta/2015/01/06998925/13rRUxly94b", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirB", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xq6dB5", "doi": "10.1109/ICTAI.2018.00087", "title": "Random Forests with Stochastic Induction of Decision Trees", "normalizedTitle": "Random Forests with Stochastic Induction of Decision Trees", "abstract": "In this paper, a novel stochastic approach for the induction of the decision trees in a tree-structured ensemble classifier is presented. The proposed algorithm is based on a stochastic process to induct each decision tree, assigning a probability for the selection of the split attribute in every tree node, designed in order to create strong and independent trees. A selection of 33 well-known classification datasets have been employed for the evaluation of the proposed algorithm, obtaining high classification results, in terms of Classification Accuracy, Average Sensitivity and Average Precision. Furthermore, a comparative study with Random Forest, Random Subspace and C4.5 is performed. The obtained results indicate the importance of the proposed algorithm, since it achieved the highest overall results in all metrics.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, a novel stochastic approach for the induction of the decision trees in a tree-structured ensemble classifier is presented. The proposed algorithm is based on a stochastic process to induct each decision tree, assigning a probability for the selection of the split attribute in every tree node, designed in order to create strong and independent trees. A selection of 33 well-known classification datasets have been employed for the evaluation of the proposed algorithm, obtaining high classification results, in terms of Classification Accuracy, Average Sensitivity and Average Precision. Furthermore, a comparative study with Random Forest, Random Subspace and C4.5 is performed. The obtained results indicate the importance of the proposed algorithm, since it achieved the highest overall results in all metrics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, a novel stochastic approach for the induction of the decision trees in a tree-structured ensemble classifier is presented. The proposed algorithm is based on a stochastic process to induct each decision tree, assigning a probability for the selection of the split attribute in every tree node, designed in order to create strong and independent trees. A selection of 33 well-known classification datasets have been employed for the evaluation of the proposed algorithm, obtaining high classification results, in terms of Classification Accuracy, Average Sensitivity and Average Precision. Furthermore, a comparative study with Random Forest, Random Subspace and C4.5 is performed. The obtained results indicate the importance of the proposed algorithm, since it achieved the highest overall results in all metrics.", "fno": "744900a527", "keywords": [ "Decision Trees", "Pattern Classification", "Probability", "Random Forests", "Stochastic Processes", "Stochastic Induction", "Decision Tree", "Tree Structured Ensemble Classifier", "Independent Trees", "Random Forests", "Forestry", "Decision Trees", "Vegetation", "Stochastic Processes", "Training", "Sensitivity", "Radio Frequency", "Stochastic Forest Random Forests Ensemble Classifiers Classification Decision Trees" ], "authors": [ { "affiliation": null, "fullName": "Markos G. Tsipouras", "givenName": "Markos G.", "surname": "Tsipouras", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dimosthenis C. Tsouros", "givenName": "Dimosthenis C.", "surname": "Tsouros", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Panagiotis N. Smyrlis", "givenName": "Panagiotis N.", "surname": "Smyrlis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nikolaos Giannakeas", "givenName": "Nikolaos", "surname": "Giannakeas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexandros T. Tzallas", "givenName": "Alexandros T.", "surname": "Tzallas", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "527-531", "year": "2018", "issn": null, "isbn": "978-1-5386-7449-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "744900a522", "articleId": "17D45WaTkpc", "__typename": "AdjacentArticleType" }, "next": { "fno": "744900a532", "articleId": "17D45WrVg6A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209d768", "title": "Multiple Instance Learning with Response-Optimized Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d768/12OmNrJiD0f", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/1/71280278", "title": "Random decision forests", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71280278/12OmNrYCXLi", "parentPublication": { "id": "proceedings/icdar/1995/7128/1", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/2007/2947/0/29470225", "title": "Streaming Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ideas/2007/29470225/12OmNwCJONM", "parentPublication": { "id": "proceedings/ideas/2007/2947/0", "title": "2007 11th International Database Engineering and Applications Symposium, IDEAS-07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b467", "title": "Deep Neural Decision Forests", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b467/12OmNwwMeXF", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/1991/694/0/00147565", "title": "Growing binary trees in a random environment", "doi": null, "abstractUrl": "/proceedings-article/infcom/1991/00147565/12OmNzZ5onu", "parentPublication": { "id": "proceedings/infcom/1991/694/0", "title": "IEEE INFCOM '91 - Communications Societies Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/05/06574846", "title": "Random Projection Random Discretization Ensembles—Ensembles of Linear Multivariate Decision Trees", "doi": null, "abstractUrl": "/journal/tk/2014/05/06574846/13rRUxC0SWA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/01/08676336", "title": "K-Nearest Neighbor Search by Random Projection Forests", "doi": null, "abstractUrl": "/journal/bd/2021/01/08676336/18Nk65SQcWA", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a294", "title": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a294/18j8JVMWmKQ", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a399", "title": "Growing Deep Forests Efficiently with Soft Routing and Learned Connectivity", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a399/18jXIMmS6nC", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18j8Ecq0jn2", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18j8JVMWmKQ", "doi": "10.1109/WACV.2019.00037", "title": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "normalizedTitle": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "abstract": "Random Forests (RFs) are a powerful machine learning technique used for various applications including classification, regression, clustering, and manifold learning. The interpretation of a given Random Forest usually relies on statistical values, such as the distribution of path length, leaf impurity, leaf size, etc. All those measures focus on specific aspects and are incapable to provide a holistic understanding of the RF. In this paper, we propose a two-dimensional, easy-to-grasp visualization technique that follows a botanical approach and illustrates several key parameters necessary to understand why a given RF performs in a certain way. The method allows customized mappings of RF characteristics to visual properties and provides the possibility to interactively analyze the forest structure. This allows to determine trees that perform extraordinarily well or bad, to analyze the reasons for their performance, and thus to gain insights into how to change parameter setting to increase performance or efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Random Forests (RFs) are a powerful machine learning technique used for various applications including classification, regression, clustering, and manifold learning. The interpretation of a given Random Forest usually relies on statistical values, such as the distribution of path length, leaf impurity, leaf size, etc. All those measures focus on specific aspects and are incapable to provide a holistic understanding of the RF. In this paper, we propose a two-dimensional, easy-to-grasp visualization technique that follows a botanical approach and illustrates several key parameters necessary to understand why a given RF performs in a certain way. The method allows customized mappings of RF characteristics to visual properties and provides the possibility to interactively analyze the forest structure. This allows to determine trees that perform extraordinarily well or bad, to analyze the reasons for their performance, and thus to gain insights into how to change parameter setting to increase performance or efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Random Forests (RFs) are a powerful machine learning technique used for various applications including classification, regression, clustering, and manifold learning. The interpretation of a given Random Forest usually relies on statistical values, such as the distribution of path length, leaf impurity, leaf size, etc. All those measures focus on specific aspects and are incapable to provide a holistic understanding of the RF. In this paper, we propose a two-dimensional, easy-to-grasp visualization technique that follows a botanical approach and illustrates several key parameters necessary to understand why a given RF performs in a certain way. The method allows customized mappings of RF characteristics to visual properties and provides the possibility to interactively analyze the forest structure. This allows to determine trees that perform extraordinarily well or bad, to analyze the reasons for their performance, and thus to gain insights into how to change parameter setting to increase performance or efficiency.", "fno": "197500a294", "keywords": [ "Data Visualisation", "Random Forests", "Path Length", "Leaf Impurity", "Leaf Size", "Visualization Technique", "Botanical Approach", "RF Characteristics", "Visual Properties", "Forest Structure", "Colorful Trees", "Manifold Learning", "Statistical Values", "Random Forest Visualization", "Machine Learning Technique", "Vegetation", "Radio Frequency", "Impurities", "Visualization", "Forestry", "Data Visualization", "Decision Trees" ], "authors": [ { "affiliation": null, "fullName": "Ronny Hä Nsch", "givenName": "Ronny Hä", "surname": "Nsch", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Philipp Wiesner", "givenName": "Philipp", "surname": "Wiesner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sophie Wendler", "givenName": "Sophie", "surname": "Wendler", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Olaf Hellwich", "givenName": "Olaf", "surname": "Hellwich", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-01-01T00:00:00", "pubType": "proceedings", "pages": "294-302", "year": "2019", "issn": "1550-5790", "isbn": "978-1-7281-1975-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "197500a283", "articleId": "18j8PCuohj2", "__typename": "AdjacentArticleType" }, "next": { "fno": "197500a303", "articleId": "18j8KYiZFK0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2018/2335/0/233501a629", "title": "Investigating Deep Neural Forests for Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a629/12OmNx5piZT", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209b496", "title": "Leaf Species Classification Based on a Botanical Shape Sub-classifier Strategy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209b496/12OmNxvO01q", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2018/6568/0/08470320", "title": "Classification of Primary Cilia in Microscopy Images Using Convolutional Neural Random Forests", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2018/08470320/13WBGMIboGe", "parentPublication": { "id": "proceedings/ssiai/2018/6568/0", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/03/07164339", "title": "Incremental Learning of Random Forests for Large-Scale Image Classification", "doi": null, "abstractUrl": "/journal/tp/2016/03/07164339/13rRUEgaru3", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a527", "title": "Random Forests with Stochastic Induction of Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a527/17D45Xq6dB5", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a399", "title": "Growing Deep Forests Efficiently with Soft Routing and Learned Connectivity", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a399/18jXIMmS6nC", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10089875", "title": "Geometry- and Accuracy-Preserving Random Forest Proximities", "doi": null, "abstractUrl": "/journal/tp/5555/01/10089875/1LXJf5QyoV2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/02/08812930", "title": "Deep Differentiable Random Forests for Age Estimation", "doi": null, "abstractUrl": "/journal/tp/2021/02/08812930/1cPWH6Ra4sE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150418", "title": "Random Forests in Chapel", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150418/1lPGJUYSli0", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18jXIMmS6nC", "doi": "10.1109/ICDMW.2018.00065", "title": "Growing Deep Forests Efficiently with Soft Routing and Learned Connectivity", "normalizedTitle": "Growing Deep Forests Efficiently with Soft Routing and Learned Connectivity", "abstract": "Despite the latest prevailing success of deep neural networks (DNNs), several concerns have been raised against their usage, including the lack of intepretability the gap between DNNs and other well-established machine learning models, and the growingly expensive computational costs. A number of recent works [1],[2],[3] explored the alternative to sequentially stacking decision tree/random forest building blocks in a purely feed-forward way, with no need of back propagation. Since decision trees enjoy inherent reasoning transparency, such deep forest models can also facilitate the understanding of the internal decision making process. This paper further extends the deep forest idea in several important aspects. Firstly, we employ a probabilistic tree whose nodes make probabilistic routing decisions, a.k.a., \"soft routing\", rather than hard binary decisions. Besides enhancing the flexibility, it also enables non-greedy optimization for each tree. Second, we propose an innovative topology learning strategy: every node in the ree now maintains a new learnable hyperparameter indicating the probability that it will be a leaf node. In that way, the tree will jointly optimize both its parameters and the tree topology during training. Experiments on the MNIST dataset demonstrate that our empowered deep forests can achieve better or comparable performance than [1],[3], with dramatically reduced model complexity. For example, our model with only 1 layer of 15 trees can perform comparably with the model in [3] with 2 layers of 2000 trees each.", "abstracts": [ { "abstractType": "Regular", "content": "Despite the latest prevailing success of deep neural networks (DNNs), several concerns have been raised against their usage, including the lack of intepretability the gap between DNNs and other well-established machine learning models, and the growingly expensive computational costs. A number of recent works [1],[2],[3] explored the alternative to sequentially stacking decision tree/random forest building blocks in a purely feed-forward way, with no need of back propagation. Since decision trees enjoy inherent reasoning transparency, such deep forest models can also facilitate the understanding of the internal decision making process. This paper further extends the deep forest idea in several important aspects. Firstly, we employ a probabilistic tree whose nodes make probabilistic routing decisions, a.k.a., \"soft routing\", rather than hard binary decisions. Besides enhancing the flexibility, it also enables non-greedy optimization for each tree. Second, we propose an innovative topology learning strategy: every node in the ree now maintains a new learnable hyperparameter indicating the probability that it will be a leaf node. In that way, the tree will jointly optimize both its parameters and the tree topology during training. Experiments on the MNIST dataset demonstrate that our empowered deep forests can achieve better or comparable performance than [1],[3], with dramatically reduced model complexity. For example, our model with only 1 layer of 15 trees can perform comparably with the model in [3] with 2 layers of 2000 trees each.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Despite the latest prevailing success of deep neural networks (DNNs), several concerns have been raised against their usage, including the lack of intepretability the gap between DNNs and other well-established machine learning models, and the growingly expensive computational costs. A number of recent works [1],[2],[3] explored the alternative to sequentially stacking decision tree/random forest building blocks in a purely feed-forward way, with no need of back propagation. Since decision trees enjoy inherent reasoning transparency, such deep forest models can also facilitate the understanding of the internal decision making process. This paper further extends the deep forest idea in several important aspects. Firstly, we employ a probabilistic tree whose nodes make probabilistic routing decisions, a.k.a., \"soft routing\", rather than hard binary decisions. Besides enhancing the flexibility, it also enables non-greedy optimization for each tree. Second, we propose an innovative topology learning strategy: every node in the ree now maintains a new learnable hyperparameter indicating the probability that it will be a leaf node. In that way, the tree will jointly optimize both its parameters and the tree topology during training. Experiments on the MNIST dataset demonstrate that our empowered deep forests can achieve better or comparable performance than [1],[3], with dramatically reduced model complexity. For example, our model with only 1 layer of 15 trees can perform comparably with the model in [3] with 2 layers of 2000 trees each.", "fno": "928800a399", "keywords": [ "Decision Making", "Decision Trees", "Learning Artificial Intelligence", "Neural Nets", "Optimisation", "Probability", "Soft Routing", "Learned Connectivity", "Deep Neural Networks", "Purely Feed Forward Way", "Decision Trees", "Inherent Reasoning Transparency", "Deep Forest Models", "Internal Decision Making Process", "Deep Forest Idea", "Probabilistic Tree", "Probabilistic Routing Decisions", "Hard Binary Decisions", "Nongreedy Optimization", "Innovative Topology Learning Strategy", "Leaf Node", "Tree Topology", "Empowered Deep Forests", "Dramatically Reduced Model Complexity", "DNN", "Machine Learning Models", "Decision Tree Random Forest Building Blocks", "Vegetation", "Forestry", "Decision Trees", "Routing", "Training", "Computational Modeling", "Topology", "Soft Routing", "Topology Learning", "Deep Forest" ], "authors": [ { "affiliation": null, "fullName": "Jianghao Shen", "givenName": "Jianghao", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sicheng Wang", "givenName": "Sicheng", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhangyang Wang", "givenName": "Zhangyang", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "399-402", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800a391", "articleId": "18jXJlz8enC", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800a403", "articleId": "18jXDyMJ15K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2014/5118/0/5118a081", "title": "Neural Decision Forests for Semantic Image Labelling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118a081/12OmNAtaS1q", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d768", "title": "Multiple Instance Learning with Response-Optimized Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d768/12OmNrJiD0f", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2012/2049/0/06266362", "title": "Random forests based WCE frames classification", "doi": null, "abstractUrl": "/proceedings-article/cbms/2012/06266362/12OmNwqft5I", "parentPublication": { "id": "proceedings/cbms/2012/2049/0", "title": "2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391b467", "title": "Deep Neural Decision Forests", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391b467/12OmNwwMeXF", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454906", "title": "iForest: Interpreting Random Forests via Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454906/17D45VsBU5x", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a527", "title": "Random Forests with Stochastic Induction of Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a527/17D45Xq6dB5", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a294", "title": "Colorful Trees: Visualizing Random Forests for Analysis and Interpretation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a294/18j8JVMWmKQ", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/02/08812930", "title": "Deep Differentiable Random Forests for Age Estimation", "doi": null, "abstractUrl": "/journal/tp/2021/02/08812930/1cPWH6Ra4sE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a406", "title": "Kernel Rotation Forests for Classification", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a406/1jdDv9syOyI", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2020/1054/0/09191611", "title": "Discovering Drug-Drug and Drug-Disease Interactions Inducing Acute Kidney Injury Using Deep Rule Forests", "doi": null, "abstractUrl": "/proceedings-article/iri/2020/09191611/1n0IvmFF5f2", "parentPublication": { "id": "proceedings/iri/2020/1054/0", "title": "2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrJAe19", "title": "2015 International Workshop on Data Mining with Industrial Applications (DMIA)", "acronym": "dmia", "groupId": "1814104", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzC5TsA", "doi": "10.1109/DMIA.2015.16", "title": "VAST Challenge 2014: The Kronos Incident-Mini-Challenge 3", "normalizedTitle": "VAST Challenge 2014: The Kronos Incident-Mini-Challenge 3", "abstract": "The leaders of GAStech are celebrating their new found fortune as a result of the initial public offering of their very successful company, in the city of Abila, at the island country of Kronos. In the midst of this celebration, several employees of GAStech go missing. An organization known as the Protectors of Kronos is suspected in the disappearance. It is January 23, 2014, and the employees have been missing for three days. VAST 2014, Mini-Challenge 3 poses a streaming analysis challenge, with access to real-time feeds of microblogs and emergency calls, to identify what is happening in Abila and find the missing employees.", "abstracts": [ { "abstractType": "Regular", "content": "The leaders of GAStech are celebrating their new found fortune as a result of the initial public offering of their very successful company, in the city of Abila, at the island country of Kronos. In the midst of this celebration, several employees of GAStech go missing. An organization known as the Protectors of Kronos is suspected in the disappearance. It is January 23, 2014, and the employees have been missing for three days. VAST 2014, Mini-Challenge 3 poses a streaming analysis challenge, with access to real-time feeds of microblogs and emergency calls, to identify what is happening in Abila and find the missing employees.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The leaders of GAStech are celebrating their new found fortune as a result of the initial public offering of their very successful company, in the city of Abila, at the island country of Kronos. In the midst of this celebration, several employees of GAStech go missing. An organization known as the Protectors of Kronos is suspected in the disappearance. It is January 23, 2014, and the employees have been missing for three days. VAST 2014, Mini-Challenge 3 poses a streaming analysis challenge, with access to real-time feeds of microblogs and emergency calls, to identify what is happening in Abila and find the missing employees.", "fno": "8111a079", "keywords": [ "Data Mining", "Data Visualisation", "Emergency Management", "Web Sites", "Kronos Incident Mini Challenge 3", "GA Stech", "VAST 2014", "Microblogs", "Emergency Calls", "Abila", "Missing Employees", "Fires", "Software", "Visualization", "Data Mining", "Tagging", "Law Enforcement", "Knowledge Discovery", "Information Visualization", "VAST 2014", "Mini Challenge 3", "Visual Analytics", "Streaming Analysis", "Sentiment Analysis", "Raw", "Tableau Software", "Wordle" ], "authors": [ { "affiliation": null, "fullName": "Mariana Clara Landoni", "givenName": "Mariana Clara", "surname": "Landoni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrei Rukavina", "givenName": "Andrei", "surname": "Rukavina", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "María Laura Traverso", "givenName": "María Laura", "surname": "Traverso", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paulina Verasay", "givenName": "Paulina", "surname": "Verasay", "__typename": "ArticleAuthorType" } ], "idPrefix": "dmia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "79-81", "year": "2015", "issn": null, "isbn": "978-1-4673-8111-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8111a072", "articleId": "12OmNs5rkMd", "__typename": "AdjacentArticleType" }, "next": { "fno": "8111a082", "articleId": "12OmNz4BdsA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042560", "title": "A three step process to design visualisations for GeoTemporal analysis (VAST 2014 Mini Challenge 2)", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042560/12OmNAOKnYn", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042541", "title": "The Kronos Incident (Mini-challenge 1)", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042541/12OmNB8Cj9L", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042567", "title": "VAST 2014: Summary on Mini Challenge two", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042567/12OmNBf94XY", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042554", "title": "AnnotatedTimeTree: Visualization and annotation of news text and other heterogeneous document collections", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042554/12OmNCeaPZm", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042550", "title": "VAST challenge 2014: Mini-challenge 1", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042550/12OmNs59JJd", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042536", "title": "VAST challenge 2014: The Kronos incident", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042536/12OmNscOUhM", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042574", "title": "VAST 2014: Summary on Mini Challenge 3 work", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042574/12OmNvDI3Rg", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042568", "title": "Making sense of daily life data: From commonalities to anomalies: VAST 2014 Mini Challenge #2", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042568/12OmNvTBB5x", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042577", "title": "VAST Challenge 2014 — The Kronos incident — Mini-Challenge 3", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042577/12OmNwDACjP", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042539", "title": "VAST 2014: Summary on grant challenge work", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042539/12OmNzdoMtA", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwCJOY5", "title": "2015 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNqJZgym", "doi": "10.1109/BigData.2015.7364039", "title": "Shaping data: Visualization under construction", "normalizedTitle": "Shaping data: Visualization under construction", "abstract": "Generating the maximum number of visual patterns by uncovering the entire space of possible visual designs remains a challenge within the construction process of information visualization. Users interact with different mindsets consisting of design, data analysis, application development, and hardware resource usage. Therefore, they desire a flexible and productive interface that keeps them clued into the design process without requiring knowledge of the underlying technical system. This was summarized under the no developing, more modeling paradigm, which is described through a visual theory as the basis of the shaping process. A general model was applied to a prototype to demonstrate the benefits and restrictions of this construction process and to contribute toward bringing different mindsets together.", "abstracts": [ { "abstractType": "Regular", "content": "Generating the maximum number of visual patterns by uncovering the entire space of possible visual designs remains a challenge within the construction process of information visualization. Users interact with different mindsets consisting of design, data analysis, application development, and hardware resource usage. Therefore, they desire a flexible and productive interface that keeps them clued into the design process without requiring knowledge of the underlying technical system. This was summarized under the no developing, more modeling paradigm, which is described through a visual theory as the basis of the shaping process. A general model was applied to a prototype to demonstrate the benefits and restrictions of this construction process and to contribute toward bringing different mindsets together.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generating the maximum number of visual patterns by uncovering the entire space of possible visual designs remains a challenge within the construction process of information visualization. Users interact with different mindsets consisting of design, data analysis, application development, and hardware resource usage. Therefore, they desire a flexible and productive interface that keeps them clued into the design process without requiring knowledge of the underlying technical system. This was summarized under the no developing, more modeling paradigm, which is described through a visual theory as the basis of the shaping process. A general model was applied to a prototype to demonstrate the benefits and restrictions of this construction process and to contribute toward bringing different mindsets together.", "fno": "07364039", "keywords": [ "Visualization", "Data Visualization", "Data Models", "Encoding", "Computational Modeling", "Programming", "Scalability", "Human Perception", "Information Visualization", "Visual Scalability", "Modeling", "Big Data", "Multidimensional", "Shaping" ], "authors": [ { "affiliation": "TU Bergakademie Freiberg", "fullName": "Oliver Bieh-Zimmert", "givenName": "Oliver", "surname": "Bieh-Zimmert", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Bergakademie Freiberg", "fullName": "Carsten Felden", "givenName": "Carsten", "surname": "Felden", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "2445-2452", "year": "2015", "issn": null, "isbn": "978-1-4799-9926-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07364038", "articleId": "12OmNBiygz1", "__typename": "AdjacentArticleType" }, "next": { "fno": "07364040", "articleId": "12OmNApcu7e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400552", "title": "Watch this: A taxonomy for dynamic data visualization", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400552/12OmNxYtu2A", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004008", "title": "Multidimensional Visualization Techniques for Microarray Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004008/12OmNzy7uVa", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019847", "title": "CasCADe: A Novel 4D Visualization System for Virtual Construction Planning", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019847/13rRUxlgxTr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539327", "title": "Visualization by Demonstration: An Interaction Paradigm for Visual Data Exploration", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539327/13rRUytWF9q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/02/09709159", "title": "Visualization for Architecture, Engineering, and Construction: Shaping the Future of Our Built World", "doi": null, "abstractUrl": "/magazine/cg/2022/02/09709159/1AR0v9b1beE", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800a557", "title": "Visualization and supervision system of railway engineering construction process based on BIM technology", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800a557/1ByeVlkvgVa", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a156", "title": "Student Ability Portrait Construction Research Based on Big Data", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a156/1CJgd24RInC", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a280", "title": "Visualization Tool for Comparative Analysis of Seabird Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a280/1KaH5N5YOK4", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a109", "title": "A Visual-Interactive Idiom to Diagnose Missing Data Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a109/1rSRaDpGvle", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552878", "title": "VizLinter: A Linter and Fixer Framework for Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552878/1xic0oVyd5m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBKW9zi", "title": "2006 19th Brazilian Symposium on Computer Graphics and Image Processing", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "146z4Hacfa0", "doi": "10.1109/SIBGRAPI.2006.17", "title": "Exploratory visualization based on multidimensional transfer functions and star coordinates", "normalizedTitle": "Exploratory visualization based on multidimensional transfer functions and star coordinates", "abstract": "Exploration and analysis of multivariate data play an important role in different domains. This work proposes a simple interface prototype that allows a human user to visually explore multivariate spatial objects, such as images, sequence of images or volume. It uses star coordinates as a widget to display the multivariate data on the computer 2D screen. The user then identifies a feature on this powerful coordinate system by mapping a selected feature region on that widget to a color and opacity. As a visual result, the feature is rendered on the object's space composing the use of this maps and the star coordinates projection. Some examples illustrate the potential of this interface", "abstracts": [ { "abstractType": "Regular", "content": "Exploration and analysis of multivariate data play an important role in different domains. This work proposes a simple interface prototype that allows a human user to visually explore multivariate spatial objects, such as images, sequence of images or volume. It uses star coordinates as a widget to display the multivariate data on the computer 2D screen. The user then identifies a feature on this powerful coordinate system by mapping a selected feature region on that widget to a color and opacity. As a visual result, the feature is rendered on the object's space composing the use of this maps and the star coordinates projection. Some examples illustrate the potential of this interface", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Exploration and analysis of multivariate data play an important role in different domains. This work proposes a simple interface prototype that allows a human user to visually explore multivariate spatial objects, such as images, sequence of images or volume. It uses star coordinates as a widget to display the multivariate data on the computer 2D screen. The user then identifies a feature on this powerful coordinate system by mapping a selected feature region on that widget to a color and opacity. As a visual result, the feature is rendered on the object's space composing the use of this maps and the star coordinates projection. Some examples illustrate the potential of this interface", "fno": "04027077", "keywords": [ "Data Visualisation", "Feature Extraction", "Rendering Computer Graphics", "Exploratory Visualization", "Multidimensional Transfer Function", "Interface Prototype", "Multivariate Spatial Object", "Star Coordinates Projection", "Multidimensional Systems", "Transfer Functions", "Data Visualization", "Computer Displays", "Data Analysis", "Prototypes", "Rendering Computer Graphics", "Humans", "Two Dimensional Displays", "Geology" ], "authors": [ { "affiliation": "PUC-Rio, Rio de Janeiro, Brazil", "fullName": "Alex Laier Bordignon", "givenName": "Alex Laier", "surname": "Bordignon", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio, Rio de Janeiro, Brazil", "fullName": "Rener Castro", "givenName": "Rener", "surname": "Castro", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio, Rio de Janeiro, Brazil", "fullName": "Helio Lopes", "givenName": "Helio", "surname": "Lopes", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio, Rio de Janeiro, Brazil", "fullName": "Thomas Lewiner", "givenName": "Thomas", "surname": "Lewiner", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio, Rio de Janeiro, Brazil", "fullName": "Geovan Tavares", "givenName": "Geovan", "surname": "Tavares", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "273-280", "year": "2006", "issn": "1530-1834", "isbn": "0-7695-2686-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04027088", "articleId": "12OmNxeut43", "__typename": "AdjacentArticleType" }, "next": { "fno": "04027079", "articleId": "146z4GhHgbw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waim/2008/3185/0/3185a165", "title": "Advanced Star Coordinates", "doi": null, "abstractUrl": "/proceedings-article/waim/2008/3185a165/12OmNAYoKoO", "parentPublication": { "id": "proceedings/waim/2008/3185/0", "title": "Web-Age Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532141", "title": "An interactive 3D integration of parallel coordinates and star glyphs", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532141/12OmNyuPLlh", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532141", "title": "An interactive 3D integration of parallel coordinates and star glyphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532141/12OmNzZEAtN", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900020", "title": "An Interactive 3D Integration of Parallel Coordinates and Star Glyphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900020/12OmNzkMlUx", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122615", "title": "Orthographic Star Coordinates", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122615/13rRUILLkDP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875998", "title": "Axis Calibration for Improving Data Attribute Estimation in Star Coordinates Plots", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875998/13rRUwghd50", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192699", "title": "A comparative study between RadViz and Star Coordinates", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192699/13rRUx0xPic", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/07911335", "title": "Indexed-Points Parallel Coordinates Visualization of Multivariate Correlations", "doi": null, "abstractUrl": "/journal/tg/2018/06/07911335/13rRUxly9e1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440845", "title": "Shape-preserving Star Coordinates", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440845/17D45WYQJ9Z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a145", "title": "A Study on 2D and 3D Parallel Coordinates for Pattern Identification in Temporal Multivariate Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a145/1cMFbhiN7xK", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYXWFA", "doi": "10.1109/PACIFICVIS.2015.7156392", "title": "TrajRank: Exploring travel behaviour on a route by trajectory ranking", "normalizedTitle": "TrajRank: Exploring travel behaviour on a route by trajectory ranking", "abstract": "In this paper, we propose a novel visual analysis method TrajRank to study the travel behaviour of vehicles along one route. We focus on the spatial-temporal distribution of travel time, i.e., the time spent on each road segment and the travel time variation in rush/non-rush hours. TrajRank first allows users to interactively select a route, and segment it into several road segments. Then trajectories passing this route are automatically extracted. These trajectories are ranked on each road segment according to travel time and further clustered according to the rankings on all road segments. Based on the above ranking analysis, we provide a temporal distribution view showing the temporal distribution of travel time and a ranking diagram view showing the spatial variation of travel time. With real taxi GPS data, we present three use cases and an informal user study to show the effectiveness and usability of our method.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a novel visual analysis method TrajRank to study the travel behaviour of vehicles along one route. We focus on the spatial-temporal distribution of travel time, i.e., the time spent on each road segment and the travel time variation in rush/non-rush hours. TrajRank first allows users to interactively select a route, and segment it into several road segments. Then trajectories passing this route are automatically extracted. These trajectories are ranked on each road segment according to travel time and further clustered according to the rankings on all road segments. Based on the above ranking analysis, we provide a temporal distribution view showing the temporal distribution of travel time and a ranking diagram view showing the spatial variation of travel time. With real taxi GPS data, we present three use cases and an informal user study to show the effectiveness and usability of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a novel visual analysis method TrajRank to study the travel behaviour of vehicles along one route. We focus on the spatial-temporal distribution of travel time, i.e., the time spent on each road segment and the travel time variation in rush/non-rush hours. TrajRank first allows users to interactively select a route, and segment it into several road segments. Then trajectories passing this route are automatically extracted. These trajectories are ranked on each road segment according to travel time and further clustered according to the rankings on all road segments. Based on the above ranking analysis, we provide a temporal distribution view showing the temporal distribution of travel time and a ranking diagram view showing the spatial variation of travel time. With real taxi GPS data, we present three use cases and an informal user study to show the effectiveness and usability of our method.", "fno": "07156392", "keywords": [ "Trajectory", "Roads", "Visualization", "Data Visualization", "Global Positioning System", "Vehicles", "Indexes", "Filtering", "Travel Behaviour", "Ranking Visualization" ], "authors": [ { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, China", "fullName": "Min Lu", "givenName": "Min", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, China", "fullName": "Zuchao Wang", "givenName": "Zuchao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University, China", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "311-318", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156391", "articleId": "12OmNxYL5gh", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2014/2555/0/06816646", "title": "Stochastic skyline route planning under time-varying uncertainty", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816646/12OmNC4eSs9", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2015/8033/0/07146525", "title": "DoppelDriver: Counterfactual actual travel times for alternative routes", "doi": null, "abstractUrl": "/proceedings-article/percom/2015/07146525/12OmNwDSdHL", "parentPublication": { "id": "proceedings/percom/2015/8033/0", "title": "2015 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2015/8688/0/8688a248", "title": "Analysis and Visualization of Traffic Conditions of Road Network by Route Bus Probe Data", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2015/8688a248/12OmNwbukfF", "parentPublication": { "id": "proceedings/bigmm/2015/8688/0", "title": "2015 IEEE International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2015/9783/0/07347679", "title": "Visual analysis of route choice behaviour based on GPS trajectories", "doi": null, "abstractUrl": "/proceedings-article/vast/2015/07347679/12OmNyKJiqF", "parentPublication": { "id": "proceedings/vast/2015/9783/0", "title": "2015 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113313", "title": "Personalized route recommendation using big trajectory data", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113313/12OmNzcPA9c", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2018/7016/2/701602a122", "title": "Urban Travel Time Estimation in Greater Maputo Using Mobile Phone Big Data", "doi": null, "abstractUrl": "/proceedings-article/cbi/2018/701602a122/13l5NXF5SGV", "parentPublication": { "id": "proceedings/cbi/2018/7016/2", "title": "2018 IEEE 20th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000b073", "title": "Learning to Route with Sparse Trajectory Sets", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000b073/14Fq0Uc9f9u", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a712", "title": "An Ensemble Method for Urban Travel Time Prediction", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a712/17D45WrVg8S", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2019/5141/0/514100a258", "title": "A Matrix-Decomposition-Based Context Tensor Approach for Personalized Travel Time Estimation", "doi": null, "abstractUrl": "/proceedings-article/cbd/2019/514100a258/1fw1PFFZVug", "parentPublication": { "id": "proceedings/cbd/2019/5141/0", "title": "2019 Seventh International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09261122", "title": "TTPNet: A Neural Network for Travel Time Prediction Based on Tensor Decomposition and Graph Embedding", "doi": null, "abstractUrl": "/journal/tk/2022/09/09261122/1oNViFjurPq", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Tk", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNs4S8DY", "doi": "10.1109/ICME.2008.4607384", "title": "SocialRank: A ranking model for web image retrieval in web 2.0", "normalizedTitle": "SocialRank: A ranking model for web image retrieval in web 2.0", "abstract": "In this paper, we proposed an image ranking model called SocialRank for Web image search engine, which leverages rich metadata and structures of virtual communities in online photo-sharing sites in Web 2.0. In SocialRank, three levels of static rankings for sites, users and images are computed, respectively. To achieve combined image rankings in a site, a graph model is proposed to integrate social relations between users and images to reinforce their static rankings. To obtain the unified image rankings of different sites, image rankings are normalized and combined by considering duplicate images and static site rankings. The diversity of search results is also an important factor of image search engines. So we proposed an offline static diversity ranking of images. The experimental results show that the proposed SocialRank performs comparably with Google image search.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we proposed an image ranking model called SocialRank for Web image search engine, which leverages rich metadata and structures of virtual communities in online photo-sharing sites in Web 2.0. In SocialRank, three levels of static rankings for sites, users and images are computed, respectively. To achieve combined image rankings in a site, a graph model is proposed to integrate social relations between users and images to reinforce their static rankings. To obtain the unified image rankings of different sites, image rankings are normalized and combined by considering duplicate images and static site rankings. The diversity of search results is also an important factor of image search engines. So we proposed an offline static diversity ranking of images. The experimental results show that the proposed SocialRank performs comparably with Google image search.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we proposed an image ranking model called SocialRank for Web image search engine, which leverages rich metadata and structures of virtual communities in online photo-sharing sites in Web 2.0. In SocialRank, three levels of static rankings for sites, users and images are computed, respectively. To achieve combined image rankings in a site, a graph model is proposed to integrate social relations between users and images to reinforce their static rankings. To obtain the unified image rankings of different sites, image rankings are normalized and combined by considering duplicate images and static site rankings. The diversity of search results is also an important factor of image search engines. So we proposed an offline static diversity ranking of images. The experimental results show that the proposed SocialRank performs comparably with Google image search.", "fno": "04607384", "keywords": [ "Graph Theory", "Image Retrieval", "Internet", "Meta Data", "Search Engines", "Social Rank", "Image Ranking Model", "Search Engine", "Metadata", "Web 2 0", "Image Retrieval", "Graph Model", "Cultural Differences", "Search Engines", "Image Retrieval", "Communities", "Computational Modeling", "Visualization", "Image Edge Detection", "Static Rank", "Bipartite Graph", "Virtual Community", "Large Scale" ], "authors": [ { "affiliation": "MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of EEIS, University of Science and Technology of China, Hefei 230027, China", "fullName": "Xiaoguang Rui", "givenName": null, "surname": "Xiaoguang Rui", "__typename": "ArticleAuthorType" }, { "affiliation": "MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of EEIS, University of Science and Technology of China, Hefei 230027, China", "fullName": "Nenghai Yu", "givenName": null, "surname": "Nenghai Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "MOE-Microsoft Key Laboratory of Multimedia Computing and Communication, Department of EEIS, University of Science and Technology of China, Hefei 230027, China", "fullName": "Jimin Jia", "givenName": null, "surname": "Jimin Jia", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research Asia, 49 Zhichun Road, Beijing 100080, China", "fullName": "Mingjing Li", "givenName": null, "surname": "Mingjing Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-06-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "1945-7871", "isbn": "978-1-4244-2570-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04607383", "articleId": "12OmNzcxZr3", "__typename": "AdjacentArticleType" }, "next": { "fno": "04607385", "articleId": "12OmNCm7BDG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2010/4109/0/4109d902", "title": "Unsupervised Ensemble Ranking: Application to Large-Scale Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109d902/12OmNAT0mOC", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2011/0885/0/06051744", "title": "Compounded Face Image Retrieval Based on Vertical Web Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2011/06051744/12OmNApcuq8", "parentPublication": { "id": "proceedings/chinagrid/2011/0885/0", "title": "2011 Sixth Annual Chinagrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2003/1932/0/19320242", "title": "Web Image Retrieval Re-Ranking with Relevance Model", "doi": null, "abstractUrl": "/proceedings-article/wi/2003/19320242/12OmNqGA4ZL", "parentPublication": { "id": "proceedings/wi/2003/1932/0", "title": "Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssne/2011/4631/0/4631a103", "title": "Shopping Mall System with Image Retrieval Based on UML", "doi": null, "abstractUrl": "/proceedings-article/ssne/2011/4631a103/12OmNqGA5nC", "parentPublication": { "id": "proceedings/ssne/2011/4631/0", "title": "Software and Network Engineering, ACIS International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2018/4408/0/440801a369", "title": "Medical Image Retrieval Using Manifold Ranking with Relevance Feedback", "doi": null, "abstractUrl": "/proceedings-article/icsc/2018/440801a369/12OmNy2agTz", "parentPublication": { "id": "proceedings/icsc/2018/4408/0", "title": "2018 IEEE 12th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/umc/2008/3427/0/3427a083", "title": "A Web Image Retrieval Re-ranking Scheme with Cross-Modal Association Rules", "doi": null, "abstractUrl": "/proceedings-article/umc/2008/3427a083/12OmNyRxFqs", "parentPublication": { "id": "proceedings/umc/2008/3427/0", "title": "Ubiquitous Multimedia Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04760940", "title": "6. Image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04760940/12OmNybfr9g", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/3/01326581", "title": "Robust color image retrieval for the World Wide Web", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326581/12OmNzXnNCn", "parentPublication": { "id": "proceedings/icassp/2004/8484/3", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a440", "title": "TAD-RR: Tag-Annotation Based Demand Re-ranking Approach for Personalized Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a440/12OmNzmclll", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2004/04/k0408", "title": "Image Retrieval Using Multiple Evidence Ranking", "doi": null, "abstractUrl": "/journal/tk/2004/04/k0408/13rRUx0xPIY", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrF2DI7", "title": "2016 IEEE International Conference on Services Computing (SCC)", "acronym": "scc", "groupId": "1001209", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxveNJN", "doi": "10.1109/SCC.2016.92", "title": "RaaS - Ranking as a Service", "normalizedTitle": "RaaS - Ranking as a Service", "abstract": "Choice is a pervasive feature of social life that profoundly affects us. Ranking results can be used as a reference to help people make a correct choice. But there are two problems. One problem is that fixed ranking results instead of the ranking methods are provided to people by service providers as a reference when making choice at most time. For example, TIMES World University Rankings can be used as a reference when choosing a college. However, in the numerous factors that affect objects ranking, people have their own understanding on the effect of each factor on objects ranking. Using mobile phone-selection as a practical case, some people think performance of a mobile phone is more important, while others hold the view that appearance of a mobile phone is more attractive. What's more, there are many ranking methods proposed, such as The Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and expert marking. Using only one kind of ranking methods for object ranking may lead to over objective or subjective ranking results. Although various ranking algorithm are studied, very little is known about the detailed development and deployment of the ranking services. This paper proposes a comprehensive solution of Ranking as a Service (RaaS), with the manifold contributions: Firstly, we use combination weighting method in RaaS and it can overcome the defects of subjective and objective weighting methods. Secondly, we develop ranking service APIs that bring convenience to people when making choices. Thirdly, ranking service provides ranking results for people according to their own understanding on the effect of each factor on objects ranking. Fourthly, this paper is arguably the first one that proposes using Ranking as a Service. Finally, we evaluate and analyze the proposed strategies and technologies in accordance to the experimental results.", "abstracts": [ { "abstractType": "Regular", "content": "Choice is a pervasive feature of social life that profoundly affects us. Ranking results can be used as a reference to help people make a correct choice. But there are two problems. One problem is that fixed ranking results instead of the ranking methods are provided to people by service providers as a reference when making choice at most time. For example, TIMES World University Rankings can be used as a reference when choosing a college. However, in the numerous factors that affect objects ranking, people have their own understanding on the effect of each factor on objects ranking. Using mobile phone-selection as a practical case, some people think performance of a mobile phone is more important, while others hold the view that appearance of a mobile phone is more attractive. What's more, there are many ranking methods proposed, such as The Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and expert marking. Using only one kind of ranking methods for object ranking may lead to over objective or subjective ranking results. Although various ranking algorithm are studied, very little is known about the detailed development and deployment of the ranking services. This paper proposes a comprehensive solution of Ranking as a Service (RaaS), with the manifold contributions: Firstly, we use combination weighting method in RaaS and it can overcome the defects of subjective and objective weighting methods. Secondly, we develop ranking service APIs that bring convenience to people when making choices. Thirdly, ranking service provides ranking results for people according to their own understanding on the effect of each factor on objects ranking. Fourthly, this paper is arguably the first one that proposes using Ranking as a Service. Finally, we evaluate and analyze the proposed strategies and technologies in accordance to the experimental results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Choice is a pervasive feature of social life that profoundly affects us. Ranking results can be used as a reference to help people make a correct choice. But there are two problems. One problem is that fixed ranking results instead of the ranking methods are provided to people by service providers as a reference when making choice at most time. For example, TIMES World University Rankings can be used as a reference when choosing a college. However, in the numerous factors that affect objects ranking, people have their own understanding on the effect of each factor on objects ranking. Using mobile phone-selection as a practical case, some people think performance of a mobile phone is more important, while others hold the view that appearance of a mobile phone is more attractive. What's more, there are many ranking methods proposed, such as The Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and expert marking. Using only one kind of ranking methods for object ranking may lead to over objective or subjective ranking results. Although various ranking algorithm are studied, very little is known about the detailed development and deployment of the ranking services. This paper proposes a comprehensive solution of Ranking as a Service (RaaS), with the manifold contributions: Firstly, we use combination weighting method in RaaS and it can overcome the defects of subjective and objective weighting methods. Secondly, we develop ranking service APIs that bring convenience to people when making choices. Thirdly, ranking service provides ranking results for people according to their own understanding on the effect of each factor on objects ranking. Fourthly, this paper is arguably the first one that proposes using Ranking as a Service. Finally, we evaluate and analyze the proposed strategies and technologies in accordance to the experimental results.", "fno": "2628a665", "keywords": [ "Entropy", "Principal Component Analysis", "Companies", "Decision Making", "Software", "Mobile Handsets", "Resource Management", "Comprehensive Evaluation Method", "Ranking As A Service", "Combination Weighting Method", "TOPSIS" ], "authors": [ { "affiliation": null, "fullName": "Chen-Cheng Ye", "givenName": "Chen-Cheng", "surname": "Ye", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huan Chen", "givenName": "Huan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Liang-Jie Zhang", "givenName": "Liang-Jie", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xin-Nan Li", "givenName": "Xin-Nan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hong Liang", "givenName": "Hong", "surname": "Liang", "__typename": "ArticleAuthorType" } ], "idPrefix": "scc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "665-672", "year": "2016", "issn": null, "isbn": "978-1-5090-2628-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2628a657", "articleId": "12OmNCbCrKv", "__typename": "AdjacentArticleType" }, "next": { "fno": "2628a673", "articleId": "12OmNzuZUmU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/snpd/2016/2239/0/07515909", "title": "Ranking web service for high quality by applying improved Entropy-TOPSIS method", "doi": null, "abstractUrl": "/proceedings-article/snpd/2016/07515909/12OmNAWH9xn", "parentPublication": { "id": "proceedings/snpd/2016/2239/0", "title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2018/5815/0/581501a356", "title": "RaaS: Resilience as a Service", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2018/581501a356/12OmNApLGGT", "parentPublication": { "id": "proceedings/ccgrid/2018/5815/0", "title": "2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2017/5573/0/5573a198", "title": "QoS-Based Web Service Ranking Model Considering Decision Making Methods", "doi": null, "abstractUrl": "/proceedings-article/wccct/2017/5573a198/12OmNCbU3bp", "parentPublication": { "id": "proceedings/wccct/2017/5573/0", "title": "2017 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2010/4081/0/4081a151", "title": "Robot as a Service in Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/sose/2010/4081a151/12OmNwBT1l0", "parentPublication": { "id": "proceedings/sose/2010/4081/0", "title": "2010 Fifth IEEE International Symposium on Service Oriented System Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c381", "title": "A QoS Evaluation Algorithm for Web Service Ranking Based on Artificial Neural Network", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c381/12OmNyPQ4Hh", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2014/05/06587613", "title": "Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center", "doi": null, "abstractUrl": "/journal/nt/2014/05/06587613/13rRUIJcWtR", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/12/07118213", "title": "Unsupervised Ranking of Multi-Attribute Objects Based on Principal Curves", "doi": null, "abstractUrl": "/journal/tk/2015/12/07118213/13rRUNvyali", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a974", "title": "Hybrid Robot-as-a-Service (RaaS) Platform (Using MQTT and CoAP)", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a974/1ehBFzkmCHe", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dfhmc/2020/1518/0/151800a189", "title": "A Study of M&A Performance Based on Enterprise Capability Measurement Model: Taking Shanghai RAAS Serial M&A in 2014 as an Example", "doi": null, "abstractUrl": "/proceedings-article/dfhmc/2020/151800a189/1tcjXquKI3C", "parentPublication": { "id": "proceedings/dfhmc/2020/1518/0", "title": "2020 16th Dahe Fortune China Forum and Chinese High-educational Management Annual Academic Conference (DFHMC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2021/1683/0/168300a001", "title": "Regulation-as-a-Service: Model Checking for Decision-Making Behaviors in Price-Sensitive Service Systems", "doi": null, "abstractUrl": "/proceedings-article/scc/2021/168300a001/1yymAmQ4Wju", "parentPublication": { "id": "proceedings/scc/2021/1683/0", "title": "2021 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmtWAT", "doi": "10.1109/IV.2009.59", "title": "GAIA Map: A Tool for Visual Ranking Analysis in Spatial Multicriteria Problems", "normalizedTitle": "GAIA Map: A Tool for Visual Ranking Analysis in Spatial Multicriteria Problems", "abstract": "Spatial multicriteria decision problems are decision problems where one needs to take multiple conflicting criteria as well as geographical knowledge into account. In such a context, exploratory spatial analysis is known to provide tools to visualize as much data as possible on maps but does not integrate multicriteria aspects. Also, none of the tools provided by multicriteria analysis were initially destined to be used in a geographical context.In this paper, we propose an application of the PROMETHEE and GAIA ranking methods to Geographical Information Systems (GIS). The aim is to help decision makers obtain rankings of geographical entities and understand why such rankings have been obtained. To do that, we make use of the visual approach of the GAIA method and adapt it to display the results on geographical maps. This approach is then extended to cover several weaknesses of the adaptation. Finally, it is applied to a study of the region of Brussels as well as an evaluation of the Human Development Index (HDI) in Europe.", "abstracts": [ { "abstractType": "Regular", "content": "Spatial multicriteria decision problems are decision problems where one needs to take multiple conflicting criteria as well as geographical knowledge into account. In such a context, exploratory spatial analysis is known to provide tools to visualize as much data as possible on maps but does not integrate multicriteria aspects. Also, none of the tools provided by multicriteria analysis were initially destined to be used in a geographical context.In this paper, we propose an application of the PROMETHEE and GAIA ranking methods to Geographical Information Systems (GIS). The aim is to help decision makers obtain rankings of geographical entities and understand why such rankings have been obtained. To do that, we make use of the visual approach of the GAIA method and adapt it to display the results on geographical maps. This approach is then extended to cover several weaknesses of the adaptation. Finally, it is applied to a study of the region of Brussels as well as an evaluation of the Human Development Index (HDI) in Europe.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spatial multicriteria decision problems are decision problems where one needs to take multiple conflicting criteria as well as geographical knowledge into account. In such a context, exploratory spatial analysis is known to provide tools to visualize as much data as possible on maps but does not integrate multicriteria aspects. Also, none of the tools provided by multicriteria analysis were initially destined to be used in a geographical context.In this paper, we propose an application of the PROMETHEE and GAIA ranking methods to Geographical Information Systems (GIS). The aim is to help decision makers obtain rankings of geographical entities and understand why such rankings have been obtained. To do that, we make use of the visual approach of the GAIA method and adapt it to display the results on geographical maps. This approach is then extended to cover several weaknesses of the adaptation. Finally, it is applied to a study of the region of Brussels as well as an evaluation of the Human Development Index (HDI) in Europe.", "fno": "3733a393", "keywords": [ "Cartography", "Data Visualisation", "Decision Making", "Geographic Information Systems", "Visual Ranking Analysis", "Spatial Multicriteria Decision Problems", "Geographical Knowledge", "Data Visualization", "PROMETHEE Ranking Methods", "GAIA Ranking Methods", "Geographical Information Systems", "Geographical Entities Rankings", "Geographical Maps", "Human Development Index", "Europe", "Geographic Information Systems", "Information Analysis", "Data Visualization", "Information Systems", "Knowledge Engineering", "Humans", "Europe", "Computer Displays", "Data Analysis", "Sorting", "Multicriteria Decision Aiding", "MCDA", "Ranking", "PROMETHEE", "GAIA", "Geographical Information Systems", "GIS", "Visual Multicriteria Decision Making" ], "authors": [ { "affiliation": "Dept. of Comput. & Decision Eng. (CoDE), Univ. Libre de Bruxelles, Brussels, Belgium", "fullName": "Karim Lidouh", "givenName": "Karim", "surname": "Lidouh", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. & Decision Eng. (CoDE), Univ. Libre de Bruxelles, Brussels, Belgium", "fullName": "Yves De Smet", "givenName": "Yves", "surname": "De Smet", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. & Decision Eng. (CoDE), Univ. Libre de Bruxelles, Brussels, Belgium", "fullName": "Esteban Zimányi", "givenName": "Esteban", "surname": "Zimányi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "393-402", "year": "2009", "issn": "1550-6037", "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a274", "articleId": "12OmNx3q72n", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a283", "articleId": "12OmNBqMDvY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aiccsa/2013/0792/0/06616469", "title": "Approach to integration SOLAP tools and multicriteria analysis for spatial decision support", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2013/06616469/12OmNB0nWby", "parentPublication": { "id": "proceedings/aiccsa/2013/0792/0", "title": "2013 ACS International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1995/7126/0/71260234", "title": "A fuzzy characterization process for interactive multicriteria decision making", "doi": null, "abstractUrl": "/proceedings-article/isuma/1995/71260234/12OmNCctf6D", "parentPublication": { "id": "proceedings/isuma/1995/7126/0", "title": "Uncertainty Modeling and Analysis, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/6/3735f242", "title": "Fuzzy Multicriteria Analysis for Selecting Information Systems Projects", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735f242/12OmNvkYxbO", "parentPublication": { "id": "proceedings/fskd/2009/3735/6", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2013/0792/0/06616464", "title": "Integration approach of multicriteria analysis to OLAP systems: Multidimensional model", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2013/06616464/12OmNvoFjSZ", "parentPublication": { "id": "proceedings/aiccsa/2013/0792/0", "title": "2013 ACS International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a247", "title": "New GAIA Visualization Methods", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a247/12OmNyRPgT8", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1997/7734/3/7734030320", "title": "Organizational experiences with multicriteria decision support systems : problems and issues", "doi": null, "abstractUrl": "/proceedings-article/hicss/1997/7734030320/12OmNzUgder", "parentPublication": { "id": "proceedings/hicss/1997/7734/3", "title": "30th Hawaii International Conference on System Sciences (HICSS) Volume 3: Information System Track-Organizational Systems and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2009/3876/1/3876a015", "title": "Multicriteria Ranking Using a New Distance between Alternatives", "doi": null, "abstractUrl": "/proceedings-article/iciii/2009/3876a015/12OmNzvQI5Y", "parentPublication": { "id": "proceedings/iciii/2009/3876/1", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2018/02/mcs2018020038", "title": "Information Aggregation of Hesitant Fuzzy Interval Sets for Multicriteria Decision-Making", "doi": null, "abstractUrl": "/magazine/cs/2018/02/mcs2018020038/13rRUwInv08", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010101", "title": "Automatic Metro Map Layout Using Multicriteria Optimization", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010101/13rRUx0xPIA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a797", "title": "AHPSortll-GAIA: A Sorting Method in Model Engineering to Sort Cities According to the Risk of Sustainable", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a797/1tV9hoE7SWk", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAZx8TO", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "acronym": "aici", "groupId": "1003069", "volume": "3", "displayVolume": "3", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNrIrPg4", "doi": "10.1109/AICI.2009.253", "title": "Feature Extraction Methods for Fault Classification of Rolling Element Bearing Based on Nonlinear Dimensionality Reduction and SVMs", "normalizedTitle": "Feature Extraction Methods for Fault Classification of Rolling Element Bearing Based on Nonlinear Dimensionality Reduction and SVMs", "abstract": "Feature extraction is of great importance in condition monitoring and fault diagnosis of rolling machinery. Nonlinear Dimensionality Reduction (NDR) theories brought a new idea for recognizing and predicting the underlying nonlinear behavior. In this paper, we propose a NDR based feature extraction method for fault classification of rolling element bearing. Original feature spaces are constructed by time- and frequency-domain feature selection method, NDR based feature exaction scheme is proposed to acquire the lowdimensional embeddings from feature space, which provide a more truthful low-dimensional representation compared to the linear DR methods. In order to systematically and quantitatively investigate the performance of NDR method, we compare the three nonlinear DR methods: Isometric Mapping(Isomap), Locally Linear Embedding (LLE), and Local Tangent Space Alignment(LTSA) with the intent of determining a reduced subspace representation in which the fault classes of rolling element bearing are more easily discriminable. Evaluation of the classification performance is done by Support Vector Machine (SVM), a supervised classifiers. Additionally, with optimal neighborhood size, binary code combinations based on NDR embedded results are given for fault recognition. Experiments on 6 fault data sets are used for fault and severity classification. Quantitative evaluation results suggest that NDR methods are superior in identifying potential novel classes within the data.", "abstracts": [ { "abstractType": "Regular", "content": "Feature extraction is of great importance in condition monitoring and fault diagnosis of rolling machinery. Nonlinear Dimensionality Reduction (NDR) theories brought a new idea for recognizing and predicting the underlying nonlinear behavior. In this paper, we propose a NDR based feature extraction method for fault classification of rolling element bearing. Original feature spaces are constructed by time- and frequency-domain feature selection method, NDR based feature exaction scheme is proposed to acquire the lowdimensional embeddings from feature space, which provide a more truthful low-dimensional representation compared to the linear DR methods. In order to systematically and quantitatively investigate the performance of NDR method, we compare the three nonlinear DR methods: Isometric Mapping(Isomap), Locally Linear Embedding (LLE), and Local Tangent Space Alignment(LTSA) with the intent of determining a reduced subspace representation in which the fault classes of rolling element bearing are more easily discriminable. Evaluation of the classification performance is done by Support Vector Machine (SVM), a supervised classifiers. Additionally, with optimal neighborhood size, binary code combinations based on NDR embedded results are given for fault recognition. Experiments on 6 fault data sets are used for fault and severity classification. Quantitative evaluation results suggest that NDR methods are superior in identifying potential novel classes within the data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Feature extraction is of great importance in condition monitoring and fault diagnosis of rolling machinery. Nonlinear Dimensionality Reduction (NDR) theories brought a new idea for recognizing and predicting the underlying nonlinear behavior. In this paper, we propose a NDR based feature extraction method for fault classification of rolling element bearing. Original feature spaces are constructed by time- and frequency-domain feature selection method, NDR based feature exaction scheme is proposed to acquire the lowdimensional embeddings from feature space, which provide a more truthful low-dimensional representation compared to the linear DR methods. In order to systematically and quantitatively investigate the performance of NDR method, we compare the three nonlinear DR methods: Isometric Mapping(Isomap), Locally Linear Embedding (LLE), and Local Tangent Space Alignment(LTSA) with the intent of determining a reduced subspace representation in which the fault classes of rolling element bearing are more easily discriminable. Evaluation of the classification performance is done by Support Vector Machine (SVM), a supervised classifiers. Additionally, with optimal neighborhood size, binary code combinations based on NDR embedded results are given for fault recognition. Experiments on 6 fault data sets are used for fault and severity classification. Quantitative evaluation results suggest that NDR methods are superior in identifying potential novel classes within the data.", "fno": "3816c228", "keywords": [ "Feature Extraction", "Nonlinear Dimensionality Reduction", "Bearing", "Support Vector Machine" ], "authors": [ { "affiliation": null, "fullName": "Yizhuo Zhang", "givenName": "Yizhuo", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guanghua Xu", "givenName": "Guanghua", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lin Liang", "givenName": "Lin", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jing Wang", "givenName": "Jing", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "aici", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "228-234", "year": "2009", "issn": null, "isbn": "978-0-7695-3816-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3816c224", "articleId": "12OmNA14A3y", "__typename": "AdjacentArticleType" }, "next": { "fno": "3816c235", "articleId": "12OmNrAdsFx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2013/4932/0/4932a302", "title": "Application of Wavelet Packet and Hilbert Operator to the Fault Diagnosis of Rolling Bearing", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a302/12OmNAm4THk", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/2/3804b533", "title": "Fault Pattern Recognition of Bearing Based on Principal Components Analysis and Support Vector Machine", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804b533/12OmNBEYzMa", "parentPublication": { "id": "proceedings/icicta/2009/3804/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/2/4356b012", "title": "Application of Wavelet Packet Sample Entropy in the Forecast of Rolling Element Bearing Fault Trend", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356b012/12OmNC4eSD0", "parentPublication": { "id": "proceedings/cmsp/2011/4356/2", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/3/4077e132", "title": "Research on SVM Classification Performance in Rolling Bearing Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077e132/12OmNwCJOQZ", "parentPublication": { "id": "proceedings/icicta/2010/4077/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2010/3962/1/3962a620", "title": "Application of Genetic Algorithms and Possibility Theory in Rolling Bearing Compound Fault Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962a620/12OmNy50g3f", "parentPublication": { "id": "proceedings/icmtma/2010/3962/1", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/4/3941d386", "title": "A New Statistical Model for Rolling Element Bearing Fault Signals Based on Alpha-Stable Distribution", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941d386/12OmNypIYxO", "parentPublication": { "id": "proceedings/iccms/2010/3941/4", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/2/4296c198", "title": "Fault Diagnosis of Rolling Element Bearing Based on Vibration Frequency Analysis", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296c198/12OmNzICEJU", "parentPublication": { "id": "proceedings/icmtma/2011/4296/2", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/1/4647a024", "title": "Rolling Bearing Fault Diagnosis Based on the Hybrid Algorithm of Particle Swarm Optimization with Neighborhood Operator", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647a024/12OmNzhELhd", "parentPublication": { "id": "proceedings/iccsee/2012/4647/2", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2021/0764/0/076400a284", "title": "Research on Early Fault Diagnosis Method of Rolling Bearing", "doi": null, "abstractUrl": "/proceedings-article/ichci/2021/076400a284/1Bb0ShUBBYI", "parentPublication": { "id": "proceedings/ichci/2021/0764/0", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2022/6399/0/639900a879", "title": "Fault Identification of Rolling Bearing Based on Improved EMD-Kurtosis Criterion and DBN", "doi": null, "abstractUrl": "/proceedings-article/aiam/2022/639900a879/1LRlxsJIFnq", "parentPublication": { "id": "proceedings/aiam/2022/6399/0", "title": "2022 4th International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AjSCovc0wM", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AjSCILf16g", "doi": "10.1109/ICDMW53433.2021.00065", "title": "Random Projection Through the Lens of Data Complexity Indicators", "normalizedTitle": "Random Projection Through the Lens of Data Complexity Indicators", "abstract": "Random projection (RP) is a simple and efficient tool for dimensionality reduction and has been applied in many machine learning algorithms. Theoretical guarantees ensure that the method approximately preserves the pairwise Euclidean distances with high probability. However, worst-case theoretical bounds on the required target dimension of the projection are not sufficiently tight for direct practical use, so for a large data set most often much lower values are being used in practice. While theory also suggests that this may be due to the low complexity structure of the underlying data support, this structure is typically unknown in practice. Here we investigate the use of a previously proposed battery of data complexity indicators (DCIs) to gain insight into how random projection changes the data complexity for classification problems. Our experimental results show that complexity increases with compression, but in most cases we can project data onto fairly low dimensions while maintaining nearly the same level of data complexity as that of the original data. This may offer some guidance for the choice of the target dimension in practice, although it should be interpreted with caution.", "abstracts": [ { "abstractType": "Regular", "content": "Random projection (RP) is a simple and efficient tool for dimensionality reduction and has been applied in many machine learning algorithms. Theoretical guarantees ensure that the method approximately preserves the pairwise Euclidean distances with high probability. However, worst-case theoretical bounds on the required target dimension of the projection are not sufficiently tight for direct practical use, so for a large data set most often much lower values are being used in practice. While theory also suggests that this may be due to the low complexity structure of the underlying data support, this structure is typically unknown in practice. Here we investigate the use of a previously proposed battery of data complexity indicators (DCIs) to gain insight into how random projection changes the data complexity for classification problems. Our experimental results show that complexity increases with compression, but in most cases we can project data onto fairly low dimensions while maintaining nearly the same level of data complexity as that of the original data. This may offer some guidance for the choice of the target dimension in practice, although it should be interpreted with caution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Random projection (RP) is a simple and efficient tool for dimensionality reduction and has been applied in many machine learning algorithms. Theoretical guarantees ensure that the method approximately preserves the pairwise Euclidean distances with high probability. However, worst-case theoretical bounds on the required target dimension of the projection are not sufficiently tight for direct practical use, so for a large data set most often much lower values are being used in practice. While theory also suggests that this may be due to the low complexity structure of the underlying data support, this structure is typically unknown in practice. Here we investigate the use of a previously proposed battery of data complexity indicators (DCIs) to gain insight into how random projection changes the data complexity for classification problems. Our experimental results show that complexity increases with compression, but in most cases we can project data onto fairly low dimensions while maintaining nearly the same level of data complexity as that of the original data. This may offer some guidance for the choice of the target dimension in practice, although it should be interpreted with caution.", "fno": "242700a482", "keywords": [ "Dimensionality Reduction", "Visualization", "Sensitivity", "Machine Learning Algorithms", "Conferences", "Complexity Theory", "Batteries", "Random Projection", "Data Complexity", "Classification" ], "authors": [ { "affiliation": "University of Birmingham,School of Computer Science", "fullName": "Yamonporn Thummanusarn", "givenName": "Yamonporn", "surname": "Thummanusarn", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Birmingham,School of Computer Science", "fullName": "Ata Kabán", "givenName": "Ata", "surname": "Kabán", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "482-489", "year": "2021", "issn": null, "isbn": "978-1-6654-2427-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "242700a474", "articleId": "1AjSMJNiPdK", "__typename": "AdjacentArticleType" }, "next": { "fno": "242700a490", "articleId": "1AjSQXDpwly", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asia/2009/3910/0/3910a202", "title": "Appearance-Based Subspace Projection Techniques for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/asia/2009/3910a202/12OmNANTAyx", "parentPublication": { "id": "proceedings/asia/2009/3910/0", "title": "2009 International Asia Symposium on Intelligent Interaction and Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109a380", "title": "Dimensionality Reduction for Distributed Vision Systems Using Random Projection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a380/12OmNC8uRhA", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/1/4356a165", "title": "Two-Dimensional Neighborhood Structure Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356a165/12OmNC8uRko", "parentPublication": { "id": "proceedings/cmsp/2011/4356/1", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a415", "title": "Efficient Face Recognition Research Based on Random Projection Dimension Reduction", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a415/12OmNx57HNy", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2006/12/k1600", "title": "Multi-Output Regularized Feature Projection", "doi": null, "abstractUrl": "/journal/tk/2006/12/k1600/13rRUILtJzN", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/09/08693535", "title": "Feature Selective Projection with Low-Rank Embedding and Dual Laplacian Regularization", "doi": null, "abstractUrl": "/journal/tk/2020/09/08693535/19iRbOuhl9C", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100a502", "title": "Accordion AutoEncoders (A<sup>2</sup>E) for Generative Classification with Low Complexity Network", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a502/1EpLcl5Z82s", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991474", "title": "Dual-layer Semantic Propagation for Semi-supervised Projection", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991474/1JwQ3Kpyld6", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150784", "title": "Persistent Homology-based Projection Pursuit", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150784/1lPH7mqchRC", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c014", "title": "A Sparse Local Preserving Projection Method Based On Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c014/1tzz5KXRenK", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3nxhSOIEM", "doi": "10.1109/CVPR42600.2020.00956", "title": "Attack to Explain Deep Representation", "normalizedTitle": "Attack to Explain Deep Representation", "abstract": "Deep visual models are susceptible to extremely low magnitude perturbations to input images. Though carefully crafted, the perturbation patterns generally appear noisy, yet they are able to perform controlled manipulation of model predictions. This observation is used to argue that deep representation is misaligned with human perception. This paper counter-argues and proposes the first attack on deep learning that aims at explaining the learned representation instead of fooling it. By extending the input domain of the manipulative signal and employing a model faithful channelling, we iteratively accumulate adversarial perturbations for a deep model. The accumulated signal gradually manifests itself as a collection of visually salient features of the target label (in model fooling), casting adversarial perturbations as primitive features of the target label. Our attack provides the first demonstration of systematically computing perturbations for adversarially non-robust classifiers that comprise salient visual features of objects. We leverage the model explaining character of our algorithm to perform image generation, inpainting and interactive image manipulation by attacking adversarially robust classifiers. The visually appealing results across these applications demonstrate the utility of our attack (and perturbations in general) beyond model fooling.", "abstracts": [ { "abstractType": "Regular", "content": "Deep visual models are susceptible to extremely low magnitude perturbations to input images. Though carefully crafted, the perturbation patterns generally appear noisy, yet they are able to perform controlled manipulation of model predictions. This observation is used to argue that deep representation is misaligned with human perception. This paper counter-argues and proposes the first attack on deep learning that aims at explaining the learned representation instead of fooling it. By extending the input domain of the manipulative signal and employing a model faithful channelling, we iteratively accumulate adversarial perturbations for a deep model. The accumulated signal gradually manifests itself as a collection of visually salient features of the target label (in model fooling), casting adversarial perturbations as primitive features of the target label. Our attack provides the first demonstration of systematically computing perturbations for adversarially non-robust classifiers that comprise salient visual features of objects. We leverage the model explaining character of our algorithm to perform image generation, inpainting and interactive image manipulation by attacking adversarially robust classifiers. The visually appealing results across these applications demonstrate the utility of our attack (and perturbations in general) beyond model fooling.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep visual models are susceptible to extremely low magnitude perturbations to input images. Though carefully crafted, the perturbation patterns generally appear noisy, yet they are able to perform controlled manipulation of model predictions. This observation is used to argue that deep representation is misaligned with human perception. This paper counter-argues and proposes the first attack on deep learning that aims at explaining the learned representation instead of fooling it. By extending the input domain of the manipulative signal and employing a model faithful channelling, we iteratively accumulate adversarial perturbations for a deep model. The accumulated signal gradually manifests itself as a collection of visually salient features of the target label (in model fooling), casting adversarial perturbations as primitive features of the target label. Our attack provides the first demonstration of systematically computing perturbations for adversarially non-robust classifiers that comprise salient visual features of objects. We leverage the model explaining character of our algorithm to perform image generation, inpainting and interactive image manipulation by attacking adversarially robust classifiers. The visually appealing results across these applications demonstrate the utility of our attack (and perturbations in general) beyond model fooling.", "fno": "716800j540", "keywords": [ "Image Classification", "Image Representation", "Learning Artificial Intelligence", "Nonrobust Classifiers", "Image Generation", "Interactive Image Manipulation", "Adversarially Robust Classifiers", "Deep Visual Models", "Perturbation Patterns", "Model Predictions", "Human Perception", "Deep Learning", "Learned Representation", "Manipulative Signal", "Adversarial Perturbations", "Deep Model", "Visually Salient Features", "Deep Representation", "Perturbation Methods", "Computational Modeling", "Visualization", "Robustness", "Image Generation", "Machine Learning", "Task Analysis" ], "authors": [ { "affiliation": "Computer Science and Software Engineering, The University of Western Australia", "fullName": "Mohammad A. A. K. Jalwana", "givenName": "Mohammad A. A. K.", "surname": "Jalwana", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Software Engineering, The University of Western Australia", "fullName": "Naveed Akhtar", "givenName": "Naveed", "surname": "Akhtar", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Software Engineering, The University of Western Australia", "fullName": "Mohammed Bennamoun", "givenName": "Mohammed", "surname": "Bennamoun", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Software Engineering, The University of Western Australia", "fullName": "Ajmal Mian", "givenName": "Ajmal", "surname": "Mian", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "9540-9549", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800j530", "articleId": "1m3ocKWi8HC", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800j550", "articleId": "1m3nGBrHeJG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/2019/10/08423654", "title": "Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations", "doi": null, "abstractUrl": "/journal/tp/2019/10/08423654/13rRUygT7at", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e422", "title": "Generative Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e422/17D45VTRoCR", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200h648", "title": "Just One Moment: Structural Vulnerability of Deep Action Recognition against One Frame Attack", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200h648/1BmINddyGcg", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicas/2021/2810/0/281000a401", "title": "Universal Watermark Attack in Image Classification", "doi": null, "abstractUrl": "/proceedings-article/icicas/2021/281000a401/1ByfbkfjyKY", "parentPublication": { "id": "proceedings/icicas/2021/2810/0", "title": "2021 International Conference on Intelligent Computing, Automation and Systems (ICICAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e861", "title": "The LogBarrier Adversarial Attack: Making Effective Use of Decision Boundary Information", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e861/1hQqlmqw53i", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c740", "title": "Adversarial Defense via Learning to Generate Diverse Attacks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c740/1hVlBDDUtJm", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800m2892", "title": "Robust Superpixel-Guided Attentional Adversarial Attack", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800m2892/1m3ocr4WerK", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09442299", "title": "Attack to Fool and Explain Deep Networks", "doi": null, "abstractUrl": "/journal/tp/2022/10/09442299/1tV4pZQGzZu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413263", "title": "Adversarially Training for Audio Classifiers", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413263/1tmjyf3fjk4", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900g705", "title": "IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900g705/1yeKgUumYg0", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKisN", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONmZ", "doi": "10.1109/BELIV.2018.8634108", "title": "Heuristic Evaluation in Visualization: An Empirical Study : Position paper", "normalizedTitle": "Heuristic Evaluation in Visualization: An Empirical Study : Position paper", "abstract": "Heuristic evaluation is a usability inspection method that has been adapted to evaluate visualization applications through the development of specific sets of heuristics. This paper presents an empirical study meant to assess the capacity of the method to anticipate the usability issues noticed by users when using a visualization application. The potential usability problems identified by 20 evaluators were compared with the issues found for the same application by 46 users through a usability test, as well as with the fixes recommended by the experimenters observing those users during the test. Results suggest that using some heuristics may have elicited potential problems that none of the users noticed while using the application; on the other hand, users encountered unpredicted usability issues.", "abstracts": [ { "abstractType": "Regular", "content": "Heuristic evaluation is a usability inspection method that has been adapted to evaluate visualization applications through the development of specific sets of heuristics. This paper presents an empirical study meant to assess the capacity of the method to anticipate the usability issues noticed by users when using a visualization application. The potential usability problems identified by 20 evaluators were compared with the issues found for the same application by 46 users through a usability test, as well as with the fixes recommended by the experimenters observing those users during the test. Results suggest that using some heuristics may have elicited potential problems that none of the users noticed while using the application; on the other hand, users encountered unpredicted usability issues.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heuristic evaluation is a usability inspection method that has been adapted to evaluate visualization applications through the development of specific sets of heuristics. This paper presents an empirical study meant to assess the capacity of the method to anticipate the usability issues noticed by users when using a visualization application. The potential usability problems identified by 20 evaluators were compared with the issues found for the same application by 46 users through a usability test, as well as with the fixes recommended by the experimenters observing those users during the test. Results suggest that using some heuristics may have elicited potential problems that none of the users noticed while using the application; on the other hand, users encountered unpredicted usability issues.", "fno": "08634108", "keywords": [ "Data Visualisation", "Heuristic Evaluation", "Usability Inspection Method", "Visualization Application", "Usability Test", "Usability", "Visualization", "Inspection", "Systematics", "Data Visualization", "Tools", "Visualization Evaluation", "Heuristic Evaluation", "Heuristics Sets", "Empirical Study" ], "authors": [ { "affiliation": "DETI/IEETA University of Aveiro, Portugal", "fullName": "Beatriz Sousa Santos", "givenName": "Beatriz Sousa", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": "DETI/IEETA University of Aveiro, Portugal", "fullName": "Samuel Silva", "givenName": "Samuel", "surname": "Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "DETI/IEETA University of Aveiro, Portugal", "fullName": "Paulo Dias", "givenName": "Paulo", "surname": "Dias", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "&#xa;78&#xa;-&#xa;85&#xa;", "year": "2018", "issn": null, "isbn": "978-1-5386-6884-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08634267", "articleId": "17D45XDIXRH", "__typename": "AdjacentArticleType" }, "next": { "fno": "08634297", "articleId": "17D45VTRozT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infvis/2005/9464/0/01532147", "title": "Adapting the cognitive walkthrough method to assess the usability of a knowledge domain visualization", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532147/12OmNBW0vDQ", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbes/2012/4868/0/4868a081", "title": "Using an Empirical Study to Evaluate the Feasibility of a New Usability Inspection Technique for Paper Based Prototypes of Web Applications", "doi": null, "abstractUrl": "/proceedings-article/sbes/2012/4868a081/12OmNrMHOoE", "parentPublication": { "id": "proceedings/sbes/2012/4868/0", "title": "2012 26th Brazilian Symposium on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asea/2014/7760/0/07023887", "title": "Current Trends in Usability Evaluation Methods: A Systematic Review", "doi": null, "abstractUrl": "/proceedings-article/asea/2014/07023887/12OmNvSbBpx", "parentPublication": { "id": "proceedings/asea/2014/7760/0", "title": "2014 7th International Conference on Advanced Software Engineering and Its Applications (ASEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a152", "title": "Heuristic Evaluation of a t-Commerce InfoVis Prototype", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a152/12OmNxRWId2", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532147", "title": "Adapting the cognitive walkthrough method to assess the usability of a knowledge domain visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532147/12OmNxWui8a", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2011/4689/0/06363395", "title": "Defining and Validating Virtual Worlds Usability Heuristics", "doi": null, "abstractUrl": "/proceedings-article/sccc/2011/06363395/12OmNxXUhOF", "parentPublication": { "id": "proceedings/sccc/2011/4689/0", "title": "2011 30th International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900026", "title": "Adapting the Cognitive Walkthrough Method to Assess the Usability of a Knowledge Domain Visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900026/12OmNxYL5aD", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2014/4435/0/4435a529", "title": "Identifying and Evaluating Usability Heuristics Applicable to Clinical Laboratory Systems", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a529/12OmNzwZ6ns", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2018/6884/0/08634297", "title": "Reflecting on the Evaluation of Visualization Authoring Systems : Position Paper", "doi": null, "abstractUrl": "/proceedings-article/beliv/2018/08634297/17D45VTRozT", "parentPublication": { "id": "proceedings/beliv/2018/6884/0", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506505", "title": "The GenderMag Recorder's Assistant", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506505/17D45WLdYR0", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qRNrlo577W", "title": "2020 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qRO3t1TelW", "doi": "10.1109/VIS47514.2020.00048", "title": "Why Shouldn&#x2019;t All Charts Be Scatter Plots? Beyond Precision-Driven Visualizations", "normalizedTitle": "Why Shouldn’t All Charts Be Scatter Plots? Beyond Precision-Driven Visualizations", "abstract": "A central tenet of information visualization research and practice is the notion of visual variable effectiveness, or the perceptual precision at which values are decoded given visual channels of encoding. Formative work from Cleveland &amp; McGill has shown that position along a common axis is the most effective visual variable for comparing individual values. One natural conclusion is that any chart that is not a dot plot or scatterplot is deficient and should be avoided. In this paper we refute a caricature of this \"scatterplots only\" argument as a way to call for new perspectives on how information visualization is researched, taught, and evaluated.", "abstracts": [ { "abstractType": "Regular", "content": "A central tenet of information visualization research and practice is the notion of visual variable effectiveness, or the perceptual precision at which values are decoded given visual channels of encoding. Formative work from Cleveland &amp; McGill has shown that position along a common axis is the most effective visual variable for comparing individual values. One natural conclusion is that any chart that is not a dot plot or scatterplot is deficient and should be avoided. In this paper we refute a caricature of this \"scatterplots only\" argument as a way to call for new perspectives on how information visualization is researched, taught, and evaluated.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A central tenet of information visualization research and practice is the notion of visual variable effectiveness, or the perceptual precision at which values are decoded given visual channels of encoding. Formative work from Cleveland & McGill has shown that position along a common axis is the most effective visual variable for comparing individual values. One natural conclusion is that any chart that is not a dot plot or scatterplot is deficient and should be avoided. In this paper we refute a caricature of this \"scatterplots only\" argument as a way to call for new perspectives on how information visualization is researched, taught, and evaluated.", "fno": "801400a206", "keywords": [ "Data Visualisation", "Cleveland Amp Mc Gill", "Formative Work", "Perceptual Precision", "Visual Variable Effectiveness", "Information Visualization Research", "Central Tenet", "Precision Driven Visualizations", "Scatter Plots", "Chart", "Scatterplots", "Dot Plot", "Visualization", "Pediatrics", "Data Visualization", "Tools", "Lead", "Sparks", "Guidelines", "Human Centered Computing", "Visualization", "Visualization Theory", "Concepts And Paradigms" ], "authors": [ { "affiliation": "New York University", "fullName": "Enrico Bertini", "givenName": "Enrico", "surname": "Bertini", "__typename": "ArticleAuthorType" }, { "affiliation": "Tableau Research", "fullName": "Michael Correll", "givenName": "Michael", "surname": "Correll", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Steven Franconeri", "givenName": "Steven", "surname": "Franconeri", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "206-210", "year": "2020", "issn": null, "isbn": "978-1-7281-8014-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "801400a201", "articleId": "1qRO6BS61ZC", "__typename": "AdjacentArticleType" }, "next": { "fno": "801400a211", "articleId": "1qROcw0EDja", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2008/3075/0/04439069", "title": "A Collaborative Dimensions Framework: Understanding the Mediating Role of Conceptual Visualizations in Collaborative Knowledge Work", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439069/12OmNwGIcAL", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2017/0852/0/0852a099", "title": "Stem & Leaf Plots Extended for Text Visualizations", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2017/0852a099/12OmNy5zspa", "parentPublication": { "id": "proceedings/cgiv/2017/0852/0", "title": "2017 14th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004025", "title": "Design Considerations for Drill-down Charts", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004025/12OmNzSQdqN", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1129", "title": "Scented Widgets: Improving Navigation Cues with Embedded Visualizations", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1129/13rRUEgarnG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876021", "title": "Four Experiments on the Perception of Bar Charts", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876021/13rRUNvgz9Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09978718", "title": "The Risks of Ranking: Revisiting Graphical Perception to Model Individual Differences in Visualization Performance", "doi": null, "abstractUrl": "/journal/tg/5555/01/09978718/1IXUnbRdUEE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552938", "title": "Communicating Visualizations without Visuals: Investigation of Visualization Alternative Text for People with Visual Impairments", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552938/1xjQYJDwaxa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNrw", "title": "2013 46th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgrD1q", "doi": "10.1109/HICSS.2013.96", "title": "Aperture: An Open Web 2.0 Visualization Framework", "normalizedTitle": "Aperture: An Open Web 2.0 Visualization Framework", "abstract": "Aperture is an open, adaptable and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer based approach to visualization assembly, and a data mapping API that simplifies the process of adaptable transformation of data and analytic results into visual forms and properties. This common visual layer and data mapping API, combined with core elements such as contextually derivable color palettes, layout and symbol ontology services is designed to enable highly creative and expressive visual analytics, rapidly and with less effort. This paper introduces the Aperture framework, describing key features of the programming API and reference implementation, presents example use cases, and proposes an approach for measuring technical performance metrics for software development, and operational performance metrics for visualization support of analysis and decision making.", "abstracts": [ { "abstractType": "Regular", "content": "Aperture is an open, adaptable and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer based approach to visualization assembly, and a data mapping API that simplifies the process of adaptable transformation of data and analytic results into visual forms and properties. This common visual layer and data mapping API, combined with core elements such as contextually derivable color palettes, layout and symbol ontology services is designed to enable highly creative and expressive visual analytics, rapidly and with less effort. This paper introduces the Aperture framework, describing key features of the programming API and reference implementation, presents example use cases, and proposes an approach for measuring technical performance metrics for software development, and operational performance metrics for visualization support of analysis and decision making.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aperture is an open, adaptable and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer based approach to visualization assembly, and a data mapping API that simplifies the process of adaptable transformation of data and analytic results into visual forms and properties. This common visual layer and data mapping API, combined with core elements such as contextually derivable color palettes, layout and symbol ontology services is designed to enable highly creative and expressive visual analytics, rapidly and with less effort. This paper introduces the Aperture framework, describing key features of the programming API and reference implementation, presents example use cases, and proposes an approach for measuring technical performance metrics for software development, and operational performance metrics for visualization support of analysis and decision making.", "fno": "4892b485", "keywords": [ "Data Visualization", "Apertures", "Visual Analytics", "Assembly", "Image Color Analysis", "Toolkit", "Visual Analytics", "Visualization", "Big Data", "Agile", "Framework" ], "authors": [ { "affiliation": null, "fullName": "David Jonker", "givenName": "David", "surname": "Jonker", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Scott Langevin", "givenName": "Scott", "surname": "Langevin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Neil Bozowsky", "givenName": "Neil", "surname": "Bozowsky", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "William Wright", "givenName": "William", "surname": "Wright", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2013-01-01T00:00:00", "pubType": "proceedings", "pages": "1485-1494", "year": "2013", "issn": "1530-1605", "isbn": "978-1-4673-5933-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4892b484", "articleId": "12OmNqN6R1X", "__typename": "AdjacentArticleType" }, "next": { "fno": "4892b495", "articleId": "12OmNqJ8tq4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sibgrapi-t/2012/4830/0/4830a021", "title": "Cloud and Mobile Web-Based Graphics and Visualization", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi-t/2012/4830a021/12OmNvAiSbv", "parentPublication": { "id": "proceedings/sibgrapi-t/2012/4830/0", "title": "2012 25th SIBGRAPI Conference on Graphics, Patterns and Images Tutorials", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571352", "title": "Highlighting in Information Visualization: A Survey", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571352/12OmNxVDuPS", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400507", "title": "Agile visual analytics for banking cyber “big data”", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400507/12OmNyPQ4EL", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a352", "title": "Visualization for Visual Analytics: Micro-visualization, Abstraction, and Physical Appeal", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a352/12OmNySG3Oy", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060943", "title": "How Information Visualization Novices Construct Visualizations", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05963660", "title": "Attention and Visual Memory in Visualization and Computer Graphics", "doi": null, "abstractUrl": "/journal/tg/2012/07/05963660/13rRUxBa5xf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/06/08617767", "title": "Contextual Visualization", "doi": null, "abstractUrl": "/magazine/cg/2018/06/08617767/17D45WgziNA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/06/09984051", "title": "Embracing Disciplinary Diversity in Visualization", "doi": null, "abstractUrl": "/magazine/cg/2022/06/09984051/1J4y85Z3jLW", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/06/08891842", "title": "Visualization 4.0", "doi": null, "abstractUrl": "/magazine/cg/2019/06/08891842/1eIcaQ4a1Bm", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a160", "title": "Visualization Resources: A Starting Point", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a160/1y4oFWz20Ra", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yQB4Fmf7vq", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yQB55Tsbpm", "doi": "10.1109/TREX53765.2021.00010", "title": "Time Series Model Attribution Visualizations as Explanations", "normalizedTitle": "Time Series Model Attribution Visualizations as Explanations", "abstract": "Attributions are a common local explanation technique for deep learning models on single samples as they are easily extractable and demonstrate the relevance of input values. In many cases, heatmaps visualize such attributions for samples, for instance, on images. However, heatmaps are not always the ideal visualization to explain certain model decisions for other data types. In this review, we focus on attribution visualizations for time series. We collect attribution heatmap visualizations and some alternatives, discuss the advantages as well as disadvantages and give a short position towards future opportunities for attributions and explanations for time series.", "abstracts": [ { "abstractType": "Regular", "content": "Attributions are a common local explanation technique for deep learning models on single samples as they are easily extractable and demonstrate the relevance of input values. In many cases, heatmaps visualize such attributions for samples, for instance, on images. However, heatmaps are not always the ideal visualization to explain certain model decisions for other data types. In this review, we focus on attribution visualizations for time series. We collect attribution heatmap visualizations and some alternatives, discuss the advantages as well as disadvantages and give a short position towards future opportunities for attributions and explanations for time series.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Attributions are a common local explanation technique for deep learning models on single samples as they are easily extractable and demonstrate the relevance of input values. In many cases, heatmaps visualize such attributions for samples, for instance, on images. However, heatmaps are not always the ideal visualization to explain certain model decisions for other data types. In this review, we focus on attribution visualizations for time series. We collect attribution heatmap visualizations and some alternatives, discuss the advantages as well as disadvantages and give a short position towards future opportunities for attributions and explanations for time series.", "fno": "181700a027", "keywords": [ "Data Visualisation", "Learning Artificial Intelligence", "Time Series", "Attributions", "Time Series Model Attribution Visualizations", "Common Local Explanation Technique", "Deep Learning Models", "Single Samples", "Heatmaps", "Ideal Visualization", "Model Decisions", "Heatmap Visualizations", "Human Computer Interaction", "Heating Systems", "Deep Learning", "Visual Analytics", "Conferences", "Computational Modeling", "Time Series Analysis", "Human Centered Computing", "Human Computer Interaction HCI", "Computing Methodologies", "Artificial Intelligence" ], "authors": [ { "affiliation": "University of Konstanz", "fullName": "Udo Schlegel", "givenName": "Udo", "surname": "Schlegel", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz", "fullName": "Daniel A. Keim", "givenName": "Daniel A.", "surname": "Keim", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "27-31", "year": "2021", "issn": null, "isbn": "978-1-6654-1817-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yQB529PvgI", "name": "ptrex202118170-09619898s1-mm_181700a027.zip", "size": "1.56 MB", "location": "https://www.computer.org/csdl/api/v1/extra/ptrex202118170-09619898s1-mm_181700a027.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "181700a020", "articleId": "1yQB6xGERwI", "__typename": "AdjacentArticleType" }, "next": { "fno": "181700a032", "articleId": "1yQB5vqv5Pa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2010/7846/0/05571363", "title": "Extracting Events from Spatial Time Series", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571363/12OmNA1mbcE", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875974", "title": "A Five-Level Design Framework for Bicluster Visualizations", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875974/13rRUB6Sq0A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060943", "title": "How Information Visualization Novices Construct Visualizations", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040082", "title": "Design and Effects of Personal Visualizations", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040082/13rRUwh80Nt", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454489", "title": "Patterns and Pace: Quantifying Diverse Exploration Behavior with Visualizations on the Web", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454489/17D45W1Oa3s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600k0213", "title": "Towards Better Understanding Attribution Methods", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600k0213/1H0MQTqm3wA", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a085", "title": "Let&#x0027;s Get Personal: Exploring the Design of Personalized Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a085/1J6hbZrS4dG", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600b421", "title": "A Protocol for Evaluating Model Interpretation Methods from Visual Explanations", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600b421/1KxV0afShhu", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i978", "title": "SCOUT: Self-Aware Discriminant Counterfactual Explanations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i978/1m3nF9S7iRq", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552869", "title": "EVis: Visually Analyzing Environmentally Driven Events", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552869/1xicagyRxao", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzw8jhb", "title": "2017 IEEE 7th International Advance Computing Conference (IACC)", "acronym": "iacc", "groupId": "1002691", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvStcH6", "doi": "10.1109/IACC.2017.0112", "title": "Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring", "normalizedTitle": "Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring", "abstract": "Diabetes is one of the life threatening diseases in the world. Nowadays, diabetes patients are increasing due to improper monitoring of blood glucose level. The diabetes infected patients have to check the amount of glucose level present in the body using invasive method. By using this method, they have to take a drop of blood from the body and check the amount of glucose level, by which they can inject the required amount of insulin into the body. To overcome the difficulties caused by invasive method, in this prototype we are using non-invasive methodology. The main objective of this work is to design a portable non-invasive blood glucose level monitoring device using near infrared sensors. The device includes Infrared LED, Photodiode and ATMEGA328 Microcontroller. Besides being able to detect glucose concentration in blood, the device also displays the required insulin dose based on glucose level corresponding to the Body Mass Index (BMI) of the user.", "abstracts": [ { "abstractType": "Regular", "content": "Diabetes is one of the life threatening diseases in the world. Nowadays, diabetes patients are increasing due to improper monitoring of blood glucose level. The diabetes infected patients have to check the amount of glucose level present in the body using invasive method. By using this method, they have to take a drop of blood from the body and check the amount of glucose level, by which they can inject the required amount of insulin into the body. To overcome the difficulties caused by invasive method, in this prototype we are using non-invasive methodology. The main objective of this work is to design a portable non-invasive blood glucose level monitoring device using near infrared sensors. The device includes Infrared LED, Photodiode and ATMEGA328 Microcontroller. Besides being able to detect glucose concentration in blood, the device also displays the required insulin dose based on glucose level corresponding to the Body Mass Index (BMI) of the user.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diabetes is one of the life threatening diseases in the world. Nowadays, diabetes patients are increasing due to improper monitoring of blood glucose level. The diabetes infected patients have to check the amount of glucose level present in the body using invasive method. By using this method, they have to take a drop of blood from the body and check the amount of glucose level, by which they can inject the required amount of insulin into the body. To overcome the difficulties caused by invasive method, in this prototype we are using non-invasive methodology. The main objective of this work is to design a portable non-invasive blood glucose level monitoring device using near infrared sensors. The device includes Infrared LED, Photodiode and ATMEGA328 Microcontroller. Besides being able to detect glucose concentration in blood, the device also displays the required insulin dose based on glucose level corresponding to the Body Mass Index (BMI) of the user.", "fno": "07976846", "keywords": [ "Biomedical Measurement", "Blood", "Chemical Sensors", "Diseases", "Infrared Detectors", "Intelligent Sensors", "Light Emitting Diodes", "Microcontrollers", "Patient Monitoring", "Photodiodes", "Sugar", "Smart Insulin Device", "Life Threatening Diseases", "Diabetes Infected Patients", "Noninvasive Methodology", "Portable Noninvasive Blood Glucose Level Monitoring Device", "Near Infrared Sensors", "Infrared LED", "Photodiode", "ATMEGA 328 Microcontroller", "Glucose Concentration", "Insulin Dose", "Body Mass Index", "Sugar", "Insulin", "Blood", "Photodiodes", "Diabetes", "Microcontrollers", "Pins", "Diabetes", "Blood Glucose", "Non Invasive" ], "authors": [ { "affiliation": null, "fullName": "P. Sampath Reddy", "givenName": "P. Sampath", "surname": "Reddy", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Jyostna", "givenName": "K.", "surname": "Jyostna", "__typename": "ArticleAuthorType" } ], "idPrefix": "iacc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-01-01T00:00:00", "pubType": "proceedings", "pages": "516-519", "year": "2017", "issn": "2473-3571", "isbn": "978-1-5090-1560-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07976845", "articleId": "12OmNqGRGdg", "__typename": "AdjacentArticleType" }, "next": { "fno": "07976847", "articleId": "12OmNwlZu2j", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2017/3050/0/08217809", "title": "Fraise: A framework for predicting peak postprandial blood glucose using personalized data-driven modeling", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217809/12OmNrGb2fL", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764596", "title": "Continuous blood glucose monitoring: a review and preview", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764596/12OmNwekjGl", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a274", "title": "A Non-Invasive Blood Insulin and Glucose Monitoring System Based on Near-Infrared Spectroscopy with Remote Data Logging", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a274/12OmNwpGgJP", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726720", "title": "Voltage intensity based non-invasive blood glucose monitoring", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726720/12OmNzA6GOG", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipsn/2017/4890/0/07944794", "title": "PhD Forum Abstract: Non-intrusive Blood Glucose Monitor by Multi-task Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ipsn/2017/07944794/12OmNznkJRZ", "parentPublication": { "id": "proceedings/ipsn/2017/4890/0", "title": "2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982271", "title": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982271/17D45VTRoBU", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328395", "title": "A Practical Cyber-Physical System for the Self-Capture of the Effect of Exercise on Blood Glucose Levels", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328395/17D45WYQJ7P", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a015", "title": "A Mobile Platform for Model-Based Monitoring of Glucose-Insulin Homeostasis for Diabetics", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a015/181W9pIePIt", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ises/2019/4655/0/465500a111", "title": "An IoMT Based Non-Invasive Precise Blood Glucose Measurement System", "doi": null, "abstractUrl": "/proceedings-article/ises/2019/465500a111/1hHMv0CGUKI", "parentPublication": { "id": "proceedings/ises/2019/4655/0", "title": "2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvlsi/2020/5775/0/577500a598", "title": "iGLU: Non-Invasive Device for Continuous Glucose Measurement with IoMT Framework", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2020/577500a598/1m1iX0sfoHK", "parentPublication": { "id": "proceedings/isvlsi/2020/5775/0", "title": "2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOibU", "title": "2011 IEEE International Conference on Automation Science and Engineering", "acronym": "case", "groupId": "1001095", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwENzQ", "doi": "10.1109/CASE.2011.6042485", "title": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "normalizedTitle": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "abstract": "This paper presents the application of a recurrent multilayer perceptron neural network for modeling blood glucose dynamics in Type 1 Diabetes Mellitus (T1DM). Training is performed based on an extended Kalman filtering (EKF) learning algorithm. Then, the EKF performance is compared with the well-known Levenberg-Marquardt (LM) learning algorithm. The goal is to derive a dynamical mathematical model for T1DM considering the response of a patient to meal and subcutaneous insulin infusion. Thus, the main contribution of this work is to propose a modeling methodology for blood glucose dynamics based in Artificial Neural Networks (ANN). Experimental data, given by a continuous glucose monitoring system, are utilized for identification purposes and for applicability trials of the proposed scheme in T1DM therapy.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents the application of a recurrent multilayer perceptron neural network for modeling blood glucose dynamics in Type 1 Diabetes Mellitus (T1DM). Training is performed based on an extended Kalman filtering (EKF) learning algorithm. Then, the EKF performance is compared with the well-known Levenberg-Marquardt (LM) learning algorithm. The goal is to derive a dynamical mathematical model for T1DM considering the response of a patient to meal and subcutaneous insulin infusion. Thus, the main contribution of this work is to propose a modeling methodology for blood glucose dynamics based in Artificial Neural Networks (ANN). Experimental data, given by a continuous glucose monitoring system, are utilized for identification purposes and for applicability trials of the proposed scheme in T1DM therapy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents the application of a recurrent multilayer perceptron neural network for modeling blood glucose dynamics in Type 1 Diabetes Mellitus (T1DM). Training is performed based on an extended Kalman filtering (EKF) learning algorithm. Then, the EKF performance is compared with the well-known Levenberg-Marquardt (LM) learning algorithm. The goal is to derive a dynamical mathematical model for T1DM considering the response of a patient to meal and subcutaneous insulin infusion. Thus, the main contribution of this work is to propose a modeling methodology for blood glucose dynamics based in Artificial Neural Networks (ANN). Experimental data, given by a continuous glucose monitoring system, are utilized for identification purposes and for applicability trials of the proposed scheme in T1DM therapy.", "fno": "06042485", "keywords": [ "Diseases", "Haemodynamics", "Health Care", "Kalman Filters", "Learning Artificial Intelligence", "Multilayer Perceptrons", "Recurrent Neural Nets", "Neural Modeling", "Blood Glucose Level", "Type 1 Diabetes Mellitus Patients", "Recurrent Multilayer Perceptron Neural Network", "Blood Glucose Dynamic Modeling", "Extended Kalman Filtering Learning Algorithm", "Levenberg Marquardt Learning Algorithm", "Dynamical Mathematical Model", "Artificial Neural Networks", "T 1 DM Therapy", "Continuous Glucose Monitoring System", "Subcutaneous Insulin Infusion", "Sugar", "Insulin", "Blood", "Training", "Mathematical Model", "Approximation Algorithms", "Artificial Neural Networks", "Recurrent Neural Networks", "Multilayer Perceptron", "Kalman Filtering", "Prediction", "Type 1 Diabetes Mellitus" ], "authors": [ { "affiliation": "Division de Electronica y Computacion, CUCEI, Universidad de Guadalajara, Av. Revolución 1500, Guadalajara, Jal., México", "fullName": "E. Ruiz-Velázquez", "givenName": "E.", "surname": "Ruiz-Velázquez", "__typename": "ArticleAuthorType" }, { "affiliation": "Division de Electronica y Computacion, CUCEI, Universidad de Guadalajara, Av. Revolución 1500, Guadalajara, Jal., México", "fullName": "A. Y. Alanis", "givenName": "A. Y.", "surname": "Alanis", "__typename": "ArticleAuthorType" }, { "affiliation": "Division de Matematicas Aplicadas, IPICYT, Camino a la Presa San Jose 2055, Col. Lomas 4a seccion c.p. 78216 San Luis Potosi, S. L. P., México", "fullName": "R. Femat", "givenName": "R.", "surname": "Femat", "__typename": "ArticleAuthorType" }, { "affiliation": "Facultad de Ingeniería Mecánica y Eléctrica, UANL, Pedro de Alba S/N, San Nicolás de los Garza, N.L., México", "fullName": "G. Quiroz", "givenName": "G.", "surname": "Quiroz", "__typename": "ArticleAuthorType" } ], "idPrefix": "case", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "696-701", "year": "2011", "issn": "2161-8070", "isbn": "978-1-4577-1732-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06042484", "articleId": "12OmNs5rl8G", "__typename": "AdjacentArticleType" }, "next": { "fno": "06042486", "articleId": "12OmNzaQoj2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iacc/2017/1560/0/07976846", "title": "Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring", "doi": null, "abstractUrl": "/proceedings-article/iacc/2017/07976846/12OmNvStcH6", "parentPublication": { "id": "proceedings/iacc/2017/1560/0", "title": "2017 IEEE 7th International Advance Computing Conference (IACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2006/0360/1/04022817", "title": "An Approach to Control the Blood Glucose Level in Diabetic Patients", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2006/04022817/12OmNvlg8kt", "parentPublication": { "id": "proceedings/aqtr/2006/0360/1", "title": "2006 IEEE-TTTC International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375709", "title": "PID Control based on BP Neural Network for the Regulation of Blood Glucose Level in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375709/12OmNwHQB6f", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764596", "title": "Continuous blood glucose monitoring: a review and preview", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764596/12OmNwekjGl", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2010/6724/2/05520795", "title": "Predictive control of blood glucose in diabetes mellitus patients", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2010/05520795/12OmNwpoFzO", "parentPublication": { "id": "proceedings/aqtr/2010/6724/2", "title": "International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2013/3163/0/06701604", "title": "Personalized glucose-insulin metabolism model based on self-organizing maps for patients with Type 1 Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/bibe/2013/06701604/12OmNxR5UN2", "parentPublication": { "id": "proceedings/bibe/2013/3163/0", "title": "2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a546", "title": "Simulation Studies on the Dynamics of Insulin-glucose in Diabetic Mellitus Patients", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a546/12OmNyO8tUO", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2016/0943/0/0943a199", "title": "Enhanced Wearable Medical Systems for Effective Blood Glucose Control", "doi": null, "abstractUrl": "/proceedings-article/chase/2016/0943a199/12OmNzd7bk8", "parentPublication": { "id": "proceedings/chase/2016/0943/0", "title": "2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982271", "title": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982271/17D45VTRoBU", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a142", "title": "Development of an Undergraduate Control Engineering Design Project: PID Control of Blood Glucose Levels in Type 1 Diabetes Mellitus Subjects", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a142/17D45Xh13rx", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgoo8LiPZe", "title": "Computer and Electrical Engineering, International Conference on", "acronym": "iccee", "groupId": "1002575", "volume": "1", "displayVolume": "1", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyKJiCC", "doi": "10.1109/ICCEE.2009.89", "title": "Simulation Studies Based on the Pharmacokinetic Model of Diabetes Mellitus", "normalizedTitle": "Simulation Studies Based on the Pharmacokinetic Model of Diabetes Mellitus", "abstract": "This study illustrates that the overall model based on pharmacokinetic diagrams of insulin and glucose is able to follow the dynamics of glucose in Type I diabetes. Both models are capable of predicting the blood glucose and insulin levels, total glucose uptake and the renal glucose excretion. A four-daily dose and continuous injection of insulin therapy has been used for suppressing and normalizing the change of blood glucose. The results show that continuous injection has more precise control than the traditional regime of daily injections.", "abstracts": [ { "abstractType": "Regular", "content": "This study illustrates that the overall model based on pharmacokinetic diagrams of insulin and glucose is able to follow the dynamics of glucose in Type I diabetes. Both models are capable of predicting the blood glucose and insulin levels, total glucose uptake and the renal glucose excretion. A four-daily dose and continuous injection of insulin therapy has been used for suppressing and normalizing the change of blood glucose. The results show that continuous injection has more precise control than the traditional regime of daily injections.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study illustrates that the overall model based on pharmacokinetic diagrams of insulin and glucose is able to follow the dynamics of glucose in Type I diabetes. Both models are capable of predicting the blood glucose and insulin levels, total glucose uptake and the renal glucose excretion. A four-daily dose and continuous injection of insulin therapy has been used for suppressing and normalizing the change of blood glucose. The results show that continuous injection has more precise control than the traditional regime of daily injections.", "fno": "3925a224", "keywords": [ "Insulin", "Diabetes", "Modeling", "Pharmacokinetic Model" ], "authors": [ { "affiliation": null, "fullName": "Hadis Karimipour", "givenName": "Hadis", "surname": "Karimipour", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heydar Toossian Shandiz", "givenName": "Heydar Toossian", "surname": "Shandiz", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccee", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "224-228", "year": "2009", "issn": null, "isbn": "978-0-7695-3925-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3925a219", "articleId": "12OmNB0Fxhe", "__typename": "AdjacentArticleType" }, "next": { "fno": "3925a229", "articleId": "12OmNx8Ouoz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/gcis/2009/3571/2/3571b170", "title": "Fuzzy-PID Control for the Regulation of Blood Glucose in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571b170/12OmNBUS78x", "parentPublication": { "id": "proceedings/gcis/2009/3571/2", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2000/0862/0/08620231", "title": "Simulation Studies on the Dynamics of Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/bibe/2000/08620231/12OmNBkP3Ev", "parentPublication": { "id": "proceedings/bibe/2000/0862/0", "title": "13th IEEE International Conference on BioInformatics and BioEngineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2015/8673/0/8673a055", "title": "Hybrid Model for Early Diabetes Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2015/8673a055/12OmNqEATaP", "parentPublication": { "id": "proceedings/mcsi/2015/8673/0", "title": "2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764780", "title": "Video diabetes: a teaching tool for children with insulin-dependent diabetes", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764780/12OmNrAdsyQ", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042485", "title": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042485/12OmNxwENzQ", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a546", "title": "Simulation Studies on the Dynamics of Insulin-glucose in Diabetic Mellitus Patients", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a546/12OmNyO8tUO", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2017/05/mit2017050050", "title": "Managing Diabetes Therapy through Datastream Mining", "doi": null, "abstractUrl": "/magazine/it/2017/05/mit2017050050/13rRUytnsT2", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982271", "title": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982271/17D45VTRoBU", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a015", "title": "A Mobile Platform for Model-Based Monitoring of Glucose-Insulin Homeostasis for Diabetics", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a015/181W9pIePIt", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2019/3918/0/391800a661", "title": "Effects of Hypoglycemic Anti-Deafness Prescription on Insulin Resistance in Patients with Diabetes Mellitus and Deafness", "doi": null, "abstractUrl": "/proceedings-article/itme/2019/391800a661/1gRxkZ6FwLC", "parentPublication": { "id": "proceedings/itme/2019/3918/0", "title": "2019 10th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOibU", "title": "2011 IEEE International Conference on Automation Science and Engineering", "acronym": "case", "groupId": "1001095", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyeECGt", "doi": "10.1109/CASE.2011.6042510", "title": "Preclinically assessed optimal control of postprandial glucose excursions for type 1 patients with diabetes", "normalizedTitle": "Preclinically assessed optimal control of postprandial glucose excursions for type 1 patients with diabetes", "abstract": "Type 1 Patients with Diabetes (Type 1 PwDs) have to frequently adjust their insulin dosage to keep their Blood Glucose concentration (BG) within normal bounds. Meal intakes represent the most important disturbance that has to be accounted for. Its effect differs for every individual as well as for every meal. These specificities are automatically taken into account in the approach proposed in this paper. Model parameters are identified for every couple (Patient, Meal) of interest and optimal control is applied to generate individualized meal specific insulin profiles. The method does not require the use of a continuous BG meter, the profiles being infused in an open-loop manner. Results from a preliminary clinical study are presented. The concept is shown to be effective, despite limitations due to the aggressive execution chosen. Improvements are proposed and a possible practical implementation is described.", "abstracts": [ { "abstractType": "Regular", "content": "Type 1 Patients with Diabetes (Type 1 PwDs) have to frequently adjust their insulin dosage to keep their Blood Glucose concentration (BG) within normal bounds. Meal intakes represent the most important disturbance that has to be accounted for. Its effect differs for every individual as well as for every meal. These specificities are automatically taken into account in the approach proposed in this paper. Model parameters are identified for every couple (Patient, Meal) of interest and optimal control is applied to generate individualized meal specific insulin profiles. The method does not require the use of a continuous BG meter, the profiles being infused in an open-loop manner. Results from a preliminary clinical study are presented. The concept is shown to be effective, despite limitations due to the aggressive execution chosen. Improvements are proposed and a possible practical implementation is described.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Type 1 Patients with Diabetes (Type 1 PwDs) have to frequently adjust their insulin dosage to keep their Blood Glucose concentration (BG) within normal bounds. Meal intakes represent the most important disturbance that has to be accounted for. Its effect differs for every individual as well as for every meal. These specificities are automatically taken into account in the approach proposed in this paper. Model parameters are identified for every couple (Patient, Meal) of interest and optimal control is applied to generate individualized meal specific insulin profiles. The method does not require the use of a continuous BG meter, the profiles being infused in an open-loop manner. Results from a preliminary clinical study are presented. The concept is shown to be effective, despite limitations due to the aggressive execution chosen. Improvements are proposed and a possible practical implementation is described.", "fno": "06042510", "keywords": [ "Diseases", "Medical Control Systems", "Optimal Control", "Sugar", "Preclinically Assessed Optimal Control", "Postprandial Glucose Excursions", "Type 1 Patients With Diabetes", "Blood Glucose Concentration", "Insulin Profiles", "Continuous BG Meter", "Insulin", "Sugar", "Blood", "Computational Modeling", "Optimization", "Predictive Models", "History" ], "authors": [ { "affiliation": "Lucerne University of Applied Sciences and Arts, CH 6048 Horw, Switzerland", "fullName": "Thierry Prud'homme", "givenName": "Thierry", "surname": "Prud'homme", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineering, Ecole Polytechnique Fédérale de Lausanne (EPFL), CH 1015, Switzerland", "fullName": "Alain Bock", "givenName": "Alain", "surname": "Bock", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineering, Ecole Polytechnique Fédérale de Lausanne (EPFL), CH 1015, Switzerland", "fullName": "Grégory François", "givenName": "Grégory", "surname": "François", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratoire d'Automatique, Ecole Polytechnique Fédérale de Lausanne (EPFL), CH 1015, Switzerland", "fullName": "Denis Gillet", "givenName": "Denis", "surname": "Gillet", "__typename": "ArticleAuthorType" } ], "idPrefix": "case", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "702-707", "year": "2011", "issn": "2161-8070", "isbn": "978-1-4577-1732-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06042509", "articleId": "12OmNBr4eO3", "__typename": "AdjacentArticleType" }, "next": { "fno": "06042511", "articleId": "12OmNzd7bFJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scamc/1983/0503/0/00764780", "title": "Video diabetes: a teaching tool for children with insulin-dependent diabetes", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764780/12OmNrAdsyQ", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2018/6312/0/631201a025", "title": "DAMON: A Data Authenticity Monitoring System for Diabetes Management", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2018/631201a025/12OmNrIrPeR", "parentPublication": { "id": "proceedings/iotdi/2018/6312/0", "title": "2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2006/0360/1/04022817", "title": "An Approach to Control the Blood Glucose Level in Diabetic Patients", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2006/04022817/12OmNvlg8kt", "parentPublication": { "id": "proceedings/aqtr/2006/0360/1", "title": "2006 IEEE-TTTC International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375709", "title": "PID Control based on BP Neural Network for the Regulation of Blood Glucose Level in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375709/12OmNwHQB6f", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a213", "title": "A Data-Driven Behavior Modeling and Analysis Framework for Diabetic Patients on Insulin Pumps", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a213/12OmNx6g6mS", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042485", "title": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042485/12OmNxwENzQ", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a546", "title": "Simulation Studies on the Dynamics of Insulin-glucose in Diabetic Mellitus Patients", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a546/12OmNyO8tUO", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2018/6950/0/08538682", "title": "An evolutionary methodology for estimating blood glucose levels from interstitial glucose measurements and their derivatives", "doi": null, "abstractUrl": "/proceedings-article/iscc/2018/08538682/17D45WrVgdH", "parentPublication": { "id": "proceedings/iscc/2018/6950/0", "title": "2018 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a142", "title": "Development of an Undergraduate Control Engineering Design Project: PID Control of Blood Glucose Levels in Type 1 Diabetes Mellitus Subjects", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a142/17D45Xh13rx", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/05/08667648", "title": "Sparse Reconstruction of Glucose Fluxes Using Continuous Glucose Monitors", "doi": null, "abstractUrl": "/journal/tb/2020/05/08667648/18q6asO3xHa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBDyAbd", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "acronym": "cbms", "groupId": "1000153", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUgdjR", "doi": "10.1109/CBMS.2018.00038", "title": "Simplifying the Digitization of Clinical Protocols for Diabetes Management", "normalizedTitle": "Simplifying the Digitization of Clinical Protocols for Diabetes Management", "abstract": "Hyperglycemia is a health condition characterized by abnormally high blood glucose, typically caused by a deficient usage, or lack, of insulin. Due to the metabolic derangements of this clinical condition, its regular monitoring, as well the administration of the most effective treatment, are major concerns for healthcare institutions. In this paper, we present a computational solution to build diabetes management protocols, which helps health professionals providing an adequate treatment for each hyperglycemic inpatient.", "abstracts": [ { "abstractType": "Regular", "content": "Hyperglycemia is a health condition characterized by abnormally high blood glucose, typically caused by a deficient usage, or lack, of insulin. Due to the metabolic derangements of this clinical condition, its regular monitoring, as well the administration of the most effective treatment, are major concerns for healthcare institutions. In this paper, we present a computational solution to build diabetes management protocols, which helps health professionals providing an adequate treatment for each hyperglycemic inpatient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Hyperglycemia is a health condition characterized by abnormally high blood glucose, typically caused by a deficient usage, or lack, of insulin. Due to the metabolic derangements of this clinical condition, its regular monitoring, as well the administration of the most effective treatment, are major concerns for healthcare institutions. In this paper, we present a computational solution to build diabetes management protocols, which helps health professionals providing an adequate treatment for each hyperglycemic inpatient.", "fno": "606001a176", "keywords": [ "Biochemistry", "Blood", "Diseases", "Health Care", "Medical Computing", "Medical Information Systems", "Patient Monitoring", "Patient Treatment", "Sugar", "Clinical Protocol Digitization", "Regular Monitoring", "Clinical Condition", "Metabolic Derangements", "Insulin", "Deficient Usage", "Abnormally High Blood Glucose", "Health Condition", "Hyperglycemia", "Adequate Treatment", "Health Professionals", "Diabetes Management Protocols", "Computational Solution", "Healthcare Institutions", "Effective Treatment", "Protocols", "Insulin", "Sugar", "Blood", "Web Services", "Diabetes", "Glycemic Control", "Hyperglycemia", "Hypoglycemia", "Insulin Dosing Framework", "Inpatient Glycemic Management" ], "authors": [ { "affiliation": null, "fullName": "João Rafael Almeida", "givenName": "João Rafael", "surname": "Almeida", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Joana Guimarães", "givenName": "Joana", "surname": "Guimarães", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "José Luís Oliveira", "givenName": "José Luís", "surname": "Oliveira", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "176-181", "year": "2018", "issn": "2372-9198", "isbn": "978-1-5386-6060-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "606001a170", "articleId": "12OmNvmXJ4m", "__typename": "AdjacentArticleType" }, "next": { "fno": "606001a182", "articleId": "12OmNApu5y7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iotdi/2018/6312/0/631201a025", "title": "DAMON: A Data Authenticity Monitoring System for Diabetes Management", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2018/631201a025/12OmNrIrPeR", "parentPublication": { "id": "proceedings/iotdi/2018/6312/0", "title": "2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a140", "title": "Effect of JiangTangFangLong Prescription on Hs-CRP, ABI in Patients with Different Syndrome Types of Diabetes Deafness", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a140/12OmNvxKu0B", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375709", "title": "PID Control based on BP Neural Network for the Regulation of Blood Glucose Level in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375709/12OmNwHQB6f", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2012/4976/0/06395013", "title": "A Mobile Framework for Personalized Diabetes Telecare", "doi": null, "abstractUrl": "/proceedings-article/taai/2012/06395013/12OmNxYtu7S", "parentPublication": { "id": "proceedings/taai/2012/4976/0", "title": "2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2014/2877/0/2877a231", "title": "A Predictive Approach for Diabetes Mellitus Disease through Data Mining Technologies", "doi": null, "abstractUrl": "/proceedings-article/wccct/2014/2877a231/12OmNzcxZbi", "parentPublication": { "id": "proceedings/wccct/2014/2877/0", "title": "2014 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440834", "title": "IDMVis: Temporal Event Sequence Visualization for Type 1 Diabetes Treatment Decision Support", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440834/17D45WHONrE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328395", "title": "A Practical Cyber-Physical System for the Self-Capture of the Effect of Exercise on Blood Glucose Levels", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328395/17D45WYQJ7P", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a098", "title": "Clinical Observation of Traditional Chinese Baduanjin Qigong (Eight Trigrams Boxing) in the Treatment of Patients with Type 2 Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a098/17D45WgziT7", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a249", "title": "Software Architecture for Health Care Supportive Home Systems to Assist Patients with Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a249/1cdNZPJsplS", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2020/6042/0/09178710", "title": "Risk analysis of a closed-loop artificial pancreas based on generalized predictive control", "doi": null, "abstractUrl": "/proceedings-article/iccia/2020/09178710/1mDu2pSMUg0", "parentPublication": { "id": "proceedings/iccia/2020/6042/0", "title": "2020 5th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipP", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "acronym": "cse-euc", "groupId": "1002115", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRoBU", "doi": "10.1109/CSE-EUC-DCABES.2016.209", "title": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "normalizedTitle": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "abstract": "Diabetes is one of the important issues in the medical field in which blood glucose level control and regulation needs to permanent care. Determination of appropriate rate of insulin injection in order to blood glucose level stabilization to a normal level is vital for diabetics. In this paper, optimal plasma blood glucose tracking using subcutaneous insulin administration is investigated. Here one of the recent mathematical models is used for glucose-insulin regulation system which consists of delayed nonlinear differential equations and is one of the most comprehensive models in this field, known as Palumbo. In this paper for the first time, employing combination of the fuzzy logic controller optimized by genetic algorithm with Palumbo control method is used to regulate the blood glucose level in diabetic patients. One of the most important features of the proposed controller is the ability to set the parameters for patients using genetic algorithm. Finally, the simulation results of the fuzzy control method and fuzzy-genetic control method are compared with the control method based on Palumbo feedback linearization, which indicates the proper functioning of the proposed controller for tracking of desired blood glucose level at the lowest possible error.", "abstracts": [ { "abstractType": "Regular", "content": "Diabetes is one of the important issues in the medical field in which blood glucose level control and regulation needs to permanent care. Determination of appropriate rate of insulin injection in order to blood glucose level stabilization to a normal level is vital for diabetics. In this paper, optimal plasma blood glucose tracking using subcutaneous insulin administration is investigated. Here one of the recent mathematical models is used for glucose-insulin regulation system which consists of delayed nonlinear differential equations and is one of the most comprehensive models in this field, known as Palumbo. In this paper for the first time, employing combination of the fuzzy logic controller optimized by genetic algorithm with Palumbo control method is used to regulate the blood glucose level in diabetic patients. One of the most important features of the proposed controller is the ability to set the parameters for patients using genetic algorithm. Finally, the simulation results of the fuzzy control method and fuzzy-genetic control method are compared with the control method based on Palumbo feedback linearization, which indicates the proper functioning of the proposed controller for tracking of desired blood glucose level at the lowest possible error.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diabetes is one of the important issues in the medical field in which blood glucose level control and regulation needs to permanent care. Determination of appropriate rate of insulin injection in order to blood glucose level stabilization to a normal level is vital for diabetics. In this paper, optimal plasma blood glucose tracking using subcutaneous insulin administration is investigated. Here one of the recent mathematical models is used for glucose-insulin regulation system which consists of delayed nonlinear differential equations and is one of the most comprehensive models in this field, known as Palumbo. In this paper for the first time, employing combination of the fuzzy logic controller optimized by genetic algorithm with Palumbo control method is used to regulate the blood glucose level in diabetic patients. One of the most important features of the proposed controller is the ability to set the parameters for patients using genetic algorithm. Finally, the simulation results of the fuzzy control method and fuzzy-genetic control method are compared with the control method based on Palumbo feedback linearization, which indicates the proper functioning of the proposed controller for tracking of desired blood glucose level at the lowest possible error.", "fno": "07982271", "keywords": [ "Sugar", "Insulin", "Mathematical Model", "Blood", "Diabetes", "Genetic Algorithms", "Plasmas", "Fuzzy Logic", "Genetic Algorithm", "Glucose Insulin Regulation System", "Insulin Administration", "Palumbo Feedback Linearization" ], "authors": [ { "affiliation": null, "fullName": "Vahideh Heydari", "givenName": "Vahideh", "surname": "Heydari", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ali Karsaz", "givenName": "Ali", "surname": "Karsaz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Reza Heydari", "givenName": "Reza", "surname": "Heydari", "__typename": "ArticleAuthorType" } ], "idPrefix": "cse-euc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-08-01T00:00:00", "pubType": "proceedings", "pages": "361-366", "year": "2016", "issn": null, "isbn": "978-1-5090-3593-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07982270", "articleId": "17D45VObpQ1", "__typename": "AdjacentArticleType" }, "next": { "fno": "07982272", "articleId": "17D45X0yjSE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iacc/2017/1560/0/07976846", "title": "Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring", "doi": null, "abstractUrl": "/proceedings-article/iacc/2017/07976846/12OmNvStcH6", "parentPublication": { "id": "proceedings/iacc/2017/1560/0", "title": "2017 IEEE 7th International Advance Computing Conference (IACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470343", "title": "Effect of acupuncture on the blood glucose and insulin in the obese rats", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470343/12OmNvjgWNM", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2006/0360/1/04022817", "title": "An Approach to Control the Blood Glucose Level in Diabetic Patients", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2006/04022817/12OmNvlg8kt", "parentPublication": { "id": "proceedings/aqtr/2006/0360/1", "title": "2006 IEEE-TTTC International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375709", "title": "PID Control based on BP Neural Network for the Regulation of Blood Glucose Level in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375709/12OmNwHQB6f", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scamc/1983/0503/0/00764596", "title": "Continuous blood glucose monitoring: a review and preview", "doi": null, "abstractUrl": "/proceedings-article/scamc/1983/00764596/12OmNwekjGl", "parentPublication": { "id": "proceedings/scamc/1983/0503/0", "title": "1983 The Seventh Annual Symposium on Computer Applications in Medical Care", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a274", "title": "A Non-Invasive Blood Insulin and Glucose Monitoring System Based on Near-Infrared Spectroscopy with Remote Data Logging", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a274/12OmNwpGgJP", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042485", "title": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042485/12OmNxwENzQ", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2016/0943/0/0943a199", "title": "Enhanced Wearable Medical Systems for Effective Blood Glucose Control", "doi": null, "abstractUrl": "/proceedings-article/chase/2016/0943a199/12OmNzd7bk8", "parentPublication": { "id": "proceedings/chase/2016/0943/0", "title": "2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipsn/2017/4890/0/07944794", "title": "PhD Forum Abstract: Non-intrusive Blood Glucose Monitor by Multi-task Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ipsn/2017/07944794/12OmNznkJRZ", "parentPublication": { "id": "proceedings/ipsn/2017/4890/0", "title": "2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a142", "title": "Development of an Undergraduate Control Engineering Design Project: PID Control of Blood Glucose Levels in Type 1 Diabetes Mellitus Subjects", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a142/17D45Xh13rx", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirV", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "acronym": "itme", "groupId": "1002567", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xh13rx", "doi": "10.1109/ITME.2018.00041", "title": "Development of an Undergraduate Control Engineering Design Project: PID Control of Blood Glucose Levels in Type 1 Diabetes Mellitus Subjects", "normalizedTitle": "Development of an Undergraduate Control Engineering Design Project: PID Control of Blood Glucose Levels in Type 1 Diabetes Mellitus Subjects", "abstract": "Considerations in the development of a simulation-based (matlab/SIMULINK) undergraduate Control Engineering project are outlined. The main objective of the simulation-based project, which will run in parallel with the first part of the control course, is to further embed in the students, the basic concepts of modelling, feedback control, feedforward control and performance assessment of the controlled system. The ‘tuning’ of the parameters of a proportional, integral and derivative (PID) controller to obtain a desired controlled performance is an important element of the project. The specific application considered is the post-prandial control of blood glucose levels in type I diabetes Mellitus subjects using insulin. Worldwide numbers of diabetes sufferers are steadily increasing around the world putting a strain on both healthcare resources and costs. Choosing an application of global significance does create an increased level of student engagement to the Control Engineering project.", "abstracts": [ { "abstractType": "Regular", "content": "Considerations in the development of a simulation-based (matlab/SIMULINK) undergraduate Control Engineering project are outlined. The main objective of the simulation-based project, which will run in parallel with the first part of the control course, is to further embed in the students, the basic concepts of modelling, feedback control, feedforward control and performance assessment of the controlled system. The ‘tuning’ of the parameters of a proportional, integral and derivative (PID) controller to obtain a desired controlled performance is an important element of the project. The specific application considered is the post-prandial control of blood glucose levels in type I diabetes Mellitus subjects using insulin. Worldwide numbers of diabetes sufferers are steadily increasing around the world putting a strain on both healthcare resources and costs. Choosing an application of global significance does create an increased level of student engagement to the Control Engineering project.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Considerations in the development of a simulation-based (matlab/SIMULINK) undergraduate Control Engineering project are outlined. The main objective of the simulation-based project, which will run in parallel with the first part of the control course, is to further embed in the students, the basic concepts of modelling, feedback control, feedforward control and performance assessment of the controlled system. The ‘tuning’ of the parameters of a proportional, integral and derivative (PID) controller to obtain a desired controlled performance is an important element of the project. The specific application considered is the post-prandial control of blood glucose levels in type I diabetes Mellitus subjects using insulin. Worldwide numbers of diabetes sufferers are steadily increasing around the world putting a strain on both healthcare resources and costs. Choosing an application of global significance does create an increased level of student engagement to the Control Engineering project.", "fno": "774400a142", "keywords": [ "Insulin", "Diabetes", "Sugar", "Blood", "Tuning", "Control Engineering", "Feedback Control", "Biomedical Control Engineering", "Diabetes", "SIMULINK", "Undergraduate Project", "PID Controller Design", "Performance Assessment" ], "authors": [ { "affiliation": null, "fullName": "Richard Jones", "givenName": "Richard", "surname": "Jones", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ming Tham", "givenName": "Ming", "surname": "Tham", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexander James Barnes", "givenName": "Alexander James", "surname": "Barnes", "__typename": "ArticleAuthorType" } ], "idPrefix": "itme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "142-147", "year": "2018", "issn": null, "isbn": "978-1-5386-7744-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "774400a137", "articleId": "17D45WXIkFK", "__typename": "AdjacentArticleType" }, "next": { "fno": "774400a148", "articleId": "17D45WnnFVI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iacc/2017/1560/0/07976846", "title": "Development of Smart Insulin Device for Non Invasive Blood Glucose Level Monitoring", "doi": null, "abstractUrl": "/proceedings-article/iacc/2017/07976846/12OmNvStcH6", "parentPublication": { "id": "proceedings/iacc/2017/1560/0", "title": "2017 IEEE 7th International Advance Computing Conference (IACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375709", "title": "PID Control based on BP Neural Network for the Regulation of Blood Glucose Level in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375709/12OmNwHQB6f", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042485", "title": "Neural modeling of the blood glucose level for Type 1 Diabetes Mellitus patients", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042485/12OmNxwENzQ", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2011/1732/0/06042510", "title": "Preclinically assessed optimal control of postprandial glucose excursions for type 1 patients with diabetes", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042510/12OmNyeECGt", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/5/00914700", "title": "Managing type 1 diabetes mellitus in ambulatory patients", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914700/12OmNyoiYTj", "parentPublication": { "id": "proceedings/cdc/2000/6638/5", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2014/2877/0/2877a231", "title": "A Predictive Approach for Diabetes Mellitus Disease through Data Mining Technologies", "doi": null, "abstractUrl": "/proceedings-article/wccct/2014/2877a231/12OmNzcxZbi", "parentPublication": { "id": "proceedings/wccct/2014/2877/0", "title": "2014 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2017/5573/0/5573a111", "title": "Rule Extraction for Diagnosis of Diabetes Mellitus Used for Enhancing Regular Covering Technique", "doi": null, "abstractUrl": "/proceedings-article/wccct/2017/5573a111/12OmNzuZUtr", "parentPublication": { "id": "proceedings/wccct/2017/5573/0", "title": "2017 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982271", "title": "A New Hybrid Approach on Blood Glucose Level Control Based on Palumbo Delayed Model", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982271/17D45VTRoBU", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a098", "title": "Clinical Observation of Traditional Chinese Baduanjin Qigong (Eight Trigrams Boxing) in the Treatment of Patients with Type 2 Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a098/17D45WgziT7", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2020/6042/0/09178710", "title": "Risk analysis of a closed-loop artificial pancreas based on generalized predictive control", "doi": null, "abstractUrl": "/proceedings-article/iccia/2020/09178710/1mDu2pSMUg0", "parentPublication": { "id": "proceedings/iccia/2020/6042/0", "title": "2020 5th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iHUEf9eHkY", "title": "2019 International Conference on Information Systems and Computer Science (INCISCOS)", "acronym": "inciscos", "groupId": "1825124", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iHUGEKYDRe", "doi": "10.1109/INCISCOS49368.2019.00033", "title": "Comparison between PID-Fuzzy and Numerical Methods Based on Linear Algebra Controllers for Glucose Control in Type 1 Diabetes Treatment", "normalizedTitle": "Comparison between PID-Fuzzy and Numerical Methods Based on Linear Algebra Controllers for Glucose Control in Type 1 Diabetes Treatment", "abstract": "The main problem of treatment in Type 1 Diabetes Mellitus is to maintain glycemia between Normal levels in order to reduce possible long-term nervous and vascular complications. A possible solution for this is an Artificial Pancreas because it automatically provide enough insulin amount during the day. In recent years, a variety of PIDs and MPC controllers have been developed for the proper functioning of the artificial pancreas. This paper presents the design and evaluation of two controllers, a Numerical Methods based on Linear Algebra and a PID-Fuzzy. The simulation is based on 3 meals per day and different parametric variations. The simulation analysis shows that PIDFuzzy maintains blood glucose levels better than the NMLA. The controllers are compared using several performance indexes such as: settling time, ISE and TVu. Finally, a noise source has been added to the glucose sensor in order to see how the controllers are affected.", "abstracts": [ { "abstractType": "Regular", "content": "The main problem of treatment in Type 1 Diabetes Mellitus is to maintain glycemia between Normal levels in order to reduce possible long-term nervous and vascular complications. A possible solution for this is an Artificial Pancreas because it automatically provide enough insulin amount during the day. In recent years, a variety of PIDs and MPC controllers have been developed for the proper functioning of the artificial pancreas. This paper presents the design and evaluation of two controllers, a Numerical Methods based on Linear Algebra and a PID-Fuzzy. The simulation is based on 3 meals per day and different parametric variations. The simulation analysis shows that PIDFuzzy maintains blood glucose levels better than the NMLA. The controllers are compared using several performance indexes such as: settling time, ISE and TVu. Finally, a noise source has been added to the glucose sensor in order to see how the controllers are affected.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The main problem of treatment in Type 1 Diabetes Mellitus is to maintain glycemia between Normal levels in order to reduce possible long-term nervous and vascular complications. A possible solution for this is an Artificial Pancreas because it automatically provide enough insulin amount during the day. In recent years, a variety of PIDs and MPC controllers have been developed for the proper functioning of the artificial pancreas. This paper presents the design and evaluation of two controllers, a Numerical Methods based on Linear Algebra and a PID-Fuzzy. The simulation is based on 3 meals per day and different parametric variations. The simulation analysis shows that PIDFuzzy maintains blood glucose levels better than the NMLA. The controllers are compared using several performance indexes such as: settling time, ISE and TVu. Finally, a noise source has been added to the glucose sensor in order to see how the controllers are affected.", "fno": "558100a156", "keywords": [ "Artificial Organs", "Biochemistry", "Blood", "Diseases", "Fuzzy Control", "Linear Algebra", "Medical Control Systems", "Numerical Analysis", "Patient Treatment", "Sugar", "Three Term Control", "Vascular Complications", "Artificial Pancreas", "Noise Source", "Long Term Nervous Complications", "Insulin", "Normal Levels", "Type 1 Diabetes Mellitus Treatment", "Glycemia", "Glucose Control", "Linear Algebra Controllers", "PID Fuzzy", "Glucose Sensor", "Blood Glucose Levels", "Simulation Analysis", "Parametric Variations", "Numerical Methods", "MPC Controllers", "Mathematical Model", "Insulin", "Glucose", "Diabetes", "Blood", "Pancreas", "Linear Algebra", "Artificial Pancreas Type 1 Diabetes Mellitus PID Feedforward Fuzzy Controller Numerical Methods" ], "authors": [ { "affiliation": "Escuela Politecnica Nacional", "fullName": "Oscar Camacho", "givenName": "Oscar", "surname": "Camacho", "__typename": "ArticleAuthorType" }, { "affiliation": "Escuela Politecnica Nacional", "fullName": "Danilo Chavez", "givenName": "Danilo", "surname": "Chavez", "__typename": "ArticleAuthorType" }, { "affiliation": "Escuela Politecnica Nacional", "fullName": "Bryan Moreano", "givenName": "Bryan", "surname": "Moreano", "__typename": "ArticleAuthorType" }, { "affiliation": "Escuela Politecnica Nacional", "fullName": "Juan Pumisacho", "givenName": "Juan", "surname": "Pumisacho", "__typename": "ArticleAuthorType" } ], "idPrefix": "inciscos", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "156-162", "year": "2019", "issn": null, "isbn": "978-1-7281-5581-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "558100a150", "articleId": "1iHUEIuJt6w", "__typename": "AdjacentArticleType" }, "next": { "fno": "558100a163", "articleId": "1iHUFte19L2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/gcis/2009/3571/2/3571b170", "title": "Fuzzy-PID Control for the Regulation of Blood Glucose in Diabetes", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571b170/12OmNBUS78x", "parentPublication": { "id": "proceedings/gcis/2009/3571/2", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217809", "title": "Fraise: A framework for predicting peak postprandial blood glucose using personalized data-driven modeling", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217809/12OmNrGb2fL", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1977/9999/0/00748954", "title": "Optimal Inputs For Blood Glucose Regulation Parameter Estimation", "doi": null, "abstractUrl": "/proceedings-article/acssc/1977/00748954/12OmNrIae8t", "parentPublication": { "id": "proceedings/acssc/1977/9999/0", "title": "1977 11th Asilomar Conference on Circuits, Systems and Computers, 1977. Conference Record.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470343", "title": "Effect of acupuncture on the blood glucose and insulin in the obese rats", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470343/12OmNvjgWNM", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2022/01/09721600", "title": "Multimedia Data-Based Artificial Pancreas for Type 2 Diabetes", "doi": null, "abstractUrl": "/magazine/mu/2022/01/09721600/1Bhz1bt6O52", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a542", "title": "On the identification of PoIs in glucosimeter data", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a542/1GvdGzenCne", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2020/1485/0/09105950", "title": "Data Driven Patient-Specialized Neural Networks for Blood Glucose Prediction", "doi": null, "abstractUrl": "/proceedings-article/icmew/2020/09105950/1kwqJAI0gtW", "parentPublication": { "id": "proceedings/icmew/2020/1485/0", "title": "2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2020/6042/0/09178710", "title": "Risk analysis of a closed-loop artificial pancreas based on generalized predictive control", "doi": null, "abstractUrl": "/proceedings-article/iccia/2020/09178710/1mDu2pSMUg0", "parentPublication": { "id": "proceedings/iccia/2020/6042/0", "title": "2020 5th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306653", "title": "Forecasting the Risk of Type II Diabetes using Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306653/1qcid6wL2sE", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631483", "title": "Grammatical Evolution-Based Approach for Extracting Interpretable Glucose-Dynamics Models", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631483/1zmvSOeVqMw", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qcibXBSvDi", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "acronym": "iciev-&-icivpr", "groupId": "1802578", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qcid6wL2sE", "doi": "10.1109/ICIEVicIVPR48672.2020.9306653", "title": "Forecasting the Risk of Type II Diabetes using Reinforcement Learning", "normalizedTitle": "Forecasting the Risk of Type II Diabetes using Reinforcement Learning", "abstract": "Type II Diabetes (T2D) is one of the most common lifestyle diseases which is characterized by insulin resistance. Lack of insulin&#x0027;s proper working causes uncontrollable blood glucose rise in the body which leads to life taking situations. Therefore, early detection of T2D is imperative to save many lives. Towards this goal, this work presents a machine learning-based prediction model to detect T2D. The Q-learning algorithm belonging to the Reinforcement Learning (RL) paradigm has been applied to the PIMA Indian Women diabetes dataset in developing the detection model. The model identifies patients with T2D using three factors (such as Body Mass Index, glucose level and age of subject) by generating an off-policy based RL and making the learning agent to find an optimal policy for the factors. The information of a subject can be in any of 330 possible states. The proposed RL model&#x0027;s accuracy, Precision, Recall, F-measure and AUC values have been compared with the state-of-the-art techniques such as K Nearest Neighbors and Decision Tree. The performance of the proposed RL-based T2D prediction outperforms the K Nearest Neighbors and Decision Tree.", "abstracts": [ { "abstractType": "Regular", "content": "Type II Diabetes (T2D) is one of the most common lifestyle diseases which is characterized by insulin resistance. Lack of insulin&#x0027;s proper working causes uncontrollable blood glucose rise in the body which leads to life taking situations. Therefore, early detection of T2D is imperative to save many lives. Towards this goal, this work presents a machine learning-based prediction model to detect T2D. The Q-learning algorithm belonging to the Reinforcement Learning (RL) paradigm has been applied to the PIMA Indian Women diabetes dataset in developing the detection model. The model identifies patients with T2D using three factors (such as Body Mass Index, glucose level and age of subject) by generating an off-policy based RL and making the learning agent to find an optimal policy for the factors. The information of a subject can be in any of 330 possible states. The proposed RL model&#x0027;s accuracy, Precision, Recall, F-measure and AUC values have been compared with the state-of-the-art techniques such as K Nearest Neighbors and Decision Tree. The performance of the proposed RL-based T2D prediction outperforms the K Nearest Neighbors and Decision Tree.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Type II Diabetes (T2D) is one of the most common lifestyle diseases which is characterized by insulin resistance. Lack of insulin's proper working causes uncontrollable blood glucose rise in the body which leads to life taking situations. Therefore, early detection of T2D is imperative to save many lives. Towards this goal, this work presents a machine learning-based prediction model to detect T2D. The Q-learning algorithm belonging to the Reinforcement Learning (RL) paradigm has been applied to the PIMA Indian Women diabetes dataset in developing the detection model. The model identifies patients with T2D using three factors (such as Body Mass Index, glucose level and age of subject) by generating an off-policy based RL and making the learning agent to find an optimal policy for the factors. The information of a subject can be in any of 330 possible states. The proposed RL model's accuracy, Precision, Recall, F-measure and AUC values have been compared with the state-of-the-art techniques such as K Nearest Neighbors and Decision Tree. The performance of the proposed RL-based T2D prediction outperforms the K Nearest Neighbors and Decision Tree.", "fno": "09306653", "keywords": [ "Decision Trees", "Diseases", "Learning Artificial Intelligence", "Medical Computing", "RL Model", "RL Based T 2 D Prediction", "Type II Diabetes", "Reinforcement Learning", "Common Lifestyle Diseases", "Insulin Resistance", "Machine Learning Based Prediction Model", "PIMA Indian Women", "Detection Model", "Body Mass Index", "Glucose Level", "Off Policy Based RL", "Learning Agent", "Diabetes", "Glucose", "Diseases", "Blood", "Insulin", "Decision Trees", "Training", "Type II Diabetes", "Machine Learning", "Reinforcement Learning", "Q Learning", "Healthcare" ], "authors": [ { "affiliation": "Institute of Information Technology, Jahangirnagar University,Dhaka,Bangladesh,1340", "fullName": "Most. Fatematuz Zohora", "givenName": "Most. Fatematuz", "surname": "Zohora", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Biomedical Engineering, University of Oxford,Department of Engineering Science,UK", "fullName": "Marzia Hoque Tania", "givenName": "Marzia Hoque", "surname": "Tania", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Technology, Jahangirnagar University,Dhaka,Bangladesh,1340", "fullName": "M Shamim Kaiser", "givenName": "M Shamim", "surname": "Kaiser", "__typename": "ArticleAuthorType" }, { "affiliation": "Nottingham Trent University,Dept. of Computing & Technology,Nottingham,UK,NG118NS", "fullName": "Mufti Mahmud", "givenName": "Mufti", "surname": "Mahmud", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciev-&-icivpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2020", "issn": null, "isbn": "978-1-7281-9331-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09306630", "articleId": "1qcigjLsKYg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09306675", "articleId": "1qciexhwM3m", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2014/4274/0/4274a748", "title": "GlucoGuide: An Intelligent Type-2 Diabetes Solution Using Data Mining and Mobile Computing", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2014/4274a748/12OmNBBzokU", "parentPublication": { "id": "proceedings/icdmw/2014/4274/0", "title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2000/0862/0/08620231", "title": "Simulation Studies on the Dynamics of Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/bibe/2000/08620231/12OmNBkP3Ev", "parentPublication": { "id": "proceedings/bibe/2000/0862/0", "title": "13th IEEE International Conference on BioInformatics and BioEngineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2015/8673/0/8673a055", "title": "Hybrid Model for Early Diabetes Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2015/8673a055/12OmNqEATaP", "parentPublication": { "id": "proceedings/mcsi/2015/8673/0", "title": "2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/1/3925a224", "title": "Simulation Studies Based on the Pharmacokinetic Model of Diabetes Mellitus", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a224/12OmNyKJiCC", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a176", "title": "Simplifying the Digitization of Clinical Protocols for Diabetes Management", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a176/12OmNzUgdjR", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440834", "title": "IDMVis: Temporal Event Sequence Visualization for Type 1 Diabetes Treatment Decision Support", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440834/17D45WHONrE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2022/01/09721600", "title": "Multimedia Data-Based Artificial Pancreas for Type 2 Diabetes", "doi": null, "abstractUrl": "/magazine/mu/2022/01/09721600/1Bhz1bt6O52", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a542", "title": "On the identification of PoIs in glucosimeter data", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a542/1GvdGzenCne", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/inciscos/2019/5581/0/558100a156", "title": "Comparison between PID-Fuzzy and Numerical Methods Based on Linear Algebra Controllers for Glucose Control in Type 1 Diabetes Treatment", "doi": null, "abstractUrl": "/proceedings-article/inciscos/2019/558100a156/1iHUGEKYDRe", "parentPublication": { "id": "proceedings/inciscos/2019/5581/0", "title": "2019 International Conference on Information Systems and Computer Science (INCISCOS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374313", "title": "A Deep Reinforcement Learning Approach for Type 2 Diabetes Mellitus Treatment", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374313/1rUJ1Zug2is", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsk4xJ", "title": "Informatics, Balkan Conference in", "acronym": "bci", "groupId": "1003008", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBVIUyr", "doi": "10.1109/BCI.2009.22", "title": "Cluster-Based Similarity Search in Time Series", "normalizedTitle": "Cluster-Based Similarity Search in Time Series", "abstract": "In this paper, we present a new method that accelerates similarity search implemented via one-nearest neighbor on time series data. The main idea is to identify the most similar time series to a given query without necessarily searching over the whole database. Our method is based on partitioning the search space by applying the K-means algorithm on the data. Then, similarity search is performed hierarchically starting from the cluster that lies most closely to the query. This procedure aims at reaching the most similar series without searching all clusters. In this work, we propose to reduce the intrinsically high dimensionality of time series prior to clustering by applying a well known dimensionality reduction technique, namely, the Piecewise Aggregate Approximation, for its simplicity and efficiency. Experiments are conducted on twelve real-world and synthetic datasets covering a wide range of applications.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a new method that accelerates similarity search implemented via one-nearest neighbor on time series data. The main idea is to identify the most similar time series to a given query without necessarily searching over the whole database. Our method is based on partitioning the search space by applying the K-means algorithm on the data. Then, similarity search is performed hierarchically starting from the cluster that lies most closely to the query. This procedure aims at reaching the most similar series without searching all clusters. In this work, we propose to reduce the intrinsically high dimensionality of time series prior to clustering by applying a well known dimensionality reduction technique, namely, the Piecewise Aggregate Approximation, for its simplicity and efficiency. Experiments are conducted on twelve real-world and synthetic datasets covering a wide range of applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a new method that accelerates similarity search implemented via one-nearest neighbor on time series data. The main idea is to identify the most similar time series to a given query without necessarily searching over the whole database. Our method is based on partitioning the search space by applying the K-means algorithm on the data. Then, similarity search is performed hierarchically starting from the cluster that lies most closely to the query. This procedure aims at reaching the most similar series without searching all clusters. In this work, we propose to reduce the intrinsically high dimensionality of time series prior to clustering by applying a well known dimensionality reduction technique, namely, the Piecewise Aggregate Approximation, for its simplicity and efficiency. Experiments are conducted on twelve real-world and synthetic datasets covering a wide range of applications.", "fno": "3783a113", "keywords": [ "Similarity Search", "Clustering", "Time Series", "Data Mining" ], "authors": [ { "affiliation": null, "fullName": "Leonidas Karamitopoulos", "givenName": "Leonidas", "surname": "Karamitopoulos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Georgios Evangelidis", "givenName": "Georgios", "surname": "Evangelidis", "__typename": "ArticleAuthorType" } ], "idPrefix": "bci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "113-118", "year": "2009", "issn": null, "isbn": "978-0-7695-3783-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3783a107", "articleId": "12OmNy3iFuT", "__typename": "AdjacentArticleType" }, "next": { "fno": "3783a121", "articleId": "12OmNBghtvu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dbkda/2010/3981/0/3981a097", "title": "Trend-Based Similarity Search in Time-Series Data", "doi": null, "abstractUrl": "/proceedings-article/dbkda/2010/3981a097/12OmNqBtj1j", "parentPublication": { "id": "proceedings/dbkda/2010/3981/0", "title": "Advances in Databases, First International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2002/1531/0/15310212", "title": "Similarity Search Over Time-Series Data Using Wavelets", "doi": null, "abstractUrl": "/proceedings-article/icde/2002/15310212/12OmNwGqBpm", "parentPublication": { "id": "proceedings/icde/2002/1531/0", "title": "Proceedings 18th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/2/3407c704", "title": "Efficient Time Series Mining Using Fractal Representation", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407c704/12OmNwswg6n", "parentPublication": { "id": "proceedings/iccit/2008/3407/2", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2009/3705/0/3705a283", "title": "An Adaptive Filtering Technique for Time Series Search", "doi": null, "abstractUrl": "/proceedings-article/bife/2009/3705a283/12OmNxisQX1", "parentPublication": { "id": "proceedings/bife/2009/3705/0", "title": "2009 International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2010/4154/0/4154a101", "title": "Speeding-Up the Similarity Search in Time Series Databases by Coupling Dimensionality Reduction Techniques with a Fast-and-Dirty Filter", "doi": null, "abstractUrl": "/proceedings-article/icsc/2010/4154a101/12OmNyNzhzV", "parentPublication": { "id": "proceedings/icsc/2010/4154/0", "title": "2010 IEEE Fourth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2017/6549/0/07966757", "title": "Trend and Value Based Time Series Representation for Similarity Search", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2017/07966757/12OmNzdoMCi", "parentPublication": { "id": "proceedings/bigmm/2017/6549/0", "title": "2017 IEEE Third International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2003/03/k0686", "title": "Haar Wavelets for Efficient Similarity Search of Time-Series: With and Without Time Warping", "doi": null, "abstractUrl": "/journal/tk/2003/03/k0686/13rRUwbaqV7", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2004/06/k0669", "title": "Skyline Index for Time Series Data", "doi": null, "abstractUrl": "/journal/tk/2004/06/k0669/13rRUwvT9gF", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/03/ttk2012030385", "title": "A Framework for Similarity Search of Time Series Cliques with Natural Relations", "doi": null, "abstractUrl": "/journal/tk/2012/03/ttk2012030385/13rRUxjQyvL", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2021/2125/0/212500a057", "title": "Time Series Search Based on Locality Sensitive Hashing", "doi": null, "abstractUrl": "/proceedings-article/icaml/2021/212500a057/1B60V914C1q", "parentPublication": { "id": "proceedings/icaml/2021/2125/0", "title": "2021 3rd International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCcKQA7", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "acronym": "csci", "groupId": "1803739", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyaXPRg", "doi": "10.1109/CSCI.2015.36", "title": "Similarity Search of Bounded TIDASETs within Large Time Interval Databases", "normalizedTitle": "Similarity Search of Bounded TIDASETs within Large Time Interval Databases", "abstract": "Searching for similar entities within a database is a common and a daily, billions of times, performed task. Generally, similarities are calculated using common distance measures like Manhatten, Euclidian, Levenshtein, Mahalanobis or Dynamic Time Warping (DTW). In this paper, we present a similarity measure for time interval data, which allows searching for similar sets of time interval records bounded by a time window (e.g., a day, a week, or a month). We introduce three different groups of distance measures i.e., temporal order, temporal measure, and temporal relation distances. In addition, we present bitmap-based implementations for algorithms of each of the three types. We designed our solutions to perform well on large datasets and support distributed calculations. Evaluations show the out-standing performance regarding other interval related similarity measures, i.e., ARTEMIS and IBSM.", "abstracts": [ { "abstractType": "Regular", "content": "Searching for similar entities within a database is a common and a daily, billions of times, performed task. Generally, similarities are calculated using common distance measures like Manhatten, Euclidian, Levenshtein, Mahalanobis or Dynamic Time Warping (DTW). In this paper, we present a similarity measure for time interval data, which allows searching for similar sets of time interval records bounded by a time window (e.g., a day, a week, or a month). We introduce three different groups of distance measures i.e., temporal order, temporal measure, and temporal relation distances. In addition, we present bitmap-based implementations for algorithms of each of the three types. We designed our solutions to perform well on large datasets and support distributed calculations. Evaluations show the out-standing performance regarding other interval related similarity measures, i.e., ARTEMIS and IBSM.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Searching for similar entities within a database is a common and a daily, billions of times, performed task. Generally, similarities are calculated using common distance measures like Manhatten, Euclidian, Levenshtein, Mahalanobis or Dynamic Time Warping (DTW). In this paper, we present a similarity measure for time interval data, which allows searching for similar sets of time interval records bounded by a time window (e.g., a day, a week, or a month). We introduce three different groups of distance measures i.e., temporal order, temporal measure, and temporal relation distances. In addition, we present bitmap-based implementations for algorithms of each of the three types. We designed our solutions to perform well on large datasets and support distributed calculations. Evaluations show the out-standing performance regarding other interval related similarity measures, i.e., ARTEMIS and IBSM.", "fno": "9795a024", "keywords": [ "Databases", "Time Measurement", "Information Management", "Time Series Analysis", "Information Filters", "Interpolation", "K Nearest Neighbors", "Similarity Search", "Time Interval Data Analysis", "Time Series" ], "authors": [ { "affiliation": null, "fullName": "Philipp Meisen", "givenName": "Philipp", "surname": "Meisen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Diane Keng", "givenName": "Diane", "surname": "Keng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tobias Meisen", "givenName": "Tobias", "surname": "Meisen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marco Recchioni", "givenName": "Marco", "surname": "Recchioni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sabina Jeschke", "givenName": "Sabina", "surname": "Jeschke", "__typename": "ArticleAuthorType" } ], "idPrefix": "csci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "24-29", "year": "2015", "issn": null, "isbn": "978-1-4673-9795-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9795a018", "articleId": "12OmNzaQoPG", "__typename": "AdjacentArticleType" }, "next": { "fno": "9795a030", "articleId": "12OmNAFWOQO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2011/0372/0/06122674", "title": "Hidden dynamic learning for long-interval consecutive missing values reconstruction in EEG time series", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122674/12OmNAtK4in", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2018/5377/0/537701a434", "title": "Pattern Similarity in Time Interval Sequences", "doi": null, "abstractUrl": "/proceedings-article/ichi/2018/537701a434/12OmNBTawhb", "parentPublication": { "id": "proceedings/ichi/2018/5377/0", "title": "2018 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicis/2011/1561/0/06063249", "title": "Interval Valued Fuzzy Filters of Lattice Implication Algebras", "doi": null, "abstractUrl": "/proceedings-article/icicis/2011/06063249/12OmNC3XhhW", "parentPublication": { "id": "proceedings/icicis/2011/1561/0", "title": "2011 International Conference on Internet Computing and Information Services (ICICIS 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b036", "title": "Online Interval Skyline Queries on Time Series", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b036/12OmNqBbHF6", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/3/01259757", "title": "ISITL: intrusion signatures in augmented interval temporal logic", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259757/12OmNyUnEGW", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2008/3278/0/3278b017", "title": "The Design and Analysis of Constraint Networks for Uncertain Temporal Interval Relations", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2008/3278b017/12OmNyrZLBz", "parentPublication": { "id": "proceedings/iih-msp/2008/3278/0", "title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b833", "title": "Measuring Similarity between Interval-Valued Fuzzy Numbers Using Quadratic-mean operator", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b833/12OmNzwZ6hp", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/01/07172543", "title": "Similarity Measure Selection for Clustering Time Series Databases", "doi": null, "abstractUrl": "/journal/tk/2016/01/07172543/13rRUxD9gYc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1993/04/k0551", "title": "Interval-Based Conceptual Models for Time-Dependent Multimedia Data", "doi": null, "abstractUrl": "/journal/tk/1993/04/k0551/13rRUxjQyhw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440826", "title": "Comparing Similarity Perception in Time Series Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440826/17D45XoXP7S", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45X0yjTr", "doi": "10.1109/BigData.2017.8258343", "title": "Ranked time series matching by interleaving similarity distances", "normalizedTitle": "Ranked time series matching by interleaving similarity distances", "abstract": "Similarity analytics of time series data are critical for a wide range of applications ranging from medical to financial, and from weather forecasting to image processing. Yet these analytics tasks are known to be prohibitively expensive for large data sets, especially when accounting for varying temporal alignments and lengths. Our proposed framework tackles this challenge by adopting a preprocess-once and query-many-times paradigm. We extend a previous formal model interleaving the inexpensive Euclidean distance with the robust Dynamic Time Warping (DTW) to retrieve the k most similar matches to a given sample sequence. Our extended ONline EXploration of top k time series similarity system (K-ONEX) first encodes similarity relationships by compressing the raw time series into Euclidean-based groups; these groups are further explored using the elastic DTW to find similar sequences of any length and temporal alignment with response times that are almost as fast as retrieving only one best match. Our empirical results illustrate that K-ONEX provides response times that are 2–3 orders of magnitude faster than the benchmark and state-of-the-art methods while achieving 100% accuracy by exploring less than 0.5% of the sequences in each dataset.", "abstracts": [ { "abstractType": "Regular", "content": "Similarity analytics of time series data are critical for a wide range of applications ranging from medical to financial, and from weather forecasting to image processing. Yet these analytics tasks are known to be prohibitively expensive for large data sets, especially when accounting for varying temporal alignments and lengths. Our proposed framework tackles this challenge by adopting a preprocess-once and query-many-times paradigm. We extend a previous formal model interleaving the inexpensive Euclidean distance with the robust Dynamic Time Warping (DTW) to retrieve the k most similar matches to a given sample sequence. Our extended ONline EXploration of top k time series similarity system (K-ONEX) first encodes similarity relationships by compressing the raw time series into Euclidean-based groups; these groups are further explored using the elastic DTW to find similar sequences of any length and temporal alignment with response times that are almost as fast as retrieving only one best match. Our empirical results illustrate that K-ONEX provides response times that are 2–3 orders of magnitude faster than the benchmark and state-of-the-art methods while achieving 100% accuracy by exploring less than 0.5% of the sequences in each dataset.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Similarity analytics of time series data are critical for a wide range of applications ranging from medical to financial, and from weather forecasting to image processing. Yet these analytics tasks are known to be prohibitively expensive for large data sets, especially when accounting for varying temporal alignments and lengths. Our proposed framework tackles this challenge by adopting a preprocess-once and query-many-times paradigm. We extend a previous formal model interleaving the inexpensive Euclidean distance with the robust Dynamic Time Warping (DTW) to retrieve the k most similar matches to a given sample sequence. Our extended ONline EXploration of top k time series similarity system (K-ONEX) first encodes similarity relationships by compressing the raw time series into Euclidean-based groups; these groups are further explored using the elastic DTW to find similar sequences of any length and temporal alignment with response times that are almost as fast as retrieving only one best match. Our empirical results illustrate that K-ONEX provides response times that are 2–3 orders of magnitude faster than the benchmark and state-of-the-art methods while achieving 100% accuracy by exploring less than 0.5% of the sequences in each dataset.", "fno": "08258343", "keywords": [ "Time Series Analysis", "Robustness", "Time Factors", "Complexity Theory", "Shape", "Euclidean Distance", "Subsequence Matching", "Data Mining", "Time Series Analytics", "K Similarity Search", "Dynamic Time Warping", "Visualization Of Time Series Similarity" ], "authors": [ { "affiliation": "Worcester Polytechnic Institute", "fullName": "Cuong Nguyen", "givenName": "Cuong", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Charles Lovering", "givenName": "Charles", "surname": "Lovering", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Rodica Neamtu", "givenName": "Rodica", "surname": "Neamtu", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "3530-3539", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08258342", "articleId": "17D45WHONje", "__typename": "AdjacentArticleType" }, "next": { "fno": "08258344", "articleId": "17D45VObpMP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2017/3800/0/3800a025", "title": "Distance and Density Clustering for Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a025/12OmNApLGQv", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icycs/2008/3398/0/3398b866", "title": "FSMBO: Fast Time Series Similarity Matching Based on Bit Operation", "doi": null, "abstractUrl": "/proceedings-article/icycs/2008/3398b866/12OmNBQTJif", "parentPublication": { "id": "proceedings/icycs/2008/3398/0", "title": "2008 9th International Conference for Young Computer Scientists", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/4/3336g399", "title": "Similarity Match in Time Series Streams under Dynamic Time Warping Distance", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336g399/12OmNCdk2Is", "parentPublication": { "id": "csse/2008/3336/4", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363799", "title": "Bandwidth-efficient distributed k-nearest-neighbor search with dynamic time warping", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363799/12OmNvDqsNz", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2012/4976/0/06395016", "title": "Location Time-Series Clustering on Optimal Sensor Arrangement", "doi": null, "abstractUrl": "/proceedings-article/taai/2012/06395016/12OmNyQGShx", "parentPublication": { "id": "proceedings/taai/2012/4976/0", "title": "2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2010/4258/0/4258a861", "title": "Similarity Matching Algorithm of Multiple Granularities Time-Series Data", "doi": null, "abstractUrl": "/proceedings-article/mines/2010/4258a861/12OmNzUxOk3", "parentPublication": { "id": "proceedings/mines/2010/4258/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2013/5092/0/5092a082", "title": "An Empirical Comparison of Dissimilarity Measures for Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/bracis/2013/5092a082/12OmNzsJ7kh", "parentPublication": { "id": "proceedings/bracis/2013/5092/0", "title": "2013 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a260", "title": "An Examination of Multivariate Time Series Hashing with Applications to Health Care", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a260/12OmNzxPTJX", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09306921", "title": "A Linear Time Approach to Computing Time Series Similarity Based on Deep Metric Learning", "doi": null, "abstractUrl": "/journal/tk/2022/10/09306921/1pOZizY2K88", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2021/2703/0/270300a187", "title": "Evaluation of Time Series Clustering on Embedded Sensor Platform", "doi": null, "abstractUrl": "/proceedings-article/dsd/2021/270300a187/1xCbdRCDPAQ", "parentPublication": { "id": "proceedings/dsd/2021/2703/0", "title": "2021 24th Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KxTT0RGtCo", "title": "2022 IEEE International Conference on Knowledge Graph (ICKG)", "acronym": "ickg", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KxU3hp9Fio", "doi": "10.1109/ICKG55886.2022.00013", "title": "Matrix Profile XXVII: A Novel Distance Measure for Comparing Long Time Series", "normalizedTitle": "Matrix Profile XXVII: A Novel Distance Measure for Comparing Long Time Series", "abstract": "The most useful data mining primitives are distance measures. With an effective distance measure, it is possible to perform classification, clustering, anomaly detection, segmentation, etc. For single-event time series Euclidean Distance and Dynamic Time Warping distance are known to be extremely effective. However, for time series containing cyclical behaviors, the semantic meaningfulness of such comparisons is less clear. For example, on two separate days the telemetry from an athlete&#x0027;s workout routine might be very similar. However, on the second day she might have changed the order in which she did push-ups and squats, added a few repetitions of pull-ups, or completely omitted dumbbell curls. Any one of these minor changes would defeat existing time series distance measures. Some &#x201C;bag-of-features&#x201D; methods have been proposed to address this problem; however, we argue that in many cases, similarity is intimately tied to the shapes of subsequences within these longer time series. In such cases, summative features will lack discrimination ability. In this work we introduce PRCIS, which stands for Pattern Representation Comparison in Series. PRCIS is a distance measure for long time series, which exploits recent progress in our ability to summarize time series with &#x201C;dictionaries&#x201D;. We will demonstrate the utility of our ideas on diverse tasks and datasets.", "abstracts": [ { "abstractType": "Regular", "content": "The most useful data mining primitives are distance measures. With an effective distance measure, it is possible to perform classification, clustering, anomaly detection, segmentation, etc. For single-event time series Euclidean Distance and Dynamic Time Warping distance are known to be extremely effective. However, for time series containing cyclical behaviors, the semantic meaningfulness of such comparisons is less clear. For example, on two separate days the telemetry from an athlete&#x0027;s workout routine might be very similar. However, on the second day she might have changed the order in which she did push-ups and squats, added a few repetitions of pull-ups, or completely omitted dumbbell curls. Any one of these minor changes would defeat existing time series distance measures. Some &#x201C;bag-of-features&#x201D; methods have been proposed to address this problem; however, we argue that in many cases, similarity is intimately tied to the shapes of subsequences within these longer time series. In such cases, summative features will lack discrimination ability. In this work we introduce PRCIS, which stands for Pattern Representation Comparison in Series. PRCIS is a distance measure for long time series, which exploits recent progress in our ability to summarize time series with &#x201C;dictionaries&#x201D;. We will demonstrate the utility of our ideas on diverse tasks and datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The most useful data mining primitives are distance measures. With an effective distance measure, it is possible to perform classification, clustering, anomaly detection, segmentation, etc. For single-event time series Euclidean Distance and Dynamic Time Warping distance are known to be extremely effective. However, for time series containing cyclical behaviors, the semantic meaningfulness of such comparisons is less clear. For example, on two separate days the telemetry from an athlete's workout routine might be very similar. However, on the second day she might have changed the order in which she did push-ups and squats, added a few repetitions of pull-ups, or completely omitted dumbbell curls. Any one of these minor changes would defeat existing time series distance measures. Some “bag-of-features” methods have been proposed to address this problem; however, we argue that in many cases, similarity is intimately tied to the shapes of subsequences within these longer time series. In such cases, summative features will lack discrimination ability. In this work we introduce PRCIS, which stands for Pattern Representation Comparison in Series. PRCIS is a distance measure for long time series, which exploits recent progress in our ability to summarize time series with “dictionaries”. We will demonstrate the utility of our ideas on diverse tasks and datasets.", "fno": "510100a040", "keywords": [ "Data Mining", "Distance Measurement", "Pattern Classification", "Pattern Clustering", "Time Series", "Athlete", "Dynamic Time Warping Distance", "Effective Distance Measure", "Existing Time Series Distance Measures", "Long Time Series", "Longer Time Series", "Matrix Profile XXVII", "Novel Distance Measure", "Push Ups", "Separate Days", "Single Event Time Series Euclidean Distance", "Squats", "Useful Data Mining Primitives", "Dictionaries", "Shape", "Time Series Analysis", "Semantics", "Euclidean Distance", "Time Measurement", "Behavioral Sciences", "Time Series", "Distance Measure", "Similarity", "Matrix Profile" ], "authors": [ { "affiliation": "University of California,Riverside", "fullName": "Audrey Der", "givenName": "Audrey", "surname": "Der", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Chin-Chia Michael Yeh", "givenName": "Chin-Chia Michael", "surname": "Yeh", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Riverside", "fullName": "Renjie Wu", "givenName": "Renjie", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Junpeng Wang", "givenName": "Junpeng", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Yan Zheng", "givenName": "Yan", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Zhongfang Zhuang", "givenName": "Zhongfang", "surname": "Zhuang", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Liang Wang", "givenName": "Liang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Visa Research", "fullName": "Wei Zhang", "givenName": "Wei", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Riverside", "fullName": "Eamonn Keogh", "givenName": "Eamonn", "surname": "Keogh", "__typename": "ArticleAuthorType" } ], "idPrefix": "ickg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "40-47", "year": "2022", "issn": null, "isbn": "978-1-6654-5101-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "510100a032", "articleId": "1KxTVpZU8BW", "__typename": "AdjacentArticleType" }, "next": { "fno": "510100a048", "articleId": "1KxTWbKcM8M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2017/3800/0/3800a025", "title": "Distance and Density Clustering for Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a025/12OmNApLGQv", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2014/5057/0/06906799", "title": "Hydrological Time Series Anomaly Mining Based on Symbolization and Distance Measure", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2014/06906799/12OmNBhHt56", "parentPublication": { "id": "proceedings/bigdata-congress/2014/5057/0", "title": "2014 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a687", "title": "Time Series Classification Using Compression Distance of Recurrence Plots", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a687/12OmNBqdr3r", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2013/5092/0/5092a082", "title": "An Empirical Comparison of Dissimilarity Measures for Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/bracis/2013/5092a082/12OmNzsJ7kh", "parentPublication": { "id": "proceedings/bracis/2013/5092/0", "title": "2013 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/01/07172543", "title": "Similarity Measure Selection for Clustering Time Series Databases", "doi": null, "abstractUrl": "/journal/tk/2016/01/07172543/13rRUxD9gYc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2018/9125/0/912500a382", "title": "Matrix Profile XIII: Time Series Snippets: A New Primitive for Time Series Data Mining", "doi": null, "abstractUrl": "/proceedings-article/icbk/2018/912500a382/17D45VTRoDJ", "parentPublication": { "id": "proceedings/icbk/2018/9125/0", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594928", "title": "Matrix Profile XII: MPdist: A Novel Time Series Distance Measure to Allow Data Mining in More Challenging Scenarios", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594928/17D45VsBU2v", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a388", "title": "A scalable approach to detect Contrasting Consecutive Patterns in time series data", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a388/1FJ5Czyffag", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a101", "title": "Class-Specific Explainability for Deep Time Series Classifiers", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a101/1KpCofcZVh6", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2022/4627/0/462700a297", "title": "Profile-matrix-based shapelet discovery for time series binary classification", "doi": null, "abstractUrl": "/proceedings-article/cis/2022/462700a297/1M9pYAZg5Yk", "parentPublication": { "id": "proceedings/cis/2022/4627/0", "title": "2022 18th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxYUM", "title": "Games and Virtual Worlds for Serious Applications, Conference in", "acronym": "vs-games", "groupId": "1002788", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyr8YeD", "doi": "10.1109/VS-GAMES.2009.15", "title": "An Automated Modeling Method for Multiple Detail Levels of Real-Time Trees", "normalizedTitle": "An Automated Modeling Method for Multiple Detail Levels of Real-Time Trees", "abstract": "Rendering realistic outdoor scenes in realtimeapplications is a difficult task to accomplishsince the geometric complexity of the objects, andmost notably of trees, is too high for currenthardware to handle efficiently in large amounts.Our method generates trees with self-similarity, andlater exploits this property by heavily sharing prerenderedtextures of similar parts of the tree. Theintrinsic tree hierarchy of the trees, combined withtheir self-similarity, allows generation of multiplelevels of detail. Here we present the flow of theprocessing stage, from the collection of the requiredinput data until the export of the models in all theirlevels of detail as well as related and additionaldata.", "abstracts": [ { "abstractType": "Regular", "content": "Rendering realistic outdoor scenes in realtimeapplications is a difficult task to accomplishsince the geometric complexity of the objects, andmost notably of trees, is too high for currenthardware to handle efficiently in large amounts.Our method generates trees with self-similarity, andlater exploits this property by heavily sharing prerenderedtextures of similar parts of the tree. Theintrinsic tree hierarchy of the trees, combined withtheir self-similarity, allows generation of multiplelevels of detail. Here we present the flow of theprocessing stage, from the collection of the requiredinput data until the export of the models in all theirlevels of detail as well as related and additionaldata.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Rendering realistic outdoor scenes in realtimeapplications is a difficult task to accomplishsince the geometric complexity of the objects, andmost notably of trees, is too high for currenthardware to handle efficiently in large amounts.Our method generates trees with self-similarity, andlater exploits this property by heavily sharing prerenderedtextures of similar parts of the tree. Theintrinsic tree hierarchy of the trees, combined withtheir self-similarity, allows generation of multiplelevels of detail. Here we present the flow of theprocessing stage, from the collection of the requiredinput data until the export of the models in all theirlevels of detail as well as related and additionaldata.", "fno": "3588a053", "keywords": [ "Tree", "Modeling", "Foliage", "Rendering", "Image Based" ], "authors": [ { "affiliation": null, "fullName": "Charalampos Koniaris", "givenName": "Charalampos", "surname": "Koniaris", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Athanasios Gaitatzes", "givenName": "Athanasios", "surname": "Gaitatzes", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Georgios Papaioannou", "givenName": "Georgios", "surname": "Papaioannou", "__typename": "ArticleAuthorType" } ], "idPrefix": "vs-games", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-03-01T00:00:00", "pubType": "proceedings", "pages": "53-60", "year": "2009", "issn": null, "isbn": "978-0-7695-3588-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3588a166", "articleId": "12OmNviZlkN", "__typename": "AdjacentArticleType" }, "next": { "fno": "3588a068", "articleId": "12OmNzd7bGl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icip/1995/7310/3/73103656", "title": "Tree pruning strategy in automated detection of coronary trees in cineangiograms", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73103656/12OmNBpEeL7", "parentPublication": { "id": "proceedings/icip/1995/7310/3", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2011/4648/0/4648a017", "title": "A Hybrid Geometry and Billboard-Based Model for Trees", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2011/4648a017/12OmNCbU2Rx", "parentPublication": { "id": "proceedings/sbgames/2011/4648/0", "title": "2011 Brazilian Symposium on Games and Digital Entertainment", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2012/2310/0/06468626", "title": "Pattern matching with wildcards based on multiple suffix trees", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468626/12OmNvTjZV7", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a111", "title": "Efficiently Mining Unordered Trees", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a111/12OmNwEJ0S0", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2009/3926/0/3926a693", "title": "A New Method for Learning Decision Trees from Rules", "doi": null, "abstractUrl": "/proceedings-article/icmla/2009/3926a693/12OmNyYm2u8", "parentPublication": { "id": "proceedings/icmla/2009/3926/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssdbm/2004/2146/0/21460011", "title": "HybridTreeMiner: An Efficient Algorithm for Mining Frequent Rooted Trees and Free Trees Using Canonical Forms", "doi": null, "abstractUrl": "/proceedings-article/ssdbm/2004/21460011/12OmNzUPpAJ", "parentPublication": { "id": "proceedings/ssdbm/2004/2146/0", "title": "Scientific and Statistical Database Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1987/07/01702291", "title": "Two Access Methods Using Compact Binary Trees", "doi": null, "abstractUrl": "/journal/ts/1987/07/01702291/13rRUwdIOTD", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1294", "title": "Exploring Multiple Trees through DAG Representations", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1294/13rRUxAATgr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/04/ttb2011041029", "title": "Metrics on Multilabeled Trees: Interrelationships and Diameter Bounds", "doi": null, "abstractUrl": "/journal/tb/2011/04/ttb2011041029/13rRUy0qnEH", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1997/12/i1376", "title": "Error-Tolerant Retrieval of Trees", "doi": null, "abstractUrl": "/journal/tp/1997/12/i1376/13rRUyeCkbr", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBTJIGQ", "doi": "10.1109/IV.2016.28", "title": "Isoline-Enhanced Dynamic Graph Visualization", "normalizedTitle": "Isoline-Enhanced Dynamic Graph Visualization", "abstract": "Static or dynamic graphs are typically visualized by either node-link diagrams, adjacency matrices, adjacency lists, orhybrids thereof. In particular, for the case of a changing graphstructure a viewer wishes to be able to visually compare thegraphs in a sequence. Doing such a comparison task rapidlyand reliably can give support to visually analyze the dynamicgraph for certain dynamic patterns. In this paper we describe a novel dynamic graph visualization that is based on the concept of smooth density fields generated by first splatting the links of a given graph in a certain layout. To further visually enhance the time-varying graph structures we add user-adaptable isolines to the resulting dynamic graph representation. The computed visual encoding of the dynamic graph is aesthetically appealing due to its smooth curves and can additionally be used to do comparisons in a long graph sequence, i.e., from an information visualization perspective it serves as an overview representation supporting to start more detailed analyses processes. To demonstrate theusefulness of the technique we explore real-world dynamic graph data by taking into account visual parameters like node-link layouts, smoothing iterations, number of isolines, and different color codings.", "abstracts": [ { "abstractType": "Regular", "content": "Static or dynamic graphs are typically visualized by either node-link diagrams, adjacency matrices, adjacency lists, orhybrids thereof. In particular, for the case of a changing graphstructure a viewer wishes to be able to visually compare thegraphs in a sequence. Doing such a comparison task rapidlyand reliably can give support to visually analyze the dynamicgraph for certain dynamic patterns. In this paper we describe a novel dynamic graph visualization that is based on the concept of smooth density fields generated by first splatting the links of a given graph in a certain layout. To further visually enhance the time-varying graph structures we add user-adaptable isolines to the resulting dynamic graph representation. The computed visual encoding of the dynamic graph is aesthetically appealing due to its smooth curves and can additionally be used to do comparisons in a long graph sequence, i.e., from an information visualization perspective it serves as an overview representation supporting to start more detailed analyses processes. To demonstrate theusefulness of the technique we explore real-world dynamic graph data by taking into account visual parameters like node-link layouts, smoothing iterations, number of isolines, and different color codings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Static or dynamic graphs are typically visualized by either node-link diagrams, adjacency matrices, adjacency lists, orhybrids thereof. In particular, for the case of a changing graphstructure a viewer wishes to be able to visually compare thegraphs in a sequence. Doing such a comparison task rapidlyand reliably can give support to visually analyze the dynamicgraph for certain dynamic patterns. In this paper we describe a novel dynamic graph visualization that is based on the concept of smooth density fields generated by first splatting the links of a given graph in a certain layout. To further visually enhance the time-varying graph structures we add user-adaptable isolines to the resulting dynamic graph representation. The computed visual encoding of the dynamic graph is aesthetically appealing due to its smooth curves and can additionally be used to do comparisons in a long graph sequence, i.e., from an information visualization perspective it serves as an overview representation supporting to start more detailed analyses processes. To demonstrate theusefulness of the technique we explore real-world dynamic graph data by taking into account visual parameters like node-link layouts, smoothing iterations, number of isolines, and different color codings.", "fno": "8942a001", "keywords": [ "Layout", "Visualization", "Data Visualization", "Heuristic Algorithms", "Algorithm Design And Analysis", "Reliability", "Clutter", "Edge Splatting", "Dynamic Graph Visualization", "Isolines" ], "authors": [ { "affiliation": null, "fullName": "Michael Burch", "givenName": "Michael", "surname": "Burch", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942z025", "articleId": "12OmNzdoN6l", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a009", "articleId": "12OmNAsk4Fh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2011/935/0/05742388", "title": "Dynamic network visualization in 1.5D", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742388/12OmNvjgWV1", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156358", "title": "Laplacian-based dynamic graph visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156358/12OmNwHQB7U", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2012/0852/0/06344514", "title": "Rapid Serial Visual Presentation in dynamic graph visualization", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2012/06344514/12OmNxYL5fe", "parentPublication": { "id": "proceedings/vlhcc/2012/0852/0", "title": "2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a230", "title": "Dynamic Graph Visualization on Different Temporal Granularities", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a230/12OmNzxPTGk", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061277", "title": "Geometry-Based Edge Clustering for Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061277/13rRUNvyakF", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352369", "title": "Visualizing Dynamic Hierarchies in Graph Sequences", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352369/13rRUzp02os", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/07/08580419", "title": "Event-Based Dynamic Graph Visualisation", "doi": null, "abstractUrl": "/journal/tg/2020/07/08580419/17D45WK5Amw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454344", "title": "Juniper: A Tree+Table Approach to Multivariate Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454344/17D45WLdYQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/10/08673661", "title": "Eiffel: Evolutionary Flow Map for Influence Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/10/08673661/18LF7Q1L3na", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a248", "title": "Time-Aligned Edge Plots for Dynamic Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a248/1rSR9vG2u4w", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmL9a8AhfW", "doi": "10.1109/ICCV48922.2021.00133", "title": "TGRNet: A Table Graph Reconstruction Network for Table Structure Recognition", "normalizedTitle": "TGRNet: A Table Graph Reconstruction Network for Table Structure Recognition", "abstract": "A table arranging data in rows and columns is a very effective data structure, which has been widely used in business and scientific research. Considering large-scale tabular data in online and offline documents, automatic table recognition has attracted increasing attention from the document analysis community. Though human can easily understand the structure of tables, it remains a challenge for machines to understand that, especially due to a variety of different table layouts and styles. Existing methods usually model a table as either the markup sequence or the adjacency matrix between different table cells, failing to address the importance of the logical location of table cells, e.g., a cell is located in the first row and the second column of the table. In this paper, we reformulate the problem of table structure recognition as the table graph reconstruction, and propose an end-to-end trainable table graph reconstruction network (TGRNet) for table structure recognition. Specifically, the proposed method has two main branches, a cell detection branch and a cell logical location branch, to jointly predict the spatial location and the logical location of different cells. Experimental results on three popular table recognition datasets and a new dataset with table graph annotations (TableGraph-350K) demonstrate the effectiveness of the proposed TGRNet for table structure recognition. Code and annotations will be made publicly available at https://github.com/xuewenyuan/TGRNet.", "abstracts": [ { "abstractType": "Regular", "content": "A table arranging data in rows and columns is a very effective data structure, which has been widely used in business and scientific research. Considering large-scale tabular data in online and offline documents, automatic table recognition has attracted increasing attention from the document analysis community. Though human can easily understand the structure of tables, it remains a challenge for machines to understand that, especially due to a variety of different table layouts and styles. Existing methods usually model a table as either the markup sequence or the adjacency matrix between different table cells, failing to address the importance of the logical location of table cells, e.g., a cell is located in the first row and the second column of the table. In this paper, we reformulate the problem of table structure recognition as the table graph reconstruction, and propose an end-to-end trainable table graph reconstruction network (TGRNet) for table structure recognition. Specifically, the proposed method has two main branches, a cell detection branch and a cell logical location branch, to jointly predict the spatial location and the logical location of different cells. Experimental results on three popular table recognition datasets and a new dataset with table graph annotations (TableGraph-350K) demonstrate the effectiveness of the proposed TGRNet for table structure recognition. Code and annotations will be made publicly available at https://github.com/xuewenyuan/TGRNet.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A table arranging data in rows and columns is a very effective data structure, which has been widely used in business and scientific research. Considering large-scale tabular data in online and offline documents, automatic table recognition has attracted increasing attention from the document analysis community. Though human can easily understand the structure of tables, it remains a challenge for machines to understand that, especially due to a variety of different table layouts and styles. Existing methods usually model a table as either the markup sequence or the adjacency matrix between different table cells, failing to address the importance of the logical location of table cells, e.g., a cell is located in the first row and the second column of the table. In this paper, we reformulate the problem of table structure recognition as the table graph reconstruction, and propose an end-to-end trainable table graph reconstruction network (TGRNet) for table structure recognition. Specifically, the proposed method has two main branches, a cell detection branch and a cell logical location branch, to jointly predict the spatial location and the logical location of different cells. Experimental results on three popular table recognition datasets and a new dataset with table graph annotations (TableGraph-350K) demonstrate the effectiveness of the proposed TGRNet for table structure recognition. Code and annotations will be made publicly available at https://github.com/xuewenyuan/TGRNet.", "fno": "281200b275", "keywords": [ "Computer Vision", "Text Analysis", "Codes", "Annotations", "Layout", "Predictive Models", "Benchmark Testing", "Scene Text And Document Understanding", "Vision Language" ], "authors": [ { "affiliation": "Beijing Jiaotong University,Beijing Key Lab of Traffic Data Analysis and Mining,China", "fullName": "Wenyuan Xue", "givenName": "Wenyuan", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Sydney,Australia", "fullName": "Baosheng Yu", "givenName": "Baosheng", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Jiaotong University,Beijing Key Lab of Traffic Data Analysis and Mining,China", "fullName": "Wen Wang", "givenName": "Wen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Sydney,Australia", "fullName": "Dacheng Tao", "givenName": "Dacheng", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Jiaotong University,Beijing Key Lab of Traffic Data Analysis and Mining,China", "fullName": "Qingyong Li", "givenName": "Qingyong", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1275-1284", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200b265", "articleId": "1BmEE7JVn68", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200b285", "articleId": "1BmHCrOJFcs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicic/2007/2882/0/28820247", "title": "Automatic Hypertext Table Understanding by using Logical Structure Description Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icicic/2007/28820247/12OmNB8TU7c", "parentPublication": { "id": "proceedings/icicic/2007/2882/0", "title": "2007 Second International Conference on Innovative Computing, Information and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a777", "title": "Table Recognition in Heterogeneous Documents Using Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a777/12OmNyrZLCA", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/04/i0432", "title": "Layout Recognition of Multi-Kinds of Table-Form Documents", "doi": null, "abstractUrl": "/journal/tp/1995/04/i0432/13rRUygT7g3", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a217", "title": "Matching Table Structures of Historical Register Books using Association Graphs", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a217/17D45WaTkot", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600e523", "title": "Neural Collaborative Graph Machines for Table Structure Recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600e523/1H1idInmCsw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956590", "title": "Graph Neural Networks and Representation Embedding for Table Extraction in PDF Documents", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956590/1IHqitEGcUM", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400b403", "title": "DeepTabStR: Deep Learning based Table Structure Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400b403/1h81pG7YIWQ", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a142", "title": "Rethinking Table Recognition using Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a142/1h81qHhrzaM", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a122", "title": "Table Detection in Invoice Documents by Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a122/1h81zyyGfF6", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700a697", "title": "Global Table Extractor (GTE): A Framework for Joint Table Identification and Cell Structure Recognition Using Visual Context", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700a697/1uqGJGAB5EA", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtq0XzUHu", "doi": "10.1109/PacificVis52677.2021.00026", "title": "On the Visualization of Hierarchical Multivariate Data", "normalizedTitle": "On the Visualization of Hierarchical Multivariate Data", "abstract": "In this paper, we study the visual design of hierarchical multivariate data analysis. We focus on the extension of four hierarchical univariate concepts-the sunburst chart, the icicle plot, the circular treemap, and the bubble treemap-to the multivariate domain. Our study identifies several advantageous design variants, which we discuss with respect to previous approaches, and whose utility we evaluate with a user study and demonstrate for different analysis purposes and different types of data.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we study the visual design of hierarchical multivariate data analysis. We focus on the extension of four hierarchical univariate concepts-the sunburst chart, the icicle plot, the circular treemap, and the bubble treemap-to the multivariate domain. Our study identifies several advantageous design variants, which we discuss with respect to previous approaches, and whose utility we evaluate with a user study and demonstrate for different analysis purposes and different types of data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we study the visual design of hierarchical multivariate data analysis. We focus on the extension of four hierarchical univariate concepts-the sunburst chart, the icicle plot, the circular treemap, and the bubble treemap-to the multivariate domain. Our study identifies several advantageous design variants, which we discuss with respect to previous approaches, and whose utility we evaluate with a user study and demonstrate for different analysis purposes and different types of data.", "fno": "393100a136", "keywords": [ "Data Analysis", "Data Visualisation", "Trees Mathematics", "Sunburst Chart", "Hierarchical Univariate Concepts", "Design Variants", "Multivariate Domain", "Bubble Treemap", "Circular Treemap", "Icicle Plot", "Hierarchical Multivariate Data Analysis", "Visual Design", "Visualization", "Data Analysis", "Correlation", "Scalability", "Layout", "Data Visualization", "Bars", "Human Centered Computing", "Visualization", "Visualization Techniques", "Treemaps", "Visualization Application Domains", "Information Visualization" ], "authors": [ { "affiliation": "Heidelberg University,Germany", "fullName": "Boyan Zheng", "givenName": "Boyan", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Heidelberg University,Germany", "fullName": "Filip Sadlo", "givenName": "Filip", "surname": "Sadlo", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "136-145", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a131", "articleId": "1tTtqpZY94k", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a146", "articleId": "1tTtrX8Ij72", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2009/3733/0/3733a403", "title": "Treemaps and Choropleth Maps Applied to Regional Hierarchical Statistical Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a403/12OmNBqv2d4", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/1996/7668/0/76680074", "title": "Dual multiresolution HyperSlice for multivariate data visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1996/76680074/12OmNC8uRCK", "parentPublication": { "id": "proceedings/ieee-infovis/1996/7668/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2013/2322/0/2322a185", "title": "A Hierarchical Data Visualization Algorithm: Self-Adapting Sunburst Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2013/2322a185/12OmNCgJeap", "parentPublication": { "id": "proceedings/icvrv/2013/2322/0", "title": "2013 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880427", "title": "Treecube: Visualization Tool for Browsing 3D Multimedia Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880427/12OmNqHqSpN", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07536174", "title": "Optimizing Hierarchical Visualizations with the Minimum Description Length Principle", "doi": null, "abstractUrl": "/journal/tg/2017/01/07536174/13rRUwI5TXB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1286", "title": "Visualizing Changes of Hierarchical Data using Treemaps", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1286/13rRUy0qnLA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454344", "title": "Juniper: A Tree+Table Approach to Multivariate Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454344/17D45WLdYQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09956758", "title": "Multivariate Data Explanation by Jumping Emerging Patterns Visualization", "doi": null, "abstractUrl": "/journal/tg/5555/01/09956758/1Iu2JIUXLR6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933545", "title": "Interactive Visualisation of Hierarchical Quantitative Data: An Evaluation", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933545/1fTgJVRcxig", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a166", "title": "Evaluation of Hierarchical Visualization for Large and Small Hierarchies", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a166/1rSR8i3DUEU", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vF12OhpdAc", "title": "2021 International Conference on Information and Digital Technologies (IDT)", "acronym": "idt", "groupId": "1802716", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1vF1bEyLlIs", "doi": "10.1109/IDT52577.2021.9497524", "title": "On Graph Coloring Analysis Through Visualization", "normalizedTitle": "On Graph Coloring Analysis Through Visualization", "abstract": "The focus of the presented article is put on the analysis of edge coloring of selected sets of graphs - we are specifically interested in edge 3-coloring of graphs called snarks. Previous research suggests, that while using a single coloring algorithm and using various initial graph coloring edges, coloring of such graph may take anywhere from time lower than one millisecond to the time ranging in hundreds of milliseconds. In our case, we use recursive backtracking coloring algorithm based on breadth-first search and implement the change of initial graph coloring edge via permutation of adjacency matrix of graph. In this article, we present a tool created for the needs of analysis of edge coloring of graphs which is based on visualization of edge coloring and we present several problematic subgraphs and patterns which increase the time of edge coloring of cubic graphs.", "abstracts": [ { "abstractType": "Regular", "content": "The focus of the presented article is put on the analysis of edge coloring of selected sets of graphs - we are specifically interested in edge 3-coloring of graphs called snarks. Previous research suggests, that while using a single coloring algorithm and using various initial graph coloring edges, coloring of such graph may take anywhere from time lower than one millisecond to the time ranging in hundreds of milliseconds. In our case, we use recursive backtracking coloring algorithm based on breadth-first search and implement the change of initial graph coloring edge via permutation of adjacency matrix of graph. In this article, we present a tool created for the needs of analysis of edge coloring of graphs which is based on visualization of edge coloring and we present several problematic subgraphs and patterns which increase the time of edge coloring of cubic graphs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The focus of the presented article is put on the analysis of edge coloring of selected sets of graphs - we are specifically interested in edge 3-coloring of graphs called snarks. Previous research suggests, that while using a single coloring algorithm and using various initial graph coloring edges, coloring of such graph may take anywhere from time lower than one millisecond to the time ranging in hundreds of milliseconds. In our case, we use recursive backtracking coloring algorithm based on breadth-first search and implement the change of initial graph coloring edge via permutation of adjacency matrix of graph. In this article, we present a tool created for the needs of analysis of edge coloring of graphs which is based on visualization of edge coloring and we present several problematic subgraphs and patterns which increase the time of edge coloring of cubic graphs.", "fno": "09497524", "keywords": [ "Computational Complexity", "Data Visualisation", "Graph Colouring", "Edge Coloring", "Cubic Graphs", "Graph Coloring Analysis", "Edge 3 Coloring", "Graphs Called Snarks", "Single Coloring Algorithm", "Recursive Backtracking Coloring Algorithm", "Graph Coloring Edge", "Adjacency Matrix", "Visualization", "Analytical Models", "Computational Modeling", "Fitting", "Tools", "User Interfaces", "Search Problems" ], "authors": [ { "affiliation": "Matej Bel University,Faculty of Natural Sciences,Department of Computer Science,Banská Bystrica,Slovakia", "fullName": "Adam Dudáš", "givenName": "Adam", "surname": "Dudáš", "__typename": "ArticleAuthorType" }, { "affiliation": "Matej Bel University,Faculty of Natural Sciences,Department of Computer Science,Banská Bystrica,Slovakia", "fullName": "Jarmila Škrinárová", "givenName": "Jarmila", "surname": "Škrinárová", "__typename": "ArticleAuthorType" }, { "affiliation": "Matej Bel University,Faculty of Natural Sciences,Department of Computer Science,Banská Bystrica,Slovakia", "fullName": "Adam Kiss", "givenName": "Adam", "surname": "Kiss", "__typename": "ArticleAuthorType" } ], "idPrefix": "idt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "65-72", "year": "2021", "issn": null, "isbn": "978-1-6654-3692-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09497640", "articleId": "1vF15oa71Ze", "__typename": "AdjacentArticleType" }, "next": { "fno": "09497520", "articleId": "1vF1adaxn2M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/focs/1994/6580/0/0365710", "title": "Approximate graph coloring by semidefinite programming", "doi": null, "abstractUrl": "/proceedings-article/focs/1994/0365710/12OmNqJZgDA", "parentPublication": { "id": "proceedings/focs/1994/6580/0", "title": "Proceedings 35th Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saso/2010/4232/0/4232a174", "title": "Distributed Generalized Graph Coloring", "doi": null, "abstractUrl": "/proceedings-article/saso/2010/4232a174/12OmNwdtw6j", "parentPublication": { "id": "proceedings/saso/2010/4232/0", "title": "2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2007/2791/0/27910093", "title": "Distributed Functional Compression through Graph Coloring", "doi": null, "abstractUrl": "/proceedings-article/dcc/2007/27910093/12OmNwkzus2", "parentPublication": { "id": "proceedings/dcc/2007/2791/0", "title": "2007 Data Compression Conference (DCC'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2009/3914/0/3914a312", "title": "A Self-Stabilizing (delta+ 1)- Edge-Coloring Algorithm of Arbitrary Graphs", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2009/3914a312/12OmNwp74Hv", "parentPublication": { "id": "proceedings/pdcat/2009/3914/0", "title": "2009 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2006/2636/0/26360082", "title": "Generalized Edge Coloring for Channel Assignment in Wireless Networks", "doi": null, "abstractUrl": "/proceedings-article/icpp/2006/26360082/12OmNxR5UO1", "parentPublication": { "id": "proceedings/icpp/2006/2636/0", "title": "2006 International Conference on Parallel Processing (ICPP'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2018/7308/0/08644624", "title": "Efficient Algorithms for Graph Coloring on GPU", "doi": null, "abstractUrl": "/proceedings-article/icpads/2018/08644624/17QjJcBGChc", "parentPublication": { "id": "proceedings/icpads/2018/7308/0", "title": "2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/qe/2022/01/09713701", "title": "A Grover Search-Based Algorithm for the List Coloring Problem", "doi": null, "abstractUrl": "/journal/qe/2022/01/09713701/1B4gKqy3Q7S", "parentPublication": { "id": "trans/qe", "title": "IEEE Transactions on Quantum Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2022/1041/0/10051806", "title": "Independent Sets Extraction Graph Coloring Algorithm Using Beam Search", "doi": null, "abstractUrl": "/proceedings-article/snpd/2022/10051806/1LiNVgnYNAQ", "parentPublication": { "id": "proceedings/snpd/2022/1041/0", "title": "2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eei/2019/4076/0/407600a430", "title": "On the Vertex-Distinguishing Equitable Edge Coloring of Product Graph", "doi": null, "abstractUrl": "/proceedings-article/eei/2019/407600a430/1hrJurjyWhW", "parentPublication": { "id": "proceedings/eei/2019/4076/0", "title": "2019 International Conference on Electronic Engineering and Informatics (EEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/llvm-hpc-hipar/2020/1042/0/104200a023", "title": "Deep Learning-based Approximate Graph-Coloring Algorithm for Register Allocation", "doi": null, "abstractUrl": "/proceedings-article/llvm-hpc-hipar/2020/104200a023/1qiVYmGuduo", "parentPublication": { "id": "proceedings/llvm-hpc-hipar/2020/1042/0", "title": "2020 IEEE/ACM 6th Workshop on the LLVM Compiler Infrastructure in HPC (LLVM-HPC) and Workshop on Hierarchical Parallelism for Exascale Computing (HiPar)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFul", "title": "2014 18th International Conference on Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNB1eJxU", "doi": "10.1109/IV.2014.36", "title": "Semantic Blossom Graph: A New Approach for Visual Graph Exploration", "normalizedTitle": "Semantic Blossom Graph: A New Approach for Visual Graph Exploration", "abstract": "Graphs are widely used to represent relationships between entities. Indeed, their simplicity in depicting connectedness backed by a mathematical formalism, make graphs an ideal metaphor to convey relatedness between entities irrespective of the domain. However, graphs pose several challenges for visual analysis. A large number of entities or a densely connected set quickly render the graph unreadable due to clutter. Typed relationships leading to multigraphs cannot clearly be represented in hierarchical layout or edge bundling, common clutter reduction techniques. We propose a novel approach to visual analysis of complex graphs based on two metaphors: semantic blossom and selective expansion. Instead of showing the whole graph, we display only a small representative subset of nodes, each with a compressed summary of relations in a semantic blossom. Users apply selective expansion to traverse the graph and discover the subset of interest. A preliminary evaluation showed that our approach is intuitive and useful for graph exploration and provided insightful ideas for future improvements.", "abstracts": [ { "abstractType": "Regular", "content": "Graphs are widely used to represent relationships between entities. Indeed, their simplicity in depicting connectedness backed by a mathematical formalism, make graphs an ideal metaphor to convey relatedness between entities irrespective of the domain. However, graphs pose several challenges for visual analysis. A large number of entities or a densely connected set quickly render the graph unreadable due to clutter. Typed relationships leading to multigraphs cannot clearly be represented in hierarchical layout or edge bundling, common clutter reduction techniques. We propose a novel approach to visual analysis of complex graphs based on two metaphors: semantic blossom and selective expansion. Instead of showing the whole graph, we display only a small representative subset of nodes, each with a compressed summary of relations in a semantic blossom. Users apply selective expansion to traverse the graph and discover the subset of interest. A preliminary evaluation showed that our approach is intuitive and useful for graph exploration and provided insightful ideas for future improvements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graphs are widely used to represent relationships between entities. Indeed, their simplicity in depicting connectedness backed by a mathematical formalism, make graphs an ideal metaphor to convey relatedness between entities irrespective of the domain. However, graphs pose several challenges for visual analysis. A large number of entities or a densely connected set quickly render the graph unreadable due to clutter. Typed relationships leading to multigraphs cannot clearly be represented in hierarchical layout or edge bundling, common clutter reduction techniques. We propose a novel approach to visual analysis of complex graphs based on two metaphors: semantic blossom and selective expansion. Instead of showing the whole graph, we display only a small representative subset of nodes, each with a compressed summary of relations in a semantic blossom. Users apply selective expansion to traverse the graph and discover the subset of interest. A preliminary evaluation showed that our approach is intuitive and useful for graph exploration and provided insightful ideas for future improvements.", "fno": "4103a234", "keywords": [ "Semantics", "Layout", "Visualization", "Navigation", "Clutter", "Data Mining", "Data Visualization", "Selective Close", "Graph Visualization", "Graph Interaction", "Graph Navigation", "Node Properties", "Selective Expansion", "Blossom Expansion" ], "authors": [ { "affiliation": null, "fullName": "Manuela Rauch", "givenName": "Manuela", "surname": "Rauch", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ralph Wozelka", "givenName": "Ralph", "surname": "Wozelka", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eduardo Veas", "givenName": "Eduardo", "surname": "Veas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vedran Sabol", "givenName": "Vedran", "surname": "Sabol", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "234-240", "year": "2014", "issn": "1550-6037", "isbn": "978-1-4799-4103-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4103a225", "articleId": "12OmNvjQ92N", "__typename": "AdjacentArticleType" }, "next": { "fno": "4103a241", "articleId": "12OmNy6Zs1w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2013/4797/0/06596128", "title": "Visual summaries for graph collections", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596128/12OmNs5rkPo", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a019", "title": "Graph Exploration by Multiple Linked Metric Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a019/12OmNscfI0S", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a259", "title": "Fast Graph Drawing Algorithm Revealing Networks Cores", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a259/12OmNznCl21", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a230", "title": "Dynamic Graph Visualization on Different Temporal Granularities", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a230/12OmNzxPTGk", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/10/08673661", "title": "Eiffel: Evolutionary Flow Map for Influence Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/10/08673661/18LF7Q1L3na", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a081", "title": "Untangling Force-Directed Layouts Using Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a081/1J2XKiZs7xS", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807379", "title": "Persistent Homology Guided Force-Directed Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a248", "title": "Time-Aligned Edge Plots for Dynamic Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a248/1rSR9vG2u4w", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a111", "title": "Intercept Graph: An Interactive Radial Visualization for Comparison of State Changes", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a111/1yXue1y8TAI", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC1g", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "acronym": "wcre", "groupId": "1000635", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBTs7G5", "doi": "10.1109/WCRE.2013.6671314", "title": "On the effect of program exploration on maintenance tasks", "normalizedTitle": "On the effect of program exploration on maintenance tasks", "abstract": "When developers perform a maintenance task, they follow an exploration strategy (ES) that is characterised by how they navigate through the program entities. Studying ES can help to assess how developers understand a program and perform a change task. Various factors could influence how developers explore a program and the way in which they explore a program may affect their performance for a certain task. In this paper, we investigate the ES followed by developers during maintenance tasks and assess the impact of these ES on the duration and effort spent by developers on the tasks. We want to know if developers frequently revisit one (or a set) of program entities (referenced exploration), or if they visit program entities with almost the same frequency (unreferenced exploration) when performing a maintenance task. We mine 1,705 Mylyn interaction histories (IH) from four open-source projects (ECF, Mylyn, PDE, and Eclipse Platform) and perform a user study to verify if both referenced exploration (RE) and unreferenced exploration (UE) were followed by some developers. Using the Gini inequality index on the number of revisits of program entities, we automatically classify interaction histories as RE and UE and perform an empirical study to measure the effect of program exploration on the task duration and effort. We report that, although a UE may require more exploration effort than a RE, a UE is on average 12.30% less time consuming than a RE.", "abstracts": [ { "abstractType": "Regular", "content": "When developers perform a maintenance task, they follow an exploration strategy (ES) that is characterised by how they navigate through the program entities. Studying ES can help to assess how developers understand a program and perform a change task. Various factors could influence how developers explore a program and the way in which they explore a program may affect their performance for a certain task. In this paper, we investigate the ES followed by developers during maintenance tasks and assess the impact of these ES on the duration and effort spent by developers on the tasks. We want to know if developers frequently revisit one (or a set) of program entities (referenced exploration), or if they visit program entities with almost the same frequency (unreferenced exploration) when performing a maintenance task. We mine 1,705 Mylyn interaction histories (IH) from four open-source projects (ECF, Mylyn, PDE, and Eclipse Platform) and perform a user study to verify if both referenced exploration (RE) and unreferenced exploration (UE) were followed by some developers. Using the Gini inequality index on the number of revisits of program entities, we automatically classify interaction histories as RE and UE and perform an empirical study to measure the effect of program exploration on the task duration and effort. We report that, although a UE may require more exploration effort than a RE, a UE is on average 12.30% less time consuming than a RE.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When developers perform a maintenance task, they follow an exploration strategy (ES) that is characterised by how they navigate through the program entities. Studying ES can help to assess how developers understand a program and perform a change task. Various factors could influence how developers explore a program and the way in which they explore a program may affect their performance for a certain task. In this paper, we investigate the ES followed by developers during maintenance tasks and assess the impact of these ES on the duration and effort spent by developers on the tasks. We want to know if developers frequently revisit one (or a set) of program entities (referenced exploration), or if they visit program entities with almost the same frequency (unreferenced exploration) when performing a maintenance task. We mine 1,705 Mylyn interaction histories (IH) from four open-source projects (ECF, Mylyn, PDE, and Eclipse Platform) and perform a user study to verify if both referenced exploration (RE) and unreferenced exploration (UE) were followed by some developers. Using the Gini inequality index on the number of revisits of program entities, we automatically classify interaction histories as RE and UE and perform an empirical study to measure the effect of program exploration on the task duration and effort. We report that, although a UE may require more exploration effort than a RE, a UE is on average 12.30% less time consuming than a RE.", "fno": "06671314", "keywords": [ "History", "Maintenance Engineering", "Indexes", "Java", "Manuals", "Interrupters", "Navigation", "Mylyn", "Software Maintenance", "Program Exploration", "Interaction Histories", "Exploration Strategies" ], "authors": [ { "affiliation": "Ptidej Team, DGIGL, École Polytechnique de Montréal, Canada", "fullName": "Zephyrin Soh", "givenName": "Zephyrin", "surname": "Soh", "__typename": "ArticleAuthorType" }, { "affiliation": "SWAT, DGIGL, École Polytechnique de Montréal, Canada", "fullName": "Foutse Khomh", "givenName": "Foutse", "surname": "Khomh", "__typename": "ArticleAuthorType" }, { "affiliation": "Ptidej Team, DGIGL, École Polytechnique de Montréal, Canada", "fullName": "Yann-Gael Gueheneuc", "givenName": "Yann-Gael", "surname": "Gueheneuc", "__typename": "ArticleAuthorType" }, { "affiliation": "Soccer Lab, DGIGL, École Polytechnique de Montréal, Canada", "fullName": "Giuliano Antoniol", "givenName": "Giuliano", "surname": "Antoniol", "__typename": "ArticleAuthorType" }, { "affiliation": "MCIS, DGIGL, École Polytechnique de Montréal, Canada", "fullName": "Bram Adams", "givenName": "Bram", "surname": "Adams", "__typename": "ArticleAuthorType" } ], "idPrefix": "wcre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "391-400", "year": "2013", "issn": null, "isbn": "978-1-4799-2931-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06671313", "articleId": "12OmNwcl7JS", "__typename": "AdjacentArticleType" }, "next": { "fno": "06671315", "articleId": "12OmNrJiCYw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2011/4398/0/4398a193", "title": "Faceted Navigation for Software Exploration", "doi": null, "abstractUrl": "/proceedings-article/icpc/2011/4398a193/12OmNAo45FL", "parentPublication": { "id": "proceedings/icpc/2011/4398/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2009/3998/0/05090069", "title": "Structure transition graphs: An ECG for program comprehension?", "doi": null, "abstractUrl": "/proceedings-article/icpc/2009/05090069/12OmNBqdr4l", "parentPublication": { "id": "proceedings/icpc/2009/3998/0", "title": "2009 IEEE 17th International Conference on Program Comprehension (ICPC 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227238", "title": "WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227238/12OmNsdo6qb", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2017/3681/0/3681a642", "title": "Facilitating Scenario-Based Program Comprehension with Topic Models", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a642/12OmNwqx4aW", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2013/2931/0/06671290", "title": "Towards understanding how developers spend their effort during maintenance activities", "doi": null, "abstractUrl": "/proceedings-article/wcre/2013/06671290/12OmNxXCGOC", "parentPublication": { "id": "proceedings/wcre/2013/2931/0", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606622", "title": "Improving feature location practice with multi-faceted interactive exploration", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606622/12OmNyoiYZf", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2008/02/tts2008020197", "title": "The Effect of Pairs in Program Design Tasks", "doi": null, "abstractUrl": "/journal/ts/2008/02/tts2008020197/13rRUB6Sq2d", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2006/12/e0971", "title": "An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks", "doi": null, "abstractUrl": "/journal/ts/2006/12/e0971/13rRUILLkx7", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440813", "title": "Structure-Based Suggestive Exploration: A New Approach for Effective Exploration of Large Networks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440813/17D45VTRoqr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2006/12/04016573", "title": "An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks", "doi": null, "abstractUrl": "/journal/ts/2006/12/04016573/1AUkpgFs0gM", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBcb", "title": "2013 35th International Conference on Software Engineering (ICSE)", "acronym": "icse", "groupId": "1000691", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNyoiYZf", "doi": "10.1109/ICSE.2013.6606622", "title": "Improving feature location practice with multi-faceted interactive exploration", "normalizedTitle": "Improving feature location practice with multi-faceted interactive exploration", "abstract": "Feature location is a human-oriented and information-intensive process. When performing feature location tasks with existing tools, developers often feel it difficult to formulate an accurate feature query (e.g., keywords) and determine the relevance of returned results. In this paper, we propose a feature location approach that supports multi-faceted interactive program exploration. Our approach automatically extracts and mines multiple syntactic and semantic facets from candidate program elements. Furthermore, it allows developers to interactively group, sort, and filter feature location results in a centralized, multi-faceted, and intelligent search User Interface (UI). We have implemented our approach as a web-based tool MFIE and conducted an experimental study. The results show that the developers using MFIE can accomplish their feature location tasks 32% faster and the quality of their feature location results (in terms of F-measure) is 51% higher than that of the developers using regular Eclipse IDE.", "abstracts": [ { "abstractType": "Regular", "content": "Feature location is a human-oriented and information-intensive process. When performing feature location tasks with existing tools, developers often feel it difficult to formulate an accurate feature query (e.g., keywords) and determine the relevance of returned results. In this paper, we propose a feature location approach that supports multi-faceted interactive program exploration. Our approach automatically extracts and mines multiple syntactic and semantic facets from candidate program elements. Furthermore, it allows developers to interactively group, sort, and filter feature location results in a centralized, multi-faceted, and intelligent search User Interface (UI). We have implemented our approach as a web-based tool MFIE and conducted an experimental study. The results show that the developers using MFIE can accomplish their feature location tasks 32% faster and the quality of their feature location results (in terms of F-measure) is 51% higher than that of the developers using regular Eclipse IDE.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Feature location is a human-oriented and information-intensive process. When performing feature location tasks with existing tools, developers often feel it difficult to formulate an accurate feature query (e.g., keywords) and determine the relevance of returned results. In this paper, we propose a feature location approach that supports multi-faceted interactive program exploration. Our approach automatically extracts and mines multiple syntactic and semantic facets from candidate program elements. Furthermore, it allows developers to interactively group, sort, and filter feature location results in a centralized, multi-faceted, and intelligent search User Interface (UI). We have implemented our approach as a web-based tool MFIE and conducted an experimental study. The results show that the developers using MFIE can accomplish their feature location tasks 32% faster and the quality of their feature location results (in terms of F-measure) is 51% higher than that of the developers using regular Eclipse IDE.", "fno": "06606622", "keywords": [ "Semantics", "History", "Navigation", "Syntactics", "Feature Extraction", "Java", "Educational Institutions" ], "authors": [ { "affiliation": "School of Computer Science, Fudan University, Shanghai, China", "fullName": "Jinshui Wang", "givenName": "Jinshui", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Fudan University, Shanghai, China", "fullName": "Xin Peng", "givenName": "Xin", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering, Nanyang Technological University, Singapore", "fullName": "Zhenchang Xing", "givenName": "Zhenchang", "surname": "Xing", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Fudan University, Shanghai, China", "fullName": "Wenyun Zhao", "givenName": "Wenyun", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-05-01T00:00:00", "pubType": "proceedings", "pages": "762-771", "year": "2013", "issn": null, "isbn": "978-1-4673-3073-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06606621", "articleId": "12OmNyyO8P6", "__typename": "AdjacentArticleType" }, "next": { "fno": "06606623", "articleId": "12OmNqBbHDj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/apsec/2013/2144/1/2144a299", "title": "Detecting Program Changes from Edit History of Source Code", "doi": null, "abstractUrl": "/proceedings-article/apsec/2013/2144a299/12OmNAFFdEX", "parentPublication": { "id": "proceedings/apsec/2013/2144/1", "title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2017/3238/0/3238a061", "title": "Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process", "doi": null, "abstractUrl": "/proceedings-article/scam/2017/3238a061/12OmNAlvI3P", "parentPublication": { "id": "proceedings/scam/2017/3238/0", "title": "2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2011/4398/0/4398a193", "title": "Faceted Navigation for Software Exploration", "doi": null, "abstractUrl": "/proceedings-article/icpc/2011/4398a193/12OmNAo45FL", "parentPublication": { "id": "proceedings/icpc/2011/4398/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2013/2931/0/06671314", "title": "On the effect of program exploration on maintenance tasks", "doi": null, "abstractUrl": "/proceedings-article/wcre/2013/06671314/12OmNBTs7G5", "parentPublication": { "id": "proceedings/wcre/2013/2931/0", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2013/4981/0/4981a408", "title": "Which Feature Location Technique is Better?", "doi": null, "abstractUrl": "/proceedings-article/icsm/2013/4981a408/12OmNCcbEeQ", "parentPublication": { "id": "proceedings/icsm/2013/4981/0", "title": "2013 IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2012/4794/0/4794a221", "title": "Faceted Navigation on Text", "doi": null, "abstractUrl": "/proceedings-article/skg/2012/4794a221/12OmNCeK2da", "parentPublication": { "id": "proceedings/skg/2012/4794/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a499", "title": "Constraints Based Approach to Interactive Feature Location", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a499/12OmNwcUjPv", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2015/8159/0/8159a151", "title": "Rethinking User Interfaces for Feature Location", "doi": null, "abstractUrl": "/proceedings-article/icpc/2015/8159a151/12OmNwwMf1C", "parentPublication": { "id": "proceedings/icpc/2015/8159/0", "title": "2015 IEEE 23rd International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122080", "title": "Interactive Exploration of Implicit and Explicit Relations in Faceted Datasets", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122080/13rRUwI5U2F", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csf/2020/6572/0/09155136", "title": "Abstracting Faceted Execution", "doi": null, "abstractUrl": "/proceedings-article/csf/2020/09155136/1m1jO4CtFi8", "parentPublication": { "id": "proceedings/csf/2020/6572/0", "title": "2020 IEEE 33rd Computer Security Foundations Symposium (CSF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AjSWMljRoA", "title": "2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AjTiZB2YqA", "doi": "10.1109/ASE51524.2021.9678703", "title": "Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement Learning", "normalizedTitle": "Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement Learning", "abstract": "Discovering the underlying structure of HMI software efficiently and sufficiently for the purpose of testing without any prior knowledge on the software logic remains a difficult problem. The key challenge lies in the complexity of the HMI software and the high variance in the coverage of current methods. In this paper, we introduce the PathFinder, an effective and automatic HMI software exploration framework. PathFinder adopts a curiosity-based reinforcement learning framework to choose actions that lead to the discovery of more unknown states. Additionally, PathFinder progressively builds a navigation model during the exploration to further improve state coverage. We have conducted experiments on both simulations and real-world HMI software testing environment, which comprise a full tool chain of automobile dashboard instrument cluster. The exploration coverage outperforms manual and fuzzing methods which are the current industrial standards.", "abstracts": [ { "abstractType": "Regular", "content": "Discovering the underlying structure of HMI software efficiently and sufficiently for the purpose of testing without any prior knowledge on the software logic remains a difficult problem. The key challenge lies in the complexity of the HMI software and the high variance in the coverage of current methods. In this paper, we introduce the PathFinder, an effective and automatic HMI software exploration framework. PathFinder adopts a curiosity-based reinforcement learning framework to choose actions that lead to the discovery of more unknown states. Additionally, PathFinder progressively builds a navigation model during the exploration to further improve state coverage. We have conducted experiments on both simulations and real-world HMI software testing environment, which comprise a full tool chain of automobile dashboard instrument cluster. The exploration coverage outperforms manual and fuzzing methods which are the current industrial standards.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Discovering the underlying structure of HMI software efficiently and sufficiently for the purpose of testing without any prior knowledge on the software logic remains a difficult problem. The key challenge lies in the complexity of the HMI software and the high variance in the coverage of current methods. In this paper, we introduce the PathFinder, an effective and automatic HMI software exploration framework. PathFinder adopts a curiosity-based reinforcement learning framework to choose actions that lead to the discovery of more unknown states. Additionally, PathFinder progressively builds a navigation model during the exploration to further improve state coverage. We have conducted experiments on both simulations and real-world HMI software testing environment, which comprise a full tool chain of automobile dashboard instrument cluster. The exploration coverage outperforms manual and fuzzing methods which are the current industrial standards.", "fno": "033700b151", "keywords": [ "Knowledge Engineering", "Industries", "Q Learning", "Navigation", "Instruments", "Manuals", "Software", "Test Automation", "HMI Software Exploration", "Reinforcement Learning", "Curiosity" ], "authors": [ { "affiliation": "Nanyang Technological University,Continental-NTU Corporate Lab,Singapore", "fullName": "Yushi Cao", "givenName": "Yushi", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,Continental-NTU Corporate Lab,Singapore", "fullName": "Yan Zheng", "givenName": "Yan", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,Continental-NTU Corporate Lab,Singapore", "fullName": "Shang-Wei Lin", "givenName": "Shang-Wei", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,Continental-NTU Corporate Lab,Singapore", "fullName": "Yang Liu", "givenName": "Yang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Continental Automotive Singapore Pte. Ltd.,Singapore", "fullName": "Yon Shin Teo", "givenName": "Yon Shin", "surname": "Teo", "__typename": "ArticleAuthorType" }, { "affiliation": "Continental Automotive Singapore Pte. Ltd.,Singapore", "fullName": "Yuxuan Toh", "givenName": "Yuxuan", "surname": "Toh", "__typename": "ArticleAuthorType" }, { "affiliation": "Continental Automotive Singapore Pte. Ltd.,Singapore", "fullName": "Vinay Vishnumurthy Adiga", "givenName": "Vinay Vishnumurthy", "surname": "Adiga", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "1151-1155", "year": "2021", "issn": null, "isbn": "978-1-6654-0337-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "033700b146", "articleId": "1AjTikHXrKo", "__typename": "AdjacentArticleType" }, "next": { "fno": "033700b156", "articleId": "1AjTkz6g9AA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2011/4398/0/4398a193", "title": "Faceted Navigation for Software Exploration", "doi": null, "abstractUrl": "/proceedings-article/icpc/2011/4398a193/12OmNAo45FL", "parentPublication": { "id": "proceedings/icpc/2011/4398/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2013/2931/0/06671314", "title": "On the effect of program exploration on maintenance tasks", "doi": null, "abstractUrl": "/proceedings-article/wcre/2013/06671314/12OmNBTs7G5", "parentPublication": { "id": "proceedings/wcre/2013/2931/0", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2006/09/e0753", "title": "The SEXTANT Software Exploration Tool", "doi": null, "abstractUrl": "/journal/ts/2006/09/e0753/13rRUxASud9", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ica/2018/8180/0/08460067", "title": "Probabilistic Guided Exploration for Reinforcement Learning in Self-Organizing Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/ica/2018/08460067/13xI8B5Z80x", "parentPublication": { "id": "proceedings/ica/2018/8180/0", "title": "2018 IEEE International Conference on Agents (ICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440813", "title": "Structure-Based Suggestive Exploration: A New Approach for Effective Exploration of Large Networks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440813/17D45VTRoqr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09858908", "title": "Accelerating Reinforcement Learning-Based CCSL Specification Synthesis Using Curiosity-Driven Exploration", "doi": null, "abstractUrl": "/journal/tc/2023/05/09858908/1FUYCFXxlaU", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10018538", "title": "Reinforcement Learning based Path Exploration for Sequential Explainable Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/10018538/1K0DzwmJ4fm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a149", "title": "Visualisation of Swarm Metrics on a Handheld Device for Human-Swarm Interaction", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a149/1KaH69goyys", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2020/9919/0/991900a465", "title": "Efficient Exploration by Decision Making Considering Curiosity and Episodic Memory in Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/candarw/2020/991900a465/1rqEGOx58YM", "parentPublication": { "id": "proceedings/candarw/2020/9919/0", "title": "2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600a423", "title": "Automatic Web Testing Using Curiosity-Driven Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600a423/1sEXo1q6yUo", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yfxDjRGMmc", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeQD2GH6Wk", "doi": "10.1109/ISMAR-Adjunct54149.2021.00089", "title": "Fisheye vs Rubber Sheet: Supporting Visual Search and Fine Motor Skills in Augmented Reality", "normalizedTitle": "Fisheye vs Rubber Sheet: Supporting Visual Search and Fine Motor Skills in Augmented Reality", "abstract": "Fisheye and rubber sheet are common magnifying methods in information visualization. In this paper, we present two experiments about their performance in AR scenarios: visual search and fine motor manipulation. We also included baseline conditions without any magnification. For all magnified views, the size and shape of the magnified region were constant and we evaluated performance based on completion time and accuracy. Our results show that visual distortions of our magnifiers do not significantly decrease performance; our insights will be a reference for projects that require magnified AR views.", "abstracts": [ { "abstractType": "Regular", "content": "Fisheye and rubber sheet are common magnifying methods in information visualization. In this paper, we present two experiments about their performance in AR scenarios: visual search and fine motor manipulation. We also included baseline conditions without any magnification. For all magnified views, the size and shape of the magnified region were constant and we evaluated performance based on completion time and accuracy. Our results show that visual distortions of our magnifiers do not significantly decrease performance; our insights will be a reference for projects that require magnified AR views.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fisheye and rubber sheet are common magnifying methods in information visualization. In this paper, we present two experiments about their performance in AR scenarios: visual search and fine motor manipulation. We also included baseline conditions without any magnification. For all magnified views, the size and shape of the magnified region were constant and we evaluated performance based on completion time and accuracy. Our results show that visual distortions of our magnifiers do not significantly decrease performance; our insights will be a reference for projects that require magnified AR views.", "fno": "129800a389", "keywords": [ "Augmented Reality", "Data Visualisation", "Visual Distortions", "Fisheye", "Rubber Sheet", "Visual Search", "Fine Motor Skills", "Augmented Reality", "Information Visualization", "Fine Motor Manipulation", "Magnifying Methods", "AR View", "Visualization", "Shape", "Distortion", "Rubber", "Augmented Reality", "Computing Methodologies", "Computer Graphics", "Graphics Systems And Interfaces", "Mixed Augmented Reality" ], "authors": [ { "affiliation": "City University of Hong Kong,School of Creative Media", "fullName": "Qiaochu Wang", "givenName": "Qiaochu", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong,School of Creative Media", "fullName": "Christian Sandor", "givenName": "Christian", "surname": "Sandor", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "389-390", "year": "2021", "issn": null, "isbn": "978-1-6654-1298-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "129800a387", "articleId": "1yeQDGki96U", "__typename": "AdjacentArticleType" }, "next": { "fno": "129800a391", "articleId": "1yeQOxGvsPK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vl/1993/3970/0/00269620", "title": "Layout-independent fisheye views of nested graphs", "doi": null, "abstractUrl": "/proceedings-article/vl/1993/00269620/12OmNvq5jzV", "parentPublication": { "id": "proceedings/vl/1993/3970/0", "title": "Proceedings 1993 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240249", "title": "Augmented Reality for Urban Skills Training", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240249/12OmNx4yvB1", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a217", "title": "Fisheye Lens Distortion Correction Based on an Ellipsoidal Function Model", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a217/12OmNzVXNRA", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192681", "title": "SchemeLens: A Content-Aware Vector-Based Fisheye Technique for Navigating Large Systems Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192681/13rRUxC0SEi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101771", "title": "Fisheye Video Correction", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101771/13rRUxC0SW8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440835", "title": "Structure-aware Fisheye Views for Efficient Large Graph Exploration", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440835/17D45XwUAL3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699200", "title": "Effective Free Field of View Scene Exploration in VR and AR", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699200/19F1SrRS4vK", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a640", "title": "An Evaluation of Caret Navigation Methods for Text Editing in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a640/1J7W8cdLJeg", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798267", "title": "MonoEye: Monocular Fisheye Camera-based 3D Human Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798267/1cJ0RUiTm8g", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b174", "title": "Deep Single Fisheye Image Camera Calibration for Over 180-degree Projection of Field of View", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b174/1yNinwg4Lvy", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzUPpvk", "title": "2010 IEEE International Conference on Data Mining Workshops", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNvlg8nK", "doi": "10.1109/ICDMW.2010.192", "title": "A Visual Analytics Tool for Analysing Microarray Data", "normalizedTitle": "A Visual Analytics Tool for Analysing Microarray Data", "abstract": "This paper presents a new visual analytics tool for analysing microarray data with several thousands of attributes. The tool includes two components 1) automated data analysis and 2) interactive visualization. Automated data analysis is used to reduce of the amount of attributes, through the construction of data groups and principle component analysis (PCA). Interactive visualization provides an interface that allows the user to explore the variables of these data groups and to extract more information from all the attributes", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a new visual analytics tool for analysing microarray data with several thousands of attributes. The tool includes two components 1) automated data analysis and 2) interactive visualization. Automated data analysis is used to reduce of the amount of attributes, through the construction of data groups and principle component analysis (PCA). Interactive visualization provides an interface that allows the user to explore the variables of these data groups and to extract more information from all the attributes", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a new visual analytics tool for analysing microarray data with several thousands of attributes. The tool includes two components 1) automated data analysis and 2) interactive visualization. Automated data analysis is used to reduce of the amount of attributes, through the construction of data groups and principle component analysis (PCA). Interactive visualization provides an interface that allows the user to explore the variables of these data groups and to extract more information from all the attributes", "fno": "4257a388", "keywords": [ "Visual Analytics", "Data Visualization", "Data Exploration", "Multi Dimensional Data", "Scatter Plot" ], "authors": [ { "affiliation": null, "fullName": "Martin Amélie", "givenName": "Martin", "surname": "Amélie", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Monique Noirhomme-Fraiture", "givenName": "Monique", "surname": "Noirhomme-Fraiture", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Quang Vinh Nguyen", "givenName": "Quang Vinh", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Simeon Simoff", "givenName": "Simeon", "surname": "Simoff", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "388-395", "year": "2010", "issn": null, "isbn": "978-0-7695-4257-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4257a380", "articleId": "12OmNzvhvyb", "__typename": "AdjacentArticleType" }, "next": { "fno": "4257a396", "articleId": "12OmNzFdtaR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ldav/2014/5215/0/07013208", "title": "Visual analytics of large-scale climate model data", "doi": null, "abstractUrl": "/proceedings-article/ldav/2014/07013208/12OmNA14Aga", "parentPublication": { "id": "proceedings/ldav/2014/5215/0", "title": "2014 IEEE 4th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2018/1424/0/142401a160", "title": "Visual Analytics for Networked-Guarantee Loans Risk Management", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a160/12OmNBpVPS1", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b495", "title": "A Role for Reasoning in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b495/12OmNqJ8tq4", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/04/mcg2013040022", "title": "Customizing Computational Methods for Visual Analytics with Big Data", "doi": null, "abstractUrl": "/magazine/cg/2013/04/mcg2013040022/13rRUB7a1ij", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/01/mcg2017010100", "title": "Sampling for Scalable Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2017/01/mcg2017010100/13rRUxBa5pi", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122310", "title": "Flexible Linked Axes for Multivariate Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122310/13rRUxD9h54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192649", "title": "VA<sup>2</sup>: A Visual Analytics Approach for Evaluating Visual Analytics Applications", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192649/13rRUzp02op", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09906970", "title": "Tac-Trainer: A Visual Analytics System for IoT-based Racket Sports Training", "doi": null, "abstractUrl": "/journal/tg/2023/01/09906970/1H5EW63diWA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08984335", "title": "PeckVis: A Visual Analytics Tool to Analyze Dominance Hierarchies in Small Groups", "doi": null, "abstractUrl": "/journal/tg/2020/04/08984335/1haTxOaV8eA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09246282", "title": "P6: A Declarative Language for Integrating Machine Learning in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09246282/1olDLxl43Qc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4Iy", "title": "Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)", "acronym": "wetice", "groupId": "1000265", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNwbLVpB", "doi": "10.1109/ENABL.1999.805184", "title": "Component Architecture for Building Web-Based Synchronous Collaboration Systems", "normalizedTitle": "Component Architecture for Building Web-Based Synchronous Collaboration Systems", "abstract": "The component technology gains popularity as its benefits, the reusability and the simplicity of use become more and more evident. In this paper we demonstrate how component technology can be effectively applied to the process of building collaborative applications in the Web environment. In order to support development of collaborative tools the components must satisfy a set of requirements inherent for a synchronous collaboration environment.The distribution of arbitrary events and objects, the access to the collaborative session state, and the means of synchronizing operations on the shared resources must be provided. Tango Beans is a set of components based on the Tango Interactive framework that has been implemented to facilitate rapid development of collaborative applications. We explain how Tango Beans work and how they can be used to develop collaborative tools for synchronous distance learning and Web conferencing.", "abstracts": [ { "abstractType": "Regular", "content": "The component technology gains popularity as its benefits, the reusability and the simplicity of use become more and more evident. In this paper we demonstrate how component technology can be effectively applied to the process of building collaborative applications in the Web environment. In order to support development of collaborative tools the components must satisfy a set of requirements inherent for a synchronous collaboration environment.The distribution of arbitrary events and objects, the access to the collaborative session state, and the means of synchronizing operations on the shared resources must be provided. Tango Beans is a set of components based on the Tango Interactive framework that has been implemented to facilitate rapid development of collaborative applications. We explain how Tango Beans work and how they can be used to develop collaborative tools for synchronous distance learning and Web conferencing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The component technology gains popularity as its benefits, the reusability and the simplicity of use become more and more evident. In this paper we demonstrate how component technology can be effectively applied to the process of building collaborative applications in the Web environment. In order to support development of collaborative tools the components must satisfy a set of requirements inherent for a synchronous collaboration environment.The distribution of arbitrary events and objects, the access to the collaborative session state, and the means of synchronizing operations on the shared resources must be provided. Tango Beans is a set of components based on the Tango Interactive framework that has been implemented to facilitate rapid development of collaborative applications. We explain how Tango Beans work and how they can be used to develop collaborative tools for synchronous distance learning and Web conferencing.", "fno": "03650108", "keywords": [ "Components", "Collaboration Framework", "Synchronous Collaboration", "Java" ], "authors": [ { "affiliation": "Syracuse University", "fullName": "Lukasz Beca", "givenName": "Lukasz", "surname": "Beca", "__typename": "ArticleAuthorType" }, { "affiliation": "Syracuse University", "fullName": "Geoffrey C. Fox", "givenName": "Geoffrey C.", "surname": "Fox", "__typename": "ArticleAuthorType" }, { "affiliation": "Syracuse University", "fullName": "Marek Podgorny", "givenName": "Marek", "surname": "Podgorny", "__typename": "ArticleAuthorType" } ], "idPrefix": "wetice", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-06-01T00:00:00", "pubType": "proceedings", "pages": "108", "year": "1999", "issn": "1080-1383", "isbn": "0-7695-0365-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "03650102", "articleId": "12OmNynJMDT", "__typename": "AdjacentArticleType" }, "next": { "fno": "03650114", "articleId": "12OmNz2kqdv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxA3Z3V", "title": "Proceedings of 20th International Computer Software and Applications Conference: COMPSAC '96", "acronym": "compsac", "groupId": "1000143", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNxXUhPJ", "doi": "10.1109/CMPSAC.1996.544597", "title": "A Component-Based Software Development Model", "normalizedTitle": "A Component-Based Software Development Model", "abstract": "Most existing software development processes, methods, and tools are weak in supporting architecture modeling and component reuse. This paper introduces concepts and principles behind Component-Based Software Engineering (CBSE), the style of system construction by component assembly. A process model and supporting technologies are described. Central to this model is explicit representation of software components and component-based architectures.", "abstracts": [ { "abstractType": "Regular", "content": "Most existing software development processes, methods, and tools are weak in supporting architecture modeling and component reuse. This paper introduces concepts and principles behind Component-Based Software Engineering (CBSE), the style of system construction by component assembly. A process model and supporting technologies are described. Central to this model is explicit representation of software components and component-based architectures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most existing software development processes, methods, and tools are weak in supporting architecture modeling and component reuse. This paper introduces concepts and principles behind Component-Based Software Engineering (CBSE), the style of system construction by component assembly. A process model and supporting technologies are described. Central to this model is explicit representation of software components and component-based architectures.", "fno": "75790389", "keywords": [], "authors": [ { "affiliation": "Andersen Consulting", "fullName": "Jim Q. Ning", "givenName": "Jim Q.", "surname": "Ning", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-08-01T00:00:00", "pubType": "proceedings", "pages": "0389", "year": "1996", "issn": null, "isbn": "0-8186-7579-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "75790384", "articleId": "12OmNBrV1LN", "__typename": "AdjacentArticleType" }, "next": { "fno": "75790396", "articleId": "12OmNzxPTKA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx19jVI", "title": "29th Annual International Computer Software and Applications Conference (COMPSAC'05)", "acronym": "compsac", "groupId": "1000143", "volume": "2", "displayVolume": "2", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNxaw59E", "doi": "10.1109/COMPSAC.2005.17", "title": "A Component Testability Model for Verification and Measurement", "normalizedTitle": "A Component Testability Model for Verification and Measurement", "abstract": "Since components are the major building blocks for component-based systems, developing high quality components is becoming very critical for in component-based software engineering. To generate high quality components, we must pay attention to component testability to ensure that reusable components not only can be tested by component vendors, but also can be easily validated by component users. Therefore, component testability analysis, verification and measurement become very important research topic in testing components and component-based systems. This paper discusses the component testability in a quantifiable approach based on a component testability analysis model. Engineers can use this model to verify and measure component testability during a component development process. Based on this testability model, the paper discusses component testability verification, and proposes a pentagram model for testability measurement.", "abstracts": [ { "abstractType": "Regular", "content": "Since components are the major building blocks for component-based systems, developing high quality components is becoming very critical for in component-based software engineering. To generate high quality components, we must pay attention to component testability to ensure that reusable components not only can be tested by component vendors, but also can be easily validated by component users. Therefore, component testability analysis, verification and measurement become very important research topic in testing components and component-based systems. This paper discusses the component testability in a quantifiable approach based on a component testability analysis model. Engineers can use this model to verify and measure component testability during a component development process. Based on this testability model, the paper discusses component testability verification, and proposes a pentagram model for testability measurement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since components are the major building blocks for component-based systems, developing high quality components is becoming very critical for in component-based software engineering. To generate high quality components, we must pay attention to component testability to ensure that reusable components not only can be tested by component vendors, but also can be easily validated by component users. Therefore, component testability analysis, verification and measurement become very important research topic in testing components and component-based systems. This paper discusses the component testability in a quantifiable approach based on a component testability analysis model. Engineers can use this model to verify and measure component testability during a component development process. Based on this testability model, the paper discusses component testability verification, and proposes a pentagram model for testability measurement.", "fno": "241320211", "keywords": [ "Component Testability", "Testability Analysis", "Testability Measurement", "Component Testing", "And Component Based Software Testing" ], "authors": [ { "affiliation": "San Jose State University", "fullName": "Jerry Gao", "givenName": "Jerry", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "San Jose State University", "fullName": "Ming-Chih Shih", "givenName": "Ming-Chih", "surname": "Shih", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-07-01T00:00:00", "pubType": "proceedings", "pages": "211-218", "year": "2005", "issn": "0730-3157", "isbn": "0-7695-2413-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "241320205", "articleId": "12OmNx5Yv5E", "__typename": "AdjacentArticleType" }, "next": { "fno": "241320219", "articleId": "12OmNAObbCt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/valid/2010/4146/0/4146a037", "title": "Runtime Testability in Dynamic High-Availability Component-Based Systems", "doi": null, "abstractUrl": "/proceedings-article/valid/2010/4146a037/12OmNBRsVtq", "parentPublication": { "id": "proceedings/valid/2010/4146/0", "title": "2010 Second International Conference on Advances in System Testing and Validation Lifecycle", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/depcos-relcomex/2007/2850/0/28500294", "title": "Verification of Component Behavioral Compatibility", "doi": null, "abstractUrl": "/proceedings-article/depcos-relcomex/2007/28500294/12OmNBWzHQ9", "parentPublication": { "id": "proceedings/depcos-relcomex/2007/2850/0", "title": "Dependability of Computer Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2009/3702/0/3702a248", "title": "Towards an Embedded Software Component Quality Verification Framework", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2009/3702a248/12OmNqJHFAP", "parentPublication": { "id": "proceedings/iceccs/2009/3702/0", "title": "Engineering of Complex Computer Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2009/3671/0/3671a019", "title": "A Model for the Measurement of the Runtime Testability of Component-Based Systems", "doi": null, "abstractUrl": "/proceedings-article/icstw/2009/3671a019/12OmNvDqsDe", "parentPublication": { "id": "proceedings/icstw/2009/3671/0", "title": "Software Testing Verification and Validation Workshop, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/1995/7141/0/71410242", "title": "Detecting program modules with low testability", "doi": null, "abstractUrl": "/proceedings-article/icsm/1995/71410242/12OmNweBUQ4", "parentPublication": { "id": "proceedings/icsm/1995/7141/0", "title": "Proceedings of International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2011/4345/0/4345a414", "title": "Refactoring as Testability Transformation", "doi": null, "abstractUrl": "/proceedings-article/icstw/2011/4345a414/12OmNxGAL6h", "parentPublication": { "id": "proceedings/icstw/2011/4345/0", "title": "Software Testing Verification and Validation Workshop, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/memocode/2006/0421/0/01695897", "title": "Component-based hardware/software co-verification", "doi": null, "abstractUrl": "/proceedings-article/memocode/2006/01695897/12OmNxQOjJU", "parentPublication": { "id": "proceedings/memocode/2006/0421/0", "title": "Formal Methods and Models for Co-Design, ACM/IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/2008/3141/0/3141a136", "title": "Protocol Verification in a Software Component-Based Approach", "doi": null, "abstractUrl": "/proceedings-article/ecbs/2008/3141a136/12OmNxVDuV6", "parentPublication": { "id": "proceedings/ecbs/2008/3141/0", "title": "Engineering of Computer-Based Systems, IEEE International Conference on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2001/1101/0/11010151", "title": "Constructing Self-Testable Software Components", "doi": null, "abstractUrl": "/proceedings-article/dsn/2001/11010151/12OmNyTwRg2", "parentPublication": { "id": "proceedings/dsn/2001/1101/0", "title": "2001 International Conference on Dependable Systems and Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcs/2009/3688/2/3688b077", "title": "Request-Oriented Method of Software Testability Measurement", "doi": null, "abstractUrl": "/proceedings-article/itcs/2009/3688b077/12OmNyY4riX", "parentPublication": { "id": "proceedings/itcs/2009/3688/2", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIl3sU", "title": "2016 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE)", "acronym": "cbse", "groupId": "1813448", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyoAA2R", "doi": "10.1109/CBSE.2016.16", "title": "VISCTE: Runtime Exploration of Component-Based Systems", "normalizedTitle": "VISCTE: Runtime Exploration of Component-Based Systems", "abstract": "Component-based systems are often comprised of a large number of components, as well as services for binding them together. Static visualization of component dependencies suffers from scalability issues, due to the high number of nodes and edges, despite the fact that there have been previous approaches to mitigate this problem through diagram cluttering reduction mechanisms. Another limitation of static visualization is the inability to represent bindings that are dynamically determined at runtime. In this paper, we describe VISCTE, a tool for exploring component collaborations through runtime monitoring. We target concept location at the component level, where a user-controlled recording process enables developers to obtain diagrams that depict a partial representation of the system. We materialized the approach for OSGi-based component systems and successfully experimented it with an industrial-scale component-based system.", "abstracts": [ { "abstractType": "Regular", "content": "Component-based systems are often comprised of a large number of components, as well as services for binding them together. Static visualization of component dependencies suffers from scalability issues, due to the high number of nodes and edges, despite the fact that there have been previous approaches to mitigate this problem through diagram cluttering reduction mechanisms. Another limitation of static visualization is the inability to represent bindings that are dynamically determined at runtime. In this paper, we describe VISCTE, a tool for exploring component collaborations through runtime monitoring. We target concept location at the component level, where a user-controlled recording process enables developers to obtain diagrams that depict a partial representation of the system. We materialized the approach for OSGi-based component systems and successfully experimented it with an industrial-scale component-based system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Component-based systems are often comprised of a large number of components, as well as services for binding them together. Static visualization of component dependencies suffers from scalability issues, due to the high number of nodes and edges, despite the fact that there have been previous approaches to mitigate this problem through diagram cluttering reduction mechanisms. Another limitation of static visualization is the inability to represent bindings that are dynamically determined at runtime. In this paper, we describe VISCTE, a tool for exploring component collaborations through runtime monitoring. We target concept location at the component level, where a user-controlled recording process enables developers to obtain diagrams that depict a partial representation of the system. We materialized the approach for OSGi-based component systems and successfully experimented it with an industrial-scale component-based system.", "fno": "2569a091", "keywords": [ "Runtime", "Visualization", "Navigation", "Component Architectures", "Telecommunications", "Collaboration", "Monitoring", "Feature Location", "Components", "Osgi", "Runtime Monitoring" ], "authors": [ { "affiliation": null, "fullName": "André L. Santos", "givenName": "André L.", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ivo Albuquerque", "givenName": "Ivo", "surname": "Albuquerque", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-04-01T00:00:00", "pubType": "proceedings", "pages": "91-96", "year": "2016", "issn": null, "isbn": "978-1-5090-2569-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2569a085", "articleId": "12OmNx5GU9f", "__typename": "AdjacentArticleType" }, "next": { "fno": "2569a097", "articleId": "12OmNzl3X0W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/valid/2010/4146/0/4146a037", "title": "Runtime Testability in Dynamic High-Availability Component-Based Systems", "doi": null, "abstractUrl": "/proceedings-article/valid/2010/4146a037/12OmNBRsVtq", "parentPublication": { "id": "proceedings/valid/2010/4146/0", "title": "2010 Second International Conference on Advances in System Testing and Validation Lifecycle", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2008/3262/0/3262a499", "title": "An Optimised Runtime Reconfiguration of Component-Based Software Systems", "doi": null, "abstractUrl": "/proceedings-article/compsac/2008/3262a499/12OmNC4wtG7", "parentPublication": { "id": "proceedings/compsac/2008/3262/0", "title": "2008 32nd Annual IEEE International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2009/3784/0/3784a454", "title": "Guaranteeing Correctness of Component Bindings in Dynamic Adaptive Systems", "doi": null, "abstractUrl": "/proceedings-article/seaa/2009/3784a454/12OmNC943Bj", "parentPublication": { "id": "proceedings/seaa/2009/3784/0", "title": "2009 35th Euromicro Conference on Software Engineering and Advanced Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2009/3671/0/3671a019", "title": "A Model for the Measurement of the Runtime Testability of Component-Based Systems", "doi": null, "abstractUrl": "/proceedings-article/icstw/2009/3671a019/12OmNvDqsDe", "parentPublication": { "id": "proceedings/icstw/2009/3671/0", "title": "Software Testing Verification and Validation Workshop, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2010/4129/0/4129a465", "title": "Towards Resource-Aware Runtime Reconfigurable Component-Based Systems", "doi": null, "abstractUrl": "/proceedings-article/services/2010/4129a465/12OmNx9FhQ0", "parentPublication": { "id": "proceedings/services/2010/4129/0", "title": "2010 6th World Congress on Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asew/2008/2776/0/04686292", "title": "Architecture support for runtime integration and verification of component-based Systems of Systems", "doi": null, "abstractUrl": "/proceedings-article/asew/2008/04686292/12OmNyFCvT5", "parentPublication": { "id": "proceedings/asew/2008/2776/0", "title": "2008 23rd IEEE/ACM International Conference on Automated Software Engineering - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saso/2009/3794/0/3794a186", "title": "Achieving Dependable Component Bindings in Dynamic Adaptive Systems - A Runtime Testing Approach", "doi": null, "abstractUrl": "/proceedings-article/saso/2009/3794a186/12OmNz2TCzA", "parentPublication": { "id": "proceedings/saso/2009/3794/0", "title": "2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2013/2144/1/2144a450", "title": "Automated Management of Dynamic Component Dependency for Runtime System Reconfiguration", "doi": null, "abstractUrl": "/proceedings-article/apsec/2013/2144a450/12OmNz5apJ3", "parentPublication": { "id": "proceedings/apsec/2013/2144/1", "title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2014/6081/0/06921486", "title": "Optimized symbolic model checking for component-based systems", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2014/06921486/12OmNzgeLD9", "parentPublication": { "id": "proceedings/iccicc/2014/6081/0", "title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euc/2018/8296/0/829600a166", "title": "Runtime Component Information on Embedded Component Systems", "doi": null, "abstractUrl": "/proceedings-article/euc/2018/829600a166/17D45XacGjH", "parentPublication": { "id": "proceedings/euc/2018/8296/0", "title": "2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrJiCDG", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "acronym": "bigdata-congress", "groupId": "1801789", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzlUKnh", "doi": "10.1109/BigDataCongress.2015.102", "title": "Developing a Real-Time Data Analytics Framework Using Hadoop", "normalizedTitle": "Developing a Real-Time Data Analytics Framework Using Hadoop", "abstract": "Currently, the majority of existing workflows are based on meta-heuristics that produce good heuristics that are dynamic in nature, and map the workflow tasks to services on-the-fly, but unfortunately, they lack the ability of supporting analytical tasks considering data types and real-time processing. This paper aims to address this problem by developing a real-time data analytics framework capable of handling real-time processing of structured and unstructured data needed for performing different analytical tasks, ranging from data ingestion and processing to data exploration, and visualization. We propose architecture based on the Storm/YARN projects for data ingestion, processing exploration and visualization of streaming structured and unstructured data. We have implemented the proposed architecture using Apache Storm related APIs for both of a local mode and a distributed mode. We describe our experiments for the architecture prototype implementation and evaluate the functional requirements for each component and non-functional tests such as real time update performance and time taken for data flow among components. All components were able to handle their own functionalities properly. Also, we provide the main results for a non-functional test in order to discuss our system efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Currently, the majority of existing workflows are based on meta-heuristics that produce good heuristics that are dynamic in nature, and map the workflow tasks to services on-the-fly, but unfortunately, they lack the ability of supporting analytical tasks considering data types and real-time processing. This paper aims to address this problem by developing a real-time data analytics framework capable of handling real-time processing of structured and unstructured data needed for performing different analytical tasks, ranging from data ingestion and processing to data exploration, and visualization. We propose architecture based on the Storm/YARN projects for data ingestion, processing exploration and visualization of streaming structured and unstructured data. We have implemented the proposed architecture using Apache Storm related APIs for both of a local mode and a distributed mode. We describe our experiments for the architecture prototype implementation and evaluate the functional requirements for each component and non-functional tests such as real time update performance and time taken for data flow among components. All components were able to handle their own functionalities properly. Also, we provide the main results for a non-functional test in order to discuss our system efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Currently, the majority of existing workflows are based on meta-heuristics that produce good heuristics that are dynamic in nature, and map the workflow tasks to services on-the-fly, but unfortunately, they lack the ability of supporting analytical tasks considering data types and real-time processing. This paper aims to address this problem by developing a real-time data analytics framework capable of handling real-time processing of structured and unstructured data needed for performing different analytical tasks, ranging from data ingestion and processing to data exploration, and visualization. We propose architecture based on the Storm/YARN projects for data ingestion, processing exploration and visualization of streaming structured and unstructured data. We have implemented the proposed architecture using Apache Storm related APIs for both of a local mode and a distributed mode. We describe our experiments for the architecture prototype implementation and evaluate the functional requirements for each component and non-functional tests such as real time update performance and time taken for data flow among components. All components were able to handle their own functionalities properly. Also, we provide the main results for a non-functional test in order to discuss our system efficiency.", "fno": "07207286", "keywords": [ "Real Time Systems", "Storms", "Fasteners", "Data Analysis", "Big Data", "Data Visualization", "Prototypes", "YARN", "Real Time Data Analytics", "Hadoop", "Map Reduce", "Storm" ], "authors": [ { "affiliation": null, "fullName": "Sangwhan Cha", "givenName": "Sangwhan", "surname": "Cha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Monica Wachowicz", "givenName": "Monica", "surname": "Wachowicz", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigdata-congress", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-06-01T00:00:00", "pubType": "proceedings", "pages": "657-660", "year": "2015", "issn": null, "isbn": "978-1-4673-7278-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07207285", "articleId": "12OmNxd4tsP", "__typename": "AdjacentArticleType" }, "next": { "fno": "07207287", "articleId": "12OmNBW0vAo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ism/2014/4311/0/4311a106", "title": "Towards Fast Multimedia Feature Extraction: Hadoop or Storm", "doi": null, "abstractUrl": "/proceedings-article/ism/2014/4311a106/12OmNAoUTay", "parentPublication": { "id": "proceedings/ism/2014/4311/0", "title": "2014 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051925", "title": "Real-time anomaly detection over VMware performance data using storm", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051925/12OmNBSjJ4Q", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/07093076", "title": "Analysis on enhancing storm to efficiently process big data in real time", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/07093076/12OmNCzb9xA", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588928", "title": "G-Storm: A GPU-Aware Storm Scheduler", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588928/12OmNqJHFsk", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0", "title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2015/7905/0/7905a263", "title": "Processing and Analytics of Big Data Streams with Yahoo!S4", "doi": null, "abstractUrl": "/proceedings-article/aina/2015/7905a263/12OmNyrZLzV", "parentPublication": { "id": "proceedings/aina/2015/7905/0", "title": "2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363769", "title": "G-Storm: GPU-enabled high-throughput online data processing in Storm", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363769/12OmNzn390W", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2018/02/07587437", "title": "GPU-Accelerated High-Throughput Online Stream Data Processing", "doi": null, "abstractUrl": "/journal/bd/2018/02/07587437/13rRUx0ge7S", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258198", "title": "RASP: Real-time network analytics with distributed NoSQL stream processing", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258198/17D45WXIkHS", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2017/1996/0/08029342", "title": "Developing a Real-Time Data Analytics Framework for Twitter Streaming Data", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2017/08029342/17D45XoXP51", "parentPublication": { "id": "proceedings/bigdata-congress/2017/1996/0", "title": "2017 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2018/0974/0/097400a198", "title": "Performance Evaluation for Real-Time Messaging System in Big Data Pipeline Architecture", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2018/097400a198/17QjJeeJOA9", "parentPublication": { "id": "proceedings/cyberc/2018/0974/0", "title": "2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uf3n4DpFAY", "title": "2021 Second International Conference on Information Systems and Software Technologies (ICI2ST)", "acronym": "ici2st", "groupId": "1835466", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uf3otjjw8o", "doi": "10.1109/ICI2ST51859.2021.00022", "title": "Learning analytics for student academic tracking, a comparison between Analytics Graphs and Edwiser Reports", "normalizedTitle": "Learning analytics for student academic tracking, a comparison between Analytics Graphs and Edwiser Reports", "abstract": "This work presents a proposal for the progressive use of different methodologies and analytical learning techniques, using two tools available on the Moodle platform. To increase students' retentiveness and to analyze each participant's progress and performance trends are the challenges that Big Data era allows us thanks to data analysis. By closely monitoring student learning and perseverance, it is possible to identify the factors that make them continue with their studies or drop out and thus be able to build predictive models for decision-making. The objective of this work is to show significant changes in the educational processes of student groups that allow teachers to validate, supervise and redirect detailed and specific information through learning analytics with tools available for virtual learning environments, thereby mitigating the risk of loss or desertion.", "abstracts": [ { "abstractType": "Regular", "content": "This work presents a proposal for the progressive use of different methodologies and analytical learning techniques, using two tools available on the Moodle platform. To increase students' retentiveness and to analyze each participant's progress and performance trends are the challenges that Big Data era allows us thanks to data analysis. By closely monitoring student learning and perseverance, it is possible to identify the factors that make them continue with their studies or drop out and thus be able to build predictive models for decision-making. The objective of this work is to show significant changes in the educational processes of student groups that allow teachers to validate, supervise and redirect detailed and specific information through learning analytics with tools available for virtual learning environments, thereby mitigating the risk of loss or desertion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work presents a proposal for the progressive use of different methodologies and analytical learning techniques, using two tools available on the Moodle platform. To increase students' retentiveness and to analyze each participant's progress and performance trends are the challenges that Big Data era allows us thanks to data analysis. By closely monitoring student learning and perseverance, it is possible to identify the factors that make them continue with their studies or drop out and thus be able to build predictive models for decision-making. The objective of this work is to show significant changes in the educational processes of student groups that allow teachers to validate, supervise and redirect detailed and specific information through learning analytics with tools available for virtual learning environments, thereby mitigating the risk of loss or desertion.", "fno": "041100a101", "keywords": [ "Big Data", "Computer Aided Instruction", "Data Analysis", "Decision Making", "Educational Administrative Data Processing", "Graph Theory", "Student Academic Tracking", "Analytics Graphs", "Edwiser Reports", "Moodle Platform", "Big Data", "Data Analysis", "Student Learning", "Student Perseverance", "Decision Making", "Virtual Learning Environments", "Learning Analytics", "Training", "Data Analysis", "Tools", "Predictive Models", "Media", "Market Research", "Software", "Higher Education", "Learning Analytics", "Learning Activities", "Educational Innovation", "Educational Data Mining" ], "authors": [ { "affiliation": "Universidad Politécnica Salesiana,GiEACI Research group,Guayaquil,Ecuador", "fullName": "Joe Llerena", "givenName": "Joe", "surname": "Llerena", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Politécnica Salesiana,GiEACI Research collaborator,Guayaquil,Ecuador", "fullName": "Nohely Álava-Morán", "givenName": "Nohely", "surname": "Álava-Morán", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad Politécnica Salesiana,GiEACI Research collaborator,Guayaquil,Ecuador", "fullName": "Jonathan Zamora-Galindo", "givenName": "Jonathan", "surname": "Zamora-Galindo", "__typename": "ArticleAuthorType" } ], "idPrefix": "ici2st", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "101-107", "year": "2021", "issn": null, "isbn": "978-1-6654-0411-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "041100a094", "articleId": "1uf3pj57yZW", "__typename": "AdjacentArticleType" }, "next": { "fno": "041100a108", "articleId": "1uf3pu3esEw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eitt/2017/0629/0/0629a089", "title": "Joint Exploration of Negative Academic Emotion and Topics in Student-Generated Online Course Comments", "doi": null, "abstractUrl": "/proceedings-article/eitt/2017/0629a089/12OmNqzu6P6", "parentPublication": { "id": "proceedings/eitt/2017/0629/0", "title": "2017 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757715", "title": "A critical analysis of trends in student-centric engineering education and their implications for learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757715/12OmNwtWfHY", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408776", "title": "Narrowing student academic performance gaps", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408776/12OmNz4SOzz", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iset/2017/3031/0/08005410", "title": "Student Performance Prediction via Online Learning Behavior Analytics", "doi": null, "abstractUrl": "/proceedings-article/iset/2017/08005410/12OmNzE54CT", "parentPublication": { "id": "proceedings/iset/2017/3031/0", "title": "2017 International Symposium on Educational Technology (ISET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658373", "title": "Extending Academic Analytics to Engineering Education", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658373/18j96kqkh9e", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658934", "title": "Contextual analysis of engineering student academic success at a Hispanic Serving Institution (HSI)", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658934/18j98bsH8uk", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2021/3734/0/373400a206", "title": "Analyses and Benchmark of a Spontaneous Student Affect Database", "doi": null, "abstractUrl": "/proceedings-article/ism/2021/373400a206/1A3j9MYStrO", "parentPublication": { "id": "proceedings/ism/2021/3734/0", "title": "2021 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2022/6357/0/635700a352", "title": "Research on Student Achievement Analysis Method Based on Decision Tree Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2022/635700a352/1LRkNl0L9YI", "parentPublication": { "id": "proceedings/isaiee/2022/6357/0", "title": "2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2019/6303/0/09162357", "title": "Capitalizing on Learning Analytics Dashboard for Maximizing Student Outcomes", "doi": null, "abstractUrl": "/proceedings-article/csde/2019/09162357/1m6hL9ewsve", "parentPublication": { "id": "proceedings/csde/2019/6303/0", "title": "2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2021/4106/0/410600a163", "title": "Idiographic learning analytics: A definition and a case study", "doi": null, "abstractUrl": "/proceedings-article/icalt/2021/410600a163/1vJZW8YdMc0", "parentPublication": { "id": "proceedings/icalt/2021/4106/0", "title": "2021 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAH5djO", "title": "2011 ACM/IEEE 38th International Symposium on Computer Architecture (ISCA)", "acronym": "isca", "groupId": "1000123", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNASILUU", "doi": "", "title": "Benefits and limitations of tapping into stored energy for datacenters", "normalizedTitle": "Benefits and limitations of tapping into stored energy for datacenters", "abstract": "Datacenter power consumption has a significant impact on both its recurring electricity bill (Op-ex) and one-time construction costs (Cap-ex). Existing work optimizing these costs has relied primarily on throttling devices or workload shaping, both with performance degrading implications. In this paper, we present a novel knob of energy buffer (eBuff) available in the form of UPS batteries in datacenters for this cost optimization. Intuitively, eBuff stores energy in UPS batteries during “valleys” - periods of lower demand, which can be drained during “peaks” - periods of higher demand. UPS batteries are normally used as a fail-over mechanism to transition to captive power sources upon utility failure. Furthermore, frequent discharges can cause UPS batteries to fail prematurely. We conduct detailed analysis of battery operation to figure out feasible operating regions given such battery lifetime and datacenter availability concerns. Using insights learned from this analysis, we develop peak reduction algorithms that combine the UPS battery knob with existing throttling based techniques for minimizing datacenter power costs. Using an experimental platform, we offer insights about Op-ex savings offered by eBuff for a wide range of workload peaks/valleys, UPS provisioning, and application SLA constraints. We find that eBuff can be used to realize 15-45% peak power reduction, corresponding to 6-18% savings in Op-ex across this spectrum. eBuff can also play a role in reducing Cap-ex costs by allowing tighter overbooking of power infrastructure components and we quantify the extent of such Cap-ex savings. To our knowledge, this is the first paper to exploit stored energy - typically lying untapped in the datacenter - to address the peak power draw problem.", "abstracts": [ { "abstractType": "Regular", "content": "Datacenter power consumption has a significant impact on both its recurring electricity bill (Op-ex) and one-time construction costs (Cap-ex). Existing work optimizing these costs has relied primarily on throttling devices or workload shaping, both with performance degrading implications. In this paper, we present a novel knob of energy buffer (eBuff) available in the form of UPS batteries in datacenters for this cost optimization. Intuitively, eBuff stores energy in UPS batteries during “valleys” - periods of lower demand, which can be drained during “peaks” - periods of higher demand. UPS batteries are normally used as a fail-over mechanism to transition to captive power sources upon utility failure. Furthermore, frequent discharges can cause UPS batteries to fail prematurely. We conduct detailed analysis of battery operation to figure out feasible operating regions given such battery lifetime and datacenter availability concerns. Using insights learned from this analysis, we develop peak reduction algorithms that combine the UPS battery knob with existing throttling based techniques for minimizing datacenter power costs. Using an experimental platform, we offer insights about Op-ex savings offered by eBuff for a wide range of workload peaks/valleys, UPS provisioning, and application SLA constraints. We find that eBuff can be used to realize 15-45% peak power reduction, corresponding to 6-18% savings in Op-ex across this spectrum. eBuff can also play a role in reducing Cap-ex costs by allowing tighter overbooking of power infrastructure components and we quantify the extent of such Cap-ex savings. To our knowledge, this is the first paper to exploit stored energy - typically lying untapped in the datacenter - to address the peak power draw problem.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Datacenter power consumption has a significant impact on both its recurring electricity bill (Op-ex) and one-time construction costs (Cap-ex). Existing work optimizing these costs has relied primarily on throttling devices or workload shaping, both with performance degrading implications. In this paper, we present a novel knob of energy buffer (eBuff) available in the form of UPS batteries in datacenters for this cost optimization. Intuitively, eBuff stores energy in UPS batteries during “valleys” - periods of lower demand, which can be drained during “peaks” - periods of higher demand. UPS batteries are normally used as a fail-over mechanism to transition to captive power sources upon utility failure. Furthermore, frequent discharges can cause UPS batteries to fail prematurely. We conduct detailed analysis of battery operation to figure out feasible operating regions given such battery lifetime and datacenter availability concerns. Using insights learned from this analysis, we develop peak reduction algorithms that combine the UPS battery knob with existing throttling based techniques for minimizing datacenter power costs. Using an experimental platform, we offer insights about Op-ex savings offered by eBuff for a wide range of workload peaks/valleys, UPS provisioning, and application SLA constraints. We find that eBuff can be used to realize 15-45% peak power reduction, corresponding to 6-18% savings in Op-ex across this spectrum. eBuff can also play a role in reducing Cap-ex costs by allowing tighter overbooking of power infrastructure components and we quantify the extent of such Cap-ex savings. To our knowledge, this is the first paper to exploit stored energy - typically lying untapped in the datacenter - to address the peak power draw problem.", "fno": "06307771", "keywords": [ "Computer Centres", "Computer Power Supplies", "Power Aware Computing", "Uninterruptible Power Supplies", "Stored Energy", "Datacenter Power Consumption", "Electricity Bill Recurrence", "One Time Construction Costs", "Op Ex", "Cap Ex", "Throttling Devices", "Performance Degrading Implications", "Energy Buffer", "E Buff", "UPS Battery Knob", "Fail Over Mechanism", "Power Sources", "Battery Lifetime", "Datacenter Availability Concerns", "Peak Reduction Algorithms", "Throttling Based Techniques", "Datacenter Power Costs Minimization", "Peak Power Draw Problem", "Uninterruptible Power Systems", "Batteries", "Discharges Electric", "Availability", "Runtime", "US Department Of Defense", "Battery", "Datacenter", "Peak Power", "UPS" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA", "fullName": "Sriram Govindan", "givenName": "Sriram", "surname": "Govindan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA", "fullName": "Anand Sivasubramaniam", "givenName": "Anand", "surname": "Sivasubramaniam", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA", "fullName": "Bhuvan Urgaonkar", "givenName": "Bhuvan", "surname": "Urgaonkar", "__typename": "ArticleAuthorType" } ], "idPrefix": "isca", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-06-01T00:00:00", "pubType": "proceedings", "pages": "341-351", "year": "2011", "issn": "1063-6897", "isbn": "978-1-4503-0472-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06307769", "articleId": "12OmNzIUfWk", "__typename": "AdjacentArticleType" }, "next": { "fno": "06307772", "articleId": "12OmNzV70Ct", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpca/2014/3097/0/06835924", "title": "Exploiting thermal energy storage to reduce data center capital and operating expenses", "doi": null, "abstractUrl": "/proceedings-article/hpca/2014/06835924/12OmNApcuxp", "parentPublication": { "id": "proceedings/hpca/2014/3097/0", "title": "2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2018/3652/0/08390416", "title": "Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model", "doi": null, "abstractUrl": "/proceedings-article/icnc/2018/08390416/12OmNqNG3eM", "parentPublication": { "id": "proceedings/icnc/2018/3652/0", "title": "2018 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/igsc/2015/0172/0/07393690", "title": "HyStore: Hybrid energy storage for cost-efficient server power shaving in data centers", "doi": null, "abstractUrl": "/proceedings-article/igsc/2015/07393690/12OmNviZldM", "parentPublication": { "id": "proceedings/igsc/2015/0172/0", "title": "2015 Sixth International Green and Sustainable Computing Conference (IGSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2017/2764/0/2764a164", "title": "Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits", "doi": null, "abstractUrl": "/proceedings-article/mascots/2017/2764a164/12OmNwJybQA", "parentPublication": { "id": "proceedings/mascots/2017/2764/0", "title": "2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760041", "title": "Comparison of lead acid and Li-ion battery in solar home system of Bangladesh", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760041/12OmNyXMQcC", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/igcc/2013/0623/0/06604477", "title": "Distributed battery control for peak power shaving in datacenters", "doi": null, "abstractUrl": "/proceedings-article/igcc/2013/06604477/12OmNzBOhIh", "parentPublication": { "id": "proceedings/igcc/2013/0623/0", "title": "2013 International Green Computing Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2017/04/07563872", "title": "Hybrid Energy Storage with Supercapacitor for Cost-Efficient Data Center Power Shaving and Capping", "doi": null, "abstractUrl": "/journal/td/2017/04/07563872/13rRUB7a1fz", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2017/12/07942036", "title": "Managing Battery Aging for High Energy Availability in Green Datacenters", "doi": null, "abstractUrl": "/journal/td/2017/12/07942036/13rRUwInvJ2", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2015/11/07017504", "title": "TE-Shave: Reducing Data Center Capital and Operating Expenses with Thermal Energy Storage", "doi": null, "abstractUrl": "/journal/tc/2015/11/07017504/13rRUyYjK4K", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/04/08877859", "title": "COPA: Highly Cost-Effective Power Back-Up for Green Datacenters", "doi": null, "abstractUrl": "/journal/td/2020/04/08877859/1gDHlyIHdN6", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqL", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "acronym": "hpcmp-ugc", "groupId": "1002962", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCeK29F", "doi": "10.1109/HPCMP-UGC.2010.65", "title": "Enabling Interactive Analysis on Cray XT-5 Compute Nodes", "normalizedTitle": "Enabling Interactive Analysis on Cray XT-5 Compute Nodes", "abstract": "Physics-based modeling and simulation generates terabytes of data when evaluating weapons concepts and designs. Interactive analysis of these datasets using established scientific visualization applications is an essential technique used by computational scientists to understand design strengths and weaknesses in a timely manner. This paper discusses how the commercial visualization package EnSight was implemented on the US Army Research Laboratory (ARL) DoD Supercomputing Resource Centers (DSRC) Cray XT-5 systems. Given the unique software architecture of the Cray systems, numerous enhancements were required to facilitate process initialization on the compute nodes and TCP/IP communication between the allocated compute nodes and the login nodes. This communication is essential to allow the distributed processes to communicate to a client application running on a desktop workstation. Prior to the implementation of these techniques, interactive data analysis from the compute node to a client-side workstation was not possible.", "abstracts": [ { "abstractType": "Regular", "content": "Physics-based modeling and simulation generates terabytes of data when evaluating weapons concepts and designs. Interactive analysis of these datasets using established scientific visualization applications is an essential technique used by computational scientists to understand design strengths and weaknesses in a timely manner. This paper discusses how the commercial visualization package EnSight was implemented on the US Army Research Laboratory (ARL) DoD Supercomputing Resource Centers (DSRC) Cray XT-5 systems. Given the unique software architecture of the Cray systems, numerous enhancements were required to facilitate process initialization on the compute nodes and TCP/IP communication between the allocated compute nodes and the login nodes. This communication is essential to allow the distributed processes to communicate to a client application running on a desktop workstation. Prior to the implementation of these techniques, interactive data analysis from the compute node to a client-side workstation was not possible.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Physics-based modeling and simulation generates terabytes of data when evaluating weapons concepts and designs. Interactive analysis of these datasets using established scientific visualization applications is an essential technique used by computational scientists to understand design strengths and weaknesses in a timely manner. This paper discusses how the commercial visualization package EnSight was implemented on the US Army Research Laboratory (ARL) DoD Supercomputing Resource Centers (DSRC) Cray XT-5 systems. Given the unique software architecture of the Cray systems, numerous enhancements were required to facilitate process initialization on the compute nodes and TCP/IP communication between the allocated compute nodes and the login nodes. This communication is essential to allow the distributed processes to communicate to a client application running on a desktop workstation. Prior to the implementation of these techniques, interactive data analysis from the compute node to a client-side workstation was not possible.", "fno": "06018044", "keywords": [ "Client Server Systems", "Interactive Systems", "IP Networks", "Military Computing", "Weapons", "Interactive Analysis", "Physics Based Modeling", "Weapons Concept", "Scientific Visualization Application", "Commercial Visualization Package En Sight", "US Army Research Laboratory", "Do D Supercomputing Resource Centers", "Cray XT 5 Systems", "Unique Software Architecture", "TCP IP Communication", "Client Side Workstation", "Servers", "Workstations", "Data Visualization", "Linux", "US Department Of Defense", "Libraries", "Computational Modeling" ], "authors": [ { "affiliation": null, "fullName": "John R. Lewis", "givenName": "John R.", "surname": "Lewis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Richard C. Angelini", "givenName": "Richard C.", "surname": "Angelini", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcmp-ugc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "409-413", "year": "2010", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06018043", "articleId": "12OmNzZmZxz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06018045", "articleId": "12OmNvTTckf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2006/0054/0/01639300", "title": "Early evaluation of the Cray XT3", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2006/01639300/12OmNAoDim6", "parentPublication": { "id": "proceedings/ipdps/2006/0054/0", "title": "Proceedings 20th IEEE International Parallel & Distributed Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a106", "title": "Quantum Lattice-Gas Algorithm for Quantum Turbulence - CAP Simulations on 12,288 Cores of Cray XT-5 Einstein at NAVO", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a106/12OmNrFkeRW", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018002", "title": "Potential Energy Surface Mapping of Energetic Materials Using Coupled Cluster Theory", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018002/12OmNvDqsUa", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a450", "title": "Scalability of the CTH Shock Physics Code on the Cray XT", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a450/12OmNwIpNo8", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1993/3400/0/00289688", "title": "Beyond vector processing: parallel programming on the CRAY APP", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1993/00289688/12OmNxG1yOL", "parentPublication": { "id": "proceedings/cmpcon/1993/3400/0", "title": "COMPCON Spring '93. Digest of Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1995/7117/0/71170249", "title": "VOXAR-All ATM Distributed Biomedical Visualization: 1) Local OC-3 Linked Workstation Cluster; 2) Remote OC-3 Linked 40 GFlops CRAY T3D MPP", "doi": null, "abstractUrl": "/proceedings-article/cbms/1995/71170249/12OmNyPQ4BI", "parentPublication": { "id": "proceedings/cbms/1995/7117/0", "title": "Proceedings Eighth IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018034", "title": "Implementation of the Joint Analysis System on TOW to Enhance DoD Analysis Performance", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018034/12OmNzaQoxA", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a383", "title": "SSH-Enabled ParaView", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a383/12OmNzwHvhr", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fnwf/2022/6250/0/625000b113", "title": "Edge Services and Automation", "doi": null, "abstractUrl": "/proceedings-article/fnwf/2022/625000b113/1LlHaw85qpO", "parentPublication": { "id": "proceedings/fnwf/2022/6250/0", "title": "2022 IEEE Future Networks World Forum (FNWF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfec/2019/2365/0/08733150", "title": "Enabling Fog Computing using Self-Organizing Compute Nodes", "doi": null, "abstractUrl": "/proceedings-article/icfec/2019/08733150/1aIRjFJ8dl6", "parentPublication": { "id": "proceedings/icfec/2019/2365/0", "title": "2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBbaH9T", "title": "2018 International Conference on Computing, Networking and Communications (ICNC)", "acronym": "icnc", "groupId": "1800963", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNqNG3eM", "doi": "10.1109/ICCNC.2018.8390416", "title": "Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model", "normalizedTitle": "Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model", "abstract": "A datacenter’s power consumption is a major contributor to its operational expenditures (op-ex) as determined by peak-demand-over-billing-period based pricing which is often employed by major electric utility providers. There is a growing interest in reducing a datacenters electricity costs by using demand-throttling techniques and/or energy storage devices (batteries which are readily available at most datacenters as a backup energy source). For the latter, we present a Markov Decision Process framework based on power-demand uncertainty and a linearized battery degradation model. This framework also explicitly considers risk of over or under charging the battery resulting in higher cost-savings (up to 2×) with tractable risk. We show the complete characterization of risk-cost trade-off and cost-per-risk as a function of datacenter’s workload characteristics. We also, study a linearized battery degradation model empirically, and show the accuracy of this model for bursty workloads, however there is some discrepancy between the linearized model and reality for workloads with lower variability.", "abstracts": [ { "abstractType": "Regular", "content": "A datacenter’s power consumption is a major contributor to its operational expenditures (op-ex) as determined by peak-demand-over-billing-period based pricing which is often employed by major electric utility providers. There is a growing interest in reducing a datacenters electricity costs by using demand-throttling techniques and/or energy storage devices (batteries which are readily available at most datacenters as a backup energy source). For the latter, we present a Markov Decision Process framework based on power-demand uncertainty and a linearized battery degradation model. This framework also explicitly considers risk of over or under charging the battery resulting in higher cost-savings (up to 2×) with tractable risk. We show the complete characterization of risk-cost trade-off and cost-per-risk as a function of datacenter’s workload characteristics. We also, study a linearized battery degradation model empirically, and show the accuracy of this model for bursty workloads, however there is some discrepancy between the linearized model and reality for workloads with lower variability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A datacenter’s power consumption is a major contributor to its operational expenditures (op-ex) as determined by peak-demand-over-billing-period based pricing which is often employed by major electric utility providers. There is a growing interest in reducing a datacenters electricity costs by using demand-throttling techniques and/or energy storage devices (batteries which are readily available at most datacenters as a backup energy source). For the latter, we present a Markov Decision Process framework based on power-demand uncertainty and a linearized battery degradation model. This framework also explicitly considers risk of over or under charging the battery resulting in higher cost-savings (up to 2×) with tractable risk. We show the complete characterization of risk-cost trade-off and cost-per-risk as a function of datacenter’s workload characteristics. We also, study a linearized battery degradation model empirically, and show the accuracy of this model for bursty workloads, however there is some discrepancy between the linearized model and reality for workloads with lower variability.", "fno": "08390416", "keywords": [ "Batteries", "Degradation", "Uncertainty", "Computational Modeling", "Pricing", "Power Industry", "US Department Of Defense" ], "authors": [ { "affiliation": "School of EECS, Penn State University", "fullName": "Neda Nasiriani", "givenName": "Neda", "surname": "Nasiriani", "__typename": "ArticleAuthorType" }, { "affiliation": "School of EECS, Penn State University", "fullName": "George Kesidis", "givenName": "George", "surname": "Kesidis", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "58-62", "year": "2018", "issn": null, "isbn": "978-1-5386-3652-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08390315", "articleId": "12OmNCwCLqX", "__typename": "AdjacentArticleType" }, "next": { "fno": "08390346", "articleId": "12OmNxRnvW8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isca/2011/0472/0/06307771", "title": "Benefits and limitations of tapping into stored energy for datacenters", "doi": null, "abstractUrl": "/proceedings-article/isca/2011/06307771/12OmNASILUU", "parentPublication": { "id": "proceedings/isca/2011/0472/0", "title": "2011 ACM/IEEE 38th International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2012/0430/0/06386377", "title": "Battery energy storage system load shifting control based on real time load forecast and dynamic programming", "doi": null, "abstractUrl": "/proceedings-article/case/2012/06386377/12OmNApu5Lj", "parentPublication": { "id": "proceedings/case/2012/0430/0", "title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2015/7166/0/07357135", "title": "An aging-aware battery charge scheme for mobile devices exploiting plug-in time patterns", "doi": null, "abstractUrl": "/proceedings-article/iccd/2015/07357135/12OmNBzRNq3", "parentPublication": { "id": "proceedings/iccd/2015/7166/0", "title": "2015 33rd IEEE International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2013/5102/0/5102a242", "title": "Architecting Efficient Peak Power Shaving Using Batteries in Data Centers", "doi": null, "abstractUrl": "/proceedings-article/mascots/2013/5102a242/12OmNrFBQ2a", "parentPublication": { "id": "proceedings/mascots/2013/5102/0", "title": "2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460783", "title": "Predicting battery life from usage trajectory patterns", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460783/12OmNrJAdXS", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2015/8629/0/8629a307", "title": "BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters", "doi": null, "abstractUrl": "/proceedings-article/dsn/2015/8629a307/12OmNvTTc9Y", "parentPublication": { "id": "proceedings/dsn/2015/8629/0", "title": "2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2017/2764/0/2764a164", "title": "Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits", "doi": null, "abstractUrl": "/proceedings-article/mascots/2017/2764a164/12OmNwJybQA", "parentPublication": { "id": "proceedings/mascots/2017/2764/0", "title": "2017 IEEE 25th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760041", "title": "Comparison of lead acid and Li-ion battery in solar home system of Bangladesh", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760041/12OmNyXMQcC", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/igcc/2013/0623/0/06604477", "title": "Distributed battery control for peak power shaving in datacenters", "doi": null, "abstractUrl": "/proceedings-article/igcc/2013/06604477/12OmNzBOhIh", "parentPublication": { "id": "proceedings/igcc/2013/0623/0", "title": "2013 International Green Computing Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/03/09448445", "title": "Improvement of Battery Lifetime Based on Communication Resource Control in Low-Earth-Orbit Satellite Constellations", "doi": null, "abstractUrl": "/journal/ec/2022/03/09448445/1ugE9vFqPNS", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqL", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "acronym": "hpcmp-ugc", "groupId": "1002962", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNvDqsUa", "doi": "10.1109/HPCMP-UGC.2010.58", "title": "Potential Energy Surface Mapping of Energetic Materials Using Coupled Cluster Theory", "normalizedTitle": "Potential Energy Surface Mapping of Energetic Materials Using Coupled Cluster Theory", "abstract": "1,1-diamino-2,2-dinitroethylene (Fox-7) has proven to be a promising energetic material due to its low shock sensitivity and high thermal stability, and has been the subject of several Department of Defense (DoD) theoretical investigations employing Hartree-Fock and density functional theory. However, it is well-known that many energetic crystals have a significant binding contribution resulting from dispersion, a phenomena that is not accurately described by computational methods that are not explicitly correlated. This paper details the use of a state-of-the art quantum chemistry method, coupled-cluster theory, to compute a six-dimensional, dimer potential energy surface of the Fox-7 energetic molecule, which will be used to develop a pair potential for use in molecular dynamics simulations. In addition, a dimer potential energy function determined using symmetry-adapted perturbation theory is described and molecular dynamics simulations using the fitted potential are presented.", "abstracts": [ { "abstractType": "Regular", "content": "1,1-diamino-2,2-dinitroethylene (Fox-7) has proven to be a promising energetic material due to its low shock sensitivity and high thermal stability, and has been the subject of several Department of Defense (DoD) theoretical investigations employing Hartree-Fock and density functional theory. However, it is well-known that many energetic crystals have a significant binding contribution resulting from dispersion, a phenomena that is not accurately described by computational methods that are not explicitly correlated. This paper details the use of a state-of-the art quantum chemistry method, coupled-cluster theory, to compute a six-dimensional, dimer potential energy surface of the Fox-7 energetic molecule, which will be used to develop a pair potential for use in molecular dynamics simulations. In addition, a dimer potential energy function determined using symmetry-adapted perturbation theory is described and molecular dynamics simulations using the fitted potential are presented.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "1,1-diamino-2,2-dinitroethylene (Fox-7) has proven to be a promising energetic material due to its low shock sensitivity and high thermal stability, and has been the subject of several Department of Defense (DoD) theoretical investigations employing Hartree-Fock and density functional theory. However, it is well-known that many energetic crystals have a significant binding contribution resulting from dispersion, a phenomena that is not accurately described by computational methods that are not explicitly correlated. This paper details the use of a state-of-the art quantum chemistry method, coupled-cluster theory, to compute a six-dimensional, dimer potential energy surface of the Fox-7 energetic molecule, which will be used to develop a pair potential for use in molecular dynamics simulations. In addition, a dimer potential energy function determined using symmetry-adapted perturbation theory is described and molecular dynamics simulations using the fitted potential are presented.", "fno": "06018002", "keywords": [ "Coupled Cluster Calculations", "Explosives", "Molecular Dynamics Method", "Organic Compounds", "Perturbation Theory", "Potential Energy Functions", "Potential Energy Surfaces", "Energetic Materials", "Coupled Cluster Theory", "1 1 Diamino 2 2 Dinitroethylene", "Shock Sensitivity", "Thermal Stability", "Hartree Fock Theory", "Density Functional Theory", "Quantum Chemistry Method", "Six Dimensional Dimer Potential Energy Surface", "Energetic Molecule", "Molecular Dynamics Simulations", "Dimer Potential Energy Function", "Symmetry Adapted Perturbation Theory", "Computational Modeling", "Chemistry", "Materials", "US Department Of Defense", "Potential Energy", "Force", "Weapons" ], "authors": [ { "affiliation": null, "fullName": "DeCarlos E. Taylor", "givenName": "DeCarlos E.", "surname": "Taylor", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcmp-ugc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "263-268", "year": "2010", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06018001", "articleId": "12OmNBziBam", "__typename": "AdjacentArticleType" }, "next": { "fno": "06018003", "articleId": "12OmNBUS75h", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcmp-ugc/2010/986/0/06018016", "title": "Dispersion Interactions in Calculations of Properties of Energetic Materials", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018016/12OmNBSSVfl", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a175", "title": "Design of Energetic Ionic Liquids", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a175/12OmNBTawzL", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018020", "title": "Environmental Fate and Transport of Energetic Materials: The Aqueous Environment", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018020/12OmNqIQS74", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2007/3088/0/30880171", "title": "Design of Energetic Ionic Liquids", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2007/30880171/12OmNvSKNX5", "parentPublication": { "id": "proceedings/hpcmp-ugc/2007/3088/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a219", "title": "Polynitrogen/Nanoaluminum Surface Interactions", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a219/12OmNvsm6xV", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a182", "title": "Direct Quantum Mechanical Simulations of Shocked Energetic Materials Supporting Future Force Insensitive Munitions (IM) Requirements", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a182/12OmNwHhoLY", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2008/3515/0/3515a191", "title": "Direct Quantum Mechanical Simulations of Shocked Energetic Materials Supporting Future Force Insensitive Munitions (IM) Requirements", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2008/3515a191/12OmNwp74xA", "parentPublication": { "id": "proceedings/hpcmp-ugc/2008/3515/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a225", "title": "Predictions of Properties of Energetic Materials from First Principles", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a225/12OmNzQzqf2", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018015", "title": "Design of Energetic Ionic Liquids", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018015/12OmNzayNnq", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2008/3515/0/3515a187", "title": "Crystal Structures from Nonempirical Force Fields", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2008/3515a187/12OmNzlUKrc", "parentPublication": { "id": "proceedings/hpcmp-ugc/2008/3515/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqL", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "acronym": "hpcmp-ugc", "groupId": "1002962", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNz61dfN", "doi": "10.1109/HPCMP-UGC.2010.68", "title": "A Common Computational Science Environment for High Performance Computing Centers", "normalizedTitle": "A Common Computational Science Environment for High Performance Computing Centers", "abstract": "The Computational Sciences Environment (CSE) was developed to provide a standard development platform for data analysis, visualization, and software testing and evaluation. The Classified Data Analysis and Assessment Center (CDAAC), in conjunction with the Computational Sciences and Engineering Branch (CSEB) of the Army Research Laboratory, assembled a set of open source data analysis tools and applications, software management and testing tools, and libraries necessary to run the tools; and made them available as a package called CSE. CSE also provides experimental software builds for users who might need newer features than what is currently available in the release package. The CSE team provides support for developers, the end-user, and distributed development teams. Tests are regularly run on the software, both current and release, and the results are submitted to quality dashboards for review using CTest. CTest is part of an open-source software building tool called CMake. Developers can use CSE as a template and can customize it to meet their specific project goals. CSE provides developers with a common tool set to assist in developing portable high performance computing (HPC) Applications. Development of CSE has been managed through an open-source project management application that provides Software Configuration Management (SCM) integration of the CSE repository, informational wikis, bug tracking, and feature requests. To support distributed development teams, CSE provides project management tools, software repositories, SCM, and online software quality dashboards.", "abstracts": [ { "abstractType": "Regular", "content": "The Computational Sciences Environment (CSE) was developed to provide a standard development platform for data analysis, visualization, and software testing and evaluation. The Classified Data Analysis and Assessment Center (CDAAC), in conjunction with the Computational Sciences and Engineering Branch (CSEB) of the Army Research Laboratory, assembled a set of open source data analysis tools and applications, software management and testing tools, and libraries necessary to run the tools; and made them available as a package called CSE. CSE also provides experimental software builds for users who might need newer features than what is currently available in the release package. The CSE team provides support for developers, the end-user, and distributed development teams. Tests are regularly run on the software, both current and release, and the results are submitted to quality dashboards for review using CTest. CTest is part of an open-source software building tool called CMake. Developers can use CSE as a template and can customize it to meet their specific project goals. CSE provides developers with a common tool set to assist in developing portable high performance computing (HPC) Applications. Development of CSE has been managed through an open-source project management application that provides Software Configuration Management (SCM) integration of the CSE repository, informational wikis, bug tracking, and feature requests. To support distributed development teams, CSE provides project management tools, software repositories, SCM, and online software quality dashboards.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Computational Sciences Environment (CSE) was developed to provide a standard development platform for data analysis, visualization, and software testing and evaluation. The Classified Data Analysis and Assessment Center (CDAAC), in conjunction with the Computational Sciences and Engineering Branch (CSEB) of the Army Research Laboratory, assembled a set of open source data analysis tools and applications, software management and testing tools, and libraries necessary to run the tools; and made them available as a package called CSE. CSE also provides experimental software builds for users who might need newer features than what is currently available in the release package. The CSE team provides support for developers, the end-user, and distributed development teams. Tests are regularly run on the software, both current and release, and the results are submitted to quality dashboards for review using CTest. CTest is part of an open-source software building tool called CMake. Developers can use CSE as a template and can customize it to meet their specific project goals. CSE provides developers with a common tool set to assist in developing portable high performance computing (HPC) Applications. Development of CSE has been managed through an open-source project management application that provides Software Configuration Management (SCM) integration of the CSE repository, informational wikis, bug tracking, and feature requests. To support distributed development teams, CSE provides project management tools, software repositories, SCM, and online software quality dashboards.", "fno": "06018025", "keywords": [ "Computer Centres", "Data Analysis", "Data Visualisation", "Program Testing", "Project Management", "Public Domain Software", "Software Libraries", "Software Management", "Software Packages", "Software Quality", "Software Tools", "Computational Science Environment", "Data Visualization", "Software Testing", "Classified Data Analysis And Assessment Center", "Software Tools", "Libraries", "Software Package", "CSE", "Quality Dashboards", "C Test", "Open Source Software", "High Performance Computing Centre", "Software Configuration Management", "Informational Wikis", "Project Management Tools", "Software Repositories", "Software Quality", "SCM", "Software", "Libraries", "Data Visualization", "Testing", "Data Analysis", "US Department Of Defense", "Buildings" ], "authors": [ { "affiliation": "US Army Res. Lab. (ARL), Aberdeen Proving Ground, MD, USA", "fullName": "Jerry Clarke", "givenName": "Jerry", "surname": "Clarke", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Res. Lab. (ARL), Aberdeen Proving Ground, MD, USA", "fullName": "John Vines", "givenName": "John", "surname": "Vines", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Res. Lab. (ARL), Aberdeen Proving Ground, MD, USA", "fullName": "Kelly Kirk", "givenName": "Kelly", "surname": "Kirk", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Res. Lab. (ARL), Aberdeen Proving Ground, MD, USA", "fullName": "Eric Mark", "givenName": "Eric", "surname": "Mark", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Res. Lab. (ARL), Aberdeen Proving Ground, MD, USA", "fullName": "Rick Angelini", "givenName": "Rick", "surname": "Angelini", "__typename": "ArticleAuthorType" }, { "affiliation": "ARL, Lockheed Martin, Aberdeen Proving Ground, MD, USA", "fullName": "Carrie Spear", "givenName": "Carrie", "surname": "Spear", "__typename": "ArticleAuthorType" }, { "affiliation": "ARL, Lockheed Martin, Aberdeen Proving Ground, MD, USA", "fullName": "Nathaniel Waisbrot", "givenName": "Nathaniel", "surname": "Waisbrot", "__typename": "ArticleAuthorType" }, { "affiliation": "ARL, Lockheed Martin, Aberdeen Proving Ground, MD, USA", "fullName": "Joel Martin", "givenName": "Joel", "surname": "Martin", "__typename": "ArticleAuthorType" }, { "affiliation": "ARL, Lockheed Martin, Aberdeen Proving Ground, MD, USA", "fullName": "Ken Leiter", "givenName": "Ken", "surname": "Leiter", "__typename": "ArticleAuthorType" }, { "affiliation": "Kitware Inc., Clifton Park, NY, USA", "fullName": "Bill Hoffman", "givenName": "Bill", "surname": "Hoffman", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcmp-ugc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "442-449", "year": "2010", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06018024", "articleId": "12OmNyQ7G3p", "__typename": "AdjacentArticleType" }, "next": { "fno": "06018026", "articleId": "12OmNxZkhw2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/secse/2009/3737/0/05069157", "title": "Barely sufficient software engineering: 10 practices to improve your CSE software", "doi": null, "abstractUrl": "/proceedings-article/secse/2009/05069157/12OmNB9t6oF", "parentPublication": { "id": "proceedings/secse/2009/3737/0", "title": "2009 ICSE Workshop on Software Engineering for Computational Science and Engineering (SECSE 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2011/0445/0/04451226", "title": "Fourth international workshop on software engineering for computational science and engineering: (SE-CSE2011)", "doi": null, "abstractUrl": "/proceedings-article/icse/2011/04451226/12OmNBqdr9x", "parentPublication": { "id": "proceedings/icse/2011/0445/0", "title": "2011 33rd International Conference on Software Engineering (ICSE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018022", "title": "Making ParaView Easier for the Customer: A Guide to Implementers", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018022/12OmNC8Msw1", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/se-hpccse/2014/7035/0/7035a020", "title": "Towards Test Driven Development for Computational Science with pFUnit", "doi": null, "abstractUrl": "/proceedings-article/se-hpccse/2014/7035a020/12OmNs0kyrA", "parentPublication": { "id": "proceedings/se-hpccse/2014/7035/0", "title": "2014 Second International Workshop on Software Engineering for High Performance Computing in Computational Science & Engineering (SE-HPCCSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2010/986/0/06018045", "title": "Collaborative Software Development of Scalable DoD Computational Engineering", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06018045/12OmNvTTckf", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606780", "title": "5th International workshop on software engineering for Computational Science and Engineering (SE-CSE 2013)", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606780/12OmNvsm6zj", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgsew/2016/3625/0/3625a025", "title": "Distributed Software Development with One Hand Tied Behind the Back: A Course Unit to Experience the Role of Communication in GSD", "doi": null, "abstractUrl": "/proceedings-article/icgsew/2016/3625a025/12OmNx9WSWZ", "parentPublication": { "id": "proceedings/icgsew/2016/3625/0", "title": "2016 IEEE 11th International Conference on Global Software Engineering Workshops (ICGSEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2008/3515/0/3515a382", "title": "The Computational Science Environment (CSE)", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2008/3515a382/12OmNyKrHk4", "parentPublication": { "id": "proceedings/hpcmp-ugc/2008/3515/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2017/02/mcs2017020091", "title": "The 4th International Workshop on Software Engineering for HPC in Computational Science and Engineering", "doi": null, "abstractUrl": "/magazine/cs/2017/02/mcs2017020091/13rRUxBJhz9", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2020/4905/0/09049681", "title": "Metrics to Meet Security &#x0026; Privacy Requirements with Agile Software Development Methods in a Regulated Environment", "doi": null, "abstractUrl": "/proceedings-article/icnc/2020/09049681/1iES2gmWjDO", "parentPublication": { "id": "proceedings/icnc/2020/4905/0", "title": "2020 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAH5djW", "title": "2017 IEEE International Parallel and Distributed Processing Symposium: Workshops (IPDPSW)", "acronym": "ipdpsw", "groupId": "1800044", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNznkJQ8", "doi": "10.1109/IPDPSW.2017.158", "title": "Preemptive resource management for dynamically arriving tasks in an oversubscribed heterogeneous computing system", "normalizedTitle": "Preemptive resource management for dynamically arriving tasks in an oversubscribed heterogeneous computing system", "abstract": "We design resource management heuristics that assign serial tasks to the nodes of a heterogeneous high performance computing (HPC) system. The value of completing these tasks is modeled using monotonically decreasing utility functions that represent the time-varying importance of the task. The value of completing a task is equal to its utility function at the time of its completion. The overall performance of this system is measured using the total utility earned by all tasks during some interval of time. To maximize the performance of such a system where the preemption of tasks is possible, we have designed, analyzed, and compared a set of resource allocation heuristic techniques. We combine two utility-aware heuristics with three different preemption techniques to create six preemption-capable heuristics. We also consider the two utility-aware heuristics without preemption. We use simulation studies to evaluate this set of eight heuristics and compare them with an FCFS heuristic, which is often used in real systems, and random assignments. In general, our set of eight heuristics is able to significantly outperform the comparison heuristics, and the preemption-capable heuristics are able to significantly increase the utility earned compared to the heuristics that do not use preemption. We analyze the performance tradeoffs among the different preemption-capable heuristics under a variety of oversubscribed workload environments.", "abstracts": [ { "abstractType": "Regular", "content": "We design resource management heuristics that assign serial tasks to the nodes of a heterogeneous high performance computing (HPC) system. The value of completing these tasks is modeled using monotonically decreasing utility functions that represent the time-varying importance of the task. The value of completing a task is equal to its utility function at the time of its completion. The overall performance of this system is measured using the total utility earned by all tasks during some interval of time. To maximize the performance of such a system where the preemption of tasks is possible, we have designed, analyzed, and compared a set of resource allocation heuristic techniques. We combine two utility-aware heuristics with three different preemption techniques to create six preemption-capable heuristics. We also consider the two utility-aware heuristics without preemption. We use simulation studies to evaluate this set of eight heuristics and compare them with an FCFS heuristic, which is often used in real systems, and random assignments. In general, our set of eight heuristics is able to significantly outperform the comparison heuristics, and the preemption-capable heuristics are able to significantly increase the utility earned compared to the heuristics that do not use preemption. We analyze the performance tradeoffs among the different preemption-capable heuristics under a variety of oversubscribed workload environments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We design resource management heuristics that assign serial tasks to the nodes of a heterogeneous high performance computing (HPC) system. The value of completing these tasks is modeled using monotonically decreasing utility functions that represent the time-varying importance of the task. The value of completing a task is equal to its utility function at the time of its completion. The overall performance of this system is measured using the total utility earned by all tasks during some interval of time. To maximize the performance of such a system where the preemption of tasks is possible, we have designed, analyzed, and compared a set of resource allocation heuristic techniques. We combine two utility-aware heuristics with three different preemption techniques to create six preemption-capable heuristics. We also consider the two utility-aware heuristics without preemption. We use simulation studies to evaluate this set of eight heuristics and compare them with an FCFS heuristic, which is often used in real systems, and random assignments. In general, our set of eight heuristics is able to significantly outperform the comparison heuristics, and the preemption-capable heuristics are able to significantly increase the utility earned compared to the heuristics that do not use preemption. We analyze the performance tradeoffs among the different preemption-capable heuristics under a variety of oversubscribed workload environments.", "fno": "3408a054", "keywords": [ "Resource Management", "US Department Of Defense", "Computational Modeling", "High Performance Computing", "Time Measurement", "Heterogeneous Computing", "Utility Functions", "Resource Management Heuristics", "Scheduling", "Preemption" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Colorado State Univ., Fort Collins, CO, USA", "fullName": "Dylan Machovec", "givenName": "Dylan", "surname": "Machovec", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Colorado State Univ., Fort Collins, CO, USA", "fullName": "Sudeep Pasricha", "givenName": "Sudeep", "surname": "Pasricha", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Colorado State Univ., Fort Collins, CO, USA", "fullName": "Anthony A. Maciejewski", "givenName": "Anthony A.", "surname": "Maciejewski", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Colorado State Univ., Fort Collins, CO, USA", "fullName": "Howard Jay Siegel", "givenName": "Howard Jay", "surname": "Siegel", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Defense, Washington, DC, USA", "fullName": "Gregory A. Koenig", "givenName": "Gregory A.", "surname": "Koenig", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Defense, Washington, DC, USA", "fullName": "Michael Wright", "givenName": "Michael", "surname": "Wright", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Defense, Washington, DC, USA", "fullName": "Marcia Hilton", "givenName": "Marcia", "surname": "Hilton", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Defense, Washington, DC, USA", "fullName": "Rajendra Rambharos", "givenName": "Rajendra", "surname": "Rambharos", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge Nat. Lab., Oak Ridge, TN, USA", "fullName": "Thomas Naughton", "givenName": "Thomas", "surname": "Naughton", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge Nat. Lab., Oak Ridge, TN, USA", "fullName": "Neena Imam", "givenName": "Neena", "surname": "Imam", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdpsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-05-01T00:00:00", "pubType": "proceedings", "pages": "54-64", "year": "2017", "issn": null, "isbn": "978-1-5386-3408-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3408a042", "articleId": "12OmNzFMFnk", "__typename": "AdjacentArticleType" }, "next": { "fno": "3408a065", "articleId": "12OmNrJ11v5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/rtss/2011/2000/0/06121443", "title": "Improving Feasibility of Fixed Priority Tasks Using Non-Preemptive Regions", "doi": null, "abstractUrl": "/proceedings-article/rtss/2011/06121443/12OmNCeaPUo", "parentPublication": { "id": "proceedings/rtss/2011/2000/0", "title": "2011 IEEE 32nd Real-Time Systems Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtas/2008/3146/0/3146a058", "title": "Bounding Worst-Case Response Time for Tasks with Non-Preemptive Regions", "doi": null, "abstractUrl": "/proceedings-article/rtas/2008/3146a058/12OmNx3HI6c", "parentPublication": { "id": "proceedings/rtas/2008/3146/0", "title": "2008 IEEE Real-Time and Embedded Technology and Applications Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458019", "title": "A Preemptive Version of the Min-Min Heuristic for Dynamically Mapping Meta-Tasks on a Distributed Heterogeneous Environment", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458019/12OmNx76TB2", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2016/3682/0/3682a067", "title": "Dynamic Resource Management for Parallel Tasks in an Oversubscribed Energy-Constrained Heterogeneous Environment", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682a067/12OmNx7ouSy", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/real/1991/2450/0/00160366", "title": "On non-preemptive scheduling of period and sporadic tasks", "doi": null, "abstractUrl": "/proceedings-article/real/1991/00160366/12OmNyv7maR", "parentPublication": { "id": "proceedings/real/1991/2450/0", "title": "Proceedings Twelfth Real-Time Systems Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2014/4116/0/4116a058", "title": "Utility Driven Dynamic Resource Management in an Oversubscribed Energy-Constrained Heterogeneous System", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2014/4116a058/12OmNzWfp02", "parentPublication": { "id": "proceedings/ipdpsw/2014/4116/0", "title": "2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsid/2001/0831/0/08310097", "title": "Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2001/08310097/12OmNzYeAWu", "parentPublication": { "id": "proceedings/vlsid/2001/0831/0", "title": "VLSI Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csac/1993/4330/0/00315449", "title": "Heterogeneous workstation to STU-III prototype", "doi": null, "abstractUrl": "/proceedings-article/csac/1993/00315449/12OmNzYeB42", "parentPublication": { "id": "proceedings/csac/1993/4330/0", "title": "Proceedings of 9th Annual Computer Security Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2015/08/06912017", "title": "Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment", "doi": null, "abstractUrl": "/journal/tc/2015/08/06912017/13rRUy0qnFI", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440833", "title": "SmartCues: A Multitouch Query Approach for Details-on-Demand through Dynamically Computed Overlays", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440833/17D45Vw15wL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwKoZd4", "title": "2011 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "1gMviG5uVJm", "doi": "10.1109/VAST.2011.6102482", "title": "Pexel and heatmap visual analysis of multidimensional gun/homicide data", "normalizedTitle": "Pexel and heatmap visual analysis of multidimensional gun/homicide data", "abstract": "We present a visual analysis tool for mining correlations in county-level, multidimensional gun/homicide data. The tool uses 2D pexels, heatmaps, linked-views, dynamic queries and details-on-demand to analyze annual county-level data on firearm homicide rates and gun availability, as well as various socio-demographic measures. A statistical significance filter was implemented as a visual means to validate exploratory hypotheses. Results from expert evaluations indicate that our methods outperform typical graphical techniques used by statisticians, such as bar graphs, scatterplots and residual plots, to show spatial and temporal relationships. Our visualization has the potential to convey the impact of gun availability on firearm homicides to the public health arena and the general public.", "abstracts": [ { "abstractType": "Regular", "content": "We present a visual analysis tool for mining correlations in county-level, multidimensional gun/homicide data. The tool uses 2D pexels, heatmaps, linked-views, dynamic queries and details-on-demand to analyze annual county-level data on firearm homicide rates and gun availability, as well as various socio-demographic measures. A statistical significance filter was implemented as a visual means to validate exploratory hypotheses. Results from expert evaluations indicate that our methods outperform typical graphical techniques used by statisticians, such as bar graphs, scatterplots and residual plots, to show spatial and temporal relationships. Our visualization has the potential to convey the impact of gun availability on firearm homicides to the public health arena and the general public.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a visual analysis tool for mining correlations in county-level, multidimensional gun/homicide data. The tool uses 2D pexels, heatmaps, linked-views, dynamic queries and details-on-demand to analyze annual county-level data on firearm homicide rates and gun availability, as well as various socio-demographic measures. A statistical significance filter was implemented as a visual means to validate exploratory hypotheses. Results from expert evaluations indicate that our methods outperform typical graphical techniques used by statisticians, such as bar graphs, scatterplots and residual plots, to show spatial and temporal relationships. Our visualization has the potential to convey the impact of gun availability on firearm homicides to the public health arena and the general public.", "fno": "06102482", "keywords": [ "Data Analysis", "Data Visualisation", "Police Data Processing", "Statistical Analysis", "2 D Pexel", "Heatmap Visual Analysis", "Gun Data", "Firearm Homicide Data", "Linked View", "Dynamic Query", "Details On Demand", "Firearm Homicide Rate", "Gun Availability", "Statistical Significance Filter", "Bar Graphs", "Scatterplots", "Residual Plot", "Heating", "Visualization", "Fires", "Image Color Analysis", "Availability", "Data Visualization", "Correlation" ], "authors": [ { "affiliation": "Department of Statistics, University of Pittsburgh, USA", "fullName": "Scott D. Rothenberger", "givenName": "Scott D.", "surname": "Rothenberger", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Pittsburgh, USA", "fullName": "John E. Wenskovitch Jr.", "givenName": "John E.", "surname": "Wenskovitch", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Pittsburgh, USA", "fullName": "G. Elisabeta Marai", "givenName": "G. Elisabeta", "surname": "Marai", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "297-298", "year": "2011", "issn": null, "isbn": "978-1-4673-0015-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06102431", "articleId": "12OmNqIQSl4", "__typename": "AdjacentArticleType" }, "next": { "fno": "06102483", "articleId": "12OmNz6iOfw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2014/2874/0/2874a258", "title": "Visual Detection of Anomalies in DNS Query Log Data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a258/12OmNBTawfH", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a084", "title": "A Heatmap-Based Time-Varying Multi-variate Data Visualization Unifying Numeric and Categorical Variables", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a084/12OmNqESuhq", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2011/0015/0/06102493", "title": "An integrated visualization on network events VAST 2011 Mini Challenge #2 Award: “Outstanding integrated overview display”", "doi": null, "abstractUrl": "/proceedings-article/vast/2011/06102493/12OmNqNG3ji", "parentPublication": { "id": "proceedings/vast/2011/0015/0", "title": "2011 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr/2009/3589/0/3589a307", "title": "Architectural Maintenance Using a Data Warehouse System for Availability Analysis", "doi": null, "abstractUrl": "/proceedings-article/csmr/2009/3589a307/12OmNwErpOv", "parentPublication": { "id": "proceedings/csmr/2009/3589/0", "title": "2009 13th European Conference on Software Maintenance and Reengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061027", "title": "Comparative Analysis of Multidimensional, Quantitative Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061027/13rRUNvya9i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/06/mcg2016060058", "title": "BKViz: A Basketball Visual Analysis Tool", "doi": null, "abstractUrl": "/magazine/cg/2016/06/mcg2016060058/13rRUwcS1v2", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122581", "title": "DICON: Interactive Visual Analysis of Multidimensional Clusters", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122581/13rRUxcbnH8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2021/0764/0/076400a295", "title": "Research on Visual Assembly Design Flow of a Certain Type of Gun Automatic Ammunition Feeder", "doi": null, "abstractUrl": "/proceedings-article/ichci/2021/076400a295/1Bb0Z03GH4Y", "parentPublication": { "id": "proceedings/ichci/2021/0764/0", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2019/3485/0/348500a158", "title": "Academic Performance Analysis Supported by a Web-Based Visual Analytics Tool", "doi": null, "abstractUrl": "/proceedings-article/icalt/2019/348500a158/1cYi2u2hrhu", "parentPublication": { "id": "proceedings/icalt/2019/3485/2161-377X", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2020/8666/0/866600a627", "title": "Research on the Platform Construction of Guangxi County Tourism Economic Analysis", "doi": null, "abstractUrl": "/proceedings-article/icicta/2020/866600a627/1wRIzDYIH4s", "parentPublication": { "id": "proceedings/icicta/2020/8666/0", "title": "2020 13th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKk", "title": "2007 11th International Conference Information Visualization (IV '07)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNBubOQB", "doi": "10.1109/IV.2007.90", "title": "PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views", "normalizedTitle": "PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views", "abstract": "Information visualization techniques have been successfully used to build visual and interactive analysis of data and data relationships. However, dimensionality, volume and diversity make it difficult for a single technique to completely solve the problem. Information visualization tools that support multiple coordinated views allow the user to better understand the dataset by providing different perspectives based on the same set of data items. These tools support the correlation between data views and the coordinated real-time interaction mechanisms. The goal of this paper is to present the PRISMA information visualization tool that explores the use of multiple coordinated views. PRISMA provides usability, portability and extensibility. Initial usability essays are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Information visualization techniques have been successfully used to build visual and interactive analysis of data and data relationships. However, dimensionality, volume and diversity make it difficult for a single technique to completely solve the problem. Information visualization tools that support multiple coordinated views allow the user to better understand the dataset by providing different perspectives based on the same set of data items. These tools support the correlation between data views and the coordinated real-time interaction mechanisms. The goal of this paper is to present the PRISMA information visualization tool that explores the use of multiple coordinated views. PRISMA provides usability, portability and extensibility. Initial usability essays are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Information visualization techniques have been successfully used to build visual and interactive analysis of data and data relationships. However, dimensionality, volume and diversity make it difficult for a single technique to completely solve the problem. Information visualization tools that support multiple coordinated views allow the user to better understand the dataset by providing different perspectives based on the same set of data items. These tools support the correlation between data views and the coordinated real-time interaction mechanisms. The goal of this paper is to present the PRISMA information visualization tool that explores the use of multiple coordinated views. PRISMA provides usability, portability and extensibility. Initial usability essays are discussed.", "fno": "29000023", "keywords": [ "Data Analysis", "Data Visualisation", "PRISMA", "Multidimensional Information Visualization Tool", "Multiple Coordinated Views", "Data Visualization", "Data Interactive Analysis", "Data Relationships", "Multidimensional Systems", "Data Visualization", "Data Analysis", "Filters", "Usability", "Scattering", "Graphics", "Information Analysis", "Tree Graphs", "Java", "Information Visualization", "Multiple", "Coordinated Views", "Visualization Tools", "Treemap", "Parallel Coordinates", "Scatterplot" ], "authors": [ { "affiliation": "Universidade Federal do Pará (UFPA)", "fullName": "Paulo Igor A. Godinho", "givenName": "Paulo Igor A.", "surname": "Godinho", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Pará (UFPA)", "fullName": "Bianchi Serique Meiguins", "givenName": "Bianchi Serique", "surname": "Meiguins", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro Universitário do Pará (CESUPA)", "fullName": "Aruanda Simoes Goncalves Meiguins", "givenName": "Aruanda Simoes Goncalves", "surname": "Meiguins", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Pará (UFPA)", "fullName": "Ricardo M. Casseb do Carmo", "givenName": "Ricardo M.", "surname": "Casseb do Carmo", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro Universitário do Pará (CESUPA)", "fullName": "Marcelo de Brito Garcia", "givenName": "Marcelo", "surname": "de Brito Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Pará (UFPA)", "fullName": "Leandro Hernandez Almeida", "givenName": "Leandro Hernandez", "surname": "Almeida", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro Universitário do Pará (CESUPA)", "fullName": "Rodrigo Lourenco", "givenName": "Rodrigo", "surname": "Lourenco", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-07-01T00:00:00", "pubType": "proceedings", "pages": "23-32", "year": "2007", "issn": "1550-6037", "isbn": "0-7695-2900-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04271948", "articleId": "12OmNwEJ0YJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "2900xii", "articleId": "12OmNzTH0Oc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a151", "title": "An Information Visualization Tool with Multiple Coordinated Views for Network Traffic Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a151/12OmNBKEyuH", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2013/5049/0/5049a147", "title": "PRISMA-MDE - Information Visualization Environment for Multiple Display", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a147/12OmNBTJIB1", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030072", "title": "Coordinated Multiple Views: a Critical View", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004057", "title": "Prisma Maps -- A  Geovisualization Support for Prisma Multiple Coordinated View Information Visualization Tool", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004057/12OmNqI04Uh", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a113", "title": "The Impact of Multiple Coordinated Views on the Visual Data Exploration and Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a113/12OmNrY3LB9", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000156", "title": "Coordinated and Multiple Views in Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a645", "title": "WebPrisma: An Interactive Web-Based Tool for Exploratory Visualization Using Multiple Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a645/12OmNwErpOH", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a627", "title": "Using Multiple Coordinated Views for Multiple Datasets Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a627/12OmNyGbIby", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a258", "title": "Business Transactions Analysis Based on Multiple Data Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a258/12OmNynJMFi", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a396", "title": "Analysing the Large-Scale, Time-Oriented, VAST 2010 MC2 Dataset with PRISMA", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a396/12OmNzFdtaR", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxzMnU0", "title": "2011 15th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzJbR1F", "doi": "10.1109/IV.2011.15", "title": "Method to Design Coordinated Multiple Views Adapted to User's Business Requirements in 4D Collaborative Tools in AEC", "normalizedTitle": "Method to Design Coordinated Multiple Views Adapted to User's Business Requirements in 4D Collaborative Tools in AEC", "abstract": "The issue of multiple views coordination became more and more challenging in the architecture, engineering and construction (AEC) field since the apparition and the increasing success of 4D/nD CAD. In order to adapt visualization to user's business requirements in 4D-supported collaborative tools, this paper propose a method to design coordinated multiple views based on Model-Driven Engineering (MDE). The method enables user's visualization needs description, visualization modes comparison. The aim is to choose appropriate visualization modes business needs, to associate interaction principles and coordination mechanisms in order to compose coordinated multiple views adapted to actor's business needs. The paper presents a case study based on literature review and interviews with construction sector practitioners.", "abstracts": [ { "abstractType": "Regular", "content": "The issue of multiple views coordination became more and more challenging in the architecture, engineering and construction (AEC) field since the apparition and the increasing success of 4D/nD CAD. In order to adapt visualization to user's business requirements in 4D-supported collaborative tools, this paper propose a method to design coordinated multiple views based on Model-Driven Engineering (MDE). The method enables user's visualization needs description, visualization modes comparison. The aim is to choose appropriate visualization modes business needs, to associate interaction principles and coordination mechanisms in order to compose coordinated multiple views adapted to actor's business needs. The paper presents a case study based on literature review and interviews with construction sector practitioners.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The issue of multiple views coordination became more and more challenging in the architecture, engineering and construction (AEC) field since the apparition and the increasing success of 4D/nD CAD. In order to adapt visualization to user's business requirements in 4D-supported collaborative tools, this paper propose a method to design coordinated multiple views based on Model-Driven Engineering (MDE). The method enables user's visualization needs description, visualization modes comparison. The aim is to choose appropriate visualization modes business needs, to associate interaction principles and coordination mechanisms in order to compose coordinated multiple views adapted to actor's business needs. The paper presents a case study based on literature review and interviews with construction sector practitioners.", "fno": "06004028", "keywords": [ "Architectural CAD", "Architecture", "Business Data Processing", "Construction", "Data Visualisation", "Groupware", "User Business Requirements", "4 D Collaborative Tools", "Multiple Views Coordination", "Architecture", "4 D N D CAD", "Model Driven Engineering", "Visualization Modes", "Interaction Principle", "Construction Sector", "Architecture Field", "Engineering Field", "Construction Field", "Data Visualization", "Business", "Buildings", "Three Dimensional Displays", "Visualization", "Collaboration", "Adaptation Models", "AEC", "4 D CAD", "Coordinated Multiple Views", "Visualization Modeling", "Model Driven Engineering", "CSCW", "Business Views" ], "authors": [ { "affiliation": null, "fullName": "Conrad Boton", "givenName": "Conrad", "surname": "Boton", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sylvain Kubicki", "givenName": "Sylvain", "surname": "Kubicki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gilles Halin", "givenName": "Gilles", "surname": "Halin", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "96-101", "year": "2011", "issn": "1550-6037", "isbn": "978-1-4577-0868-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06004027", "articleId": "12OmNyQph8m", "__typename": "AdjacentArticleType" }, "next": { "fno": "06004029", "articleId": "12OmNy4IEX6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a151", "title": "An Information Visualization Tool with Multiple Coordinated Views for Network Traffic Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a151/12OmNBKEyuH", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030072", "title": "Coordinated Multiple Views: a Critical View", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000023", "title": "PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000023/12OmNBubOQB", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030061", "title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000156", "title": "Coordinated and Multiple Views in Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a645", "title": "WebPrisma: An Interactive Web-Based Tool for Exploratory Visualization Using Multiple Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a645/12OmNwErpOH", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2004/8696/0/86960011", "title": "A Layered Architecture for the Exploration of Heterogeneous Information Using Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2004/86960011/12OmNwK7o8U", "parentPublication": { "id": "proceedings/vlhcc/2004/8696/0", "title": "Proceedings. 2004 IEEE Symposium on Visual Languages and Human Centric Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2003/2001/0/20010095", "title": "Coordinated Views in Dynamic Interactive Documents", "doi": null, "abstractUrl": "/proceedings-article/cmv/2003/20010095/12OmNy5R3zQ", "parentPublication": { "id": "proceedings/cmv/2003/2001/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a258", "title": "Business Transactions Analysis Based on Multiple Data Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a258/12OmNynJMFi", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a246", "title": "Coordinated and Multiple Views for Visualizing Text Collections", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a246/12OmNzBwGtI", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwIYZzD", "title": "2015 IEEE Second VR International Workshop on Collaborative Virtual Environments (3DCVE)", "acronym": "3dcve", "groupId": "1807844", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzaQoHO", "doi": "10.1109/3DCVE.2015.7153591", "title": "Remote collaboration across heterogeneous large interactive spaces", "normalizedTitle": "Remote collaboration across heterogeneous large interactive spaces", "abstract": "Immersive virtual reality systems or high resolution wall-sized displays become more common for analyzing the increasing among of data from science, industry, business and society. These large interactive spaces are powerful tools to enable remote users to work together on shared data. However, we cannot imagine that remote collaboration in such systems becomes wide-spread if it requires that all users have the exact same physical devices, and we need to make remote collaboration across different systems possible. The asymmetric interaction capabilities of each user are also an interesting opportunity to develop new collaboration strategies. In this short position paper, we present our past work about collaborative virtual environments and, in particular, how to represent the physical environments of each user in a virtual environment. We also introduce an on-going project which aims to support remote collaborative interaction across heterogeneous large interactive spaces.", "abstracts": [ { "abstractType": "Regular", "content": "Immersive virtual reality systems or high resolution wall-sized displays become more common for analyzing the increasing among of data from science, industry, business and society. These large interactive spaces are powerful tools to enable remote users to work together on shared data. However, we cannot imagine that remote collaboration in such systems becomes wide-spread if it requires that all users have the exact same physical devices, and we need to make remote collaboration across different systems possible. The asymmetric interaction capabilities of each user are also an interesting opportunity to develop new collaboration strategies. In this short position paper, we present our past work about collaborative virtual environments and, in particular, how to represent the physical environments of each user in a virtual environment. We also introduce an on-going project which aims to support remote collaborative interaction across heterogeneous large interactive spaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Immersive virtual reality systems or high resolution wall-sized displays become more common for analyzing the increasing among of data from science, industry, business and society. These large interactive spaces are powerful tools to enable remote users to work together on shared data. However, we cannot imagine that remote collaboration in such systems becomes wide-spread if it requires that all users have the exact same physical devices, and we need to make remote collaboration across different systems possible. The asymmetric interaction capabilities of each user are also an interesting opportunity to develop new collaboration strategies. In this short position paper, we present our past work about collaborative virtual environments and, in particular, how to represent the physical environments of each user in a virtual environment. We also introduce an on-going project which aims to support remote collaborative interaction across heterogeneous large interactive spaces.", "fno": "07153591", "keywords": [ "Collaboration", "Three Dimensional Displays", "Virtual Environments", "Solid Modeling", "Data Visualization", "Data Analysis" ], "authors": [ { "affiliation": "Université Paris-Sud & CNRS (LRI), Inria, Orsay (France)", "fullName": "Cedric Fleury", "givenName": "Cedric", "surname": "Fleury", "__typename": "ArticleAuthorType" }, { "affiliation": "VENISE group, CNRS-LIMSI, Orsay (France)", "fullName": "Nicolas Ferey", "givenName": "Nicolas", "surname": "Ferey", "__typename": "ArticleAuthorType" }, { "affiliation": "VENISE group, CNRS-LIMSI, Orsay (France)", "fullName": "Jean-Marc Vezien", "givenName": "Jean-Marc", "surname": "Vezien", "__typename": "ArticleAuthorType" }, { "affiliation": "VENISE group, CNRS-LIMSI, Orsay (France)", "fullName": "Patrick Bourdot", "givenName": "Patrick", "surname": "Bourdot", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dcve", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "9-10", "year": "2015", "issn": null, "isbn": "978-1-4799-1840-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07153590", "articleId": "12OmNzYwceX", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2010/9343/0/05643588", "title": "Augmentation of check in/out model for remote collaboration with Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643588/12OmNC4eSy7", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2009/3791/0/3791a036", "title": "Collaboration in 3D Shared Spaces Using X3D and VRML", "doi": null, "abstractUrl": "/proceedings-article/cw/2009/3791a036/12OmNvAAtmH", "parentPublication": { "id": "proceedings/cw/2009/3791/0", "title": "2009 International Conference on CyberWorlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223391", "title": "Does vibrotactile intercommunication increase collaboration?", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223391/12OmNxX3utB", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2015/6886/0/07131746", "title": "Framework for remote collaborative interaction in virtual environments based on proximity", "doi": null, "abstractUrl": "/proceedings-article/3dui/2015/07131746/12OmNxZBSzl", "parentPublication": { "id": "proceedings/3dui/2015/6886/0", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbsc/2008/3500/0/3500a134", "title": "The Agent-Based Architecture of RECOLLVE", "doi": null, "abstractUrl": "/proceedings-article/sbsc/2008/3500a134/12OmNzxPTEB", "parentPublication": { "id": "proceedings/sbsc/2008/3500/0", "title": "Sistemas Colaborativos, Simp&#x00F3;sio Brasilerio de", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dcve/2018/5132/0/08637112", "title": "Distributed Architecture for Remote Collaborative Modification of Parametric CAD Data", "doi": null, "abstractUrl": "/proceedings-article/3dcve/2018/08637112/17D45WZZ7F8", "parentPublication": { "id": "proceedings/3dcve/2018/5132/0", "title": "2018 IEEE Fourth VR International Workshop on Collaborative Virtual Environments (3DCVE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a948", "title": "[DC] Designing Immersive Tools for Supporting Cognition in Remote Scientific Collaboration", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a948/1CJeZLMasuY", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049700", "title": "Using Virtual Replicas to Improve Mixed Reality Remote Collaboration", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049700/1KYoAxyw5c4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a438", "title": "MAGIC: Manipulating Avatars and Gestures to Improve Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a438/1MNgEQ9uIBW", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a520", "title": "Evaluating Remote Virtual Hands Models on Social Presence in Hand-based 3D Remote Collaboration", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a520/1pysxMcaE2Q", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyqRneg", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "1eof30OMMi4", "doi": "10.1109/VAST.2010.5652644", "title": "VASTvis &#x2014; Visual analytics with multiple coordinated views", "normalizedTitle": "VASTvis — Visual analytics with multiple coordinated views", "abstract": "VAST 2010 Mini Challenge 2 Award: Good analytic process and explanation. We present a multiple coordinated view system VASTvis with a central view and several mini-views around the side. Each view is coordinated together, where operations are linked between windows. Furthermore, the user can perform sequential queries on the data through a series of brushing operations. The tool was used to analyse the VAST 2010 Mini Challenge 2 dataset of Hospitalisation Records. In this article we describe how the tool was used to characterise the Pandemic Spread.", "abstracts": [ { "abstractType": "Regular", "content": "VAST 2010 Mini Challenge 2 Award: Good analytic process and explanation. We present a multiple coordinated view system VASTvis with a central view and several mini-views around the side. Each view is coordinated together, where operations are linked between windows. Furthermore, the user can perform sequential queries on the data through a series of brushing operations. The tool was used to analyse the VAST 2010 Mini Challenge 2 dataset of Hospitalisation Records. In this article we describe how the tool was used to characterise the Pandemic Spread.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "VAST 2010 Mini Challenge 2 Award: Good analytic process and explanation. We present a multiple coordinated view system VASTvis with a central view and several mini-views around the side. Each view is coordinated together, where operations are linked between windows. Furthermore, the user can perform sequential queries on the data through a series of brushing operations. The tool was used to analyse the VAST 2010 Mini Challenge 2 dataset of Hospitalisation Records. In this article we describe how the tool was used to characterise the Pandemic Spread.", "fno": "05652644", "keywords": [ "Data Analysis", "Data Visualisation", "Medical Administrative Data Processing", "VAS Tvis", "Visual Analytics", "Multiple Coordinated Views", "Sequential Queries", "Brushing Operations", "VAST 2010 Mini Challenge 2 Dataset", "Hospitalisation Records", "Pandemic Spread", "Tools", "Visual Analytics", "Data Visualization", "Urban Areas", "Google", "Visual Databases", "FREE COVID 19", "Visual Analytics", "Coordinated Multiple Views", "VAST 2010", "Information Visualization", "Pandemic Visualization" ], "authors": [ { "affiliation": "School of Computer Science Bangor University", "fullName": "Rick Walker", "givenName": "Rick", "surname": "Walker", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science Bangor University", "fullName": "Llyrap Cenydcf", "givenName": "Llyrap", "surname": "Cenydcf", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science Bangor University", "fullName": "Serban Pop", "givenName": "Serban", "surname": "Pop", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science Bangor University", "fullName": "Jonathan C. Roberts", "givenName": "Jonathan C.", "surname": "Roberts", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "279-280", "year": "2010", "issn": null, "isbn": "978-1-4244-9488-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05653071", "articleId": "12OmNvTjZSX", "__typename": "AdjacentArticleType" }, "next": { "fno": "05652661", "articleId": "1iCAmf3w4BG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042569", "title": "Visual analytics of GPS tracks: From location to place to behaviour", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042569/12OmNA0dMFU", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030072", "title": "Coordinated Multiple Views: a Critical View", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400507", "title": "Agile visual analytics for banking cyber “big data”", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400507/12OmNyPQ4EL", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802447", "title": "Visual Bird Watcher: Interactive Visual Analysis on Bird Distribution and Migration", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802447/1cJ6YMmczXG", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802397", "title": "They do Move! Visual Analytics of Rose-Crested Blue Pipit Habitat", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802397/1cJ6YpdBSzC", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05652689", "title": "Designing visual analytics systems for disease spread and evolution", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05652689/1eof2SkO4gw", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05653042", "title": "Data ingestion and evidence marshalling in Jigsaw VAST 2010 Mini Challenge 1 award: Good support for data ingest", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05653042/1eof2WlsGd2", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05651204", "title": "VisWorks text and network visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05651204/1eof34V7mPS", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a714", "title": "MIVA: Multimodal Interactions for Facilitating Visual Analysis with Multiple Coordinated Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a714/1rSR8lx5snS", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/04/09463738", "title": "VAST 2020 Contest Challenge: GraphMatchMaker&#x2014;Visual Analytics for Graph Comparison and Matching", "doi": null, "abstractUrl": "/magazine/cg/2022/04/09463738/1uFxpjx356w", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBgQFM1", "title": "2017 IEEE International Conference on Web Services (ICWS)", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNCwCLmg", "doi": "10.1109/ICWS.2017.40", "title": "AppCheck: A Crowdsourced Testing Service for Android Applications", "normalizedTitle": "AppCheck: A Crowdsourced Testing Service for Android Applications", "abstract": "It is well known that the fragmentation of Android ecosystem has caused severe compatibility issues. Therefore, for Android apps, cross-platform testing (the apps must be tested on a multitude of devices and operating system versions) is particularly important to assure their quality. Although lots of cross-platform testing techniques have been proposed, there are still some limitations: 1) it is time-consuming and error-prone to encode platform-agnostic tests manually, 2) test scripts generated by existing record/replay techniques are brittle and will break when replayed on different platforms, 3) Developers, and even test vendors have not equipped some special Android devices. As a result, apps have not been tested sufficiently, leading to many compatibility issues after releasing. To address these limitations, this paper proposes AppCheck, a crowdsourced testing service for Android apps. To generate tests that will explore different behavior of the app automatically, AppCheck crowdsources event trace collection over the Internet, and various touch events will be captured when real users interact with the app. The collected event traces are then transformed into platform-agnostic test scripts, and directly replayed on the devices of real users. During the replay, various data (e.g., screenshots and layout information) will be extracted to identify compatibility issues. Our empirical evaluation shows that AppCheck is effective and improves the state of the art.", "abstracts": [ { "abstractType": "Regular", "content": "It is well known that the fragmentation of Android ecosystem has caused severe compatibility issues. Therefore, for Android apps, cross-platform testing (the apps must be tested on a multitude of devices and operating system versions) is particularly important to assure their quality. Although lots of cross-platform testing techniques have been proposed, there are still some limitations: 1) it is time-consuming and error-prone to encode platform-agnostic tests manually, 2) test scripts generated by existing record/replay techniques are brittle and will break when replayed on different platforms, 3) Developers, and even test vendors have not equipped some special Android devices. As a result, apps have not been tested sufficiently, leading to many compatibility issues after releasing. To address these limitations, this paper proposes AppCheck, a crowdsourced testing service for Android apps. To generate tests that will explore different behavior of the app automatically, AppCheck crowdsources event trace collection over the Internet, and various touch events will be captured when real users interact with the app. The collected event traces are then transformed into platform-agnostic test scripts, and directly replayed on the devices of real users. During the replay, various data (e.g., screenshots and layout information) will be extracted to identify compatibility issues. Our empirical evaluation shows that AppCheck is effective and improves the state of the art.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is well known that the fragmentation of Android ecosystem has caused severe compatibility issues. Therefore, for Android apps, cross-platform testing (the apps must be tested on a multitude of devices and operating system versions) is particularly important to assure their quality. Although lots of cross-platform testing techniques have been proposed, there are still some limitations: 1) it is time-consuming and error-prone to encode platform-agnostic tests manually, 2) test scripts generated by existing record/replay techniques are brittle and will break when replayed on different platforms, 3) Developers, and even test vendors have not equipped some special Android devices. As a result, apps have not been tested sufficiently, leading to many compatibility issues after releasing. To address these limitations, this paper proposes AppCheck, a crowdsourced testing service for Android apps. To generate tests that will explore different behavior of the app automatically, AppCheck crowdsources event trace collection over the Internet, and various touch events will be captured when real users interact with the app. The collected event traces are then transformed into platform-agnostic test scripts, and directly replayed on the devices of real users. During the replay, various data (e.g., screenshots and layout information) will be extracted to identify compatibility issues. Our empirical evaluation shows that AppCheck is effective and improves the state of the art.", "fno": "0752a253", "keywords": [ "Androids", "Humanoid Robots", "Testing", "Performance Evaluation", "Servers", "Layout", "Mobile Communication", "Crowdsourced Testing", "Android", "Record Replay" ], "authors": [ { "affiliation": null, "fullName": "Guoquan Wu", "givenName": "Guoquan", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuzhong Cao", "givenName": "Yuzhong", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Chen", "givenName": "Wei", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jun Wei", "givenName": "Jun", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hua Zhong", "givenName": "Hua", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tao Huang", "givenName": "Tao", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-06-01T00:00:00", "pubType": "proceedings", "pages": "253-260", "year": "2017", "issn": null, "isbn": "978-1-5386-0752-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0752a245", "articleId": "12OmNBC8AyN", "__typename": "AdjacentArticleType" }, "next": { "fno": "0752a261", "articleId": "12OmNx57HM7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/spw/2016/3690/0/5829a204", "title": "Target Fragmentation in Android Apps", "doi": null, "abstractUrl": "/proceedings-article/spw/2016/5829a204/12OmNAJ4phD", "parentPublication": { "id": "proceedings/spw/2016/3690/0", "title": "2016 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2016/3845/0/07582761", "title": "Taming Android fragmentation: Characterizing and detecting compatibility issues for Android apps", "doi": null, "abstractUrl": "/proceedings-article/ase/2016/07582761/12OmNvjyxtN", "parentPublication": { "id": "proceedings/ase/2016/3845/0", "title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ast/2012/1821/0/06228986", "title": "A whitebox approach for automated security testing of Android applications on the cloud", "doi": null, "abstractUrl": "/proceedings-article/ast/2012/06228986/12OmNx6xHrS", "parentPublication": { "id": "proceedings/ast/2012/1821/0", "title": "Automation of Software Test, Second International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2013/5007/0/5007a208", "title": "A Software Environment for Confining Malicious Android Applications via Resource Virtualization", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2013/5007a208/12OmNyz5K1h", "parentPublication": { "id": "proceedings/iceccs/2013/5007/0", "title": "2013 18th International Conference on Engineering of Complex Computer Systems (ICECCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2015/8629/0/8629a343", "title": "Decomposable Trust for Android Applications", "doi": null, "abstractUrl": "/proceedings-article/dsn/2015/8629a343/12OmNzh5z0N", "parentPublication": { "id": "proceedings/dsn/2015/8629/0", "title": "2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2017/2684/0/08115615", "title": "EHBDroid: Beyond GUI testing for Android applications", "doi": null, "abstractUrl": "/proceedings-article/ase/2017/08115615/12OmNzuIjhD", "parentPublication": { "id": "proceedings/ase/2017/2684/0", "title": "2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2016/3845/0/07582763", "title": "HybriDroid: Static analysis framework for Android hybrid applications", "doi": null, "abstractUrl": "/proceedings-article/ase/2016/07582763/12OmNzyYibs", "parentPublication": { "id": "proceedings/ase/2016/3845/0", "title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a329", "title": "Poster: Efficient and Deterministic Replay for Web-Enabled Android Apps", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a329/13bd1fWcuDl", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2018/5638/0/563801a037", "title": "GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications", "doi": null, "abstractUrl": "/proceedings-article/icse/2018/563801a037/13l5NXXgd0Z", "parentPublication": { "id": "proceedings/icse/2018/5638/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2020/11/08493348", "title": "Understanding and Detecting Fragmentation-Induced Compatibility Issues for Android Apps", "doi": null, "abstractUrl": "/journal/ts/2020/11/08493348/14qdcQsKzO8", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAR1b0Y", "title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvwC5up", "doi": "10.1109/ICTAI.2016.0034", "title": "Modifying Keyboard Layout to Reduce Finger-Travel Distance", "normalizedTitle": "Modifying Keyboard Layout to Reduce Finger-Travel Distance", "abstract": "Ample evidence shows that the Qwerty layout is inefficient for one-finger typing on virtual keyboards: letters in common digrams are placed on opposite sides of the keyboard, resulting in an unnecessarily long finger-travel distance. In this paper, we report on using simulated annealing for modifying keyboard layout to reduce finger-travel distance for entering letters of the English alphabet. Our investigation led to improved 3 X 10, 4 X 7, and 5 X 6 layouts, all of which reduced the weighted sum of finger-travel distances for all digrams (denoted by d) by about 40% over Qwerty. The most improved layout is the 5 X 6 layout, which reduces d from 3.31 key widths (the value of d for Qwerty) to 1.78 key widths. These layouts also outperform the best layout reported in the literature.", "abstracts": [ { "abstractType": "Regular", "content": "Ample evidence shows that the Qwerty layout is inefficient for one-finger typing on virtual keyboards: letters in common digrams are placed on opposite sides of the keyboard, resulting in an unnecessarily long finger-travel distance. In this paper, we report on using simulated annealing for modifying keyboard layout to reduce finger-travel distance for entering letters of the English alphabet. Our investigation led to improved 3 X 10, 4 X 7, and 5 X 6 layouts, all of which reduced the weighted sum of finger-travel distances for all digrams (denoted by d) by about 40% over Qwerty. The most improved layout is the 5 X 6 layout, which reduces d from 3.31 key widths (the value of d for Qwerty) to 1.78 key widths. These layouts also outperform the best layout reported in the literature.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ample evidence shows that the Qwerty layout is inefficient for one-finger typing on virtual keyboards: letters in common digrams are placed on opposite sides of the keyboard, resulting in an unnecessarily long finger-travel distance. In this paper, we report on using simulated annealing for modifying keyboard layout to reduce finger-travel distance for entering letters of the English alphabet. Our investigation led to improved 3 X 10, 4 X 7, and 5 X 6 layouts, all of which reduced the weighted sum of finger-travel distances for all digrams (denoted by d) by about 40% over Qwerty. The most improved layout is the 5 X 6 layout, which reduces d from 3.31 key widths (the value of d for Qwerty) to 1.78 key widths. These layouts also outperform the best layout reported in the literature.", "fno": "4459a165", "keywords": [ "Layout", "Keyboards", "Simulated Annealing", "Thumb", "Human Factors", "Mathematical Model", "Mobile Handsets", "Intelligent User Interfaces", "Virtual Keyboard", "Finger Distance" ], "authors": [ { "affiliation": null, "fullName": "Nan Yang", "givenName": "Nan", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Amol D. Mali", "givenName": "Amol D.", "surname": "Mali", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-11-01T00:00:00", "pubType": "proceedings", "pages": "165-168", "year": "2016", "issn": "2375-0197", "isbn": "978-1-5090-4459-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4459a157", "articleId": "12OmNAZOK17", "__typename": "AdjacentArticleType" }, "next": { "fno": "4459a169", "articleId": "12OmNA0MZ3I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2014/3624/0/06798859", "title": "Poster: Designing effective travel techniques with bare-hand interaction", "doi": null, "abstractUrl": "/proceedings-article/3dui/2014/06798859/12OmNButq9c", "parentPublication": { "id": "proceedings/3dui/2014/3624/0", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2014/7615/0/07097812", "title": "Virtual keyboard for head mounted display-based wearable devices", "doi": null, "abstractUrl": "/proceedings-article/icpads/2014/07097812/12OmNqzu6VX", "parentPublication": { "id": "proceedings/icpads/2014/7615/0", "title": "2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2015/6886/0/07131766", "title": "A multi-touch finger gesture based low-fatigue VR travel framework", "doi": null, "abstractUrl": "/proceedings-article/3dui/2015/07131766/12OmNzayNeN", "parentPublication": { "id": "proceedings/3dui/2015/6886/0", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506501", "title": "The design and evaluation of a gestural keyboard for entering programming code on mobile devices", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506501/17D45VUZMWc", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103480", "title": "Syntax-directed keyboard extension: Evolution and evaluation", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103480/17D45WB0qby", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103481", "title": "Text entry using five to seven physical keys", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103481/17D45XDIXRA", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2018/7308/0/08644590", "title": "Oinput: A Bone-Conductive QWERTY Keyboard Recognition for Wearable Device", "doi": null, "abstractUrl": "/proceedings-article/icpads/2018/08644590/17QjJd2W6Lq", "parentPublication": { "id": "proceedings/icpads/2018/7308/0", "title": "2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09737726", "title": "MyoKey: Inertial Motion Sensing and Gesture-based QWERTY Keyboard for Extended Realities", "doi": null, "abstractUrl": "/journal/tm/5555/01/09737726/1BQlEBR0ceY", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412219", "title": "Image Defocus Analysis for Finger Detection on A Virtual Keyboard", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412219/1tmjkwe2UAo", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800a435", "title": "A Deep Genetic Method for Keyboard Layout Optimization", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800a435/1zw6eAsr9Ru", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1nTu63ECEAU", "title": "2020 30th International Conference on Field-Programmable Logic and Applications (FPL)", "acronym": "fpl", "groupId": "1001053", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1nTu7cKzxuM", "doi": "10.1109/FPL50879.2020.00043", "title": "Measuring the Accuracy of Layout Area Estimation Models of Tile-Based FPGAs in FinFET Technology", "normalizedTitle": "Measuring the Accuracy of Layout Area Estimation Models of Tile-Based FPGAs in FinFET Technology", "abstract": "This work presents the layout area of encoded and decoded multiplexers, two essential building blocks of modern FPGAs, in FinFET. Layouts with both 2 and 3 metal layers based on ASAP7 Predictive Design Kit are presented. The layout area is then compared with the prediction of two equation-based models: the VPR area model and the COFFE area model. We found that, with the original model parameters which are adjusted for planar technologies, these two equation-based models are not accurate in predicting FinFET layout area with error ranges of -2.3% to +86.5% and -32.7% to +19.3% for the VPR and COFFE models, respectively. Furthermore, when the model parameters are specifically adjusted for FinFET, the error ranges remain to be large with -19% to +31% and -26.6% to +25% for the VPR and COFFE models, respectively. These data underline the importance of verifying equation-based models against actual layout areas in FPGA architectural studies, especially when there are significant changes in the underlining process technologies.", "abstracts": [ { "abstractType": "Regular", "content": "This work presents the layout area of encoded and decoded multiplexers, two essential building blocks of modern FPGAs, in FinFET. Layouts with both 2 and 3 metal layers based on ASAP7 Predictive Design Kit are presented. The layout area is then compared with the prediction of two equation-based models: the VPR area model and the COFFE area model. We found that, with the original model parameters which are adjusted for planar technologies, these two equation-based models are not accurate in predicting FinFET layout area with error ranges of -2.3% to +86.5% and -32.7% to +19.3% for the VPR and COFFE models, respectively. Furthermore, when the model parameters are specifically adjusted for FinFET, the error ranges remain to be large with -19% to +31% and -26.6% to +25% for the VPR and COFFE models, respectively. These data underline the importance of verifying equation-based models against actual layout areas in FPGA architectural studies, especially when there are significant changes in the underlining process technologies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work presents the layout area of encoded and decoded multiplexers, two essential building blocks of modern FPGAs, in FinFET. Layouts with both 2 and 3 metal layers based on ASAP7 Predictive Design Kit are presented. The layout area is then compared with the prediction of two equation-based models: the VPR area model and the COFFE area model. We found that, with the original model parameters which are adjusted for planar technologies, these two equation-based models are not accurate in predicting FinFET layout area with error ranges of -2.3% to +86.5% and -32.7% to +19.3% for the VPR and COFFE models, respectively. Furthermore, when the model parameters are specifically adjusted for FinFET, the error ranges remain to be large with -19% to +31% and -26.6% to +25% for the VPR and COFFE models, respectively. These data underline the importance of verifying equation-based models against actual layout areas in FPGA architectural studies, especially when there are significant changes in the underlining process technologies.", "fno": "990200a214", "keywords": [ "Decoding", "Encoding", "Field Programmable Gate Arrays", "Integrated Circuit Layout", "MOSFET Circuits", "Multiplexing Equipment", "Tile Based FPGA", "Layout Area Estimation Models", "Actual Layout Areas", "Fin FET Layout Area", "Planar Technologies", "COFFE Area Model", "VPR Area Model", "ASAP 7 Predictive Design Kit", "Decoded Multiplexers", "Encoded Multiplexers", "Fin FET Technology", "Multiplexing", "Layout", "Measurement Uncertainty", "Estimation", "Metals", "Predictive Models", "Fin FE Ts", "Area Estimation Model Fin FET Layout Standard Cell FPGA" ], "authors": [ { "affiliation": "Ryerson University, Canada", "fullName": "Sajjad Rostami Sani", "givenName": "Sajjad", "surname": "Rostami Sani", "__typename": "ArticleAuthorType" }, { "affiliation": "Ryerson University, Canada", "fullName": "Farheen Fatima Khan", "givenName": "Farheen", "surname": "Fatima Khan", "__typename": "ArticleAuthorType" }, { "affiliation": "Ryerson University, Canada", "fullName": "Anas Razzaq", "givenName": "Anas", "surname": "Razzaq", "__typename": "ArticleAuthorType" }, { "affiliation": "Ryerson University, Canada", "fullName": "Andy Ye", "givenName": "Andy", "surname": "Ye", "__typename": "ArticleAuthorType" } ], "idPrefix": "fpl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "214-219", "year": "2020", "issn": null, "isbn": "978-1-7281-9902-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "990200a208", "articleId": "1nTu9CUnlCM", "__typename": "AdjacentArticleType" }, "next": { "fno": "990200a220", "articleId": "1nTu7jSOA9i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/igcc/2014/6177/0/07039170", "title": "7nm FinFET standard cell layout characterization and power density prediction in near- and super-threshold voltage regimes", "doi": null, "abstractUrl": "/proceedings-article/igcc/2014/07039170/12OmNC8uRs8", "parentPublication": { "id": "proceedings/igcc/2014/6177/0", "title": "2014 International Green Computing Conference (IGCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2014/6492/0/06974708", "title": "Low write-energy STT-MRAMs using FinFET-based access transistors", "doi": null, "abstractUrl": "/proceedings-article/iccd/2014/06974708/12OmNxVlTBP", "parentPublication": { "id": "proceedings/iccd/2014/6492/0", "title": "2014 32nd IEEE International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsid/2017/5740/0/5740a259", "title": "High Accuracy, Multi-output Bandgap Reference Circuit in 16nm FinFet", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2017/5740a259/12OmNzcxZ4n", "parentPublication": { "id": "proceedings/vlsid/2017/5740/0", "title": "2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2015/05/06857432", "title": "Design of efficient content addressable memories in high-performance FinFET technology", "doi": null, "abstractUrl": "/journal/si/2015/05/06857432/13rRUwgyOe2", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2011/05/05419976", "title": "Comparative Evaluation of Layout Density in 3T, 4T, and MT FinFET Standard Cells", "doi": null, "abstractUrl": "/journal/si/2011/05/05419976/13rRUzpQPLy", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2018/11/08438509", "title": "A Comprehensive Time-Dependent Dielectric Breakdown Lifetime Simulator for Both Traditional CMOS and FinFET Technology", "doi": null, "abstractUrl": "/journal/si/2018/11/08438509/14C6d2NUOop", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2022/04/09714073", "title": "Carbon Nanotube SRAM in 5-nm Technology Node Design, Optimization, and Performance Evaluation&#x2014;Part II: CNT Interconnect Optimization", "doi": null, "abstractUrl": "/journal/si/2022/04/09714073/1AZLmKi8vPa", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2022/8332/0/09786176", "title": "Evaluating the impact of using multiple-metal layers on the layout area of switch blocks for tile-based FPGAs in FinFET 7nm", "doi": null, "abstractUrl": "/proceedings-article/fccm/2022/09786176/1DUdW6seCR2", "parentPublication": { "id": "proceedings/fccm/2022/8332/0", "title": "2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2019/09/08753549", "title": "Modeling and Detectability of Full Open Gate Defects in FinFET Technology", "doi": null, "abstractUrl": "/journal/si/2019/09/08753549/1bl03x57cJO", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2022/03/09647857", "title": "FN-CACTI: Advanced CACTI for FinFET and NC-FinFET Technologies", "doi": null, "abstractUrl": "/journal/si/2022/03/09647857/1ziK9XLEmgU", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVr", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBZYTpD", "doi": "10.1109/CVPR.2017.85", "title": "Teaching Compositionality to CNNs", "normalizedTitle": "Teaching Compositionality to CNNs", "abstract": "Convolutional neural networks (CNNs) have shown great success in computer vision, approaching human-level performance when trained for specific tasks via application-specific loss functions. In this paper, we propose a method for augmenting and training CNNs so that their learned features are compositional. It encourages networks to form representations that disentangle objects from their surroundings and from each other, thereby promoting better generalization. Our method is agnostic to the specific details of the underlying CNN to which it is applied and can in principle be used with any CNN. As we show in our experiments, the learned representations lead to feature activations that are more localized and improve performance over non-compositional baselines in object recognition tasks.", "abstracts": [ { "abstractType": "Regular", "content": "Convolutional neural networks (CNNs) have shown great success in computer vision, approaching human-level performance when trained for specific tasks via application-specific loss functions. In this paper, we propose a method for augmenting and training CNNs so that their learned features are compositional. It encourages networks to form representations that disentangle objects from their surroundings and from each other, thereby promoting better generalization. Our method is agnostic to the specific details of the underlying CNN to which it is applied and can in principle be used with any CNN. As we show in our experiments, the learned representations lead to feature activations that are more localized and improve performance over non-compositional baselines in object recognition tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Convolutional neural networks (CNNs) have shown great success in computer vision, approaching human-level performance when trained for specific tasks via application-specific loss functions. In this paper, we propose a method for augmenting and training CNNs so that their learned features are compositional. It encourages networks to form representations that disentangle objects from their surroundings and from each other, thereby promoting better generalization. Our method is agnostic to the specific details of the underlying CNN to which it is applied and can in principle be used with any CNN. As we show in our experiments, the learned representations lead to feature activations that are more localized and improve performance over non-compositional baselines in object recognition tasks.", "fno": "0457a732", "keywords": [ "Computer Vision", "Convolution", "Image Recognition", "Image Representation", "Learning Artificial Intelligence", "Neural Nets", "Object Recognition", "CN Ns", "Convolutional Neural Networks", "Computer Vision", "Human Level Performance", "Application Specific Loss Functions", "Noncompositional Baselines", "Object Recognition Tasks", "Representation Learning", "Compositionality Teaching", "Compositional Learned Features", "Object Representations", "Training", "Visualization", "Standards", "Airplanes", "Computer Vision", "Context Modeling" ], "authors": [ { "affiliation": null, "fullName": "Austin Stone", "givenName": "Austin", "surname": "Stone", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huayan Wang", "givenName": "Huayan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael Stark", "givenName": "Michael", "surname": "Stark", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi Liu", "givenName": "Yi", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. Scott Phoenix", "givenName": "D. Scott", "surname": "Phoenix", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dileep George", "givenName": "Dileep", "surname": "George", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "732-741", "year": "2017", "issn": "1063-6919", "isbn": "978-1-5386-0457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0457a722", "articleId": "12OmNviHKkz", "__typename": "AdjacentArticleType" }, "next": { "fno": "0457a742", "articleId": "12OmNyuyaeO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851a571", "title": "Scene Recognition with CNNs: Objects, Scales and Dataset Bias", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851a571/12OmNC0PGMZ", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2018/02/mcs2018020052", "title": "Multiple VLAD Encoding of CNNs for Image Classification", "doi": null, "abstractUrl": "/magazine/cs/2018/02/mcs2018020052/13rRUIJcWpy", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546078", "title": "Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546078/17D45VTRosO", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500b588", "title": "Semi-Dense Stereo Matching Using Dual CNNs", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500b588/18j8I1PtqqA", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669400", "title": "Assessing learned features of Deep Learning applied to EEG", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669400/1A9W0kpVceA", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300g254", "title": "Interpreting CNNs via Decision Trees", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300g254/1gyrFboErks", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09050545", "title": "Interpretable CNNs for Object Classification", "doi": null, "abstractUrl": "/journal/tp/2021/10/09050545/1keqb320xkA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800o4262", "title": "On Translation Invariance in CNNs: Convolutional Layers Can Exploit Absolute Spatial Location", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800o4262/1m3nEugsKL6", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412794", "title": "VPU Specific CNNs through Neural Architecture Search", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412794/1tmjz9LC8Fi", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900e729", "title": "3D CNNs with Adaptive Temporal Feature Resolutions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900e729/1yeIizFbTs4", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwp74rk", "title": "2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (ACII 2009)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3FGjO", "doi": "10.1109/ACII.2009.5349497", "title": "A multiple perception model on emotional speech", "normalizedTitle": "A multiple perception model on emotional speech", "abstract": "More and more efforts have been made for the research of emotional speech recently. Although we may, sometimes be able to make a definite perceptual decision on emotion state, emotion is actually a kind of cline in a large vector space. Different emotions can be thought of as zones along an emotional vector. To resolve the ambiguity of emotion perception, the authors make an array of perception experiments. Furthermore, the paper creates a statistical model to simulate emotion perception and finds that there is an underlying consistency in the patterns of responses. The results show important cues on how to do multiple perception of the emotional speech.", "abstracts": [ { "abstractType": "Regular", "content": "More and more efforts have been made for the research of emotional speech recently. Although we may, sometimes be able to make a definite perceptual decision on emotion state, emotion is actually a kind of cline in a large vector space. Different emotions can be thought of as zones along an emotional vector. To resolve the ambiguity of emotion perception, the authors make an array of perception experiments. Furthermore, the paper creates a statistical model to simulate emotion perception and finds that there is an underlying consistency in the patterns of responses. The results show important cues on how to do multiple perception of the emotional speech.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "More and more efforts have been made for the research of emotional speech recently. Although we may, sometimes be able to make a definite perceptual decision on emotion state, emotion is actually a kind of cline in a large vector space. Different emotions can be thought of as zones along an emotional vector. To resolve the ambiguity of emotion perception, the authors make an array of perception experiments. Furthermore, the paper creates a statistical model to simulate emotion perception and finds that there is an underlying consistency in the patterns of responses. The results show important cues on how to do multiple perception of the emotional speech.", "fno": "05349497", "keywords": [ "Emotion Recognition", "Speech Processing", "Statistical Analysis", "Vectors", "Multiple Perception Model", "Emotional Speech", "Perceptual Decision", "Emotion State", "Vector Space", "Emotional Vector", "Statistical Model", "Emotion Perception", "Automation", "Classification Algorithms", "Emotion Recognition", "Mood", "Multilayer Perceptrons", "Maximum Likelihood Detection", "Kernel", "Speech Recognition", "Neural Networks", "Probability Distribution" ], "authors": [ { "affiliation": "NLPR, Institute of Automation Chinese Academy of Sciences", "fullName": "Jianhua Tao", "givenName": "Jianhua", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": "NLPR, Institute of Automation Chinese Academy of Sciences", "fullName": "Ya Li", "givenName": "Ya", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "NLPR, Institute of Automation Chinese Academy of Sciences", "fullName": "Shifeng Pan", "givenName": "Shifeng", "surname": "Pan", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2009", "issn": "2156-8103", "isbn": "978-1-4244-4800-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05349529", "articleId": "12OmNyQ7FZz", "__typename": "AdjacentArticleType" }, "next": { "fno": "05349454", "articleId": "12OmNCd2rUz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acii/2009/4800/0/05349515", "title": "Emotional speech synthesis by sensing affective information from text", "doi": null, "abstractUrl": "/proceedings-article/acii/2009/05349515/12OmNAYGlEs", "parentPublication": { "id": "proceedings/acii/2009/4800/0", "title": "2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (ACII 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607572", "title": "The Vera am Mittag German audio-visual emotional speech database", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607572/12OmNqI04KI", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771358", "title": "Obtaining speech assets for judgement analysis on low-pass filtered emotional speech", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771358/12OmNxH9Xbu", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011929", "title": "Appropriate emotional labelling of non-acted speech using basic emotions, geneva emotion wheel and self assessment manikins", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011929/12OmNzYwc88", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2014/04/06849440", "title": "CREMA-D: Crowd-Sourced Emotional Multimodal Actors Dataset", "doi": null, "abstractUrl": "/journal/ta/2014/04/06849440/13rRUzphDwg", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2022/8149/0/814900a096", "title": "Emotional Climate Recognition in Interactive Conversational Speech Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdh/2022/814900a096/1G6jGojbf3O", "parentPublication": { "id": "proceedings/icdh/2022/8149/0", "title": "2022 IEEE International Conference on Digital Health (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2022/9045/0/10103272", "title": "SERNet: A Novel Speech Emotion Recognition System Using Ensemble Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/sti/2022/10103272/1MBFb36Npg4", "parentPublication": { "id": "proceedings/sti/2022/9045/0", "title": "2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/01/08859243", "title": "MES-P: An Emotional Tonal Speech Dataset in Mandarin with Distal and Proximal Labels", "doi": null, "abstractUrl": "/journal/ta/2022/01/08859243/1dR0QzhXnIA", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09612052", "title": "Quantifying Emotional Similarity in Speech", "doi": null, "abstractUrl": "/journal/ta/5555/01/09612052/1yrD2kuc1oI", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a198", "title": "Temporal Integration of Emotion Perception for Cross-Cultural and Multi-Emotion Music", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a198/1ziPgcS2xWw", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H2petWxAqI", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "acronym": "cost", "groupId": "1847867", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H2pnWQtNRe", "doi": "10.1109/CoST57098.2022.00067", "title": "Transformer-based Multimodal Contextual Co-encoding for Humour Detection", "normalizedTitle": "Transformer-based Multimodal Contextual Co-encoding for Humour Detection", "abstract": "Humor, a unique expression of the human language system different from other emotions, plays a very important role in human communication. Previous works on humor detection have been mostly limited to a single textual modality. From the perspective of human humor perception, various aspects such as text, intonation, mannerisms, and body language can convey humor. From the perspective of the structure of jokes, any combination of textual, acoustic, and visual modalities in various positions in the context can form unexpected humor. Therefore, information that exists among multiple modalities and contexts should be considered simultaneously in humor detection. This paper proposes a humor detection model based on the transformer and contextual co-encoding called Transformer-based Multimodal Contextual Co-encoding (TMCC). The model uses the transformer-based multi-head attention to capture potential information across modalities and contexts first. Then, it uses a convolutional autoencoder to further fuse the overall feature matrix and reduce dimensionality. Finally, a simple multilayer perceptron is used to predict the humor labels. By comparing with common baselines of humor detection, it is demonstrated that our model achieves some performance improvement. The availability of each part of the model is demonstrated through a series of ablation studies.", "abstracts": [ { "abstractType": "Regular", "content": "Humor, a unique expression of the human language system different from other emotions, plays a very important role in human communication. Previous works on humor detection have been mostly limited to a single textual modality. From the perspective of human humor perception, various aspects such as text, intonation, mannerisms, and body language can convey humor. From the perspective of the structure of jokes, any combination of textual, acoustic, and visual modalities in various positions in the context can form unexpected humor. Therefore, information that exists among multiple modalities and contexts should be considered simultaneously in humor detection. This paper proposes a humor detection model based on the transformer and contextual co-encoding called Transformer-based Multimodal Contextual Co-encoding (TMCC). The model uses the transformer-based multi-head attention to capture potential information across modalities and contexts first. Then, it uses a convolutional autoencoder to further fuse the overall feature matrix and reduce dimensionality. Finally, a simple multilayer perceptron is used to predict the humor labels. By comparing with common baselines of humor detection, it is demonstrated that our model achieves some performance improvement. The availability of each part of the model is demonstrated through a series of ablation studies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Humor, a unique expression of the human language system different from other emotions, plays a very important role in human communication. Previous works on humor detection have been mostly limited to a single textual modality. From the perspective of human humor perception, various aspects such as text, intonation, mannerisms, and body language can convey humor. From the perspective of the structure of jokes, any combination of textual, acoustic, and visual modalities in various positions in the context can form unexpected humor. Therefore, information that exists among multiple modalities and contexts should be considered simultaneously in humor detection. This paper proposes a humor detection model based on the transformer and contextual co-encoding called Transformer-based Multimodal Contextual Co-encoding (TMCC). The model uses the transformer-based multi-head attention to capture potential information across modalities and contexts first. Then, it uses a convolutional autoencoder to further fuse the overall feature matrix and reduce dimensionality. Finally, a simple multilayer perceptron is used to predict the humor labels. By comparing with common baselines of humor detection, it is demonstrated that our model achieves some performance improvement. The availability of each part of the model is demonstrated through a series of ablation studies.", "fno": "624800a292", "keywords": [ "Convolutional Neural Nets", "Feature Extraction", "Matrix Algebra", "Multilayer Perceptrons", "Sentiment Analysis", "Visual Modalities", "Multiple Modalities", "Humor Detection Model", "Transformer Based Multihead Attention", "Humor Labels", "Humour Detection", "Human Language System", "Human Communication", "Human Humor Perception", "Textual Modalities", "Acoustic Modalities", "Transformer Based Multimodal Contextual Co Encoding", "TMCC", "Multilayer Perceptron", "Feature Matrix", "Convolutional Autoencoder", "Visualization", "Costs", "Fuses", "Multilayer Perceptrons", "Transformers", "Acoustics", "Context Modeling", "Humor Detection", "Multimodal Sentiment Analysis", "Contextual Co Coding", "Convolutional Autoencoder" ], "authors": [ { "affiliation": "Communication University of China,School of Information and Communication Engineering,Beijing,China", "fullName": "Boya Deng", "givenName": "Boya", "surname": "Deng", "__typename": "ArticleAuthorType" }, { "affiliation": "Communication University of China,School of Information and Communication Engineering,Beijing,China", "fullName": "Jiayin Tian", "givenName": "Jiayin", "surname": "Tian", "__typename": "ArticleAuthorType" }, { "affiliation": "Networks Laboratory,Science and Technology on Communication,Shijiazhuang,China", "fullName": "Hao Li", "givenName": "Hao", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "cost", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "292-297", "year": "2022", "issn": null, "isbn": "978-1-6654-6248-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "624800a288", "articleId": "1H2piYM1HfW", "__typename": "AdjacentArticleType" }, "next": { "fno": "624800a298", "articleId": "1H2piLcGDII", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2021/3176/0/09667030", "title": "Multi-Modal Learning for AU Detection Based on Multi-Head Fused Transformers", "doi": null, "abstractUrl": "/proceedings-article/fg/2021/09667030/1A6BCazRaaA", "parentPublication": { "id": "proceedings/fg/2021/3176/0", "title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2022/02/09740502", "title": "Emotion Recognition With Multimodal Transformer Fusion Framework Based on Acoustic and Lexical Information", "doi": null, "abstractUrl": "/magazine/mu/2022/02/09740502/1BYErtU5hlK", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i128", "title": "Attention is not Enough: Mitigating the Distribution Discrepancy in Asynchronous Multimodal Sequence Fusion", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i128/1BmEWHsMrC0", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e702", "title": "Visual Saliency Transformer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e702/1BmJOuCBlG8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2022/7218/0/09859304", "title": "Transformer Based Multimodal Scene Recognition in Soccer Videos", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859304/1G4EV2XKSJ2", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859770", "title": "PanFormer: A Transformer Based Model for Pan-Sharpening", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859770/1G9EeJXuPra", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a898", "title": "CAT-Det: Contrastively Augmented Transformer for Multimodal 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a898/1H1kvwiB80E", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9988", "title": "Everything at Once &#x2013; Multi-modal Fusion Transformer for Video Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9988/1H1mzYqpz5C", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10003979", "title": "TensorFormer: A Tensor-based Multimodal Transformer for Multimodal Sentiment Analysis and Depression Detection", "doi": null, "abstractUrl": "/journal/ta/5555/01/10003979/1JwLhn5bvnq", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428081", "title": "Multimodal Transformer Networks with Latent Interaction for Audio-Visual Event Localization", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428081/1uilRgsbUFa", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hc7TzZcI", "doi": "10.1109/VIS54862.2022.00028", "title": "VisQuiz: Exploring Feedback Mechanisms to Improve Graphical Perception", "normalizedTitle": "VisQuiz: Exploring Feedback Mechanisms to Improve Graphical Perception", "abstract": "In this paper, we explore the design and evaluation of feedback for graphical perception tasks, called VisQuiz. Using a quiz-like metaphor, we design feedback for a typical visualization comparison experiment, showing participants their answer alongside the correct answer in an animated sequence in each trial, as well as summary feedback at the end of trial sections. To evaluate VisQuiz, we conduct a between-subjects experiment, including three stages of 40 trials each with a control condition that included only summary feedback. Results from <tex>Z_$n=80$_Z</tex> participants show that once participants started receiving trial feedback (Stage 2) they performed significantly better with bubble charts than those in the control condition. This effect carried over when feedback was removed (Stage 3). Results also suggest an overall trend of improved performance due to feedback. We discuss these findings in the context of other visualization literacy efforts, and possible future work at the intersection of visualization, feedback, and learning. Experiment data and analysis scripts are available at the following repository https://osf.io/jys5d/", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we explore the design and evaluation of feedback for graphical perception tasks, called VisQuiz. Using a quiz-like metaphor, we design feedback for a typical visualization comparison experiment, showing participants their answer alongside the correct answer in an animated sequence in each trial, as well as summary feedback at the end of trial sections. To evaluate VisQuiz, we conduct a between-subjects experiment, including three stages of 40 trials each with a control condition that included only summary feedback. Results from <tex>$n=80$</tex> participants show that once participants started receiving trial feedback (Stage 2) they performed significantly better with bubble charts than those in the control condition. This effect carried over when feedback was removed (Stage 3). Results also suggest an overall trend of improved performance due to feedback. We discuss these findings in the context of other visualization literacy efforts, and possible future work at the intersection of visualization, feedback, and learning. Experiment data and analysis scripts are available at the following repository https://osf.io/jys5d/", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we explore the design and evaluation of feedback for graphical perception tasks, called VisQuiz. Using a quiz-like metaphor, we design feedback for a typical visualization comparison experiment, showing participants their answer alongside the correct answer in an animated sequence in each trial, as well as summary feedback at the end of trial sections. To evaluate VisQuiz, we conduct a between-subjects experiment, including three stages of 40 trials each with a control condition that included only summary feedback. Results from - participants show that once participants started receiving trial feedback (Stage 2) they performed significantly better with bubble charts than those in the control condition. This effect carried over when feedback was removed (Stage 3). Results also suggest an overall trend of improved performance due to feedback. We discuss these findings in the context of other visualization literacy efforts, and possible future work at the intersection of visualization, feedback, and learning. Experiment data and analysis scripts are available at the following repository https://osf.io/jys5d/", "fno": "881200a095", "keywords": [ "Computer Aided Instruction", "Computer Animation", "Data Visualisation", "Statistical Analysis", "User Interfaces", "Animated Sequence", "Between Subjects Experiment", "Feedback Mechanisms", "Graphical Perception Tasks", "Quiz Like Metaphor", "Summary Feedback", "Trial Feedback", "Typical Visualization Comparison Experiment", "Vis Quiz", "Visualization Literacy Efforts", "Visual Analytics", "Data Visualization", "Market Research", "Task Analysis", "Visualization", "Graphical Perception", "Feedback" ], "authors": [ { "affiliation": "Worcester Polytechnic Institute", "fullName": "Ryan Birchfield", "givenName": "Ryan", "surname": "Birchfield", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Maddison Caten", "givenName": "Maddison", "surname": "Caten", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Errica Cheng", "givenName": "Errica", "surname": "Cheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Madyson Kelly", "givenName": "Madyson", "surname": "Kelly", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Truman Larson", "givenName": "Truman", "surname": "Larson", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Hoan Phan Pham", "givenName": "Hoan Phan", "surname": "Pham", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Yiren Ding", "givenName": "Yiren", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Noëlle Rakotondravony", "givenName": "Noëlle", "surname": "Rakotondravony", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Lane Harrison", "givenName": "Lane", "surname": "Harrison", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "95-99", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "881200a090", "articleId": "1J6hfplZRDO", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a100", "articleId": "1J6hd7nIQ5a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2015/3854/0/07403672", "title": "Evaluating criminal networks with PEVNET", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403672/12OmNA0MZ5H", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031600", "title": "Exploring controversy via sentiment divergences of aspects in reviews", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031600/12OmNAo45Rt", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2004/2112/0/21120208", "title": "Can Haptic Feedback Improve the Perception of Self-Motion in Virtual Reality?", "doi": null, "abstractUrl": "/proceedings-article/haptics/2004/21120208/12OmNBzRNsV", "parentPublication": { "id": "proceedings/haptics/2004/2112/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2010/6237/0/05444791", "title": "Influence of tactile feedback and presence on egocentric distance perception in virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2010/05444791/12OmNyoAA64", "parentPublication": { "id": "proceedings/vr/2010/6237/0", "title": "2010 IEEE Virtual Reality Conference (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2018/7016/1/701601a070", "title": "Exploring Users' Perception of Collaborative Explanation Styles", "doi": null, "abstractUrl": "/proceedings-article/cbi/2018/701601a070/13l5NWR8tNx", "parentPublication": { "id": "cbi/2018/7016/1", "title": "2018 IEEE 20th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534855", "title": "A Visual Analytics Approach for Understanding Reasons behind Snowballing and Comeback in MOBA Games", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534855/13rRUxjQybV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09747941", "title": "SD^2: Slicing and Dicing Scholarly Data for Interactive Evaluation of Academic Performance", "doi": null, "abstractUrl": "/journal/tg/5555/01/09747941/1CdB6lneKkg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2022/0103/0/10108519", "title": "The Effects of Data Visualization on User Perceptions of a Health Chatbot", "doi": null, "abstractUrl": "/proceedings-article/vahc/2022/10108519/1MIgTbk9v8Y", "parentPublication": { "id": "proceedings/vahc/2022/0103/0", "title": "2022 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802466", "title": "Identifying Patterns and Anomalies within Spatiotemporal Water Sampling Data", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802466/1cJ6YQ6osms", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09492011", "title": "A Survey of Perception-Based Visualization Studies by Task", "doi": null, "abstractUrl": "/journal/tg/2022/12/09492011/1volPuHGMdW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yylaxRHvDW", "title": "2021 9th International Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yyldMmsUVi", "doi": "10.1109/ACII52823.2021.9597423", "title": "Dimensional perception of a &#x2018;smiling McGurk effect&#x2019;", "normalizedTitle": "Dimensional perception of a ‘smiling McGurk effect’", "abstract": "Multisensory integration influences emotional perception, as the McGurk effect demonstrates for the communication between humans. Human physiology implicitly links the production of visual features with other modes like the audio channel: Face muscles responsible for a smiling face also stretch the vocal cords that results in a characteristic smiling voice. For artificial agents capable of multimodal expression, this linkage is modeled explicitly. In our study, we observe the influence of visual and audio channel on the perception of the agent&#x2019;s emotional state. We created two virtual characters to control for anthropomorphic appearance. We record videos of these agents either with matching or mismatching emotional expression in the audio and visual channel. In an online study we measured the agent&#x2019;s perceived valence and arousal. Our results show that a matched smiling voice and smiling face increase both dimensions of the Circumplex model of emotions: ratings of valence and arousal grow. When the channels present conflicting information, any type of smiling results in higher arousal rating, but only the visual channel increases the perceived valence. When engineers are constrained in their design choices, we suggest they should give precedence to convey the artificial agent&#x2019;s emotional state through the visual channel.", "abstracts": [ { "abstractType": "Regular", "content": "Multisensory integration influences emotional perception, as the McGurk effect demonstrates for the communication between humans. Human physiology implicitly links the production of visual features with other modes like the audio channel: Face muscles responsible for a smiling face also stretch the vocal cords that results in a characteristic smiling voice. For artificial agents capable of multimodal expression, this linkage is modeled explicitly. In our study, we observe the influence of visual and audio channel on the perception of the agent&#x2019;s emotional state. We created two virtual characters to control for anthropomorphic appearance. We record videos of these agents either with matching or mismatching emotional expression in the audio and visual channel. In an online study we measured the agent&#x2019;s perceived valence and arousal. Our results show that a matched smiling voice and smiling face increase both dimensions of the Circumplex model of emotions: ratings of valence and arousal grow. When the channels present conflicting information, any type of smiling results in higher arousal rating, but only the visual channel increases the perceived valence. When engineers are constrained in their design choices, we suggest they should give precedence to convey the artificial agent&#x2019;s emotional state through the visual channel.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multisensory integration influences emotional perception, as the McGurk effect demonstrates for the communication between humans. Human physiology implicitly links the production of visual features with other modes like the audio channel: Face muscles responsible for a smiling face also stretch the vocal cords that results in a characteristic smiling voice. For artificial agents capable of multimodal expression, this linkage is modeled explicitly. In our study, we observe the influence of visual and audio channel on the perception of the agent’s emotional state. We created two virtual characters to control for anthropomorphic appearance. We record videos of these agents either with matching or mismatching emotional expression in the audio and visual channel. In an online study we measured the agent’s perceived valence and arousal. Our results show that a matched smiling voice and smiling face increase both dimensions of the Circumplex model of emotions: ratings of valence and arousal grow. When the channels present conflicting information, any type of smiling results in higher arousal rating, but only the visual channel increases the perceived valence. When engineers are constrained in their design choices, we suggest they should give precedence to convey the artificial agent’s emotional state through the visual channel.", "fno": "09597423", "keywords": [ "Emotion Recognition", "Physiology", "Sensor Fusion", "Visual Perception", "Dimensional Perception", "Smiling Mc Gurk Effect", "Multisensory Integration", "Emotional Perception", "Human Physiology", "Visual Features", "Audio Channel", "Face Muscles", "Vocal Cords", "Characteristic Smiling Voice", "Artificial Agents", "Multimodal Expression", "Virtual Characters", "Anthropomorphic Appearance", "Matching Mismatching Emotional Expression", "Visual Channel", "Perceived Valence", "Smiling Face Increase Both Dimensions", "Higher Arousal Rating", "Artificial Agent", "Circumplex Model Of Emotions", "Couplings", "Visualization", "Affective Computing", "Production", "Muscles", "Multisensory Integration", "Physiology", "Multisensory Integration", "Smiling", "Virtual Agent", "Human Likeness" ], "authors": [ { "affiliation": "KTH Royal Institute of Technology,Stockholm,Sweden", "fullName": "Ilaria Torre", "givenName": "Ilaria", "surname": "Torre", "__typename": "ArticleAuthorType" }, { "affiliation": "KTH Royal Institute of Technology,Stockholm,Sweden", "fullName": "Simon Holk", "givenName": "Simon", "surname": "Holk", "__typename": "ArticleAuthorType" }, { "affiliation": "Trinity College Dublin,Dublin,Ireland", "fullName": "Emma Carrigan", "givenName": "Emma", "surname": "Carrigan", "__typename": "ArticleAuthorType" }, { "affiliation": "KTH Royal Institute of Technology,Stockholm,Sweden", "fullName": "Iolanda Leite", "givenName": "Iolanda", "surname": "Leite", "__typename": "ArticleAuthorType" }, { "affiliation": "Trinity College Dublin,Dublin,Ireland", "fullName": "Rachel McDonnell", "givenName": "Rachel", "surname": "McDonnell", "__typename": "ArticleAuthorType" }, { "affiliation": "Trinity College Dublin,Dublin,Ireland", "fullName": "Naomi Harte", "givenName": "Naomi", "surname": "Harte", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2021", "issn": null, "isbn": "978-1-6654-0019-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09597463", "articleId": "1yylaWoRRHG", "__typename": "AdjacentArticleType" }, "next": { "fno": "09597458", "articleId": "1yylfBEGBHO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ism/2008/3454/0/3454a228", "title": "Affective Characterization of Movie Scenes Based on Multimedia Content Analysis and User's Physiological Emotional Responses", "doi": null, "abstractUrl": "/proceedings-article/ism/2008/3454a228/12OmNC4wtGk", "parentPublication": { "id": "proceedings/ism/2008/3454/0", "title": "2008 Tenth IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a582", "title": "User-centric Affective Video Tagging from MEG and Peripheral Physiological Responses", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a582/12OmNrkjVpA", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2012/02/tta2012020211", "title": "Multimodal Emotion Recognition in Response to Videos", "doi": null, "abstractUrl": "/journal/ta/2012/02/tta2012020211/13rRUypp568", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/02/08515042", "title": "Predicting Emotionally Salient Regions Using Qualitative Agreement of Deep Neural Network Regressors", "doi": null, "abstractUrl": "/journal/ta/2021/02/08515042/14NIz3XSgyA", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873987", "title": "Neurophysiological and Subjective Analysis of VR Emotion Induction Paradigm", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873987/1GjwIFarTz2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09915425", "title": "Smiling in the Face and Voice of Avatars and Robots: Evidence for a &#x2018;smiling McGurk Effect&#x2019;", "doi": null, "abstractUrl": "/journal/ta/5555/01/09915425/1HmfLOsfG4o", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2022/5490/0/10086019", "title": "Music Charts for Approximating Everyday Emotions: A Dataset of Daily Charts with Music Features from 106 Cities", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2022/10086019/1M668FTwk5G", "parentPublication": { "id": "proceedings/aciiw/2022/5490/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icectt/2020/9928/0/992800a213", "title": "Emotional Response Increments Induced by Equivalent Enhancement of Different Valence Films", "doi": null, "abstractUrl": "/proceedings-article/icectt/2020/992800a213/1oa5ey8lRaE", "parentPublication": { "id": "proceedings/icectt/2020/9928/0", "title": "2020 5th International Conference on Electromechanical Control Technology and Transportation (ICECTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2021/0019/0/09597442", "title": "Multi-modal emotion recognition using recurrence plots and transfer learning on physiological signals", "doi": null, "abstractUrl": "/proceedings-article/acii/2021/09597442/1yyleK1V1a8", "parentPublication": { "id": "proceedings/acii/2021/0019/0", "title": "2021 9th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2021/4261/0/09635346", "title": "A machine learning approach to predict emotional arousal and valence from gaze extracted features", "doi": null, "abstractUrl": "/proceedings-article/bibe/2021/09635346/1zmvn0ear7i", "parentPublication": { "id": "proceedings/bibe/2021/4261/0", "title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqH9hnp", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdL7e3", "doi": "10.1109/CVPR.2016.493", "title": "Natural Language Object Retrieval", "normalizedTitle": "Natural Language Object Retrieval", "abstract": "In this paper, we address the task of natural language object retrieval, to localize a target object within a given image based on a natural language query of the object. Natural language object retrieval differs from text-based image retrieval task as it involves spatial information about objects within the scene and global scene context. To address this issue, we propose a novel Spatial Context Recurrent ConvNet (SCRC) model as scoring function on candidate boxes for object retrieval, integrating spatial configurations and global scene-level contextual information into the network. Our model processes query text, local image descriptors, spatial configurations and global context features through a recurrent network, outputs the probability of the query text conditioned on each candidate box as a score for the box, and can transfer visual-linguistic knowledge from image captioning domain to our task. Experimental results demonstrate that our method effectively utilizes both local and global information, outperforming previous baseline methods significantly on different datasets and scenarios, and can exploit large scale vision and language datasets for knowledge transfer.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we address the task of natural language object retrieval, to localize a target object within a given image based on a natural language query of the object. Natural language object retrieval differs from text-based image retrieval task as it involves spatial information about objects within the scene and global scene context. To address this issue, we propose a novel Spatial Context Recurrent ConvNet (SCRC) model as scoring function on candidate boxes for object retrieval, integrating spatial configurations and global scene-level contextual information into the network. Our model processes query text, local image descriptors, spatial configurations and global context features through a recurrent network, outputs the probability of the query text conditioned on each candidate box as a score for the box, and can transfer visual-linguistic knowledge from image captioning domain to our task. Experimental results demonstrate that our method effectively utilizes both local and global information, outperforming previous baseline methods significantly on different datasets and scenarios, and can exploit large scale vision and language datasets for knowledge transfer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we address the task of natural language object retrieval, to localize a target object within a given image based on a natural language query of the object. Natural language object retrieval differs from text-based image retrieval task as it involves spatial information about objects within the scene and global scene context. To address this issue, we propose a novel Spatial Context Recurrent ConvNet (SCRC) model as scoring function on candidate boxes for object retrieval, integrating spatial configurations and global scene-level contextual information into the network. Our model processes query text, local image descriptors, spatial configurations and global context features through a recurrent network, outputs the probability of the query text conditioned on each candidate box as a score for the box, and can transfer visual-linguistic knowledge from image captioning domain to our task. Experimental results demonstrate that our method effectively utilizes both local and global information, outperforming previous baseline methods significantly on different datasets and scenarios, and can exploit large scale vision and language datasets for knowledge transfer.", "fno": "8851e555", "keywords": [ "Natural Languages", "Context", "Context Modeling", "Predictive Models", "Adaptation Models", "Feature Extraction", "Training" ], "authors": [ { "affiliation": null, "fullName": "Ronghang Hu", "givenName": "Ronghang", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huazhe Xu", "givenName": "Huazhe", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marcus Rohrbach", "givenName": "Marcus", "surname": "Rohrbach", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiashi Feng", "givenName": "Jiashi", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kate Saenko", "givenName": "Kate", "surname": "Saenko", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Trevor Darrell", "givenName": "Trevor", "surname": "Darrell", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "4555-4564", "year": "2016", "issn": "1063-6919", "isbn": "978-1-4673-8851-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8851e545", "articleId": "12OmNzZEADV", "__typename": "AdjacentArticleType" }, "next": { "fno": "8851e565", "articleId": "12OmNy3iFfF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cmpsac/1992/3000/0/00217572", "title": "ORL: an object retrieval language interface to an object algebra", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1992/00217572/12OmNCwUmyu", "parentPublication": { "id": "proceedings/cmpsac/1992/3000/0", "title": "1992 Proceedings. The Sixteenth Annual International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b462", "title": "Spatio-Temporal Person Retrieval via Natural Language Queries", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b462/12OmNx4yvE0", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733a027", "title": "Attention-Based Natural Language Person Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a027/12OmNx5YvgB", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1985/01/01701902", "title": "A Field Evaluation of Natural Language for Data Retrieval", "doi": null, "abstractUrl": "/journal/ts/1985/01/01701902/13rRUy3xY9x", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2014/08/06823180", "title": "Supporting Process Model Validation through Natural Language Generation", "doi": null, "abstractUrl": "/journal/ts/2014/08/06823180/13rRUytWFaT", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900e927", "title": "Cross-modal Target Retrieval for Tracking by Natural Language", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900e927/1G56UyoeRm8", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300c584", "title": "Object Captioning and Retrieval with Natural Language", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300c584/1i5mwUasWGI", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvidl/2020/9481/0/948100a532", "title": "A Speech Content Retrieval Model Based on Integrated Neural Network for Natural Language Description", "doi": null, "abstractUrl": "/proceedings-article/cvidl/2020/948100a532/1pbe6qUPXc4", "parentPublication": { "id": "proceedings/cvidl/2020/9481/0", "title": "2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/4.899E245", "title": "Contrastive Learning for Natural Language-Based Vehicle Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/4.899E245/1yXsAdaJybS", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900n3758", "title": "Towards More Flexible and Accurate Object Tracking with Natural Language: Algorithms and Benchmark", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900n3758/1yeKUnsA9Wg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbDh", "title": "1984 IEEE First International Conference on Data Engineering", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "1984", "__typename": "ProceedingType" }, "article": { "id": "12OmNzWx01G", "doi": "10.1109/ICDE.1984.7271256", "title": "A natural language interface for performing database updates", "normalizedTitle": "A natural language interface for performing database updates", "abstract": "Although natural language database interfaces have been developed for query processing, the problem of natural language updates has not generally been considered. To interpret update requests, several issues must be addressed that do not typically pose difficulties when dealing exclusively with queries. This paper examines the problems encountered, and describes an implemented system that performs simple natural language updates. Examples of the system's operation are presented, and the efficacy of the overall method is discussed.", "abstracts": [ { "abstractType": "Regular", "content": "Although natural language database interfaces have been developed for query processing, the problem of natural language updates has not generally been considered. To interpret update requests, several issues must be addressed that do not typically pose difficulties when dealing exclusively with queries. This paper examines the problems encountered, and describes an implemented system that performs simple natural language updates. Examples of the system's operation are presented, and the efficacy of the overall method is discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although natural language database interfaces have been developed for query processing, the problem of natural language updates has not generally been considered. To interpret update requests, several issues must be addressed that do not typically pose difficulties when dealing exclusively with queries. This paper examines the problems encountered, and describes an implemented system that performs simple natural language updates. Examples of the system's operation are presented, and the efficacy of the overall method is discussed.", "fno": "07271256", "keywords": [ "Databases", "Natural Languages", "Semantics", "Context", "Remuneration", "Accuracy", "Data Models" ], "authors": [ { "affiliation": "Department of Computer Science, Stanford University", "fullName": "James Davidson", "givenName": "James", "surname": "Davidson", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1984-04-01T00:00:00", "pubType": "proceedings", "pages": "69-76", "year": "1984", "issn": null, "isbn": "978-0-8186-0533-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07271255", "articleId": "12OmNvxsSQJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07271257", "articleId": "12OmNBKEysT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2012/4859/0/4859a130", "title": "A Vietnamese Natural Language Interface to Database", "doi": null, "abstractUrl": "/proceedings-article/icsc/2012/4859a130/12OmNARAn85", "parentPublication": { "id": "proceedings/icsc/2012/4859/0", "title": "2012 IEEE Sixth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a169", "title": "Answering N-Relation Natural Language Questions in the Commercial Domain", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a169/12OmNB9bvf9", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiaws/1991/2240/0/00236578", "title": "Natural language interface to a corporate cash management system", "doi": null, "abstractUrl": "/proceedings-article/aiaws/1991/00236578/12OmNBlofMw", "parentPublication": { "id": "proceedings/aiaws/1991/2240/0", "title": "Proceedings First International Conference on Artificial Intelligence Applications on Wall Street", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2016/4320/0/07945786", "title": "An independent-domain natural language interface for relational database: Case Arabic language", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2016/07945786/12OmNrkjVcJ", "parentPublication": { "id": "proceedings/aiccsa/2016/4320/0", "title": "2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851e555", "title": "Natural Language Object Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851e555/12OmNwdL7e3", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1991/2152/0/00170148", "title": "Extending the E-R concepts to capture natural language semantics for database access", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1991/00170148/12OmNxFaLtA", "parentPublication": { "id": "proceedings/cmpsac/1991/2152/0", "title": "1991 The Fifteenth Annual International Computer Software & Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1988/0837/0/00196127", "title": "Hierarchical multilevel processing model for natural language database interface", "doi": null, "abstractUrl": "/proceedings-article/caia/1988/00196127/12OmNy1SFQR", "parentPublication": { "id": "proceedings/caia/1988/0837/0", "title": "Proceedings. The Fourth Conference on Artificial Intelligence Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/1986/0655/0/07266215", "title": "A knowledge-based approach to design a portable natural language interface to database systems", "doi": null, "abstractUrl": "/proceedings-article/icde/1986/07266215/12OmNzWfpab", "parentPublication": { "id": "proceedings/icde/1986/0655/0", "title": "1986 IEEE Second International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1992/2897/0/00235208", "title": "Visual query specification in a multimedia database system", "doi": null, "abstractUrl": "/proceedings-article/visual/1992/00235208/12OmNzaQojY", "parentPublication": { "id": "proceedings/visual/1992/2897/0", "title": "Proceedings Visualization '92", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101534", "title": "A Natural Language Interface for Database: Achieving Transfer-learnability Using Adversarial Method for Question Understanding", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101534/1kaMKArBilq", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiqf", "title": "2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)", "acronym": "aire", "groupId": "1803944", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VObpNK", "doi": "10.1109/AIRE.2018.00009", "title": "Extraction of Natural Language Requirements from Breach Reports Using Event Inference", "normalizedTitle": "Extraction of Natural Language Requirements from Breach Reports Using Event Inference", "abstract": "We address the problem of extracting useful information contained in security and privacy breach reports. A breach report tells a short story describing how a breach happened and the follow-up remedial actions taken by the responsible parties. By predicting sentences that may follow a breach description using natural language processing, our goal is to suggest security and privacy requirements for practitioners and end users that can be used to prevent and recover from such breaches. We prepare a curated dataset of structured short breach stories using unstructured breach reports published by the U.S. Department of Health and Human Services. We propose a prediction model for inferring held-out sentences based on Paragraph Vector, a document embedding method, and Long Short-Term Memory networks. The predicted sentences can suggest natural language requirements. We evaluate our model on the curated dataset as well as the ROCStories corpus, a collection of five-sentence commonsense stories, and find that the presented model performs significantly better than the baseline of using average word vectors.", "abstracts": [ { "abstractType": "Regular", "content": "We address the problem of extracting useful information contained in security and privacy breach reports. A breach report tells a short story describing how a breach happened and the follow-up remedial actions taken by the responsible parties. By predicting sentences that may follow a breach description using natural language processing, our goal is to suggest security and privacy requirements for practitioners and end users that can be used to prevent and recover from such breaches. We prepare a curated dataset of structured short breach stories using unstructured breach reports published by the U.S. Department of Health and Human Services. We propose a prediction model for inferring held-out sentences based on Paragraph Vector, a document embedding method, and Long Short-Term Memory networks. The predicted sentences can suggest natural language requirements. We evaluate our model on the curated dataset as well as the ROCStories corpus, a collection of five-sentence commonsense stories, and find that the presented model performs significantly better than the baseline of using average word vectors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We address the problem of extracting useful information contained in security and privacy breach reports. A breach report tells a short story describing how a breach happened and the follow-up remedial actions taken by the responsible parties. By predicting sentences that may follow a breach description using natural language processing, our goal is to suggest security and privacy requirements for practitioners and end users that can be used to prevent and recover from such breaches. We prepare a curated dataset of structured short breach stories using unstructured breach reports published by the U.S. Department of Health and Human Services. We propose a prediction model for inferring held-out sentences based on Paragraph Vector, a document embedding method, and Long Short-Term Memory networks. The predicted sentences can suggest natural language requirements. We evaluate our model on the curated dataset as well as the ROCStories corpus, a collection of five-sentence commonsense stories, and find that the presented model performs significantly better than the baseline of using average word vectors.", "fno": "840400a022", "keywords": [ "Data Privacy", "Natural Language Processing", "Recurrent Neural Nets", "Security Of Data", "Text Analysis", "Security", "Privacy Requirements", "Curated Dataset", "Structured Short Breach Stories", "Unstructured Breach Reports", "Prediction Model", "Long Short Term Memory Networks", "Predicted Sentences", "Natural Language Requirements", "Five Sentence Commonsense Stories", "Event Inference", "Privacy Breach Reports", "Breach Description", "Natural Language Processing", "ROC Stories Corpus", "Average Word Vectors", "US Department Of Health And Human Services", "Task Analysis", "Predictive Models", "Security", "Natural Languages", "Privacy", "Recurrent Neural Networks", "Semantics", "Event Inference", "Story Cloze Test", "Security And Privacy Requirements", "Breach Reports", "Recurrent Neural Networks", "Long Short Term Memory Architecture" ], "authors": [ { "affiliation": null, "fullName": "Hui Guo", "givenName": "Hui", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Özgür Kafali", "givenName": "Özgür", "surname": "Kafali", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Munindar Singh", "givenName": "Munindar", "surname": "Singh", "__typename": "ArticleAuthorType" } ], "idPrefix": "aire", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "22-28", "year": "2018", "issn": null, "isbn": "978-1-5386-8404-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "840400a015", "articleId": "17D45Wda7eq", "__typename": "AdjacentArticleType" }, "next": { "fno": "840400a029", "articleId": "17D45WIXbRT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdcs/2017/1792/0/1792c423", "title": "Location Privacy Breach: Apps Are Watching You in Background", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792c423/12OmNvAiSph", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227137", "title": "Inferring method specifications from natural language API descriptions", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227137/12OmNwcCIT5", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457d337", "title": "A Hierarchical Approach for Generating Descriptive Image Paragraphs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d337/12OmNzfXawt", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594899", "title": "Image-Enhanced Multi-level Sentence Representation Net for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594899/17D45Xh13q9", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669540", "title": "COVID Vaccine and Cardiovascular Risks: A Natural Language Analysis of Vaccine Adverse Event Reports", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669540/1A9VGLPOjF6", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2022/9755/0/975500a043", "title": "A System for Generating Student Progress Reports in Cram School", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2022/975500a043/1GU6VolQ1RS", "parentPublication": { "id": "proceedings/iiai-aai/2022/9755/0", "title": "2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2022/1008/0/10017722", "title": "Natural Language Inference for Arabic using Recurrent Neural Network and Word Embedding", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2022/10017722/1KJxvGKMy4w", "parentPublication": { "id": "proceedings/aiccsa/2022/1008/0", "title": "2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a719", "title": "Language2Pose: Natural Language Grounded Pose Forecasting", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a719/1ezRC9pr2KY", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2021/8899/0/889900a288", "title": "Using Conditional Sentence Representation in Pointer Networks for Sentence Ordering", "doi": null, "abstractUrl": "/proceedings-article/icsc/2021/889900a288/1rFzUTZi7RK", "parentPublication": { "id": "proceedings/icsc/2021/8899/0", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428375", "title": "Relative Position Representation over Interaction Space for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428375/1uimbeSEquQ", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AUp1OqOcOA", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AUp3cpQCIg", "doi": "10.1109/ISSRE52982.2021.00033", "title": "Evaluating Natural Language Inference Models: A Metamorphic Testing Approach", "normalizedTitle": "Evaluating Natural Language Inference Models: A Metamorphic Testing Approach", "abstract": "Natural language inference (NLI) is a fundamental NLP task that forms the cornerstone of deep natural language understanding. Unfortunately, evaluation of NLI models is challenging. On one hand, due to the lack of test oracles, it is difficult to automatically judge the correctness of NLI&#x0027;s prediction results. On the other hand, apart from knowing how well a model performs, there is a further need for understanding the capabilities and characteristics of different NLI models. To mitigate these issues, we propose to apply the technique of metamorphic testing (MT) to NLI. We identify six categories of metamorphic relations, covering a wide range of properties that are expected to be possessed by NLI task. Based on this, MT can be conducted on NLI models without using test oracles, and MT results are able to interpret NLI models&#x0027; capabilities from varying aspects. We further demonstrate the validity and effectiveness of our approach by conducting experiments on five NLI models. Our experiments expose a large number of prediction failures from subject NLI models, and also yield interpretations for common characteristics of NLI models.", "abstracts": [ { "abstractType": "Regular", "content": "Natural language inference (NLI) is a fundamental NLP task that forms the cornerstone of deep natural language understanding. Unfortunately, evaluation of NLI models is challenging. On one hand, due to the lack of test oracles, it is difficult to automatically judge the correctness of NLI&#x0027;s prediction results. On the other hand, apart from knowing how well a model performs, there is a further need for understanding the capabilities and characteristics of different NLI models. To mitigate these issues, we propose to apply the technique of metamorphic testing (MT) to NLI. We identify six categories of metamorphic relations, covering a wide range of properties that are expected to be possessed by NLI task. Based on this, MT can be conducted on NLI models without using test oracles, and MT results are able to interpret NLI models&#x0027; capabilities from varying aspects. We further demonstrate the validity and effectiveness of our approach by conducting experiments on five NLI models. Our experiments expose a large number of prediction failures from subject NLI models, and also yield interpretations for common characteristics of NLI models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Natural language inference (NLI) is a fundamental NLP task that forms the cornerstone of deep natural language understanding. Unfortunately, evaluation of NLI models is challenging. On one hand, due to the lack of test oracles, it is difficult to automatically judge the correctness of NLI's prediction results. On the other hand, apart from knowing how well a model performs, there is a further need for understanding the capabilities and characteristics of different NLI models. To mitigate these issues, we propose to apply the technique of metamorphic testing (MT) to NLI. We identify six categories of metamorphic relations, covering a wide range of properties that are expected to be possessed by NLI task. Based on this, MT can be conducted on NLI models without using test oracles, and MT results are able to interpret NLI models' capabilities from varying aspects. We further demonstrate the validity and effectiveness of our approach by conducting experiments on five NLI models. Our experiments expose a large number of prediction failures from subject NLI models, and also yield interpretations for common characteristics of NLI models.", "fno": "258700a220", "keywords": [ "Inference Mechanisms", "Natural Language Processing", "Program Testing", "Natural Language Inference Models", "Metamorphic Testing Approach", "Deep Natural Language Understanding", "Test Oracles", "NLI Models", "NLI Task", "Analytical Models", "Natural Languages", "Predictive Models", "Maintenance Engineering", "Linguistics", "Cognition", "Software Reliability", "Natural Language Inference", "Metamorphic Testing", "Metamorphic Relation", "Quality Evaluation", "Oracle Problem" ], "authors": [ { "affiliation": "Zhejiang Sci-Tech University,Hangzhou,China", "fullName": "Mingyue Jiang", "givenName": "Mingyue", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Sci-Tech University,Hangzhou,China", "fullName": "Houzhen Bao", "givenName": "Houzhen", "surname": "Bao", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Sci-Tech University,Hangzhou,China", "fullName": "Kaiyi Tu", "givenName": "Kaiyi", "surname": "Tu", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Informatics,Tokyo,Japan", "fullName": "Xiao-Yi Zhang", "givenName": "Xiao-Yi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang Sci-Tech University,Hangzhou,China", "fullName": "Zuohua Ding", "givenName": "Zuohua", "surname": "Ding", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "220-230", "year": "2021", "issn": null, "isbn": "978-1-6654-2587-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "258700a208", "articleId": "1AUp6DDrisU", "__typename": "AdjacentArticleType" }, "next": { "fno": "258700a231", "articleId": "1AUp79BROTu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icstw/2014/5790/0/5790a237", "title": "Techniques for Automatic Detection of Metamorphic Relations", "doi": null, "abstractUrl": "/proceedings-article/icstw/2014/5790a237/12OmNyKJidw", "parentPublication": { "id": "proceedings/icstw/2014/5790/0", "title": "2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2016/8845/2/8845b598", "title": "Experience Report: How Do Metamorphic Relations Perform in Geographic Information Systems Testing", "doi": null, "abstractUrl": "/proceedings-article/compsac/2016/8845b598/12OmNylKAJD", "parentPublication": { "id": "proceedings/compsac/2016/8845/1", "title": "2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2019/01/08496812", "title": "Metamorphic Testing: A Simple Yet Effective Approach for Testing Scientific Software", "doi": null, "abstractUrl": "/magazine/cs/2019/01/08496812/14tNJqqlFwB", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594899", "title": "Image-Enhanced Multi-level Sentence Representation Net for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594899/17D45Xh13q9", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09783098", "title": "Explainable Natural Language Inference via Identifying Important Rationales", "doi": null, "abstractUrl": "/journal/ai/5555/01/09783098/1DIx32lLO9O", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a360", "title": "Dynamic Knowledge Integration for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a360/1GNtn2h5lQI", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a001", "title": "Adversarial Analysis of Natural Language Inference Systems", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a001/1iffzC8cHba", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428375", "title": "Relative Position Representation over Interaction Space for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428375/1uimbeSEquQ", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2020/9594/0/09450263", "title": "Exploring Lexical Irregularities in Hypothesis-Only Models of Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2020/09450263/1uqFME8m2M8", "parentPublication": { "id": "proceedings/icci*cc/2020/9594/0", "title": "2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annsim/2021/375/0/09552058", "title": "Metamorphic Testing for Hybrid Simulation Validation", "doi": null, "abstractUrl": "/proceedings-article/annsim/2021/09552058/1xsdIPjZPMI", "parentPublication": { "id": "proceedings/annsim/2021/375/0", "title": "2021 Annual Modeling and Simulation Conference (ANNSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ckrzcHMojm", "title": "2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "acronym": "aike", "groupId": "1828385", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ckrzwkWm40", "doi": "10.1109/AIKE.2019.00048", "title": "Natural Language Explanations of Classifier Behavior", "normalizedTitle": "Natural Language Explanations of Classifier Behavior", "abstract": "Tools that enhance interpretability of classifiers tend to focus on the knowledgeable data scientist. Here we propose techniques that generate textual explanations of the internal behavior of a given classifier, aiming at less technically proficient users of machine learning resources. Our approach has been positively evaluated by a group of users who received its textual output.", "abstracts": [ { "abstractType": "Regular", "content": "Tools that enhance interpretability of classifiers tend to focus on the knowledgeable data scientist. Here we propose techniques that generate textual explanations of the internal behavior of a given classifier, aiming at less technically proficient users of machine learning resources. Our approach has been positively evaluated by a group of users who received its textual output.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tools that enhance interpretability of classifiers tend to focus on the knowledgeable data scientist. Here we propose techniques that generate textual explanations of the internal behavior of a given classifier, aiming at less technically proficient users of machine learning resources. Our approach has been positively evaluated by a group of users who received its textual output.", "fno": "148800a239", "keywords": [ "Learning Artificial Intelligence", "Natural Language Processing", "Pattern Classification", "Text Analysis", "Machine Learning Resources", "Knowledgeable Data Scientist", "Textual Explanations", "Classifier", "Natural Language", "Natural Languages", "Indexes", "Analytical Models", "Data Models", "Sensitivity", "Mathematical Model", "Predictive Models", "Machine Learning", "Interpretability", "Transparency" ], "authors": [ { "affiliation": "Universidade de São Paulo", "fullName": "Rodrigo Monteiro de Aquino", "givenName": "Rodrigo", "surname": "Monteiro de Aquino", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade de São Paulo", "fullName": "Fabio Cozman", "givenName": "Fabio", "surname": "Cozman", "__typename": "ArticleAuthorType" } ], "idPrefix": "aike", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "239-242", "year": "2019", "issn": null, "isbn": "978-1-7281-1488-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "148800a231", "articleId": "1ckrzRbTdxS", "__typename": "AdjacentArticleType" }, "next": { "fno": "148800a243", "articleId": "1ckrBB22Epy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457f187", "title": "Person Search with Natural Language Description", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f187/12OmNB9KHw2", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccp/2011/4528/0/4528a067", "title": "Natural Language Compression per Blocks", "doi": null, "abstractUrl": "/proceedings-article/ccp/2011/4528a067/12OmNC8uRzl", "parentPublication": { "id": "proceedings/ccp/2011/4528/0", "title": "Data Compression, Communications and Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/raise/2012/1753/0/06227965", "title": "Synchronizing domain models with natural language specifications", "doi": null, "abstractUrl": "/proceedings-article/raise/2012/06227965/12OmNxVV5US", "parentPublication": { "id": "proceedings/raise/2012/1753/0", "title": "2012 First International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a236", "title": "Attention Based Natural Language Grounding by Navigating Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a236/18j8QawPToI", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2022/3418/0/341800a099", "title": "NEO-NDA: Neo Natural Language Data Augmentation", "doi": null, "abstractUrl": "/proceedings-article/icsc/2022/341800a099/1BYIucGudJS", "parentPublication": { "id": "proceedings/icsc/2022/3418/0", "title": "2022 IEEE 16th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b224", "title": "e-ViL: A Dataset and Benchmark for Natural Language Explanations in Vision-Language Tasks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b224/1BmFPQSK4pO", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600i312", "title": "NLX-GPT: A Model for Natural Language Explanations in Vision and Vision-Language Tasks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i312/1H1lXLtTXeU", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962555", "title": "Piloting Natural Language Generation for Personalized Progress Feedback", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962555/1IHnFy9lvWg", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/transai/2022/7184/0/718400a040", "title": "Generating Natural Language Explanations for Black-Box Predictions", "doi": null, "abstractUrl": "/proceedings-article/transai/2022/718400a040/1Ip7OyYW21a", "parentPublication": { "id": "proceedings/transai/2022/7184/0", "title": "2022 Fourth International Conference on Transdisciplinary AI (TransAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020247", "title": "User-Entity Differential Privacy in Learning Natural Language Models", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020247/1KfR65iwNYQ", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ezRzLyH4bu", "title": "2019 International Conference on 3D Vision (3DV)", "acronym": "3dv", "groupId": "1800494", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ezRC9pr2KY", "doi": "10.1109/3DV.2019.00084", "title": "Language2Pose: Natural Language Grounded Pose Forecasting", "normalizedTitle": "Language2Pose: Natural Language Grounded Pose Forecasting", "abstract": "Generating animations from natural language sentences finds its applications in a a number of domains such as movie script visualization, virtual human animation and, robot motion planning. These sentences can describe different kinds of actions, speeds and direction of these actions, and possibly a target destination. The core modeling challenge in this language-to-pose application is how to map linguistic concepts to motion animations. In this paper, we address this multimodal problem by introducing a neural architecture called Joint Language-to-Pose (or JL2P), which learns a joint embedding of language and pose. This joint embedding space is learned end-to-end using a curriculum learning approach which emphasizes shorter and easier sequences first before moving to longer and harder ones. We evaluate our proposed model on a publicly available corpus of 3D pose data and human-annotated sentences. Both objective metrics and human judgment evaluation confirm that our proposed approach is able to generate more accurate animations and are deemed visually more representative by humans than other data driven approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Generating animations from natural language sentences finds its applications in a a number of domains such as movie script visualization, virtual human animation and, robot motion planning. These sentences can describe different kinds of actions, speeds and direction of these actions, and possibly a target destination. The core modeling challenge in this language-to-pose application is how to map linguistic concepts to motion animations. In this paper, we address this multimodal problem by introducing a neural architecture called Joint Language-to-Pose (or JL2P), which learns a joint embedding of language and pose. This joint embedding space is learned end-to-end using a curriculum learning approach which emphasizes shorter and easier sequences first before moving to longer and harder ones. We evaluate our proposed model on a publicly available corpus of 3D pose data and human-annotated sentences. Both objective metrics and human judgment evaluation confirm that our proposed approach is able to generate more accurate animations and are deemed visually more representative by humans than other data driven approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generating animations from natural language sentences finds its applications in a a number of domains such as movie script visualization, virtual human animation and, robot motion planning. These sentences can describe different kinds of actions, speeds and direction of these actions, and possibly a target destination. The core modeling challenge in this language-to-pose application is how to map linguistic concepts to motion animations. In this paper, we address this multimodal problem by introducing a neural architecture called Joint Language-to-Pose (or JL2P), which learns a joint embedding of language and pose. This joint embedding space is learned end-to-end using a curriculum learning approach which emphasizes shorter and easier sequences first before moving to longer and harder ones. We evaluate our proposed model on a publicly available corpus of 3D pose data and human-annotated sentences. Both objective metrics and human judgment evaluation confirm that our proposed approach is able to generate more accurate animations and are deemed visually more representative by humans than other data driven approaches.", "fno": "313100a719", "keywords": [ "Computer Animation", "Data Visualisation", "Learning Artificial Intelligence", "Mobile Robots", "Natural Language Processing", "Path Planning", "Pose Estimation", "Multimodal Problem", "Neural Architecture", "JL 2 P", "Joint Embedding Space", "Curriculum Learning Approach", "3 D Pose Data", "Human Annotated Sentences", "Human Judgment Evaluation", "Accurate Animations", "Language 2 Pose", "Natural Language Sentences", "Movie Script Visualization", "Virtual Human Animation", "Robot Motion Planning", "Target Destination", "Core Modeling Challenge", "Language To Pose Application", "Map Linguistic Concepts", "Motion Animations", "Pose Forecasting", "Joint Language To Pose", "Animation", "Natural Languages", "Predictive Models", "Task Analysis", "Training", "Forecasting", "Trajectory", "Animation", "Generation", "Joint Space", "Language Grounding", "Language 2 Pose", "Pose Forecasting", "Pose Generation" ], "authors": [ { "affiliation": "Carnegie Mellon University", "fullName": "Chaitanya Ahuja", "givenName": "Chaitanya", "surname": "Ahuja", "__typename": "ArticleAuthorType" }, { "affiliation": "Carnegie Mellon University", "fullName": "Louis-Philippe Morency", "givenName": "Louis-Philippe", "surname": "Morency", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "719-728", "year": "2019", "issn": null, "isbn": "978-1-7281-3131-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "313100a709", "articleId": "1ezRAyp7qVO", "__typename": "AdjacentArticleType" }, "next": { "fno": "313100a729", "articleId": "1ezRzUCreBa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/re/2014/3031/0/06912260", "title": "Hidden in plain sight: Automatically identifying security requirements from natural language artifacts", "doi": null, "abstractUrl": "/proceedings-article/re/2014/06912260/12OmNBlofQ4", "parentPublication": { "id": "proceedings/re/2014/3031/0", "title": "2014 IEEE 22nd International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394334", "title": "An extensible scripting language for interactive animation in a speech-enabled virtual environment", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394334/12OmNCbU2XL", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227137", "title": "Inferring method specifications from natural language API descriptions", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227137/12OmNwcCIT5", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/policy/2012/4735/0/4735a033", "title": "Classifying Natural Language Sentences for Policy", "doi": null, "abstractUrl": "/proceedings-article/policy/2012/4735a033/12OmNy3AgsP", "parentPublication": { "id": "proceedings/policy/2012/4735/0", "title": "Policies for Distributed Systems and Networks, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2018/9269/0/926900a027", "title": "A Natural Language Programming Application for Lego Mindstorms EV3", "doi": null, "abstractUrl": "/proceedings-article/aivr/2018/926900a027/17D45Vu1TyC", "parentPublication": { "id": "proceedings/aivr/2018/9269/0", "title": "2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982290", "title": "A Case-Based Reasoning Approach to Convert Natural Language into First Order Logic", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982290/17D45WLdYR9", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2019/6783/0/08665517", "title": "Controlled Natural Language Framework for Generating Assertions from Hardware Specifications", "doi": null, "abstractUrl": "/proceedings-article/icsc/2019/08665517/18qcdZ7PxBe", "parentPublication": { "id": "proceedings/icsc/2019/6783/0", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b645", "title": "VLGrammar: Grounded Grammar Induction of Vision and Language", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b645/1BmGBfsMybK", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b376", "title": "Synthesis of Compositional Animations from Textual Descriptions", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b376/1BmL1cdH9BK", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412833", "title": "What and How? Jointly Forecasting Human Action and Pose", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412833/1tmjlm3PlgQ", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uqFLXjtNcI", "title": "2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "acronym": "icci*cc", "groupId": "1000097", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1uqFME8m2M8", "doi": "10.1109/ICCICC50026.2020.9450263", "title": "Exploring Lexical Irregularities in Hypothesis-Only Models of Natural Language Inference", "normalizedTitle": "Exploring Lexical Irregularities in Hypothesis-Only Models of Natural Language Inference", "abstract": "Natural Language Inference (NLI) or Recognizing Textual Entailment (RTE) is the task of predicting the entailment relation between a pair of sentences (premise and hypothesis). This task has been described as &#x201C;a valuable testing ground for the development of semantic representations&#x201D; [1], and is a key component in natural language understanding evaluation benchmarks. Models that understand entailment should encode both, the premise and the hypothesis. However, experiments by Poliak et al. [2] revealed a strong preference of these models towards patterns observed only in the hypothesis, based on a 10 dataset comparison. Their results indicated the existence of statistical irregularities present in the hypothesis that bias the model into performing competitively with the state of the art. While recast datasets provide large scale generation of NLI instances due to minimal human intervention, the papers that generate them do not provide fine-grained analysis of the potential statistical patterns that can bias NLI models. In this work, we analyze hypothesis-only models trained on one of the recast datasets provided in Poliak et al. [2] for word-level patterns. Our results indicate the existence of potential lexical biases that could contribute to inflating the models' performance.", "abstracts": [ { "abstractType": "Regular", "content": "Natural Language Inference (NLI) or Recognizing Textual Entailment (RTE) is the task of predicting the entailment relation between a pair of sentences (premise and hypothesis). This task has been described as &#x201C;a valuable testing ground for the development of semantic representations&#x201D; [1], and is a key component in natural language understanding evaluation benchmarks. Models that understand entailment should encode both, the premise and the hypothesis. However, experiments by Poliak et al. [2] revealed a strong preference of these models towards patterns observed only in the hypothesis, based on a 10 dataset comparison. Their results indicated the existence of statistical irregularities present in the hypothesis that bias the model into performing competitively with the state of the art. While recast datasets provide large scale generation of NLI instances due to minimal human intervention, the papers that generate them do not provide fine-grained analysis of the potential statistical patterns that can bias NLI models. In this work, we analyze hypothesis-only models trained on one of the recast datasets provided in Poliak et al. [2] for word-level patterns. Our results indicate the existence of potential lexical biases that could contribute to inflating the models' performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Natural Language Inference (NLI) or Recognizing Textual Entailment (RTE) is the task of predicting the entailment relation between a pair of sentences (premise and hypothesis). This task has been described as “a valuable testing ground for the development of semantic representations” [1], and is a key component in natural language understanding evaluation benchmarks. Models that understand entailment should encode both, the premise and the hypothesis. However, experiments by Poliak et al. [2] revealed a strong preference of these models towards patterns observed only in the hypothesis, based on a 10 dataset comparison. Their results indicated the existence of statistical irregularities present in the hypothesis that bias the model into performing competitively with the state of the art. While recast datasets provide large scale generation of NLI instances due to minimal human intervention, the papers that generate them do not provide fine-grained analysis of the potential statistical patterns that can bias NLI models. In this work, we analyze hypothesis-only models trained on one of the recast datasets provided in Poliak et al. [2] for word-level patterns. Our results indicate the existence of potential lexical biases that could contribute to inflating the models' performance.", "fno": "09450263", "keywords": [ "Learning Artificial Intelligence", "Natural Language Processing", "Natural Languages", "Pattern Classification", "Text Analysis", "Textual Entailment", "Natural Language Inference", "Lexical Irregularities", "Potential Lexical Biases", "Hypothesis Only", "Bias NLI Models", "Potential Statistical Patterns", "NLI Instances", "Recast Datasets", "Statistical Irregularities", "10 Dataset Comparison", "Poliak Et Al", "Natural Language Understanding Evaluation Benchmarks", "Semantic Representations", "Valuable Testing Ground", "Entailment Relation", "Analytical Models", "Computational Modeling", "Natural Languages", "Semantics", "Benchmark Testing", "Task Analysis", "Cognitive Systems", "Natural Language Inference", "Bias Detection", "Entailment" ], "authors": [ { "affiliation": "Purdue University,Computer and Information Technology,West Lafayette,IN,USA", "fullName": "Qingyuan Hu", "givenName": "Qingyuan", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University,Computer and Information Technology,West Lafayette,IN,USA", "fullName": "Yi Zhang", "givenName": "Yi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University,Computer and Information Technology,West Lafayette,IN,USA", "fullName": "Kanishka Misra", "givenName": "Kanishka", "surname": "Misra", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University,Computer and Information Technology,West Lafayette,IN,USA", "fullName": "Julia Taylor Rayz", "givenName": "Julia Taylor", "surname": "Rayz", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci*cc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "125-130", "year": "2020", "issn": null, "isbn": "978-1-7281-9594-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09450265", "articleId": "1uqFPuctRZe", "__typename": "AdjacentArticleType" }, "next": { "fno": "09450259", "articleId": "1uqFPXcGIZW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2017/3876/0/387601a072", "title": "SDF-NN: A Deep Neural Network with Semantic Dropping and Fusion for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a072/12OmNAZx8La", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2015/7303/0/07072846", "title": "Paraphrase generation based on lexical knowledge and features for a natural language question answering system", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2015/07072846/12OmNz5JBWT", "parentPublication": { "id": "proceedings/bigcomp/2015/7303/0", "title": "2015 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482023", "title": "Natural Language Interfaces to Domain Specific Knowledge Bases: An Illustration for Querying Elements of the Periodic Table", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482023/14dcEfU1kpa", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594899", "title": "Image-Enhanced Multi-level Sentence Representation Net for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594899/17D45Xh13q9", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622057", "title": "CAM: A Combined Attention Model for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622057/17D45Xtvpd4", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a220", "title": "Evaluating Natural Language Inference Models: A Metamorphic Testing Approach", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a220/1AUp3cpQCIg", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a360", "title": "Dynamic Knowledge Integration for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a360/1GNtn2h5lQI", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101534", "title": "A Natural Language Interface for Database: Achieving Transfer-learnability Using Adversarial Method for Question Understanding", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101534/1kaMKArBilq", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412102", "title": "Evaluation of BERT and ALBERT Sentence Embedding Performance on Downstream NLP Tasks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412102/1tmiFmXFpQs", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428375", "title": "Relative Position Representation over Interaction Space for Natural Language Inference", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428375/1uimbeSEquQ", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNviHKdU", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDiz", "doi": "10.1109/EISIC.2013.22", "title": "Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis", "normalizedTitle": "Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis", "abstract": "During forensic text analysis, the automation of the process is key when working with large quantities of documents. As documents often come in a wide variety of different file types, this creates the need for tailored tools to be developed to analyze each document type to correctly identify and extract text elements for analysis without loss. These text extraction tools often omit sections of text that are unreadable from documents leaving drastic inconsistencies during the forensic text analysis process. As a solution to this a single output format, HTML, was chosen as a unified analysis format. Document to HTML/CSS extraction tools each with varying techniques to convert common document formats to rich HTML/CSS counterparts were tested. This approach can reduce the amount of analysis tools needed during forensic text analysis by utilizing a single document format. Two tests were designed, a 10 point document overview test and a 48 point detailed document analysis test to assess and quantify the level of loss, rate of error and overall quality of outputted HTML structures. This study concluded that tools that utilize a number of different approaches and have an understanding of the document structure yield the best results with the least amount of loss.", "abstracts": [ { "abstractType": "Regular", "content": "During forensic text analysis, the automation of the process is key when working with large quantities of documents. As documents often come in a wide variety of different file types, this creates the need for tailored tools to be developed to analyze each document type to correctly identify and extract text elements for analysis without loss. These text extraction tools often omit sections of text that are unreadable from documents leaving drastic inconsistencies during the forensic text analysis process. As a solution to this a single output format, HTML, was chosen as a unified analysis format. Document to HTML/CSS extraction tools each with varying techniques to convert common document formats to rich HTML/CSS counterparts were tested. This approach can reduce the amount of analysis tools needed during forensic text analysis by utilizing a single document format. Two tests were designed, a 10 point document overview test and a 48 point detailed document analysis test to assess and quantify the level of loss, rate of error and overall quality of outputted HTML structures. This study concluded that tools that utilize a number of different approaches and have an understanding of the document structure yield the best results with the least amount of loss.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "During forensic text analysis, the automation of the process is key when working with large quantities of documents. As documents often come in a wide variety of different file types, this creates the need for tailored tools to be developed to analyze each document type to correctly identify and extract text elements for analysis without loss. These text extraction tools often omit sections of text that are unreadable from documents leaving drastic inconsistencies during the forensic text analysis process. As a solution to this a single output format, HTML, was chosen as a unified analysis format. Document to HTML/CSS extraction tools each with varying techniques to convert common document formats to rich HTML/CSS counterparts were tested. This approach can reduce the amount of analysis tools needed during forensic text analysis by utilizing a single document format. Two tests were designed, a 10 point document overview test and a 48 point detailed document analysis test to assess and quantify the level of loss, rate of error and overall quality of outputted HTML structures. This study concluded that tools that utilize a number of different approaches and have an understanding of the document structure yield the best results with the least amount of loss.", "fno": "06657132", "keywords": [ "Feature Extraction", "Hypermedia Markup Languages", "Law", "Text Analysis", "Text Detection", "Cross Domain Assessment", "Document To HTML Conversion Tools", "Structural Loss", "Text Loss", "Document Analysis", "Text Extraction Tools", "Forensic Text Analysis Process", "Unified Analysis Format", "Error Rate", "HTML Structures", "Document Structure", "HTML CSS Output", "HTML", "Layout", "Optical Character Recognition Software", "Text Analysis", "Portable Document Format", "Forensics" ], "authors": [ { "affiliation": null, "fullName": "Kyle Goslin", "givenName": "Kyle", "surname": "Goslin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Markus Hofmann", "givenName": "Markus", "surname": "Hofmann", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "100-105", "year": "2013", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06657131", "articleId": "12OmNvrMUh8", "__typename": "AdjacentArticleType" }, "next": { "fno": "06657133", "articleId": "12OmNAg7k0I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccee/2009/3925/1/3925a569", "title": "Exploring HTML Tags and Metadata to Improve the Expressiveness of Web Search Engine's Queries", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a569/12OmNC3FGkQ", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imf/2013/4955/0/4955a059", "title": "Developing a cloud computing based approach for forensic analysis using OCR", "doi": null, "abstractUrl": "/proceedings-article/imf/2013/4955a059/12OmNwcl7Az", "parentPublication": { "id": "proceedings/imf/2013/4955/0", "title": "2013 Seventh International Conference on IT Security Incident Management and IT Forensics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670f607", "title": "Text-Based Document Similarity Matching Using Sdtext", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670f607/12OmNx57HMU", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2008/3121/0/3121a545", "title": "Improving HTML Compression", "doi": null, "abstractUrl": "/proceedings-article/dcc/2008/3121a545/12OmNxA3YUO", "parentPublication": { "id": "proceedings/dcc/2008/3121/0", "title": "2008 Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwfhr/2004/2187/0/21870563", "title": "The WANDAML Markup Language for Digital Document Annotation", "doi": null, "abstractUrl": "/proceedings-article/iwfhr/2004/21870563/12OmNzBOhN6", "parentPublication": { "id": "proceedings/iwfhr/2004/2187/0", "title": "Proceedings. Ninth International Workshop on Frontiers in Handwriting Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2019/01/08674171", "title": "Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware", "doi": null, "abstractUrl": "/magazine/sp/2019/01/08674171/18GGsUTlata", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100a671", "title": "AutoTR: Efficient Reformatting Text Spread out in a DOM Tree for Text-Analytic Applications", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a671/1EpLg7iL22Q", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852829", "title": "D-Lib Magazine pioneered Web-based Scholarly Communication", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852829/1FT2n37co92", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a363", "title": "Delivering Document Conversion as a Cloud Service with High Throughput and Responsiveness", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a363/1G6jYuf0sbS", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMG", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwE9OBq", "doi": "", "title": "PDFFigures 2.0: Mining figures from research papers", "normalizedTitle": "PDFFigures 2.0: Mining figures from research papers", "abstract": "Figures and tables are key sources of information in many scholarly documents. However, current academic search engines do not make use of figures and tables when semantically parsing documents or presenting document summaries to users. To facilitate these applications we develop an algorithm that extracts figures, tables, and captions from documents called “PDFFigures 2.0.” Our proposed approach analyzes the structure of individual pages by detecting captions, graphical elements, and chunks of body text, and then locates figures and tables by reasoning about the empty regions within that text. To evaluate our work, we introduce a new dataset of computer science papers, along with ground truth labels for the locations of the figures, tables, and captions within them. Our algorithm achieves impressive results (94% precision at 90% recall) on this dataset surpassing previous state of the art. Further, we show how our framework was used to extract figures from a corpus of over one million papers, and how the resulting extractions were integrated into the user interface of a smart academic search engine, Semantic Scholar (www.semanticscholar.org). Finally, we present results of exploratory data analysis completed on the extracted figures as well as an extension of our method for the task of section title extraction. We release our dataset and code on our project webpage for enabling future research (http://pdffigures2.allenai.org).", "abstracts": [ { "abstractType": "Regular", "content": "Figures and tables are key sources of information in many scholarly documents. However, current academic search engines do not make use of figures and tables when semantically parsing documents or presenting document summaries to users. To facilitate these applications we develop an algorithm that extracts figures, tables, and captions from documents called “PDFFigures 2.0.” Our proposed approach analyzes the structure of individual pages by detecting captions, graphical elements, and chunks of body text, and then locates figures and tables by reasoning about the empty regions within that text. To evaluate our work, we introduce a new dataset of computer science papers, along with ground truth labels for the locations of the figures, tables, and captions within them. Our algorithm achieves impressive results (94% precision at 90% recall) on this dataset surpassing previous state of the art. Further, we show how our framework was used to extract figures from a corpus of over one million papers, and how the resulting extractions were integrated into the user interface of a smart academic search engine, Semantic Scholar (www.semanticscholar.org). Finally, we present results of exploratory data analysis completed on the extracted figures as well as an extension of our method for the task of section title extraction. We release our dataset and code on our project webpage for enabling future research (http://pdffigures2.allenai.org).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Figures and tables are key sources of information in many scholarly documents. However, current academic search engines do not make use of figures and tables when semantically parsing documents or presenting document summaries to users. To facilitate these applications we develop an algorithm that extracts figures, tables, and captions from documents called “PDFFigures 2.0.” Our proposed approach analyzes the structure of individual pages by detecting captions, graphical elements, and chunks of body text, and then locates figures and tables by reasoning about the empty regions within that text. To evaluate our work, we introduce a new dataset of computer science papers, along with ground truth labels for the locations of the figures, tables, and captions within them. Our algorithm achieves impressive results (94% precision at 90% recall) on this dataset surpassing previous state of the art. Further, we show how our framework was used to extract figures from a corpus of over one million papers, and how the resulting extractions were integrated into the user interface of a smart academic search engine, Semantic Scholar (www.semanticscholar.org). Finally, we present results of exploratory data analysis completed on the extracted figures as well as an extension of our method for the task of section title extraction. We release our dataset and code on our project webpage for enabling future research (http://pdffigures2.allenai.org).", "fno": "07559577", "keywords": [ "Computer Science", "Data Mining", "Search Engines", "Semantics", "Graphics", "Handheld Computers", "Portable Document Format", "Figure Usage Analysis", "Scalable Figure Extraction", "Academic Search Engine", "Section Title Extraction" ], "authors": [ { "affiliation": "Allen Institute for Artificial Intelligence, University of Washington", "fullName": "Christopher Clark", "givenName": "Christopher", "surname": "Clark", "__typename": "ArticleAuthorType" }, { "affiliation": "Allen Institute for Artificial Intelligence, University of Washington", "fullName": "Santosh Divvala", "givenName": "Santosh", "surname": "Divvala", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "143-152", "year": "2016", "issn": null, "isbn": "978-1-4503-4229-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07559576", "articleId": "12OmNBQkx6C", "__typename": "AdjacentArticleType" }, "next": { "fno": "07559578", "articleId": "12OmNwoxShK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628599", "title": "Figure Metadata Extraction from Digital Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628599/12OmNAKM00Y", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a553", "title": "A Deep Learning-Based Formula Detection Method for PDF Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a553/12OmNAo45R6", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1995/7029/0/00512412", "title": "Acrobat 2.0 [multimedia systems]", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1995/00512412/12OmNC0guyk", "parentPublication": { "id": "proceedings/cmpcon/1995/7029/0", "title": "Computer Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120505", "title": "An Automatic System for Extracting Figures and Captions in Biomedical PDF Documents", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120505/12OmNCgJe9W", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a789", "title": "Convolutional Neural Networks for Figure Extraction in Historical Technical Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a789/12OmNz6iOhI", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113388", "title": "PandaSearch: A fine-grained academic search engine for research documents", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113388/12OmNzICEKQ", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/5/505405a158", "title": "Table Understanding in Structured Documents", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505405a158/1eLygwQb0pa", "parentPublication": { "id": "icdarw/2019/5054/5", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compcon/1995/7029/0/00512412", "title": "Acrobat 2.0 [multimedia systems]", "doi": null, "abstractUrl": "/proceedings-article/compcon/1995/00512412/1h0JDsKkVxu", "parentPublication": { "id": "proceedings/compcon/1995/7029/0", "title": "Computer Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093592", "title": "Figure Captioning with Relation Maps for Reasoning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093592/1jPbhvKoICs", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwtn3Ed", "doi": "10.1109/IV.2016.82", "title": "Using Video Tutorials to Reduce Cognitive Load and Frustration for Early Learners of 3D Maya: A Comparative Case Study Discussion on Knowledge Visualisation Modes", "normalizedTitle": "Using Video Tutorials to Reduce Cognitive Load and Frustration for Early Learners of 3D Maya: A Comparative Case Study Discussion on Knowledge Visualisation Modes", "abstract": "This study investigates the reduction in frustration experienced by early learners of 3D Maya by reducing the cognitive load of the learning materials. It compares the relative efficacy of the traditional front-of-class demonstration with printable text and image, and narrated video format -- with the main focus on the latter. It found that participants preferred the video tutorial over other formats and reported higher satisfaction with the overall learning experience. This was due to the reduced cognitive load of the video tutorial when compared to the other formats.", "abstracts": [ { "abstractType": "Regular", "content": "This study investigates the reduction in frustration experienced by early learners of 3D Maya by reducing the cognitive load of the learning materials. It compares the relative efficacy of the traditional front-of-class demonstration with printable text and image, and narrated video format -- with the main focus on the latter. It found that participants preferred the video tutorial over other formats and reported higher satisfaction with the overall learning experience. This was due to the reduced cognitive load of the video tutorial when compared to the other formats.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study investigates the reduction in frustration experienced by early learners of 3D Maya by reducing the cognitive load of the learning materials. It compares the relative efficacy of the traditional front-of-class demonstration with printable text and image, and narrated video format -- with the main focus on the latter. It found that participants preferred the video tutorial over other formats and reported higher satisfaction with the overall learning experience. This was due to the reduced cognitive load of the video tutorial when compared to the other formats.", "fno": "8942a209", "keywords": [ "Visualization", "Tutorials", "Portable Document Format", "Streaming Media", "Software", "Three Dimensional Displays" ], "authors": [ { "affiliation": null, "fullName": "Theodor Wyeld", "givenName": "Theodor", "surname": "Wyeld", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "209-215", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a203", "articleId": "12OmNx7G68T", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a216", "articleId": "12OmNAS9zBl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2018/2335/0/233501z028", "title": "FG 2018 Tutorials", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501z028/12OmNA0MZ9v", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2016/5575/0/5575z018", "title": "Tutorials", "doi": null, "abstractUrl": "/proceedings-article/apsec/2016/5575z018/12OmNAT0mLs", "parentPublication": { "id": "proceedings/apsec/2016/5575/0", "title": "2016 23rd Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmia/2015/8111/0/8111z012", "title": "Tutorials", "doi": null, "abstractUrl": "/proceedings-article/dmia/2015/8111z012/12OmNBrV1Oy", "parentPublication": { "id": "proceedings/dmia/2015/8111/0", "title": "2015 International Workshop on Data Mining with Industrial Applications (DMIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a159", "title": "Automatically Recognizing Facial Indicators of Frustration: A Learning-centric Analysis", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a159/12OmNC8Mstu", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hoti/2016/2854/0/2854z018", "title": "Tutorials", "doi": null, "abstractUrl": "/proceedings-article/hoti/2016/2854z018/12OmNCdk2xR", "parentPublication": { "id": "proceedings/hoti/2016/2854/0", "title": "2016 IEEE 24th Annual Symposium on High-Performance Interconnects (HOTI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hoti/2013/5103/0/06627728", "title": "Tutorials", "doi": null, "abstractUrl": "/proceedings-article/hoti/2013/06627728/12OmNwogh91", "parentPublication": { "id": "proceedings/hoti/2013/5103/0", "title": "2013 IEEE 21st Annual Symposium on High-Performance Interconnects (HOTI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hoti/2014/5860/0/5860z025", "title": "Tutorials [4 abstracts]", "doi": null, "abstractUrl": "/proceedings-article/hoti/2014/5860z025/12OmNzBOi0u", "parentPublication": { "id": "proceedings/hoti/2014/5860/0", "title": "2014 IEEE 22nd Annual Symposium on High-Performance Interconnects (HOTI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2015/03/mpc2015030044", "title": "Creating Tutorials with Web-Based Authoring and Heads-Up Capture", "doi": null, "abstractUrl": "/magazine/pc/2015/03/mpc2015030044/13rRUEgarys", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/laclo/2021/2358/0/235800a350", "title": "Interactive ENEM: exams with statistics and free access", "doi": null, "abstractUrl": "/proceedings-article/laclo/2021/235800a350/1BzW0yIdnDq", "parentPublication": { "id": "proceedings/laclo/2021/2358/0", "title": "2021 XVI Latin American Conference on Learning Technologies (LACLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seet/2022/9592/0/959200a158", "title": "ITSS: Interactive Web-Based Authoring and Playback Integrated Environment for Programming Tutorials", "doi": null, "abstractUrl": "/proceedings-article/icse-seet/2022/959200a158/1EaOSuYTnAA", "parentPublication": { "id": "proceedings/icse-seet/2022/9592/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aO", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNx9FhSD", "doi": "10.1109/ICDAR.2013.292", "title": "ICDAR 2013 Table Competition", "normalizedTitle": "ICDAR 2013 Table Competition", "abstract": "Table understanding is a well studied problem in document analysis, and many academic and commercial approaches have been developed to recognize tables in several document formats, including plain text, scanned page images and born-digital, object-based formats such as PDF. Despite the abundance of these techniques, an objective comparison of their performance is still missing. The Table Competition held in the context of ICDAR 2013 is our first attempt at objectively evaluating these techniques against each other in a standardized way, across several input formats. The competition independently addresses three problems: (i) table location, (ii) table structure recognition, and (iii) these two tasks combined. We received results from seven academic systems, which we have also compared against four commercial products. This paper presents our findings.", "abstracts": [ { "abstractType": "Regular", "content": "Table understanding is a well studied problem in document analysis, and many academic and commercial approaches have been developed to recognize tables in several document formats, including plain text, scanned page images and born-digital, object-based formats such as PDF. Despite the abundance of these techniques, an objective comparison of their performance is still missing. The Table Competition held in the context of ICDAR 2013 is our first attempt at objectively evaluating these techniques against each other in a standardized way, across several input formats. The competition independently addresses three problems: (i) table location, (ii) table structure recognition, and (iii) these two tasks combined. We received results from seven academic systems, which we have also compared against four commercial products. This paper presents our findings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Table understanding is a well studied problem in document analysis, and many academic and commercial approaches have been developed to recognize tables in several document formats, including plain text, scanned page images and born-digital, object-based formats such as PDF. Despite the abundance of these techniques, an objective comparison of their performance is still missing. The Table Competition held in the context of ICDAR 2013 is our first attempt at objectively evaluating these techniques against each other in a standardized way, across several input formats. The competition independently addresses three problems: (i) table location, (ii) table structure recognition, and (iii) these two tasks combined. We received results from seven academic systems, which we have also compared against four commercial products. This paper presents our findings.", "fno": "06628853", "keywords": [ "Portable Document Format", "Educational Institutions", "Text Analysis", "Measurement", "HTML", "Training", "Electronic Mail", "Table Understanding", "PDF", "Born Digital PDF", "Document Analysis", "Document Understanding", "Table Recognition", "Table Location", "Table Structure Recognition" ], "authors": [ { "affiliation": null, "fullName": "Max Gobel", "givenName": "Max", "surname": "Gobel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tamir Hassan", "givenName": "Tamir", "surname": "Hassan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ermelinda Oro", "givenName": "Ermelinda", "surname": "Oro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Giorgio Orsi", "givenName": "Giorgio", "surname": "Orsi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "1449-1453", "year": "2013", "issn": "1520-5363", "isbn": "978-0-7695-4999-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06628852", "articleId": "12OmNBpmDRt", "__typename": "AdjacentArticleType" }, "next": { "fno": "06628854", "articleId": "12OmNC4eSzF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657132", "title": "Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657132/12OmNBqMDiz", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2016/1792/0/1792a287", "title": "A Table Detection Method for PDF Documents Based on Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a287/12OmNqG0T19", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628859", "title": "ICDAR 2013 Robust Reading Competition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628859/12OmNwHyZUc", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628856", "title": "ICDAR 2013 Chinese Handwriting Recognition Competition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628856/12OmNxEBzcq", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628851", "title": "ICDAR 2013 Competition on Book Structure Extraction", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628851/12OmNxw5Bi5", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a771", "title": "Table Detection Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a771/12OmNy87QsX", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628843", "title": "ICDAR 2013 Competition on Writer Identification", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628843/12OmNz4Bdq8", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a813", "title": "A YOLO-Based Table Detection Method", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a813/1h81t9os5Qk", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400b510", "title": "ICDAR 2019 Competition on Table Detection and Recognition (cTDaR)", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400b510/1h81wP5AoSY", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a114", "title": "Deep Splitting and Merging for Table Structure Decomposition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a114/1h81wvy6pJC", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxHrym4", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "1", "displayVolume": "1", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyuPL96", "doi": "10.1109/ICDAR.2017.192", "title": "DeepDeSRT: Deep Learning for Detection and Structure Recognition of Tables in Document Images", "normalizedTitle": "DeepDeSRT: Deep Learning for Detection and Structure Recognition of Tables in Document Images", "abstract": "This paper presents a novel end-to-end system for table understanding in document images called DeepDeSRT. In particular, the contribution of DeepDeSRT is two-fold. First, it presents a deep learning-based solution for table detection in document images. Secondly, it proposes a novel deep learning-based approach for table structure recognition, i.e. identifying rows, columns, and cell positions in the detected tables. In contrast to existing rule-based methods, which rely on heuristics or additional PDF metadata (like, for example, print instructions, character bounding boxes, or line segments), the presented system is data-driven and does not need any heuristics or metadata to detect as well as to recognize tabular structures in document images. Furthermore, in contrast to most existing table detection and structure recognition methods, which are applicable only to PDFs, DeepDeSRT processes document images, which makes it equally suitable for born-digital PDFs (as they can automatically be converted into images) as well as even harder problems, e.g. scanned documents. To gauge the performance of DeepDeSRT, the system is evaluated on the publicly available ICDAR 2013 table competition dataset containing 67 documents with 238 pages overall. Evaluation results reveal that DeepDeSRT outperforms state-of-the-art methods for table detection and structure recognition and achieves F1-measures of 96.77% and 91.44% for table detection and structure recognition, respectively. Additionally, DeepDeSRT is evaluated on a closed dataset from a real use case of a major European aviation company comprising documents which are highly unlike those in ICDAR 2013. Tested on a randomly selected sample from this dataset, DeepDeSRT achieves high detection accuracy for tables which demonstrates the sound generalization capabilities of our system.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a novel end-to-end system for table understanding in document images called DeepDeSRT. In particular, the contribution of DeepDeSRT is two-fold. First, it presents a deep learning-based solution for table detection in document images. Secondly, it proposes a novel deep learning-based approach for table structure recognition, i.e. identifying rows, columns, and cell positions in the detected tables. In contrast to existing rule-based methods, which rely on heuristics or additional PDF metadata (like, for example, print instructions, character bounding boxes, or line segments), the presented system is data-driven and does not need any heuristics or metadata to detect as well as to recognize tabular structures in document images. Furthermore, in contrast to most existing table detection and structure recognition methods, which are applicable only to PDFs, DeepDeSRT processes document images, which makes it equally suitable for born-digital PDFs (as they can automatically be converted into images) as well as even harder problems, e.g. scanned documents. To gauge the performance of DeepDeSRT, the system is evaluated on the publicly available ICDAR 2013 table competition dataset containing 67 documents with 238 pages overall. Evaluation results reveal that DeepDeSRT outperforms state-of-the-art methods for table detection and structure recognition and achieves F1-measures of 96.77% and 91.44% for table detection and structure recognition, respectively. Additionally, DeepDeSRT is evaluated on a closed dataset from a real use case of a major European aviation company comprising documents which are highly unlike those in ICDAR 2013. Tested on a randomly selected sample from this dataset, DeepDeSRT achieves high detection accuracy for tables which demonstrates the sound generalization capabilities of our system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a novel end-to-end system for table understanding in document images called DeepDeSRT. In particular, the contribution of DeepDeSRT is two-fold. First, it presents a deep learning-based solution for table detection in document images. Secondly, it proposes a novel deep learning-based approach for table structure recognition, i.e. identifying rows, columns, and cell positions in the detected tables. In contrast to existing rule-based methods, which rely on heuristics or additional PDF metadata (like, for example, print instructions, character bounding boxes, or line segments), the presented system is data-driven and does not need any heuristics or metadata to detect as well as to recognize tabular structures in document images. Furthermore, in contrast to most existing table detection and structure recognition methods, which are applicable only to PDFs, DeepDeSRT processes document images, which makes it equally suitable for born-digital PDFs (as they can automatically be converted into images) as well as even harder problems, e.g. scanned documents. To gauge the performance of DeepDeSRT, the system is evaluated on the publicly available ICDAR 2013 table competition dataset containing 67 documents with 238 pages overall. Evaluation results reveal that DeepDeSRT outperforms state-of-the-art methods for table detection and structure recognition and achieves F1-measures of 96.77% and 91.44% for table detection and structure recognition, respectively. Additionally, DeepDeSRT is evaluated on a closed dataset from a real use case of a major European aviation company comprising documents which are highly unlike those in ICDAR 2013. Tested on a randomly selected sample from this dataset, DeepDeSRT achieves high detection accuracy for tables which demonstrates the sound generalization capabilities of our system.", "fno": "3586b162", "keywords": [ "Document Image Processing", "Feature Extraction", "Image Classification", "Image Segmentation", "Learning Artificial Intelligence", "Deep De SRT", "Deep Learning", "Document Images", "End To End System", "Table Understanding", "Table Structure Recognition", "Structure Recognition Methods", "Scanned Documents", "Rule Based Methods", "Table Detection", "ICDAR 2013 Table Competition Dataset", "Portable Document Format", "Image Recognition", "Machine Learning", "Training", "Metadata", "Task Analysis", "Feature Extraction" ], "authors": [ { "affiliation": null, "fullName": "Sebastian Schreiber", "givenName": "Sebastian", "surname": "Schreiber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stefan Agne", "givenName": "Stefan", "surname": "Agne", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ivo Wolf", "givenName": "Ivo", "surname": "Wolf", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andreas Dengel", "givenName": "Andreas", "surname": "Dengel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sheraz Ahmed", "givenName": "Sheraz", "surname": "Ahmed", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "1162-1167", "year": "2017", "issn": "2379-2140", "isbn": "978-1-5386-3586-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3586b156", "articleId": "12OmNs0kytz", "__typename": "AdjacentArticleType" }, "next": { "fno": "3586b168", "articleId": "12OmNAY79fT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/das/2016/1792/0/1792a287", "title": "A Table Detection Method for PDF Documents Based on Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a287/12OmNqG0T19", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a771", "title": "Table Detection Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a771/12OmNy87QsX", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2014/01/msp2014010020", "title": "Leaking Sensitive Information in Complex Document Files--and How to Prevent It", "doi": null, "abstractUrl": "/magazine/sp/2014/01/msp2014010020/13rRUxASuEg", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546073", "title": "Page Object Detection from PDF Document Images by Deep Structured Prediction and Supervised Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546073/17D45WWzW3M", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029443", "title": "FEPDF: A Robust Feature Extractor for Malicious PDF Detection", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029443/17D45WrVg8C", "parentPublication": { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0", "title": "2017 IEEE Trustcom/BigDataSE/ICESS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a363", "title": "Delivering Document Conversion as a Cloud Service with High Throughput and Responsiveness", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a363/1G6jYuf0sbS", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a114", "title": "Deep Splitting and Merging for Table Structure Decomposition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a114/1h81wvy6pJC", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a051", "title": "Graphical Object Detection in Document Images", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a051/1h81zeprCda", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413069", "title": "An Integrated Approach of Deep Learning and Symbolic Analysis for Digital PDF Table Extraction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413069/1tmhBYdsiPK", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzl3WWY", "title": "2007 11th IEEE International Conference on Computer Vision", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNyugyME", "doi": "10.1109/ICCV.2007.4409154", "title": "[PDF Not Yet Available In IEEE Xplore]", "normalizedTitle": "[PDF Not Yet Available In IEEE Xplore]", "abstract": "The document that should appear here is not currently available.", "abstracts": [ { "abstractType": "Regular", "content": "The document that should appear here is not currently available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The document that should appear here is not currently available.", "fno": "04409154", "keywords": [ "Portable Document Format" ], "authors": [], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2007", "issn": "1550-5499", "isbn": "978-1-4244-1630-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04409138", "articleId": "12OmNBJNL0G", "__typename": "AdjacentArticleType" }, "next": { "fno": "04409139", "articleId": "12OmNwKoZbP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/passat-socialcom/2011/1931/0/06113216", "title": "Masquerading as a Trustworthy Entity through Portable Document File (PDF) Format", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113216/12OmNASraPT", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2016/0987/0/0987a197", "title": "A Study of Malicious PDF Detection Technique", "doi": null, "abstractUrl": "/proceedings-article/cisis/2016/0987a197/12OmNAtK4l7", "parentPublication": { "id": "proceedings/cisis/2016/0987/0", "title": "2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2014/3244/0/3244a360", "title": "Logical Labeling of Fixed Layout PDF Documents Using Multiple Contexts", "doi": null, "abstractUrl": "/proceedings-article/das/2014/3244a360/12OmNBuL14s", "parentPublication": { "id": "proceedings/das/2014/3244/0", "title": "2014 11th IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2014/2233/0/2233a100", "title": "Detecting Malicious Javascript in PDF through Document Instrumentation", "doi": null, "abstractUrl": "/proceedings-article/dsn/2014/2233a100/12OmNwEJ0Kk", "parentPublication": { "id": "proceedings/dsn/2014/2233/0", "title": "2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2011/0529/0/05981752", "title": "PDF Not Yet Available In IEEE Xplore", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2011/05981752/12OmNxUv6gs", "parentPublication": { "id": "proceedings/cvprw/2011/0529/0", "title": "CVPR 2011 WORKSHOPS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pst/2012/2323/0/20943000S03", "title": "PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents", "doi": null, "abstractUrl": "/proceedings-article/pst/2012/20943000S03/12OmNxVV5Xk", "parentPublication": { "id": "proceedings/pst/2012/2323/0", "title": "2012 Tenth Annual International Conference on Privacy, Security and Trust", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2017/3861/0/07991564", "title": "A Benchmark and Evaluation for Text Extraction from PDF", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2017/07991564/12OmNxwnccQ", "parentPublication": { "id": "proceedings/jcdl/2017/3861/0", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spi/2008/2317/0/04558397", "title": "[PDF Not Yet Available In IEEE Xplore]", "doi": null, "abstractUrl": "/proceedings-article/spi/2008/04558397/12OmNyeWdMx", "parentPublication": { "id": "proceedings/spi/2008/2317/0", "title": "IEEE Workshop on Signal Propagation on Interconnects (SPI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a106", "title": "CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a106/181W9oFwi3L", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2021/8934/0/893400b902", "title": "Breaking the Specification: PDF Certification", "doi": null, "abstractUrl": "/proceedings-article/sp/2021/893400b902/1t0x9ObxH8Y", "parentPublication": { "id": "proceedings/sp/2021/8934/0/", "title": "2021 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgopg5GyGc", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "acronym": "icdarw", "groupId": "1834224", "volume": "5", "displayVolume": "5", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1eLygwQb0pa", "doi": "10.1109/ICDARW.2019.40098", "title": "Table Understanding in Structured Documents", "normalizedTitle": "Table Understanding in Structured Documents", "abstract": "Table detection and extraction has been studied in the context of documents like reports, where tables are clearly outlined and stand out from the document structure visually. We study this topic in a rather more challenging domain of layout-heavy business documents, particularly invoices. Invoices present the novel challenges of tables being often without outlines - either in the form of borders or surrounding text flow - with ragged columns and widely varying data content. We will also show, that we can extract specific information from structurally different tables or table-like structures with one model. We present a comprehensive representation of a page using graph over word boxes, positional embeddings, trainable textual features and rephrase the table detection as a text box labeling problem. We will work on our newly presented dataset of pro forma invoices, invoices and debit note documents using this representation and propose multiple baselines to solve this labeling problem. We then propose a novel neural network model that achieves strong, practical results on the presented dataset and analyze the model performance and effects of graph convolutions and self-attention in detail.", "abstracts": [ { "abstractType": "Regular", "content": "Table detection and extraction has been studied in the context of documents like reports, where tables are clearly outlined and stand out from the document structure visually. We study this topic in a rather more challenging domain of layout-heavy business documents, particularly invoices. Invoices present the novel challenges of tables being often without outlines - either in the form of borders or surrounding text flow - with ragged columns and widely varying data content. We will also show, that we can extract specific information from structurally different tables or table-like structures with one model. We present a comprehensive representation of a page using graph over word boxes, positional embeddings, trainable textual features and rephrase the table detection as a text box labeling problem. We will work on our newly presented dataset of pro forma invoices, invoices and debit note documents using this representation and propose multiple baselines to solve this labeling problem. We then propose a novel neural network model that achieves strong, practical results on the presented dataset and analyze the model performance and effects of graph convolutions and self-attention in detail.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Table detection and extraction has been studied in the context of documents like reports, where tables are clearly outlined and stand out from the document structure visually. We study this topic in a rather more challenging domain of layout-heavy business documents, particularly invoices. Invoices present the novel challenges of tables being often without outlines - either in the form of borders or surrounding text flow - with ragged columns and widely varying data content. We will also show, that we can extract specific information from structurally different tables or table-like structures with one model. We present a comprehensive representation of a page using graph over word boxes, positional embeddings, trainable textual features and rephrase the table detection as a text box labeling problem. We will work on our newly presented dataset of pro forma invoices, invoices and debit note documents using this representation and propose multiple baselines to solve this labeling problem. We then propose a novel neural network model that achieves strong, practical results on the presented dataset and analyze the model performance and effects of graph convolutions and self-attention in detail.", "fno": "505405a158", "keywords": [ "Learning Artificial Intelligence", "Neural Nets", "Text Analysis", "Table Like Structures", "Table Detection", "Text Box Labeling Problem", "Table Understanding", "Structured Documents", "Document Structure", "Table Extraction", "Textual Features", "Neural Network Model", "Layout", "Feature Extraction", "Computer Architecture", "Task Analysis", "Microprocessors", "Measurement", "Portable Document Format", "Table Detection", "Neural Networks", "Invoices", "Graph Convolution", "Attention" ], "authors": [ { "affiliation": "Charles University, Department of Numerical Mathematics", "fullName": "Martin Holeček", "givenName": "Martin", "surname": "Holeček", "__typename": "ArticleAuthorType" }, { "affiliation": "rossum.ai", "fullName": "Antonín Hoskovec", "givenName": "Antonín", "surname": "Hoskovec", "__typename": "ArticleAuthorType" }, { "affiliation": "rossum.ai", "fullName": "Petr Baudiš", "givenName": "Petr", "surname": "Baudiš", "__typename": "ArticleAuthorType" }, { "affiliation": "rossum.ai", "fullName": "Pavel Klinger", "givenName": "Pavel", "surname": "Klinger", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdarw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "158-164", "year": "2019", "issn": null, "isbn": "978-1-7281-5054-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "505405a152", "articleId": "1eLygOdoJ20", "__typename": "AdjacentArticleType" }, "next": { "fno": "505405a165", "articleId": "1eLyhqM0qvm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/das/2016/1792/0/1792a287", "title": "A Table Detection Method for PDF Documents Based on Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a287/12OmNqG0T19", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a771", "title": "Table Detection Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a771/12OmNy87QsX", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a789", "title": "Convolutional Neural Networks for Figure Extraction in Historical Technical Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a789/12OmNz6iOhI", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a567", "title": "DeshengNet: An Information Extraction Model for Table in Digital Documents", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a567/1BLnza1djt6", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200a924", "title": "Parsing Table Structures in the Wild", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200a924/1BmIf2czv1u", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a813", "title": "A YOLO-Based Table Detection Method", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a813/1h81t9os5Qk", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a114", "title": "Deep Splitting and Merging for Table Structure Decomposition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a114/1h81wvy6pJC", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194497", "title": "An OpenCV-based Framework for Table Information Extraction", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194497/1n2nkAU06mk", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413069", "title": "An Integrated Approach of Deep Learning and Symbolic Analysis for Digital PDF Table Extraction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413069/1tmhBYdsiPK", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1h81oza1jwY", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1h81zeprCda", "doi": "10.1109/ICDAR.2019.00018", "title": "Graphical Object Detection in Document Images", "normalizedTitle": "Graphical Object Detection in Document Images", "abstract": "Graphical elements: particularly tables and figures contain a visual summary of the most valuable information contained in a document. Therefore, localization of such graphical objects in the document images is the initial step to understand the content of such graphical objects or document images. In this paper, we present a novel end-to-end trainable deep learning based framework to localize graphical objects in the document images called as Graphical Object Detection ( GOD ). Our framework is data-driven and does not require any heuristics or meta-data to locate graphical objects in the document images. The GOD explores the concept of transfer learning and domain adaptation to handle scarcity of labeled training images for graphical object detection task in the document images. Performance analysis carried out on the various public benchmark data sets: ICDAR -2013, ICDAR - POD2017 and UNLV shows that our model yields promising results as compared to state-of-the-art techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Graphical elements: particularly tables and figures contain a visual summary of the most valuable information contained in a document. Therefore, localization of such graphical objects in the document images is the initial step to understand the content of such graphical objects or document images. In this paper, we present a novel end-to-end trainable deep learning based framework to localize graphical objects in the document images called as Graphical Object Detection ( GOD ). Our framework is data-driven and does not require any heuristics or meta-data to locate graphical objects in the document images. The GOD explores the concept of transfer learning and domain adaptation to handle scarcity of labeled training images for graphical object detection task in the document images. Performance analysis carried out on the various public benchmark data sets: ICDAR -2013, ICDAR - POD2017 and UNLV shows that our model yields promising results as compared to state-of-the-art techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graphical elements: particularly tables and figures contain a visual summary of the most valuable information contained in a document. Therefore, localization of such graphical objects in the document images is the initial step to understand the content of such graphical objects or document images. In this paper, we present a novel end-to-end trainable deep learning based framework to localize graphical objects in the document images called as Graphical Object Detection ( GOD ). Our framework is data-driven and does not require any heuristics or meta-data to locate graphical objects in the document images. The GOD explores the concept of transfer learning and domain adaptation to handle scarcity of labeled training images for graphical object detection task in the document images. Performance analysis carried out on the various public benchmark data sets: ICDAR -2013, ICDAR - POD2017 and UNLV shows that our model yields promising results as compared to state-of-the-art techniques.", "fno": "301400a051", "keywords": [ "Document Image Processing", "Learning Artificial Intelligence", "Neural Nets", "Object Detection", "Document Images", "Graphical Object Detection", "End To End Trainable Deep Learning Based Framework", "Transfer Learning", "Domain Adaptation", "Labeled Training Images", "Object Detection", "Deep Learning", "Task Analysis", "Mathematical Model", "Layout", "Proposals", "Portable Document Format", "Graphical Object Localization Deep Neural Network Transfer Learning Data Driven" ], "authors": [ { "affiliation": "International Institute of Information Technology, Hyderabad, India", "fullName": "Ranajit Saha", "givenName": "Ranajit", "surname": "Saha", "__typename": "ArticleAuthorType" }, { "affiliation": "International Institute of Information Technology, Hyderabad, India", "fullName": "Ajoy Mondal", "givenName": "Ajoy", "surname": "Mondal", "__typename": "ArticleAuthorType" }, { "affiliation": "International Institute of Information Technology, Hyderabad, India", "fullName": "C V Jawahar", "givenName": "C V", "surname": "Jawahar", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "51-58", "year": "2019", "issn": null, "isbn": "978-1-7281-3014-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "301400a045", "articleId": "1h81AydBRu0", "__typename": "AdjacentArticleType" }, "next": { "fno": "301400a059", "articleId": "1h81ucLiN1u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657132", "title": "Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657132/12OmNBqMDiz", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2016/1792/0/1792a287", "title": "A Table Detection Method for PDF Documents Based on Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a287/12OmNqG0T19", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586b120", "title": "Rank-Reducing Two-Dimensional Grammars for Document Layout Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586b120/12OmNqGA5hF", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628853", "title": "ICDAR 2013 Table Competition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628853/12OmNx9FhSD", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a771", "title": "Table Detection Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a771/12OmNy87QsX", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586b162", "title": "DeepDeSRT: Deep Learning for Detection and Structure Recognition of Tables in Document Images", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586b162/12OmNyuPL96", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546073", "title": "Page Object Detection from PDF Document Images by Deep Structured Prediction and Supervised Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546073/17D45WWzW3M", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440810", "title": "Elastic Documents: Coupling Text and Tables through Contextual Visualizations for Enhanced Document Reading", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440810/17D45WwsQ5M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a813", "title": "A YOLO-Based Table Detection Method", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a813/1h81t9os5Qk", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800m2912", "title": "Cross-Domain Document Object Detection: Benchmark Suite and Method", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800m2912/1m3nrMjpFjq", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1n2nh6feFVe", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "acronym": "ickg", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1n2nkAU06mk", "doi": "10.1109/ICBK50248.2020.00093", "title": "An OpenCV-based Framework for Table Information Extraction", "normalizedTitle": "An OpenCV-based Framework for Table Information Extraction", "abstract": "Portable Document Format (PDF), as one of the most popular file format, is especially useful for educational documents such as text books, articles, or papers in which we can preserve the original graphic appearance and conveniently share online. Detecting and extracting information from tables in PDF files can provide a plethora of structural data to construct educational knowledge graphs. However, most of the existing methods rely on PDF parsing tools and natural language processing techniques, which generally require training samples and are frail in handling cross-page tables. In light of this, in this paper, we propose a novel OpenCV-based framework to extract the metadata and specific values from PDF tables. Specifically, we first highlight the visual outline of the tables. Then, we locate tables using horizontal and vertical lines and get the coordinates of tabular frames in each PDF page. Once the tables are successfully detected, for each table, we detect the cross-page scenarios and use the Optical Character Recognition (OCR) engine to extract the specific values in each table cell. Differing from other machine learning based methods, the proposed method can achieve table information extraction accurately without labeled data. We conduct extensive experiments on real-world PDF files. The results demonstrate that our approach can effectively deal with cross-page tables and only need 6.12 seconds on average to process a table.", "abstracts": [ { "abstractType": "Regular", "content": "Portable Document Format (PDF), as one of the most popular file format, is especially useful for educational documents such as text books, articles, or papers in which we can preserve the original graphic appearance and conveniently share online. Detecting and extracting information from tables in PDF files can provide a plethora of structural data to construct educational knowledge graphs. However, most of the existing methods rely on PDF parsing tools and natural language processing techniques, which generally require training samples and are frail in handling cross-page tables. In light of this, in this paper, we propose a novel OpenCV-based framework to extract the metadata and specific values from PDF tables. Specifically, we first highlight the visual outline of the tables. Then, we locate tables using horizontal and vertical lines and get the coordinates of tabular frames in each PDF page. Once the tables are successfully detected, for each table, we detect the cross-page scenarios and use the Optical Character Recognition (OCR) engine to extract the specific values in each table cell. Differing from other machine learning based methods, the proposed method can achieve table information extraction accurately without labeled data. We conduct extensive experiments on real-world PDF files. The results demonstrate that our approach can effectively deal with cross-page tables and only need 6.12 seconds on average to process a table.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Portable Document Format (PDF), as one of the most popular file format, is especially useful for educational documents such as text books, articles, or papers in which we can preserve the original graphic appearance and conveniently share online. Detecting and extracting information from tables in PDF files can provide a plethora of structural data to construct educational knowledge graphs. However, most of the existing methods rely on PDF parsing tools and natural language processing techniques, which generally require training samples and are frail in handling cross-page tables. In light of this, in this paper, we propose a novel OpenCV-based framework to extract the metadata and specific values from PDF tables. Specifically, we first highlight the visual outline of the tables. Then, we locate tables using horizontal and vertical lines and get the coordinates of tabular frames in each PDF page. Once the tables are successfully detected, for each table, we detect the cross-page scenarios and use the Optical Character Recognition (OCR) engine to extract the specific values in each table cell. Differing from other machine learning based methods, the proposed method can achieve table information extraction accurately without labeled data. We conduct extensive experiments on real-world PDF files. The results demonstrate that our approach can effectively deal with cross-page tables and only need 6.12 seconds on average to process a table.", "fno": "09194497", "keywords": [ "Data Mining", "Data Visualisation", "Document Image Processing", "Learning Artificial Intelligence", "Meta Data", "Natural Language Processing", "Optical Character Recognition", "PDF Page", "Table Cell", "Table Information Extraction", "Real World PDF Files", "Cross Page Tables", "Portable Document Format", "Educational Documents", "Educational Knowledge Graphs", "PDF Parsing Tools", "PDF Tables", "Open CV Based Framework", "Natural Language Processing Techniques", "Metadata Extraction", "Horizontal Vertical Lines", "Optical Character Recognition", "OCR", "Machine Learning Based Methods", "Portable Document Format", "Data Mining", "Image Color Analysis", "Information Retrieval", "Tools", "Metadata", "Optical Character Recognition Software", "Information Extraction", "PDF", "Open CV" ], "authors": [ { "affiliation": "Southeast University,College of Software Engineering,Nanjing,China", "fullName": "Jiayi Yuan", "givenName": "Jiayi", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Southeast University,College of Software Engineering,Nanjing,China", "fullName": "Hongye Li", "givenName": "Hongye", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "MOE Key Laboratory of Computer Network and Information Integration,China", "fullName": "Meng Wang", "givenName": "Meng", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Southeast University,Chien-Shiung Wu College,Nanjing,China", "fullName": "Ruyang Liu", "givenName": "Ruyang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "MOE Key Laboratory of Computer Network and Information Integration,China", "fullName": "Chuanyou Li", "givenName": "Chuanyou", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "MOE Key Laboratory of Computer Network and Information Integration,China", "fullName": "Beilun Wang", "givenName": "Beilun", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ickg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "621-628", "year": "2020", "issn": null, "isbn": "978-1-7281-8156-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09194512", "articleId": "1n2nkg52qMU", "__typename": "AdjacentArticleType" }, "next": { "fno": "09194546", "articleId": "1n2njR0F0vC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/das/2016/1792/0/1792a287", "title": "A Table Detection Method for PDF Documents Based on Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/das/2016/1792a287/12OmNqG0T19", "parentPublication": { "id": "proceedings/das/2016/1792/0", "title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628853", "title": "ICDAR 2013 Table Competition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628853/12OmNx9FhSD", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a771", "title": "Table Detection Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a771/12OmNy87QsX", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a567", "title": "DeshengNet: An Information Extraction Model for Table in Digital Documents", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a567/1BLnza1djt6", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200a924", "title": "Parsing Table Structures in the Wild", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200a924/1BmIf2czv1u", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/5/505405a158", "title": "Table Understanding in Structured Documents", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505405a158/1eLygwQb0pa", "parentPublication": { "id": "icdarw/2019/5054/5", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a381", "title": "Extraction of Math Expressions from PDF Documents Based on Unsupervised Modeling of Fonts", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a381/1h81slifDsk", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a813", "title": "A YOLO-Based Table Detection Method", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a813/1h81t9os5Qk", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a114", "title": "Deep Splitting and Merging for Table Structure Decomposition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a114/1h81wvy6pJC", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413069", "title": "An Integrated Approach of Deep Learning and Symbolic Analysis for Digital PDF Table Extraction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413069/1tmhBYdsiPK", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyen1y0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNroijlX", "doi": "10.1109/FIE.2016.7757692", "title": "Learning principles in program visualizations: A systematic literature review", "normalizedTitle": "Learning principles in program visualizations: A systematic literature review", "abstract": "Program visualizations help students understand the runtime behavior of other programs. They are educational tools to complement lectures or replace inefficient static drawings. A recent survey found 46 program visualizations developed from 1979 to 2012 reported that their effectiveness is unclear. They also evaluated learner engagement strategies implemented by visualization systems, but other learning principles were not considered. Learning principles are potential key factors in the success of program visualization as learning tools. In this paper, we identified 16 principles that may contribute to the effectiveness of a learning tool based on Vygotsky's learning theory. We hypothesize that some of these principles could be supported by incorporating visual concrete allegories and gamification. We conducted a literature review to know if these principles are supported by existing solutions. We found six new systems between 2012 and 2015. Very few systems consider a learning theory as theoretical framework. Only two out the 16 learning principles are supported by existing visualizations. All systems use unconnected visual metaphors, two use concrete visual metaphors, and one implemented a gamification principle. We expect that using concrete visual allegories and gamification in future program visualizations will significantly improve their effectiveness.", "abstracts": [ { "abstractType": "Regular", "content": "Program visualizations help students understand the runtime behavior of other programs. They are educational tools to complement lectures or replace inefficient static drawings. A recent survey found 46 program visualizations developed from 1979 to 2012 reported that their effectiveness is unclear. They also evaluated learner engagement strategies implemented by visualization systems, but other learning principles were not considered. Learning principles are potential key factors in the success of program visualization as learning tools. In this paper, we identified 16 principles that may contribute to the effectiveness of a learning tool based on Vygotsky's learning theory. We hypothesize that some of these principles could be supported by incorporating visual concrete allegories and gamification. We conducted a literature review to know if these principles are supported by existing solutions. We found six new systems between 2012 and 2015. Very few systems consider a learning theory as theoretical framework. Only two out the 16 learning principles are supported by existing visualizations. All systems use unconnected visual metaphors, two use concrete visual metaphors, and one implemented a gamification principle. We expect that using concrete visual allegories and gamification in future program visualizations will significantly improve their effectiveness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Program visualizations help students understand the runtime behavior of other programs. They are educational tools to complement lectures or replace inefficient static drawings. A recent survey found 46 program visualizations developed from 1979 to 2012 reported that their effectiveness is unclear. They also evaluated learner engagement strategies implemented by visualization systems, but other learning principles were not considered. Learning principles are potential key factors in the success of program visualization as learning tools. In this paper, we identified 16 principles that may contribute to the effectiveness of a learning tool based on Vygotsky's learning theory. We hypothesize that some of these principles could be supported by incorporating visual concrete allegories and gamification. We conducted a literature review to know if these principles are supported by existing solutions. We found six new systems between 2012 and 2015. Very few systems consider a learning theory as theoretical framework. Only two out the 16 learning principles are supported by existing visualizations. All systems use unconnected visual metaphors, two use concrete visual metaphors, and one implemented a gamification principle. We expect that using concrete visual allegories and gamification in future program visualizations will significantly improve their effectiveness.", "fno": "07757692", "keywords": [ "Visualization", "Software", "Programming", "Data Visualization", "Bibliographies", "Computers", "Computer Languages", "Gamification", "Systematic Literature Review", "Program Visualization", "Learning Theory", "Constructivism", "Visual Metaphor", "Visual Allegory" ], "authors": [ { "affiliation": "Centro de Investigaciones en Tecnologías de la Información y Comunicación (CITIC), Universidad de Costa Rica, San José, Costa Rica", "fullName": "Jeisson Hidalgo-Céspedes", "givenName": "Jeisson", "surname": "Hidalgo-Céspedes", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro de Investigaciones en Tecnologías de la Información y Comunicación (CITIC), Universidad de Costa Rica, San José, Costa Rica", "fullName": "Gabriela Marín-Raventós", "givenName": "Gabriela", "surname": "Marín-Raventós", "__typename": "ArticleAuthorType" }, { "affiliation": "Centro de Investigaciones en Tecnologías de la Información y Comunicación (CITIC), Universidad de Costa Rica, San José, Costa Rica", "fullName": "Vladimir Lara-Villagrán", "givenName": "Vladimir", "surname": "Lara-Villagrán", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-9", "year": "2016", "issn": null, "isbn": "978-1-5090-1790-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07757691", "articleId": "12OmNybfr1P", "__typename": "AdjacentArticleType" }, "next": { "fno": "07757693", "articleId": "12OmNymjN0z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/apsec/2017/3681/0/3681a041", "title": "Text-Mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/apsec/2017/3681a041/12OmNBlofPT", "parentPublication": { "id": "proceedings/apsec/2017/3681/0", "title": "2017 24th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2017/3581/0/3581b354", "title": "A Systematic Literature Review on Mobile Learning in Saudi Arabia", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2017/3581b354/12OmNwekjJ8", "parentPublication": { "id": "proceedings/aiccsa/2017/3581/0", "title": "2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2013/5091/0/5091a009", "title": "Kanban in software development: A systematic literature review", "doi": null, "abstractUrl": "/proceedings-article/seaa/2013/5091a009/12OmNyyeWuL", "parentPublication": { "id": "proceedings/seaa/2013/5091/0", "title": "2013 39th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/01/07542151", "title": "Perceiving Learning at a Glance: A Systematic Literature Review of Learning Dashboard Research", "doi": null, "abstractUrl": "/journal/lt/2017/01/07542151/13rRUwdIOWV", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2021/3784/0/378400a296", "title": "Concepts and Models of Environment of Self-Adaptive Systems: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/apsec/2021/378400a296/1B4mgwnVAUU", "parentPublication": { "id": "proceedings/apsec/2021/3784/0", "title": "2021 28th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/se4rai/2022/9319/0/931900a001", "title": "Operationalizing Machine Learning Models - A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/se4rai/2022/931900a001/1ED20Ql4AIo", "parentPublication": { "id": "proceedings/se4rai/2022/9319/0", "title": "2022 IEEE/ACM 1st International Workshop on Software Engineering for Responsible Artificial Intelligence (SE4RAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/2/260702a616", "title": "Mob Programming: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260702a616/1cYirmUWWXu", "parentPublication": { "id": "compsac/2019/2607/2", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2019/2847/0/284700a146", "title": "A Systematic Literature Review on Autonomous Agile Teams", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2019/284700a146/1dPoRquUs1O", "parentPublication": { "id": "proceedings/iccsa/2019/2847/0", "title": "2019 19th International Conference on Computational Science and Its Applications (ICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09156051", "title": "Gamification in online discussions: How do game elements affect critical thinking?", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09156051/1m1j7Gl7WsU", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2021/1409/0/140900a105", "title": "Gamification in Software Engineering: A literature Review", "doi": null, "abstractUrl": "/proceedings-article/chase/2021/140900a105/1tB7tbdtzpu", "parentPublication": { "id": "proceedings/chase/2021/1409/0/", "title": "2021 IEEE/ACM 13th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2YF", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNB9bvgh", "doi": "10.1109/ICALT.2013.126", "title": "Towards Portable Learning Analytics Dashboards", "normalizedTitle": "Towards Portable Learning Analytics Dashboards", "abstract": "This paper proposes a novel approach to build and deploy learning analytics dashboards in multiple learning environments. Existing learning dashboards are barely portable: once deployed on a learning platform, it requires considerable effort to deploy the dashboard elsewhere. We suggest constructing dashboards from lightweight web applications, namely widgets. Our approach allows to port dashboards with no additional cost between learning environments that implement open specifications (Open Social and Activity Streams) for data access and use widget APIs. We propose to facilitate reuse by sharing the dashboards and widgets via a centralized analytics repository.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a novel approach to build and deploy learning analytics dashboards in multiple learning environments. Existing learning dashboards are barely portable: once deployed on a learning platform, it requires considerable effort to deploy the dashboard elsewhere. We suggest constructing dashboards from lightweight web applications, namely widgets. Our approach allows to port dashboards with no additional cost between learning environments that implement open specifications (Open Social and Activity Streams) for data access and use widget APIs. We propose to facilitate reuse by sharing the dashboards and widgets via a centralized analytics repository.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a novel approach to build and deploy learning analytics dashboards in multiple learning environments. Existing learning dashboards are barely portable: once deployed on a learning platform, it requires considerable effort to deploy the dashboard elsewhere. We suggest constructing dashboards from lightweight web applications, namely widgets. Our approach allows to port dashboards with no additional cost between learning environments that implement open specifications (Open Social and Activity Streams) for data access and use widget APIs. We propose to facilitate reuse by sharing the dashboards and widgets via a centralized analytics repository.", "fno": "5009a412", "keywords": [ "Media", "Context", "Computer Aided Manufacturing", "Software", "Standards", "Blogs", "Google", "Open Social", "Learning Analytics", "Dashboards", "Portability", "Open Standards", "Widget", "Activity Streams" ], "authors": [ { "affiliation": null, "fullName": "Andrii Vozniuk", "givenName": "Andrii", "surname": "Vozniuk", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sten Govaerts", "givenName": "Sten", "surname": "Govaerts", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Denis Gillet", "givenName": "Denis", "surname": "Gillet", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "412-416", "year": "2013", "issn": null, "isbn": "978-0-7695-5009-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5009a410", "articleId": "12OmNylboDf", "__typename": "AdjacentArticleType" }, "next": { "fno": "5009a417", "articleId": "12OmNwNwzJS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a028", "title": "Open Service for Video Learning Analytics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a028/12OmNqGRGkg", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a260", "title": "Towards Textual Reporting in Learning Analytics Dashboards", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a260/12OmNwDACc5", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a041", "title": "Enhancing the Professional Vision of Teachers: A Physiological Study of Teaching Analytics Dashboards of Students' Repertory Grid Exercises in Business Education", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a041/12OmNxcdG0Y", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2013/4796/0/06781845", "title": "KnowYourColors: Visual dashboards for blood metrics and healthcare analytics", "doi": null, "abstractUrl": "/proceedings-article/isspit/2013/06781845/12OmNzlly1J", "parentPublication": { "id": "proceedings/isspit/2013/4796/0", "title": "2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2009/01/mso2009010041", "title": "Analytics-Driven Dashboards Enable Leading Indicators for Requirements and Designs of Large-Scale Systems", "doi": null, "abstractUrl": "/magazine/so/2009/01/mso2009010041/13rRUILtJjK", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2013/04/mso2013040046", "title": "Developer Dashboards: The Need for Qualitative Analytics", "doi": null, "abstractUrl": "/magazine/so/2013/04/mso2013040046/13rRUxAAT5z", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493435", "title": "Multi-Level Game Learning Analytics for Serious Games", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493435/14tNJosRlQZ", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/laclo/2021/2358/0/235800a060", "title": "Systematic Mapping of Moodle Dashboards Focused on Learning Analytics Tasks", "doi": null, "abstractUrl": "/proceedings-article/laclo/2021/235800a060/1BzWag1IQx2", "parentPublication": { "id": "proceedings/laclo/2021/2358/0", "title": "2021 XVI Latin American Conference on Learning Technologies (LACLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552449", "title": "MultiVision: Designing Analytical Dashboards with Deep Learning Based Recommendation", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552449/1xic65iQBoY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637388", "title": "Descriptive Analytics Dashboard for an Inclusive Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637388/1zuw1NkrZ28", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxTEiSt", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNCga1Ul", "doi": "10.1109/PACIFICVIS.2016.7465268", "title": "Visualization of origin-destination matrices using a connection barchart and coordinated maps", "normalizedTitle": "Visualization of origin-destination matrices using a connection barchart and coordinated maps", "abstract": "The origin-destination matrix is an useful tool for traffic and transport analysis. This kind of matrices are increasing in volume and complexity due to the availability of new technologies to gather new information. In this project we present a novel way of representing origin-destination matrices using a connection barchart and two coordinated maps. The main goal is to use the connection Barchart as the center of the interactive visualization providing an overview of the dataset. Through interaction, the information about specific origin-destination nodes in the origin-destination matrix is shown in both the connection barchart and the coordinated maps, giving the user information about origin, destination, direction, and volume of flow. Additionally, an evaluation with users was conducted to test the usefulness and usability of the interactive visualization using real data for the RBT system in Bogota, Colombia.", "abstracts": [ { "abstractType": "Regular", "content": "The origin-destination matrix is an useful tool for traffic and transport analysis. This kind of matrices are increasing in volume and complexity due to the availability of new technologies to gather new information. In this project we present a novel way of representing origin-destination matrices using a connection barchart and two coordinated maps. The main goal is to use the connection Barchart as the center of the interactive visualization providing an overview of the dataset. Through interaction, the information about specific origin-destination nodes in the origin-destination matrix is shown in both the connection barchart and the coordinated maps, giving the user information about origin, destination, direction, and volume of flow. Additionally, an evaluation with users was conducted to test the usefulness and usability of the interactive visualization using real data for the RBT system in Bogota, Colombia.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The origin-destination matrix is an useful tool for traffic and transport analysis. This kind of matrices are increasing in volume and complexity due to the availability of new technologies to gather new information. In this project we present a novel way of representing origin-destination matrices using a connection barchart and two coordinated maps. The main goal is to use the connection Barchart as the center of the interactive visualization providing an overview of the dataset. Through interaction, the information about specific origin-destination nodes in the origin-destination matrix is shown in both the connection barchart and the coordinated maps, giving the user information about origin, destination, direction, and volume of flow. Additionally, an evaluation with users was conducted to test the usefulness and usability of the interactive visualization using real data for the RBT system in Bogota, Colombia.", "fno": "07465268", "keywords": [ "I 3 8 COMPUTER GRAPHICS Applications Traffic And Transport Analysis" ], "authors": [ { "affiliation": "IMAGINE Research group, Universidad de los Andes", "fullName": "Juan C. Ibarra", "givenName": "Juan C.", "surname": "Ibarra", "__typename": "ArticleAuthorType" }, { "affiliation": "IMAGINE Research group, Universidad de los Andes", "fullName": "John A. Triana", "givenName": "John A.", "surname": "Triana", "__typename": "ArticleAuthorType" }, { "affiliation": "IMAGINE Research group, Universidad de los Andes", "fullName": "José T. Hernández", "givenName": "José T.", "surname": "Hernández", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-04-01T00:00:00", "pubType": "proceedings", "pages": "189-193", "year": "2016", "issn": "2165-8773", "isbn": "978-1-5090-1451-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07465267", "articleId": "12OmNCbCrKh", "__typename": "AdjacentArticleType" }, "next": { "fno": "07465269", "articleId": "12OmNqBtj32", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icniconsmcl/2006/2552/0/25520041", "title": "Characteristics of Origin-Destination Pair Traffic in Funet", "doi": null, "abstractUrl": "/proceedings-article/icniconsmcl/2006/25520041/12OmNAQanvZ", "parentPublication": { "id": "proceedings/icniconsmcl/2006/2552/0", "title": "Mobile Communications and Learning Technologies, Conference on Networking, Conference on Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/04061339", "title": "Origin-Destination Network Tomography with Bayesian Inversion Approach", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/04061339/12OmNBOllof", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985b146", "title": "Estimation of Passenger Origin-Destination Matrices and Efficiency Evaluation of Public Transportation", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985b146/12OmNrIJqA0", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460905", "title": "Statistical Origin-destination generation with multiple sources", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460905/12OmNwGZNMk", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/274700038", "title": "Origin-Destination Network Tomography with Bayesian Inversion Approach", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/274700038/12OmNyKa5YI", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cpsna/2013/0798/0/06614243", "title": "Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems", "doi": null, "abstractUrl": "/proceedings-article/cpsna/2013/06614243/12OmNya72uy", "parentPublication": { "id": "proceedings/cpsna/2013/0798/0", "title": "2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875983", "title": "Origin-Destination Flow Data Smoothing and Mapping", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875983/13rRUxYrbUK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09785888", "title": "Online Metro Origin-Destination Prediction via Heterogeneous Information Aggregation", "doi": null, "abstractUrl": "/journal/tp/2023/03/09785888/1DPaAhAefgQ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d481", "title": "ODNET: A Novel Personalized Origin-Destination Ranking Network for Flight Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d481/1FwFzP6X9Ty", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a760", "title": "Taxi Origin-Destination Demand Prediction with Contextualized Spatial-Temporal Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a760/1cdOTb4hTJC", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dPofs0eSGI", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-smartcity-dss", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dPoshaDN84", "doi": "10.1109/HPCC/SmartCity/DSS.2019.00248", "title": "A Flow Table with Two-Stage Timeout Mechanism for SDN Switches", "normalizedTitle": "A Flow Table with Two-Stage Timeout Mechanism for SDN Switches", "abstract": "In Software-Defined Network (SDN), OpenFlow implements fine-grained network policy by installing rules in the switch flow table. Limited by memory capacity, inactive flows have to be evicted from the flow table to make room for newer flows. Currently, OpenFlow uses the fixed timeout mechanism to manage the flow table. This may result in poor utilization of the flow table. In this paper, driven by an in-depth analysis on network traffic characteristics, we propose a novel flow table architecture with two-stage timeout mechanism to better identify and keep useful flow entries. First, each flow rule is installed into the primary table with a timeout calculated by the SDN controller. Each flow rule in the primary table is expected to be hit by a packet within its timeout, and then renew its timeout to receive more packets. Upon violation of this expectation, a timeout will expire, and the flow will be shelved onto the Inactive Flow Queue (IFQ). The IFQ provides a second chance for a flow to be promoted back to the primary table if a packet of this flow arrives before its eviction from the IFQ. With this design, this two-stage flow table keeps retiring the most useless flows. In particular, it enables shortlived flows to be evicted as soon as possible to avoid waste of flow table resources, and enables active flows to be better retained with the help of the IFQ. Experimental results using real network packet traces show 60% higher hit ratio than current OpenFlow with the same overall table size.", "abstracts": [ { "abstractType": "Regular", "content": "In Software-Defined Network (SDN), OpenFlow implements fine-grained network policy by installing rules in the switch flow table. Limited by memory capacity, inactive flows have to be evicted from the flow table to make room for newer flows. Currently, OpenFlow uses the fixed timeout mechanism to manage the flow table. This may result in poor utilization of the flow table. In this paper, driven by an in-depth analysis on network traffic characteristics, we propose a novel flow table architecture with two-stage timeout mechanism to better identify and keep useful flow entries. First, each flow rule is installed into the primary table with a timeout calculated by the SDN controller. Each flow rule in the primary table is expected to be hit by a packet within its timeout, and then renew its timeout to receive more packets. Upon violation of this expectation, a timeout will expire, and the flow will be shelved onto the Inactive Flow Queue (IFQ). The IFQ provides a second chance for a flow to be promoted back to the primary table if a packet of this flow arrives before its eviction from the IFQ. With this design, this two-stage flow table keeps retiring the most useless flows. In particular, it enables shortlived flows to be evicted as soon as possible to avoid waste of flow table resources, and enables active flows to be better retained with the help of the IFQ. Experimental results using real network packet traces show 60% higher hit ratio than current OpenFlow with the same overall table size.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In Software-Defined Network (SDN), OpenFlow implements fine-grained network policy by installing rules in the switch flow table. Limited by memory capacity, inactive flows have to be evicted from the flow table to make room for newer flows. Currently, OpenFlow uses the fixed timeout mechanism to manage the flow table. This may result in poor utilization of the flow table. In this paper, driven by an in-depth analysis on network traffic characteristics, we propose a novel flow table architecture with two-stage timeout mechanism to better identify and keep useful flow entries. First, each flow rule is installed into the primary table with a timeout calculated by the SDN controller. Each flow rule in the primary table is expected to be hit by a packet within its timeout, and then renew its timeout to receive more packets. Upon violation of this expectation, a timeout will expire, and the flow will be shelved onto the Inactive Flow Queue (IFQ). The IFQ provides a second chance for a flow to be promoted back to the primary table if a packet of this flow arrives before its eviction from the IFQ. With this design, this two-stage flow table keeps retiring the most useless flows. In particular, it enables shortlived flows to be evicted as soon as possible to avoid waste of flow table resources, and enables active flows to be better retained with the help of the IFQ. Experimental results using real network packet traces show 60% higher hit ratio than current OpenFlow with the same overall table size.", "fno": "205800b804", "keywords": [ "Queueing Theory", "Software Defined Networking", "Telecommunication Control", "Telecommunication Switching", "Telecommunication Traffic", "Primary Table", "Inactive Flow Queue", "Two Stage Flow Table", "Flow Table Resources", "Two Stage Timeout Mechanism", "Switch Flow Table", "Inactive Flows", "Fixed Timeout Mechanism", "Flow Table Architecture", "IFQ", "Software Defined Network", "Open Flow", "SDN Controller", "Network Traffic Characteristics", "SDN Switches", "History", "Mice", "Control Systems", "Feedback Control", "Aerospace Electronics", "Information Theory", "Network Architecture", "Software Defined Network", "Flow Table", "Timeout", "TCAM" ], "authors": [ { "affiliation": "Peking University", "fullName": "Xianfeng Li", "givenName": "Xianfeng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University", "fullName": "Yan Huang", "givenName": "Yan", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-smartcity-dss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-08-01T00:00:00", "pubType": "proceedings", "pages": "1804-1809", "year": "2019", "issn": null, "isbn": "978-1-7281-2058-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "205800b798", "articleId": "1dPokS6rhAY", "__typename": "AdjacentArticleType" }, "next": { "fno": "205800b810", "articleId": "1dPoupNhV4Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ewsdn/2015/0180/0/0180a117", "title": "Table Visor: An Emulation Layer for Multi-table Open Flow Switches", "doi": null, "abstractUrl": "/proceedings-article/ewsdn/2015/0180a117/12OmNqHqSwL", "parentPublication": { "id": "proceedings/ewsdn/2015/0180/0", "title": "2015 European Workshop on Software Defined Networks (EWSDN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ancs/2012/1685/0/07846347", "title": "Attendre: Mitigating ill effects of race conditions in OpenFlow via queueing mechanism", "doi": null, "abstractUrl": "/proceedings-article/ancs/2012/07846347/12OmNx1qV0B", "parentPublication": { "id": "proceedings/ancs/2012/1685/0", "title": "2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2010/4277/0/4277a044", "title": "An Adaptive Timeout Strategy for Profiling UDP Flows", "doi": null, "abstractUrl": "/proceedings-article/icnc/2010/4277a044/12OmNzE54Kx", "parentPublication": { "id": "proceedings/icnc/2010/4277/0", "title": "2010 First International Conference on Networking and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2018/04/08385221", "title": "Delayed Installation and Expedited Eviction: An Alternative Approach to Reduce Flow Table Occupancy in SDN Switches", "doi": null, "abstractUrl": "/journal/nt/2018/04/08385221/13rRUxBa58N", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a821", "title": "Mitigating SDN Flow Table Overflow", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a821/144U9bjq0A8", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0/649700a644", "title": "Per-Flow Size Measurement by Combining Sketch and Flow Table in Software-Defined Networks", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2022/649700a644/1LKwlZ9pMsg", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0", "title": "2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800b779", "title": "An Adaptive Flow Table Adjustment Algorithm for SDN", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800b779/1dPoiGvhT68", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/monetec/2020/8268/0/09258208", "title": "Representation of the OpenFlow Switch Flow Table", "doi": null, "abstractUrl": "/proceedings-article/monetec/2020/09258208/1oRj1tsYao8", "parentPublication": { "id": "proceedings/monetec/2020/8268/0", "title": "2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2021/9101/0/09333889", "title": "Protection against Flow Table Overflow Attack in Software Defined Networks", "doi": null, "abstractUrl": "/proceedings-article/icoin/2021/09333889/1qTrUCRYX7O", "parentPublication": { "id": "proceedings/icoin/2021/9101/0", "title": "2021 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900a917", "title": "AFTM: An Adaptive Flow Table Management Scheme for OpenFlow Switches", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900a917/1t7n0GXKykw", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }