data
dict
{ "proceeding": { "id": "12OmNvEyR7P", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "4", "displayVolume": "4", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUnEGA", "doi": "10.1109/ICPR.2006.442", "title": "Detection of presynaptic terminals on dendritic spines in double labeling confocal images", "normalizedTitle": "Detection of presynaptic terminals on dendritic spines in double labeling confocal images", "abstract": "For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a confocal laser scanning microscope. The images are unsharp because of the (direction dependent) resolution limit. A deconvolution on image data is not sufficient for the resolution needed. Therefore a parametric model is used to reconstruct the dendrite and the spines. The parameter estimation of model is done in a two step approach. First, rough center axes of dendrite and spines are found by a growing model which can be adjusted interactively. In a second step the model parameters are optimized during an iterative process. To estimate the deviation between the microscope image and the model, the model is sampled with the same resolution as the microscope image and convolved by the microscope point spread function (psf). The result is a accurate model of dendrite and spines. The model fitting process is comparable with a deconvolution but with a limited number of model parameters and stable results without strong distortions by PSF. The associated presynaptic terminal can be detected in a second image channel inside a region of interest (roi) on spine position. Morphological features of spines from geometrical model and from second channel roi are combined for statistical analysis.", "abstracts": [ { "abstractType": "Regular", "content": "For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a confocal laser scanning microscope. The images are unsharp because of the (direction dependent) resolution limit. A deconvolution on image data is not sufficient for the resolution needed. Therefore a parametric model is used to reconstruct the dendrite and the spines. The parameter estimation of model is done in a two step approach. First, rough center axes of dendrite and spines are found by a growing model which can be adjusted interactively. In a second step the model parameters are optimized during an iterative process. To estimate the deviation between the microscope image and the model, the model is sampled with the same resolution as the microscope image and convolved by the microscope point spread function (psf). The result is a accurate model of dendrite and spines. The model fitting process is comparable with a deconvolution but with a limited number of model parameters and stable results without strong distortions by PSF. The associated presynaptic terminal can be detected in a second image channel inside a region of interest (roi) on spine position. Morphological features of spines from geometrical model and from second channel roi are combined for statistical analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a confocal laser scanning microscope. The images are unsharp because of the (direction dependent) resolution limit. A deconvolution on image data is not sufficient for the resolution needed. Therefore a parametric model is used to reconstruct the dendrite and the spines. The parameter estimation of model is done in a two step approach. First, rough center axes of dendrite and spines are found by a growing model which can be adjusted interactively. In a second step the model parameters are optimized during an iterative process. To estimate the deviation between the microscope image and the model, the model is sampled with the same resolution as the microscope image and convolved by the microscope point spread function (psf). The result is a accurate model of dendrite and spines. The model fitting process is comparable with a deconvolution but with a limited number of model parameters and stable results without strong distortions by PSF. The associated presynaptic terminal can be detected in a second image channel inside a region of interest (roi) on spine position. Morphological features of spines from geometrical model and from second channel roi are combined for statistical analysis.", "fno": "252140715", "keywords": [], "authors": [ { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Andreas Herzog", "givenName": "Andreas", "surname": "Herzog", "__typename": "ArticleAuthorType" }, { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Robert Niese", "givenName": "Robert", "surname": "Niese", "__typename": "ArticleAuthorType" }, { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Gerald Krell", "givenName": "Gerald", "surname": "Krell", "__typename": "ArticleAuthorType" }, { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Bernd Michaelis", "givenName": "Bernd", "surname": "Michaelis", "__typename": "ArticleAuthorType" }, { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Wladimir Ovtscharoff", "givenName": "Wladimir", "surname": "Ovtscharoff", "__typename": "ArticleAuthorType" }, { "affiliation": "Otto-von-Guericke-University Magdeburg", "fullName": "Katharina Braun", "givenName": "Katharina", "surname": "Braun", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-08-01T00:00:00", "pubType": "proceedings", "pages": "715-718", "year": "2006", "issn": "1051-4651", "isbn": "0-7695-2521-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "252140711", "articleId": "12OmNBUS75t", "__typename": "AdjacentArticleType" }, "next": { "fno": "252140719", "articleId": "12OmNx3Zjgf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2007/2875/2/28750363", "title": "The Depth-Variant Image Restoration Based on Hopfield Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icnc/2007/28750363/12OmNwM6A47", "parentPublication": { "id": "proceedings/icnc/2007/2875/2", "title": "Third International Conference on Natural Computation (ICNC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1999/0234/0/02340248", "title": "Ultrasound Image Deconvolution Using Adaptive Inverse Filtering", "doi": null, "abstractUrl": "/proceedings-article/cbms/1999/02340248/12OmNy2rS40", "parentPublication": { "id": "proceedings/cbms/1999/0234/0", "title": "Proceedings 12th IEEE Symposium on Computer-Based Medical Systems (Cat. No.99CB36365)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medivis/2006/2603/0/26030034", "title": "Geometrical Modeling and Visualization of Pre- and Post-Synaptic Structures in Double-Labeled Confocal Images", "doi": null, "abstractUrl": "/proceedings-article/medivis/2006/26030034/12OmNyRPgGU", "parentPublication": { "id": "proceedings/medivis/2006/2603/0", "title": "International Conference on Medical Information Visualisation - BioMedical Visualisation (MedVis'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2014/04/06891304", "title": "Haptically Assisted Connection Procedure for the Reconstruction of Dendritic Spines", "doi": null, "abstractUrl": "/journal/th/2014/04/06891304/13rRUygT7yk", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2021/3933/0/393300a048", "title": "Evolutionary Dendritic Neuron Model Learned by A State-of-the-art Evolutionary Learning Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccia/2021/393300a048/1zpzLe72Zpu", "parentPublication": { "id": "proceedings/iccia/2021/3933/0", "title": "2021 6th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCy2L3P", "title": "Proceedings 13th IEEE Symposium on Computer-Based Medical Systems. CBMS 2000", "acronym": "cbms", "groupId": "1000153", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNzRHOU2", "doi": "10.1109/CBMS.2000.856908", "title": "Use of Shape Models to Search Digitized Spine X-rays", "normalizedTitle": "Use of Shape Models to Search Digitized Spine X-rays", "abstract": "We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medical Information Retrieval System, or WebMIRS, is currently in beta test. In a future WebMIRS system, we plan to have not only text and raw image data, but quantitative anatomical feature information derived from the images and capability to retrieve images based on image characteristics, either alone or in conjunction with text descriptions associated with the images. Our archive consists of data collected in the second and third National Health and Nutrition Examination Surveys (NHANES), conducted by the National Center for Health Statistics. For the NHANES II survey, the records contain information for approximately 20,000 participants. Each record contains about two thousand data points, including demographic information, answers to health questionnaires, anthropometric information, and the results of a physician's examination. In addition, approximately 10,000 cervical spines and 7,000 lumbar spine x-rays were collected. WebMIRS makes the text and images retrievable. Only raw images are returned; no quantitative or descriptive information about the images is stored in the database. We are conducting research into the problem of automatically or semi-automatically segmenting spine vertebrae in these images and determining vertebral boundaries with enough accuracy to be useful in classifying the vertebrae into categories of interest to researchers in osteoarthritis.", "abstracts": [ { "abstractType": "Regular", "content": "We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medical Information Retrieval System, or WebMIRS, is currently in beta test. In a future WebMIRS system, we plan to have not only text and raw image data, but quantitative anatomical feature information derived from the images and capability to retrieve images based on image characteristics, either alone or in conjunction with text descriptions associated with the images. Our archive consists of data collected in the second and third National Health and Nutrition Examination Surveys (NHANES), conducted by the National Center for Health Statistics. For the NHANES II survey, the records contain information for approximately 20,000 participants. Each record contains about two thousand data points, including demographic information, answers to health questionnaires, anthropometric information, and the results of a physician's examination. In addition, approximately 10,000 cervical spines and 7,000 lumbar spine x-rays were collected. WebMIRS makes the text and images retrievable. Only raw images are returned; no quantitative or descriptive information about the images is stored in the database. We are conducting research into the problem of automatically or semi-automatically segmenting spine vertebrae in these images and determining vertebral boundaries with enough accuracy to be useful in classifying the vertebrae into categories of interest to researchers in osteoarthritis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medical Information Retrieval System, or WebMIRS, is currently in beta test. In a future WebMIRS system, we plan to have not only text and raw image data, but quantitative anatomical feature information derived from the images and capability to retrieve images based on image characteristics, either alone or in conjunction with text descriptions associated with the images. Our archive consists of data collected in the second and third National Health and Nutrition Examination Surveys (NHANES), conducted by the National Center for Health Statistics. For the NHANES II survey, the records contain information for approximately 20,000 participants. Each record contains about two thousand data points, including demographic information, answers to health questionnaires, anthropometric information, and the results of a physician's examination. In addition, approximately 10,000 cervical spines and 7,000 lumbar spine x-rays were collected. WebMIRS makes the text and images retrievable. Only raw images are returned; no quantitative or descriptive information about the images is stored in the database. We are conducting research into the problem of automatically or semi-automatically segmenting spine vertebrae in these images and determining vertebral boundaries with enough accuracy to be useful in classifying the vertebrae into categories of interest to researchers in osteoarthritis.", "fno": "04840255", "keywords": [ "Active Shape Model", "Digital X Ray", "Feature Extraction", "NLM", "NCHS" ], "authors": [ { "affiliation": "National Library of Medicine", "fullName": "L. Rodney Long", "givenName": "L. Rodney", "surname": "Long", "__typename": "ArticleAuthorType" }, { "affiliation": "National Library of Medicine", "fullName": "George R. Thoma", "givenName": "George R.", "surname": "Thoma", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbms", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-06-01T00:00:00", "pubType": "proceedings", "pages": "255", "year": "2000", "issn": "1063-7125", "isbn": "0-7695-0484-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04840247", "articleId": "12OmNyKa6ac", "__typename": "AdjacentArticleType" }, "next": { "fno": "04840261", "articleId": "12OmNx9WT0I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwErpHy", "title": "Proceedings Computer Animation 2001. Fourteenth Conference on Computer Animation", "acronym": "ca", "groupId": "1000121", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmtWw6", "doi": "10.1109/CA.2001.982391", "title": "Human spine posture estimation from video images based on connected vertebra spheres model", "normalizedTitle": "Human spine posture estimation from video images based on connected vertebra spheres model", "abstract": "This paper reports a method for estimating human spine posture using the front and side views of a human body taken by a video camera. We present here a new 3D model to estimate the spine posture using connected vertebra spheres. In this model, each vertebra forming the spine is approximated as a sphere. The spine is approximated as a series of spheres connecting each other. Each sphere has the control points to represent the outer shape of the body. The spine posture is estimated by moving the sphere and the control points. The estimation is performed by calculating the matching ratio between a projected image of the model and an input image. X-ray CT slices are used for the construction of the model. We applied the proposed method to real human images. The experimental results show that our 3D model worked reasonably well for the estimation of human spine posture based on real human images.", "abstracts": [ { "abstractType": "Regular", "content": "This paper reports a method for estimating human spine posture using the front and side views of a human body taken by a video camera. We present here a new 3D model to estimate the spine posture using connected vertebra spheres. In this model, each vertebra forming the spine is approximated as a sphere. The spine is approximated as a series of spheres connecting each other. Each sphere has the control points to represent the outer shape of the body. The spine posture is estimated by moving the sphere and the control points. The estimation is performed by calculating the matching ratio between a projected image of the model and an input image. X-ray CT slices are used for the construction of the model. We applied the proposed method to real human images. The experimental results show that our 3D model worked reasonably well for the estimation of human spine posture based on real human images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper reports a method for estimating human spine posture using the front and side views of a human body taken by a video camera. We present here a new 3D model to estimate the spine posture using connected vertebra spheres. In this model, each vertebra forming the spine is approximated as a sphere. The spine is approximated as a series of spheres connecting each other. Each sphere has the control points to represent the outer shape of the body. The spine posture is estimated by moving the sphere and the control points. The estimation is performed by calculating the matching ratio between a projected image of the model and an input image. X-ray CT slices are used for the construction of the model. We applied the proposed method to real human images. The experimental results show that our 3D model worked reasonably well for the estimation of human spine posture based on real human images.", "fno": "00982391", "keywords": [ "Solid Modelling", "Stereo Image Processing", "Pattern Matching", "Physiological Models", "Human Spine Posture Estimation", "3 D Model", "Connected Vertebra Spheres Model", "Matching Ratio", "X Ray CT Slices", "Left Lateral Bending", "Humans", "Biological System Modeling", "Shape Control", "Animation", "Ellipsoids", "Joints", "Magnetooptic Recording", "Joining Processes", "X Ray Imaging", "Computed Tomography" ], "authors": [ { "affiliation": "Dept. of Comput. Sci. & Eng., Nagoya Univ., Japan", "fullName": "D. Furukawa", "givenName": "D.", "surname": "Furukawa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Mori", "givenName": "K.", "surname": "Mori", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Y. Suenaga", "givenName": "Y.", "surname": "Suenaga", "__typename": "ArticleAuthorType" } ], "idPrefix": "ca", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "174,175,176,177,178,179,180,181", "year": "2001", "issn": "1087-4844", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00982390", "articleId": "12OmNxRF74d", "__typename": "AdjacentArticleType" }, "next": { "fno": "00982392", "articleId": "12OmNzcPAf0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2011/1189/0/05999147", "title": "Spine X-ray image retrieval using partial vertebral boundaries", "doi": null, "abstractUrl": "/proceedings-article/cbms/2011/05999147/12OmNqBtiF7", "parentPublication": { "id": "proceedings/cbms/2011/1189/0", "title": "2011 24th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a374", "title": "Detection and Evaluation on the Spine Tracking Accuracy during Image-Guided Radiation Therapy", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a374/12OmNrHSD3n", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2004/2104/0/21040097", "title": "Partial Shape Matching of Spine X-Ray Shapes Using Dynamic Programming", "doi": null, "abstractUrl": "/proceedings-article/cbms/2004/21040097/12OmNx9FhMM", "parentPublication": { "id": "proceedings/cbms/2004/2104/0", "title": "Proceedings. 17th IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2004/2128/3/212830322", "title": "Spine Posture Estimation Method from Human Images Using 3D Spine Model - Computation of the rough approximation of the physical forces working on vertebral bodies -", "doi": null, "abstractUrl": "/proceedings-article/icpr/2004/212830322/12OmNxEjY4x", "parentPublication": { "id": "proceedings/icpr/2004/2128/3", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2011/4532/0/4532a466", "title": "Accelerometer Array and Method to Obtain a 3D Representation of the Spine Posture", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2011/4532a466/12OmNxcMSln", "parentPublication": { "id": "proceedings/bwcca/2011/4532/0", "title": "2011 International Conference on Broadband and Wireless Computing, Communication and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2008/3165/0/3165a224", "title": "CBIR of Spine X-Ray Images on Inter-Vertebral Disc Space and Shape Profiles", "doi": null, "abstractUrl": "/proceedings-article/cbms/2008/3165a224/12OmNyQ7G23", "parentPublication": { "id": "proceedings/cbms/2008/3165/0", "title": "2008 21st IEEE International Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a121", "title": "A Novel Framework for 3D-2D Vertebra Matching", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a121/19wB4ylXYXe", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a220", "title": "Human Posture Estimation", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a220/1BQiAeZ9qZa", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956489", "title": "Automatic Lumbar Vertebra Landmark Localization and Segmentation for Pedicle Screw Placement", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956489/1IHplh5pfHO", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900f276", "title": "Automatic Vertebra Localization and Identification in CT by Spine Rectification and Anatomically-constrained Optimization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900f276/1yeKWTUY132", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XacGk8", "doi": "10.1109/CVPR.2018.00052", "title": "Disentangling 3D Pose in a Dendritic CNN for Unconstrained 2D Face Alignment", "normalizedTitle": "Disentangling 3D Pose in a Dendritic CNN for Unconstrained 2D Face Alignment", "abstract": "Heatmap regression has been used for landmark localization for quite a while now. Most of the methods use a very deep stack of bottleneck modules for heatmap classification stage, followed by heatmap regression to extract the keypoints. In this paper, we present a single dendritic CNN, termed as Pose Conditioned Dendritic Convolution Neural Network (PCD-CNN), where a classification network is followed by a second and modular classification network, trained in an end to end fashion to obtain accurate landmark points. Following a Bayesian formulation, we disentangle the 3D pose of a face image explicitly by conditioning the landmark estimation on pose, making it different from multi-tasking approaches. Extensive experimentation shows that conditioning on pose reduces the localization error by making it agnostic to face pose. The proposed model can be extended to yield variable number of landmark points and hence broadening its applicability to other datasets. Instead of increasing depth or width of the network, we train the CNN efficiently with Mask-Softmax Loss and hard sample mining to achieve upto 15% reduction in error compared to state-of-the-art methods for extreme and medium pose face images from challenging datasets including AFLW, AFW, COFW and IBUG.", "abstracts": [ { "abstractType": "Regular", "content": "Heatmap regression has been used for landmark localization for quite a while now. Most of the methods use a very deep stack of bottleneck modules for heatmap classification stage, followed by heatmap regression to extract the keypoints. In this paper, we present a single dendritic CNN, termed as Pose Conditioned Dendritic Convolution Neural Network (PCD-CNN), where a classification network is followed by a second and modular classification network, trained in an end to end fashion to obtain accurate landmark points. Following a Bayesian formulation, we disentangle the 3D pose of a face image explicitly by conditioning the landmark estimation on pose, making it different from multi-tasking approaches. Extensive experimentation shows that conditioning on pose reduces the localization error by making it agnostic to face pose. The proposed model can be extended to yield variable number of landmark points and hence broadening its applicability to other datasets. Instead of increasing depth or width of the network, we train the CNN efficiently with Mask-Softmax Loss and hard sample mining to achieve upto 15% reduction in error compared to state-of-the-art methods for extreme and medium pose face images from challenging datasets including AFLW, AFW, COFW and IBUG.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Heatmap regression has been used for landmark localization for quite a while now. Most of the methods use a very deep stack of bottleneck modules for heatmap classification stage, followed by heatmap regression to extract the keypoints. In this paper, we present a single dendritic CNN, termed as Pose Conditioned Dendritic Convolution Neural Network (PCD-CNN), where a classification network is followed by a second and modular classification network, trained in an end to end fashion to obtain accurate landmark points. Following a Bayesian formulation, we disentangle the 3D pose of a face image explicitly by conditioning the landmark estimation on pose, making it different from multi-tasking approaches. Extensive experimentation shows that conditioning on pose reduces the localization error by making it agnostic to face pose. The proposed model can be extended to yield variable number of landmark points and hence broadening its applicability to other datasets. Instead of increasing depth or width of the network, we train the CNN efficiently with Mask-Softmax Loss and hard sample mining to achieve upto 15% reduction in error compared to state-of-the-art methods for extreme and medium pose face images from challenging datasets including AFLW, AFW, COFW and IBUG.", "fno": "642000a430", "keywords": [ "Bayes Methods", "Face Recognition", "Feedforward Neural Nets", "Image Classification", "Learning Artificial Intelligence", "Pose Estimation", "Regression Analysis", "Stereo Image Processing", "3 D Pose", "Unconstrained 2 D Face Alignment", "Heatmap Regression", "Landmark Localization", "Heatmap Classification Stage", "Single Dendritic CNN", "Pose Conditioned Dendritic Convolution Neural Network", "PCD CNN", "Second Classification Network", "Modular Classification Network", "Face Image", "Landmark Estimation", "Localization Error", "Bayesian Formulation", "Face", "Three Dimensional Displays", "Task Analysis", "Two Dimensional Displays", "Deformable Models", "Solid Modeling", "Shape" ], "authors": [ { "affiliation": null, "fullName": "Amit Kumar", "givenName": "Amit", "surname": "Kumar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rama Chellappa", "givenName": "Rama", "surname": "Chellappa", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "430-439", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000a420", "articleId": "17D45XoXP6r", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000a440", "articleId": "17D45VUZMX5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457f689", "title": "Lifting from the Deep: Convolutional 3D Pose Estimation from a Single Image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f689/12OmNBRbkrc", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/07780823", "title": "Large-Pose Face Alignment via CNN-Based Dense 3D Model Fitting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/07780823/12OmNqBbHze", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a685", "title": "Learning Camera Viewpoint Using CNN to Improve 3D Body Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a685/12OmNqFa5pt", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2017/0563/0/08273654", "title": "CNN based 3D facial expression recognition using masking and landmark features", "doi": null, "abstractUrl": "/proceedings-article/acii/2017/08273654/12OmNrAMEJB", "parentPublication": { "id": "proceedings/acii/2017/0563/0", "title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457e704", "title": "Unite the People: Closing the Loop Between 3D and 2D Human Representations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457e704/12OmNrGb2kh", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034b619", "title": "Dense Face Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b619/12OmNwF0C4S", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457f719", "title": "Simultaneous Facial Landmark Detection, Pose and Deformation Estimation Under Facial Occlusion", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f719/12OmNx76TF9", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b642", "title": "Recurrent 3D-2D Dual Learning for Large-Pose Facial Landmark Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b642/12OmNzmclKY", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a314", "title": "A Light-Weighted Network for Facial Landmark Detection via Combined Heatmap and Coordinate Regression", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a314/1cdOPysKPuw", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933795", "title": "Interactive Dendritic Spine Analysis Based on 3D Morphological Features", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933795/1fTgFVHfgPe", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1IlNS8T3xtu", "title": "2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)", "acronym": "aemcse", "groupId": "9948218", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1IlOgb601Fe", "doi": "10.1109/AEMCSE55572.2022.00140", "title": "Multi-perspectives 2D Spine CT images Segmentation of 3D Fuse Algorithm", "normalizedTitle": "Multi-perspectives 2D Spine CT images Segmentation of 3D Fuse Algorithm", "abstract": "Vertebrae segmentation is a key component of quantitative spine image analysis, which can directly detect and evaluate vertebrae fractures, and indirectly support modeling and monitoring of spinal aging process. There are two main segmentation methods in the past: one is to use 2D CNN for segmentation, and then stack along a certain axis; the other is to preform 3D CNN segmentation directly. However, the former does not utilize the correlation information between the upper and lower slices lead to low segmentation accuracy, the latter has significant shortcomings such as mass of parameters, dependent data and slow segmentation speed. In this paper, a 3D segmentation algorithm using multi-perspectives 2D spine images is proposed. The proposed algorithm does not require a large amount of data, which can segment the spine boundary more accurately. Specifically, the 2D slices from three perspectives are segmented respectively, and then the three segmentation results are fused. It is different from previous algorithms that ignore the information from different perspectives. In this paper, we adopt three perspectives for mutual supervision learning to obtain the 3D information of the spine. In particular, we add the shape flow information in order to obtain more accurate boundary segmentation in the network. The model obtains 83.4% PA on the standard spine data. Similarly, the proposed algorithm still has obvious advantages in BraTS 2018 brain tumor segmentation task, and the proposed algorithm still achieved 80.0% PA in the case of a small amount of data.", "abstracts": [ { "abstractType": "Regular", "content": "Vertebrae segmentation is a key component of quantitative spine image analysis, which can directly detect and evaluate vertebrae fractures, and indirectly support modeling and monitoring of spinal aging process. There are two main segmentation methods in the past: one is to use 2D CNN for segmentation, and then stack along a certain axis; the other is to preform 3D CNN segmentation directly. However, the former does not utilize the correlation information between the upper and lower slices lead to low segmentation accuracy, the latter has significant shortcomings such as mass of parameters, dependent data and slow segmentation speed. In this paper, a 3D segmentation algorithm using multi-perspectives 2D spine images is proposed. The proposed algorithm does not require a large amount of data, which can segment the spine boundary more accurately. Specifically, the 2D slices from three perspectives are segmented respectively, and then the three segmentation results are fused. It is different from previous algorithms that ignore the information from different perspectives. In this paper, we adopt three perspectives for mutual supervision learning to obtain the 3D information of the spine. In particular, we add the shape flow information in order to obtain more accurate boundary segmentation in the network. The model obtains 83.4% PA on the standard spine data. Similarly, the proposed algorithm still has obvious advantages in BraTS 2018 brain tumor segmentation task, and the proposed algorithm still achieved 80.0% PA in the case of a small amount of data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Vertebrae segmentation is a key component of quantitative spine image analysis, which can directly detect and evaluate vertebrae fractures, and indirectly support modeling and monitoring of spinal aging process. There are two main segmentation methods in the past: one is to use 2D CNN for segmentation, and then stack along a certain axis; the other is to preform 3D CNN segmentation directly. However, the former does not utilize the correlation information between the upper and lower slices lead to low segmentation accuracy, the latter has significant shortcomings such as mass of parameters, dependent data and slow segmentation speed. In this paper, a 3D segmentation algorithm using multi-perspectives 2D spine images is proposed. The proposed algorithm does not require a large amount of data, which can segment the spine boundary more accurately. Specifically, the 2D slices from three perspectives are segmented respectively, and then the three segmentation results are fused. It is different from previous algorithms that ignore the information from different perspectives. In this paper, we adopt three perspectives for mutual supervision learning to obtain the 3D information of the spine. In particular, we add the shape flow information in order to obtain more accurate boundary segmentation in the network. The model obtains 83.4% PA on the standard spine data. Similarly, the proposed algorithm still has obvious advantages in BraTS 2018 brain tumor segmentation task, and the proposed algorithm still achieved 80.0% PA in the case of a small amount of data.", "fno": "847400a696", "keywords": [ "Biomedical MRI", "Bone", "Brain", "Computerised Tomography", "Fracture", "Image Classification", "Image Segmentation", "Learning Artificial Intelligence", "Medical Image Processing", "Neurophysiology", "Tumours", "2 D CNN", "3 D CNN Segmentation", "3 D Fuse Algorithm", "Accurate Boundary Segmentation", "Bra TS 2018 Brain Tumor Segmentation Task", "Correlation Information", "Dependent Data", "Low Segmentation Accuracy", "Lower Slices", "Main Segmentation Methods", "Modeling Monitoring", "Multiperspectives 2 D", "Quantitative Spine Image Analysis", "Segmentation Speed", "Shape Flow Information", "Spinal Aging Process", "Spine Boundary", "Standard Spine Data", "Upper Slices", "Vertebrae Fractures", "Vertebrae Segmentation", "Image Segmentation", "Three Dimensional Displays", "Shape", "Fuses", "Spine", "Data Models", "Task Analysis", "2 D Slice", "3 D Segmentation", "Multi Perspectives", "Shape Flow Information" ], "authors": [ { "affiliation": "Qinghai University,Department of Computer Technology and Application,Xining,China,810016", "fullName": "Jiali Cui", "givenName": "Jiali", "surname": "Cui", "__typename": "ArticleAuthorType" }, { "affiliation": "Qinghai University,School of Mechanical Engineering,Xining,China,810016", "fullName": "Dedong Gao", "givenName": "Dedong", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Qinghai University,School of Mechanical Engineering,Xining,China,810016", "fullName": "Yan Zhao", "givenName": "Yan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Qinghai University,School of Mechanical Engineering,Xining,China,810016", "fullName": "Linze Wang", "givenName": "Linze", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Qinghai University,School of Mechanical Engineering,Xining,China,810016", "fullName": "Xin Peng", "givenName": "Xin", "surname": "Peng", "__typename": "ArticleAuthorType" } ], "idPrefix": "aemcse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-04-01T00:00:00", "pubType": "proceedings", "pages": "696-703", "year": "2022", "issn": null, "isbn": "978-1-6654-8474-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "847400a691", "articleId": "1IlO80UnVq8", "__typename": "AdjacentArticleType" }, "next": { "fno": "847400a704", "articleId": "1IlNY423Tpe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dicta/2011/4588/0/4588a019", "title": "Automated 3D Segmentation of Vertebral Bodies and Intervertebral Discs from MRI", "doi": null, "abstractUrl": "/proceedings-article/dicta/2011/4588a019/12OmNC36tRb", "parentPublication": { "id": "proceedings/dicta/2011/4588/0", "title": "2011 International Conference on Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2011/1189/0/05999147", "title": "Spine X-ray image retrieval using partial vertebral boundaries", "doi": null, "abstractUrl": "/proceedings-article/cbms/2011/05999147/12OmNqBtiF7", "parentPublication": { "id": "proceedings/cbms/2011/1189/0", "title": "2011 24th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icetet/2008/3267/0/3267a715", "title": "Live Wire Segmentation Tool for Osteophyte Detection in Lumbar Spine X-Ray Images", "doi": null, "abstractUrl": "/proceedings-article/icetet/2008/3267a715/12OmNrJAe7s", "parentPublication": { "id": "proceedings/icetet/2008/3267/0", "title": "Emerging Trends in Engineering & Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a066", "title": "Statistic Model of the Spine in Three-Dimension Geometry", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a066/12OmNvSbBuL", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270a420", "title": "Study on Cervical Spine Stresses Based on Three-Dimensional Finite Element Method", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a420/12OmNwCsdOJ", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfcse/2011/1562/0/06041654", "title": "Study on Cervical Spine Stresses Based on Finite Element Model", "doi": null, "abstractUrl": "/proceedings-article/icfcse/2011/06041654/12OmNwEJ0GF", "parentPublication": { "id": "proceedings/icfcse/2011/1562/0", "title": "2011 International Conference on Future Computer Science and Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d191", "title": "Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d191/12OmNykCcg3", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2018/6857/0/685700a194", "title": "Two Staged Machine Learning Network for Spine Segmentation and Recognition", "doi": null, "abstractUrl": "/proceedings-article/ism/2018/685700a194/17D45VTRopr", "parentPublication": { "id": "proceedings/ism/2018/6857/0", "title": "2018 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956489", "title": "Automatic Lumbar Vertebra Landmark Localization and Segmentation for Pedicle Screw Placement", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956489/1IHplh5pfHO", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428388", "title": "A Keypoint Transformer to Discover Spine Structure for Cobb Angle Estimation", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428388/1uilSmQX3X2", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fTgF9x78sw", "title": "2019 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fTgFVHfgPe", "doi": "10.1109/VISUAL.2019.8933795", "title": "Interactive Dendritic Spine Analysis Based on 3D Morphological Features", "normalizedTitle": "Interactive Dendritic Spine Analysis Based on 3D Morphological Features", "abstract": "Dendritic spines are submicron scale protrusions on neuronal dendrites that form the postsynaptic sites of excitatory neuronal inputs. The morphological changes of dendritic spines reflect alterations in physiological conditions and are further indicators of various neuropsychiatric conditions. However, due to the highly dynamic and heterogeneous nature of spines, accurate measurement and object analysis of spine morphology is a major challenge in neuroscience research. Here, we propose an interactive 3D dendritic spine analysis system that displays 3D rendering of spines and plots the high-dimensional features extracted from the 3D mesh of spines in three graph types (parallel coordinate plot, radar plot, and 2D scatter plot with t-Distributed Stochastic Neighbor Embedding). With this system, analysts can effectively explore and analyze the dendritic spine in a 3D manner with high-dimensional features. For the system, we have constructed a set of morphological high-dimensional features from the 3D mesh of dendritic spines.", "abstracts": [ { "abstractType": "Regular", "content": "Dendritic spines are submicron scale protrusions on neuronal dendrites that form the postsynaptic sites of excitatory neuronal inputs. The morphological changes of dendritic spines reflect alterations in physiological conditions and are further indicators of various neuropsychiatric conditions. However, due to the highly dynamic and heterogeneous nature of spines, accurate measurement and object analysis of spine morphology is a major challenge in neuroscience research. Here, we propose an interactive 3D dendritic spine analysis system that displays 3D rendering of spines and plots the high-dimensional features extracted from the 3D mesh of spines in three graph types (parallel coordinate plot, radar plot, and 2D scatter plot with t-Distributed Stochastic Neighbor Embedding). With this system, analysts can effectively explore and analyze the dendritic spine in a 3D manner with high-dimensional features. For the system, we have constructed a set of morphological high-dimensional features from the 3D mesh of dendritic spines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Dendritic spines are submicron scale protrusions on neuronal dendrites that form the postsynaptic sites of excitatory neuronal inputs. The morphological changes of dendritic spines reflect alterations in physiological conditions and are further indicators of various neuropsychiatric conditions. However, due to the highly dynamic and heterogeneous nature of spines, accurate measurement and object analysis of spine morphology is a major challenge in neuroscience research. Here, we propose an interactive 3D dendritic spine analysis system that displays 3D rendering of spines and plots the high-dimensional features extracted from the 3D mesh of spines in three graph types (parallel coordinate plot, radar plot, and 2D scatter plot with t-Distributed Stochastic Neighbor Embedding). With this system, analysts can effectively explore and analyze the dendritic spine in a 3D manner with high-dimensional features. For the system, we have constructed a set of morphological high-dimensional features from the 3D mesh of dendritic spines.", "fno": "08933795", "keywords": [ "Biomedical Optical Imaging", "Data Visualisation", "Dendrites", "Feature Extraction", "Medical Image Processing", "Neurophysiology", "Rendering Computer Graphics", "Stochastic Processes", "Interactive Dendritic Spine Analysis", "3 D Morphological Features", "Neuronal Dendrites", "Spine Morphology", "Spine Analysis System", "High Dimensional Features", "Postsynaptic Sites", "Excitatory Neuronal Inputs", "Physiological Condition", "Neuropsychiatric Conditions", "High Dimensional Feature Extraction", "3 D Mesh", "T Distributed Stochastic Neighbor Embedding", "Morphological High Dimensional Features", "Three Dimensional Displays", "Neck", "Head", "Image Color Analysis", "Two Dimensional Displays", "Rendering Computer Graphics", "Shape", "Biomedical And Medical Visualization", "Coordinated And Multiple Views", "User Interfaces" ], "authors": [ { "affiliation": "Ulsan National Institute of Science and Technology", "fullName": "JunYoung Choi", "givenName": "JunYoung", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "Seoul National University College of Medicine", "fullName": "Sang-Eun Lee", "givenName": "Sang-Eun", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Seoul National University College of Medicine", "fullName": "Eunji Cho", "givenName": "Eunji", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tokyo", "fullName": "Yutaro Kashiwagi", "givenName": "Yutaro", "surname": "Kashiwagi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tokyo", "fullName": "Shigeo Okabe", "givenName": "Shigeo", "surname": "Okabe", "__typename": "ArticleAuthorType" }, { "affiliation": "Seoul National University College of Medicine", "fullName": "Sunghoe Chang", "givenName": "Sunghoe", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "Ulsan National Institute of Science and Technology", "fullName": "Won-Ki Jeong", "givenName": "Won-Ki", "surname": "Jeong", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "171-175", "year": "2019", "issn": null, "isbn": "978-1-7281-4941-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08933605", "articleId": "1fTgJMYf7P2", "__typename": "AdjacentArticleType" }, "next": { "fno": "08933693", "articleId": "1fTgFyxezMQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2014/4985/0/06836066", "title": "Viewpoint-independent book spine segmentation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836066/12OmNCwCLld", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a374", "title": "Detection and Evaluation on the Spine Tracking Accuracy during Image-Guided Radiation Therapy", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a374/12OmNrHSD3n", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140715", "title": "Detection of presynaptic terminals on dendritic spines in double labeling confocal images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140715/12OmNyUnEGA", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532821", "title": "Interactive visual analysis and exploration of injection systems simulations", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532821/12OmNzn391J", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a430", "title": "Disentangling 3D Pose in a Dendritic CNN for Unconstrained 2D Face Alignment", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a430/17D45XacGk8", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aemcse/2022/8474/0/847400a696", "title": "Multi-perspectives 2D Spine CT images Segmentation of 3D Fuse Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aemcse/2022/847400a696/1IlOgb601Fe", "parentPublication": { "id": "proceedings/aemcse/2022/8474/0", "title": "2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2022/9476/0/947600a150", "title": "Poster: Head and Neck Tumor Segmentation With Sliced 3D PET Scans", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/947600a150/1JjytlkyTKM", "parentPublication": { "id": "proceedings/chase/2022/9476/0", "title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222085", "title": "Visualization of Human Spine Biomechanics for Spinal Surgery", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222085/1nTqvP5vNXW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306647", "title": "A Coarse to Fine Framework for Multi-organ Segmentation in Head and Neck Images", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306647/1qcicyL3L2M", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09555234", "title": "DXplorer: A Unified Visualization Framework for Interactive Dendritic Spine Analysis Using 3D Morphological Features", "doi": null, "abstractUrl": "/journal/tg/2023/02/09555234/1xjQYixG2Lm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qyxP4fUhfG", "title": "2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)", "acronym": "cogmi", "groupId": "1835524", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qyxRaymb7O", "doi": "10.1109/CogMI50398.2020.00033", "title": "Artificial Dendrites: an Algorithm", "normalizedTitle": "Artificial Dendrites: an Algorithm", "abstract": "This paper outlines preliminary work on an algorithm to create dendritic, tree-like structures by arranging spines in R<sup>3</sup> using directional forces. Each spine is attracted to its neighbor based on the temporal coincidence of afferent action potentials. The resulting spine location spatially encodes activation patterns. Proximity to the soma and to each other determines connectivity within an acyclic graph. Dendritic branches carry back-propagating action potentials used for credit assignment by Hebbian-style learning. Preliminary results suggest this method could be used to create spiking neural networks consisting of dendritic neurons capable of pattern recognition.", "abstracts": [ { "abstractType": "Regular", "content": "This paper outlines preliminary work on an algorithm to create dendritic, tree-like structures by arranging spines in R<sup>3</sup> using directional forces. Each spine is attracted to its neighbor based on the temporal coincidence of afferent action potentials. The resulting spine location spatially encodes activation patterns. Proximity to the soma and to each other determines connectivity within an acyclic graph. Dendritic branches carry back-propagating action potentials used for credit assignment by Hebbian-style learning. Preliminary results suggest this method could be used to create spiking neural networks consisting of dendritic neurons capable of pattern recognition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper outlines preliminary work on an algorithm to create dendritic, tree-like structures by arranging spines in R3 using directional forces. Each spine is attracted to its neighbor based on the temporal coincidence of afferent action potentials. The resulting spine location spatially encodes activation patterns. Proximity to the soma and to each other determines connectivity within an acyclic graph. Dendritic branches carry back-propagating action potentials used for credit assignment by Hebbian-style learning. Preliminary results suggest this method could be used to create spiking neural networks consisting of dendritic neurons capable of pattern recognition.", "fno": "414400a198", "keywords": [ "Backpropagation", "Biomimetics", "Hebbian Learning", "Neural Nets", "Neurophysiology", "Pattern Recognition", "Physiological Models", "Back Propagating Action Potentials", "Hebbian Style Learning", "Dendritic Neurons", "Pattern Recognition", "Artificial Dendrites", "Tree Like Structures", "Directional Forces", "Temporal Coincidence", "Soma", "Acyclic Graph", "Spine Location", "Neural Network Spiking", "Force", "Neurons", "Training", "Synapses", "Action Potentials", "Shape", "Computational Modeling", "Artificial Dendrites", "Spiking Neural Networks", "Brain Inspired Computing" ], "authors": [ { "affiliation": "School of Computing and Information Science, University of Maine,Orono,ME,USA,04469", "fullName": "Zachary Hutchinson", "givenName": "Zachary", "surname": "Hutchinson", "__typename": "ArticleAuthorType" } ], "idPrefix": "cogmi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "198-207", "year": "2020", "issn": null, "isbn": "978-1-7281-4144-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "414400a190", "articleId": "1qyxPgHZd3a", "__typename": "AdjacentArticleType" }, "next": { "fno": "414400a208", "articleId": "1qyxR3xMiZ2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wgec/2009/3899/0/3899a192", "title": "An Anomaly Detection System Based on Dendritic Cell Algorithm", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a192/12OmNBh8gWh", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bsn/2011/4431/0/4431a053", "title": "Compressive Sensing of Neural Action Potentials Using a Learned Union of Supports", "doi": null, "abstractUrl": "/proceedings-article/bsn/2011/4431a053/12OmNBiygwe", "parentPublication": { "id": "proceedings/bsn/2011/4431/0", "title": "Wearable and Implantable Body Sensor Networks, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2002/03/x3048", "title": "Using Data Compression for Multidimensional Distribution Analysis", "doi": null, "abstractUrl": "/magazine/ex/2002/03/x3048/13rRUwI5TTB", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2018/7568/0/08642781", "title": "Modeling the bursting behavior of the Hodgkin-Huxley neurons using genetic algorithm based parameter search", "doi": null, "abstractUrl": "/proceedings-article/isspit/2018/08642781/17QjJfv56tX", "parentPublication": { "id": "proceedings/isspit/2018/7568/0", "title": "2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995173", "title": "Effect of arsenic trioxide on human ventricular myocytes: a model study", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995173/1JC28XuvGo0", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/massw/2019/4121/0/412100a063", "title": "Adaptive Sampling for Low-Power Wearable and Implantable Devices", "doi": null, "abstractUrl": "/proceedings-article/massw/2019/412100a063/1iTvBUwjsuA", "parentPublication": { "id": "proceedings/massw/2019/4121/0", "title": "2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2020/7164/0/09130026", "title": "Machine Learning-Assisted Detection of Action Potentials in Extracellular Multi-Unit Recordings", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2020/09130026/1l6SLQ47Qg8", "parentPublication": { "id": "proceedings/aqtr/2020/7164/0", "title": "2020 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2021/9101/0/09333947", "title": "Tactile Perception Modulation by Transcutaneous Electrical Stimulation", "doi": null, "abstractUrl": "/proceedings-article/icoin/2021/09333947/1qTrVRo0U24", "parentPublication": { "id": "proceedings/icoin/2021/9101/0", "title": "2021 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412936", "title": "Improving Explainability of Integrated Gradients with Guided Non-Linearity", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412936/1tmiOlDkhoY", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2022/09/09573511", "title": "Stochastic SOT Device Based SNN Architecture for On-Chip Unsupervised STDP Learning", "doi": null, "abstractUrl": "/journal/tc/2022/09/09573511/1xH5GaJqEeY", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqO", "title": "2006 International Conference on Hybrid Information Technology", "acronym": "ichit", "groupId": "1001740", "volume": "1", "displayVolume": "1", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNwFzO2t", "doi": "10.1109/ICHIT.2006.253477", "title": "Cylindrical Model-Based Head Tracking and 3D Pose Recovery from Sequential Face Images", "normalizedTitle": "Cylindrical Model-Based Head Tracking and 3D Pose Recovery from Sequential Face Images", "abstract": "This paper presents a novel approach to estimate 3D head pose dynamically from a sequence of input images. The exact head pose estimation and facial motion tracking are critical problems to be solved in developing a vision based human computer interaction system. Given an initial reference template of head image and corresponding head pose, the full head motion is recovered by using a cylindrical head model. By updating the template dynamically in order to accommodate gradual changes in lighting, it is possible to recover head pose robustly regardless of light variation and self-occlusion. For this, we adopt optical flow along with iteratively re-weighted least square technique. From the experiments, we can show the proposed approach efficiently estimate 3D head pose", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a novel approach to estimate 3D head pose dynamically from a sequence of input images. The exact head pose estimation and facial motion tracking are critical problems to be solved in developing a vision based human computer interaction system. Given an initial reference template of head image and corresponding head pose, the full head motion is recovered by using a cylindrical head model. By updating the template dynamically in order to accommodate gradual changes in lighting, it is possible to recover head pose robustly regardless of light variation and self-occlusion. For this, we adopt optical flow along with iteratively re-weighted least square technique. From the experiments, we can show the proposed approach efficiently estimate 3D head pose", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a novel approach to estimate 3D head pose dynamically from a sequence of input images. The exact head pose estimation and facial motion tracking are critical problems to be solved in developing a vision based human computer interaction system. Given an initial reference template of head image and corresponding head pose, the full head motion is recovered by using a cylindrical head model. By updating the template dynamically in order to accommodate gradual changes in lighting, it is possible to recover head pose robustly regardless of light variation and self-occlusion. For this, we adopt optical flow along with iteratively re-weighted least square technique. From the experiments, we can show the proposed approach efficiently estimate 3D head pose", "fno": "04021080", "keywords": [ "Computer Graphics", "Face Recognition", "Human Computer Interaction", "Image Motion Analysis", "Least Squares Approximations", "Cylindrical Model Based Head Tracking", "3 D Pose Recovery", "Sequential Face Images", "3 D Head Pose", "Facial Motion Tracking", "Human Computer Interaction", "Re Weighted Least Square Technique", "Self Occlusion", "Head", "Face Detection", "Skin", "Facial Animation", "Tracking", "Phase Estimation", "Motion Estimation", "Solid Modeling", "Robustness", "Image Sequences" ], "authors": [ { "affiliation": "Kyonggi University, Suwon, Korea", "fullName": "Ohryun Kwon", "givenName": "Ohryun", "surname": "Kwon", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyonggi University, Suwon, Korea", "fullName": "Junchul Chun", "givenName": "Junchul", "surname": "Chun", "__typename": "ArticleAuthorType" }, { "affiliation": "Ajou University, Suwon, Korea", "fullName": "Poem Park", "givenName": "Poem", "surname": "Park", "__typename": "ArticleAuthorType" } ], "idPrefix": "ichit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-11-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2006", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "267410062", "articleId": "12OmNxHryjz", "__typename": "AdjacentArticleType" }, "next": { "fno": "267410066", "articleId": "12OmNBr4ewW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/motion/2002/1860/0/18600125", "title": "Comparative Study of Coarse Head Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/motion/2002/18600125/12OmNAGw13Q", "parentPublication": { "id": "proceedings/motion/2002/1860/0", "title": "Proceedings Workshop on Motion and Video Computing (MOTION 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c263", "title": "Robust Real-Time Extreme Head Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c263/12OmNBBQZpN", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/1/267410135", "title": "Cylindrical Model-Based Head Tracking and 3D Pose Recovery from Sequential Face Images", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/267410135/12OmNqGA5fI", "parentPublication": { "id": "proceedings/ichit/2006/2674/1", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2012/4711/0/4711a794", "title": "3D Head Pose Estimation Based on Scene Flow and Generic Head Model", "doi": null, "abstractUrl": "/proceedings-article/icme/2012/4711a794/12OmNqGitTB", "parentPublication": { "id": "proceedings/icme/2012/4711/0", "title": "2012 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2008/3454/0/3454a592", "title": "Supervised Learning for Head Pose Estimation Using SVD and Gabor Wavelets", "doi": null, "abstractUrl": "/proceedings-article/ism/2008/3454a592/12OmNvs4vpg", "parentPublication": { "id": "proceedings/ism/2008/3454/0", "title": "2008 Tenth IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2012/4683/0/4683a125", "title": "Coarse Head Pose Estimation using Image Abstraction", "doi": null, "abstractUrl": "/proceedings-article/crv/2012/4683a125/12OmNwE9ORM", "parentPublication": { "id": "proceedings/crv/2012/4683/0", "title": "2012 Ninth Conference on Computer and Robot Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/amfg/2003/2010/0/20100092", "title": "Absolute Head Pose Estimation From Overhead Wide-Angle Cameras", "doi": null, "abstractUrl": "/proceedings-article/amfg/2003/20100092/12OmNyen1y9", "parentPublication": { "id": "proceedings/amfg/2003/2010/0", "title": "2003 IEEE International Workshop on Analysis and Modeling of Faces and Gestures", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/2/73102599", "title": "3D head pose computation from 2D images: templates versus features", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73102599/12OmNzUPpoH", "parentPublication": { "id": "proceedings/icip/1995/7310/2", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446495", "title": "Head-to-Body-Pose Classification in No-Pose VR Tracking Systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446495/13bd1f3HvEZ", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c237", "title": "Light-Weight Head Pose Invariant Gaze Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c237/17D45WXIkI8", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXGd", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzIUfQ1", "doi": "10.1109/ICME.2017.8019362", "title": "From talking head to singing head: A significant enhancement for more natural human computer interaction", "normalizedTitle": "From talking head to singing head: A significant enhancement for more natural human computer interaction", "abstract": "This paper proposes a 3D virtual animating head system, which can not only talk but also sing. With a reconstructed head mesh model, including external/internal articulators, from multi-source images, biology information are first used to visualize each phoneme with a musical note. The synchronicity between songs and articulatory movements is then modeled by a deep neural network trained on an audio/articulatory corpus. Finally, the visualization results of phonemes are blended by the synchronicity model to produce the song synchronized articulatory animations. Quantitative and qualitative improvements of singing ability on human computer interaction are demonstrated by comparing with other state-of-the-art talking head systems.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a 3D virtual animating head system, which can not only talk but also sing. With a reconstructed head mesh model, including external/internal articulators, from multi-source images, biology information are first used to visualize each phoneme with a musical note. The synchronicity between songs and articulatory movements is then modeled by a deep neural network trained on an audio/articulatory corpus. Finally, the visualization results of phonemes are blended by the synchronicity model to produce the song synchronized articulatory animations. Quantitative and qualitative improvements of singing ability on human computer interaction are demonstrated by comparing with other state-of-the-art talking head systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a 3D virtual animating head system, which can not only talk but also sing. With a reconstructed head mesh model, including external/internal articulators, from multi-source images, biology information are first used to visualize each phoneme with a musical note. The synchronicity between songs and articulatory movements is then modeled by a deep neural network trained on an audio/articulatory corpus. Finally, the visualization results of phonemes are blended by the synchronicity model to produce the song synchronized articulatory animations. Quantitative and qualitative improvements of singing ability on human computer interaction are demonstrated by comparing with other state-of-the-art talking head systems.", "fno": "08019362", "keywords": [ "Animation", "Muscles", "Tongue", "Music", "Head", "Skin", "Solid Modeling", "Virtual Head", "Articulatory Animation" ], "authors": [ { "affiliation": "Department of Automation, University of Science and Technology of China", "fullName": "Jun Yu", "givenName": "Jun", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, the State University of New York at Buffalo", "fullName": "Chang Wen Chen", "givenName": "Chang Wen", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "511-516", "year": "2017", "issn": "1945-788X", "isbn": "978-1-5090-6067-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08019361", "articleId": "12OmNyOq54H", "__typename": "AdjacentArticleType" }, "next": { "fno": "08019363", "articleId": "12OmNxZ2Gjn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460057", "title": "Head posture detection using skin and hair information", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460057/12OmNqIhG7i", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771384", "title": "Realistic head motion synthesis for an image-based talking head", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771384/12OmNviZlz1", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a595", "title": "A M3G Talking Head for Smartphones", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a595/12OmNwoPtpR", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-vis/2008/3271/0/3271a129", "title": "Talking Head - Visualizations & Level of Detail", "doi": null, "abstractUrl": "/proceedings-article/iv-vis/2008/3271a129/12OmNwoPttf", "parentPublication": { "id": "proceedings/iv-vis/2008/3271/0", "title": "Visualisation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822623", "title": "A realistic and reliable 3D pronunciation visualization instruction system for computer-assisted language learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822623/12OmNzC5T3Y", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771401", "title": "Realistic head motion synthesis for an image-based talking head", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771401/12OmNzVoBzX", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2008/3109/0/3109a709", "title": "A Java3D Talking Head for a Chatbot", "doi": null, "abstractUrl": "/proceedings-article/cisis/2008/3109a709/12OmNzzP5DI", "parentPublication": { "id": "proceedings/cisis/2008/3109/0", "title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2018/6857/0/685700a167", "title": "Spectrum Enhancement of Singing Voice Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ism/2018/685700a167/17D45We0UCq", "parentPublication": { "id": "proceedings/ism/2018/6857/0", "title": "2018 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600k0779", "title": "Few-Shot Head Swapping in the Wild", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600k0779/1H0NmuFrNpS", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798288", "title": "A Real-Time Music VR System for 3D External and Internal Articulators", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798288/1cJ1fOEaYRa", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyfdOJ3", "title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems", "acronym": "cisis", "groupId": "1002005", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzzP5DI", "doi": "10.1109/CISIS.2008.57", "title": "A Java3D Talking Head for a Chatbot", "normalizedTitle": "A Java3D Talking Head for a Chatbot", "abstract": "Facial animation is referred to all those systems performing the speech synchronization with an animated face model. This kind of systems are called \"Talking Head\" or \"Talking Face\". In this paper a Talking Head oriented to the creation of a Chatbot is presented. It requires an input query and an answer is generated in form of text. The answer is transduced into a facial animation using a 3D face model whose lips movements are synchronized with the sound produced by a speech synthesis module. Our \"Talking Head\" explores the naturalness of the facial animation and provides a real-time interactive interface to the user. The WEB infrastructure has been realized using the Client-Server model delegating the Chatbot, the Natural Language Processing and the Digital Signal Processing services to the server, while the client is involved in animation, synchronization; in this way, the server can handle multiple requests from clients.", "abstracts": [ { "abstractType": "Regular", "content": "Facial animation is referred to all those systems performing the speech synchronization with an animated face model. This kind of systems are called \"Talking Head\" or \"Talking Face\". In this paper a Talking Head oriented to the creation of a Chatbot is presented. It requires an input query and an answer is generated in form of text. The answer is transduced into a facial animation using a 3D face model whose lips movements are synchronized with the sound produced by a speech synthesis module. Our \"Talking Head\" explores the naturalness of the facial animation and provides a real-time interactive interface to the user. The WEB infrastructure has been realized using the Client-Server model delegating the Chatbot, the Natural Language Processing and the Digital Signal Processing services to the server, while the client is involved in animation, synchronization; in this way, the server can handle multiple requests from clients.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Facial animation is referred to all those systems performing the speech synchronization with an animated face model. This kind of systems are called \"Talking Head\" or \"Talking Face\". In this paper a Talking Head oriented to the creation of a Chatbot is presented. It requires an input query and an answer is generated in form of text. The answer is transduced into a facial animation using a 3D face model whose lips movements are synchronized with the sound produced by a speech synthesis module. Our \"Talking Head\" explores the naturalness of the facial animation and provides a real-time interactive interface to the user. The WEB infrastructure has been realized using the Client-Server model delegating the Chatbot, the Natural Language Processing and the Digital Signal Processing services to the server, while the client is involved in animation, synchronization; in this way, the server can handle multiple requests from clients.", "fno": "3109a709", "keywords": [ "Java", "Java 3 D", "Chatbot", "Talking Head", "3 D Modelling" ], "authors": [ { "affiliation": null, "fullName": "Salvatore Gaglio", "givenName": "Salvatore", "surname": "Gaglio", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Giovanni Pilato", "givenName": "Giovanni", "surname": "Pilato", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roberto Pirrone", "givenName": "Roberto", "surname": "Pirrone", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Orazio Gambino", "givenName": "Orazio", "surname": "Gambino", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Agnese Augello", "givenName": "Agnese", "surname": "Augello", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alessandro Caronia", "givenName": "Alessandro", "surname": "Caronia", "__typename": "ArticleAuthorType" } ], "idPrefix": "cisis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-03-01T00:00:00", "pubType": "proceedings", "pages": "709-714", "year": "2008", "issn": null, "isbn": "978-0-7695-3109-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3109a703", "articleId": "12OmNxE2mWz", "__typename": "AdjacentArticleType" }, "next": { "fno": "3109a715", "articleId": "12OmNBDyA8B", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgi/2004/2171/0/21710284", "title": "Combination of Facial Movements on a 3D Talking Head", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710284/12OmNBOllne", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2000/0580/0/05800189", "title": "Face Analysis for the Synthesis of Photo-Realistic Talking Heads", "doi": null, "abstractUrl": "/proceedings-article/fg/2000/05800189/12OmNBpVQ9P", "parentPublication": { "id": "proceedings/fg/2000/0580/0", "title": "Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a414", "title": "On the Development of an Interactive Talking Head System", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a414/12OmNBr4eGH", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2002/1602/0/16020396", "title": "Visual Prosody: Facial Movements Accompanying Speech", "doi": null, "abstractUrl": "/proceedings-article/fg/2002/16020396/12OmNwkzusE", "parentPublication": { "id": "proceedings/fg/2002/1602/0", "title": "Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a595", "title": "A M3G Talking Head for Smartphones", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a595/12OmNwoPtpR", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-vis/2008/3271/0/3271a129", "title": "Talking Head - Visualizations & Level of Detail", "doi": null, "abstractUrl": "/proceedings-article/iv-vis/2008/3271a129/12OmNwoPttf", "parentPublication": { "id": "proceedings/iv-vis/2008/3271/0", "title": "Visualisation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/1999/0293/0/02930043", "title": "A Speech Driven Talking Head System Based on a Single Face Image", "doi": null, "abstractUrl": "/proceedings-article/pg/1999/02930043/12OmNyUWR0N", "parentPublication": { "id": "proceedings/pg/1999/0293/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/2/73102591", "title": "A new frame interpolation scheme for talking head sequences", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73102591/12OmNypIYye", "parentPublication": { "id": "proceedings/icip/1995/7310/2", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771401", "title": "Realistic head motion synthesis for an image-based talking head", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771401/12OmNzVoBzX", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011835", "title": "Realistic facial expression synthesis for an image-based talking head", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011835/12OmNzcxYWX", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmFXTjNhrG", "doi": "10.1109/ICCV48922.2021.00384", "title": "FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning", "normalizedTitle": "FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning", "abstract": "In this paper, we propose a talking face generation method that takes an audio signal as input and a short target video clip as reference, and synthesizes a photo-realistic video of the target face with natural lip motions, head poses, and eye blinks that are in-sync with the input audio signal. We note that the synthetic face attributes include not only explicit ones such as lip motions that have high correlations with speech, but also implicit ones such as head poses and eye blinks that have only weak correlation with the input audio. To model such complicated relationships among different face attributes with input audio, we propose a FACe Implicit Attribute Learning Generative Adversarial Network (FACIAL-GAN), which integrates the phonetics-aware, context-aware, and identity-aware information to synthesize the 3D face animation with realistic motions of lips, head poses, and eye blinks. Then, our Rendering-to-Video network takes the rendered face images and the attention map of eye blinks as input to generate the photorealistic output video frames. Experimental results and user studies show our method can generate realistic talking face videos with not only synchronized lip motions, but also natural head movements and eye blinks, with better qualities than the results of state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a talking face generation method that takes an audio signal as input and a short target video clip as reference, and synthesizes a photo-realistic video of the target face with natural lip motions, head poses, and eye blinks that are in-sync with the input audio signal. We note that the synthetic face attributes include not only explicit ones such as lip motions that have high correlations with speech, but also implicit ones such as head poses and eye blinks that have only weak correlation with the input audio. To model such complicated relationships among different face attributes with input audio, we propose a FACe Implicit Attribute Learning Generative Adversarial Network (FACIAL-GAN), which integrates the phonetics-aware, context-aware, and identity-aware information to synthesize the 3D face animation with realistic motions of lips, head poses, and eye blinks. Then, our Rendering-to-Video network takes the rendered face images and the attention map of eye blinks as input to generate the photorealistic output video frames. Experimental results and user studies show our method can generate realistic talking face videos with not only synchronized lip motions, but also natural head movements and eye blinks, with better qualities than the results of state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a talking face generation method that takes an audio signal as input and a short target video clip as reference, and synthesizes a photo-realistic video of the target face with natural lip motions, head poses, and eye blinks that are in-sync with the input audio signal. We note that the synthetic face attributes include not only explicit ones such as lip motions that have high correlations with speech, but also implicit ones such as head poses and eye blinks that have only weak correlation with the input audio. To model such complicated relationships among different face attributes with input audio, we propose a FACe Implicit Attribute Learning Generative Adversarial Network (FACIAL-GAN), which integrates the phonetics-aware, context-aware, and identity-aware information to synthesize the 3D face animation with realistic motions of lips, head poses, and eye blinks. Then, our Rendering-to-Video network takes the rendered face images and the attention map of eye blinks as input to generate the photorealistic output video frames. Experimental results and user studies show our method can generate realistic talking face videos with not only synchronized lip motions, but also natural head movements and eye blinks, with better qualities than the results of state-of-the-art methods.", "fno": "281200d847", "keywords": [ "Solid Modeling", "Correlation", "Three Dimensional Displays", "Lips", "Dynamics", "Rendering Computer Graphics", "Generative Adversarial Networks", "Faces", "Image And Video Synthesis" ], "authors": [ { "affiliation": "The University of Texas at Dallas", "fullName": "Chenxu Zhang", "givenName": "Chenxu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University", "fullName": "Yifan Zhao", "givenName": "Yifan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "East China Normal University", "fullName": "Yifei Huang", "givenName": "Yifei", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Xiamen University", "fullName": "Ming Zeng", "givenName": "Ming", "surname": "Zeng", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung Research America", "fullName": "Saifeng Ni", "givenName": "Saifeng", "surname": "Ni", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung Research America", "fullName": "Madhukar Budagavi", "givenName": "Madhukar", "surname": "Budagavi", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Texas at Dallas", "fullName": "Xiaohu Guo", "givenName": "Xiaohu", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "3847-3856", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200d834", "articleId": "1BmGOd4kbm0", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200d857", "articleId": "1BmH2hkwv5K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2004/2122/0/21220475", "title": "Portable Facial Information Measurement System and Its Application to Human Modeling and Human Interfaces", "doi": null, "abstractUrl": "/proceedings-article/fg/2004/21220475/12OmNvFHfCW", "parentPublication": { "id": "proceedings/fg/2004/2122/0", "title": "Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2011/4376/0/4376a331", "title": "Automatic and Robust Detection of Facial Features in Frontal Face Images", "doi": null, "abstractUrl": "/proceedings-article/uksim/2011/4376a331/12OmNzGlRE2", "parentPublication": { "id": "proceedings/uksim/2011/4376/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b153", "title": "MeshTalk: 3D Face Animation from Speech using Cross-Modality Disentanglement", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b153/1BmKgJNr99m", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d377", "title": "Expressive Talking Head Generation with Granular Audio-Visual Control", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d377/1H1iVqbQEKI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a045", "title": "Text-based Talking Facial Synthesis for Virtual Host System", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a045/1H2pgK1150A", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f198", "title": "Towards Generating Ultra-High Resolution Talking-Face Videos with Lip synchronization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f198/1L8qtg44UjC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/04/08713909", "title": "Speech-Driven Expressive Talking Lips with Conditional Sequential Generative Adversarial Networks", "doi": null, "abstractUrl": "/journal/ta/2021/04/08713909/1a312pJ90re", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09117185", "title": "Dynamic Facial Expression Generation on Hilbert Hypersphere With Conditional Wasserstein Generative Adversarial Nets", "doi": null, "abstractUrl": "/journal/tp/2022/02/09117185/1kGfN3QogZq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b328", "title": "FACEGAN: Facial Attribute Controllable rEenactment GAN", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b328/1uqGqHtd4CQ", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2021/2354/0/235400a239", "title": "A Generative Approach for Face Mask Removal Using Audio and Appearance", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2021/235400a239/1zursp1kPyE", "parentPublication": { "id": "proceedings/sibgrapi/2021/2354/0", "title": "2021 34th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmKdD1ODqU", "doi": "10.1109/ICCV48922.2021.00573", "title": "AD-NeRF: Audio Driven Neural Radiance Fields for Talking Head Synthesis", "normalizedTitle": "AD-NeRF: Audio Driven Neural Radiance Fields for Talking Head Synthesis", "abstract": "Generating high-fidelity talking head video by fitting with the input audio sequence is a challenging problem that receives considerable attentions recently. In this paper, we address this problem with the aid of neural scene representation networks. Our method is completely different from existing methods that rely on intermediate representations like 2D landmarks or 3D face models to bridge the gap between audio input and video output. Specifically, the feature of input audio signal is directly fed into a conditional implicit function to generate a dynamic neural radiance field, from which a high-fidelity talking-head video corresponding to the audio signal is synthesized using volume rendering. Another advantage of our framework is that not only the head (with hair) region is synthesized as previous methods did, but also the upper body is generated via two individual neural radiance fields. Experimental results demonstrate that our novel framework can (1) produce high-fidelity and natural results, and (2) support free adjustment of audio signals, viewing directions, and background images. Code is available at https://github.com/YudongGuo/AD-NeRF.", "abstracts": [ { "abstractType": "Regular", "content": "Generating high-fidelity talking head video by fitting with the input audio sequence is a challenging problem that receives considerable attentions recently. In this paper, we address this problem with the aid of neural scene representation networks. Our method is completely different from existing methods that rely on intermediate representations like 2D landmarks or 3D face models to bridge the gap between audio input and video output. Specifically, the feature of input audio signal is directly fed into a conditional implicit function to generate a dynamic neural radiance field, from which a high-fidelity talking-head video corresponding to the audio signal is synthesized using volume rendering. Another advantage of our framework is that not only the head (with hair) region is synthesized as previous methods did, but also the upper body is generated via two individual neural radiance fields. Experimental results demonstrate that our novel framework can (1) produce high-fidelity and natural results, and (2) support free adjustment of audio signals, viewing directions, and background images. Code is available at https://github.com/YudongGuo/AD-NeRF.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generating high-fidelity talking head video by fitting with the input audio sequence is a challenging problem that receives considerable attentions recently. In this paper, we address this problem with the aid of neural scene representation networks. Our method is completely different from existing methods that rely on intermediate representations like 2D landmarks or 3D face models to bridge the gap between audio input and video output. Specifically, the feature of input audio signal is directly fed into a conditional implicit function to generate a dynamic neural radiance field, from which a high-fidelity talking-head video corresponding to the audio signal is synthesized using volume rendering. Another advantage of our framework is that not only the head (with hair) region is synthesized as previous methods did, but also the upper body is generated via two individual neural radiance fields. Experimental results demonstrate that our novel framework can (1) produce high-fidelity and natural results, and (2) support free adjustment of audio signals, viewing directions, and background images. Code is available at https://github.com/YudongGuo/AD-NeRF.", "fno": "281200f764", "keywords": [ "Hair", "Solid Modeling", "Computer Vision", "Head", "Three Dimensional Displays", "Neural Networks", "Meetings", "Neural Generative Models", "Image And Video Synthesis", "Vision Other Modalities" ], "authors": [ { "affiliation": "University of Science and Technology of China", "fullName": "Yudong Guo", "givenName": "Yudong", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China", "fullName": "Keyu Chen", "givenName": "Keyu", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Sen Liang", "givenName": "Sen", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University", "fullName": "Yong-Jin Liu", "givenName": "Yong-Jin", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Hujun Bao", "givenName": "Hujun", "surname": "Bao", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China", "fullName": "Juyong Zhang", "givenName": "Juyong", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "5764-5774", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200f753", "articleId": "1BmLkbx0k6c", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200f775", "articleId": "1BmHJ3w9x9S", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2011/4373/0/4373a595", "title": "A M3G Talking Head for Smartphones", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a595/12OmNwoPtpR", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019362", "title": "From talking head to singing head: A significant enhancement for more natural human computer interaction", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019362/12OmNzIUfQ1", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2008/3109/0/3109a709", "title": "A Java3D Talking Head for a Chatbot", "doi": null, "abstractUrl": "/proceedings-article/cisis/2008/3109a709/12OmNzzP5DI", "parentPublication": { "id": "proceedings/cisis/2008/3109/0", "title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f600", "title": "H3D-Net: Few-Shot High-Fidelity 3D Head Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f600/1BmG0cJclQA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0342", "title": "HeadNeRF: A Realtime NeRF-based Parametric Head Model", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0342/1H1hITKdHGg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d377", "title": "Expressive Talking Head Generation with Granular Audio-Visual Control", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d377/1H1iVqbQEKI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8377", "title": "HDR-NeRF: High Dynamic Range Neural Radiance Fields", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8377/1H1kSeZPinK", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042553", "title": "FLAME-in-NeRF: Neural control of Radiance Fields for Free View Face Animation", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042553/1KOuZgIV1QI", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042567", "title": "LipNeRF: What is the right feature space to lip-sync a NeRF?", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042567/1KOv4ewUoUg", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09557828", "title": "3D Talking Face With Personalized Pose Dynamics", "doi": null, "abstractUrl": "/journal/tg/2023/02/09557828/1xquHkBQ2xa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeJBzQChhK", "doi": "10.1109/CVPR46437.2021.00366", "title": "Flow-guided One-shot Talking Face Generation with a High-resolution Audio-visual Dataset", "normalizedTitle": "Flow-guided One-shot Talking Face Generation with a High-resolution Audio-visual Dataset", "abstract": "One-shot talking face generation should synthesize high visual quality facial videos with reasonable animations of expression and head pose, and just utilize arbitrary driving audio and arbitrary single face image as the source. Current works fail to generate over 256&#x00D7;256 resolution realistic-looking videos due to the lack of an appropriate high-resolution audio-visual dataset, and the limitation of the sparse facial landmarks in providing poor expression details. To synthesize high-definition videos, we build a large in-the-wild high-resolution audio-visual dataset and propose a novel flow-guided talking face generation framework. The new dataset is collected from youtube and consists of about 16 hours 720P or 1080P videos. We leverage the facial 3D morphable model (3DMM) to split the framework into two cascaded modules instead of learning a direct mapping from audio to video. In the first module, we propose a novel animation generator to produce the movements of mouth, eyebrow and head pose simultaneously. In the second module, we transform animation into dense flow to provide more expression details and carefully design a novel flow-guided video generator to synthesize videos. Our method is able to produce high-definition videos and outperforms state-of-the-art works in objective and subjective comparisons<sup>*</sup>.", "abstracts": [ { "abstractType": "Regular", "content": "One-shot talking face generation should synthesize high visual quality facial videos with reasonable animations of expression and head pose, and just utilize arbitrary driving audio and arbitrary single face image as the source. Current works fail to generate over 256&#x00D7;256 resolution realistic-looking videos due to the lack of an appropriate high-resolution audio-visual dataset, and the limitation of the sparse facial landmarks in providing poor expression details. To synthesize high-definition videos, we build a large in-the-wild high-resolution audio-visual dataset and propose a novel flow-guided talking face generation framework. The new dataset is collected from youtube and consists of about 16 hours 720P or 1080P videos. We leverage the facial 3D morphable model (3DMM) to split the framework into two cascaded modules instead of learning a direct mapping from audio to video. In the first module, we propose a novel animation generator to produce the movements of mouth, eyebrow and head pose simultaneously. In the second module, we transform animation into dense flow to provide more expression details and carefully design a novel flow-guided video generator to synthesize videos. Our method is able to produce high-definition videos and outperforms state-of-the-art works in objective and subjective comparisons<sup>*</sup>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One-shot talking face generation should synthesize high visual quality facial videos with reasonable animations of expression and head pose, and just utilize arbitrary driving audio and arbitrary single face image as the source. Current works fail to generate over 256×256 resolution realistic-looking videos due to the lack of an appropriate high-resolution audio-visual dataset, and the limitation of the sparse facial landmarks in providing poor expression details. To synthesize high-definition videos, we build a large in-the-wild high-resolution audio-visual dataset and propose a novel flow-guided talking face generation framework. The new dataset is collected from youtube and consists of about 16 hours 720P or 1080P videos. We leverage the facial 3D morphable model (3DMM) to split the framework into two cascaded modules instead of learning a direct mapping from audio to video. In the first module, we propose a novel animation generator to produce the movements of mouth, eyebrow and head pose simultaneously. In the second module, we transform animation into dense flow to provide more expression details and carefully design a novel flow-guided video generator to synthesize videos. Our method is able to produce high-definition videos and outperforms state-of-the-art works in objective and subjective comparisons*.", "fno": "450900d660", "keywords": [ "Audio Signal Processing", "Computer Animation", "Face Recognition", "Image Resolution", "Pose Estimation", "Solid Modelling", "Stereo Image Processing", "Video Signal Processing", "Facial 3 D Morphable Model", "High Visual Quality Facial Videos", "Arbitrary Driving Audio", "Arbitrary Single Face Image", "Sparse Facial Landmarks", "High Resolution Audio Visual Dataset", "Animation Generator", "Flow Guided Video Generator", "Flow Guided One Shot Talking Face Generation", "3 DMM", "Expression Details", "Mouth Movement", "Eyebrow Movement", "Head Pose Movement", "Youtube", "Visualization", "Solid Modeling", "Three Dimensional Displays", "Image Resolution", "Face Recognition", "Mouth", "Transforms" ], "authors": [ { "affiliation": "Virtual Human Group,Netease Fuxi AI Lab", "fullName": "Zhimeng Zhang", "givenName": "Zhimeng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Virtual Human Group,Netease Fuxi AI Lab", "fullName": "Lincheng Li", "givenName": "Lincheng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Virtual Human Group,Netease Fuxi AI Lab", "fullName": "Yu Ding", "givenName": "Yu", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": "Virtual Human Group,Netease Fuxi AI Lab", "fullName": "Changjie Fan", "givenName": "Changjie", "surname": "Fan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "3660-3669", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeJBwuyiWs", "name": "pcvpr202145090-09578462s1-mm_450900d660.zip", "size": "1.16 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578462s1-mm_450900d660.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900d649", "articleId": "1yeLPmg9QZO", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900d670", "articleId": "1yeM1iXyYXC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2000/0580/0/05800189", "title": "Face Analysis for the Synthesis of Photo-Realistic Talking Heads", "doi": null, "abstractUrl": "/proceedings-article/fg/2000/05800189/12OmNBpVQ9P", "parentPublication": { "id": "proceedings/fg/2000/0580/0", "title": "Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2011/348/0/06011835", "title": "Realistic facial expression synthesis for an image-based talking head", "doi": null, "abstractUrl": "/proceedings-article/icme/2011/06011835/12OmNzcxYWX", "parentPublication": { "id": "proceedings/icme/2011/348/0", "title": "2011 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d847", "title": "FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d847/1BmFXTjNhrG", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09858334", "title": "Generating Talking Face with Controllable Eye Movements by Disentangled Blinking Feature", "doi": null, "abstractUrl": "/journal/tg/5555/01/09858334/1FUYBSBjTRm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d377", "title": "Expressive Talking Head Generation with Granular Audio-Visual Control", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d377/1H1iVqbQEKI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2019/4604/0/460400a787", "title": "Mining Audio, Text and Visual Information for Talking Face Generation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2019/460400a787/1h5XEYiq4DK", "parentPublication": { "id": "proceedings/icdm/2019/4604/0", "title": "2019 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150729", "title": "Robust One Shot Audio to Video Generation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150729/1lPH4pPRFqE", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800m2332", "title": "DAVD-Net: Deep Audio-Aided Video Decompression of Talking Heads", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800m2332/1m3o4flFjmU", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412425", "title": "Talking Face Generation via Learning Semantic and Temporal Synchronous Landmarks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412425/1tmiW2iEQW4", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E179", "title": "Pose-Controllable Talking Face Generation by Implicitly Modularized Audio-Visual Representation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E179/1yeLFZU81zy", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeJwbnt4Gs", "doi": "10.1109/CVPR46437.2021.00278", "title": "LipSync3D: Data-Efficient Learning of Personalized 3D Talking Faces from Video using Pose and Lighting Normalization", "normalizedTitle": "LipSync3D: Data-Efficient Learning of Personalized 3D Talking Faces from Video using Pose and Lighting Normalization", "abstract": "In this paper, we present a video-based learning framework for animating personalized 3D talking faces from audio. We introduce two training-time data normalizations that significantly improve data sample efficiency. First, we isolate and represent faces in a normalized space that decouples 3D geometry, head pose, and texture. This decomposes the prediction problem into regressions over the 3D face shape and the corresponding 2D texture atlas. Second, we leverage facial symmetry and approximate albedo constancy of skin to isolate and remove spatio-temporal lighting variations. Together, these normalizations allow simple networks to generate high fidelity lip-sync videos under novel ambient illumination while training with just a single speaker-specific video. Further, to stabilize temporal dynamics, we introduce an auto-regressive approach that conditions the model on its previous visual state. Human ratings and objective metrics demonstrate that our method outperforms contemporary state-of-the-art audio-driven video reenactment benchmarks in terms of realism, lip-sync and visual quality scores. We illustrate several applications enabled by our framework.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a video-based learning framework for animating personalized 3D talking faces from audio. We introduce two training-time data normalizations that significantly improve data sample efficiency. First, we isolate and represent faces in a normalized space that decouples 3D geometry, head pose, and texture. This decomposes the prediction problem into regressions over the 3D face shape and the corresponding 2D texture atlas. Second, we leverage facial symmetry and approximate albedo constancy of skin to isolate and remove spatio-temporal lighting variations. Together, these normalizations allow simple networks to generate high fidelity lip-sync videos under novel ambient illumination while training with just a single speaker-specific video. Further, to stabilize temporal dynamics, we introduce an auto-regressive approach that conditions the model on its previous visual state. Human ratings and objective metrics demonstrate that our method outperforms contemporary state-of-the-art audio-driven video reenactment benchmarks in terms of realism, lip-sync and visual quality scores. We illustrate several applications enabled by our framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a video-based learning framework for animating personalized 3D talking faces from audio. We introduce two training-time data normalizations that significantly improve data sample efficiency. First, we isolate and represent faces in a normalized space that decouples 3D geometry, head pose, and texture. This decomposes the prediction problem into regressions over the 3D face shape and the corresponding 2D texture atlas. Second, we leverage facial symmetry and approximate albedo constancy of skin to isolate and remove spatio-temporal lighting variations. Together, these normalizations allow simple networks to generate high fidelity lip-sync videos under novel ambient illumination while training with just a single speaker-specific video. Further, to stabilize temporal dynamics, we introduce an auto-regressive approach that conditions the model on its previous visual state. Human ratings and objective metrics demonstrate that our method outperforms contemporary state-of-the-art audio-driven video reenactment benchmarks in terms of realism, lip-sync and visual quality scores. We illustrate several applications enabled by our framework.", "fno": "450900c754", "keywords": [ "Computer Animation", "Face Recognition", "Geometry", "Image Texture", "Learning Artificial Intelligence", "Pose Estimation", "Regression Analysis", "Solid Modelling", "Video Signal Processing", "Lip Sync 3 D", "Data Efficient Learning", "Personalized 3 D Talking Faces", "Video Using Pose", "Lighting Normalization", "Video Based", "Training Time Data Normalizations", "Data Sample Efficiency", "Normalized Space", "Prediction Problem", "3 D Face Shape", "Leverage Facial Symmetry", "Spatio Temporal Lighting Variations", "High Fidelity Lip Sync Videos", "Single Speaker Specific Video", "Auto Regressive Approach", "Contemporary State Of The Art Audio Driven Video Reenactment Benchmarks", "Training", "Measurement", "Visualization", "Three Dimensional Displays", "Shape", "Lighting", "Skin" ], "authors": [ { "affiliation": "Google Research", "fullName": "Avisek Lahiri", "givenName": "Avisek", "surname": "Lahiri", "__typename": "ArticleAuthorType" }, { "affiliation": "Google Research", "fullName": "Vivek Kwatra", "givenName": "Vivek", "surname": "Kwatra", "__typename": "ArticleAuthorType" }, { "affiliation": "Google Research", "fullName": "Christian Frueh", "givenName": "Christian", "surname": "Frueh", "__typename": "ArticleAuthorType" }, { "affiliation": "Google Research", "fullName": "John Lewis", "givenName": "John", "surname": "Lewis", "__typename": "ArticleAuthorType" }, { "affiliation": "Google Research", "fullName": "Chris Bregler", "givenName": "Chris", "surname": "Bregler", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "2754-2763", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeJw7Rt8MU", "name": "pcvpr202145090-09577593s1-mm_450900c754.zip", "size": "2.54 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09577593s1-mm_450900c754.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900c744", "articleId": "1yeIUseywtG", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900c764", "articleId": "1yeHHMT7mxO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209c101", "title": "A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c101/12OmNBzRNty", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2016/0979/0/0979a492", "title": "Three Dimensional Reconstruction from Single Uniform Texture Image with Unknown Lighting Conditions", "doi": null, "abstractUrl": "/proceedings-article/nbis/2016/0979a492/12OmNCd2rVL", "parentPublication": { "id": "proceedings/nbis/2016/0979/0", "title": "2016 19th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/06/mcg2013060036", "title": "Fabricating 3D Figurines with Personalized Faces", "doi": null, "abstractUrl": "/magazine/cg/2013/06/mcg2013060036/13rRUzp02qx", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/11/08359431", "title": "3D Reconstruction of “In-the-Wild” Faces in Images and Videos", "doi": null, "abstractUrl": "/journal/tp/2018/11/08359431/143fh0r3Al2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d847", "title": "FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d847/1BmFXTjNhrG", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200n3809", "title": "Learned Spatial Representations for Few-shot Talking-Head Synthesis", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3809/1BmG5mhQ1NK", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d377", "title": "Expressive Talking Head Generation with Granular Audio-Visual Control", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d377/1H1iVqbQEKI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042567", "title": "LipNeRF: What is the right feature space to lip-sync a NeRF?", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042567/1KOv4ewUoUg", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f198", "title": "Towards Generating Ultra-High Resolution Talking-Face Videos with Lip synchronization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f198/1L8qtg44UjC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09557828", "title": "3D Talking Face With Personalized Pose Dynamics", "doi": null, "abstractUrl": "/journal/tg/2023/02/09557828/1xquHkBQ2xa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeLFZU81zy", "doi": "10.1109/CVPR46437.2021.00416", "title": "Pose-Controllable Talking Face Generation by Implicitly Modularized Audio-Visual Representation", "normalizedTitle": "Pose-Controllable Talking Face Generation by Implicitly Modularized Audio-Visual Representation", "abstract": "While accurate lip synchronization has been achieved for arbitrary-subject audio-driven talking face generation, the problem of how to efficiently drive the head pose remains. Previous methods rely on pre-estimated structural information such as landmarks and 3D parameters, aiming to generate personalized rhythmic movements. However, the inaccuracy of such estimated information under extreme conditions would lead to degradation problems. In this paper, we propose a clean yet effective framework to generate pose-controllable talking faces. We operate on non-aligned raw face images, using only a single photo as an identity reference. The key is to modularize audio-visual representations by devising an implicit low-dimension pose code. Substantially, both speech content and head pose information lie in a joint non-identity embedding space. While speech content information can be defined by learning the intrinsic synchronization between audio-visual modalities, we identify that a pose code will be complementarily learned in a modulated convolution-based reconstruction framework.Extensive experiments show that our method generates accurately lip-synced talking faces whose poses are controllable by other videos. Moreover, our model has multiple advanced capabilities including extreme view robustness and talking face frontalization.<sup>1</sup>", "abstracts": [ { "abstractType": "Regular", "content": "While accurate lip synchronization has been achieved for arbitrary-subject audio-driven talking face generation, the problem of how to efficiently drive the head pose remains. Previous methods rely on pre-estimated structural information such as landmarks and 3D parameters, aiming to generate personalized rhythmic movements. However, the inaccuracy of such estimated information under extreme conditions would lead to degradation problems. In this paper, we propose a clean yet effective framework to generate pose-controllable talking faces. We operate on non-aligned raw face images, using only a single photo as an identity reference. The key is to modularize audio-visual representations by devising an implicit low-dimension pose code. Substantially, both speech content and head pose information lie in a joint non-identity embedding space. While speech content information can be defined by learning the intrinsic synchronization between audio-visual modalities, we identify that a pose code will be complementarily learned in a modulated convolution-based reconstruction framework.Extensive experiments show that our method generates accurately lip-synced talking faces whose poses are controllable by other videos. Moreover, our model has multiple advanced capabilities including extreme view robustness and talking face frontalization.<sup>1</sup>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While accurate lip synchronization has been achieved for arbitrary-subject audio-driven talking face generation, the problem of how to efficiently drive the head pose remains. Previous methods rely on pre-estimated structural information such as landmarks and 3D parameters, aiming to generate personalized rhythmic movements. However, the inaccuracy of such estimated information under extreme conditions would lead to degradation problems. In this paper, we propose a clean yet effective framework to generate pose-controllable talking faces. We operate on non-aligned raw face images, using only a single photo as an identity reference. The key is to modularize audio-visual representations by devising an implicit low-dimension pose code. Substantially, both speech content and head pose information lie in a joint non-identity embedding space. While speech content information can be defined by learning the intrinsic synchronization between audio-visual modalities, we identify that a pose code will be complementarily learned in a modulated convolution-based reconstruction framework.Extensive experiments show that our method generates accurately lip-synced talking faces whose poses are controllable by other videos. Moreover, our model has multiple advanced capabilities including extreme view robustness and talking face frontalization.1", "fno": "4.509E179", "keywords": [ "Audio Visual Systems", "Computer Animation", "Face Recognition", "Image Reconstruction", "Learning Artificial Intelligence", "Pose Estimation", "Speech Processing", "Implicitly Modularized Audio Visual Representation", "Accurate Lip Synchronization", "Pre Estimated Structural Information", "Personalized Rhythmic Movements", "Estimated Information", "Degradation Problems", "Clean Yet Effective Framework", "Pose Controllable Talking Faces", "Nonaligned Raw Face Images", "Audio Visual Representations", "Information Lie", "Nonidentity Embedding Space", "Speech Content Information", "Intrinsic Synchronization", "Audio Visual Modalities", "Pose Code", "Modulated Convolution Based Reconstruction Framework", "Faces Whose Poses", "Extreme View Robustness", "Talking Face Frontalization", "Pose Controllable Talking Face Generation", "Three Dimensional Displays", "Speech Coding", "Face Recognition", "Lips", "Speech Recognition", "Aerospace Electronics", "Robustness" ], "authors": [ { "affiliation": "The Chinese University of Hong Kong,CUHK - SenseTime Joint Lab", "fullName": "Hang Zhou", "givenName": "Hang", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "SenseTime Research", "fullName": "Yasheng Sun", "givenName": "Yasheng", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "SenseTime Research", "fullName": "Wayne Wu", "givenName": "Wayne", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Chen Change Loy", "givenName": "Chen Change", "surname": "Loy", "__typename": "ArticleAuthorType" }, { "affiliation": "The Chinese University of Hong Kong,CUHK - SenseTime Joint Lab", "fullName": "Xiaogang Wang", "givenName": "Xiaogang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Ziwei Liu", "givenName": "Ziwei", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "4174-4184", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeLFRjkWqs", "name": "pcvpr202145090-09578337s1-mm_450900e174.zip", "size": "17.3 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578337s1-mm_450900e174.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "4.509E169", "articleId": "1yeKYryEsgM", "__typename": "AdjacentArticleType" }, "next": { "fno": "4.509E190", "articleId": "1yeKyYl2HcI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457d444", "title": "Lip Reading Sentences in the Wild", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d444/12OmNvoWUY4", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/2/73102579", "title": "Speech-assisted lip synchronization in audio-visual communications", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73102579/12OmNyQph9e", "parentPublication": { "id": "proceedings/icip/1995/7310/2", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/08585066", "title": "Deep Audio-Visual Speech Recognition", "doi": null, "abstractUrl": "/journal/tp/2022/12/08585066/17D45VtKiwZ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d847", "title": "FACIAL: Synthesizing Dynamic Talking Face with Implicit Attribute Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d847/1BmFXTjNhrG", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d377", "title": "Expressive Talking Head Generation with Granular Audio-Visual Control", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d377/1H1iVqbQEKI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956316", "title": "Audio-Driven Deformation Flow for Effective Lip Reading", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956316/1IHoFFBmjcc", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042567", "title": "LipNeRF: What is the right feature space to lip-sync a NeRF?", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042567/1KOv4ewUoUg", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2019/4604/0/460400a787", "title": "Mining Audio, Text and Visual Information for Talking Face Generation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2019/460400a787/1h5XEYiq4DK", "parentPublication": { "id": "proceedings/icdm/2019/4604/0", "title": "2019 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412454", "title": "Audio-Visual Speech Recognition Using A Two-Step Feature Fusion Strategy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412454/1tmjhXptDuo", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5490", "title": "VisualVoice: Audio-Visual Speech Separation with Cross-Modal Consistency", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5490/1yeIBGdgSAw", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4r3R2", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNARRYl8", "doi": "10.1109/CVPR.2009.5206764", "title": "Illumination and spatially varying specular reflectance from a single view", "normalizedTitle": "Illumination and spatially varying specular reflectance from a single view", "abstract": "Estimating the illumination and the reflectance properties of an object surface from a sparse set of images is an important but inherently ill-posed problem. The problem becomes even harder if we wish to account for the spatial variation of material properties on the surface. In this paper, we derive a novel method for estimating the spatially varying specular reflectance properties, of a surface of known geometry, as well as the illumination distribution from a specular-only image, for instance, captured using polarization to separate reflection components. Unlike previous work, we do not assume the illumination to be a single point light source. We model specular reflection with a spherical statistical distribution and encode the spatial variation with radial basis functions of its parameters. This allows us to formulate the simultaneous estimation of spatially varying specular reflectance and illumination as a sound probabilistic inference problem, in particular, using Csiszar's I-divergence measure. To solve it, we derive an iterative algorithm similar to expectation maximization. We demonstrate the effectiveness of the method on synthetic and real-world scenes.", "abstracts": [ { "abstractType": "Regular", "content": "Estimating the illumination and the reflectance properties of an object surface from a sparse set of images is an important but inherently ill-posed problem. The problem becomes even harder if we wish to account for the spatial variation of material properties on the surface. In this paper, we derive a novel method for estimating the spatially varying specular reflectance properties, of a surface of known geometry, as well as the illumination distribution from a specular-only image, for instance, captured using polarization to separate reflection components. Unlike previous work, we do not assume the illumination to be a single point light source. We model specular reflection with a spherical statistical distribution and encode the spatial variation with radial basis functions of its parameters. This allows us to formulate the simultaneous estimation of spatially varying specular reflectance and illumination as a sound probabilistic inference problem, in particular, using Csiszar's I-divergence measure. To solve it, we derive an iterative algorithm similar to expectation maximization. We demonstrate the effectiveness of the method on synthetic and real-world scenes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Estimating the illumination and the reflectance properties of an object surface from a sparse set of images is an important but inherently ill-posed problem. The problem becomes even harder if we wish to account for the spatial variation of material properties on the surface. In this paper, we derive a novel method for estimating the spatially varying specular reflectance properties, of a surface of known geometry, as well as the illumination distribution from a specular-only image, for instance, captured using polarization to separate reflection components. Unlike previous work, we do not assume the illumination to be a single point light source. We model specular reflection with a spherical statistical distribution and encode the spatial variation with radial basis functions of its parameters. This allows us to formulate the simultaneous estimation of spatially varying specular reflectance and illumination as a sound probabilistic inference problem, in particular, using Csiszar's I-divergence measure. To solve it, we derive an iterative algorithm similar to expectation maximization. We demonstrate the effectiveness of the method on synthetic and real-world scenes.", "fno": "05206764", "keywords": [ "Expectation Maximisation Algorithm", "Image Coding", "Iterative Methods", "Radial Basis Function Networks", "Statistical Distributions", "Spatial Varying Specular Reflectance", "Illumination Estimation", "Ill Posed Problem", "Illumination Distribution", "Polarization", "Specular Reflection Model", "Spherical Statistical Distribution", "Radial Basis Function", "A Sound Probabilistic Inference Problem", "Csiszar I Divergence Measure", "Expectation Maximization", "Iterative Algorithm", "Lighting", "Reflectivity", "Optical Reflection", "Material Properties", "Geometry", "Optical Polarization", "Light Sources", "Acoustic Reflection", "Statistical Distributions", "Particle Measurements" ], "authors": [ { "affiliation": "Department of Visual Communication Design, Kyushu University, Japan", "fullName": "Kenji Hara", "givenName": "Kenji", "surname": "Hara", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Drexel University, USA", "fullName": "Ko Nishino", "givenName": "Ko", "surname": "Nishino", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "619-626", "year": "2009", "issn": "1063-6919", "isbn": "978-1-4244-3992-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05206763", "articleId": "12OmNznCl36", "__typename": "AdjacentArticleType" }, "next": { "fno": "05206761", "articleId": "12OmNviZldk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/robot/1989/1938/0/00099963", "title": "Shape and reflectance from an image sequence generated using extended sources", "doi": null, "abstractUrl": "/proceedings-article/robot/1989/00099963/12OmNAq3hRr", "parentPublication": { "id": "proceedings/robot/1989/1938/0", "title": "1989 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2004/2128/2/212820895", "title": "Dense Estimation of Surface Reflectance Properties Based on Inverse Global Illumination Rendering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2004/212820895/12OmNCcbE8h", "parentPublication": { "id": "proceedings/icpr/2004/2128/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139559", "title": "Calculating surface reflectance using a single-bounce model of mutual reflection", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139559/12OmNvAAtIF", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/00937573", "title": "Determining reflectance parameters and illumination distribution from a sparse set of images for view-dependent image synthesis", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/00937573/12OmNwIYZFm", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223148", "title": "Diffuse reflection (intensity reflectance model)", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223148/12OmNwlZu1a", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbmcv/1995/7021/0/00514684", "title": "Reflectance analysis under solar illumination", "doi": null, "abstractUrl": "/proceedings-article/pbmcv/1995/00514684/12OmNxbW4O4", "parentPublication": { "id": "proceedings/pbmcv/1995/7021/0", "title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/11/i1059", "title": "Polarization-Based Material Classification from Specular Reflection", "doi": null, "abstractUrl": "/journal/tp/1990/11/i1059/13rRUIJuxqv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1991/11/i1139", "title": "Determining Reflectance Properties of an Object Using Range and Brightness Images", "doi": null, "abstractUrl": "/journal/tp/1991/11/i1139/13rRUyfKIEd", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1991/07/i0635", "title": "Constraining Object Features Using a Polarization Reflectance Model", "doi": null, "abstractUrl": "/journal/tp/1991/07/i0635/13rRUyoPSPY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c548", "title": "Separating Partially-Polarized Diffuse and Specular Reflection Components under Unpolarized Light Sources", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c548/1KxVkSYWbxC", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNviZlH1", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "acronym": "sitis", "groupId": "1002425", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNroijaF", "doi": "10.1109/SITIS.2013.78", "title": "An LED-Based Spectral Imaging System for Surface Reflectance and Normal Estimation", "normalizedTitle": "An LED-Based Spectral Imaging System for Surface Reflectance and Normal Estimation", "abstract": "An LED-based spectral imaging system is proposed for estimating surface spectral reflectances and surface normals of art painting. The imaging system is decomposed into a multi-spectral lighting system and a digital camera. The previous lighting system has some essential limitation and inconvenience, which includes low luminance, time consumption, and expensive cost. For the purpose of solving the problems, this paper presents an LED-based spectral lighting system. This is an active illumination system in which spectral light can be controlled by a computer. We note that LED lamps with different peak wavelengths are available recently and the band width of LED light is narrow. The luminance level of emitted light is much higher and the image acquisition is much faster by changing spectral light quickly. First, we construct a flat lighting system using six LEDs with different peak wavelengths to estimate surface spectral reflectances. The surface spectral reflectances of objects are recovered from noisy spectral camera data by the Wiener estimator. Next, we construct a dome lighting system using several sets consisting of seven LEDs, mainly to estimate surface normals of art paintings. The photometric stereo technique is used for estimating the surface normal vector at every pixel point. The feasibility of the proposed method is examined in experiments using a Mac Beth Color Checker chart and an oil painting.", "abstracts": [ { "abstractType": "Regular", "content": "An LED-based spectral imaging system is proposed for estimating surface spectral reflectances and surface normals of art painting. The imaging system is decomposed into a multi-spectral lighting system and a digital camera. The previous lighting system has some essential limitation and inconvenience, which includes low luminance, time consumption, and expensive cost. For the purpose of solving the problems, this paper presents an LED-based spectral lighting system. This is an active illumination system in which spectral light can be controlled by a computer. We note that LED lamps with different peak wavelengths are available recently and the band width of LED light is narrow. The luminance level of emitted light is much higher and the image acquisition is much faster by changing spectral light quickly. First, we construct a flat lighting system using six LEDs with different peak wavelengths to estimate surface spectral reflectances. The surface spectral reflectances of objects are recovered from noisy spectral camera data by the Wiener estimator. Next, we construct a dome lighting system using several sets consisting of seven LEDs, mainly to estimate surface normals of art paintings. The photometric stereo technique is used for estimating the surface normal vector at every pixel point. The feasibility of the proposed method is examined in experiments using a Mac Beth Color Checker chart and an oil painting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An LED-based spectral imaging system is proposed for estimating surface spectral reflectances and surface normals of art painting. The imaging system is decomposed into a multi-spectral lighting system and a digital camera. The previous lighting system has some essential limitation and inconvenience, which includes low luminance, time consumption, and expensive cost. For the purpose of solving the problems, this paper presents an LED-based spectral lighting system. This is an active illumination system in which spectral light can be controlled by a computer. We note that LED lamps with different peak wavelengths are available recently and the band width of LED light is narrow. The luminance level of emitted light is much higher and the image acquisition is much faster by changing spectral light quickly. First, we construct a flat lighting system using six LEDs with different peak wavelengths to estimate surface spectral reflectances. The surface spectral reflectances of objects are recovered from noisy spectral camera data by the Wiener estimator. Next, we construct a dome lighting system using several sets consisting of seven LEDs, mainly to estimate surface normals of art paintings. The photometric stereo technique is used for estimating the surface normal vector at every pixel point. The feasibility of the proposed method is examined in experiments using a Mac Beth Color Checker chart and an oil painting.", "fno": "3211a441", "keywords": [ "Lighting", "Light Emitting Diodes", "Painting", "Reflectivity", "Cameras", "Estimation", "Active Illumination", "LED Based Spectral Imaging System", "Spectral Reflectance", "Surface Normal", "Painting Surface" ], "authors": [ { "affiliation": null, "fullName": "Keita Hirai", "givenName": "Keita", "surname": "Hirai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tetsushi Tanimoto", "givenName": "Tetsushi", "surname": "Tanimoto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kazuya Yamamoto", "givenName": "Kazuya", "surname": "Yamamoto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Takahiko Horiuchi", "givenName": "Takahiko", "surname": "Horiuchi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shoji Tominaga", "givenName": "Shoji", "surname": "Tominaga", "__typename": "ArticleAuthorType" } ], "idPrefix": "sitis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "441-447", "year": "2013", "issn": null, "isbn": "978-1-4799-3211-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3211a434", "articleId": "12OmNC1Gucd", "__typename": "AdjacentArticleType" }, "next": { "fno": "3211a448", "articleId": "12OmNzxPTLR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2014/6636/0/6636a445", "title": "Realization of LED Urban Lighting Network Based on POWERLINK Industrial Ethernet", "doi": null, "abstractUrl": "/proceedings-article/icicta/2014/6636a445/12OmNBTawtH", "parentPublication": { "id": "proceedings/icicta/2014/6636/0", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2017/6517/0/07947047", "title": "Spectral-Temporal LED Lighting Modules for Reproducing Daily and Seasonal Solar Circadian Rhythmicities", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2017/07947047/12OmNrYlmCk", "parentPublication": { "id": "proceedings/smartcomp/2017/6517/0", "title": "2017 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2016/9036/0/9036a355", "title": "Applicability of LED-Based Light Sources for Diabetic Retinopathy Detection in Retinal Imaging", "doi": null, "abstractUrl": "/proceedings-article/cbms/2016/9036a355/12OmNxu6pbL", "parentPublication": { "id": "proceedings/cbms/2016/9036/0", "title": "2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2022/1643/0/09762392", "title": "RGB LED Bulbs for Communication, Harvesting and Sensing", "doi": null, "abstractUrl": "/proceedings-article/percom/2022/09762392/1CUOglizcqs", "parentPublication": { "id": "proceedings/percom/2022/1643/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600m2642", "title": "Optimal LED Spectral Multiplexing for NIR2RGB Translation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600m2642/1H1hZJsqbw4", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2022/6495/0/649500a281", "title": "Lighting Spectral Power Distribution Estimation With RGB Camera", "doi": null, "abstractUrl": "/proceedings-article/sitis/2022/649500a281/1MeoGuSgRPO", "parentPublication": { "id": "proceedings/sitis/2022/6495/0", "title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctec/2017/5784/0/578400a295", "title": "Study on LED Color Mixing for Stage Lighting Based on Locus Fitting of Blackbody", "doi": null, "abstractUrl": "/proceedings-article/icctec/2017/578400a295/1cks7sBlY8U", "parentPublication": { "id": "proceedings/icctec/2017/5784/0", "title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icectt/2020/9928/0/992800a219", "title": "Energy Saving Ability for LED Ring Alignments with Optimized LED SAHPs in Dimming Visible Light Communications", "doi": null, "abstractUrl": "/proceedings-article/icectt/2020/992800a219/1oa5fTUi1fa", "parentPublication": { "id": "proceedings/icectt/2020/9928/0", "title": "2020 5th International Conference on Electromechanical Control Technology and Transportation (ICECTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2021/1952/0/09466267", "title": "Spectral MVIR: Joint Reconstruction of 3D Shape and Spectral Reflectance", "doi": null, "abstractUrl": "/proceedings-article/iccp/2021/09466267/1uSSWr7wnkY", "parentPublication": { "id": "proceedings/iccp/2021/1952/0", "title": "2021 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09557800", "title": "Neural Reflectance Capture in the View-Illumination Domain", "doi": null, "abstractUrl": "/journal/tg/2023/02/09557800/1xquQN6emfS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uSSOI3aow0", "title": "2021 IEEE International Conference on Computational Photography (ICCP)", "acronym": "iccp", "groupId": "1800125", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uSSWr7wnkY", "doi": "10.1109/ICCP51581.2021.9466267", "title": "Spectral MVIR: Joint Reconstruction of 3D Shape and Spectral Reflectance", "normalizedTitle": "Spectral MVIR: Joint Reconstruction of 3D Shape and Spectral Reflectance", "abstract": "Reconstructing an object&#x0027;s high-quality 3D shape with inherent spectral reflectance property, beyond typical device-dependent RGB albedos, opens the door to applications requiring a high-fidelity 3D model in terms of both geometry and photometry. In this paper, we propose a novel Multi-View Inverse Rendering (MVIR) method called Spectral MVIR for jointly reconstructing the 3D shape and the spectral reflectance for each point of object surfaces from multi-view images captured using a standard RGB camera and low-cost lighting equipment such as an LED bulb or an LED projector. Our main contributions are twofold: (i) We present a rendering model that considers both geometric and photometric principles in the image formation by explicitly considering camera spectral sensitivity, light&#x0027;s spectral power distribution, and light source positions. (ii) Based on the derived model, we build a cost-optimization MVIR framework for the joint reconstruction of the 3D shape and the per-vertex spectral reflectance while estimating the light source positions and the shadows. Different from most existing spectral-3D acquisition methods, our method does not require expensive special equipment and cumbersome geometric calibration. Experimental results using both synthetic and real-world data demonstrate that our Spectral MVIR can acquire a high-quality 3D model with accurate spectral reflectance property.", "abstracts": [ { "abstractType": "Regular", "content": "Reconstructing an object&#x0027;s high-quality 3D shape with inherent spectral reflectance property, beyond typical device-dependent RGB albedos, opens the door to applications requiring a high-fidelity 3D model in terms of both geometry and photometry. In this paper, we propose a novel Multi-View Inverse Rendering (MVIR) method called Spectral MVIR for jointly reconstructing the 3D shape and the spectral reflectance for each point of object surfaces from multi-view images captured using a standard RGB camera and low-cost lighting equipment such as an LED bulb or an LED projector. Our main contributions are twofold: (i) We present a rendering model that considers both geometric and photometric principles in the image formation by explicitly considering camera spectral sensitivity, light&#x0027;s spectral power distribution, and light source positions. (ii) Based on the derived model, we build a cost-optimization MVIR framework for the joint reconstruction of the 3D shape and the per-vertex spectral reflectance while estimating the light source positions and the shadows. Different from most existing spectral-3D acquisition methods, our method does not require expensive special equipment and cumbersome geometric calibration. Experimental results using both synthetic and real-world data demonstrate that our Spectral MVIR can acquire a high-quality 3D model with accurate spectral reflectance property.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Reconstructing an object's high-quality 3D shape with inherent spectral reflectance property, beyond typical device-dependent RGB albedos, opens the door to applications requiring a high-fidelity 3D model in terms of both geometry and photometry. In this paper, we propose a novel Multi-View Inverse Rendering (MVIR) method called Spectral MVIR for jointly reconstructing the 3D shape and the spectral reflectance for each point of object surfaces from multi-view images captured using a standard RGB camera and low-cost lighting equipment such as an LED bulb or an LED projector. Our main contributions are twofold: (i) We present a rendering model that considers both geometric and photometric principles in the image formation by explicitly considering camera spectral sensitivity, light's spectral power distribution, and light source positions. (ii) Based on the derived model, we build a cost-optimization MVIR framework for the joint reconstruction of the 3D shape and the per-vertex spectral reflectance while estimating the light source positions and the shadows. Different from most existing spectral-3D acquisition methods, our method does not require expensive special equipment and cumbersome geometric calibration. Experimental results using both synthetic and real-world data demonstrate that our Spectral MVIR can acquire a high-quality 3D model with accurate spectral reflectance property.", "fno": "09466267", "keywords": [ "Calibration", "Cameras", "Image Colour Analysis", "Image Reconstruction", "Image Sensors", "Light Sources", "Lighting", "Optical Projectors", "Photometry", "Rendering Computer Graphics", "Spectral Analysis", "Accurate Spectral Reflectance Property", "High Quality 3 D Model", "Different From Most Existing Spectral 3 D Acquisition Methods", "Per Vertex Spectral Reflectance", "Cost Optimization MVIR Framework", "Light Source Positions", "Camera Spectral Sensitivity", "Rendering Model", "Low Cost Lighting Equipment", "Multiview Images", "Novel Multi View Inverse Rendering Method", "High Fidelity 3 D Model", "Typical Device Dependent RGB Albedos", "Inherent Spectral Reflectance Property", "High Quality 3 D Shape", "Joint Reconstruction", "Spectral MVIR", "Reflectivity", "Solid Modeling", "Three Dimensional Displays", "Shape", "Rendering Computer Graphics", "Light Emitting Diodes", "Cameras", "Inverse Rendering", "Multi View 3 D Reconstruction", "Spectral Reflectance Estimation" ], "authors": [ { "affiliation": "School of Engineering, Tokyo Institute of Technology,Department of Systems and Control Engineering,Tokyo,Japan", "fullName": "Chunyu Li", "givenName": "Chunyu", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineering, Tokyo Institute of Technology,Department of Systems and Control Engineering,Tokyo,Japan", "fullName": "Yusuke Monno", "givenName": "Yusuke", "surname": "Monno", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineering, Tokyo Institute of Technology,Department of Systems and Control Engineering,Tokyo,Japan", "fullName": "Masatoshi Okutomi", "givenName": "Masatoshi", "surname": "Okutomi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-05-01T00:00:00", "pubType": "proceedings", "pages": "1-12", "year": "2021", "issn": null, "isbn": "978-1-6654-1952-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1uSSWh7S2o8", "name": "piccp202119520-09466267s1-09-045-supp.zip", "size": "22.2 MB", "location": "https://www.computer.org/csdl/api/v1/extra/piccp202119520-09466267s1-09-045-supp.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "09466273", "articleId": "1uSSXDOinlu", "__typename": "AdjacentArticleType" }, "next": { "fno": "09466256", "articleId": "1uSSPMnUs8M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2012/1611/0/06239343", "title": "Recovering spectral reflectance under commonly available lighting conditions", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06239343/12OmNBTs7yq", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/2/01315168", "title": "Recovering shape and reflectance model of non-lambertian objects from multiple views", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315168/12OmNBigFyE", "parentPublication": { "id": "proceedings/cvpr/2004/2158/2", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2013/3211/0/3211a441", "title": "An LED-Based Spectral Imaging System for Surface Reflectance and Normal Estimation", "doi": null, "abstractUrl": "/proceedings-article/sitis/2013/3211a441/12OmNroijaF", "parentPublication": { "id": "proceedings/sitis/2013/3211/0", "title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbmcv/1995/7021/0/00514684", "title": "Reflectance analysis under solar illumination", "doi": null, "abstractUrl": "/proceedings-article/pbmcv/1995/00514684/12OmNxbW4O4", "parentPublication": { "id": "proceedings/pbmcv/1995/7021/0", "title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/04/07383338", "title": "Inter-reflection Compensation of Immersive Projection Display by Spatio-Temporal Screen Reflectance Modulation", "doi": null, "abstractUrl": "/journal/tg/2016/04/07383338/13rRUwInvfc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/03/07875163", "title": "SVBRDF-Invariant Shape and Reflectance Estimation from a Light-Field Camera", "doi": null, "abstractUrl": "/journal/tp/2018/03/07875163/13rRUwbJD6c", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/01/ttp2014010086", "title": "Discriminative Illumination: Per-Pixel Classification of Raw Materials Based on Optimal Projections of Spectral BRDF", "doi": null, "abstractUrl": "/journal/tp/2014/01/ttp2014010086/13rRUwdIOW1", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/04/v0663", "title": "Seeing People in Different Light-Joint Shape, Motion, and Reflectance Capture", "doi": null, "abstractUrl": "/journal/tg/2007/04/v0663/13rRUxjQyp6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/07/09064908", "title": "Shape and Reflectance Reconstruction Using Concentric Multi-Spectral Light Field", "doi": null, "abstractUrl": "/journal/tp/2020/07/09064908/1iZGtGUiMhO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09557800", "title": "Neural Reflectance Capture in the View-Illumination Domain", "doi": null, "abstractUrl": "/journal/tg/2023/02/09557800/1xquQN6emfS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4O", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "acronym": "vissoft", "groupId": "1001231", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBInLjl", "doi": "10.1109/VISSOFT.2014.12", "title": "Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments", "normalizedTitle": "Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments", "abstract": "Although spreadsheets are often faulty, end-users like them for their flexibility. Most existing approaches to spreadsheet diagnosis are fully automated and use static analysis techniques to find anomalies in formulas or methods to derive test cases without user interaction. The few more interactive approaches are based on values already present in spreadsheets as well. In our work, we advance the idea of testing spreadsheets with user-defined test scenarios but encourage visually aided creation of independent test cases by separating the definition of test scenarios from the specific values present in the spreadsheet - just like test code is separated from production code in professional software. We combine the testing approach with static analysis and integrate it into a common visual spreadsheet environment named SIFEI. It supports users in interactively creating, executing, and analyzing their own test scenarios with a number of visual markers. Findings from two qualitative studies indicate that the concept is suitable for casual spreadsheet users.", "abstracts": [ { "abstractType": "Regular", "content": "Although spreadsheets are often faulty, end-users like them for their flexibility. Most existing approaches to spreadsheet diagnosis are fully automated and use static analysis techniques to find anomalies in formulas or methods to derive test cases without user interaction. The few more interactive approaches are based on values already present in spreadsheets as well. In our work, we advance the idea of testing spreadsheets with user-defined test scenarios but encourage visually aided creation of independent test cases by separating the definition of test scenarios from the specific values present in the spreadsheet - just like test code is separated from production code in professional software. We combine the testing approach with static analysis and integrate it into a common visual spreadsheet environment named SIFEI. It supports users in interactively creating, executing, and analyzing their own test scenarios with a number of visual markers. Findings from two qualitative studies indicate that the concept is suitable for casual spreadsheet users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although spreadsheets are often faulty, end-users like them for their flexibility. Most existing approaches to spreadsheet diagnosis are fully automated and use static analysis techniques to find anomalies in formulas or methods to derive test cases without user interaction. The few more interactive approaches are based on values already present in spreadsheets as well. In our work, we advance the idea of testing spreadsheets with user-defined test scenarios but encourage visually aided creation of independent test cases by separating the definition of test scenarios from the specific values present in the spreadsheet - just like test code is separated from production code in professional software. We combine the testing approach with static analysis and integrate it into a common visual spreadsheet environment named SIFEI. It supports users in interactively creating, executing, and analyzing their own test scenarios with a number of visual markers. Findings from two qualitative studies indicate that the concept is suitable for casual spreadsheet users.", "fno": "6150a011", "keywords": [ "Testing", "Visualization", "Inspection", "Software", "Manuals", "Spreadsheet Programs", "Educational Institutions", "Diagnosis", "Spreadsheet", "Anomaly", "Detection", "Testing", "Defect", "Failure" ], "authors": [ { "affiliation": null, "fullName": "Daniel Kulesz", "givenName": "Daniel", "surname": "Kulesz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jonas Scheurich", "givenName": "Jonas", "surname": "Scheurich", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fabian Beck", "givenName": "Fabian", "surname": "Beck", "__typename": "ArticleAuthorType" } ], "idPrefix": "vissoft", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "11-19", "year": "2014", "issn": null, "isbn": "978-1-4799-6150-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6150a001", "articleId": "12OmNzcPA2c", "__typename": "AdjacentArticleType" }, "next": { "fno": "6150a020", "articleId": "12OmNwGZNF5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/issre/2002/1763/0/17630257", "title": "Test Reuse in the Spreadsheet Paradigm", "doi": null, "abstractUrl": "/proceedings-article/issre/2002/17630257/12OmNALUowJ", "parentPublication": { "id": "proceedings/issre/2002/1763/0", "title": "13th International Symposium on Software Reliability Engineering, 2002. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2016/0252/0/07739679", "title": "Finding errors in the Enron spreadsheet corpus", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2016/07739679/12OmNAle6pg", "parentPublication": { "id": "proceedings/vlhcc/2016/0252/0", "title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2010/8485/0/05635221", "title": "Struggling to Excel: A Field Study of Challenges Faced by Spreadsheet Users", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635221/12OmNBfqG4z", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405299", "title": "Refactoring meets spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405299/12OmNBkxsxl", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/1995/7086/0/70860002", "title": "A FCCM for dataflow (spreadsheet) programs", "doi": null, "abstractUrl": "/proceedings-article/fccm/1995/70860002/12OmNroij91", "parentPublication": { "id": "proceedings/fccm/1995/7086/0", "title": "Field-Programmable Custom Computing Machines, Annual IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117587", "title": "Spreadsheet Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117587/12OmNxG1yJV", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2012/5048/0/06405435", "title": "Debugging Spreadsheets: A CSP-based Approach", "doi": null, "abstractUrl": "/proceedings-article/issrew/2012/06405435/12OmNy7h35k", "parentPublication": { "id": "proceedings/issrew/2012/5048/0", "title": "2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2017/5501/0/07884634", "title": "Spreadsheet testing in practice", "doi": null, "abstractUrl": "/proceedings-article/saner/2017/07884634/12OmNyOHG4Y", "parentPublication": { "id": "proceedings/saner/2017/5501/0", "title": "2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/1990/03/s3078", "title": "A 3D Spreadsheet Based on Intensional Logic", "doi": null, "abstractUrl": "/magazine/so/1990/03/s3078/13rRUIJcWjy", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506490", "title": "Fritz: A Tool for Spreadsheet Quality Assurance", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506490/17D45WZZ7Ek", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAndiq7", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "acronym": "icse-c", "groupId": "1002125", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBKW9B8", "doi": "10.1109/ICSE-C.2017.141", "title": "Towards systematic spreadsheet construction processes", "normalizedTitle": "Towards systematic spreadsheet construction processes", "abstract": "Spreadsheets are used in professional business contexts to make decisions based on collected data. Usually, these spreadsheets are developed by end users (e.g. accountants) in an ad-hoc way. The effect of this practice is that the business logic of a concrete spreadsheet is not explicit to them. Thus, its correctness is hard to assess and users have to trust. We present an approach where structure and computational behavior of a spreadsheet are specified by a model with a process-like notation based on combining pre-defined functional spreadsheet services with typed interfaces. This allows for a consistent construction of a spreadsheet by defining its structure and computational behavior as well as filling it with data and executing the defined computational behavior. Thus, concrete spreadsheets are equipped with a specification of their construction process. This supports their understanding and correct usage, even in case of legacy spreadsheets. The approach has been developed in cooperation with an industrial partner from the automotive industry.", "abstracts": [ { "abstractType": "Regular", "content": "Spreadsheets are used in professional business contexts to make decisions based on collected data. Usually, these spreadsheets are developed by end users (e.g. accountants) in an ad-hoc way. The effect of this practice is that the business logic of a concrete spreadsheet is not explicit to them. Thus, its correctness is hard to assess and users have to trust. We present an approach where structure and computational behavior of a spreadsheet are specified by a model with a process-like notation based on combining pre-defined functional spreadsheet services with typed interfaces. This allows for a consistent construction of a spreadsheet by defining its structure and computational behavior as well as filling it with data and executing the defined computational behavior. Thus, concrete spreadsheets are equipped with a specification of their construction process. This supports their understanding and correct usage, even in case of legacy spreadsheets. The approach has been developed in cooperation with an industrial partner from the automotive industry.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spreadsheets are used in professional business contexts to make decisions based on collected data. Usually, these spreadsheets are developed by end users (e.g. accountants) in an ad-hoc way. The effect of this practice is that the business logic of a concrete spreadsheet is not explicit to them. Thus, its correctness is hard to assess and users have to trust. We present an approach where structure and computational behavior of a spreadsheet are specified by a model with a process-like notation based on combining pre-defined functional spreadsheet services with typed interfaces. This allows for a consistent construction of a spreadsheet by defining its structure and computational behavior as well as filling it with data and executing the defined computational behavior. Thus, concrete spreadsheets are equipped with a specification of their construction process. This supports their understanding and correct usage, even in case of legacy spreadsheets. The approach has been developed in cooperation with an industrial partner from the automotive industry.", "fno": "1589a356", "keywords": [ "Unified Modeling Language", "Business", "Computational Modeling", "Object Oriented Modeling", "Software Engineering", "Electronic Mail", "Automobiles", "Model Driven Engineering", "Situational Method Engineering", "Construction Process", "Spreadsheet" ], "authors": [ { "affiliation": "HASLab, Univ. do Minho, Braga, Portugal", "fullName": "Jorge Mendes", "givenName": "Jorge", "surname": "Mendes", "__typename": "ArticleAuthorType" }, { "affiliation": "NOVA LINCS, Univ. NOVA de Lisboa, Lisbon, Portugal", "fullName": "Jacome Cunha", "givenName": "Jacome", "surname": "Cunha", "__typename": "ArticleAuthorType" }, { "affiliation": "Bosch Car Multimedia, Portugal", "fullName": "Francisco Duarte", "givenName": "Francisco", "surname": "Duarte", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Paderborn, Paderborn, Germany", "fullName": "Gregor Engels", "givenName": "Gregor", "surname": "Engels", "__typename": "ArticleAuthorType" }, { "affiliation": "HASLab, Univ. do Minho, Braga, Portugal", "fullName": "Joao Saraiva", "givenName": "Joao", "surname": "Saraiva", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Paderborn, Paderborn, Germany", "fullName": "Stefan Sauer", "givenName": "Stefan", "surname": "Sauer", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse-c", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-05-01T00:00:00", "pubType": "proceedings", "pages": "356-358", "year": "2017", "issn": null, "isbn": "978-1-5386-1589-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07965356", "articleId": "12OmNvSbBlj", "__typename": "AdjacentArticleType" }, "next": { "fno": "07965358", "articleId": "12OmNvD8RFH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2011/1246/0/06070409", "title": "ClassSheet-driven spreadsheet environments", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070409/12OmNANTAxA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2016/0252/0/07739679", "title": "Finding errors in the Enron spreadsheet corpus", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2016/07739679/12OmNAle6pg", "parentPublication": { "id": "proceedings/vlhcc/2016/0252/0", "title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070396", "title": "Embedding and evolution of spreadsheet models in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070396/12OmNwkzuuR", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a670", "title": "Understanding Spreadsheet Evolution in Practice", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a670/12OmNx2QUH1", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2010/8485/0/05635202", "title": "Automatically Inferring ClassSheet Models from Spreadsheets", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635202/12OmNxEjY33", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227225", "title": "Coupled evolution of model-driven spreadsheets", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227225/12OmNxQOjGN", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbes/2015/9272/0/9272a140", "title": "Automatic Spreadsheet Generation from Conceptual Models", "doi": null, "abstractUrl": "/proceedings-article/sbes/2015/9272a140/12OmNz6iOKX", "parentPublication": { "id": "proceedings/sbes/2015/9272/0", "title": "2015 29th Brazilian Symposium on Software Engineering (SBES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2016/4205/0/4205a162", "title": "VEnron: A Versioned Spreadsheet Corpus and Related Evolution Analysis", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2016/4205a162/12OmNzBOid5", "parentPublication": { "id": "proceedings/icse-c/2016/4205/0", "title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103459", "title": "Systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103459/17D45Xh13tN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icict/2021/1399/0/139900a233", "title": "Towards Wide-Spectrum Spreadsheet Computing", "doi": null, "abstractUrl": "/proceedings-article/icict/2021/139900a233/1vg8wzaXTjy", "parentPublication": { "id": "proceedings/icict/2021/1399/0", "title": "2021 4th International Conference on Information and Computer Technologies (ICICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzXFowI", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "acronym": "icsm", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBkxsxl", "doi": "10.1109/ICSM.2012.6405299", "title": "Refactoring meets spreadsheet formulas", "normalizedTitle": "Refactoring meets spreadsheet formulas", "abstract": "The number of end-users who write spreadsheet programs is at least an order of magnitude larger than the number of trained programmers who write professional software. We studied a corpus of 3691 spreadsheets and we found that their formulas are riddled with the same smells that plague professional software: hardcoded constants, duplicated expressions, unnecessary complexity, and unsanitized input. These make spreadsheets difficult to read and expensive to maintain. Like automated refactoring in the object-oriented domain, spreadsheet refactoring can be transformative. In this paper we present seven refactorings for spreadsheet formulas implemented in RefBook, a plugin for Microsoft Excel. To evaluate the usefulness of RefBook, we employed three kinds of empirical methods. First, we conducted a User Survey with 28 Excel users to find out whether they preferred the refactored formulas. Second, we conducted a Controlled Experiment with the same 28 participants to measure their productivity when doing manual refactorings. Third, we performed a Retrospective Case Study on the EUSES Spreadsheet Corpus with 3691 spreadsheets to determine how often we could apply the refactorings supported by RefBook. The results show: (i) users prefer the improved quality of refactored formulas, (ii) RefBook is faster and more reliable than manual refactoring, and (iii) the refactorings are widely applicable. On average RefBook is able to apply the refactorings in less than half the time that users performed the refactorings manually. 92.54% of users introduced errors or new smells into the spreadsheet or were unable to complete the task.", "abstracts": [ { "abstractType": "Regular", "content": "The number of end-users who write spreadsheet programs is at least an order of magnitude larger than the number of trained programmers who write professional software. We studied a corpus of 3691 spreadsheets and we found that their formulas are riddled with the same smells that plague professional software: hardcoded constants, duplicated expressions, unnecessary complexity, and unsanitized input. These make spreadsheets difficult to read and expensive to maintain. Like automated refactoring in the object-oriented domain, spreadsheet refactoring can be transformative. In this paper we present seven refactorings for spreadsheet formulas implemented in RefBook, a plugin for Microsoft Excel. To evaluate the usefulness of RefBook, we employed three kinds of empirical methods. First, we conducted a User Survey with 28 Excel users to find out whether they preferred the refactored formulas. Second, we conducted a Controlled Experiment with the same 28 participants to measure their productivity when doing manual refactorings. Third, we performed a Retrospective Case Study on the EUSES Spreadsheet Corpus with 3691 spreadsheets to determine how often we could apply the refactorings supported by RefBook. The results show: (i) users prefer the improved quality of refactored formulas, (ii) RefBook is faster and more reliable than manual refactoring, and (iii) the refactorings are widely applicable. On average RefBook is able to apply the refactorings in less than half the time that users performed the refactorings manually. 92.54% of users introduced errors or new smells into the spreadsheet or were unable to complete the task.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The number of end-users who write spreadsheet programs is at least an order of magnitude larger than the number of trained programmers who write professional software. We studied a corpus of 3691 spreadsheets and we found that their formulas are riddled with the same smells that plague professional software: hardcoded constants, duplicated expressions, unnecessary complexity, and unsanitized input. These make spreadsheets difficult to read and expensive to maintain. Like automated refactoring in the object-oriented domain, spreadsheet refactoring can be transformative. In this paper we present seven refactorings for spreadsheet formulas implemented in RefBook, a plugin for Microsoft Excel. To evaluate the usefulness of RefBook, we employed three kinds of empirical methods. First, we conducted a User Survey with 28 Excel users to find out whether they preferred the refactored formulas. Second, we conducted a Controlled Experiment with the same 28 participants to measure their productivity when doing manual refactorings. Third, we performed a Retrospective Case Study on the EUSES Spreadsheet Corpus with 3691 spreadsheets to determine how often we could apply the refactorings supported by RefBook. The results show: (i) users prefer the improved quality of refactored formulas, (ii) RefBook is faster and more reliable than manual refactoring, and (iii) the refactorings are widely applicable. On average RefBook is able to apply the refactorings in less than half the time that users performed the refactorings manually. 92.54% of users introduced errors or new smells into the spreadsheet or were unable to complete the task.", "fno": "06405299", "keywords": [ "Computer Architecture", "Microprocessors", "Conferences", "Software Maintenance", "Spreadsheet Programs", "Productivity" ], "authors": [ { "affiliation": "University of Illinois", "fullName": "Sandro Badame", "givenName": "Sandro", "surname": "Badame", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois", "fullName": "Danny Dig", "givenName": "Danny", "surname": "Dig", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "399-409", "year": "2012", "issn": "1063-6773", "isbn": "978-1-4673-2313-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06405297", "articleId": "12OmNvjQ8Rz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06405300", "articleId": "12OmNrH1PEf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/1997/8189/0/81890017", "title": "A spreadsheet approach to information visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1997/81890017/12OmNApcuwH", "parentPublication": { "id": "proceedings/ieee-infovis/1997/8189/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a011", "title": "Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a011/12OmNBInLjl", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405300", "title": "Detecting code smells in spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405300/12OmNrH1PEf", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883041", "title": "Bidirectional spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883041/12OmNvkpl6W", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117587", "title": "Spreadsheet Simulation", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117587/12OmNxG1yJV", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1998/8712/0/87120118", "title": "Fluid Visualization of Spreadsheet Structures", "doi": null, "abstractUrl": "/proceedings-article/vl/1998/87120118/12OmNxXUhMp", "parentPublication": { "id": "proceedings/vl/1998/8712/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2015/7529/0/07335408", "title": "A grammar for spreadsheet formulas evaluated on two large datasets", "doi": null, "abstractUrl": "/proceedings-article/scam/2015/07335408/12OmNxwWoBm", "parentPublication": { "id": "proceedings/scam/2015/7529/0", "title": "2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a196", "title": "Refactoring Meets Model-Driven Spreadsheet Evolution", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a196/12OmNzWfp3b", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2015/7532/0/07332488", "title": "Code smells in spreadsheet formulas revisited on an industrial dataset", "doi": null, "abstractUrl": "/proceedings-article/icsme/2015/07332488/12OmNzyGH4E", "parentPublication": { "id": "proceedings/icsme/2015/7532/0", "title": "2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506490", "title": "Fritz: A Tool for Spreadsheet Quality Assurance", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506490/17D45WZZ7Ek", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzK8", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNx1Iw8e", "doi": "10.1109/VLHCC.2014.6883040", "title": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "normalizedTitle": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "abstract": "Earlier research on spreadsheet authors' mental models has shown that people possess several types of information about spreadsheets. Especially, when explaining a spreadsheet, the real-world and domain mental models are prominent and the spreadsheet model is suppressed, but when locating and fixing an error, one must constantly switch back and forth between the domain model and the spreadsheet model, which requires frequent use of the mapping between problem domain concepts and their spreadsheet model counterparts. This paper introduces a new spreadsheet visualization tool and its empirical evaluation. The tool translates traditional spreadsheet formulas into problem domain narratives and highlights referenced cells. The tool was found to be easy to learn and helped the participants to locate more errors in spreadsheets. Furthermore, the tool increased the use of the domain mental model and appeared to improve the mapping between the spreadsheet model and the domain model.", "abstracts": [ { "abstractType": "Regular", "content": "Earlier research on spreadsheet authors' mental models has shown that people possess several types of information about spreadsheets. Especially, when explaining a spreadsheet, the real-world and domain mental models are prominent and the spreadsheet model is suppressed, but when locating and fixing an error, one must constantly switch back and forth between the domain model and the spreadsheet model, which requires frequent use of the mapping between problem domain concepts and their spreadsheet model counterparts. This paper introduces a new spreadsheet visualization tool and its empirical evaluation. The tool translates traditional spreadsheet formulas into problem domain narratives and highlights referenced cells. The tool was found to be easy to learn and helped the participants to locate more errors in spreadsheets. Furthermore, the tool increased the use of the domain mental model and appeared to improve the mapping between the spreadsheet model and the domain model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Earlier research on spreadsheet authors' mental models has shown that people possess several types of information about spreadsheets. Especially, when explaining a spreadsheet, the real-world and domain mental models are prominent and the spreadsheet model is suppressed, but when locating and fixing an error, one must constantly switch back and forth between the domain model and the spreadsheet model, which requires frequent use of the mapping between problem domain concepts and their spreadsheet model counterparts. This paper introduces a new spreadsheet visualization tool and its empirical evaluation. The tool translates traditional spreadsheet formulas into problem domain narratives and highlights referenced cells. The tool was found to be easy to learn and helped the participants to locate more errors in spreadsheets. Furthermore, the tool increased the use of the domain mental model and appeared to improve the mapping between the spreadsheet model and the domain model.", "fno": "06883040", "keywords": [ "Cognitive Science", "Visualization", "Debugging", "Data Models", "Analysis Of Variance", "Computational Modeling", "Usability" ], "authors": [ { "affiliation": "University of Eastern Finland School of Computing, Joensuu Campus Joensuu, Finland", "fullName": "Bennett Kankuzi", "givenName": "Bennett", "surname": "Kankuzi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Eastern Finland School of Computing, Joensuu Campus Joensuu, Finland", "fullName": "Jorma Sajaniemi", "givenName": "Jorma", "surname": "Sajaniemi", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "157-160", "year": "2014", "issn": null, "isbn": "978-1-4799-4035-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06883039", "articleId": "12OmNvkplan", "__typename": "AdjacentArticleType" }, "next": { "fno": "06883041", "articleId": "12OmNvkpl6W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2011/1246/0/06070409", "title": "ClassSheet-driven spreadsheet environments", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070409/12OmNANTAxA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enc/2013/5087/0/5087a007", "title": "Mental Models, Performance and Usability of a Complex Interactive System: The Case of Twitter", "doi": null, "abstractUrl": "/proceedings-article/enc/2013/5087a007/12OmNrH1PAK", "parentPublication": { "id": "proceedings/enc/2013/5087/0", "title": "2013 Mexican International Conference on Computer Science (ENC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883059", "title": "A domain terms visualization tool for spreadsheets", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883059/12OmNwEJ0TX", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070396", "title": "Embedding and evolution of spreadsheet models in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070396/12OmNwkzuuR", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2013/2552/0/06688892", "title": "Mutation-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688892/12OmNxTVTYC", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645237", "title": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645237/12OmNyoAAat", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/2/00495419", "title": "Hitting the wall: errors in developing and debugging a \"simple\" spreadsheet model", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495419/12OmNyr8YxC", "parentPublication": { "id": "proceedings/hicss/1996/7324/2", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/11/ttk2010111563", "title": "A Deductive Spreadsheet System for End Users", "doi": null, "abstractUrl": "/journal/tk/2010/11/ttk2010111563/13rRUxEhFt1", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103458", "title": "A decomposition-based approach to spreadsheet testing and debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103458/17D45Vw15vI", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apr/2021/4472/0/447200a021", "title": "Domain invariant-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/apr/2021/447200a021/1vb99iv4yty", "parentPublication": { "id": "proceedings/apr/2021/4472/0", "title": "2021 IEEE/ACM International Workshop on Automated Program Repair (APR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxuXcvK", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "acronym": "icsme", "groupId": "1000694", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNx2QUH1", "doi": "10.1109/ICSME.2017.38", "title": "Understanding Spreadsheet Evolution in Practice", "normalizedTitle": "Understanding Spreadsheet Evolution in Practice", "abstract": "As a special kind of software, spreadsheets have been evolving during their life cycle. Understanding spreadsheet evolution can help facilitate spreadsheet design, maintenance and fault detection. However, understanding spreadsheet evolution is challenging in practice. There are many factors that hinder spreadsheet evolution comprehension, such as, lack of version information, complicated structure changes during evolution, etc. Thus, we propose this work to facilitate the understanding of spreadsheet evolution, including developing semi-automated technique to build versioned spreadsheet corpora, characterizing and understanding how spreadsheet templates are reused, developing automated tools for spreadsheet comparison, and new approaches for fault detection during evolution.", "abstracts": [ { "abstractType": "Regular", "content": "As a special kind of software, spreadsheets have been evolving during their life cycle. Understanding spreadsheet evolution can help facilitate spreadsheet design, maintenance and fault detection. However, understanding spreadsheet evolution is challenging in practice. There are many factors that hinder spreadsheet evolution comprehension, such as, lack of version information, complicated structure changes during evolution, etc. Thus, we propose this work to facilitate the understanding of spreadsheet evolution, including developing semi-automated technique to build versioned spreadsheet corpora, characterizing and understanding how spreadsheet templates are reused, developing automated tools for spreadsheet comparison, and new approaches for fault detection during evolution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As a special kind of software, spreadsheets have been evolving during their life cycle. Understanding spreadsheet evolution can help facilitate spreadsheet design, maintenance and fault detection. However, understanding spreadsheet evolution is challenging in practice. There are many factors that hinder spreadsheet evolution comprehension, such as, lack of version information, complicated structure changes during evolution, etc. Thus, we propose this work to facilitate the understanding of spreadsheet evolution, including developing semi-automated technique to build versioned spreadsheet corpora, characterizing and understanding how spreadsheet templates are reused, developing automated tools for spreadsheet comparison, and new approaches for fault detection during evolution.", "fno": "0992a670", "keywords": [ "Fault Diagnosis", "Software Maintenance", "Spreadsheet Programs", "Spreadsheet Design", "Versioned Spreadsheet Corpora", "Spreadsheet Templates", "Spreadsheet Evolution Comprehension", "Fault Detection", "Electronic Mail", "Layout", "Tools", "Fault Detection", "Feature Extraction", "Software", "Training", "Spreadsheet", "Evolution", "Version", "Empirical Study", "Template", "Comparison" ], "authors": [ { "affiliation": null, "fullName": "Liang Xu", "givenName": "Liang", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-09-01T00:00:00", "pubType": "proceedings", "pages": "670-674", "year": "2017", "issn": null, "isbn": "978-1-5386-0992-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0992a665", "articleId": "12OmNzahc8Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "0992a675", "articleId": "12OmNwe2Iwt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2016/0252/0/07739679", "title": "Finding errors in the Enron spreadsheet corpus", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2016/07739679/12OmNAle6pg", "parentPublication": { "id": "proceedings/vlhcc/2016/0252/0", "title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/1589a356", "title": "Towards systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/1589a356/12OmNBKW9B8", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070396", "title": "Embedding and evolution of spreadsheet models in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070396/12OmNwkzuuR", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2017/5501/0/07884634", "title": "Spreadsheet testing in practice", "doi": null, "abstractUrl": "/proceedings-article/saner/2017/07884634/12OmNyOHG4Y", "parentPublication": { "id": "proceedings/saner/2017/5501/0", "title": "2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2016/4205/0/4205a162", "title": "VEnron: A Versioned Spreadsheet Corpus and Related Evolution Analysis", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2016/4205a162/12OmNzBOid5", "parentPublication": { "id": "proceedings/icse-c/2016/4205/0", "title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2014/6133/0/6133a196", "title": "Refactoring Meets Model-Driven Spreadsheet Evolution", "doi": null, "abstractUrl": "/proceedings-article/quatic/2014/6133a196/12OmNzWfp3b", "parentPublication": { "id": "proceedings/quatic/2014/6133/0", "title": "2014 9th International Conference on the Quality of Information and Communications Technology (QUATIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227239", "title": "MDSheet: A framework for model-driven spreadsheet engineering", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227239/12OmNzuZUsW", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2017/1544/0/07962365", "title": "SpreadCluster: Recovering Versioned Spreadsheets through Similarity-Based Clustering", "doi": null, "abstractUrl": "/proceedings-article/msr/2017/07962365/12OmNzxgHtl", "parentPublication": { "id": "proceedings/msr/2017/1544/0", "title": "2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506490", "title": "Fritz: A Tool for Spreadsheet Quality Assurance", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506490/17D45WZZ7Ek", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103459", "title": "Systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103459/17D45Xh13tN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mWl", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "acronym": "issrew", "groupId": "1002972", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxTVTYC", "doi": "10.1109/ISSREW.2013.6688892", "title": "Mutation-based spreadsheet debugging", "normalizedTitle": "Mutation-based spreadsheet debugging", "abstract": "Spreadsheets are the most prominent example of end-user programming. Unfortunately, spreadsheets often contain faults. Spreadsheets can be very complex and can contain several thousand formula. Therefore, debugging of spreadsheets can be a frustrating job. In this paper, we explain how genetic programming can be used to automatically debug spreadsheets. Therefore, we adapt an automatic repair approach from the software debugging domain to the spreadsheet domain. In an initial empirical evaluation, we show that genetic programming can be used to debug spreadsheets: For more than 55% of the spreadsheets, genetic programming is able to find a repair.", "abstracts": [ { "abstractType": "Regular", "content": "Spreadsheets are the most prominent example of end-user programming. Unfortunately, spreadsheets often contain faults. Spreadsheets can be very complex and can contain several thousand formula. Therefore, debugging of spreadsheets can be a frustrating job. In this paper, we explain how genetic programming can be used to automatically debug spreadsheets. Therefore, we adapt an automatic repair approach from the software debugging domain to the spreadsheet domain. In an initial empirical evaluation, we show that genetic programming can be used to debug spreadsheets: For more than 55% of the spreadsheets, genetic programming is able to find a repair.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spreadsheets are the most prominent example of end-user programming. Unfortunately, spreadsheets often contain faults. Spreadsheets can be very complex and can contain several thousand formula. Therefore, debugging of spreadsheets can be a frustrating job. In this paper, we explain how genetic programming can be used to automatically debug spreadsheets. Therefore, we adapt an automatic repair approach from the software debugging domain to the spreadsheet domain. In an initial empirical evaluation, we show that genetic programming can be used to debug spreadsheets: For more than 55% of the spreadsheets, genetic programming is able to find a repair.", "fno": "06688892", "keywords": [ "Maintenance Engineering", "Genetic Programming", "Debugging", "Sociology", "Statistics", "Software", "Manuals", "Mutation", "Spreadsheets", "Fault Correction", "Automated Debugging", "Genetic Programming" ], "authors": [ { "affiliation": "Inst. for Software Technol., Graz Univ. of Technol., Graz, Austria", "fullName": "Birgit Hofer", "givenName": "Birgit", "surname": "Hofer", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Software Technol., Graz Univ. of Technol., Graz, Austria", "fullName": "Franz Wotawa", "givenName": "Franz", "surname": "Wotawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "issrew", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-11-01T00:00:00", "pubType": "proceedings", "pages": "132-137", "year": "2013", "issn": null, "isbn": "978-1-4799-2552-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06688891", "articleId": "12OmNzcxZbc", "__typename": "AdjacentArticleType" }, "next": { "fno": "06688893", "articleId": "12OmNyrIay3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/issrew/2017/2387/0/2387a191", "title": "Qualitative Deviation Models for Spreadsheet Debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2017/2387a191/12OmNApLGAZ", "parentPublication": { "id": "proceedings/issrew/2017/2387/0", "title": "2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2017/2387/0/2387a199", "title": "Removing Coincidental Correctness in Spectrum-Based Fault Localization for Circuit and Spreadsheet Debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2017/2387a199/12OmNxiKs2i", "parentPublication": { "id": "proceedings/issrew/2017/2387/0", "title": "2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645237", "title": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645237/12OmNyoAAat", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/2/00495419", "title": "Hitting the wall: errors in developing and debugging a \"simple\" spreadsheet model", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495419/12OmNyr8YxC", "parentPublication": { "id": "proceedings/hicss/1996/7324/2", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004b875", "title": "Does Genetic Programming Work Well on Automated Program Repair?", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004b875/12OmNywxlHy", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103458", "title": "A decomposition-based approach to spreadsheet testing and debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103458/17D45Vw15vI", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103496", "title": "An Al-based interactive tool for spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103496/17D45XDIXQA", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2018/9571/0/652800a210", "title": "Dynamic Adaptive Mutation Based Genetic Programming for Ring Oscillator PUF", "doi": null, "abstractUrl": "/proceedings-article/iccia/2018/652800a210/1a3xhjARYJO", "parentPublication": { "id": "proceedings/iccia/2018/9571/0", "title": "2018 3rd International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gi/2019/2268/0/226800a002", "title": "Leveraging Program Invariants to Promote Population Diversity in Search-Based Automatic Program Repair", "doi": null, "abstractUrl": "/proceedings-article/gi/2019/226800a002/1d9UobCLInS", "parentPublication": { "id": "proceedings/gi/2019/2268/0", "title": "2019 IEEE/ACM International Workshop on Genetic Improvement (GI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apr/2021/4472/0/447200a021", "title": "Domain invariant-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/apr/2021/447200a021/1vb99iv4yty", "parentPublication": { "id": "proceedings/apr/2021/4472/0", "title": "2021 IEEE/ACM International Workshop on Automated Program Repair (APR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWvHg", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNyoAAat", "doi": "10.1109/VLHCC.2013.6645237", "title": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "normalizedTitle": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "abstract": "In this paper, we report on an empirical study exploring the nature of mental models of spreadsheet authors when they are explaining and debugging their own spreadsheets. Study participants were first asked to explain one of their own spreadsheets, and then to find and fix seeded errors in the same spreadsheets. Talk-aloud protocols were collected and analyzed to reveal the nature of participants' mental models in these activities. The findings indicate that the authors explain their spreadsheets mainly in terms of real-world and problem domain concepts; in debugging, they constantly switch between problem domain concepts and spreadsheet-specific concepts, although they mainly use spreadsheet-specific concepts to fix an identified error. These study findings provide insights on the need for developing spreadsheet authoring and debugging tools that correspond to spreadsheet authors' mental models of spreadsheets.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we report on an empirical study exploring the nature of mental models of spreadsheet authors when they are explaining and debugging their own spreadsheets. Study participants were first asked to explain one of their own spreadsheets, and then to find and fix seeded errors in the same spreadsheets. Talk-aloud protocols were collected and analyzed to reveal the nature of participants' mental models in these activities. The findings indicate that the authors explain their spreadsheets mainly in terms of real-world and problem domain concepts; in debugging, they constantly switch between problem domain concepts and spreadsheet-specific concepts, although they mainly use spreadsheet-specific concepts to fix an identified error. These study findings provide insights on the need for developing spreadsheet authoring and debugging tools that correspond to spreadsheet authors' mental models of spreadsheets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we report on an empirical study exploring the nature of mental models of spreadsheet authors when they are explaining and debugging their own spreadsheets. Study participants were first asked to explain one of their own spreadsheets, and then to find and fix seeded errors in the same spreadsheets. Talk-aloud protocols were collected and analyzed to reveal the nature of participants' mental models in these activities. The findings indicate that the authors explain their spreadsheets mainly in terms of real-world and problem domain concepts; in debugging, they constantly switch between problem domain concepts and spreadsheet-specific concepts, although they mainly use spreadsheet-specific concepts to fix an identified error. These study findings provide insights on the need for developing spreadsheet authoring and debugging tools that correspond to spreadsheet authors' mental models of spreadsheets.", "fno": "06645237", "keywords": [ "Cognitive Science", "Debugging", "Educational Institutions", "Computers", "Switches", "Encoding", "Visualization" ], "authors": [ { "affiliation": "University of Eastern Finland, School of Computing, Joensuu Campus Joensuu, Finland", "fullName": "Bennett Kankuzi", "givenName": "Bennett", "surname": "Kankuzi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Eastern Finland, School of Computing, Joensuu Campus, Joensuu, Finland", "fullName": "Jorma Sajaniemi", "givenName": "Jorma", "surname": "Sajaniemi", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "15-18", "year": "2013", "issn": "1943-6092", "isbn": "978-1-4799-0369-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06645236", "articleId": "12OmNBhHtgA", "__typename": "AdjacentArticleType" }, "next": { "fno": "06645238", "articleId": "12OmNzmtWIt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/issrew/2017/2387/0/2387a191", "title": "Qualitative Deviation Models for Spreadsheet Debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2017/2387a191/12OmNApLGAZ", "parentPublication": { "id": "proceedings/issrew/2017/2387/0", "title": "2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883059", "title": "A domain terms visualization tool for spreadsheets", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883059/12OmNwEJ0TX", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883040", "title": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883040/12OmNx1Iw8e", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2013/2552/0/06688892", "title": "Mutation-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688892/12OmNxTVTYC", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2012/5048/0/06405435", "title": "Debugging Spreadsheets: A CSP-based Approach", "doi": null, "abstractUrl": "/proceedings-article/issrew/2012/06405435/12OmNy7h35k", "parentPublication": { "id": "proceedings/issrew/2012/5048/0", "title": "2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/2/00495419", "title": "Hitting the wall: errors in developing and debugging a \"simple\" spreadsheet model", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495419/12OmNyr8YxC", "parentPublication": { "id": "proceedings/hicss/1996/7324/2", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2009/05/mso2009050025", "title": "Software Engineering for Spreadsheets", "doi": null, "abstractUrl": "/magazine/so/2009/05/mso2009050025/13rRUxZRbmc", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103458", "title": "A decomposition-based approach to spreadsheet testing and debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103458/17D45Vw15vI", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103496", "title": "An Al-based interactive tool for spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103496/17D45XDIXQA", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apr/2021/4472/0/447200a021", "title": "Domain invariant-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/apr/2021/447200a021/1vb99iv4yty", "parentPublication": { "id": "proceedings/apr/2021/4472/0", "title": "2021 IEEE/ACM International Workshop on Automated Program Repair (APR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1s6586p6LFS", "title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)", "acronym": "iceccs", "groupId": "1000271", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1s659gSdjB6", "doi": "10.1109/ICECCS51672.2020.00027", "title": "The Semantic Spreadsheet", "normalizedTitle": "The Semantic Spreadsheet", "abstract": "Spreadsheets are one of the most widely used data management tools. Although intuitive and easy to use, they suffer from a number of issues. Numerous publications indicate that most spreadsheets contain errors and that spreadsheet-based data shadow systems lead to problems such as the &#x201C;spreadmart dilemma&#x201D; creating inconsistent views on organizational data. In this paper, we describe &#x201C; The Semantic Spreadsheet &#x201D;, a new data model for a semantically accurate spreadsheet system. Unlike the existing data models, the described model is a presentation independent data model based on the Resource Description Framework (RDF) that avoids the spreadmart dilemma by providing a semantically sound data structure. We describe the set-theoretic and relational algebraic operations on the data model and show how it can improve data integrity.", "abstracts": [ { "abstractType": "Regular", "content": "Spreadsheets are one of the most widely used data management tools. Although intuitive and easy to use, they suffer from a number of issues. Numerous publications indicate that most spreadsheets contain errors and that spreadsheet-based data shadow systems lead to problems such as the &#x201C;spreadmart dilemma&#x201D; creating inconsistent views on organizational data. In this paper, we describe &#x201C; The Semantic Spreadsheet &#x201D;, a new data model for a semantically accurate spreadsheet system. Unlike the existing data models, the described model is a presentation independent data model based on the Resource Description Framework (RDF) that avoids the spreadmart dilemma by providing a semantically sound data structure. We describe the set-theoretic and relational algebraic operations on the data model and show how it can improve data integrity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spreadsheets are one of the most widely used data management tools. Although intuitive and easy to use, they suffer from a number of issues. Numerous publications indicate that most spreadsheets contain errors and that spreadsheet-based data shadow systems lead to problems such as the “spreadmart dilemma” creating inconsistent views on organizational data. In this paper, we describe “ The Semantic Spreadsheet ”, a new data model for a semantically accurate spreadsheet system. Unlike the existing data models, the described model is a presentation independent data model based on the Resource Description Framework (RDF) that avoids the spreadmart dilemma by providing a semantically sound data structure. We describe the set-theoretic and relational algebraic operations on the data model and show how it can improve data integrity.", "fno": "855800a171", "keywords": [ "Data Integrity", "Data Models", "Relational Algebra", "Set Theory", "Spreadsheet Programs", "Semantic Spreadsheet", "Spreadsheets", "Data Management Tools", "Spreadsheet Based Data Shadow Systems", "Spreadmart Dilemma Creating Inconsistent Views", "Organizational Data", "Semantically Accurate Spreadsheet System", "Presentation Independent Data Model", "Semantically Sound Data Structure", "Data Integrity", "Resource Description Framework", "Computational Modeling", "Data Integrity", "Semantics", "Tools", "Data Structures", "Data Models", "Resource Description Framework", "Data Systems", "Data Processing", "Spreadsheet Programs" ], "authors": [ { "affiliation": "School of Computer Science, The University of Auckland,Auckland,New Zealand", "fullName": "Behzad Farokhi", "givenName": "Behzad", "surname": "Farokhi", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, The University of Auckland,Auckland,New Zealand", "fullName": "Katharina Dost", "givenName": "Katharina", "surname": "Dost", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, The University of Auckland,Auckland,New Zealand", "fullName": "Gerald Weber", "givenName": "Gerald", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, The University of Auckland,Auckland,New Zealand", "fullName": "Jing Sun", "givenName": "Jing", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bath,Department of Computer Science,Bath,United Kingdom", "fullName": "Christof Lutteroth", "givenName": "Christof", "surname": "Lutteroth", "__typename": "ArticleAuthorType" } ], "idPrefix": "iceccs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "171-176", "year": "2020", "issn": null, "isbn": "978-1-7281-8558-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "855800a165", "articleId": "1s658uNbXzy", "__typename": "AdjacentArticleType" }, "next": { "fno": "855800a177", "articleId": "1s659BISzWU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2011/1246/0/06070409", "title": "ClassSheet-driven spreadsheet environments", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070409/12OmNANTAxA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2018/6871/0/687101b571", "title": "Shared Access to Spreadsheet Elements for End User Programming", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2018/687101b571/12OmNAgY7pK", "parentPublication": { "id": "proceedings/icdcs/2018/6871/0", "title": "2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/1589a356", "title": "Towards systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/1589a356/12OmNBKW9B8", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lfa/1988/0890/0/00024963", "title": "Structured spreadsheet calculation", "doi": null, "abstractUrl": "/proceedings-article/lfa/1988/00024963/12OmNvjgWV0", "parentPublication": { "id": "proceedings/lfa/1988/0890/0", "title": "1988 IEEE Workshop on Languages for Automation@m_Symbiotic and Intelligent Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883039", "title": "Embedding model-driven spreadsheet queries in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883039/12OmNvkplan", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2003/2027/0/20270306", "title": "Analyzing Large Spreadsheet Programs", "doi": null, "abstractUrl": "/proceedings-article/wcre/2003/20270306/12OmNvlxJsC", "parentPublication": { "id": "proceedings/wcre/2003/2027/0", "title": "10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2012/4816/0/4816a076", "title": "Ontology Based Data Conversion from Spreadsheet to OWL", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2012/4816a076/12OmNwKGAog", "parentPublication": { "id": "proceedings/chinagrid/2012/4816/0", "title": "2012 Seventh ChinaGrid Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070396", "title": "Embedding and evolution of spreadsheet models in spreadsheet systems", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070396/12OmNwkzuuR", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/09/mco2016090078", "title": "The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing", "doi": null, "abstractUrl": "/magazine/co/2016/09/mco2016090078/13rRUwcAqvB", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103459", "title": "Systematic spreadsheet construction processes", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103459/17D45Xh13tN", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vb996zV5Ly", "title": "2021 IEEE/ACM International Workshop on Automated Program Repair (APR)", "acronym": "apr", "groupId": "1842225", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1vb99iv4yty", "doi": "10.1109/APR52552.2021.00012", "title": "Domain invariant-based spreadsheet debugging", "normalizedTitle": "Domain invariant-based spreadsheet debugging", "abstract": "Spreadsheets are widely used in finance, accounting, auditing, etc. In our survey, we find that more than half of the spreadsheets used in daily audit work do not contain any formula. In practice, errors in such spreadsheets are usually handled manually according to the domain knowledge behind the data, which is time-consuming and easy to make mistakes. Inspired by this, we first propose to use domain invariants to do error detection and repair in spreadsheets. In this paper, a framework using domain invariants in spreadsheet debugging is proposed by incorporating with formal and prediction methods, respectively.", "abstracts": [ { "abstractType": "Regular", "content": "Spreadsheets are widely used in finance, accounting, auditing, etc. In our survey, we find that more than half of the spreadsheets used in daily audit work do not contain any formula. In practice, errors in such spreadsheets are usually handled manually according to the domain knowledge behind the data, which is time-consuming and easy to make mistakes. Inspired by this, we first propose to use domain invariants to do error detection and repair in spreadsheets. In this paper, a framework using domain invariants in spreadsheet debugging is proposed by incorporating with formal and prediction methods, respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spreadsheets are widely used in finance, accounting, auditing, etc. In our survey, we find that more than half of the spreadsheets used in daily audit work do not contain any formula. In practice, errors in such spreadsheets are usually handled manually according to the domain knowledge behind the data, which is time-consuming and easy to make mistakes. Inspired by this, we first propose to use domain invariants to do error detection and repair in spreadsheets. In this paper, a framework using domain invariants in spreadsheet debugging is proposed by incorporating with formal and prediction methods, respectively.", "fno": "447200a021", "keywords": [ "Program Debugging", "Spreadsheet Programs", "Auditing", "Spreadsheets", "Daily Audit Work", "Domain Knowledge", "Domain Invariants", "Error Detection", "Repair", "Spreadsheet Debugging", "Conferences", "Finance", "Debugging", "Prediction Methods", "Maintenance Engineering", "Spreadsheet", "Debugging", "Error Detection", "Repair", "Domain Invariant" ], "authors": [ { "affiliation": "Nanjing Audit University", "fullName": "Xiaoyan Wang", "givenName": "Xiaoyan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing Audit University", "fullName": "Jie Zhao", "givenName": "Jie", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "apr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "21-22", "year": "2021", "issn": null, "isbn": "978-1-6654-4472-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "447200a019", "articleId": "1vb99cF9ZDi", "__typename": "AdjacentArticleType" }, "next": { "fno": "447200a023", "articleId": "1vb99omp6Y8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsm/2012/2313/0/06405299", "title": "Refactoring meets spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405299/12OmNBkxsxl", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2012/2313/0/06405300", "title": "Detecting code smells in spreadsheet formulas", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405300/12OmNrH1PEf", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883059", "title": "A domain terms visualization tool for spreadsheets", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883059/12OmNwEJ0TX", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883040", "title": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883040/12OmNx1Iw8e", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2013/2552/0/06688892", "title": "Mutation-based spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688892/12OmNxTVTYC", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2012/5048/0/06405435", "title": "Debugging Spreadsheets: A CSP-based Approach", "doi": null, "abstractUrl": "/proceedings-article/issrew/2012/06405435/12OmNy7h35k", "parentPublication": { "id": "proceedings/issrew/2012/5048/0", "title": "2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645237", "title": "An empirical study of spreadsheet authors' mental models in explaining and debugging tasks", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645237/12OmNyoAAat", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/2/00495419", "title": "Hitting the wall: errors in developing and debugging a \"simple\" spreadsheet model", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00495419/12OmNyr8YxC", "parentPublication": { "id": "proceedings/hicss/1996/7324/2", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103458", "title": "A decomposition-based approach to spreadsheet testing and debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103458/17D45Vw15vI", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2017/0443/0/08103496", "title": "An Al-based interactive tool for spreadsheet debugging", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2017/08103496/17D45XDIXQA", "parentPublication": { "id": "proceedings/vlhcc/2017/0443/0", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvAiSpZ", "title": "2015 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNrFTrba", "doi": "10.1109/VR.2015.7223325", "title": "Elastic-Arm: Human-scale passive haptic feedback for augmenting interaction and perception in virtual environments", "normalizedTitle": "Elastic-Arm: Human-scale passive haptic feedback for augmenting interaction and perception in virtual environments", "abstract": "Haptic feedback is known to improve 3D interaction in virtual environments but current haptic interfaces remain complex and tailored to desktop interaction. In this paper, we introduce the “Elastic-Arm”, a novel approach for incorporating haptic feedback in immersive virtual environments in a simple and cost-effective way. The Elastic-Arm is based on a body-mounted elastic armature that links the user's hand to her shoulder. As a result, a progressive resistance force is perceived when extending the arm. This haptic feedback can be incorporated with various 3D interaction techniques and we illustrate the possibilities offered by our system through several use cases based on well-known examples such as the Bubble technique, Redirected Touching and pseudo-haptics. These illustrative use cases provide users with haptic feedback during selection and navigation tasks but they also enhance their perception of the virtual environment. Taken together, these examples suggest that the Elastic-Arm can be transposed in numerous applications and with various 3D interaction metaphors in which a mobile hap-tic feedback can be beneficial. It could also pave the way for the design of new interaction techniques based on “human-scale” egocentric haptic feedback.", "abstracts": [ { "abstractType": "Regular", "content": "Haptic feedback is known to improve 3D interaction in virtual environments but current haptic interfaces remain complex and tailored to desktop interaction. In this paper, we introduce the “Elastic-Arm”, a novel approach for incorporating haptic feedback in immersive virtual environments in a simple and cost-effective way. The Elastic-Arm is based on a body-mounted elastic armature that links the user's hand to her shoulder. As a result, a progressive resistance force is perceived when extending the arm. This haptic feedback can be incorporated with various 3D interaction techniques and we illustrate the possibilities offered by our system through several use cases based on well-known examples such as the Bubble technique, Redirected Touching and pseudo-haptics. These illustrative use cases provide users with haptic feedback during selection and navigation tasks but they also enhance their perception of the virtual environment. Taken together, these examples suggest that the Elastic-Arm can be transposed in numerous applications and with various 3D interaction metaphors in which a mobile hap-tic feedback can be beneficial. It could also pave the way for the design of new interaction techniques based on “human-scale” egocentric haptic feedback.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Haptic feedback is known to improve 3D interaction in virtual environments but current haptic interfaces remain complex and tailored to desktop interaction. In this paper, we introduce the “Elastic-Arm”, a novel approach for incorporating haptic feedback in immersive virtual environments in a simple and cost-effective way. The Elastic-Arm is based on a body-mounted elastic armature that links the user's hand to her shoulder. As a result, a progressive resistance force is perceived when extending the arm. This haptic feedback can be incorporated with various 3D interaction techniques and we illustrate the possibilities offered by our system through several use cases based on well-known examples such as the Bubble technique, Redirected Touching and pseudo-haptics. These illustrative use cases provide users with haptic feedback during selection and navigation tasks but they also enhance their perception of the virtual environment. Taken together, these examples suggest that the Elastic-Arm can be transposed in numerous applications and with various 3D interaction metaphors in which a mobile hap-tic feedback can be beneficial. It could also pave the way for the design of new interaction techniques based on “human-scale” egocentric haptic feedback.", "fno": "07223325", "keywords": [ "Haptic Interfaces", "Virtual Environments", "Three Dimensional Displays", "Navigation", "Visualization", "Force", "Prototypes", "Haptic I O", "H 5 2 Information Interfaces And Presentation User Interfaces Interaction Styles" ], "authors": [ { "affiliation": "Inria Rennes, France", "fullName": "Merwan Achibet", "givenName": "Merwan", "surname": "Achibet", "__typename": "ArticleAuthorType" }, { "affiliation": "Inria Rennes, France", "fullName": "Adrien Girard", "givenName": "Adrien", "surname": "Girard", "__typename": "ArticleAuthorType" }, { "affiliation": "INSA/Inria Rennes, France", "fullName": "Anthony Talvas", "givenName": "Anthony", "surname": "Talvas", "__typename": "ArticleAuthorType" }, { "affiliation": "INSA/Inria Rennes, France", "fullName": "Maud Marchal", "givenName": "Maud", "surname": "Marchal", "__typename": "ArticleAuthorType" }, { "affiliation": "Inria Rennes, France", "fullName": "Anatole Lecuyer", "givenName": "Anatole", "surname": "Lecuyer", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "63-68", "year": "2015", "issn": null, "isbn": "978-1-4799-1727-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07223324", "articleId": "12OmNCvLXZ7", "__typename": "AdjacentArticleType" }, "next": { "fno": "07223326", "articleId": "12OmNvT2oVf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/haptic/2006/0226/0/01627127", "title": "Performance Enhancement of a Haptic Arm Exoskeleton", "doi": null, "abstractUrl": "/proceedings-article/haptic/2006/01627127/12OmNA1DMm0", "parentPublication": { "id": "proceedings/haptic/2006/0226/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479943", "title": "Data-Driven Haptic Rendering of Visco-Elastic Effects", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479943/12OmNqBKU4L", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2016/03/07457685", "title": "Pseudo-Haptic Feedback in Teleoperation", "doi": null, "abstractUrl": "/journal/th/2016/03/07457685/13rRUyYjK5o", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09978713", "title": "Revisiting Walking-in-Place by Introducing Step-Height Control, Elastic Input, and Pseudo-Haptic Feedback", "doi": null, "abstractUrl": "/journal/tg/5555/01/09978713/1IXUnnVaWoE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797718", "title": "Haptic Prop: A Tangible Prop for Semi-passive Haptic Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797718/1cJ0Lqfe0gw", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798139", "title": "Human, Virtual Human, Bump&#x0021; A Preliminary Study on Haptic Feedback", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798139/1cJ157IzTri", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090613", "title": "Augmenting Physics Education with Haptic and Visual Feedback", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090613/1jIxjCgjjwc", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090536", "title": "Elastic-Move: Passive Haptic Device with Force Feedback for Virtual Reality Locomotion", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090536/1jIxqFQXvSE", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090589", "title": "Elastic-Move: Passive Force Feedback Devices for Virtual Reality Locomotion", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090589/1jIxwEELmJW", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09273221", "title": "Crowd Navigation in VR: Exploring Haptic Rendering of Collisions", "doi": null, "abstractUrl": "/journal/tg/2022/07/09273221/1pb9BhAe16o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwcUjWq", "title": "2013 XV Symposium on Virtual and Augmented Reality (SVR)", "acronym": "svr", "groupId": "1800426", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNz6iOwZ", "doi": "10.1109/SVR.2013.47", "title": "Haptic Rendering Techniques Supporting Material Removal", "normalizedTitle": "Haptic Rendering Techniques Supporting Material Removal", "abstract": "The term haptic refers to the tactile sensation perceived by the user when he is manipulating objects in a Virtual Environment. These sensations are extremely important in Virtual Reality simulators for training medical and dental procedures with the goal of increasing the level of motor skills. Many tasks trained, such as teeth and bones drilling, are held in rigid bodies and require parts of the virtual models to be removed. One way to manipulate these objects is by using voxel-based models, which divide the object into smaller parts that can be removed by the haptic device. This paper deals with a new method for haptic rendering with voxel-based rigid bodies that may be composed of various materials with different densities. The method describes the process for obtaining and storing the virtual objects, in addition to detailing the techniques used for collision detection, calculating the force feedback and removing parts of objects during the drilling process. The paper ends with an experiment that shows that the method provides stability and allows the haptic device to simulate the removal of voxels and also different material densities properly.", "abstracts": [ { "abstractType": "Regular", "content": "The term haptic refers to the tactile sensation perceived by the user when he is manipulating objects in a Virtual Environment. These sensations are extremely important in Virtual Reality simulators for training medical and dental procedures with the goal of increasing the level of motor skills. Many tasks trained, such as teeth and bones drilling, are held in rigid bodies and require parts of the virtual models to be removed. One way to manipulate these objects is by using voxel-based models, which divide the object into smaller parts that can be removed by the haptic device. This paper deals with a new method for haptic rendering with voxel-based rigid bodies that may be composed of various materials with different densities. The method describes the process for obtaining and storing the virtual objects, in addition to detailing the techniques used for collision detection, calculating the force feedback and removing parts of objects during the drilling process. The paper ends with an experiment that shows that the method provides stability and allows the haptic device to simulate the removal of voxels and also different material densities properly.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The term haptic refers to the tactile sensation perceived by the user when he is manipulating objects in a Virtual Environment. These sensations are extremely important in Virtual Reality simulators for training medical and dental procedures with the goal of increasing the level of motor skills. Many tasks trained, such as teeth and bones drilling, are held in rigid bodies and require parts of the virtual models to be removed. One way to manipulate these objects is by using voxel-based models, which divide the object into smaller parts that can be removed by the haptic device. This paper deals with a new method for haptic rendering with voxel-based rigid bodies that may be composed of various materials with different densities. The method describes the process for obtaining and storing the virtual objects, in addition to detailing the techniques used for collision detection, calculating the force feedback and removing parts of objects during the drilling process. The paper ends with an experiment that shows that the method provides stability and allows the haptic device to simulate the removal of voxels and also different material densities properly.", "fno": "06655760", "keywords": [ "Bone", "Dentistry", "Force Feedback", "Haptic Interfaces", "Medical Computing", "Rendering Computer Graphics", "Virtual Reality", "Haptic Rendering Techniques", "Material Removal", "Tactile Sensation", "Object Manipulation", "Virtual Environment", "Virtual Reality Simulators", "Medical Procedures Training", "Dental Procedures Training", "Motor Skills Level", "Teeth", "Bones Drilling", "Virtual Models", "Voxel Based Models", "Haptic Device", "Voxel Based Rigid Bodies", "Virtual Objects", "Collision Detection", "Force Feedback", "Drilling Process", "Material Densities", "Hip", "Materials", "Haptic Interfaces", "Solid Modeling", "Rendering Computer Graphics", "Virtual Reality", "Dentistry", "Virtual Reality", "Haptic Rendering", "Voxel Based Material Removal" ], "authors": [ { "affiliation": null, "fullName": "Tales Nereu Bogoni", "givenName": "Tales Nereu", "surname": "Bogoni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Márcio Sarroglia Pinho", "givenName": "Márcio Sarroglia", "surname": "Pinho", "__typename": "ArticleAuthorType" } ], "idPrefix": "svr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-05-01T00:00:00", "pubType": "proceedings", "pages": "36-45", "year": "2013", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06655759", "articleId": "12OmNqBtiNf", "__typename": "AdjacentArticleType" }, "next": { "fno": "06655761", "articleId": "12OmNzlD9kV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/haptics/2006/0226/0/02260033", "title": "Standardized Evaluation of Haptic Rendering Systems", "doi": null, "abstractUrl": "/proceedings-article/haptics/2006/02260033/12OmNAObbDP", "parentPublication": { "id": "proceedings/haptics/2006/0226/0", "title": "2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a091", "title": "Haptic Rendering of Volume Data with Collision Determination Guarantee Using Ray Casting and Implicit Surface Representation", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a091/12OmNB9t6w1", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a038", "title": "Haptic Rendering of Mixed Haptic Effects", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a038/12OmNCdk2IT", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a157", "title": "Stable Dynamic Algorithm Based on Virtual Coupling for 6-DOF Haptic Rendering", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a157/12OmNqJ8tk6", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2007/0905/0/04161034", "title": "Real-time Volumetric Haptic and Visual Burrhole Simulation", "doi": null, "abstractUrl": "/proceedings-article/vr/2007/04161034/12OmNy7yEem", "parentPublication": { "id": "proceedings/vr/2007/0905/0", "title": "2007 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a286", "title": "Image-Driven Haptic Rendering in Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a286/12OmNyuy9Q9", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptic/2006/0226/0/01627081", "title": "Standardized Evaluation of Haptic Rendering Systems", "doi": null, "abstractUrl": "/proceedings-article/haptic/2006/01627081/12OmNzR8Czk", "parentPublication": { "id": "proceedings/haptic/2006/0226/0", "title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2013/03/tth2013030257", "title": "A Proxy Method for Real-Time 3-DOF Haptic Rendering of Streaming Point Cloud Data", "doi": null, "abstractUrl": "/journal/th/2013/03/tth2013030257/13rRUwhHcJv", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a431", "title": "Real-Time Haptic Rendering of Double-Points Interaction", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a431/17D45WaTkft", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIx7fmpQ9a", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxb4ZNizS", "doi": "10.1109/VR46266.2020.00043", "title": "Implementation and Evaluation of Touch-based Interaction Using Electrovibration Haptic Feedback in Virtual Environments", "normalizedTitle": "Implementation and Evaluation of Touch-based Interaction Using Electrovibration Haptic Feedback in Virtual Environments", "abstract": "Presentation of more haptic information to improve the users interactive capability is an important and challenging task in the virtual environment. As an emerging haptic feedback technology, electrovibration is an underlying solution to enhance the systems interactivity and improve user experience. However, such a solution is rarely studied in a virtual environment. In this work, we explore a new VR interaction method based on electrovibration technology with a touch screen and conduct evaluations about it. The key idea is to incorporate a set of manipulation gestures and three types of electrovibration in the VR interaction to help users acquire different kinds of tactile perception in the virtual manipulation. We present the evaluation in which we compare user performance measured first in a Fitts law task to evaluate different electrovibration types and then in a virtual office application to assess the interactive user interface. Our results show that the precision of interactions is significantly improved with the electrovibration haptic feedback. To the best of our knowledge, this is the first work to introduce electrovibration haptic feedback into the VR human-computer interaction and our work enlightens the potential of the electrovibration touchscreen-based interaction in virtual environments.", "abstracts": [ { "abstractType": "Regular", "content": "Presentation of more haptic information to improve the users interactive capability is an important and challenging task in the virtual environment. As an emerging haptic feedback technology, electrovibration is an underlying solution to enhance the systems interactivity and improve user experience. However, such a solution is rarely studied in a virtual environment. In this work, we explore a new VR interaction method based on electrovibration technology with a touch screen and conduct evaluations about it. The key idea is to incorporate a set of manipulation gestures and three types of electrovibration in the VR interaction to help users acquire different kinds of tactile perception in the virtual manipulation. We present the evaluation in which we compare user performance measured first in a Fitts law task to evaluate different electrovibration types and then in a virtual office application to assess the interactive user interface. Our results show that the precision of interactions is significantly improved with the electrovibration haptic feedback. To the best of our knowledge, this is the first work to introduce electrovibration haptic feedback into the VR human-computer interaction and our work enlightens the potential of the electrovibration touchscreen-based interaction in virtual environments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presentation of more haptic information to improve the users interactive capability is an important and challenging task in the virtual environment. As an emerging haptic feedback technology, electrovibration is an underlying solution to enhance the systems interactivity and improve user experience. However, such a solution is rarely studied in a virtual environment. In this work, we explore a new VR interaction method based on electrovibration technology with a touch screen and conduct evaluations about it. The key idea is to incorporate a set of manipulation gestures and three types of electrovibration in the VR interaction to help users acquire different kinds of tactile perception in the virtual manipulation. We present the evaluation in which we compare user performance measured first in a Fitts law task to evaluate different electrovibration types and then in a virtual office application to assess the interactive user interface. Our results show that the precision of interactions is significantly improved with the electrovibration haptic feedback. To the best of our knowledge, this is the first work to introduce electrovibration haptic feedback into the VR human-computer interaction and our work enlightens the potential of the electrovibration touchscreen-based interaction in virtual environments.", "fno": "09089598", "keywords": [ "Haptic Interfaces", "Three Dimensional Displays", "Virtual Environments", "Task Analysis", "Thumb", "Haptic Feedback", "Electrovibration", "Interactive Mode", "Virtual Reality" ], "authors": [ { "affiliation": "Beijing Institute of Technology,Beijing Engineering Research Center of Mixed Reality and Advanced Display, School of Optics and Photonics", "fullName": "Lu Zhao", "givenName": "Lu", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Technology,Beijing Engineering Research Center of Mixed Reality and Advanced Display, School of Optics and Photonics", "fullName": "Yue Liu", "givenName": "Yue", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Technology,Beijing Engineering Research Center of Mixed Reality and Advanced Display, School of Optics and Photonics", "fullName": "Dejiang Ye", "givenName": "Dejiang", "surname": "Ye", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Technology,Beijing Engineering Research Center of Mixed Reality and Advanced Display, School of Optics and Photonics", "fullName": "Zhuoluo Ma", "givenName": "Zhuoluo", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University", "fullName": "Weitao Song", "givenName": "Weitao", "surname": "Song", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "239-247", "year": "2020", "issn": null, "isbn": "978-1-7281-5608-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09089593", "articleId": "1jIxcQ8hdfO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09089505", "articleId": "1jIxgidw4AE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2007/3005/0/04390938", "title": "MHaptic : a Haptic Manipulation Library for Generic Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/cw/2007/04390938/12OmNASraZe", "parentPublication": { "id": "proceedings/cw/2007/3005/0", "title": "2007 International Conference on Cyberworlds (CW'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223325", "title": "Elastic-Arm: Human-scale passive haptic feedback for augmenting interaction and perception in virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223325/12OmNrFTrba", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892233", "title": "VRRobot: Robot actuated props in an infinite virtual environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892233/12OmNwkhTh6", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icess/2009/3678/0/3678a482", "title": "Implementing Haptic Feedback Environments from High-Level Descriptions", "doi": null, "abstractUrl": "/proceedings-article/icess/2009/3678a482/12OmNxXl5Gj", "parentPublication": { "id": "proceedings/icess/2009/3678/0", "title": "Embedded Software and Systems, Second International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2018/6909/0/690901a092", "title": "The Development of a Virtual Doll Companion for Haptic Interaction", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2018/690901a092/13bd1AITnav", "parentPublication": { "id": "proceedings/nicoint/2018/6909/0", "title": "2018 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2016/03/07457685", "title": "Pseudo-Haptic Feedback in Teleoperation", "doi": null, "abstractUrl": "/journal/th/2016/03/07457685/13rRUyYjK5o", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a538", "title": "CardsVR: A Two-Person VR Experience with Passive Haptic Feedback from a Deck of Playing Cards", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a538/1JrRaySJ7So", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798139", "title": "Human, Virtual Human, Bump&#x0021; A Preliminary Study on Haptic Feedback", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798139/1cJ157IzTri", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797993", "title": "VirtualTablet: Extending Movable Surfaces with Touch Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797993/1cJ1hgQ4Li8", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09273221", "title": "Crowd Navigation in VR: Exploring Haptic Rendering of Collisions", "doi": null, "abstractUrl": "/journal/tg/2022/07/09273221/1pb9BhAe16o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tuAeQeDJja", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tuAPeNHqog", "doi": "10.1109/VR50410.2021.00036", "title": "Unscripted Retargeting: Reach Prediction for Haptic Retargeting in Virtual Reality", "normalizedTitle": "Unscripted Retargeting: Reach Prediction for Haptic Retargeting in Virtual Reality", "abstract": "Research is exploring novel ways of adding haptics to VR. One popular technique is haptic retargeting, where real and virtual hands are decoupled to enable the reuse of physical props. However, this technique requires the system to know the users' intended interaction target, or requires additional hardware for prediction. We explore software-based reach prediction as a means of facilitating responsive, unscripted retargeting. We trained a Long Short-Term Memory network on users' reach trajectories to predict intended targets. We achieved an accuracy of 81.1 % at approximately 65% of movement. This could enable haptic retargeting during the last 35% of movement. We discuss the implications for possible physical proxy locations.", "abstracts": [ { "abstractType": "Regular", "content": "Research is exploring novel ways of adding haptics to VR. One popular technique is haptic retargeting, where real and virtual hands are decoupled to enable the reuse of physical props. However, this technique requires the system to know the users' intended interaction target, or requires additional hardware for prediction. We explore software-based reach prediction as a means of facilitating responsive, unscripted retargeting. We trained a Long Short-Term Memory network on users' reach trajectories to predict intended targets. We achieved an accuracy of 81.1 % at approximately 65% of movement. This could enable haptic retargeting during the last 35% of movement. We discuss the implications for possible physical proxy locations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research is exploring novel ways of adding haptics to VR. One popular technique is haptic retargeting, where real and virtual hands are decoupled to enable the reuse of physical props. However, this technique requires the system to know the users' intended interaction target, or requires additional hardware for prediction. We explore software-based reach prediction as a means of facilitating responsive, unscripted retargeting. We trained a Long Short-Term Memory network on users' reach trajectories to predict intended targets. We achieved an accuracy of 81.1 % at approximately 65% of movement. This could enable haptic retargeting during the last 35% of movement. We discuss the implications for possible physical proxy locations.", "fno": "255600a150", "keywords": [ "Haptic Interfaces", "Human Computer Interaction", "Learning Artificial Intelligence", "Recurrent Neural Nets", "Virtual Reality", "Software Based Reach Prediction", "Responsive Retargeting", "Unscripted Retargeting", "Haptic Retargeting", "Virtual Reality", "Virtual Hands", "Physical Props", "User Intended Interaction Target", "Long Short Term Memory Network", "User Reach Trajectory", "Physical Proxy Locations", "Solid Modeling", "Three Dimensional Displays", "Neural Networks", "Virtual Reality", "Predictive Models", "User Interfaces", "Hardware", "Human Centered Computing Human Computer Interaction HCI Interaction Paradigms Virtual Reality", "Computing Methodologies Machine Learning Machine Learning Approaches Neural Networks" ], "authors": [ { "affiliation": "Monash University", "fullName": "Aldrich Clarence", "givenName": "Aldrich", "surname": "Clarence", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Melbourne", "fullName": "Jarrod Knibbe", "givenName": "Jarrod", "surname": "Knibbe", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University", "fullName": "Maxime Cordeil", "givenName": "Maxime", "surname": "Cordeil", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University", "fullName": "Michael Wybrow", "givenName": "Michael", "surname": "Wybrow", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "150-159", "year": "2021", "issn": null, "isbn": "978-1-6654-1838-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "255600a140", "articleId": "1tuAMntNvxu", "__typename": "AdjacentArticleType" }, "next": { "fno": "255600a160", "articleId": "1tuASeZqmc0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892328", "title": "Effect on high versus low fidelity haptic feedback in a virtual reality baseball simulation", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892328/12OmNym2bPM", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446399", "title": "Three Haptic Shape-Feedback Controllers for Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446399/13bd1fHrlRF", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a205", "title": "Body Warping Versus Change Blindness Remapping: A Comparison of Two Approaches to Repurposing Haptic Proxies for Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a205/1CJbOUWTweQ", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a625", "title": "Shape Aware Haptic Retargeting for Accurate Hand Interactions", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a625/1CJcacl0uhq", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a618", "title": "Retargeting Destinations of Passive Props for Enhancing Haptic Feedback in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a618/1CJeVmWfgWc", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a612", "title": "Investigating The Effect of Direction on The Limits of Haptic Retargeting", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a612/1JrReInK5H2", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798143", "title": "Estimating Detection Thresholds for Desktop-Scale Hand Redirection in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798143/1cJ0GRxSQwM", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797974", "title": "Remapped Physical-Virtual Interfaces with Bimanual Haptic Retargeting", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797974/1cJ0NcRFX5m", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/05/09382898", "title": "Combining Dynamic Passive Haptics and Haptic Retargeting for Enhanced Haptic Feedback in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2021/05/09382898/1saZv7Dd9Ty", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09576632", "title": "Adaptive Reset Techniques for Haptic Retargeted Interaction", "doi": null, "abstractUrl": "/journal/tg/2023/02/09576632/1xIKunVGow0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvA1hw7", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "acronym": "msn", "groupId": "1002549", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNA2cYBf", "doi": "10.1109/MSN.2013.25", "title": "The Design of Distributed Architecture for Geological Prospecting Projection Management System", "normalizedTitle": "The Design of Distributed Architecture for Geological Prospecting Projection Management System", "abstract": "Distributed geological prospecting projection management system based Web service has been designed to speed up the digitization development of Gold Geological Branch of Chinese Armed Police Force (GGBCAPF). In this paper, the development of distributed application system has been briefed and the overall design and key technology research of geological prospecting projection management system have been introduced briefly. It is proved that the system which has accelerated the informatization, digitization and routinization of geological prospecting, has changed the way of geological data gather, storage, process and has improved the effectiveness of geological prospecting work played a significant role in geological prospecting of CCGCAPF.", "abstracts": [ { "abstractType": "Regular", "content": "Distributed geological prospecting projection management system based Web service has been designed to speed up the digitization development of Gold Geological Branch of Chinese Armed Police Force (GGBCAPF). In this paper, the development of distributed application system has been briefed and the overall design and key technology research of geological prospecting projection management system have been introduced briefly. It is proved that the system which has accelerated the informatization, digitization and routinization of geological prospecting, has changed the way of geological data gather, storage, process and has improved the effectiveness of geological prospecting work played a significant role in geological prospecting of CCGCAPF.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Distributed geological prospecting projection management system based Web service has been designed to speed up the digitization development of Gold Geological Branch of Chinese Armed Police Force (GGBCAPF). In this paper, the development of distributed application system has been briefed and the overall design and key technology research of geological prospecting projection management system have been introduced briefly. It is proved that the system which has accelerated the informatization, digitization and routinization of geological prospecting, has changed the way of geological data gather, storage, process and has improved the effectiveness of geological prospecting work played a significant role in geological prospecting of CCGCAPF.", "fno": "06726347", "keywords": [ "Geology", "Business", "Servers", "Spatial Databases", "Gold", "Force", "Distributed Architecture", "Geological Prospecting Projec", "Design", "Web Service" ], "authors": [ { "affiliation": null, "fullName": "Kong Yuanyuan", "givenName": "Kong", "surname": "Yuanyuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Su Xueying", "givenName": "Su", "surname": "Xueying", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lu Yingchuan", "givenName": "Lu", "surname": "Yingchuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Liang", "givenName": "Wang", "surname": "Liang", "__typename": "ArticleAuthorType" } ], "idPrefix": "msn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "300-304", "year": "2013", "issn": null, "isbn": "978-0-7695-5159-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06726346", "articleId": "12OmNywOWOh", "__typename": "AdjacentArticleType" }, "next": { "fno": "06726348", "articleId": "12OmNClQ0zc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pdis/1994/6400/0/00331708", "title": "A client/server architecture for distributed workflow management systems", "doi": null, "abstractUrl": "/proceedings-article/pdis/1994/00331708/12OmNA1VnsA", "parentPublication": { "id": "proceedings/pdis/1994/6400/0", "title": "Proceedings of 3rd International Conference on Parallel and Distributed Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a405", "title": "Mine Information System Based on 3D Geological Modeling", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a405/12OmNvjyxVf", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a526", "title": "Oil and Gas Exploration Information Integration Management Plan Based on GIS Technology", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a526/12OmNxGja6w", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2017/1568/0/1568a029", "title": "Decision Management for Micro-Granular Digital Architecture", "doi": null, "abstractUrl": "/proceedings-article/edocw/2017/1568a029/12OmNxdm4Jx", "parentPublication": { "id": "proceedings/edocw/2017/1568/0", "title": "2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcc/2010/4313/0/4313a258", "title": "The Spatial Data Sharing Mechanisms of Geological Survey Information Grid in P2P Mixed Network Systems Network Architecture Model", "doi": null, "abstractUrl": "/proceedings-article/gcc/2010/4313a258/12OmNzBOhEh", "parentPublication": { "id": "proceedings/gcc/2010/4313/0", "title": "Grid and Cloud Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/1/3570a089", "title": "Researches on Geographic Data Storage and Management Based on Object-Oriented Storage in the Distributed Software Architecture", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570a089/12OmNzDehhg", "parentPublication": { "id": "proceedings/wcse/2009/3570/1", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518272", "title": "Management of Unstructured Geological Data Based on Hadoop", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518272/12OmNzsJ7x0", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a203", "title": "Design and Implementation of Geological Environment Survey Big Data Platform for Danjiangkou Reservoir Water Source Area Based on WebGIS", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a203/1dUo3uzNiJG", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09576578", "title": "Real-Time Visualization of Large-Scale Geological Models With Nonlinear Feature-Preserving Levels of Detail", "doi": null, "abstractUrl": "/journal/tg/2023/02/09576578/1xIKu8EbmkE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwCJOXg", "title": "Virtual Reality Annual International Symposium", "acronym": "vrais", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvAs", "doi": "10.1109/VRAIS.1997.583039", "title": "Smooth Levels of Detail", "normalizedTitle": "Smooth Levels of Detail", "abstract": "Levels of detail (LODs) are used in interactive computer graphics to avoid overload of the rendering hardware with to high numbers of polygons. While conventional methods use a small set of discrete LODs, we introduce a new class of polygonal simplification: Smooth LODs. A very large number of small details encoded in a data stream allows a progressive refinement of the object from a very coarse approximation to the original high quality representation. Advantages of the new approach include progressive transmission and encoding suitable for networked applications, interactive selection of any desired quality, and compression of the data by incremental and redundancy free encoding.", "abstracts": [ { "abstractType": "Regular", "content": "Levels of detail (LODs) are used in interactive computer graphics to avoid overload of the rendering hardware with to high numbers of polygons. While conventional methods use a small set of discrete LODs, we introduce a new class of polygonal simplification: Smooth LODs. A very large number of small details encoded in a data stream allows a progressive refinement of the object from a very coarse approximation to the original high quality representation. Advantages of the new approach include progressive transmission and encoding suitable for networked applications, interactive selection of any desired quality, and compression of the data by incremental and redundancy free encoding.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Levels of detail (LODs) are used in interactive computer graphics to avoid overload of the rendering hardware with to high numbers of polygons. While conventional methods use a small set of discrete LODs, we introduce a new class of polygonal simplification: Smooth LODs. A very large number of small details encoded in a data stream allows a progressive refinement of the object from a very coarse approximation to the original high quality representation. Advantages of the new approach include progressive transmission and encoding suitable for networked applications, interactive selection of any desired quality, and compression of the data by incremental and redundancy free encoding.", "fno": "78430012", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Dieter Schmalstieg & Gernot Schaufler", "givenName": "Dieter Schmalstieg & Gernot", "surname": "Schaufler", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrais", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-03-01T00:00:00", "pubType": "proceedings", "pages": "12", "year": "1997", "issn": null, "isbn": "0-8186-7843-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "78430004", "articleId": "12OmNyv7mcm", "__typename": "AdjacentArticleType" }, "next": { "fno": "78430020", "articleId": "12OmNxwWozy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrnJ6JE", "title": "2001 International Conferences on Info-tech and Info-net. Proceedings", "acronym": "icii", "groupId": "1002214", "volume": "1", "displayVolume": "1", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNAtaRY0", "doi": "10.1109/ICII.2001.982723", "title": "Data fusion of multi-sensor for petroleum geological exploration", "normalizedTitle": "Data fusion of multi-sensor for petroleum geological exploration", "abstract": "Integrating different remote sensing data to obtain the geological information as much as possible for petroleum geological exploration is the main object of this research project. Radar images have very different characteristics from visible/infrared satellite remote sensing images in both physical properties and image mechanization. Data fusion technology is used to merge Landsat TM data and Radarsat SAR data, and several methods of image fusion and information extraction are tried to compare their results. The result images show that the different detail can be highlighted by different approach, and the method of image multiplication followed by PCA transform obtains good effects by analyzing carefully the each character if these two images. The integrated images give some new understand for the geological structure of the area and reveal some buried structures and faults through comprehensive geological interpretation.", "abstracts": [ { "abstractType": "Regular", "content": "Integrating different remote sensing data to obtain the geological information as much as possible for petroleum geological exploration is the main object of this research project. Radar images have very different characteristics from visible/infrared satellite remote sensing images in both physical properties and image mechanization. Data fusion technology is used to merge Landsat TM data and Radarsat SAR data, and several methods of image fusion and information extraction are tried to compare their results. The result images show that the different detail can be highlighted by different approach, and the method of image multiplication followed by PCA transform obtains good effects by analyzing carefully the each character if these two images. The integrated images give some new understand for the geological structure of the area and reveal some buried structures and faults through comprehensive geological interpretation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Integrating different remote sensing data to obtain the geological information as much as possible for petroleum geological exploration is the main object of this research project. Radar images have very different characteristics from visible/infrared satellite remote sensing images in both physical properties and image mechanization. Data fusion technology is used to merge Landsat TM data and Radarsat SAR data, and several methods of image fusion and information extraction are tried to compare their results. The result images show that the different detail can be highlighted by different approach, and the method of image multiplication followed by PCA transform obtains good effects by analyzing carefully the each character if these two images. The integrated images give some new understand for the geological structure of the area and reveal some buried structures and faults through comprehensive geological interpretation.", "fno": "00982723", "keywords": [ "Geophysical Techniques", "Geophysical Prospecting", "Geophysical Signal Processing", "Remote Sensing", "Multidimensional Signal Processing", "Sensor Fusion", "Remote Sensing By Radar", "Synthetic Aperture Radar", "Radar Imaging", "Radar Signal Processing", "Geophysical Measurement Technique", "Prospecting", "Oil Exploration", "Landsat TM", "Radarsat", "Optical Imaging", "Visible", "IR", "Infrared", "Multispectral Remote Sensing", "Radar Remote Sensing", "SAR", "Synthetic Aperture Radar", "Data Fusion", "Multi Sensor Method", "Geology", "Petroleum", "Geology", "Remote Sensing", "Satellites", "Radar Imaging", "Radar Remote Sensing", "Spaceborne Radar", "Infrared Imaging", "Mechanical Factors", "Image Fusion" ], "authors": [ { "affiliation": "Res. Inst. of Pet. Exploration & Dev., China Nat. Pet. Corp., Beijing, China", "fullName": "Xiaoge Zhu", "givenName": null, "surname": "Xiaoge Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lipu Yin", "givenName": null, "surname": "Lipu Yin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "70,71,72,73,74,75", "year": "2001", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00982721", "articleId": "12OmNzJbQSI", "__typename": "AdjacentArticleType" }, "next": { "fno": "00982724", "articleId": "12OmNApLGCv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcse/2009/3570/2/3570b528", "title": "The Study of Image Fusion Method Based on Wavelet-Packet Transform", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570b528/12OmNBUS75A", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706b201", "title": "An RS Image-Fusion Approach to Farmland Fertility", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706b201/12OmNBWzHQ6", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2015/8562/0/07439473", "title": "Detection of rice-area using self-organizing feature map", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439473/12OmNqzu6MD", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/4/3119d672", "title": "A Remote Sensing Image Fusion Algorithm Based on Constrained Nonnegative Matrix Factorization", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119d672/12OmNvAiSbN", "parentPublication": { "id": "proceedings/cisp/2008/3119/4", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2009/3858/0/05368959", "title": "Geological Units Classification of Multispectral Images by Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/incos/2009/05368959/12OmNwt5snM", "parentPublication": { "id": "proceedings/incos/2009/3858/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a610", "title": "A Remote Sensing Image Fusion Algorithm Based on Nonnegative Ordinal Independent Component Analysis by Using Lagrange Algorithm", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a610/12OmNwtn3u9", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733b561", "title": "Dense Semantic Labeling of Very-High-Resolution Aerial Imagery and LiDAR with Fully-Convolutional Neural Networks and Higher-Order CRFs", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b561/12OmNzVGcJA", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2016/3578/0/07733827", "title": "Geological Exploration Scheme Based on Remote Sensing Image Processing Technology", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2016/07733827/12OmNzYeAMa", "parentPublication": { "id": "proceedings/icsgea/2016/3578/0", "title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2001/7010/1/00982727", "title": "Extracting the flood extent from satellite SAR image with the support of topographic data", "doi": null, "abstractUrl": "/proceedings-article/icii/2001/00982727/12OmNzn38Sa", "parentPublication": { "id": "proceedings/icii/2001/7010/1", "title": "2001 International Conferences on Info-tech and Info-net. Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b526", "title": "CenterFusion: Center-based Radar and Camera Fusion for 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b526/1uqGQ7l2stG", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Te", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "acronym": "icicta", "groupId": "1002487", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwLOYRB", "doi": "10.1109/ICICTA.2015.19", "title": "A Methodology for Automatically 3D Geological Modeling Based on Geophysical Data Grids", "normalizedTitle": "A Methodology for Automatically 3D Geological Modeling Based on Geophysical Data Grids", "abstract": "Using 3D visualization models to exhibit geological structure has become a trend in geological studies. Compared to 2D geological mapping, 3D geological modeling is dependent on more geological sampling information. In many cases, however, the geological sampling information is difficult to acquire by drilling (especially for deep subsurface information). Geophysical methods (e.g., Gravity, seismic, and electric) have become the major tools in geological modeling. Because the geophysical data are recorded in a data grid, people must extract the geological information from various data grids acquired through different geophysical methods and subsequently integrate the information to manually construct a 3D geological model. This approach usually causes inconvenience and inefficiencies in practice. Therefore, we propose a methodology of automatically 3D geological modeling based on geophysical data grids. The method first constructs visualization models from different geophysical data grids and subsequently integrates these models for interpretation using mapping rules learned from physical properties of rock samples measured in a laboratory and finally converts the interpreted visualization model to a 3D geological model. With the application in the practical work, the result demonstrates that the methodology can effectively solve problems of 3D geological modeling in the case of enriched geophysical data lacking sufficient geological sampling information.", "abstracts": [ { "abstractType": "Regular", "content": "Using 3D visualization models to exhibit geological structure has become a trend in geological studies. Compared to 2D geological mapping, 3D geological modeling is dependent on more geological sampling information. In many cases, however, the geological sampling information is difficult to acquire by drilling (especially for deep subsurface information). Geophysical methods (e.g., Gravity, seismic, and electric) have become the major tools in geological modeling. Because the geophysical data are recorded in a data grid, people must extract the geological information from various data grids acquired through different geophysical methods and subsequently integrate the information to manually construct a 3D geological model. This approach usually causes inconvenience and inefficiencies in practice. Therefore, we propose a methodology of automatically 3D geological modeling based on geophysical data grids. The method first constructs visualization models from different geophysical data grids and subsequently integrates these models for interpretation using mapping rules learned from physical properties of rock samples measured in a laboratory and finally converts the interpreted visualization model to a 3D geological model. With the application in the practical work, the result demonstrates that the methodology can effectively solve problems of 3D geological modeling in the case of enriched geophysical data lacking sufficient geological sampling information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Using 3D visualization models to exhibit geological structure has become a trend in geological studies. Compared to 2D geological mapping, 3D geological modeling is dependent on more geological sampling information. In many cases, however, the geological sampling information is difficult to acquire by drilling (especially for deep subsurface information). Geophysical methods (e.g., Gravity, seismic, and electric) have become the major tools in geological modeling. Because the geophysical data are recorded in a data grid, people must extract the geological information from various data grids acquired through different geophysical methods and subsequently integrate the information to manually construct a 3D geological model. This approach usually causes inconvenience and inefficiencies in practice. Therefore, we propose a methodology of automatically 3D geological modeling based on geophysical data grids. The method first constructs visualization models from different geophysical data grids and subsequently integrates these models for interpretation using mapping rules learned from physical properties of rock samples measured in a laboratory and finally converts the interpreted visualization model to a 3D geological model. With the application in the practical work, the result demonstrates that the methodology can effectively solve problems of 3D geological modeling in the case of enriched geophysical data lacking sufficient geological sampling information.", "fno": "7644a040", "keywords": [ "Geology", "Data Models", "Solid Modeling", "Three Dimensional Displays", "Data Visualization", "Geophysical Measurements", "Data Mining", "Machine Learning", "Data Visualization", "3 D Geological Modeling" ], "authors": [ { "affiliation": null, "fullName": "Xiangyu Yu", "givenName": "Xiangyu", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yixian Xu", "givenName": "Yixian", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-06-01T00:00:00", "pubType": "proceedings", "pages": "40-43", "year": "2015", "issn": null, "isbn": "978-1-4673-7644-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7644a036", "articleId": "12OmNwx3Qam", "__typename": "AdjacentArticleType" }, "next": { "fno": "7644a044", "articleId": "12OmNCga1RO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icig/2004/2244/0/01410471", "title": "NURBS-based 3D graphical modeling and visualization of geological structures", "doi": null, "abstractUrl": "/proceedings-article/icig/2004/01410471/12OmNAq3hQx", "parentPublication": { "id": "proceedings/icig/2004/2244/0", "title": "Proceedings. Third International Conference on Image and Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssdbm/1996/7264/0/72640234", "title": "Characterization of temporal sequences in geophysical databases", "doi": null, "abstractUrl": "/proceedings-article/ssdbm/1996/72640234/12OmNB8kHVx", "parentPublication": { "id": "proceedings/ssdbm/1996/7264/0", "title": "Scientific and Statistical Database Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2015/6850/0/6850a641", "title": "Building a 3D Visualization System for the Geological Survey", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a641/12OmNqGA59F", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1993/3940/0/00398892", "title": "Visualization and modelling of geophysical data", "doi": null, "abstractUrl": "/proceedings-article/visual/1993/00398892/12OmNsbGvHy", "parentPublication": { "id": "proceedings/visual/1993/3940/0", "title": "Proceedings Visualization '93", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2010/7081/4/05514084", "title": "Achieving Complex Geological Object Solid Modeling Based on TIN and TEN", "doi": null, "abstractUrl": "/proceedings-article/icic/2010/05514084/12OmNxTmHMu", "parentPublication": { "id": "proceedings/icic/2010/7081/4", "title": "2010 Third International Conference on Information and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558284", "title": "3D Fine Geological Modeling of the High Water Cut Stage Reservoir: A Case Study of the ES2S1 Reservoir in the Southern Pucheng Oilfield", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558284/12OmNzBwGA6", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/01/mcg2014010016", "title": "Investigating Landfill Contamination by Visualizing Geophysical Data", "doi": null, "abstractUrl": "/magazine/cg/2014/01/mcg2014010016/13rRUxEhFv3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2022/5179/0/517900a127", "title": "Research on 3D Product Service System Based on Spherical Model", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2022/517900a127/1JeFmOj1jMI", "parentPublication": { "id": "proceedings/smartcloud/2022/5179/0", "title": "2022 IEEE 7th International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icikm/2022/6150/0/615000a010", "title": "Study on the Characteristics and Prevention Methods of Seeper in Mined-out Area Based on Big Data Analysis and Geophysical Exploration Technology", "doi": null, "abstractUrl": "/proceedings-article/icikm/2022/615000a010/1Jtw1s9JXxK", "parentPublication": { "id": "proceedings/icikm/2022/6150/0", "title": "2022 International Conference on Innovation, Knowledge, and Management (ICIKM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2021/1289/0/128900a198", "title": "Study on extraction method of geological profile data based on BIM", "doi": null, "abstractUrl": "/proceedings-article/icuems/2021/128900a198/1twf5iUbw7C", "parentPublication": { "id": "proceedings/icuems/2021/1289/0", "title": "2021 2nd International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqBtiPB", "title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "acronym": "3pgcic", "groupId": "1800224", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxG1yLr", "doi": "10.1109/3PGCIC.2015.127", "title": "Research and Implementation on Visual Analysis of Geological Volume", "normalizedTitle": "Research and Implementation on Visual Analysis of Geological Volume", "abstract": "In engineering applications, the visualization of geological data can help scientists to fully understand spatial distribution of geological information, so that the geological structure analysis will be more intuitive and accurate, which providing an intuitive analysis method for quantitative geological structure research. But at present, in the visualization of geological formation, technologist are accustomed to a single three-dimensional visualization or two-dimensional visualization, without combining them together. This paper studies and implements the key technologies of interaction between two dimensional visualization and three dimensional visualization of geological volume data, algorithms of geological model ' s cutting and the visualization of bathymetric map. Those technologies provide practicable solutions for full-scale visualization of geological data, and have already been used in the research project of Southern China Geological Form Display.", "abstracts": [ { "abstractType": "Regular", "content": "In engineering applications, the visualization of geological data can help scientists to fully understand spatial distribution of geological information, so that the geological structure analysis will be more intuitive and accurate, which providing an intuitive analysis method for quantitative geological structure research. But at present, in the visualization of geological formation, technologist are accustomed to a single three-dimensional visualization or two-dimensional visualization, without combining them together. This paper studies and implements the key technologies of interaction between two dimensional visualization and three dimensional visualization of geological volume data, algorithms of geological model ' s cutting and the visualization of bathymetric map. Those technologies provide practicable solutions for full-scale visualization of geological data, and have already been used in the research project of Southern China Geological Form Display.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In engineering applications, the visualization of geological data can help scientists to fully understand spatial distribution of geological information, so that the geological structure analysis will be more intuitive and accurate, which providing an intuitive analysis method for quantitative geological structure research. But at present, in the visualization of geological formation, technologist are accustomed to a single three-dimensional visualization or two-dimensional visualization, without combining them together. This paper studies and implements the key technologies of interaction between two dimensional visualization and three dimensional visualization of geological volume data, algorithms of geological model ' s cutting and the visualization of bathymetric map. Those technologies provide practicable solutions for full-scale visualization of geological data, and have already been used in the research project of Southern China Geological Form Display.", "fno": "9473a146", "keywords": [ "Geology", "Data Visualization", "Three Dimensional Displays", "Solid Modeling", "Image Edge Detection", "Mathematical Model", "Surface Topography", "Bathymetric Map", "3 D Visualization", "Cutting", "Delaunay Triangulation" ], "authors": [ { "affiliation": null, "fullName": "Kunliang Liu", "givenName": "Kunliang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dakun Zhang", "givenName": "Dakun", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xu An Wang", "givenName": "Xu An", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guozhi Song", "givenName": "Guozhi", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shuxia Ren", "givenName": "Shuxia", "surname": "Ren", "__typename": "ArticleAuthorType" } ], "idPrefix": "3pgcic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "146-150", "year": "2015", "issn": null, "isbn": "978-1-4673-9473-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9473a141", "articleId": "12OmNrAdsHX", "__typename": "AdjacentArticleType" }, "next": { "fno": "9473a151", "articleId": "12OmNARiM3d", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icig/2004/2244/0/01410471", "title": "NURBS-based 3D graphical modeling and visualization of geological structures", "doi": null, "abstractUrl": "/proceedings-article/icig/2004/01410471/12OmNAq3hQx", "parentPublication": { "id": "proceedings/icig/2004/2244/0", "title": "Proceedings. Third International Conference on Image and Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a021", "title": "Study of 3D Geological Structure Modeling and Visualization Application Based on Computer Technology", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a021/12OmNClQ0wR", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2015/6850/0/6850a641", "title": "Building a 3D Visualization System for the Geological Survey", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a641/12OmNqGA59F", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2015/7644/0/7644a040", "title": "A Methodology for Automatically 3D Geological Modeling Based on Geophysical Data Grids", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a040/12OmNwLOYRB", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2010/7081/4/05514084", "title": "Achieving Complex Geological Object Solid Modeling Based on TIN and TEN", "doi": null, "abstractUrl": "/proceedings-article/icic/2010/05514084/12OmNxTmHMu", "parentPublication": { "id": "proceedings/icic/2010/7081/4", "title": "2010 Third International Conference on Information and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558277", "title": "Applications of Three-Dimensional Geological Modeling in the Development of Da Qingzi Oilfield", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558277/12OmNzTH0Gj", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a716", "title": "Study on geological structure characteristics of Lamadian oilfield test area based on gptmap software", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a716/1Hcncu50nzq", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2022/5179/0/517900a127", "title": "Research on 3D Product Service System Based on Spherical Model", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2022/517900a127/1JeFmOj1jMI", "parentPublication": { "id": "proceedings/smartcloud/2022/5179/0", "title": "2022 IEEE 7th International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09576578", "title": "Real-Time Visualization of Large-Scale Geological Models With Nonlinear Feature-Preserving Levels of Detail", "doi": null, "abstractUrl": "/journal/tg/2023/02/09576578/1xIKu8EbmkE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxcMSdz", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "acronym": "uic-atc-scalcom", "groupId": "1002946", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzsJ7x0", "doi": "10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.93", "title": "Management of Unstructured Geological Data Based on Hadoop", "normalizedTitle": "Management of Unstructured Geological Data Based on Hadoop", "abstract": "For over a century Geological Survey of China (CGS) has accumulated an enormous amount of data on geology, mineral resources and petroleum fields of China. Many of this geological information were recorded in unstructured formats. How to derive useful knowledge from these data for industrial and research users is a challenging problem for a long period. In this paper, we developed a hierarchical model to store the unstructured geological data based on Hadoop. Using a modified KNN (K-Nearest Neighbor) algorithm based on MapReduce framework, top 10 geological words were identified and analyzed in the unstructured geological test data.", "abstracts": [ { "abstractType": "Regular", "content": "For over a century Geological Survey of China (CGS) has accumulated an enormous amount of data on geology, mineral resources and petroleum fields of China. Many of this geological information were recorded in unstructured formats. How to derive useful knowledge from these data for industrial and research users is a challenging problem for a long period. In this paper, we developed a hierarchical model to store the unstructured geological data based on Hadoop. Using a modified KNN (K-Nearest Neighbor) algorithm based on MapReduce framework, top 10 geological words were identified and analyzed in the unstructured geological test data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For over a century Geological Survey of China (CGS) has accumulated an enormous amount of data on geology, mineral resources and petroleum fields of China. Many of this geological information were recorded in unstructured formats. How to derive useful knowledge from these data for industrial and research users is a challenging problem for a long period. In this paper, we developed a hierarchical model to store the unstructured geological data based on Hadoop. Using a modified KNN (K-Nearest Neighbor) algorithm based on MapReduce framework, top 10 geological words were identified and analyzed in the unstructured geological test data.", "fno": "07518272", "keywords": [ "Geology", "Data Models", "Classification Algorithms", "Object Oriented Modeling", "Entropy", "Databases", "Text Categorization", "Geological Survey", "Hadoop", "Unstructured Geological Data", "Automatic Classification" ], "authors": [ { "affiliation": null, "fullName": "Dongqi Wei", "givenName": "Dongqi", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yueqin Zhu", "givenName": "Yueqin", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "uic-atc-scalcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "432-435", "year": "2015", "issn": null, "isbn": "978-1-4673-7211-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07518271", "articleId": "12OmNASraNl", "__typename": "AdjacentArticleType" }, "next": { "fno": "07518273", "articleId": "12OmNxxdZFH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/msn/2013/5159/0/06726347", "title": "The Design of Distributed Architecture for Geological Prospecting Projection Management System", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726347/12OmNA2cYBf", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2004/2244/0/01410471", "title": "NURBS-based 3D graphical modeling and visualization of geological structures", "doi": null, "abstractUrl": "/proceedings-article/icig/2004/01410471/12OmNAq3hQx", "parentPublication": { "id": "proceedings/icig/2004/2244/0", "title": "Proceedings. Third International Conference on Image and Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a021", "title": "Study of 3D Geological Structure Modeling and Visualization Application Based on Computer Technology", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a021/12OmNClQ0wR", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2015/7644/0/7644a040", "title": "A Methodology for Automatically 3D Geological Modeling Based on Geophysical Data Grids", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a040/12OmNwLOYRB", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2015/9473/0/9473a146", "title": "Research and Implementation on Visual Analysis of Geological Volume", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2015/9473a146/12OmNxG1yLr", "parentPublication": { "id": "proceedings/3pgcic/2015/9473/0", "title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/6079/1/05445747", "title": "Study of Geological Disaster Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/05445747/12OmNxWLTpP", "parentPublication": { "id": "proceedings/iccea/2010/6079/1", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dbta/2009/3604/0/3604a018", "title": "Geological Spatial Data Mining Basing on Web Geological Database", "doi": null, "abstractUrl": "/proceedings-article/dbta/2009/3604a018/12OmNzVoBNN", "parentPublication": { "id": "proceedings/dbta/2009/3604/0", "title": "2009 First International Workshop on Database Technology and Applications, DBTA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a191", "title": "Geological Disaster Emergency Decision Support System based on Location-Based Service", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a191/1FUVIPaPWc8", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103684", "title": "The Research and Practice of a General Data Management Tool on Multivariate Marine Geology Data", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103684/1kesAljzQMo", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Byek4Mxh9m", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "acronym": "icmtma", "groupId": "1002837", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1ByeTcY2hnW", "doi": "10.1109/ICMTMA54903.2022.00213", "title": "Geological Map Database Management System based on GIS and DEM", "normalizedTitle": "Geological Map Database Management System based on GIS and DEM", "abstract": "Geological Map Database Management System has been developed based on component GIS in this paper. It integrated the DEM and the National basic geological map. It can realize real-time transformation of two-dimensional plane and three- dimensional display on the geological map, extraction data by custom area, and geological analysis of slope, aspect, section lines. It can improve the map&#x2019;s information, administrative levels and accuracy, and also widely used in geological prospecting, water, earthquake, engineering geology, etc. Therefore, the developed system will provide a scientific basis in the respect of optimizing geological environment, the early warning of geological disasters zoning, utilization of underground space and planning for urban construction and development.", "abstracts": [ { "abstractType": "Regular", "content": "Geological Map Database Management System has been developed based on component GIS in this paper. It integrated the DEM and the National basic geological map. It can realize real-time transformation of two-dimensional plane and three- dimensional display on the geological map, extraction data by custom area, and geological analysis of slope, aspect, section lines. It can improve the map&#x2019;s information, administrative levels and accuracy, and also widely used in geological prospecting, water, earthquake, engineering geology, etc. Therefore, the developed system will provide a scientific basis in the respect of optimizing geological environment, the early warning of geological disasters zoning, utilization of underground space and planning for urban construction and development.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geological Map Database Management System has been developed based on component GIS in this paper. It integrated the DEM and the National basic geological map. It can realize real-time transformation of two-dimensional plane and three- dimensional display on the geological map, extraction data by custom area, and geological analysis of slope, aspect, section lines. It can improve the map’s information, administrative levels and accuracy, and also widely used in geological prospecting, water, earthquake, engineering geology, etc. Therefore, the developed system will provide a scientific basis in the respect of optimizing geological environment, the early warning of geological disasters zoning, utilization of underground space and planning for urban construction and development.", "fno": "997800b058", "keywords": [ "Database Management Systems", "Digital Elevation Models", "Disasters", "Geographic Information Systems", "Geology", "Geophysical Techniques", "Geological Map Database Management System", "National Basic Geological Map", "Geological Prospecting", "Engineering Geology", "Geological Environment", "Geological Disasters Zoning", "Urban Development", "Urban Construction", "Seismic Measurements", "Mechatronics", "Geology", "Earthquake Engineering", "Keyboards", "Database Systems", "Real Time Systems", "DEM", "Geological Mapping", "Database Management System", "Automatic Extract" ], "authors": [ { "affiliation": "Chinese Academy of Geological Sciences,SinoProbe Center,Beijing,China,100037", "fullName": "Wei-Cui Ding", "givenName": "Wei-Cui", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Hydrogeology and Environmental Geology, CGS,Baoding,China,071051", "fullName": "Qiang Yang", "givenName": "Qiang", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "China University of Geosciences,School of Earth Sciences and Resources,Beijing,China,100083", "fullName": "Lele Han", "givenName": "Lele", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Geological Sciences,SinoProbe Center,Beijing,China,100037", "fullName": "Xuan-Hua Chen", "givenName": "Xuan-Hua", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Geological Sciences,SinoProbe Center,Beijing,China,100037", "fullName": "Sheng-Lin Xu", "givenName": "Sheng-Lin", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong Zhengyuan Digital City Construction Co., Lid,Yantai,China,264000", "fullName": "Meiqing Du", "givenName": "Meiqing", "surname": "Du", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmtma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-01-01T00:00:00", "pubType": "proceedings", "pages": "1058-1063", "year": "2022", "issn": null, "isbn": "978-1-6654-9978-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "997800b052", "articleId": "1ByeSWYfOUw", "__typename": "AdjacentArticleType" }, "next": { "fno": "997800b064", "articleId": "1ByeHsvW8mI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/msn/2013/5159/0/06726347", "title": "The Design of Distributed Architecture for Geological Prospecting Projection Management System", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726347/12OmNA2cYBf", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/2/3557c590", "title": "Imaged Geological Map: A Quantitative Way to Express Geological Information", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557c590/12OmNBKmXsy", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b244", "title": "New Method Research on Remote Sensing Interpretation for Debris Flow Geological Hazard at Country Level", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b244/12OmNCeK28y", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2015/9473/0/9473a146", "title": "Research and Implementation on Visual Analysis of Geological Volume", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2015/9473a146/12OmNxG1yLr", "parentPublication": { "id": "proceedings/3pgcic/2015/9473/0", "title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/6079/1/05445747", "title": "Study of Geological Disaster Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/05445747/12OmNxWLTpP", "parentPublication": { "id": "proceedings/iccea/2010/6079/1", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dbta/2009/3604/0/3604a217", "title": "Mineralization Information Mining from GIS Map & Attribution Database and Multi-sources Data Intergration", "doi": null, "abstractUrl": "/proceedings-article/dbta/2009/3604a217/12OmNyrIaLf", "parentPublication": { "id": "proceedings/dbta/2009/3604/0", "title": "2009 First International Workshop on Database Technology and Applications, DBTA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2016/2461/0/2461a928", "title": "Geological Segmentation on UAV Aerial Image Using Shape-Based LSM with Dominant Color", "doi": null, "abstractUrl": "/proceedings-article/waina/2016/2461a928/12OmNywfKGY", "parentPublication": { "id": "proceedings/waina/2016/2461/0", "title": "2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336j094", "title": "The Design and Realization of Computer-Aided Drawing for the Prospecting Line Profile Map", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336j094/12OmNzlUKIq", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518272", "title": "Management of Unstructured Geological Data Based on Hadoop", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518272/12OmNzsJ7x0", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a191", "title": "Geological Disaster Emergency Decision Support System based on Location-Based Service", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a191/1FUVIPaPWc8", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KYsZsmReSY", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "acronym": "icnisc", "groupId": "10045340", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KYtpzXLs40", "doi": "10.1109/ICNISC57059.2022.00046", "title": "Review and Prospect of Geological Hazard Monitoring Methods", "normalizedTitle": "Review and Prospect of Geological Hazard Monitoring Methods", "abstract": "Geological disaster monitoring can provide useful information for natural disaster early warning. In this study, the existing geological disaster monitoring sensor technology, monitoring technology is summarized. The theory, function and characteristics of the existing geological disaster monitoring sensors are introduced in detail. Several frequently used geological disaster monitoring technologies are described, and their advantages and disadvantages are compared and analyzed. Finally, the development trend of geological disaster monitoring technology is predicted.", "abstracts": [ { "abstractType": "Regular", "content": "Geological disaster monitoring can provide useful information for natural disaster early warning. In this study, the existing geological disaster monitoring sensor technology, monitoring technology is summarized. The theory, function and characteristics of the existing geological disaster monitoring sensors are introduced in detail. Several frequently used geological disaster monitoring technologies are described, and their advantages and disadvantages are compared and analyzed. Finally, the development trend of geological disaster monitoring technology is predicted.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geological disaster monitoring can provide useful information for natural disaster early warning. In this study, the existing geological disaster monitoring sensor technology, monitoring technology is summarized. The theory, function and characteristics of the existing geological disaster monitoring sensors are introduced in detail. Several frequently used geological disaster monitoring technologies are described, and their advantages and disadvantages are compared and analyzed. Finally, the development trend of geological disaster monitoring technology is predicted.", "fno": "535100a181", "keywords": [ "Disasters", "Geology", "Hazards", "Existing Geological Disaster Monitoring Sensor Technology", "Existing Geological Disaster Monitoring Sensors", "Geological Disaster Monitoring Technology", "Geological Hazard Monitoring Methods", "Natural Disaster Early Warning", "Computers", "Automation", "Costs", "Geology", "Market Research", "Hazards", "Monitoring", "Component", "Geological Disaster", "Sensor", "Geological Hazard Monitoring Technology" ], "authors": [ { "affiliation": "East China University of Technology,Nanchang,Jiangxi,China", "fullName": "Han Zhang", "givenName": "Han", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Geological Information Engineering Team, Geological Bureau,Nanchang,Jiangxi,China", "fullName": "Huo Liu", "givenName": "Huo", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanchang Dam Simulation Monitoring IoT Application Engineering Technology Center,Nanchang,Jiangxi,China", "fullName": "Weiguo Xiong", "givenName": "Weiguo", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": "Affiliated Hospital of Jiangxi University of Traditional Chinese Medicine,Nanchang,Jiangxi,China", "fullName": "Jun Fang", "givenName": "Jun", "surname": "Fang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnisc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-09-01T00:00:00", "pubType": "proceedings", "pages": "181-184", "year": "2022", "issn": null, "isbn": "978-1-6654-5351-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "535100a177", "articleId": "1KYt22k6Dn2", "__typename": "AdjacentArticleType" }, "next": { "fno": "535100a185", "articleId": "1KYtezPYifC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iitaw/2008/3505/0/3505a255", "title": "Research on the City Gas Network Resisting Engineering Geological Hazard Damage Warning and Decision Support System", "doi": null, "abstractUrl": "/proceedings-article/iitaw/2008/3505a255/12OmNAS9zPl", "parentPublication": { "id": "proceedings/iitaw/2008/3505/0", "title": "2008 International Symposium on Intelligent Information Technology Application Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fitme/2008/3480/0/3480a177", "title": "The Study on City Gas Network Resisting Engineering Geological Hazard Damage Early Warning and Decision Support System", "doi": null, "abstractUrl": "/proceedings-article/fitme/2008/3480a177/12OmNBv2Cki", "parentPublication": { "id": "proceedings/fitme/2008/3480/0", "title": "Future Information Technology and Management Engineering, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b244", "title": "New Method Research on Remote Sensing Interpretation for Debris Flow Geological Hazard at Country Level", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b244/12OmNCeK28y", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/git4ndm/2013/2269/0/2269a001", "title": "The Distribution Characters and Development Trends of Secondary Geological Disasters Caused by Lushan Ms 7.0 Earthquake in Sichuan Province, China", "doi": null, "abstractUrl": "/proceedings-article/git4ndm/2013/2269a001/12OmNx76TVK", "parentPublication": { "id": "proceedings/git4ndm/2013/2269/0", "title": "2013 Fifth International Conference on Geo-Information Technologies for Natural Disaster Management (GiT4NDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a268", "title": "A Study of Spatial Information Sharing Model Based on Geological Hazard Domain Ontology", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a268/12OmNySG3R6", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a191", "title": "Geological Disaster Emergency Decision Support System based on Location-Based Service", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a191/1FUVIPaPWc8", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aie/2022/7400/0/740000a117", "title": "Application of Triggered Inclination Monitoring Microsystem Base on Double MEMS Accelerometers in Geological Disaster Monitoring", "doi": null, "abstractUrl": "/proceedings-article/aie/2022/740000a117/1GZj8mKeNBm", "parentPublication": { "id": "proceedings/aie/2022/7400/0", "title": "2022 International Conference on Artificial Intelligence in Everything (AIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2022/5488/0/548800a107", "title": "Construction of Early Warning Model of Geological Disasters Based on Data Mining", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2022/548800a107/1LvAn3pN4iI", "parentPublication": { "id": "proceedings/iscsic/2022/5488/0", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icscde/2021/0142/0/014200a136", "title": "Design of geological disaster early warning system based on multi source rainfall data", "doi": null, "abstractUrl": "/proceedings-article/icscde/2021/014200a136/1xtSGefK1Ik", "parentPublication": { "id": "proceedings/icscde/2021/0142/0", "title": "2021 International Conference of Social Computing and Digital Economy (ICSCDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LvAgOJRVtK", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "acronym": "iscsic", "groupId": "1824604", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LvAn3pN4iI", "doi": "10.1109/ISCSIC57216.2022.00032", "title": "Construction of Early Warning Model of Geological Disasters Based on Data Mining", "normalizedTitle": "Construction of Early Warning Model of Geological Disasters Based on Data Mining", "abstract": "In view of the problem that traditional geological disaster monitoring methods cannot adapt to the development of big data, an early warning model of geological disasters based on data mining was proposed. Firstly, the function of the early warning system was determined, and the system included login, data mining and cleaning, early warning and other functions. Secondly, the early warning evaluation system of geological disasters was constructed from the three aspects of susceptibility, hazard and risk, and then the risk was early warned and evaluated by analytic hierarchy process and fuzzy evaluation method. The experimental results showed that in the actual prediction, the early warning results obtained by the early warning model of geological disasters based on data mining are consistent with the actual situation. Moreover, compared with the historical data, the prediction accuracy of the medium above disaster data in the early warning model reaches 87.433%. Therefore, the early warning model of geological disasters based on data mining can accurately predict geological disasters.", "abstracts": [ { "abstractType": "Regular", "content": "In view of the problem that traditional geological disaster monitoring methods cannot adapt to the development of big data, an early warning model of geological disasters based on data mining was proposed. Firstly, the function of the early warning system was determined, and the system included login, data mining and cleaning, early warning and other functions. Secondly, the early warning evaluation system of geological disasters was constructed from the three aspects of susceptibility, hazard and risk, and then the risk was early warned and evaluated by analytic hierarchy process and fuzzy evaluation method. The experimental results showed that in the actual prediction, the early warning results obtained by the early warning model of geological disasters based on data mining are consistent with the actual situation. Moreover, compared with the historical data, the prediction accuracy of the medium above disaster data in the early warning model reaches 87.433%. Therefore, the early warning model of geological disasters based on data mining can accurately predict geological disasters.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In view of the problem that traditional geological disaster monitoring methods cannot adapt to the development of big data, an early warning model of geological disasters based on data mining was proposed. Firstly, the function of the early warning system was determined, and the system included login, data mining and cleaning, early warning and other functions. Secondly, the early warning evaluation system of geological disasters was constructed from the three aspects of susceptibility, hazard and risk, and then the risk was early warned and evaluated by analytic hierarchy process and fuzzy evaluation method. The experimental results showed that in the actual prediction, the early warning results obtained by the early warning model of geological disasters based on data mining are consistent with the actual situation. Moreover, compared with the historical data, the prediction accuracy of the medium above disaster data in the early warning model reaches 87.433%. Therefore, the early warning model of geological disasters based on data mining can accurately predict geological disasters.", "fno": "548800a107", "keywords": [ "Alarm Systems", "Analytic Hierarchy Process", "Big Data", "Data Mining", "Disasters", "Emergency Management", "Fuzzy Set Theory", "Geology", "Data Mining", "Disaster Data", "Early Warning Evaluation System", "Early Warning Model", "Early Warning Results", "Early Warning System", "Geological Disasters", "Traditional Geological Disaster Monitoring Methods", "Databases", "Geology", "Crawlers", "Predictive Models", "Big Data", "Data Models", "Hazards", "Data Mining", "Early Warning Of Geological Disasters", "Liability", "Hazard", "Risk" ], "authors": [ { "affiliation": "Chongqing Vocational College Public Transprotantion,College of Railways and Architecture,Chongqing,China,401120", "fullName": "Ying Wang", "givenName": "Ying", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing Institute of Geology and Mineral Resources,Ecological Restoration Branch,Chongqing,China,401120", "fullName": "XianBin Yang", "givenName": "XianBin", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscsic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "107-111", "year": "2022", "issn": null, "isbn": "978-1-6654-5488-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "548800a101", "articleId": "1LvAnT5lWiQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "548800a112", "articleId": "1LvAlwl1i4U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciicii/2015/8312/0/8312a093", "title": "Construction of Service-Oriented Regional Geo-hazards Meteorological Early Warning Model Base", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a093/12OmNAXPy1a", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fitme/2008/3480/0/3480a177", "title": "The Study on City Gas Network Resisting Engineering Geological Hazard Damage Early Warning and Decision Support System", "doi": null, "abstractUrl": "/proceedings-article/fitme/2008/3480a177/12OmNBv2Cki", "parentPublication": { "id": "proceedings/fitme/2008/3480/0", "title": "Future Information Technology and Management Engineering, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2009/3887/0/pid982680", "title": "A Study on Urban Early Warning System against Exceptionally Severe Disasters", "doi": null, "abstractUrl": "/proceedings-article/icise/2009/pid982680/12OmNyywxEo", "parentPublication": { "id": "proceedings/icise/2009/3887/0", "title": "Information Science and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a132", "title": "Research on The Construction of Corruption Early Warning Mining Model Based on Big Data", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a132/1CJfYKCBrLW", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aie/2022/7400/0/740000a117", "title": "Application of Triggered Inclination Monitoring Microsystem Base on Double MEMS Accelerometers in Geological Disaster Monitoring", "doi": null, "abstractUrl": "/proceedings-article/aie/2022/740000a117/1GZj8mKeNBm", "parentPublication": { "id": "proceedings/aie/2022/7400/0", "title": "2022 International Conference on Artificial Intelligence in Everything (AIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a181", "title": "Review and Prospect of Geological Hazard Monitoring Methods", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a181/1KYtpzXLs40", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103850", "title": "Design of Slope Displacement Monitoring and Early Warning System Based on Beidou", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103850/1keszhBIPYs", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2020/8832/0/09151515", "title": "Early Warning Wndex and Application of Roof Disaster in Fully Mechanized Mining Face", "doi": null, "abstractUrl": "/proceedings-article/icuems/2020/09151515/1lRlObePm7e", "parentPublication": { "id": "proceedings/icuems/2020/8832/0", "title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icscde/2021/0142/0/014200a136", "title": "Design of geological disaster early warning system based on multi source rainfall data", "doi": null, "abstractUrl": "/proceedings-article/icscde/2021/014200a136/1xtSGefK1Ik", "parentPublication": { "id": "proceedings/icscde/2021/0142/0", "title": "2021 International Conference of Social Computing and Digital Economy (ICSCDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dUo07mzDNu", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "acronym": "icnisc", "groupId": "1807445", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1dUo3uzNiJG", "doi": "10.1109/ICNISC.2018.00047", "title": "Design and Implementation of Geological Environment Survey Big Data Platform for Danjiangkou Reservoir Water Source Area Based on WebGIS", "normalizedTitle": "Design and Implementation of Geological Environment Survey Big Data Platform for Danjiangkou Reservoir Water Source Area Based on WebGIS", "abstract": "Danjiangkou reservoir water source area is the source of the water source area of south-to-north water diversion. In order to confirm the specific conditions of the local geological environment, geological environment surveys occupy a very important position. During the survey, a large amount of geological environment data was generated. These data are extremely scattered and cannot be used in a comprehensive manner. For more efficiently using the geological environment survey data and realizing the function of polyphyletic, heterogeneous data management and real-time dynamic update, the paper explained how to use the SQL Server database, rely on the MapGIS geographic information system platform, and carry out secondary development based on the double services of the MapGIS IGServer, and establish a Geological Environment Survey Big Data Integration System based on WebGIS. The polyphyletic, heterogeneous spatial data and attribute data are uniformly processed, stored, searched, managed and analyzed. Data support will be provided for in-depth geological research, analysis and land planning for the Danjiangkou Reservoir water source area on this system platform.", "abstracts": [ { "abstractType": "Regular", "content": "Danjiangkou reservoir water source area is the source of the water source area of south-to-north water diversion. In order to confirm the specific conditions of the local geological environment, geological environment surveys occupy a very important position. During the survey, a large amount of geological environment data was generated. These data are extremely scattered and cannot be used in a comprehensive manner. For more efficiently using the geological environment survey data and realizing the function of polyphyletic, heterogeneous data management and real-time dynamic update, the paper explained how to use the SQL Server database, rely on the MapGIS geographic information system platform, and carry out secondary development based on the double services of the MapGIS IGServer, and establish a Geological Environment Survey Big Data Integration System based on WebGIS. The polyphyletic, heterogeneous spatial data and attribute data are uniformly processed, stored, searched, managed and analyzed. Data support will be provided for in-depth geological research, analysis and land planning for the Danjiangkou Reservoir water source area on this system platform.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Danjiangkou reservoir water source area is the source of the water source area of south-to-north water diversion. In order to confirm the specific conditions of the local geological environment, geological environment surveys occupy a very important position. During the survey, a large amount of geological environment data was generated. These data are extremely scattered and cannot be used in a comprehensive manner. For more efficiently using the geological environment survey data and realizing the function of polyphyletic, heterogeneous data management and real-time dynamic update, the paper explained how to use the SQL Server database, rely on the MapGIS geographic information system platform, and carry out secondary development based on the double services of the MapGIS IGServer, and establish a Geological Environment Survey Big Data Integration System based on WebGIS. The polyphyletic, heterogeneous spatial data and attribute data are uniformly processed, stored, searched, managed and analyzed. Data support will be provided for in-depth geological research, analysis and land planning for the Danjiangkou Reservoir water source area on this system platform.", "fno": "695600a203", "keywords": [ "Big Data", "Data Analysis", "Data Integration", "Database Management Systems", "Geographic Information Systems", "Geology", "Geophysics Computing", "Reservoirs", "SQL", "Geological Environment Survey Data", "Heterogeneous Data Management", "Real Time Dynamic Update", "Geological Environment Survey Big Data Integration System", "Heterogeneous Spatial Data", "Attribute Data", "Data Support", "Land Planning", "Danjiangkou Reservoir Water Source Area", "Geological Environment Survey Big Data Platform", "Danjiangkou Reservoir Water Source Area", "South To North Water Diversion", "Local Geological Environment", "Geological Environment Surveys", "Geological Environment Data", "Geology", "Big Data", "Spatial Databases", "Servers", "Reservoirs", "Danjiangkou", "Big Data Platform", "Geological Environment Survey" ], "authors": [ { "affiliation": "Wuhan Centre of China Geological Survey", "fullName": "Fu Yong-Peng", "givenName": "Fu", "surname": "Yong-Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Centre of China Geological Survey", "fullName": "Li Yi-Yong", "givenName": "Li", "surname": "Yi-Yong", "__typename": "ArticleAuthorType" }, { "affiliation": "Wuhan Centre of China Geological Survey", "fullName": "Wang Lei", "givenName": "Wang", "surname": "Lei", "__typename": "ArticleAuthorType" }, { "affiliation": "China University of Geosciences (Wuhan)", "fullName": "Zhou Ling-Feng", "givenName": "Zhou", "surname": "Ling-Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "China University of Geosciences (Wuhan)", "fullName": "Li Xue-Ping", "givenName": "Li", "surname": "Xue-Ping", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnisc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "203-207", "year": "2018", "issn": null, "isbn": "978-1-5386-6956-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "695600a196", "articleId": "1dUo0r5pA9q", "__typename": "AdjacentArticleType" }, "next": { "fno": "695600a208", "articleId": "1dUo0ii89hu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/msn/2013/5159/0/06726347", "title": "The Design of Distributed Architecture for Geological Prospecting Projection Management System", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726347/12OmNA2cYBf", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456374", "title": "Analysis of the Impact of Reservoir Water Level Fluctuation on the Stability of Cohesive Colluvial Landslide in the Three Gorges Reservoir Area", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456374/12OmNBpmDEh", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2015/6850/0/6850a641", "title": "Building a 3D Visualization System for the Geological Survey", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a641/12OmNqGA59F", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558284", "title": "3D Fine Geological Modeling of the High Water Cut Stage Reservoir: A Case Study of the ES2S1 Reservoir in the Southern Pucheng Oilfield", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558284/12OmNzBwGA6", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b058", "title": "Geological Map Database Management System based on GIS and DEM", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b058/1ByeTcY2hnW", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a716", "title": "Study on geological structure characteristics of Lamadian oilfield test area based on gptmap software", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a716/1Hcncu50nzq", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a834", "title": "Integration and Research of the Multifunctional Geological Survey Information Acquisition System", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a834/1HcnugSkiZO", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2022/5488/0/548800a107", "title": "Construction of Early Warning Model of Geological Disasters Based on Data Mining", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2022/548800a107/1LvAn3pN4iI", "parentPublication": { "id": "proceedings/iscsic/2022/5488/0", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a109", "title": "Development Effect Evaluation and Injection-Production System Adjustment of Water Flooding Reservoir", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a109/1cI61mDUAy4", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2020/9986/0/998600a325", "title": "Application of High Precision 3D Geological Modeling in Horizontal Well Development of Tight Gas Reservoir", "doi": null, "abstractUrl": "/proceedings-article/aiam/2020/998600a325/1tweOLCcTHq", "parentPublication": { "id": "proceedings/aiam/2020/9986/0", "title": "2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNs8", "title": "XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNy5hRb4", "doi": "10.1109/SIBGRAPI.2005.18", "title": "CHF: A Scalable Topological Data Structure for Tetrahedral Meshes", "normalizedTitle": "CHF: A Scalable Topological Data Structure for Tetrahedral Meshes", "abstract": "This work introduces a scalable topological data structure for manifold tetrahedral meshes called Compact Half-Face (CHF). It provides a high degree of scalability, since it is able to optimize the memory consumption/execution time ratio for different applications and data by using features of its different levels. An object-oriented API using class inheritance and virtual instantiation enables a unique interface for each function at any level. CHF requires very few memory, is simple to implement and easy to use, since it substitutes pointers by container of integers and basic bit-wise rules.", "abstracts": [ { "abstractType": "Regular", "content": "This work introduces a scalable topological data structure for manifold tetrahedral meshes called Compact Half-Face (CHF). It provides a high degree of scalability, since it is able to optimize the memory consumption/execution time ratio for different applications and data by using features of its different levels. An object-oriented API using class inheritance and virtual instantiation enables a unique interface for each function at any level. CHF requires very few memory, is simple to implement and easy to use, since it substitutes pointers by container of integers and basic bit-wise rules.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work introduces a scalable topological data structure for manifold tetrahedral meshes called Compact Half-Face (CHF). It provides a high degree of scalability, since it is able to optimize the memory consumption/execution time ratio for different applications and data by using features of its different levels. An object-oriented API using class inheritance and virtual instantiation enables a unique interface for each function at any level. CHF requires very few memory, is simple to implement and easy to use, since it substitutes pointers by container of integers and basic bit-wise rules.", "fno": "23890349", "keywords": [ "Geometric Modeling", "Data Structures", "Object Oriented Programming", "Generic Containers" ], "authors": [ { "affiliation": "PUC-Rio", "fullName": "Marcos Lage", "givenName": "Marcos", "surname": "Lage", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio and INRIA", "fullName": "Thomas Lewiner", "givenName": "Thomas", "surname": "Lewiner", "__typename": "ArticleAuthorType" }, { "affiliation": "PUC-Rio", "fullName": "Hélio Lopes", "givenName": "Hélio", "surname": "Lopes", "__typename": "ArticleAuthorType" }, { "affiliation": "IMPA", "fullName": "Luiz Velho", "givenName": "Luiz", "surname": "Velho", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-10-01T00:00:00", "pubType": "proceedings", "pages": "349-356", "year": "2005", "issn": "1530-1834", "isbn": "0-7695-2389-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23890341", "articleId": "12OmNC8dgnK", "__typename": "AdjacentArticleType" }, "next": { "fno": "23890359", "articleId": "12OmNvxbhNS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2004/01/v0029", "title": "Selective Refinement Queries for Volume Visualization of Unstructured Tetrahedral Meshes", "doi": null, "abstractUrl": "/journal/tg/2004/01/v0029/13rRUyY28Yi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/01/04015405", "title": "Streaming Simplification of Tetrahedral Meshes", "doi": null, "abstractUrl": "/journal/tg/2007/01/04015405/13rRUyY28Yk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqzcvOC", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "acronym": "cdc", "groupId": "1000188", "volume": "2", "displayVolume": "2", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNBcj5Dw", "doi": "10.1109/CDC.2000.912108", "title": "Overview of some theoretical and experimental results on modeling and control of shear flows", "normalizedTitle": "Overview of some theoretical and experimental results on modeling and control of shear flows", "abstract": "This paper reviews the state-of-the-art in the modeling and control of transitional and turbulent shear flows, with particular emphasis on mixing applications. The review is divided into two parts. The first part provides a literature survey of analytical and experimental approaches to the modeling and control of mixing in shear flows. The second part presents some recent results in the development of reduced-order models and model-based control of mixing in some prototypical shear flow problems.", "abstracts": [ { "abstractType": "Regular", "content": "This paper reviews the state-of-the-art in the modeling and control of transitional and turbulent shear flows, with particular emphasis on mixing applications. The review is divided into two parts. The first part provides a literature survey of analytical and experimental approaches to the modeling and control of mixing in shear flows. The second part presents some recent results in the development of reduced-order models and model-based control of mixing in some prototypical shear flow problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper reviews the state-of-the-art in the modeling and control of transitional and turbulent shear flows, with particular emphasis on mixing applications. The review is divided into two parts. The first part provides a literature survey of analytical and experimental approaches to the modeling and control of mixing in shear flows. The second part presents some recent results in the development of reduced-order models and model-based control of mixing in some prototypical shear flow problems.", "fno": "00912108", "keywords": [ "Shear Turbulence", "Mixing", "Shear Flow", "Laminar To Turbulent Transitions", "Flow Control", "Reviews", "Reduced Order Systems", "Shear Flow Modeling", "Shear Flow Control", "Transitional Shear Flows", "Turbulent Shear Flows", "Mixing", "Reduced Order Models", "Model Based Control", "Fluid Flow Control", "Navier Stokes Equations", "Numerical Simulation", "Computational Modeling", "Reduced Order Systems", "Physics Computing", "Control Theory", "Differential Equations", "Stability", "Delay" ], "authors": [ { "affiliation": "Harvard Univ., Cambridge, MA, USA", "fullName": "I. Mezic", "givenName": "I.", "surname": "Mezic", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "S. Narayanan", "givenName": "S.", "surname": "Narayanan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cdc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-01-01T00:00:00", "pubType": "proceedings", "pages": "1709,1710,1711,1712,1713,1714,1715", "year": "2000", "issn": "0191-2216", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00912107", "articleId": "12OmNCd2ryj", "__typename": "AdjacentArticleType" }, "next": { "fno": "00912109", "articleId": "12OmNAnuTke", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/shpcc/1992/2775/0/00232675", "title": "Unsteady flow simulation using an MIMD computer", "doi": null, "abstractUrl": "/proceedings-article/shpcc/1992/00232675/12OmNBpEeXt", "parentPublication": { "id": "proceedings/shpcc/1992/2775/0", "title": "1992 Proceedings Scalable High Performance Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2012/4676/0/4676b387", "title": "Scalable Parallel Algorithms for Boundary Control of Thermally Convective Flows", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2012/4676b387/12OmNqGRGc3", "parentPublication": { "id": "proceedings/ipdpsw/2012/4676/0", "title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/5/00914612", "title": "Shape design of channel flows for steady, incompressible flows", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914612/12OmNrnJ6Wk", "parentPublication": { "id": "proceedings/cdc/2000/6638/5", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/shpcc/1992/2775/0/00232657", "title": "Applications of a parallel pressure-correction algorithm to 3D turbomachinery flows", "doi": null, "abstractUrl": "/proceedings-article/shpcc/1992/00232657/12OmNvrMUiC", "parentPublication": { "id": "proceedings/shpcc/1992/2775/0", "title": "1992 Proceedings Scalable High Performance Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2014/4324/0/4324a112", "title": "TVD and ENO Applications to Supersonic Flows in 2D", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2014/4324a112/12OmNvxbhJA", "parentPublication": { "id": "proceedings/mcsi/2014/4324/0", "title": "2014 International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2011/4648/0/4648a148", "title": "Fluid Animation on Arbitrarily-Shaped Structured Grids", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2011/4648a148/12OmNzb7Zrb", "parentPublication": { "id": "proceedings/sbgames/2011/4648/0", "title": "2011 Brazilian Symposium on Games and Digital Entertainment", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/med/2006/1/0/04124859", "title": "Experimental Results and Bifurcation Analysis on Scaled Feedback Control for Subsonic Cavity Flows", "doi": null, "abstractUrl": "/proceedings-article/med/2006/04124859/12OmNzmLxBu", "parentPublication": { "id": "proceedings/med/2006/1/0", "title": "Proceedings of the 14th Mediterranean Conference on Control and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2007/06/mcs2007060045", "title": "Shear Flows and Turbulence in Nature", "doi": null, "abstractUrl": "/magazine/cs/2007/06/mcs2007060045/13rRUxD9h13", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600b274", "title": "Shear Velocity Prediction in the Tight Oil Formation with Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600b274/1x3kzwn7VFS", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09599597", "title": "Dynamic Mode Decomposition for Large-Scale Coherent Structure Extraction in Shear Flows", "doi": null, "abstractUrl": "/journal/tg/2023/02/09599597/1yeCaMmiM3S", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTjZWD", "title": "2008 International Conference on Computational Intelligence and Security", "acronym": "cis", "groupId": "1001517", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwekjvz", "doi": "10.1109/CIS.2008.84", "title": "Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation", "normalizedTitle": "Shape Constraint Incorporated Geometric Flows for Blood Vessels Segmentation", "abstract": "Flux maximizing geometric flows have been widely used to segment elongated structures such as blood vessels. Only using the magnitude and direction of an appropriate vector field to segment blood vessels often results in leakages at areas where the image information is ambiguous. To overcome this problem, we combine image statistics and shape information to derive a geometric flow to segment tubular structures and penalize leakages. To accelerate the segmentation speed, a two-stage segmentation framework is presented. Results on cases demonstrate it is the mostly accuracy and efficiency of the approach.", "abstracts": [ { "abstractType": "Regular", "content": "Flux maximizing geometric flows have been widely used to segment elongated structures such as blood vessels. Only using the magnitude and direction of an appropriate vector field to segment blood vessels often results in leakages at areas where the image information is ambiguous. To overcome this problem, we combine image statistics and shape information to derive a geometric flow to segment tubular structures and penalize leakages. To accelerate the segmentation speed, a two-stage segmentation framework is presented. Results on cases demonstrate it is the mostly accuracy and efficiency of the approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Flux maximizing geometric flows have been widely used to segment elongated structures such as blood vessels. Only using the magnitude and direction of an appropriate vector field to segment blood vessels often results in leakages at areas where the image information is ambiguous. To overcome this problem, we combine image statistics and shape information to derive a geometric flow to segment tubular structures and penalize leakages. To accelerate the segmentation speed, a two-stage segmentation framework is presented. Results on cases demonstrate it is the mostly accuracy and efficiency of the approach.", "fno": "3508a560", "keywords": [ "Biomedical MRI", "Blood Vessels", "Brain", "Haemodynamics", "Image Segmentation", "Medical Image Processing", "Shape Constraint Incorporated Geometric Flow", "Two Stage Cerebral Blood Vessel Segmentation Framework", "Flux Maximizing Geometric Flow", "Image Statistics", "Tubular Structure Segmentation", "MR Angiography Image", "Shape", "Blood Vessels", "Image Segmentation", "Biomedical Imaging", "Statistics", "Acceleration", "Blood Flow", "Computer Vision", "Solid Modeling", "Context Modeling", "Medical Image Processing", "Image Segmentation", "Blood Vessels", "Tof MRA" ], "authors": [ { "affiliation": "Sch. of Comput. & Electr. Eng., Univ. of Shanghai for Sci. & Technol., Shanghai, China", "fullName": "Ju-tao Hao", "givenName": "Ju-tao", "surname": "Hao", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Lab. of Power Transm. Equip. & Syst. Security & New Technol., Chongqing Univ., Chongqing, China", "fullName": "Jing-jing Zhao", "givenName": "Jing-jing", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "cis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "560-563", "year": "2008", "issn": null, "isbn": "978-0-7695-3508-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3508a464", "articleId": "12OmNCbU2Tp", "__typename": "AdjacentArticleType" }, "next": { "fno": "3508a570", "articleId": "12OmNx6g6kJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icip/1994/6952/2/00413547", "title": "Three-dimensional imaging of blood vessels using cone-beam CT", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413547/12OmNA14A66", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2008/3456/0/3456a052", "title": "Tracking of Blood Vessels in Retinal Images Using Kalman Filter", "doi": null, "abstractUrl": "/proceedings-article/dicta/2008/3456a052/12OmNARRYiI", "parentPublication": { "id": "proceedings/dicta/2008/3456/0", "title": "2008 Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a377", "title": "Simulation of Blood Vessels for Surgery Simulators", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a377/12OmNAXxXf6", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a203", "title": "Personal Identification Algorithm Based on Retinal Blood Vessels Bifurcation", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a203/12OmNqBbHSt", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6270/2/00576894", "title": "Generalized stochastic tube model: tracking 3D blood vessels in MR images", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576894/12OmNvSKO10", "parentPublication": { "id": "proceedings/icpr/1994/6270/2", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2015/7548/0/7549a166", "title": "A Survey on Blood Vessel Detection Methodologies in Retinal Images", "doi": null, "abstractUrl": "/proceedings-article/cine/2015/7549a166/12OmNxRWI9C", "parentPublication": { "id": "proceedings/cine/2015/7548/0", "title": "2015 International Conference on Computational Intelligence & Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/00937511", "title": "Flux maximizing geometric flows", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/00937511/12OmNynJMGa", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2014/5179/0/06850834", "title": "Automated retinal blood vessels extraction using Optimized Gabor filter", "doi": null, "abstractUrl": "/proceedings-article/iciev/2014/06850834/12OmNz6Apcx", "parentPublication": { "id": "proceedings/iciev/2014/5179/0", "title": "2014 International Conference on Informatics, Electronics & Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a244", "title": "Analysis of Retinal Blood Vessels Using Image Processing Techniques", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a244/12OmNzlD9o0", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a222", "title": "Using Convolutional Neural Networks to Detect and Extract Retinal Blood Vessels in Fundoscopic Images", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a222/19wB3YMIlq0", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zmvjlvd5Ek", "title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zmvo7RzhwA", "doi": "10.1109/BIBE52308.2021.9635269", "title": "Computational Finite Element Analysis of Aortic Root with Bicuspid Valve", "normalizedTitle": "Computational Finite Element Analysis of Aortic Root with Bicuspid Valve", "abstract": "The aim of this work was to evaluate the impact of Bicuspid Aortic Valve (BAV), on displacements, Von Mises stress, shear stress and pressure distribution within the aortic root by using computational Finite Element (FE) method. The three-dimensional (3D) patient-specific geometry of dilated aortic root with BAV was reconstructed based on Computed Tomography (CT) scan images, in order to obtain the 3D finite element mesh. Two types of analyses: i) structural analysis and ii) computational fluid dynamics (CFD) were performed, with applied equivalent material characteristics of BAV and boundary conditions. The initial results for this single case, displacements and Von Mises stress distribution (for structural analysis), as well as shear stress and pressure distribution (for CFD analysis) were quantified concerning anatomical patient&#x0027;s structures. The regions of abnormal stresses on the aortic leaflets and annulus, with asymmetrically open bicuspid valve, were related to the increased pressures and shear stresses and analyzed for this patient-specific case. Due to the difficulties in obtaining such characteristics in vitro or in vivo, the performed computational analysis gave better insight into the biomechanics of the aortic root with BAV that is needed to achieve improvements in surgical repair techniques and presurgical planning.", "abstracts": [ { "abstractType": "Regular", "content": "The aim of this work was to evaluate the impact of Bicuspid Aortic Valve (BAV), on displacements, Von Mises stress, shear stress and pressure distribution within the aortic root by using computational Finite Element (FE) method. The three-dimensional (3D) patient-specific geometry of dilated aortic root with BAV was reconstructed based on Computed Tomography (CT) scan images, in order to obtain the 3D finite element mesh. Two types of analyses: i) structural analysis and ii) computational fluid dynamics (CFD) were performed, with applied equivalent material characteristics of BAV and boundary conditions. The initial results for this single case, displacements and Von Mises stress distribution (for structural analysis), as well as shear stress and pressure distribution (for CFD analysis) were quantified concerning anatomical patient&#x0027;s structures. The regions of abnormal stresses on the aortic leaflets and annulus, with asymmetrically open bicuspid valve, were related to the increased pressures and shear stresses and analyzed for this patient-specific case. Due to the difficulties in obtaining such characteristics in vitro or in vivo, the performed computational analysis gave better insight into the biomechanics of the aortic root with BAV that is needed to achieve improvements in surgical repair techniques and presurgical planning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The aim of this work was to evaluate the impact of Bicuspid Aortic Valve (BAV), on displacements, Von Mises stress, shear stress and pressure distribution within the aortic root by using computational Finite Element (FE) method. The three-dimensional (3D) patient-specific geometry of dilated aortic root with BAV was reconstructed based on Computed Tomography (CT) scan images, in order to obtain the 3D finite element mesh. Two types of analyses: i) structural analysis and ii) computational fluid dynamics (CFD) were performed, with applied equivalent material characteristics of BAV and boundary conditions. The initial results for this single case, displacements and Von Mises stress distribution (for structural analysis), as well as shear stress and pressure distribution (for CFD analysis) were quantified concerning anatomical patient's structures. The regions of abnormal stresses on the aortic leaflets and annulus, with asymmetrically open bicuspid valve, were related to the increased pressures and shear stresses and analyzed for this patient-specific case. Due to the difficulties in obtaining such characteristics in vitro or in vivo, the performed computational analysis gave better insight into the biomechanics of the aortic root with BAV that is needed to achieve improvements in surgical repair techniques and presurgical planning.", "fno": "09635269", "keywords": [ "Biomechanics", "Blood Vessels", "Cardiovascular System", "Computational Fluid Dynamics", "Computerised Tomography", "Diseases", "Finite Element Analysis", "Haemodynamics", "Medical Image Processing", "Physiological Models", "Prosthetics", "Asymmetrically Open Bicuspid Valve", "Increased Pressures", "Patient Specific Case", "Performed Computational Analysis", "BAV", "Computational Finite Element Analysis", "Bicuspid Aortic Valve", "Shear Stress", "Pressure Distribution", "Computational Finite Element Method", "Three Dimensional Patient Specific Geometry", "Dilated Aortic Root", "Computed Tomography Scan Images", "3 D Finite Element Mesh", "Computational Fluid Dynamics", "Applied Equivalent Material Characteristics", "Von Mises Stress Distribution", "Structural Analysis", "CFD Analysis", "Anatomical Patient", "Aortic Leaflets", "Biomechanics", "Analytical Models", "Three Dimensional Displays", "Biological System Modeling", "Computational Fluid Dynamics", "Computational Modeling", "Surgery", "Aortic Root", "Bicuspid Aortic Valve", "Computational Analysis", "Finite Element Method" ], "authors": [ { "affiliation": "University of Kragujevac,Faculty of Engineering,Kragujevac,Serbia", "fullName": "Smiljana Tomasevic", "givenName": "Smiljana", "surname": "Tomasevic", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Information Technologies,Kragujevac,Serbia", "fullName": "Igor Saveljic", "givenName": "Igor", "surname": "Saveljic", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Cardiovascular Diseases,Sremska Kamenica,Serbia", "fullName": "Lazar Velicki", "givenName": "Lazar", "surname": "Velicki", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kragujevac,Faculty of Engineering,Kragujevac,Serbia", "fullName": "Nenad Filipovic", "givenName": "Nenad", "surname": "Filipovic", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2021", "issn": null, "isbn": "978-1-6654-4261-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09635428", "articleId": "1zmvqDB6w5a", "__typename": "AdjacentArticleType" }, "next": { "fno": "09635289", "articleId": "1zmvmnucMrm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/miar/2001/1113/0/11130131", "title": "Development of a Method to Construct Three-Dimensional Finite Element Models of Thoracic Aortic Aneurysms from MRI Images", "doi": null, "abstractUrl": "/proceedings-article/miar/2001/11130131/12OmNAKcNLm", "parentPublication": { "id": "proceedings/miar/2001/1113/0", "title": "Medical Imaging and Augmented Reality, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2017/2628/0/2628a105", "title": "Effect of Torsional Load on the Stress Distribution in Weld-Bonded Steel Disc", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2017/2628a105/12OmNB06l1L", "parentPublication": { "id": "proceedings/icmcce/2017/2628/0", "title": "2017 Second International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcasia/2005/2486/0/24860161", "title": "Three-dimensional Computational Mechanical Analysis for 3-layered Aortic Arch Model under Steady and Unsteady Flow with Fluid-structure Interactions", "doi": null, "abstractUrl": "/proceedings-article/hpcasia/2005/24860161/12OmNBCZnRW", "parentPublication": { "id": "proceedings/hpcasia/2005/2486/0", "title": "Proceedings. Eighth International Conference on High-Performance Computing in Asia-Pacific Region", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a563", "title": "Comparative Finite Element Analysis of Patient-Specific Tricuspid and Bicuspid Aortic Valve", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a563/12OmNCgrD9M", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a559", "title": "Finite Element Analysis of Femoral Implant Under Static Load", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a559/12OmNqFrGxw", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdcat/2005/2405/0/24050989", "title": "Fluid-structure Interaction Within 3-layered Aortic Arch Model under Pulsatile Blood Flow", "doi": null, "abstractUrl": "/proceedings-article/pdcat/2005/24050989/12OmNs59JXk", "parentPublication": { "id": "proceedings/pdcat/2005/2405/0", "title": "Sixth International Conference on Parallel and Distributed Computing Applications and Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfcse/2011/1562/0/06041654", "title": "Study on Cervical Spine Stresses Based on Finite Element Model", "doi": null, "abstractUrl": "/proceedings-article/icfcse/2011/06041654/12OmNwEJ0GF", "parentPublication": { "id": "proceedings/icfcse/2011/1562/0", "title": "2011 International Conference on Future Computer Science and Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2015/7983/0/07367656", "title": "Computational simulation of blood flow in a DeBakey type I aortic dissection", "doi": null, "abstractUrl": "/proceedings-article/bibe/2015/07367656/12OmNwsNRaN", "parentPublication": { "id": "proceedings/bibe/2015/7983/0", "title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2014/7502/0/7502a315", "title": "Numerical Assessment of Turbulent Flow Downstream of Stenosed Aortic Valve with Flexible Leaflets Using Fluid-Solid Interactions Approach", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a315/12OmNyoSbe7", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a656", "title": "Finite Element Analysis of Hollow Shaft under Torsion and Teaching Practice in Higher Vocational Colleges", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a656/1KpBzJ35VLi", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAXxXaK", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyS6Rzc", "doi": "10.1109/ICCV.2017.26", "title": "Learning Compact Geometric Features", "normalizedTitle": "Learning Compact Geometric Features", "abstract": "We present an approach to learning features that represent the local geometry around a point in an unstructured point cloud. Such features play a central role in geometric registration, which supports diverse applications in robotics and 3D vision. Current state-of-the-art local features for unstructured point clouds have been manually crafted and none combines the desirable properties of precision, compactness, and robustness. We show that features with these properties can be learned from data, by optimizing deep networks that map high-dimensional histograms into low-dimensional Euclidean spaces. The presented approach yields a family of features, parameterized by dimension, that are both more compact and more accurate than existing descriptors.", "abstracts": [ { "abstractType": "Regular", "content": "We present an approach to learning features that represent the local geometry around a point in an unstructured point cloud. Such features play a central role in geometric registration, which supports diverse applications in robotics and 3D vision. Current state-of-the-art local features for unstructured point clouds have been manually crafted and none combines the desirable properties of precision, compactness, and robustness. We show that features with these properties can be learned from data, by optimizing deep networks that map high-dimensional histograms into low-dimensional Euclidean spaces. The presented approach yields a family of features, parameterized by dimension, that are both more compact and more accurate than existing descriptors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an approach to learning features that represent the local geometry around a point in an unstructured point cloud. Such features play a central role in geometric registration, which supports diverse applications in robotics and 3D vision. Current state-of-the-art local features for unstructured point clouds have been manually crafted and none combines the desirable properties of precision, compactness, and robustness. We show that features with these properties can be learned from data, by optimizing deep networks that map high-dimensional histograms into low-dimensional Euclidean spaces. The presented approach yields a family of features, parameterized by dimension, that are both more compact and more accurate than existing descriptors.", "fno": "1032a153", "keywords": [ "Computational Geometry", "Learning Artificial Intelligence", "Unstructured Point Cloud", "Geometric Registration", "Local Features", "Low Dimensional Euclidean Spaces", "Compact Geometric Feature Learning", "High Dimensional Histograms", "Three Dimensional Displays", "Histograms", "Geometry", "Pipelines", "Surface Cleaning", "Shape", "Robots" ], "authors": [ { "affiliation": null, "fullName": "Marc Khoury", "givenName": "Marc", "surname": "Khoury", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qian-Yi Zhou", "givenName": "Qian-Yi", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vladlen Koltun", "givenName": "Vladlen", "surname": "Koltun", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "153-161", "year": "2017", "issn": "2380-7504", "isbn": "978-1-5386-1032-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1032a143", "articleId": "12OmNzXWZKe", "__typename": "AdjacentArticleType" }, "next": { "fno": "1032a162", "articleId": "12OmNzTYBP2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/rvsp/2013/3184/0/3184a051", "title": "Compact Multi-dimensional LBP Features for Improved Texture Retrieval", "doi": null, "abstractUrl": "/proceedings-article/rvsp/2013/3184a051/12OmNBr4eqr", "parentPublication": { "id": "proceedings/rvsp/2013/3184/0", "title": "2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2011/4548/0/4548a001", "title": "Texturing 3D Models with Low Geometric Features", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2011/4548a001/12OmNCcbEik", "parentPublication": { "id": "proceedings/sibgrapi/2011/4548/0", "title": "2011 24th SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pbg/2005/20/0/01500311", "title": "Attraction and projection", "doi": null, "abstractUrl": "/proceedings-article/pbg/2005/01500311/12OmNvlg8io", "parentPublication": { "id": "proceedings/pbg/2005/20/0", "title": "Point-Based Graphics 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2010/7779/0/05575931", "title": "User-Controlled Geometric Feature Preserving Simplification", "doi": null, "abstractUrl": "/proceedings-article/fcst/2010/05575931/12OmNyNQSQn", "parentPublication": { "id": "proceedings/fcst/2010/7779/0", "title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/10/i1041", "title": "Matching Point Features with Ordered Geometric, Rigidity, and Disparity Constraints", "doi": null, "abstractUrl": "/journal/tp/1994/10/i1041/13rRUx0gevO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040100", "title": "Making Sense of Geometric Data", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040100/13rRUyp7tZa", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a052", "title": "Total Denoising: Unsupervised Learning of 3D Point Cloud Cleaning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a052/1hVlvo8kleE", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i957", "title": "Fully Convolutional Geometric Features", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i957/1hVlyusHmsU", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150706", "title": "Self-Supervised Learning of Local Features in 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150706/1lPHxKcwvQI", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800b480", "title": "Geometric Invariant Representation Learning for 3D Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800b480/1zw6hJOIDcs", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qyxi3OgORy", "title": "2020 International Conference on 3D Vision (3DV)", "acronym": "3dv", "groupId": "1800494", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qyxjGFgneM", "doi": "10.1109/3DV50981.2020.00085", "title": "PanoNet3D: Combining Semantic and Geometric Understanding for LiDAR Point Cloud Detection", "normalizedTitle": "PanoNet3D: Combining Semantic and Geometric Understanding for LiDAR Point Cloud Detection", "abstract": "Visual data in autonomous driving perception, such as camera image and LiDAR point cloud, can be interpreted as a mixture of two aspects: semantic feature and geometric structure. Semantics come from the appearance and context of objects to the sensor, while geometric structure is the actual 3D shape of point clouds. Most detectors on LiDAR point clouds focus only on analyzing the geometric structure of objects in real 3D space. Unlike previous works, we propose to learn both semantic feature and geometric structure via a unified multi-view framework. Our method exploits the nature of LiDAR scans - 2D range images, and applies well-studied 2D convolutions to extract semantic features. By fusing semantic and geometric features, our method outperforms state-of-the-art approaches in all categories by a large margin. The methodology of combining semantic and geometric features provides a unique perspective of looking at the problems in real-world 3D point cloud detection.", "abstracts": [ { "abstractType": "Regular", "content": "Visual data in autonomous driving perception, such as camera image and LiDAR point cloud, can be interpreted as a mixture of two aspects: semantic feature and geometric structure. Semantics come from the appearance and context of objects to the sensor, while geometric structure is the actual 3D shape of point clouds. Most detectors on LiDAR point clouds focus only on analyzing the geometric structure of objects in real 3D space. Unlike previous works, we propose to learn both semantic feature and geometric structure via a unified multi-view framework. Our method exploits the nature of LiDAR scans - 2D range images, and applies well-studied 2D convolutions to extract semantic features. By fusing semantic and geometric features, our method outperforms state-of-the-art approaches in all categories by a large margin. The methodology of combining semantic and geometric features provides a unique perspective of looking at the problems in real-world 3D point cloud detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual data in autonomous driving perception, such as camera image and LiDAR point cloud, can be interpreted as a mixture of two aspects: semantic feature and geometric structure. Semantics come from the appearance and context of objects to the sensor, while geometric structure is the actual 3D shape of point clouds. Most detectors on LiDAR point clouds focus only on analyzing the geometric structure of objects in real 3D space. Unlike previous works, we propose to learn both semantic feature and geometric structure via a unified multi-view framework. Our method exploits the nature of LiDAR scans - 2D range images, and applies well-studied 2D convolutions to extract semantic features. By fusing semantic and geometric features, our method outperforms state-of-the-art approaches in all categories by a large margin. The methodology of combining semantic and geometric features provides a unique perspective of looking at the problems in real-world 3D point cloud detection.", "fno": "812800a753", "keywords": [ "Cameras", "Feature Extraction", "Image Recognition", "Image Sensors", "Mobile Robots", "Optical Radar", "Pano Net 3 D", "Geometric Understanding", "Li DAR Point Cloud Detection", "Autonomous Driving Perception", "Camera Image", "Semantic Feature", "Geometric Structure", "Semantics", "Actual 3 D Shape", "Li DAR Point Clouds", "Geometric Features", "Real World 3 D Point Cloud Detection", "Three Dimensional Displays", "Feature Extraction", "Detectors", "Semantics", "Laser Radar", "Two Dimensional Displays", "Tensors", "3 D Detection", "Lidar Point Cloud" ], "authors": [ { "affiliation": "Robotics Institute, Carnegie Mellon University 5000 Forbes Ave,Pittsburgh,Pennsylvania", "fullName": "Xia Chen", "givenName": "Xia", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Robotics Institute, Carnegie Mellon University 5000 Forbes Ave,Pittsburgh,Pennsylvania", "fullName": "Jianren Wang", "givenName": "Jianren", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Robotics Institute, Carnegie Mellon University 5000 Forbes Ave,Pittsburgh,Pennsylvania", "fullName": "David Held", "givenName": "David", "surname": "Held", "__typename": "ArticleAuthorType" }, { "affiliation": "Robotics Institute, Carnegie Mellon University 5000 Forbes Ave,Pittsburgh,Pennsylvania", "fullName": "Martial Hebert", "givenName": "Martial", "surname": "Hebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "753-761", "year": "2020", "issn": null, "isbn": "978-1-7281-8128-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "812800a743", "articleId": "1qyxoJ0PPkk", "__typename": "AdjacentArticleType" }, "next": { "fno": "812800a762", "articleId": "1qyxoT9QVzi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2013/3022/0/3022a714", "title": "Semantic Parsing of Street Scene Images Using 3D LiDAR Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2013/3022a714/12OmNBBQZnh", "parentPublication": { "id": "proceedings/iccvw/2013/3022/0", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc/2017/3790/0/379001b107", "title": "A cGANs-Based Scene Reconstruction Model Using Lidar Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc/2017/379001b107/17D45VsBU2A", "parentPublication": { "id": "proceedings/ispa-iucc/2017/3790/0", "title": "2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j296", "title": "SemanticKITTI: A Dataset for Semantic Scene Understanding of LiDAR Sequences", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j296/1hQqpgtOs0g", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a857", "title": "Monocular 3D Object Detection with Pseudo-LiDAR Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a857/1i5mFr4yElW", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093584", "title": "FuseSeg: LiDAR Point Cloud Segmentation Fusing Multi-Modal Data", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093584/1jPbsnOkgne", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102769", "title": "Lightningnet: Fast and Accurate Semantic Segmentation for Autonomous Driving Based on 3D LIDAR Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102769/1kwqWPaplrG", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09495168", "title": "Cylindrical and Asymmetrical 3D Convolution Networks for LiDAR-Based Perception", "doi": null, "abstractUrl": "/journal/tp/2022/10/09495168/1vyjjXcBARy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5358", "title": "Complete &#x0026; Label: A Domain Adaptation Approach to Semantic Segmentation of LiDAR Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5358/1yeKG8howYE", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900f523", "title": "4D Panoptic LiDAR Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900f523/1yeLogZvWrS", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a920", "title": "Learning Scale-Adaptive Representations for Point-Level LiDAR Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a920/1zWEmjK82hq", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeM866kqYg", "doi": "10.1109/CVPR46437.2021.01412", "title": "Self-supervised Geometric Perception", "normalizedTitle": "Self-supervised Geometric Perception", "abstract": "We present self-supervised geometric perception (SGP), the first general framework to learn a feature descriptor for correspondence matching without any ground-truth geometric model labels (e.g., camera poses, rigid transformations). Our first contribution is to formulate geometric perception as an optimization problem that jointly optimizes the feature descriptor and the geometric models given a large corpus of visual measurements (e.g., images, point clouds). Under this optimization formulation, we show that two important streams of research in vision, namely robust model fitting and deep feature learning, correspond to optimizing one block of the unknown variables while fixing the other block. This analysis naturally leads to our second contribution &#x2013; the SGP algorithm that performs alternating minimization to solve the joint optimization. SGP iteratively executes two meta-algorithms: a teacher that performs robust model fitting given learned features to generate geometric pseudo-labels, and a student that performs deep feature learning under noisy supervision of the pseudo-labels. As a third contribution, we apply SGP to two perception problems on large-scale real datasets, namely relative camera pose estimation on MegaDepth and point cloud registration on 3DMatch. We demonstrate that SGP achieves state-of-the-art performance that is on-par or superior to the supervised oracles trained using ground-truth labels.<sup>1</sup>", "abstracts": [ { "abstractType": "Regular", "content": "We present self-supervised geometric perception (SGP), the first general framework to learn a feature descriptor for correspondence matching without any ground-truth geometric model labels (e.g., camera poses, rigid transformations). Our first contribution is to formulate geometric perception as an optimization problem that jointly optimizes the feature descriptor and the geometric models given a large corpus of visual measurements (e.g., images, point clouds). Under this optimization formulation, we show that two important streams of research in vision, namely robust model fitting and deep feature learning, correspond to optimizing one block of the unknown variables while fixing the other block. This analysis naturally leads to our second contribution &#x2013; the SGP algorithm that performs alternating minimization to solve the joint optimization. SGP iteratively executes two meta-algorithms: a teacher that performs robust model fitting given learned features to generate geometric pseudo-labels, and a student that performs deep feature learning under noisy supervision of the pseudo-labels. As a third contribution, we apply SGP to two perception problems on large-scale real datasets, namely relative camera pose estimation on MegaDepth and point cloud registration on 3DMatch. We demonstrate that SGP achieves state-of-the-art performance that is on-par or superior to the supervised oracles trained using ground-truth labels.<sup>1</sup>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present self-supervised geometric perception (SGP), the first general framework to learn a feature descriptor for correspondence matching without any ground-truth geometric model labels (e.g., camera poses, rigid transformations). Our first contribution is to formulate geometric perception as an optimization problem that jointly optimizes the feature descriptor and the geometric models given a large corpus of visual measurements (e.g., images, point clouds). Under this optimization formulation, we show that two important streams of research in vision, namely robust model fitting and deep feature learning, correspond to optimizing one block of the unknown variables while fixing the other block. This analysis naturally leads to our second contribution – the SGP algorithm that performs alternating minimization to solve the joint optimization. SGP iteratively executes two meta-algorithms: a teacher that performs robust model fitting given learned features to generate geometric pseudo-labels, and a student that performs deep feature learning under noisy supervision of the pseudo-labels. As a third contribution, we apply SGP to two perception problems on large-scale real datasets, namely relative camera pose estimation on MegaDepth and point cloud registration on 3DMatch. We demonstrate that SGP achieves state-of-the-art performance that is on-par or superior to the supervised oracles trained using ground-truth labels.1", "fno": "450900o4345", "keywords": [ "Cameras", "Computational Geometry", "Computer Vision", "Feature Extraction", "Image Matching", "Image Registration", "Iterative Methods", "Learning Artificial Intelligence", "Pose Estimation", "Video Signal Processing", "Self Supervised Geometric Perception", "Feature Descriptor", "Correspondence Matching", "Ground Truth Geometric Model Labels", "Optimization Problem", "Geometric Models", "Optimization Formulation", "Robust Model Fitting", "SGP Algorithm", "Joint Optimization", "Performs Robust Model", "Pseudolabels", "Performs Deep Feature", "Noisy Supervision", "Perception Problems", "Supervised Oracles", "Ground Truth Labels", "Training", "Visualization", "Pose Estimation", "Fitting", "Streaming Media", "Cameras", "Minimization" ], "authors": [ { "affiliation": "MIT Lids", "fullName": "Heng Yang", "givenName": "Heng", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "CMU RI", "fullName": "Wei Dong", "givenName": "Wei", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "MIT Lids", "fullName": "Luca Carlone", "givenName": "Luca", "surname": "Carlone", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel Labs", "fullName": "Vladlen Koltun", "givenName": "Vladlen", "surname": "Koltun", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "14345-14356", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeM80ttq6Y", "name": "pcvpr202145090-09578201s1-mm_450900o4345.zip", "size": "8.85 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578201s1-mm_450900o4345.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900o4335", "articleId": "1yeLfu8LmJW", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900o4357", "articleId": "1yeMdjfe1LW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2014/4985/0/06836029", "title": "Joint semantic and geometric segmentation of videos with a stage model", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836029/12OmNqJq4iV", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/11/ttg2011111676", "title": "Learning a 3D Human Pose Distance Metric from Geometric Pose Descriptor", "doi": null, "abstractUrl": "/journal/tg/2011/11/ttg2011111676/13rRUxASuMA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1998/04/v0307", "title": "Perception of Human Motion With Different Geometric Models", "doi": null, "abstractUrl": "/journal/tg/1998/04/v0307/13rRUyY28Yg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a380", "title": "Geometric Consistency for Self-Supervised End-to-End Visual Odometry", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a380/17D45Wda7fp", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09785843", "title": "Certifiably Optimal Outlier-Robust Geometric Perception: Semidefinite Relaxations and Scalable Global Optimization", "doi": null, "abstractUrl": "/journal/tp/2023/03/09785843/1DPavu2lWHS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859802", "title": "Self-Supervised Video Representation Learning with Motion-Contrastive Perception", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859802/1G9DTS2aMRq", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9270", "title": "Self-Supervised Image Representation Learning with Geometric Set Consistency", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9270/1H1mMPgZggE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/9.346E265", "title": "Weakly-supervised Point Cloud Instance Segmentation with Geometric Priors", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/9.346E265/1KxVbnA0Z5S", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f694", "title": "Self-supervised Relative Pose with Homography Model-fitting in the Loop", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f694/1L8qupstIFG", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300f707", "title": "Unsupervised 3D Pose Estimation With Geometric Self-Supervision", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300f707/1gyrBoGn3SU", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8wTfL", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYoKw5", "doi": "10.1109/ICPR.2008.4761132", "title": "Ridge Regression for Two Dimensional Locality Preserving Projection", "normalizedTitle": "Ridge Regression for Two Dimensional Locality Preserving Projection", "abstract": "Two Dimensional Locality Preserving Projection (2D-LPP) is a recent extension of LPP, a popular face recognition algorithm. It has been shown that 2D-LPP performs better than PCA, 2D-PCA and LPP. However, the computational cost of 2D-LPP is high. This paper proposes a novel algorithm called Ridge Regression for Two Dimensional Locality Preserving Projection (RR-2DLPP), which is an extension of 2D-LPP with the use of ridge regression. RR-2DLPP is comparable to 2D-LPP in performance whilst having a lower computational cost. The experimental results on three benchmark face data sets - the ORL, Yale and FERET databases - demonstrate the effectiveness and efficiency of RR-2DLPP compared with other face recognition algorithms such as PCA, LPP, SR, 2D-PCA and 2D-LPP.", "abstracts": [ { "abstractType": "Regular", "content": "Two Dimensional Locality Preserving Projection (2D-LPP) is a recent extension of LPP, a popular face recognition algorithm. It has been shown that 2D-LPP performs better than PCA, 2D-PCA and LPP. However, the computational cost of 2D-LPP is high. This paper proposes a novel algorithm called Ridge Regression for Two Dimensional Locality Preserving Projection (RR-2DLPP), which is an extension of 2D-LPP with the use of ridge regression. RR-2DLPP is comparable to 2D-LPP in performance whilst having a lower computational cost. The experimental results on three benchmark face data sets - the ORL, Yale and FERET databases - demonstrate the effectiveness and efficiency of RR-2DLPP compared with other face recognition algorithms such as PCA, LPP, SR, 2D-PCA and 2D-LPP.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Two Dimensional Locality Preserving Projection (2D-LPP) is a recent extension of LPP, a popular face recognition algorithm. It has been shown that 2D-LPP performs better than PCA, 2D-PCA and LPP. However, the computational cost of 2D-LPP is high. This paper proposes a novel algorithm called Ridge Regression for Two Dimensional Locality Preserving Projection (RR-2DLPP), which is an extension of 2D-LPP with the use of ridge regression. RR-2DLPP is comparable to 2D-LPP in performance whilst having a lower computational cost. The experimental results on three benchmark face data sets - the ORL, Yale and FERET databases - demonstrate the effectiveness and efficiency of RR-2DLPP compared with other face recognition algorithms such as PCA, LPP, SR, 2D-PCA and 2D-LPP.", "fno": "04761132", "keywords": [ "Face Recognition", "Regression Analysis", "Two Dimensional Locality Preserving Projection", "Face Recognition Algorithm", "Ridge Regression Algorithm", "FERET Database", "Principal Component Analysis", "Face Recognition", "Computational Efficiency", "Linear Discriminant Analysis", "Databases", "Strontium", "Kernel", "Covariance Matrix", "Eigenvalues And Eigenfunctions", "Null Space" ], "authors": [ { "affiliation": "Department of Computing, Curtin University, Australia", "fullName": "Nam Nguyen", "givenName": "Nam", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computing, Curtin University, Australia", "fullName": "Wanquan Liu", "givenName": "Wanquan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computing, Curtin University, Australia", "fullName": "Svetha Venkatesh", "givenName": "Svetha", "surname": "Venkatesh", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "1051-4651", "isbn": "978-1-4244-2174-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04761131", "articleId": "12OmNC8dge9", "__typename": "AdjacentArticleType" }, "next": { "fno": "04761133", "articleId": "12OmNvonIHp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icig/2007/2929/0/29290791", "title": "Iterative Locality Preserving Projection for Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icig/2007/29290791/12OmNAio74s", "parentPublication": { "id": "proceedings/icig/2007/2929/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2011/688/0/05954516", "title": "A Novel Regularized Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/icic/2011/05954516/12OmNB8TU6k", "parentPublication": { "id": "proceedings/icic/2011/688/0", "title": "2011 Fourth International Conference on Information and Computing (ICIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762b034", "title": "Face Image Super-Resolution Using Two-dimensional Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762b034/12OmNBQC87H", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06456667", "title": "Classification of Multivariate Time Series Using Supervised Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06456667/12OmNClQ0Am", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761898", "title": "Boosting performance for 2D Linear Discriminant Analysis via regression", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761898/12OmNvFYQKt", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/4/3119d613", "title": "Locality Preserving Projection in Orthogonal Domain", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119d613/12OmNvTTckq", "parentPublication": { "id": "proceedings/cisp/2008/3119/4", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcip/2009/3699/2/3699b003", "title": "Face Recognition Using Two-Dimensional Discriminant Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/apcip/2009/3699b003/12OmNvjyy2p", "parentPublication": { "id": "proceedings/apcip/2009/3699/1", "title": "Information Processing, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270130", "title": "Face Recognition Using Kernel Ridge Regression", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270130/12OmNxxvAGX", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a214", "title": "Two-Stage Tensor Locality-Preserving Projection Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a214/12OmNzICELs", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsps/2009/3654/0/3654a718", "title": "Identification of Human Faces Using Orthogonal Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/icsps/2009/3654a718/12OmNzl3WVz", "parentPublication": { "id": "proceedings/icsps/2009/3654/0", "title": "2009 International Conference on Signal Processing Systems (ICSPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzX6cee", "title": "2012 International Conference on Information Science and Applications (ICISA 2012)", "acronym": "icisa", "groupId": "1800053", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNxuFBpg", "doi": "10.1109/ICISA.2012.6220924", "title": "Robust Semi-Supervised SVM on Kernel Partial Least Discriminant Space for High Dimensional Data Mining", "normalizedTitle": "Robust Semi-Supervised SVM on Kernel Partial Least Discriminant Space for High Dimensional Data Mining", "abstract": "Kernel machines (such as support vector machines) have demonstrated excellent performance in numerous areas of pattern recognitions. However, traditional kernel machines do not make efficient use of both labeled training data and unlabeled testing data. Moreover, high dimensional and nonlinear distributed data generally degrade the performance of kernel classifiers due to the curse of dimensionality. To address these problems, this study proposes a novel hybrid classifier which constructs a robust semi- supervised support vector machine (SVM) on kernel partial least square discriminant space (KPLSDS). KPLSDS is created by optimal projection of original data space to a representative low dimensional subspace which has maximum covariance between inputs and outputs. Robust semi-supervised SVMs on KPLSDS exploit the candidate low-density separators and simultaneously prevent identifying a poor separator from the help of unlabeled data. Compared with other dimensionality reduction methods and conventional classifiers, the hybrid classifier performs best.", "abstracts": [ { "abstractType": "Regular", "content": "Kernel machines (such as support vector machines) have demonstrated excellent performance in numerous areas of pattern recognitions. However, traditional kernel machines do not make efficient use of both labeled training data and unlabeled testing data. Moreover, high dimensional and nonlinear distributed data generally degrade the performance of kernel classifiers due to the curse of dimensionality. To address these problems, this study proposes a novel hybrid classifier which constructs a robust semi- supervised support vector machine (SVM) on kernel partial least square discriminant space (KPLSDS). KPLSDS is created by optimal projection of original data space to a representative low dimensional subspace which has maximum covariance between inputs and outputs. Robust semi-supervised SVMs on KPLSDS exploit the candidate low-density separators and simultaneously prevent identifying a poor separator from the help of unlabeled data. Compared with other dimensionality reduction methods and conventional classifiers, the hybrid classifier performs best.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Kernel machines (such as support vector machines) have demonstrated excellent performance in numerous areas of pattern recognitions. However, traditional kernel machines do not make efficient use of both labeled training data and unlabeled testing data. Moreover, high dimensional and nonlinear distributed data generally degrade the performance of kernel classifiers due to the curse of dimensionality. To address these problems, this study proposes a novel hybrid classifier which constructs a robust semi- supervised support vector machine (SVM) on kernel partial least square discriminant space (KPLSDS). KPLSDS is created by optimal projection of original data space to a representative low dimensional subspace which has maximum covariance between inputs and outputs. Robust semi-supervised SVMs on KPLSDS exploit the candidate low-density separators and simultaneously prevent identifying a poor separator from the help of unlabeled data. Compared with other dimensionality reduction methods and conventional classifiers, the hybrid classifier performs best.", "fno": "06220924", "keywords": [ "Data Mining", "Least Squares Approximations", "Pattern Classification", "Support Vector Machines", "Robust Semisupervised SVM", "Kernel Partial Least Square Discriminant Space", "High Dimensional Data Mining", "Kernel Machines", "High Dimensional Distributed Data", "Nonlinear Distributed Data", "Kernel Classifiers", "Dimensionality Curse", "Hybrid Classifier", "Robust Semisupervised Support Vector Machine", "KPLSDS", "Original Data Space Optimal Projection", "Candidate Low Density Separators", "Kernel", "Support Vector Machines", "Companies", "Data Mining", "Particle Separators", "Vectors", "Principal Component Analysis" ], "authors": [ { "affiliation": null, "fullName": "Shian-Chang Huang", "givenName": "Shian-Chang", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tung-Kuang Wu", "givenName": "Tung-Kuang", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icisa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-05-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2012", "issn": "2162-9048", "isbn": "978-1-4673-1402-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06220923", "articleId": "12OmNBpmDHI", "__typename": "AdjacentArticleType" }, "next": { "fno": "06220925", "articleId": "12OmNxYtubr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2001/1143/1/114310275", "title": "Self-Supervised earning for Object Recognition based on Kernel Discriminant-EM Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/114310275/12OmNANkog7", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/306P2C44", "title": "Chebyshev approximations to the histogram χ2 kernel", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/306P2C44/12OmNAQJzJN", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2016/3811/0/07738030", "title": "Kernel Partial Least Squares for person re-identification", "doi": null, "abstractUrl": "/proceedings-article/avss/2016/07738030/12OmNC4eSyI", "parentPublication": { "id": "proceedings/avss/2016/3811/0", "title": "2016 13th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2001/1143/1/00937529", "title": "Self-supervised learning for object recognition based on kernel discriminant-EM algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccv/2001/00937529/12OmNz61dxq", "parentPublication": { "id": "proceedings/iccv/2001/1143/1", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130506", "title": "Facial action unit detection using kernel partial least squares", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130506/12OmNzCF4Vd", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761718", "title": "Indefinite Kernel Fisher Discriminant", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761718/12OmNzIl3Cc", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327147", "title": "Learning based on kernel discriminant-EM algorithm for image classification", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327147/12OmNzYNNaQ", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/03/ttp2011030631", "title": "Kernel Optimization in Discriminant Analysis", "doi": null, "abstractUrl": "/journal/tp/2011/03/ttp2011030631/13rRUILLkEO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2012/09/ttp2012091814", "title": "Online Kernel Principal Component Analysis: A Reduced-Order Model", "doi": null, "abstractUrl": "/journal/tp/2012/09/ttp2012091814/13rRUyogGBn", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2018/8023/0/802300a312", "title": "Nonlinear Discriminant Principal Component Analysis for Image Classification and Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/bracis/2018/802300a312/17D45VsBTXT", "parentPublication": { "id": "proceedings/bracis/2018/8023/0", "title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC3FG3S", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "acronym": "isdea", "groupId": "1800333", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNyaGeDX", "doi": "10.1109/ISDEA.2012.254", "title": "Radar Target Recognition Based on Kernel Projection Vector Space Using High-resolution Range Profile", "normalizedTitle": "Radar Target Recognition Based on Kernel Projection Vector Space Using High-resolution Range Profile", "abstract": "In this paper, a novel approach, namely kernel projection vector space (KPVS), is proposed for radar target recognition using high-resolution range profile (HRRP). First, the HRRP samples are mapped into a high-dimensional feature space using nonlinear mapping. Second, the kernel projection vectors, are obtained by kernel discriminant analysis. Then, for each class, the kernel projection vector space is formed using all the training kernel projection vectors of class. Finally, the minimum hyper plane distance classifier (MHDC) is used for classification. The aim of KPVS method is to represent the feature area of target using kernel projection vector space, and effectively measure the distance between the test HRRP and feature area via minimum hyper plane distance (MHD) metric. The experimental results of measured data show that the proposed method has better performance of recognition than KPCA and KFDA.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, a novel approach, namely kernel projection vector space (KPVS), is proposed for radar target recognition using high-resolution range profile (HRRP). First, the HRRP samples are mapped into a high-dimensional feature space using nonlinear mapping. Second, the kernel projection vectors, are obtained by kernel discriminant analysis. Then, for each class, the kernel projection vector space is formed using all the training kernel projection vectors of class. Finally, the minimum hyper plane distance classifier (MHDC) is used for classification. The aim of KPVS method is to represent the feature area of target using kernel projection vector space, and effectively measure the distance between the test HRRP and feature area via minimum hyper plane distance (MHD) metric. The experimental results of measured data show that the proposed method has better performance of recognition than KPCA and KFDA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, a novel approach, namely kernel projection vector space (KPVS), is proposed for radar target recognition using high-resolution range profile (HRRP). First, the HRRP samples are mapped into a high-dimensional feature space using nonlinear mapping. Second, the kernel projection vectors, are obtained by kernel discriminant analysis. Then, for each class, the kernel projection vector space is formed using all the training kernel projection vectors of class. Finally, the minimum hyper plane distance classifier (MHDC) is used for classification. The aim of KPVS method is to represent the feature area of target using kernel projection vector space, and effectively measure the distance between the test HRRP and feature area via minimum hyper plane distance (MHD) metric. The experimental results of measured data show that the proposed method has better performance of recognition than KPCA and KFDA.", "fno": "06456101", "keywords": [ "Distance Measurement", "Principal Component Analysis", "Radar Resolution", "Radar Target Recognition", "Signal Classification", "Kernel Projection Vector Space", "Radar Target Recognition", "High Resolution Range Profile", "HRRP", "High Dimensional Feature Space", "Nonlinear Mapping", "Kernel Discriminant Analysis", "Training Kernel Projection Vector", "Minimum Hyper Plane Distance Classifier", "MHDC", "Classification", "KPVS Method", "Distance Measurement", "KPCA", "KFDA", "Kernel", "Target Recognition", "Radar", "Vectors", "Support Vector Machine Classification", "Equations", "Principal Component Analysis", "Radar Target Recognition", "HRRP", "Kernel Projection Vector Space", "Minimum Hyperplane Distance Classifier" ], "authors": [ { "affiliation": null, "fullName": "Daiying Zhou", "givenName": "Daiying", "surname": "Zhou", "__typename": "ArticleAuthorType" } ], "idPrefix": "isdea", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-01-01T00:00:00", "pubType": "proceedings", "pages": "1077-1080", "year": "2013", "issn": null, "isbn": "978-1-4673-4893-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06456104", "articleId": "12OmNANTAyp", "__typename": "AdjacentArticleType" }, "next": { "fno": "06456097", "articleId": "12OmNz5s0L6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iiki/2016/5952/0/5952a409", "title": "The Range Alignment Algorithm for High-Resolution Range Profile Based on Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iiki/2016/5952a409/12OmNCctfbD", "parentPublication": { "id": "proceedings/iiki/2016/5952/0", "title": "2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031a956", "title": "Extraction of Radar Target Length Based on High Resolution Range Profile", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031a956/12OmNCga1Uf", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890252", "title": "Hyperspectral biological images compression based on multiway tensor projection", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890252/12OmNs5rkQ5", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682291", "title": "A New Method for Estimating Radar Profile Length of a Cone Target", "doi": null, "abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682291/12OmNx1Iw9P", "parentPublication": { "id": "proceedings/greencom-ithingscpscom/2013/5046/0", "title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2012/1402/0/06220924", "title": "Robust Semi-Supervised SVM on Kernel Partial Least Discriminant Space for High Dimensional Data Mining", "doi": null, "abstractUrl": "/proceedings-article/icisa/2012/06220924/12OmNxuFBpg", "parentPublication": { "id": "proceedings/icisa/2012/1402/0", "title": "2012 International Conference on Information Science and Applications (ICISA 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iitaw/2008/3505/0/3505a431", "title": "A Novel Radar Target Recognition Algorithm Based on SVM", "doi": null, "abstractUrl": "/proceedings-article/iitaw/2008/3505a431/12OmNy1SFEL", "parentPublication": { "id": "proceedings/iitaw/2008/3505/0", "title": "2008 International Symposium on Intelligent Information Technology Application Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2012/4858/0/4858a809", "title": "High Resolution Range Profile Recognition Using Robust Kernel Neighborhood Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/cit/2012/4858a809/12OmNy7QftE", "parentPublication": { "id": "proceedings/cit/2012/4858/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2009/3605/1/3605a874", "title": "Automatic Target Recognition Based on HRRP Using SKO-KPCA", "doi": null, "abstractUrl": "/proceedings-article/cso/2009/3605a874/12OmNzXnNy8", "parentPublication": { "id": "cso/2009/3605/1", "title": "2009 International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890263", "title": "Robust visual tracking using latent subspace projection pursuit", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890263/12OmNzd7btc", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/1/3119a184", "title": "Radar Target Recognition Using LVQ Network and Majority Voting", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119a184/12OmNzt0IBa", "parentPublication": { "id": "proceedings/cisp/2008/3119/1", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyxXlsu", "title": "Innovations in Bio-inspired Computing and Applications, International Conference on", "acronym": "ibica", "groupId": "1800621", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzaQoIs", "doi": "10.1109/IBICA.2011.26", "title": "Essence of Two-Dimensional Principal Component Analysis and Its Generalization: Multi-dimensional PCA", "normalizedTitle": "Essence of Two-Dimensional Principal Component Analysis and Its Generalization: Multi-dimensional PCA", "abstract": "This paper examines the connection between two-dimensional principal component analysis (2DPCA) and traditional one-dimensional principal component analysis (PCA) and theoretically reveals the reason why 2DPCA outperforms PCA. Our finding provides new insights into the computation of 2DPCA and give a new equivalent algorithm for performing 2DPCA based on row vectors of original matrices. Based on the new algorithm, we extend the existing 2DPCA algorithm to its multi-dimensional case by developing a new feature extraction technique for multi-dimensional data called multi-dimensional principal component analysis (MDPCA). Different from 2DPCA and PCA, MDPCA is based on multi-dimensional data rather than 2D image matrices or 1D vectors so the range of PCA-based applications is significantly enlarged. The experimental results also demonstrate that MDPCA can extract more effective and robust multi-dimensional image features than 2DPCA.", "abstracts": [ { "abstractType": "Regular", "content": "This paper examines the connection between two-dimensional principal component analysis (2DPCA) and traditional one-dimensional principal component analysis (PCA) and theoretically reveals the reason why 2DPCA outperforms PCA. Our finding provides new insights into the computation of 2DPCA and give a new equivalent algorithm for performing 2DPCA based on row vectors of original matrices. Based on the new algorithm, we extend the existing 2DPCA algorithm to its multi-dimensional case by developing a new feature extraction technique for multi-dimensional data called multi-dimensional principal component analysis (MDPCA). Different from 2DPCA and PCA, MDPCA is based on multi-dimensional data rather than 2D image matrices or 1D vectors so the range of PCA-based applications is significantly enlarged. The experimental results also demonstrate that MDPCA can extract more effective and robust multi-dimensional image features than 2DPCA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper examines the connection between two-dimensional principal component analysis (2DPCA) and traditional one-dimensional principal component analysis (PCA) and theoretically reveals the reason why 2DPCA outperforms PCA. Our finding provides new insights into the computation of 2DPCA and give a new equivalent algorithm for performing 2DPCA based on row vectors of original matrices. Based on the new algorithm, we extend the existing 2DPCA algorithm to its multi-dimensional case by developing a new feature extraction technique for multi-dimensional data called multi-dimensional principal component analysis (MDPCA). Different from 2DPCA and PCA, MDPCA is based on multi-dimensional data rather than 2D image matrices or 1D vectors so the range of PCA-based applications is significantly enlarged. The experimental results also demonstrate that MDPCA can extract more effective and robust multi-dimensional image features than 2DPCA.", "fno": "4606a085", "keywords": [ "Principal Component Analysis", "Multi Dimensional", "Feature Extraction", "Face Recognition" ], "authors": [ { "affiliation": null, "fullName": "Caikou Chen", "givenName": "Caikou", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jingyu Yang", "givenName": "Jingyu", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ibica", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-12-01T00:00:00", "pubType": "proceedings", "pages": "85-90", "year": "2011", "issn": null, "isbn": "978-0-7695-4606-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4606a081", "articleId": "12OmNyLiuqX", "__typename": "AdjacentArticleType" }, "next": { "fno": "4606a091", "articleId": "12OmNAS9zxw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/paciia/2008/3490/1/3490a044", "title": "A Novel Fast Face Recognition Method of Two-Dimensional Principal Component Analysis Based on BP Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a044/12OmNAWH9Gt", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458104", "title": "Kernel-based 2DPCA for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458104/12OmNBvkdlR", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907548", "title": "An Incremental Two-Dimensional Principal Component Analysis for Image Compression and Recognition", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907548/12OmNrJ11zg", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2010/4297/0/4297a280", "title": "Essence of Two-Dimensional Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/cis/2010/4297a280/12OmNwc3wwP", "parentPublication": { "id": "proceedings/cis/2010/4297/0", "title": "2010 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2008/3278/0/3278a572", "title": "Face Recognition Based on Gabor Features and Two-Dimensional PCA", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2008/3278a572/12OmNxA3YTh", "parentPublication": { "id": "proceedings/iih-msp/2008/3278/0", "title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a784", "title": "Wood Identification Based on PCA, 2DPCA and (2D)2PCA", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a784/12OmNyXMQd2", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2011/4482/0/4482a022", "title": "Face Recognition Method Based on Adaptively Weighted Block-Two Dimensional Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2011/4482a022/12OmNywfKBx", "parentPublication": { "id": "proceedings/cicsyn/2011/4482/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/10/07331304", "title": "Two-Dimensional Whitening Reconstruction for Enhancing Robustness of Principal Component Analysis", "doi": null, "abstractUrl": "/journal/tp/2016/10/07331304/13rRUwInvgs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/01/i0131", "title": "Two-Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition", "doi": null, "abstractUrl": "/journal/tp/2004/01/i0131/13rRUxASuTZ", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2016/4847/0/07899869", "title": "Two-dimensional PCA hashing and its extension", "doi": null, "abstractUrl": "/proceedings-article/icpr/2016/07899869/1gyspPzQlOw", "parentPublication": { "id": "proceedings/icpr/2016/4847/0", "title": "2016 23rd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1h5Yv2kLE8E", "title": "2019 IEEE Visualization in Data Science (VDS)", "acronym": "vds", "groupId": "1829064", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1h5YvkuOn8A", "doi": "10.1109/VDS48975.2019.8973381", "title": "Pollux: Interactive Cluster-First Projections of High-Dimensional Data", "normalizedTitle": "Pollux: Interactive Cluster-First Projections of High-Dimensional Data", "abstract": "Semantic interaction is a technique relying upon the interactive semantic exploration of data. When an analyst manipulates data items within a visualization, an underlying model learns from the intent underlying these interactions, updating the parameters of the model controlling the visualization. In this work, we propose, implement, and evaluate a model which defines clusters within this data projection, then projects these clusters into a two-dimensional space using a &#x201C;proximity&#x2248;similarity&#x201D; metaphor. These clusters act as targets against which data values can be manipulated, providing explicit user-driven cluster membership assignments to train the underlying models. Using this cluster-first approach can improve the speed and efficiency of laying out a projection of high-dimensional data, with the tradeoff of distorting the global projection space.", "abstracts": [ { "abstractType": "Regular", "content": "Semantic interaction is a technique relying upon the interactive semantic exploration of data. When an analyst manipulates data items within a visualization, an underlying model learns from the intent underlying these interactions, updating the parameters of the model controlling the visualization. In this work, we propose, implement, and evaluate a model which defines clusters within this data projection, then projects these clusters into a two-dimensional space using a &#x201C;proximity&#x2248;similarity&#x201D; metaphor. These clusters act as targets against which data values can be manipulated, providing explicit user-driven cluster membership assignments to train the underlying models. Using this cluster-first approach can improve the speed and efficiency of laying out a projection of high-dimensional data, with the tradeoff of distorting the global projection space.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Semantic interaction is a technique relying upon the interactive semantic exploration of data. When an analyst manipulates data items within a visualization, an underlying model learns from the intent underlying these interactions, updating the parameters of the model controlling the visualization. In this work, we propose, implement, and evaluate a model which defines clusters within this data projection, then projects these clusters into a two-dimensional space using a “proximity≈similarity” metaphor. These clusters act as targets against which data values can be manipulated, providing explicit user-driven cluster membership assignments to train the underlying models. Using this cluster-first approach can improve the speed and efficiency of laying out a projection of high-dimensional data, with the tradeoff of distorting the global projection space.", "fno": "08973381", "keywords": [ "Data Analysis", "Pattern Clustering", "Data Items", "Data Projection", "Two Dimensional Space", "Data Values", "Explicit User Driven Cluster Membership Assignments", "Cluster First Approach", "High Dimensional Data", "Global Projection Space", "Interactive Cluster", "Semantic Interaction", "Proximity Similarity Metaphor", "Pollux", "Dimension Reduction", "Clustering", "Semantic Interaction", "Exploratory Data Analysis", "Human Centered Computing", "Visualization", "Visual Analytics" ], "authors": [ { "affiliation": "Virginia Tech Discovery Analytics Center", "fullName": "John Wenskovitch", "givenName": "John", "surname": "Wenskovitch", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech Discovery Analytics Center", "fullName": "Chris North", "givenName": "Chris", "surname": "North", "__typename": "ArticleAuthorType" } ], "idPrefix": "vds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "38-47", "year": "2019", "issn": null, "isbn": "978-1-7281-5047-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08973379", "articleId": "1h5YvbYyS4w", "__typename": "AdjacentArticleType" }, "next": { "fno": "08973384", "articleId": "1h5Yv7ni0lG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2004/2177/0/21770471", "title": "Interactive Cluster Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770471/12OmNBlXs8Y", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a223", "title": "An Interactive Interface for Multi-dimensional Data Stream Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a223/12OmNvSKNRP", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298954", "title": "Sparse projections for high-dimensional binary codes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298954/12OmNvSKNYg", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2002/1754/0/17540589", "title": "Optimal Projections of High Dimensional Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2002/17540589/12OmNx8wTlT", "parentPublication": { "id": "proceedings/icdm/2002/1754/0", "title": "2002 IEEE International Conference on Data Mining, 2002. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ivapp/2014/8132/0/07294435", "title": "Role of human perception In Cluster-Based Visual Analysis Of Multidimensional Data Projections", "doi": null, "abstractUrl": "/proceedings-article/ivapp/2014/07294435/12OmNxdm4Ln", "parentPublication": { "id": "proceedings/ivapp/2014/8132/0", "title": "2014 International Conference on Information Visualization Theory and Applications (IVAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122625", "title": "Dimension Projection Matrix/Tree: Interactive Subspace Visual Exploration and Analysis of High Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122625/13rRUx0xPi9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2003/02/c2014", "title": "Using Projections to Visually Cluster High-Dimensional Data", "doi": null, "abstractUrl": "/magazine/cs/2003/02/c2014/13rRUxly9hz", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2019/4253/0/425300a156", "title": "Multidimensional Projections Analysis Using Performance Evaluation Planning", "doi": null, "abstractUrl": "/proceedings-article/bracis/2019/425300a156/1fHkKP2SzEQ", "parentPublication": { "id": "proceedings/bracis/2019/4253/0", "title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552206", "title": "Measuring and Explaining the Inter-Cluster Reliability of Multidimensional Projections", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552206/1xic9jxItoI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09606529", "title": "UnProjection: Leveraging Inverse-Projections for Visual Analytics of High-Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2023/02/09606529/1ymF2Tydh3G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1n90Sv3ORc4", "title": "2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)", "acronym": "icbaie", "groupId": "1837904", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1n90SJW3ANG", "doi": "10.1109/ICBAIE49996.2020.00053", "title": "Three-dimensional reconstruction algorithm based on inverse perspective transformation", "normalizedTitle": "Three-dimensional reconstruction algorithm based on inverse perspective transformation", "abstract": "In order to solve the problems of difficulty and low accuracy in three-dimensional reconstruction based on 2D images, this paper proposes a three-dimensional reconstruction method based on inverse perspective transformation for 2D images. This method through the detection and segmentation in the images of the water wall tube welding area, a two-dimensional image by inverse perspective transformation welding area of the reduction in the three-dimensional world, is obtained by cubic spline interpolation on flow surface area boundary point, using three-dimensional kriging interpolation method involves cloud model, the point cloud model for grid operation, reconstruction of three-dimensional welding zone model. The experimental results show that this method is simple and efficient, and can effectively carry out three-dimensional reconstruction based on 2d images, which provides a new way of thinking for three-dimensional reconstruction of 2D images.", "abstracts": [ { "abstractType": "Regular", "content": "In order to solve the problems of difficulty and low accuracy in three-dimensional reconstruction based on 2D images, this paper proposes a three-dimensional reconstruction method based on inverse perspective transformation for 2D images. This method through the detection and segmentation in the images of the water wall tube welding area, a two-dimensional image by inverse perspective transformation welding area of the reduction in the three-dimensional world, is obtained by cubic spline interpolation on flow surface area boundary point, using three-dimensional kriging interpolation method involves cloud model, the point cloud model for grid operation, reconstruction of three-dimensional welding zone model. The experimental results show that this method is simple and efficient, and can effectively carry out three-dimensional reconstruction based on 2d images, which provides a new way of thinking for three-dimensional reconstruction of 2D images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to solve the problems of difficulty and low accuracy in three-dimensional reconstruction based on 2D images, this paper proposes a three-dimensional reconstruction method based on inverse perspective transformation for 2D images. This method through the detection and segmentation in the images of the water wall tube welding area, a two-dimensional image by inverse perspective transformation welding area of the reduction in the three-dimensional world, is obtained by cubic spline interpolation on flow surface area boundary point, using three-dimensional kriging interpolation method involves cloud model, the point cloud model for grid operation, reconstruction of three-dimensional welding zone model. The experimental results show that this method is simple and efficient, and can effectively carry out three-dimensional reconstruction based on 2d images, which provides a new way of thinking for three-dimensional reconstruction of 2D images.", "fno": "09196236", "keywords": [ "Image Reconstruction", "Image Segmentation", "Interpolation", "Object Detection", "Pipes", "Production Engineering Computing", "Splines Mathematics", "Statistical Analysis", "Welding", "Three Dimensional Reconstruction Algorithm", "Three Dimensional Reconstruction Method", "Water Wall Tube Welding Area", "Two Dimensional Image", "Inverse Perspective Transformation Welding Area", "Three Dimensional World", "Flow Surface Area Boundary Point", "Three Dimensional Kriging Interpolation Method", "Three Dimensional Welding Zone Model", "Welding", "Electron Tubes", "Image Reconstruction", "Interpolation", "Mathematical Model", "Image Segmentation", "Three Dimensional Displays", "Two Dimensional Image", "Inverse Perspective Transformation", "Three Dimensional Reconstruction", "Computer Vision" ], "authors": [ { "affiliation": "Harbin Engineering University,Harbin,China", "fullName": "Sun Zhenyu", "givenName": "Sun", "surname": "Zhenyu", "__typename": "ArticleAuthorType" }, { "affiliation": "Southeast University,Nanjing,China", "fullName": "Wang Lihui", "givenName": "Wang", "surname": "Lihui", "__typename": "ArticleAuthorType" }, { "affiliation": "Harbin Engineering University,Harbin,China", "fullName": "Liu Liqiang", "givenName": "Liu", "surname": "Liqiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbaie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "221-225", "year": "2020", "issn": null, "isbn": "978-1-7281-6499-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09196480", "articleId": "1n90WCpZy8w", "__typename": "AdjacentArticleType" }, "next": { "fno": "09196412", "articleId": "1n90ZbNbT6o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciibms/2015/8562/0/07439503", "title": "Development of Three-Dimensional Hot Bending and Direct Quench using robot", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439503/12OmNC8uRlJ", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbmi/2011/4623/0/4623a008", "title": "A Three-Dimensional Transrectal Ultrasound Imaging System", "doi": null, "abstractUrl": "/proceedings-article/icbmi/2011/4623a008/12OmNrJRP7q", "parentPublication": { "id": "proceedings/icbmi/2011/4623/0", "title": "Intelligent Computation and Bio-Medical Instrumentation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncvpripg/2011/4599/0/4599a204", "title": "Enhancing Radiographic Images Using Two Dimensional Left Median Filter", "doi": null, "abstractUrl": "/proceedings-article/ncvpripg/2011/4599a204/12OmNwMFMiJ", "parentPublication": { "id": "proceedings/ncvpripg/2011/4599/0", "title": "Computer Vision, Pattern Recognition, Image Processing and Graphics, National Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2012/2310/0/06468681", "title": "Research on three-dimensional reconstruction of the liver CT images", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468681/12OmNy3Agre", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/5/3735e397", "title": "Image Segmentation of the Underwater Welding V-seam Image Based on Improved Two-dimensional Ostu Algorithm", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735e397/12OmNy50gcA", "parentPublication": { "id": "proceedings/fskd/2009/3735/5", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2004/8689/0/01434410", "title": "Three dimensional reconstruction of the left ventricle based on the Delaunay triangulation", "doi": null, "abstractUrl": "/proceedings-article/isspit/2004/01434410/12OmNyL0TEP", "parentPublication": { "id": "proceedings/isspit/2004/8689/0", "title": "Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/1/81831173", "title": "Three-dimensional reconstruction of noisy electron microscopy virus particle images", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81831173/12OmNzn391t", "parentPublication": { "id": "proceedings/icip/1997/8183/1", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020780", "title": "Pseudo slicer on three dimensional brain tumor segmentation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020780/1KfRtjunC7K", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctec/2017/5784/0/578400a994", "title": "Three-Dimensional Pulse Electric Field Test System with Optical Fiber", "doi": null, "abstractUrl": "/proceedings-article/icctec/2017/578400a994/1cks7vLuN1u", "parentPublication": { "id": "proceedings/icctec/2017/5784/0", "title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvidl/2020/9481/0/948100a057", "title": "Three-dimensional Reconstruction of Single Pipeline Radiographic Image", "doi": null, "abstractUrl": "/proceedings-article/cvidl/2020/948100a057/1pbecHZdj2M", "parentPublication": { "id": "proceedings/cvidl/2020/9481/0", "title": "2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4x", "title": "2008 Second International Symposium on Intelligent Information Technology Application", "acronym": "iita", "groupId": "1002566", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNqFJhRw", "doi": "10.1109/IITA.2008.171", "title": "Association Rules Mining and Their Principal Analysis Component Based on Probability and Statistics Estimate Model", "normalizedTitle": "Association Rules Mining and Their Principal Analysis Component Based on Probability and Statistics Estimate Model", "abstract": "Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy or correlativity respectively, even they ignore mining principal factors among all the correlativity. Thus, there seems a paradox among efficiency, accuracy and correlativity. In order to resolve to this conflict, a novel algorithm based on Probability estimate and principal component analysis is proposed to mine the association rules from database with the high correlativity and the high confidence. Probability estimate reduce the times of database scanning so as to increase efficiency and accuracy, and principal component analysis helps us to know which factors have most influence to event rate so as to distinguish correlativity. Experimental results have demonstrated that our algorithms are efficient accurate and correlativity.", "abstracts": [ { "abstractType": "Regular", "content": "Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy or correlativity respectively, even they ignore mining principal factors among all the correlativity. Thus, there seems a paradox among efficiency, accuracy and correlativity. In order to resolve to this conflict, a novel algorithm based on Probability estimate and principal component analysis is proposed to mine the association rules from database with the high correlativity and the high confidence. Probability estimate reduce the times of database scanning so as to increase efficiency and accuracy, and principal component analysis helps us to know which factors have most influence to event rate so as to distinguish correlativity. Experimental results have demonstrated that our algorithms are efficient accurate and correlativity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy or correlativity respectively, even they ignore mining principal factors among all the correlativity. Thus, there seems a paradox among efficiency, accuracy and correlativity. In order to resolve to this conflict, a novel algorithm based on Probability estimate and principal component analysis is proposed to mine the association rules from database with the high correlativity and the high confidence. Probability estimate reduce the times of database scanning so as to increase efficiency and accuracy, and principal component analysis helps us to know which factors have most influence to event rate so as to distinguish correlativity. Experimental results have demonstrated that our algorithms are efficient accurate and correlativity.", "fno": "3497a070", "keywords": [ "Association Rules", "Probability Estimate", "Principal Component Analysis" ], "authors": [ { "affiliation": null, "fullName": "Yun Yu", "givenName": "Yun", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Chen", "givenName": "Wei", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chang Li", "givenName": "Chang", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "iita", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "70-74", "year": "2008", "issn": null, "isbn": "978-0-7695-3497-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3497a065", "articleId": "12OmNvAAtmP", "__typename": "AdjacentArticleType" }, "next": { "fno": "3497a080", "articleId": "12OmNzmLxAI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2012/4789/0/4789b228", "title": "Research of Mining Effective and Weighted Association Rules Based on Dual Confidence", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789b228/12OmNAOsMLG", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997b418", "title": "Effective Mining of Fuzzy Quantitative Weighted Association Rules", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997b418/12OmNARiM20", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2010/4225/3/4225c144", "title": "Mining Efficacious Association Rules Under Length-Decreasing Support Constraint", "doi": null, "abstractUrl": "/proceedings-article/aici/2010/4225c144/12OmNqESucl", "parentPublication": { "id": "proceedings/aici/2010/4225/3", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2010/4339/0/4339a102", "title": "Research on Mining Positive and Negative Association Rules Based on Dual Confidence", "doi": null, "abstractUrl": "/proceedings-article/icicse/2010/4339a102/12OmNrYlmDG", "parentPublication": { "id": "proceedings/icicse/2010/4339/0", "title": "2010 Fifth International Conference on Internet Computing for Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2008/3357/1/3357a791", "title": "Mining Positive and Negative Association Rules in Multi-database Based on Minimum Interestingness", "doi": null, "abstractUrl": "/proceedings-article/icicta/2008/3357a791/12OmNro0I3w", "parentPublication": { "id": "proceedings/icicta/2008/3357/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2009/4830/0/05255112", "title": "Mining opened frequent itemsets to generate maximal Boolean association rules", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255112/12OmNwFiddF", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paciia/2008/3490/1/3490a003", "title": "Association Rules Mining Based on an Optimized Probability and Statistics Estimate Model", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a003/12OmNx38vUu", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/1/3930a141", "title": "Mining Association Rules Based on Apriori Algorithm and Application", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930a141/12OmNxR5UQY", "parentPublication": { "id": "proceedings/ifcsta/2009/3930/3", "title": "Computer Science-Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031d784", "title": "Generalized Association Rule and Orexis Degree", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031d784/12OmNxw5B69", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2012/2120/0/06299263", "title": "Enhance the Multi-level Fuzzy Association Rules Based on Cumulative Probability Distribution Approach", "doi": null, "abstractUrl": "/proceedings-article/snpd/2012/06299263/12OmNyoAAcJ", "parentPublication": { "id": "proceedings/snpd/2012/2120/0", "title": "2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mVE", "title": "Energy and Environment Technology, International Conference on", "acronym": "iceet", "groupId": "1003015", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwE9OwR", "doi": "10.1109/ICEET.2009.418", "title": "Simultaneous Spectrophotometric Determination of Copper, Zinc, Nickel and Cobalt in Water Using Principal Component Regression Coupled with Wavelet Transform", "normalizedTitle": "Simultaneous Spectrophotometric Determination of Copper, Zinc, Nickel and Cobalt in Water Using Principal Component Regression Coupled with Wavelet Transform", "abstract": "This paper describes the simultaneous spectrophotometric determination of copper, zinc, nickel and cobalt in water with 5-Br-PADAP. The absorbance spectra obtained were processed with wavelet transform (WT) for removal of noise from the spectra. In order to eliminate spectral interferences, calculation of the metal concentrations in mixtures was performed using principal component regression (PCR). The results showed that the combination of MT and PCR allowed more accurate and precious spectrophotometric determination of these ions than traditional PCR approach.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the simultaneous spectrophotometric determination of copper, zinc, nickel and cobalt in water with 5-Br-PADAP. The absorbance spectra obtained were processed with wavelet transform (WT) for removal of noise from the spectra. In order to eliminate spectral interferences, calculation of the metal concentrations in mixtures was performed using principal component regression (PCR). The results showed that the combination of MT and PCR allowed more accurate and precious spectrophotometric determination of these ions than traditional PCR approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the simultaneous spectrophotometric determination of copper, zinc, nickel and cobalt in water with 5-Br-PADAP. The absorbance spectra obtained were processed with wavelet transform (WT) for removal of noise from the spectra. In order to eliminate spectral interferences, calculation of the metal concentrations in mixtures was performed using principal component regression (PCR). The results showed that the combination of MT and PCR allowed more accurate and precious spectrophotometric determination of these ions than traditional PCR approach.", "fno": "3819b745", "keywords": [ "Copper", "Zinc", "Nickel", "Cobalt", "Principal Component Regression", "Wavelet Transform", "Spectrophotometry" ], "authors": [ { "affiliation": null, "fullName": "Xiaoguo Ma", "givenName": "Xiaoguo", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dahai Huang", "givenName": "Dahai", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iceet", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-10-01T00:00:00", "pubType": "proceedings", "pages": "745-747", "year": "2009", "issn": null, "isbn": "978-0-7695-3819-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3819b741", "articleId": "12OmNvDI3Po", "__typename": "AdjacentArticleType" }, "next": { "fno": "3819b748", "articleId": "12OmNCfAPNt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mcmc/1993/3540/0/00302148", "title": "The pretreatment of aluminum bondpads for electroless nickel bumping", "doi": null, "abstractUrl": "/proceedings-article/mcmc/1993/00302148/12OmNqBbHOg", "parentPublication": { "id": "proceedings/mcmc/1993/3540/0", "title": "Proceedings of IEEE Multi-Chip Module Conference (MCMC-93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rgGgDpN7vW", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rgGmp6DNQs", "doi": "10.1109/ICDMW51313.2020.00023", "title": "Synthetic Data by Principal Component Analysis", "normalizedTitle": "Synthetic Data by Principal Component Analysis", "abstract": "In statistical disclosure control, releasing synthetic data implies difficulty in identifying individual records, since the value of synthetic data is different from original data. We propose two methods of generating synthetic data using principal component analysis: orthogonal transformation (linear method) and sandglass-type neural networks (nonlinear method). While the typical generation method of synthetic data by multiple imputation requires existence of common variables between population and survey data, our proposed method can generate synthetic data without common variables. Additionally, the linear method can explicitly evaluate information loss as the ratio of discarded eigenvalues. We generate synthetic data by the proposed method for decathlon data and evaluate four information loss measures: our proposed information loss measure, mean absolute error for each record, mean absolute error of mean of each variable, and mean absolute error of covariance between variables. We find that information loss in the linear method is less than that in the nonlinear method.", "abstracts": [ { "abstractType": "Regular", "content": "In statistical disclosure control, releasing synthetic data implies difficulty in identifying individual records, since the value of synthetic data is different from original data. We propose two methods of generating synthetic data using principal component analysis: orthogonal transformation (linear method) and sandglass-type neural networks (nonlinear method). While the typical generation method of synthetic data by multiple imputation requires existence of common variables between population and survey data, our proposed method can generate synthetic data without common variables. Additionally, the linear method can explicitly evaluate information loss as the ratio of discarded eigenvalues. We generate synthetic data by the proposed method for decathlon data and evaluate four information loss measures: our proposed information loss measure, mean absolute error for each record, mean absolute error of mean of each variable, and mean absolute error of covariance between variables. We find that information loss in the linear method is less than that in the nonlinear method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In statistical disclosure control, releasing synthetic data implies difficulty in identifying individual records, since the value of synthetic data is different from original data. We propose two methods of generating synthetic data using principal component analysis: orthogonal transformation (linear method) and sandglass-type neural networks (nonlinear method). While the typical generation method of synthetic data by multiple imputation requires existence of common variables between population and survey data, our proposed method can generate synthetic data without common variables. Additionally, the linear method can explicitly evaluate information loss as the ratio of discarded eigenvalues. We generate synthetic data by the proposed method for decathlon data and evaluate four information loss measures: our proposed information loss measure, mean absolute error for each record, mean absolute error of mean of each variable, and mean absolute error of covariance between variables. We find that information loss in the linear method is less than that in the nonlinear method.", "fno": "901200a101", "keywords": [ "Data Privacy", "Eigenvalues And Eigenfunctions", "Neural Nets", "Principal Component Analysis", "Synthetic Data", "Principal Component Analysis", "Linear Method", "Sensitivity Analysis", "Neural Networks", "Sociology", "Measurement Uncertainty", "Loss Measurement", "Eigenvalues And Eigenfunctions", "Principal Component Analysis", "Statistical Disclosure Control", "Synthetic Data", "Principal Component Analysis", "Sandglass Type Neural Networks" ], "authors": [ { "affiliation": "Tokyo University of Information Sciences,Department of Informatics,Chiba,JAPAN", "fullName": "Natsuki Sano", "givenName": "Natsuki", "surname": "Sano", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "101-105", "year": "2020", "issn": null, "isbn": "978-1-7281-9012-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "901200a093", "articleId": "1rgGgO4STsc", "__typename": "AdjacentArticleType" }, "next": { "fno": "901200a106", "articleId": "1rgGjfO37ck", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itnac/2016/0919/0/07878823", "title": "Antenna selection in massive MIMO using non-central Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/itnac/2016/07878823/12OmNsdo6tT", "parentPublication": { "id": "proceedings/itnac/2016/0919/0", "title": "2016 26th International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122589", "title": "On principal component analysis for data with tolerance", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122589/12OmNyqRn47", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2016/6167/0/07838164", "title": "L1-Norm Principal-Component Analysis via Bit Flipping", "doi": null, "abstractUrl": "/proceedings-article/icmla/2016/07838164/12OmNzBwGxB", "parentPublication": { "id": "proceedings/icmla/2016/6167/0", "title": "2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2017/0367/2/0367b391", "title": "Application of Complex Hilbert Principal Component Analysis to Financial Data", "doi": null, "abstractUrl": "/proceedings-article/compsac/2017/0367b391/12OmNzEVS1g", "parentPublication": { "id": "compsac/2017/0367/2", "title": "2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2003/08/i1034", "title": "Candid Covariance-Free Incremental Principal Component Analysis", "doi": null, "abstractUrl": "/journal/tp/2003/08/i1034/13rRUwhHcKf", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486553", "title": "Adaptive Weighted Sparse Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486553/14jQfOIfQCT", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a089", "title": "Iris Recognition Using Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a089/17PYElGZUBp", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/qe/2022/01/09669030", "title": "A Low-Complexity Quantum Principal Component Analysis Algorithm", "doi": null, "abstractUrl": "/journal/qe/2022/01/09669030/1B4eLmfWmze", "parentPublication": { "id": "trans/qe", "title": "IEEE Transactions on Quantum Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b678", "title": "Real Time Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b678/1aDSXLbdAdy", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/10/09308968", "title": "Fast Extended Inductive Robust Principal Component Analysis With Optimal Mean", "doi": null, "abstractUrl": "/journal/tk/2022/10/09308968/1pQEa2Qipfa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVF", "title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNBigFtH", "doi": "10.1109/IV.1999.781548", "title": "Optical Occlusion and Shadows in a 'See-through' Augmented Reality Display", "normalizedTitle": "Optical Occlusion and Shadows in a 'See-through' Augmented Reality Display", "abstract": "As distinct from virtual reality, which seeks to immerse the user in a fully synthetic world, computer-augmented reality systems supplement sensory input with computer-generated information. The principle has, for a number of years, been employed in the head-up display systems used by military pilots and usually comprises an optical display arrangement based on part-silvered mirrors that reflect computer graphics into the eye in such a way that they appear superimposed on the real-world view. Compositing real and virtual worlds offers many new and exciting possibilities but also presents some significant challenges, particularly with respect to applications for which the real and virtual elements need to be integrated convincingly. Unfortunately, the inherent difficulties are compounded further in situations where a direct, unpixellated view of the real world is desired, since current optical systems do not allow real- virtual occlusion, nor a number of other essential visual interactions. This paper presents a generic model of augmented reality as a context for discussion, and then describes a simple but effective technique for providing a significant degree of control over the visual compositing of real and virtual worlds.", "abstracts": [ { "abstractType": "Regular", "content": "As distinct from virtual reality, which seeks to immerse the user in a fully synthetic world, computer-augmented reality systems supplement sensory input with computer-generated information. The principle has, for a number of years, been employed in the head-up display systems used by military pilots and usually comprises an optical display arrangement based on part-silvered mirrors that reflect computer graphics into the eye in such a way that they appear superimposed on the real-world view. Compositing real and virtual worlds offers many new and exciting possibilities but also presents some significant challenges, particularly with respect to applications for which the real and virtual elements need to be integrated convincingly. Unfortunately, the inherent difficulties are compounded further in situations where a direct, unpixellated view of the real world is desired, since current optical systems do not allow real- virtual occlusion, nor a number of other essential visual interactions. This paper presents a generic model of augmented reality as a context for discussion, and then describes a simple but effective technique for providing a significant degree of control over the visual compositing of real and virtual worlds.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As distinct from virtual reality, which seeks to immerse the user in a fully synthetic world, computer-augmented reality systems supplement sensory input with computer-generated information. The principle has, for a number of years, been employed in the head-up display systems used by military pilots and usually comprises an optical display arrangement based on part-silvered mirrors that reflect computer graphics into the eye in such a way that they appear superimposed on the real-world view. Compositing real and virtual worlds offers many new and exciting possibilities but also presents some significant challenges, particularly with respect to applications for which the real and virtual elements need to be integrated convincingly. Unfortunately, the inherent difficulties are compounded further in situations where a direct, unpixellated view of the real world is desired, since current optical systems do not allow real- virtual occlusion, nor a number of other essential visual interactions. This paper presents a generic model of augmented reality as a context for discussion, and then describes a simple but effective technique for providing a significant degree of control over the visual compositing of real and virtual worlds.", "fno": "02100128", "keywords": [ "Augmented Reality", "Virtual Reality", "Computer Graphics", "Displays" ], "authors": [ { "affiliation": "The Open University", "fullName": "Eric W Tatham", "givenName": "Eric W", "surname": "Tatham", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-07-01T00:00:00", "pubType": "proceedings", "pages": "128", "year": "1999", "issn": "1093-9547", "isbn": "0-7695-0210-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02100122", "articleId": "12OmNx57HM9", "__typename": "AdjacentArticleType" }, "next": { "fno": "02100132", "articleId": "12OmNCd2rEk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcPA9q", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "acronym": "ismar", "groupId": "1000465", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvSKNKa", "doi": "10.1109/ISMAR.2017.23", "title": "Occlusion Matting: Realistic Occlusion Handling for Augmented Reality Applications", "normalizedTitle": "Occlusion Matting: Realistic Occlusion Handling for Augmented Reality Applications", "abstract": "Nowadays, visualizations in Augmented Reality have to be as realistic as possible with lowest possible computational cost. In this paper, we present a real-time solution to realize dynamic occlusions. Sometimes virtual objects are softly, partially or totally occluded by real objects. Incorrect and inaccurate occlusion handling breaks the illusion of co-existence between the real and virtual world on the one hand and can result in wrong depth perception on the other hand. Our approach formulates the occlusion problem as alpha matting problem. Instead of calculating the visibility for each pixel of the virtual objects we estimate a blending coefficient. This enables a seamless integration of virtual objects in the real world, even for fuzzy foreground objects (like hair). Our approach takes raw depth information of the real scene (e.g. obtained by a low cost depth sensor) to realize rough foreground background segmentation. The blending coefficient between transitions where depth values are typically noisy is estimated based on the color image. Experimental evaluations of several scenes demonstrate that our algorithm produces consistent and visually appealing occlusions between the real and virtual scene with low computational cost. Furthermore, we compare the results with related depth-based approaches and show that our algorithm overcomes previous limitations.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, visualizations in Augmented Reality have to be as realistic as possible with lowest possible computational cost. In this paper, we present a real-time solution to realize dynamic occlusions. Sometimes virtual objects are softly, partially or totally occluded by real objects. Incorrect and inaccurate occlusion handling breaks the illusion of co-existence between the real and virtual world on the one hand and can result in wrong depth perception on the other hand. Our approach formulates the occlusion problem as alpha matting problem. Instead of calculating the visibility for each pixel of the virtual objects we estimate a blending coefficient. This enables a seamless integration of virtual objects in the real world, even for fuzzy foreground objects (like hair). Our approach takes raw depth information of the real scene (e.g. obtained by a low cost depth sensor) to realize rough foreground background segmentation. The blending coefficient between transitions where depth values are typically noisy is estimated based on the color image. Experimental evaluations of several scenes demonstrate that our algorithm produces consistent and visually appealing occlusions between the real and virtual scene with low computational cost. Furthermore, we compare the results with related depth-based approaches and show that our algorithm overcomes previous limitations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, visualizations in Augmented Reality have to be as realistic as possible with lowest possible computational cost. In this paper, we present a real-time solution to realize dynamic occlusions. Sometimes virtual objects are softly, partially or totally occluded by real objects. Incorrect and inaccurate occlusion handling breaks the illusion of co-existence between the real and virtual world on the one hand and can result in wrong depth perception on the other hand. Our approach formulates the occlusion problem as alpha matting problem. Instead of calculating the visibility for each pixel of the virtual objects we estimate a blending coefficient. This enables a seamless integration of virtual objects in the real world, even for fuzzy foreground objects (like hair). Our approach takes raw depth information of the real scene (e.g. obtained by a low cost depth sensor) to realize rough foreground background segmentation. The blending coefficient between transitions where depth values are typically noisy is estimated based on the color image. Experimental evaluations of several scenes demonstrate that our algorithm produces consistent and visually appealing occlusions between the real and virtual scene with low computational cost. Furthermore, we compare the results with related depth-based approaches and show that our algorithm overcomes previous limitations.", "fno": "2943a062", "keywords": [ "Augmented Reality", "Fuzzy Set Theory", "Image Segmentation", "Virtual World", "Wrong Depth Perception", "Alpha Matting Problem", "Virtual Objects", "Blending Coefficient", "Fuzzy Foreground Objects", "Rough Foreground Background Segmentation", "Virtual Scene", "Occlusion Matting", "Realistic Occlusion Handling", "Augmented Reality Applications", "Image Color Analysis", "Image Edge Detection", "Solid Modeling", "Augmented Reality", "Real Time Systems", "Color", "Noise Measurement", "Realistic Occlusion", "Dynamic Occlusion Handling", "Augmented Reality", "Alpha Matting", "Natural Image Matting" ], "authors": [ { "affiliation": null, "fullName": "Anna Katharina Hebborn", "givenName": "Anna Katharina", "surname": "Hebborn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nils Höhner", "givenName": "Nils", "surname": "Höhner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stefan Müller", "givenName": "Stefan", "surname": "Müller", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "62-71", "year": "2017", "issn": null, "isbn": "978-1-5386-2943-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2943a052", "articleId": "12OmNvoWV1k", "__typename": "AdjacentArticleType" }, "next": { "fno": "2943a072", "articleId": "12OmNyfdON8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/svr/2012/4725/0/4725a036", "title": "Realistic Shadows for Mobile Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/svr/2012/4725a036/12OmNASrawf", "parentPublication": { "id": "proceedings/svr/2012/4725/0", "title": "2012 14th Symposium on Virtual and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492775", "title": "Realistic occlusion effects in mirror-based co-located augmented reality systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492775/12OmNAYoKpz", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2007/3056/0/30560055", "title": "Volumetric Display for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icat/2007/30560055/12OmNBCqbJu", "parentPublication": { "id": "proceedings/icat/2007/3056/0", "title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948455", "title": "[Poster] Motion detection based ghosted views for occlusion handling in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948455/12OmNrkBwkj", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a192", "title": "[POSTER] Illumination Estimation Using Cast Shadows for Realistic Augmented Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a192/12OmNxX3uLh", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2015/8471/0/8471a060", "title": "Motion-Aware Ghosted Views for Single Layer Occlusions in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2015/8471a060/12OmNzgwmOE", "parentPublication": { "id": "proceedings/ismarw/2015/8471/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality Workshops (ISMARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699304", "title": "Addressing the Occlusion Problem in Augmented Reality Environments with Phantom Hollow Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699304/19F1T4QjgOY", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a298", "title": "Real-Time Augmented Reality with Occlusion Handling Based on RGBD Images", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a298/1ap5xY9dZni", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/05/08998139", "title": "Factored Occlusion: Single Spatial Light Modulator Occlusion-capable Optical See-through Augmented Reality Display", "doi": null, "abstractUrl": "/journal/tg/2020/05/08998139/1hrXe0Hbv0I", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09560081", "title": "Occlusion Handling in Augmented Reality: Past, Present and Future", "doi": null, "abstractUrl": "/journal/tg/2023/02/09560081/1xtOqCv3vNe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2YF", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwp74Cw", "doi": "10.1109/ICALT.2013.45", "title": "Augmented Reality X-Ray Interaction in K-12 Education: Theory, Student Perception and Teacher Evaluation", "normalizedTitle": "Augmented Reality X-Ray Interaction in K-12 Education: Theory, Student Perception and Teacher Evaluation", "abstract": "Augmented reality (AR) x-ray interaction is an enabling technology for providing students with virtual abstractions of the interior of an object. It provides students contextual visualization - the presentation of virtual information in the rich context of a real environment - thereby offering compelling experiences. According to experiential learning theory, such personal experiences are necessary for reaching different types of learners. AR x-ray is a novel interaction technique for education, thus, it is necessary to investigate how it affects the students' perception. We implemented AR x-ray using a state-of-the-art occlusion technique, and compared it to viewing 3D objects without occlusion. Results of two user studies (n=23 and n=47) show that there are no significant differences in realism, perception of depth, and visibility with occlusion and without occlusion, and that the current technique is usable for educational purposes. We also conducted interviews with both students (n=23) and teachers (n=12). Results indicate that AR x-ray is perceived to be useful for motivating and explaining to students. The teachers expressed willingness to adopt AR x-ray and to undergo training for using AR-based teaching materials.", "abstracts": [ { "abstractType": "Regular", "content": "Augmented reality (AR) x-ray interaction is an enabling technology for providing students with virtual abstractions of the interior of an object. It provides students contextual visualization - the presentation of virtual information in the rich context of a real environment - thereby offering compelling experiences. According to experiential learning theory, such personal experiences are necessary for reaching different types of learners. AR x-ray is a novel interaction technique for education, thus, it is necessary to investigate how it affects the students' perception. We implemented AR x-ray using a state-of-the-art occlusion technique, and compared it to viewing 3D objects without occlusion. Results of two user studies (n=23 and n=47) show that there are no significant differences in realism, perception of depth, and visibility with occlusion and without occlusion, and that the current technique is usable for educational purposes. We also conducted interviews with both students (n=23) and teachers (n=12). Results indicate that AR x-ray is perceived to be useful for motivating and explaining to students. The teachers expressed willingness to adopt AR x-ray and to undergo training for using AR-based teaching materials.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Augmented reality (AR) x-ray interaction is an enabling technology for providing students with virtual abstractions of the interior of an object. It provides students contextual visualization - the presentation of virtual information in the rich context of a real environment - thereby offering compelling experiences. According to experiential learning theory, such personal experiences are necessary for reaching different types of learners. AR x-ray is a novel interaction technique for education, thus, it is necessary to investigate how it affects the students' perception. We implemented AR x-ray using a state-of-the-art occlusion technique, and compared it to viewing 3D objects without occlusion. Results of two user studies (n=23 and n=47) show that there are no significant differences in realism, perception of depth, and visibility with occlusion and without occlusion, and that the current technique is usable for educational purposes. We also conducted interviews with both students (n=23) and teachers (n=12). Results indicate that AR x-ray is perceived to be useful for motivating and explaining to students. The teachers expressed willingness to adopt AR x-ray and to undergo training for using AR-based teaching materials.", "fno": "5009a141", "keywords": [ "Augmented Reality", "Visualization", "Three Dimensional Displays", "Materials", "Educational Institutions", "X Ray Imaging", "Experiential Learning", "Augmented Reality", "Augmented Reality Learning Experience", "AR X Ray" ], "authors": [ { "affiliation": null, "fullName": "Marc Ericson C. Santos", "givenName": "Marc Ericson C.", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Angie Chen", "givenName": "Angie", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mitsuaki Terawaki", "givenName": "Mitsuaki", "surname": "Terawaki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Goshiro Yamamoto", "givenName": "Goshiro", "surname": "Yamamoto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Takafumi Taketomi", "givenName": "Takafumi", "surname": "Taketomi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jun Miyazaki", "givenName": "Jun", "surname": "Miyazaki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hirokazu Kato", "givenName": "Hirokazu", "surname": "Kato", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "141-145", "year": "2013", "issn": null, "isbn": "978-0-7695-5009-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5009a138", "articleId": "12OmNAnMuEK", "__typename": "AdjacentArticleType" }, "next": { "fno": "5009a146", "articleId": "12OmNBqMDx3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2012/4660/0/06402569", "title": "Superman-like X-ray vision: Towards brain-computer interfaces for medical augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402569/12OmNAoUT3L", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2017/4822/0/07926666", "title": "X-Ray Scattering Image Classification Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2017/07926666/12OmNBPtJHg", "parentPublication": { "id": "proceedings/wacv/2017/4822/0", "title": "2017 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a188", "title": "[POSTER] Vergence-Based AR X-ray Vision", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a188/12OmNCesrcK", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2011/2135/0/06121045", "title": "Automated Inspection Using X-Ray Imaging", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2011/06121045/12OmNwDSdFg", "parentPublication": { "id": "proceedings/trustcom/2011/2135/0", "title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2014/4985/0/06836004", "title": "Materials discovery: Fine-grained classification of X-ray scattering images", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836004/12OmNxcdFVL", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2012/4467/0/06404468", "title": "Data intensive science at synchrotron based 3D x-ray imaging facilities", "doi": null, "abstractUrl": "/proceedings-article/e-science/2012/06404468/12OmNzZEADb", "parentPublication": { "id": "proceedings/e-science/2012/4467/0", "title": "2012 IEEE 8th International Conference on E-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2014/7000/1/7000a345", "title": "Multimodal Calibration of Portable X-Ray Capture Systems for 3D Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/3dv/2014/7000a345/12OmNzdoN5I", "parentPublication": { "id": "proceedings/3dv/2014/7000/2", "title": "2014 2nd International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a820", "title": "Measuring Virtual Object Location with X-Ray Vision at Action Space Distances", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a820/1CJewQHvMBi", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811002", "title": "Improving Spatial Perception for Augmented Reality X-Ray Vision", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811002/1t0I1sqXnl6", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a483", "title": "Depth Perception using X-Ray Visualizations", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a483/1yeQMsaSzkI", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIl3sT", "title": "2011 Sixth Annual Chinagrid Conference", "acronym": "chinagrid", "groupId": "1002436", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxaw5dZ", "doi": "10.1109/ChinaGrid.2011.49", "title": "Cooperatively Resolving Occlusion between Real and Virtual in Multiple Video Sequences", "normalizedTitle": "Cooperatively Resolving Occlusion between Real and Virtual in Multiple Video Sequences", "abstract": "The occlusion between real and virtual objects influences not only seamless merging of virtual and real environments but also users' visual perception of orientations & locations and spatial interactions in augmented reality. If there exist a large amount of video sequences for representing the real environment, and each video sequence utilizes computer vision algorithms to deal with all of occlusions between real and virtual, this often drops down the real-time performance of augmented reality system. This article proposed an approach of cooperatively resolving the occlusion between real and virtual based on multiple video sequences in augmented reality scene. Firstly it analyzes the occlusion relations between virtual and real objects in initial video sequences with their intrinsic parameters and poses, and obtains the spatial relations among video sequences through 3D registration information. Secondly, for each video sequence, it divides and codes the perception regions of relative augmented reality scene. Lastly, according to the spatial relations of video sequences, the known occlusion relations in initial video sequences and the code data of perception regions, three types of occlusion relations including real occluding virtual, virtual occluding real and non-occlusion are detected out and represented in augmented reality scene. Some experimental results show that this approach can reduce redundant calculations on the way of resolving the occlusion between real and virtual objects, and improve the performance of generating augmented reality scene, especially which includes plenty of video sequences and occlusion relations of virtual occluding real or non-occlusion.", "abstracts": [ { "abstractType": "Regular", "content": "The occlusion between real and virtual objects influences not only seamless merging of virtual and real environments but also users' visual perception of orientations & locations and spatial interactions in augmented reality. If there exist a large amount of video sequences for representing the real environment, and each video sequence utilizes computer vision algorithms to deal with all of occlusions between real and virtual, this often drops down the real-time performance of augmented reality system. This article proposed an approach of cooperatively resolving the occlusion between real and virtual based on multiple video sequences in augmented reality scene. Firstly it analyzes the occlusion relations between virtual and real objects in initial video sequences with their intrinsic parameters and poses, and obtains the spatial relations among video sequences through 3D registration information. Secondly, for each video sequence, it divides and codes the perception regions of relative augmented reality scene. Lastly, according to the spatial relations of video sequences, the known occlusion relations in initial video sequences and the code data of perception regions, three types of occlusion relations including real occluding virtual, virtual occluding real and non-occlusion are detected out and represented in augmented reality scene. Some experimental results show that this approach can reduce redundant calculations on the way of resolving the occlusion between real and virtual objects, and improve the performance of generating augmented reality scene, especially which includes plenty of video sequences and occlusion relations of virtual occluding real or non-occlusion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The occlusion between real and virtual objects influences not only seamless merging of virtual and real environments but also users' visual perception of orientations & locations and spatial interactions in augmented reality. If there exist a large amount of video sequences for representing the real environment, and each video sequence utilizes computer vision algorithms to deal with all of occlusions between real and virtual, this often drops down the real-time performance of augmented reality system. This article proposed an approach of cooperatively resolving the occlusion between real and virtual based on multiple video sequences in augmented reality scene. Firstly it analyzes the occlusion relations between virtual and real objects in initial video sequences with their intrinsic parameters and poses, and obtains the spatial relations among video sequences through 3D registration information. Secondly, for each video sequence, it divides and codes the perception regions of relative augmented reality scene. Lastly, according to the spatial relations of video sequences, the known occlusion relations in initial video sequences and the code data of perception regions, three types of occlusion relations including real occluding virtual, virtual occluding real and non-occlusion are detected out and represented in augmented reality scene. Some experimental results show that this approach can reduce redundant calculations on the way of resolving the occlusion between real and virtual objects, and improve the performance of generating augmented reality scene, especially which includes plenty of video sequences and occlusion relations of virtual occluding real or non-occlusion.", "fno": "06051758", "keywords": [ "Augmented Reality", "Computer Graphics", "Image Registration", "Image Sequences", "Video Signal Processing", "Occlusion", "Multiple Video Sequences", "Visual Perception", "Augmented Reality System", "Computer Vision Algorithms", "3 D Registration Information", "Video Sequences", "Augmented Reality", "Cameras", "Three Dimensional Displays", "Estimation", "Encoding", "Component", "Virtual Reality", "Augmented Reality", "Video Sequence", "Occlusion", "Region Code" ], "authors": [ { "affiliation": null, "fullName": "Xin Jin", "givenName": "Xin", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaowu Chen", "givenName": "Xiaowu", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bin Zhou", "givenName": "Bin", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hongchang Lin", "givenName": "Hongchang", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "chinagrid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "234-240", "year": "2011", "issn": "1949-131X", "isbn": "978-1-4577-0885-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06051757", "articleId": "12OmNwFicVa", "__typename": "AdjacentArticleType" }, "next": { "fno": "06051759", "articleId": "12OmNx19k0d", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgiv/2009/3789/0/3789a153", "title": "An Implementation Review of Occlusion-Based Interaction in Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a153/12OmNB7cjly", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995364", "title": "Occlusion boundary detection and figure/ground assignment from optical flow", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995364/12OmNBRbklU", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/1999/0210/0/02100128", "title": "Optical Occlusion and Shadows in a 'See-through' Augmented Reality Display", "doi": null, "abstractUrl": "/proceedings-article/iv/1999/02100128/12OmNBigFtH", "parentPublication": { "id": "proceedings/iv/1999/0210/0", "title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78220091", "title": "Resolving Occlusion in Augmented Reality : a Contour Based Approach without 3D Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78220091/12OmNCdk2C0", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948455", "title": "[Poster] Motion detection based ghosted views for occlusion handling in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948455/12OmNrkBwkj", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836504", "title": "An Evaluation of Information Connection in Augmented Reality for 3D Scenes with Occlusion", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836504/12OmNvSbBGA", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699304", "title": "Addressing the Occlusion Problem in Augmented Reality Environments with Phantom Hollow Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699304/19F1T4QjgOY", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a298", "title": "Real-Time Augmented Reality with Occlusion Handling Based on RGBD Images", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a298/1ap5xY9dZni", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/05/08998139", "title": "Factored Occlusion: Single Spatial Light Modulator Occlusion-capable Optical See-through Augmented Reality Display", "doi": null, "abstractUrl": "/journal/tg/2020/05/08998139/1hrXe0Hbv0I", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09560081", "title": "Occlusion Handling in Augmented Reality: Past, Present and Future", "doi": null, "abstractUrl": "/journal/tg/2023/02/09560081/1xtOqCv3vNe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHjwsU3emc", "title": "2019 21st Symposium on Virtual and Augmented Reality (SVR)", "acronym": "svr", "groupId": "1800426", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHjy1FyZzO", "doi": "10.1109/SVR.2019.00033", "title": "Handling Occlusions in Augmented Reality for Mobile Devices", "normalizedTitle": "Handling Occlusions in Augmented Reality for Mobile Devices", "abstract": "The coherent display of the spatial relationship between real and virtual elements is a desirable feature for realistic Augmented Reality (AR) systems. The system must be able to automatically estimate the depths of the real and virtual elements that compose the scene and display in the foreground of the frame the element closest to the camera. In other words, real and virtual elements must hide (totally or partially) each other according to their depths in the frame. This paper presents a method for occlusion treatment of scene elements for mobile applications. The solution presented uses pixel proportions, relative to the total pixels of the frame, occupied by the real and virtual elements to estimate their depths. Then, a skin color model based segmentation method is applied to extract the real element in frames in which it is in the foreground of the scene and, as a result, must overlap the virtual object. The results of the evaluation of the proposed method showed its superiority to those found in the literature when a set of important features are compared.", "abstracts": [ { "abstractType": "Regular", "content": "The coherent display of the spatial relationship between real and virtual elements is a desirable feature for realistic Augmented Reality (AR) systems. The system must be able to automatically estimate the depths of the real and virtual elements that compose the scene and display in the foreground of the frame the element closest to the camera. In other words, real and virtual elements must hide (totally or partially) each other according to their depths in the frame. This paper presents a method for occlusion treatment of scene elements for mobile applications. The solution presented uses pixel proportions, relative to the total pixels of the frame, occupied by the real and virtual elements to estimate their depths. Then, a skin color model based segmentation method is applied to extract the real element in frames in which it is in the foreground of the scene and, as a result, must overlap the virtual object. The results of the evaluation of the proposed method showed its superiority to those found in the literature when a set of important features are compared.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The coherent display of the spatial relationship between real and virtual elements is a desirable feature for realistic Augmented Reality (AR) systems. The system must be able to automatically estimate the depths of the real and virtual elements that compose the scene and display in the foreground of the frame the element closest to the camera. In other words, real and virtual elements must hide (totally or partially) each other according to their depths in the frame. This paper presents a method for occlusion treatment of scene elements for mobile applications. The solution presented uses pixel proportions, relative to the total pixels of the frame, occupied by the real and virtual elements to estimate their depths. Then, a skin color model based segmentation method is applied to extract the real element in frames in which it is in the foreground of the scene and, as a result, must overlap the virtual object. The results of the evaluation of the proposed method showed its superiority to those found in the literature when a set of important features are compared.", "fno": "543400a112", "keywords": [ "Augmented Reality", "Image Colour Analysis", "Image Segmentation", "Medical Computing", "Mobile Computing", "Camera", "Pixel Proportions", "Mobile Applications", "Scene Elements", "Occlusion Treatment", "Augmented Reality Systems", "Spatial Relationship", "Coherent Display", "Mobile Devices", "Virtual Object", "Skin Color Model Based Segmentation Method", "Virtual Elements", "Three Dimensional Displays", "Augmented Reality", "Mobile Handsets", "Visualization", "Solid Modeling", "Graphics Processing Units", "Augmented Reality Mobile Devices Handling Occlusion" ], "authors": [ { "affiliation": "Universidade Tecnológica Federal do Paraná", "fullName": "Silvio R. R. Sanches", "givenName": "Silvio R. R.", "surname": "Sanches", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Tecnológica Federal do Paraná", "fullName": "Vitor V. G. Silva", "givenName": "Vitor V. G.", "surname": "Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Estadual Paulista", "fullName": "Antonio C. Sementille", "givenName": "Antonio C.", "surname": "Sementille", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Tecnológica Federal do Paraná", "fullName": "Cléber G. Corrêa", "givenName": "Cléber G.", "surname": "Corrêa", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Tecnológica Federal do Paraná", "fullName": "Claiton Oliveira", "givenName": "Claiton", "surname": "Oliveira", "__typename": "ArticleAuthorType" } ], "idPrefix": "svr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "112-119", "year": "2019", "issn": null, "isbn": "978-1-7281-5434-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "543400a107", "articleId": "1fHjzbrO6Ri", "__typename": "AdjacentArticleType" }, "next": { "fno": "543400a120", "articleId": "1fHjyfmQOKQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2015/1727/0/07223466", "title": "Nested immersion: Describing and classifying augmented virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223466/12OmNAle6GI", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2007/3056/0/30560055", "title": "Volumetric Display for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icat/2007/30560055/12OmNBCqbJu", "parentPublication": { "id": "proceedings/icat/2007/3056/0", "title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948455", "title": "[Poster] Motion detection based ghosted views for occlusion handling in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948455/12OmNrkBwkj", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2017/2943/0/2943a062", "title": "Occlusion Matting: Realistic Occlusion Handling for Augmented Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar/2017/2943a062/12OmNvSKNKa", "parentPublication": { "id": "proceedings/ismar/2017/2943/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2015/8232/0/8232a041", "title": "\"Third-Person\" Augmented Reality-Based Interactive Chinese Drama", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2015/8232a041/12OmNy6Zs20", "parentPublication": { "id": "proceedings/culture-computing/2015/8232/0", "title": "2015 International Conference on Culture and Computing (Culture Computing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492774", "title": "Stylized augmented reality for improved immersion", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492774/12OmNylbotS", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2012/2719/0/06337162", "title": "Simulation Teaching in 3D Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2012/06337162/12OmNzdGnxC", "parentPublication": { "id": "proceedings/iiai-aai/2012/2719/0", "title": "2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2015/8471/0/8471a060", "title": "Motion-Aware Ghosted Views for Single Layer Occlusions in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2015/8471a060/12OmNzgwmOE", "parentPublication": { "id": "proceedings/ismarw/2015/8471/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality Workshops (ISMARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/12/07368948", "title": "Pose Estimation for Augmented Reality: A Hands-On Survey", "doi": null, "abstractUrl": "/journal/tg/2016/12/07368948/13rRUxYINfj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09560081", "title": "Occlusion Handling in Augmented Reality: Past, Present and Future", "doi": null, "abstractUrl": "/journal/tg/2023/02/09560081/1xtOqCv3vNe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZX1", "title": "2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "acronym": "iiki", "groupId": "1805504", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwlZu44", "doi": "10.1109/IIKI.2016.99", "title": "Semantics-Based Anomaly Detection of Processes in Linux Containers", "normalizedTitle": "Semantics-Based Anomaly Detection of Processes in Linux Containers", "abstract": "With the development of the cloud computing, Linux containers are playing an important role in industrial use, however, the containers are suffering more and more cyber-attacks. A novel semantics-based anomaly detection approach of processes in Linux containers is presented and implemented in this paper, which extracts the features of processes by using the system calls produced by container behaviors, finds the relations between the processes, and builds the features tree of the processes. Experiments show that the approach we proposed can identify the abnormal processes effectively in Linux containers.", "abstracts": [ { "abstractType": "Regular", "content": "With the development of the cloud computing, Linux containers are playing an important role in industrial use, however, the containers are suffering more and more cyber-attacks. A novel semantics-based anomaly detection approach of processes in Linux containers is presented and implemented in this paper, which extracts the features of processes by using the system calls produced by container behaviors, finds the relations between the processes, and builds the features tree of the processes. Experiments show that the approach we proposed can identify the abnormal processes effectively in Linux containers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the development of the cloud computing, Linux containers are playing an important role in industrial use, however, the containers are suffering more and more cyber-attacks. A novel semantics-based anomaly detection approach of processes in Linux containers is presented and implemented in this paper, which extracts the features of processes by using the system calls produced by container behaviors, finds the relations between the processes, and builds the features tree of the processes. Experiments show that the approach we proposed can identify the abnormal processes effectively in Linux containers.", "fno": "5952a060", "keywords": [ "Cloud Computing", "Linux", "Security Of Data", "Linux Containers", "Semantics Based Anomaly Detection Approach", "Cloud Computing", "System Calls", "Abnormal Processes", "Container Behaviors", "Feature Extraction", "Containers", "Anomaly Detection", "Training", "Linux", "Training Data", "Cloud Computing", "Anomaly Detection", "Container", "Semantic", "Process", "System Call" ], "authors": [ { "affiliation": null, "fullName": "Hongliang Liang", "givenName": "Hongliang", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qichen Hao", "givenName": "Qichen", "surname": "Hao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mingyu Li", "givenName": "Mingyu", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yini Zhang", "givenName": "Yini", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiki", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "60-63", "year": "2016", "issn": null, "isbn": "978-1-5090-5952-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5952a054", "articleId": "12OmNzkMlOf", "__typename": "AdjacentArticleType" }, "next": { "fno": "5952a064", "articleId": "12OmNCwCLnT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/lcn/2016/2054/0/2054a619", "title": "Toward Smart Moving Target Defense for Linux Container Resiliency", "doi": null, "abstractUrl": "/proceedings-article/lcn/2016/2054a619/12OmNAXglMA", "parentPublication": { "id": "proceedings/lcn/2016/2054/0", "title": "2016 IEEE 41st Conference on Local Computer Networks (LCN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic2e/2017/5817/0/07923811", "title": "Comparing Scaling Methods for Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/ic2e/2017/07923811/12OmNAq3hSe", "parentPublication": { "id": "proceedings/ic2e/2017/5817/0", "title": "2017 IEEE International Conference on Cloud Engineering (IC2E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcsw/2017/3292/0/6173a401", "title": "Leveraging the Serverless Architecture for Securing Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2017/6173a401/12OmNwCaCqX", "parentPublication": { "id": "proceedings/icdcsw/2017/3292/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2017/6031/0/6031a092", "title": "Mining Sandboxes for Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/icst/2017/6031a092/12OmNx0RIQt", "parentPublication": { "id": "proceedings/icst/2017/6031/0", "title": "2017 IEEE International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispass/2015/1957/0/07095802", "title": "An updated performance comparison of virtual machines and Linux containers", "doi": null, "abstractUrl": "/proceedings-article/ispass/2015/07095802/12OmNxVlTCl", "parentPublication": { "id": "proceedings/ispass/2015/1957/0", "title": "2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic2e/2015/8218/0/8218a076", "title": "Leveraging Linux Containers to Achieve High Availability for Cloud Services", "doi": null, "abstractUrl": "/proceedings-article/ic2e/2015/8218a076/12OmNxX3uq0", "parentPublication": { "id": "proceedings/ic2e/2015/8218/0", "title": "2015 IEEE International Conference on Cloud Engineering (IC2E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2017/6611/0/07973786", "title": "Fine-Grained Supervision and Restriction of Biomedical Applications in Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2017/07973786/12OmNyr8Yb7", "parentPublication": { "id": "proceedings/ccgrid/2017/6611/0", "title": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloudcom/2018/7899/0/789900a239", "title": "Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2018/789900a239/17D45WYQJ5S", "parentPublication": { "id": "proceedings/cloudcom/2018/7899/0", "title": "2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962510", "title": "Levereging Apache Guacamole, Linux LXD and Docker Containers to Deliver a Secure Online Lab for a Large Cybersecurity Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962510/1IHnVEvZap2", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud-summit/2022/5113/0/511300a063", "title": "The Cost of Virtualizing Time in Linux Containers", "doi": null, "abstractUrl": "/proceedings-article/cloud-summit/2022/511300a063/1J4CdcgUjYI", "parentPublication": { "id": "proceedings/cloud-summit/2022/5113/0", "title": "2022 IEEE Cloud Summit", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwogh4x", "title": "2017 IEEE International Conference on Information Reuse and Integration (IRI)", "acronym": "iri", "groupId": "1001046", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxzMnTR", "doi": "10.1109/IRI.2017.44", "title": "User Behavior Anomaly Detection for Application Layer DDoS Attacks", "normalizedTitle": "User Behavior Anomaly Detection for Application Layer DDoS Attacks", "abstract": "Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet applications and web services. The main goal of these attacks is to make the services unavailable to legitimate users by overwhelming the resources on a web server. They look valid in connection and protocol characteristics, which makes them difficult to detect. In this paper, we propose a detection method for the application layer DDoS attacks, which is based on user behavior anomaly detection. We extract instances of user behaviors requesting resources from HTTP web server logs. We apply the Principle Component Analysis (PCA) subspace anomaly detection method for the detection of anomalous behavior instances. Web server logs from a web server hosting a student resource portal were collected as experimental data. We also generated nine different HTTP DDoS attacks through penetration testing. Our performance results on the collected data show that using PCAsubspace anomaly detection on user behavior data can detect application layer DDoS attacks, even if they are trying to mimic a normal user's behavior at some level.", "abstracts": [ { "abstractType": "Regular", "content": "Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet applications and web services. The main goal of these attacks is to make the services unavailable to legitimate users by overwhelming the resources on a web server. They look valid in connection and protocol characteristics, which makes them difficult to detect. In this paper, we propose a detection method for the application layer DDoS attacks, which is based on user behavior anomaly detection. We extract instances of user behaviors requesting resources from HTTP web server logs. We apply the Principle Component Analysis (PCA) subspace anomaly detection method for the detection of anomalous behavior instances. Web server logs from a web server hosting a student resource portal were collected as experimental data. We also generated nine different HTTP DDoS attacks through penetration testing. Our performance results on the collected data show that using PCAsubspace anomaly detection on user behavior data can detect application layer DDoS attacks, even if they are trying to mimic a normal user's behavior at some level.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet applications and web services. The main goal of these attacks is to make the services unavailable to legitimate users by overwhelming the resources on a web server. They look valid in connection and protocol characteristics, which makes them difficult to detect. In this paper, we propose a detection method for the application layer DDoS attacks, which is based on user behavior anomaly detection. We extract instances of user behaviors requesting resources from HTTP web server logs. We apply the Principle Component Analysis (PCA) subspace anomaly detection method for the detection of anomalous behavior instances. Web server logs from a web server hosting a student resource portal were collected as experimental data. We also generated nine different HTTP DDoS attacks through penetration testing. Our performance results on the collected data show that using PCAsubspace anomaly detection on user behavior data can detect application layer DDoS attacks, even if they are trying to mimic a normal user's behavior at some level.", "fno": "1562a154", "keywords": [ "Computer Network Security", "File Servers", "Internet", "Principal Component Analysis", "Protocols", "Web Services", "Application Layer D Do S Attacks", "Cyber Attacks", "Legitimate Application Layer Requests", "Principle Component Analysis", "Web Services", "Subspace Anomaly Detection Method", "Distributed Denial Of Service Attacks", "HTTP Web Server Logs", "Internet", "Protocol Characteristics", "User Behavior Anomaly Detection Method", "PCA", "Student Resource Portal", "HTTP D Do S Attacks", "Penetration Testing", "Anomalous Behavior Instance Detection", "Web Servers", "Computer Crime", "Anomaly Detection", "Protocols", "Browsers", "Feature Extraction", "Application Layer D Do S Attacks", "Anomaly Detection", "PCA Subspace" ], "authors": [ { "affiliation": null, "fullName": "Maryam M. Najafabadi", "givenName": "Maryam M.", "surname": "Najafabadi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Taghi M. Khoshgoftaar", "givenName": "Taghi M.", "surname": "Khoshgoftaar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chad Calvert", "givenName": "Chad", "surname": "Calvert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Clifford Kemp", "givenName": "Clifford", "surname": "Kemp", "__typename": "ArticleAuthorType" } ], "idPrefix": "iri", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "154-161", "year": "2017", "issn": null, "isbn": "978-1-5386-1562-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1562a144", "articleId": "12OmNzZWbFj", "__typename": "AdjacentArticleType" }, "next": { "fno": "1562a162", "articleId": "12OmNBhZ4k4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/imsccs/2006/2581/2/258120056", "title": "A Novel Model for Detecting Application Layer DDoS Attacks", "doi": null, "abstractUrl": "/proceedings-article/imsccs/2006/258120056/12OmNBCqbHl", "parentPublication": { "id": "proceedings/imsccs/2006/2581/2", "title": "First International on Computer and Computational Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2017/0752/0/0752a500", "title": "Characterizing the Impacts of Application Layer DDoS Attacks", "doi": null, "abstractUrl": "/proceedings-article/icws/2017/0752a500/12OmNCcKQQM", "parentPublication": { "id": "proceedings/icws/2017/0752/0", "title": "2017 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saintw/2005/2263/0/01619987", "title": "Detecting DDoS Attacks by Analyzing Client Response Patterns", "doi": null, "abstractUrl": "/proceedings-article/saintw/2005/01619987/12OmNqHItwq", "parentPublication": { "id": "proceedings/saintw/2005/2263/0", "title": "2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380589", "title": "Simulation study of application layer DDoS attack", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380589/12OmNx3ZjfV", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2015/6564/3/6564c261", "title": "Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication", "doi": null, "abstractUrl": "/proceedings-article/compsac/2015/6564c261/12OmNyFU701", "parentPublication": { "id": "proceedings/compsac/2015/6564/3", "title": "2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saintw/2005/2263/0/01619992", "title": "Measurement of DNS Traffic Caused by DDoS Attacks", "doi": null, "abstractUrl": "/proceedings-article/saintw/2005/01619992/12OmNyS6RJq", "parentPublication": { "id": "proceedings/saintw/2005/2263/0", "title": "2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icycs/2008/3398/0/3398c180", "title": "A Deployable Architecture against Application-level DDoS Attacks", "doi": null, "abstractUrl": "/proceedings-article/icycs/2008/3398c180/12OmNyeECwB", "parentPublication": { "id": "proceedings/icycs/2008/3398/0", "title": "2008 9th International Conference for Young Computer Scientists", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2009/01/04555692", "title": "DDoS-shield: DDoS-resilient scheduling to counter application layer attacks", "doi": null, "abstractUrl": "/journal/nt/2009/01/04555692/13rRUILtJo3", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2009/01/04548145", "title": "Monitoring the application-layer DDoS attacks for popular websites", "doi": null, "abstractUrl": "/journal/nt/2009/01/04548145/13rRUx0xPWI", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b565", "title": "ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b565/17D45VTRouT", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JeDYJ4gxZm", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "acronym": "mass", "groupId": "9973399", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JeE7brCY0M", "doi": "10.1109/MASS56207.2022.00058", "title": "Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems", "normalizedTitle": "Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems", "abstract": "Industrial Control Systems (ICS) are increasingly facing the threat of False Data Injection (FDI) attacks. As an emerging intrusion detection scheme for ICS, process-based Intrusion Detection Systems (IDS) can effectively detect the anomalies caused by FDI attacks. Specifically, such IDS establishes anomaly detection model which can describe the normal pattern of industrial processes, then perform real-time anomaly detection on industrial process data. However, this method suffers low detection accuracy due to the complexity and instability of industrial processes. That is, the process data inherently contains sophisticated nonlinear spatial-temporal correlations which are hard to be explicitly described by anomaly detection model. In addition, the noise and disturbance in process data prevent the IDS from distinguishing the real anomaly events. In this paper, we propose an Anomaly Detection approach based on Robust Spatial-temporal Modeling (AD-RoSM). Concretely, to explicitly describe the spatial-temporal correlations within the process data, a neural based state estimation model is proposed by utilizing 1D CNN for temporal modeling and multi-head self attention mechanism for spatial modeling. To perform robust anomaly detection in the presence of noise and disturbance, a composite anomaly discrimination model is designed so that the outputs of the state estimation model can be analyzed with a combination of threshold strategy and entropy-based strategy. We conducted extensive experiments on two benchmark ICS security datasets to demonstrate the effectiveness of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Industrial Control Systems (ICS) are increasingly facing the threat of False Data Injection (FDI) attacks. As an emerging intrusion detection scheme for ICS, process-based Intrusion Detection Systems (IDS) can effectively detect the anomalies caused by FDI attacks. Specifically, such IDS establishes anomaly detection model which can describe the normal pattern of industrial processes, then perform real-time anomaly detection on industrial process data. However, this method suffers low detection accuracy due to the complexity and instability of industrial processes. That is, the process data inherently contains sophisticated nonlinear spatial-temporal correlations which are hard to be explicitly described by anomaly detection model. In addition, the noise and disturbance in process data prevent the IDS from distinguishing the real anomaly events. In this paper, we propose an Anomaly Detection approach based on Robust Spatial-temporal Modeling (AD-RoSM). Concretely, to explicitly describe the spatial-temporal correlations within the process data, a neural based state estimation model is proposed by utilizing 1D CNN for temporal modeling and multi-head self attention mechanism for spatial modeling. To perform robust anomaly detection in the presence of noise and disturbance, a composite anomaly discrimination model is designed so that the outputs of the state estimation model can be analyzed with a combination of threshold strategy and entropy-based strategy. We conducted extensive experiments on two benchmark ICS security datasets to demonstrate the effectiveness of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Industrial Control Systems (ICS) are increasingly facing the threat of False Data Injection (FDI) attacks. As an emerging intrusion detection scheme for ICS, process-based Intrusion Detection Systems (IDS) can effectively detect the anomalies caused by FDI attacks. Specifically, such IDS establishes anomaly detection model which can describe the normal pattern of industrial processes, then perform real-time anomaly detection on industrial process data. However, this method suffers low detection accuracy due to the complexity and instability of industrial processes. That is, the process data inherently contains sophisticated nonlinear spatial-temporal correlations which are hard to be explicitly described by anomaly detection model. In addition, the noise and disturbance in process data prevent the IDS from distinguishing the real anomaly events. In this paper, we propose an Anomaly Detection approach based on Robust Spatial-temporal Modeling (AD-RoSM). Concretely, to explicitly describe the spatial-temporal correlations within the process data, a neural based state estimation model is proposed by utilizing 1D CNN for temporal modeling and multi-head self attention mechanism for spatial modeling. To perform robust anomaly detection in the presence of noise and disturbance, a composite anomaly discrimination model is designed so that the outputs of the state estimation model can be analyzed with a combination of threshold strategy and entropy-based strategy. We conducted extensive experiments on two benchmark ICS security datasets to demonstrate the effectiveness of our approach.", "fno": "718000a355", "keywords": [ "Control Engineering Computing", "Convolutional Neural Nets", "Entropy", "Industrial Control", "Production Engineering Computing", "Security Of Data", "State Estimation", "1 D CNN", "AD Ro SM", "Anomaly Detection Approach", "Anomaly Detection Model", "Anomaly Events", "Composite Anomaly Discrimination Model", "Entropy Based Strategy", "False Data Injection Attacks", "FDI Attacks", "ICS", "IDS", "Industrial Control Systems", "Industrial Process Data", "Intrusion Detection Scheme", "Low Detection Accuracy", "Multihead Self Attention Mechanism", "Neural Based State Estimation Model", "Nonlinear Spatial Temporal Correlations", "Process Based Intrusion Detection Systems", "Real Time Anomaly Detection", "Robust Spatial Temporal Modeling", "Spatial Modeling", "Threshold Strategy", "Analytical Models", "Correlation", "Intrusion Detection", "Predictive Models", "Data Models", "Robustness", "Security", "Industrial Control Systems", "Anomaly Detection", "Intrusion Detection Systems", "Machine Learning", "Cyber Physical Systems" ], "authors": [ { "affiliation": "School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China", "fullName": "Shijie Li", "givenName": "Shijie", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China", "fullName": "Junjiao Liu", "givenName": "Junjiao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Zhiwen Pan", "givenName": "Zhiwen", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China", "fullName": "Shichao Lv", "givenName": "Shichao", "surname": "Lv", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China", "fullName": "Shuaizong Si", "givenName": "Shuaizong", "surname": "Si", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Cyber Security, University of Chinese Academy of Sciences,Beijing,China", "fullName": "Limin Sun", "givenName": "Limin", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "mass", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "355-363", "year": "2022", "issn": null, "isbn": "978-1-6654-7180-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "718000a346", "articleId": "1JeDZwme0lW", "__typename": "AdjacentArticleType" }, "next": { "fno": "718000a364", "articleId": "1JeEpsNnLxK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isads/2017/4042/0/07940233", "title": "Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol", "doi": null, "abstractUrl": "/proceedings-article/isads/2017/07940233/12OmNC2xhA3", "parentPublication": { "id": "proceedings/isads/2017/4042/0", "title": "2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2017/0542/0/0542a261", "title": "Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks", "doi": null, "abstractUrl": "/proceedings-article/dsn/2017/0542a261/12OmNvSKO1V", "parentPublication": { "id": "proceedings/dsn/2017/0542/0", "title": "2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2018/2205/0/08402710", "title": "A taxonomy and platform for anomaly detection", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2018/08402710/12OmNzZmZsx", "parentPublication": { "id": "proceedings/aqtr/2018/2205/0", "title": "2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmaee/2022/4657/0/465700a025", "title": "An error neighborhood-based detection mechanism to improve the performance of anomaly detection in industrial control systems", "doi": null, "abstractUrl": "/proceedings-article/cmaee/2022/465700a025/1LAyVKkXiwg", "parentPublication": { "id": "proceedings/cmaee/2022/4657/0", "title": "2022 International Conference on Mechanical, Automation and Electrical Engineering (CMAEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2023/6451/0/10092008", "title": "Intrusion Detection System for Industrial Control Systems Based on Imbalanced Data", "doi": null, "abstractUrl": "/proceedings-article/isads/2023/10092008/1M9pU6D0FxK", "parentPublication": { "id": "proceedings/isads/2023/6451/0", "title": "2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2018/6808/0/08710993", "title": "A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2018/08710993/1axfHd0c9Yk", "parentPublication": { "id": "proceedings/ipccc/2018/6808/0", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a294", "title": "A Case Study of Anomaly Detection in Industrial Environments", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a294/1fHkzVu8cmY", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2019/6625/0/662500a150", "title": "An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/fit/2019/662500a150/1hrJvBMnT56", "parentPublication": { "id": "proceedings/fit/2019/6625/0", "title": "2019 International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wowmom/2020/7374/0/737400a360", "title": "Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2020/737400a360/1nMQBTRbsly", "parentPublication": { "id": "proceedings/wowmom/2020/7374/0", "title": "2020 IEEE 21st International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a899", "title": "Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a899/1r548U93Pjy", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1axfDU6mDyU", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "acronym": "ipccc", "groupId": "1000548", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1axfHd0c9Yk", "doi": "10.1109/PCCC.2018.8710993", "title": "A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition", "normalizedTitle": "A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition", "abstract": "As closed Industrial Control Systems (ICS) gradually evolve toward networking, ICS data and operational processes can be easily tampered with by attackers, causing industrial control equipment to fail or become damaged. Depending on the characteristics of ICS business logic stability, this paper proposes a novel two-level anomaly detection framework to ensure that system data and business logic are safe and reliable. Specifically, basic information is obtained from network traffic. In our framework, the first-level detection uses convolutional neural network (CNN) to feature extraction and anomaly identification. In the second-level detection, we propose a process state transfer algorithm. The feature extracted by the CNN model is invoked as the input of the algorithm to construct the normal state process transfer model of ICS. The model detects whether the current data meets the normal state transition process of the system, and may find unknown attacks or 0-day attacks. Finally, through laboratory gas pipeline network system verification, we found that the anomaly detection framework combined with the two methods has more outstanding performance than several current latest technologies.", "abstracts": [ { "abstractType": "Regular", "content": "As closed Industrial Control Systems (ICS) gradually evolve toward networking, ICS data and operational processes can be easily tampered with by attackers, causing industrial control equipment to fail or become damaged. Depending on the characteristics of ICS business logic stability, this paper proposes a novel two-level anomaly detection framework to ensure that system data and business logic are safe and reliable. Specifically, basic information is obtained from network traffic. In our framework, the first-level detection uses convolutional neural network (CNN) to feature extraction and anomaly identification. In the second-level detection, we propose a process state transfer algorithm. The feature extracted by the CNN model is invoked as the input of the algorithm to construct the normal state process transfer model of ICS. The model detects whether the current data meets the normal state transition process of the system, and may find unknown attacks or 0-day attacks. Finally, through laboratory gas pipeline network system verification, we found that the anomaly detection framework combined with the two methods has more outstanding performance than several current latest technologies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As closed Industrial Control Systems (ICS) gradually evolve toward networking, ICS data and operational processes can be easily tampered with by attackers, causing industrial control equipment to fail or become damaged. Depending on the characteristics of ICS business logic stability, this paper proposes a novel two-level anomaly detection framework to ensure that system data and business logic are safe and reliable. Specifically, basic information is obtained from network traffic. In our framework, the first-level detection uses convolutional neural network (CNN) to feature extraction and anomaly identification. In the second-level detection, we propose a process state transfer algorithm. The feature extracted by the CNN model is invoked as the input of the algorithm to construct the normal state process transfer model of ICS. The model detects whether the current data meets the normal state transition process of the system, and may find unknown attacks or 0-day attacks. Finally, through laboratory gas pipeline network system verification, we found that the anomaly detection framework combined with the two methods has more outstanding performance than several current latest technologies.", "fno": "08710993", "keywords": [ "Control Engineering Computing", "Convolutional Neural Nets", "Feature Extraction", "Industrial Control", "Pipelines", "Production Engineering Computing", "Security Of Data", "Telecommunication Traffic", "Convolutional Neural Network", "Feature Extraction", "Anomaly Identification", "Process State Transfer Algorithm", "CNN Model", "Normal State Process Transfer Model", "Normal State Transition Process", "Laboratory Gas Pipeline Network System Verification", "ICS Data", "Industrial Control Equipment", "ICS Business Logic Stability", "Network Traffic", "Industrial Control Systems", "Intrusion Detection", "Two Level Anomaly Detection", "Integrated Circuits", "Feature Extraction", "Anomaly Detection", "Intrusion Detection", "Convolution", "Industrial Control System", "Anomaly Detection", "Convolutional Neural Network", "Process State Transfer Algorithm" ], "authors": [ { "affiliation": "IIE CAS, Beijing Key Laboratory of IoT Information Security Technology, Beijing, 100093, China", "fullName": "Junjiao Liu", "givenName": "Junjiao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "National Industrial Information Security Development Research Center, Beijing, 100040, China", "fullName": "Libo Yin", "givenName": "Libo", "surname": "Yin", "__typename": "ArticleAuthorType" }, { "affiliation": "USTB, School of Computer and Communication Engineering, Beijing, China", "fullName": "Yan Hu", "givenName": "Yan", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "IIE CAS, Beijing Key Laboratory of IoT Information Security Technology, Beijing, 100093, China", "fullName": "Shichao Lv", "givenName": "Shichao", "surname": "Lv", "__typename": "ArticleAuthorType" }, { "affiliation": "IIE CAS, Beijing Key Laboratory of IoT Information Security Technology, Beijing, 100093, China", "fullName": "Limin Sun", "givenName": "Limin", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipccc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2018", "issn": null, "isbn": "978-1-5386-6808-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08711267", "articleId": "1axfIX5FVRu", "__typename": "AdjacentArticleType" }, "next": { "fno": "08710885", "articleId": "1axfHQiMSw8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/depcos-relcomex/2008/3179/0/3179a211", "title": "Anomaly-Based Intrusion Detection Using Bayesian Networks", "doi": null, "abstractUrl": "/proceedings-article/depcos-relcomex/2008/3179a211/12OmNAoUTuo", "parentPublication": { "id": "proceedings/depcos-relcomex/2008/3179/0", "title": "Dependability of Computer Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2009/3899/0/3899a426", "title": "A Mixed Unsupervised Clustering-Based Intrusion Detection Model", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a426/12OmNBhHthU", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan/2009/3908/0/3908a448", "title": "Attribute Normalization in Network Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/ispan/2009/3908a448/12OmNvAiSg7", "parentPublication": { "id": "proceedings/ispan/2009/3908/0", "title": "Parallel Architectures, Algorithms, and Networks, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2017/0542/0/0542a261", "title": "Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks", "doi": null, "abstractUrl": "/proceedings-article/dsn/2017/0542a261/12OmNvSKO1V", "parentPublication": { "id": "proceedings/dsn/2017/0542/0", "title": "2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2006/2528/2/252821095", "title": "Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network", "doi": null, "abstractUrl": "/proceedings-article/isda/2006/252821095/12OmNweBUEo", "parentPublication": { "id": "proceedings/isda/2006/2528/2", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbctis/2022/9691/0/969100a032", "title": "Industrial Intrusion Detection System Based on CNN-Attention -BILSTM Network", "doi": null, "abstractUrl": "/proceedings-article/icbctis/2022/969100a032/1GqgX5ymchy", "parentPublication": { "id": "proceedings/icbctis/2022/9691/0", "title": "2022 International Conference on Blockchain Technology and Information Security (ICBCTIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000a355", "title": "Anomaly Detection based on Robust Spatial-temporal Modeling for Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000a355/1JeE7brCY0M", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2023/6451/0/10092008", "title": "Intrusion Detection System for Industrial Control Systems Based on Imbalanced Data", "doi": null, "abstractUrl": "/proceedings-article/isads/2023/10092008/1M9pU6D0FxK", "parentPublication": { "id": "proceedings/isads/2023/6451/0", "title": "2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a294", "title": "A Case Study of Anomaly Detection in Industrial Environments", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a294/1fHkzVu8cmY", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wowmom/2020/7374/0/737400a360", "title": "Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2020/737400a360/1nMQBTRbsly", "parentPublication": { "id": "proceedings/wowmom/2020/7374/0", "title": "2020 IEEE 21st International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dx8y6v6yZO", "title": "2019 IEEE Security and Privacy Workshops (SPW)", "acronym": "spw", "groupId": "1801671", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dx8yNWRRo4", "doi": "10.1109/SPW.2019.00040", "title": "Devil in the Detail: Attack Scenarios in Industrial Applications", "normalizedTitle": "Devil in the Detail: Attack Scenarios in Industrial Applications", "abstract": "In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.", "abstracts": [ { "abstractType": "Regular", "content": "In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.", "fno": "350800a169", "keywords": [ "Cyber Physical Systems", "Learning Artificial Intelligence", "Matrix Algebra", "Recurrent Neural Nets", "Security Of Data", "Software Maintenance", "Time Series", "Attack Scenarios", "Industrial Applications", "Industrial Networks", "Private Networks", "Public Networks", "Attack Surface", "Legacy Systems", "Cyber Physical Systems", "Physical Work", "Attack Vectors", "Neural Networks", "Long Short Term Memory Network", "Matrix Profiles", "Machine Learning Based Methods", "Time Series Anomaly Detection", "Containers", "Malware", "Valves", "Intrusion Detection", "Sensors", "Time Series Analysis", "Cyber Security Time Series Machine Learning Neural Networks Industrial Control Systems" ], "authors": [ { "affiliation": "German Research Center for Artificial Intelligence", "fullName": "Simon D. Duque Anton", "givenName": "Simon D.", "surname": "Duque Anton", "__typename": "ArticleAuthorType" }, { "affiliation": "German Research Center for Artificial Intelligence", "fullName": "Alexander Hafner", "givenName": "Alexander", "surname": "Hafner", "__typename": "ArticleAuthorType" }, { "affiliation": "German Research Center for Artificial Intelligence", "fullName": "Hans Dieter Schotten", "givenName": "Hans Dieter", "surname": "Schotten", "__typename": "ArticleAuthorType" } ], "idPrefix": "spw", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "169-174", "year": "2019", "issn": null, "isbn": "978-1-7281-3508-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "350800a163", "articleId": "1dx8A9L4Ov6", "__typename": "AdjacentArticleType" }, "next": { "fno": "350800a175", "articleId": "1dx8yncSQDe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bwcca/2015/8315/0/8315a375", "title": "Ontology Based APT Attack Behavior Analysis in Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2015/8315a375/12OmNvAiSwX", "parentPublication": { "id": "proceedings/bwcca/2015/8315/0", "title": "2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ficloudw/2017/3281/0/3281a069", "title": "Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution", "doi": null, "abstractUrl": "/proceedings-article/ficloudw/2017/3281a069/12OmNxGj9Zu", "parentPublication": { "id": "proceedings/ficloudw/2017/3281/0", "title": "2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2007/3032/0/30320368", "title": "Generating Attack Scenarios with Causal Relationship", "doi": null, "abstractUrl": "/proceedings-article/grc/2007/30320368/12OmNzlD9zw", "parentPublication": { "id": "proceedings/grc/2007/3032/0", "title": "2007 IEEE International Conference on Granular Computing (GRC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a001", "title": "Time is of the Essence: Machine Learning-Based Intrusion Detection in Industrial Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a001/18jXCaKz0Lm", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medcomnet/2022/8729/0/09810446", "title": "System for Operational Technology Attack Detection in Industrial IoT", "doi": null, "abstractUrl": "/proceedings-article/medcomnet/2022/09810446/1EEH36FpJBe", "parentPublication": { "id": "proceedings/medcomnet/2022/8729/0", "title": "2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/6giott/2022/5484/0/548400a081", "title": "Analysis of APT Attack Source Tracing in Industrial Internet Environment", "doi": null, "abstractUrl": "/proceedings-article/6giott/2022/548400a081/1LKwLRp8aL6", "parentPublication": { "id": "proceedings/6giott/2022/5484/0", "title": "2022 International Conference on 6G Communications and IoT Technologies (6GIoTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a482", "title": "Secured Cyber-Attack Signatures Distribution using Blockchain Technology", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a482/1fHkvrbR9Li", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pst/2019/3265/0/08949065", "title": "Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network", "doi": null, "abstractUrl": "/proceedings-article/pst/2019/08949065/1grMQ0MsLh6", "parentPublication": { "id": "proceedings/pst/2019/3265/0", "title": "2019 17th International Conference on Privacy, Security and Trust (PST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a899", "title": "Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a899/1r548U93Pjy", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/su/2021/02/08515052", "title": "Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems", "doi": null, "abstractUrl": "/journal/su/2021/02/08515052/1ugDOOhxoEE", "parentPublication": { "id": "trans/su", "title": "IEEE Transactions on Sustainable Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hrJvz1dLEc", "title": "2019 International Conference on Frontiers of Information Technology (FIT)", "acronym": "fit", "groupId": "1800803", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hrJvBMnT56", "doi": "10.1109/FIT47737.2019.00037", "title": "An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection", "normalizedTitle": "An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection", "abstract": "Detecting process-based attacks on industrial control systems (ICS) is challenging. These cyber-attacks are designed to disrupt the industrial process by changing the state of a system, while keeping the system's behaviour close to the expected behaviour. Such anomalous behaviour can be effectively detected by an event-driven approach. Petri Net (PN) model identification has proved to be an effective method for event-driven system analysis and anomaly detection. However, PN identification-based anomaly detection methods require ICS device logs to be converted into event logs (sequence of events). Therefore, in this paper we present a formalised method for pre-processing and transforming ICS device logs into event logs. The proposed approach outperforms the previous methods of device logs processing in terms of anomaly detection. We have demonstrated the results using two published datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Detecting process-based attacks on industrial control systems (ICS) is challenging. These cyber-attacks are designed to disrupt the industrial process by changing the state of a system, while keeping the system's behaviour close to the expected behaviour. Such anomalous behaviour can be effectively detected by an event-driven approach. Petri Net (PN) model identification has proved to be an effective method for event-driven system analysis and anomaly detection. However, PN identification-based anomaly detection methods require ICS device logs to be converted into event logs (sequence of events). Therefore, in this paper we present a formalised method for pre-processing and transforming ICS device logs into event logs. The proposed approach outperforms the previous methods of device logs processing in terms of anomaly detection. We have demonstrated the results using two published datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Detecting process-based attacks on industrial control systems (ICS) is challenging. These cyber-attacks are designed to disrupt the industrial process by changing the state of a system, while keeping the system's behaviour close to the expected behaviour. Such anomalous behaviour can be effectively detected by an event-driven approach. Petri Net (PN) model identification has proved to be an effective method for event-driven system analysis and anomaly detection. However, PN identification-based anomaly detection methods require ICS device logs to be converted into event logs (sequence of events). Therefore, in this paper we present a formalised method for pre-processing and transforming ICS device logs into event logs. The proposed approach outperforms the previous methods of device logs processing in terms of anomaly detection. We have demonstrated the results using two published datasets.", "fno": "662500a150", "keywords": [ "Industrial Control", "Petri Nets", "Security Of Data", "System Monitoring", "Improved Industrial Control System Device Logs Processing Method", "Process Based Anomaly Detection", "Industrial Control Systems", "Cyber Attacks", "Industrial Process", "Expected Behaviour", "Anomalous Behaviour", "Petri Net Model Identification", "Event Driven System Analysis", "PN Identification Based Anomaly Detection Methods", "ICS Device", "Event Logs", "Formalised Method", "Process Based Attacks", "Industrial Control Systems", "Intrusion Detection System", "System Identification", "Process Related Attacks" ], "authors": [ { "affiliation": "Queensland University of Technology, COMSATS University Islamabad", "fullName": "Mukhtar Hussain", "givenName": "Mukhtar", "surname": "Hussain", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology, Griffith University", "fullName": "Ernest Foo", "givenName": "Ernest", "surname": "Foo", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology", "fullName": "Suriadi Suriadi", "givenName": "Suriadi", "surname": "Suriadi", "__typename": "ArticleAuthorType" } ], "idPrefix": "fit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "150-1505", "year": "2019", "issn": "2334-3141", "isbn": "978-1-7281-6625-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "662500a144", "articleId": "1hrJziux904", "__typename": "AdjacentArticleType" }, "next": { "fno": "662500a156", "articleId": "1hrJzfaJXHi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cloud/2017/1993/0/1993a447", "title": "LogSed: Anomaly Diagnosis through Mining Time-Weighted Control Flow Graph in Logs", "doi": null, "abstractUrl": "/proceedings-article/cloud/2017/1993a447/12OmNqEjhZK", "parentPublication": { "id": "proceedings/cloud/2017/1993/0", "title": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258034", "title": "WEAC: Word embeddings for anomaly classification from event logs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258034/17D45VObpRG", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edcc/2018/8060/0/806000a140", "title": "Contextual anomaly detection for a critical industrial system based on logs and metrics", "doi": null, "abstractUrl": "/proceedings-article/edcc/2018/806000a140/17D45WcjjQB", "parentPublication": { "id": "proceedings/edcc/2018/8060/0", "title": "2018 14th European Dependable Computing Conference (EDCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0/751800a151", "title": "Detecting Anomaly in Big Data System Logs Using Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2018/751800a151/17D45Xtvpe7", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0", "title": "2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftxs/2022/8847/0/884700a001", "title": "ClusterLog: Clustering Logs for Effective Log-based Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/ftxs/2022/884700a001/1KcktUT6Mw0", "parentPublication": { "id": "proceedings/ftxs/2022/8847/0", "title": "2022 IEEE/ACM 12th Workshop on Fault Tolerance for HPC at eXtreme Scale (FTXS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a066", "title": "Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a066/1cYivvDqvx6", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a294", "title": "A Case Study of Anomaly Detection in Industrial Environments", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a294/1fHkzVu8cmY", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0/09123047", "title": "Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2020/09123047/1kTB1EuScVi", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2020/6873/0", "title": "2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/srds/2020/7626/0/762600a195", "title": "Anomaly Detection via Mining Numerical Workflow Relations from Logs", "doi": null, "abstractUrl": "/proceedings-article/srds/2020/762600a195/1oHlygnIG9q", "parentPublication": { "id": "proceedings/srds/2020/7626/0", "title": "2020 International Symposium on Reliable Distributed Systems (SRDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b196", "title": "Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b196/1r54AAonPsA", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1k0P4azyjCw", "title": "2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI)", "acronym": "iotdi", "groupId": "1813304", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1k0P6qeLvCE", "doi": "10.1109/IoTDI49375.2020.00032", "title": "A Novel Data Collection Framework for Telemetry and Anomaly Detection in Industrial IoT Systems", "normalizedTitle": "A Novel Data Collection Framework for Telemetry and Anomaly Detection in Industrial IoT Systems", "abstract": "The advent of IoTs has catalyzed the development of a variety of cyber-physical systems in which hundreds of sensor-actuator enabled devices (including industrial IoTs) cooperatively interact with the physical and human worlds. However, due to the large volume and heterogeneity of data generated by such systems and the stringent time requirements of industrial applications, the design of efficient frameworks to store, monitor and analyze the IoT data is quite challenging. This paper proposes an industrial IoT architectural framework that allows data offloading between the cloud and the edge. Specifically, we use this framework for telemetry of a set of heterogeneous sensors attached to a scale replica of an industrial assembly plant. We also design an anomaly detection algorithm that exploits deep learning techniques to assess the working conditions of the plant. Experimental results show that the proposed anomaly detector is able to detect 99% of the anomalies occurred in the industrial system demonstrating the feasibility of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "The advent of IoTs has catalyzed the development of a variety of cyber-physical systems in which hundreds of sensor-actuator enabled devices (including industrial IoTs) cooperatively interact with the physical and human worlds. However, due to the large volume and heterogeneity of data generated by such systems and the stringent time requirements of industrial applications, the design of efficient frameworks to store, monitor and analyze the IoT data is quite challenging. This paper proposes an industrial IoT architectural framework that allows data offloading between the cloud and the edge. Specifically, we use this framework for telemetry of a set of heterogeneous sensors attached to a scale replica of an industrial assembly plant. We also design an anomaly detection algorithm that exploits deep learning techniques to assess the working conditions of the plant. Experimental results show that the proposed anomaly detector is able to detect 99% of the anomalies occurred in the industrial system demonstrating the feasibility of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The advent of IoTs has catalyzed the development of a variety of cyber-physical systems in which hundreds of sensor-actuator enabled devices (including industrial IoTs) cooperatively interact with the physical and human worlds. However, due to the large volume and heterogeneity of data generated by such systems and the stringent time requirements of industrial applications, the design of efficient frameworks to store, monitor and analyze the IoT data is quite challenging. This paper proposes an industrial IoT architectural framework that allows data offloading between the cloud and the edge. Specifically, we use this framework for telemetry of a set of heterogeneous sensors attached to a scale replica of an industrial assembly plant. We also design an anomaly detection algorithm that exploits deep learning techniques to assess the working conditions of the plant. Experimental results show that the proposed anomaly detector is able to detect 99% of the anomalies occurred in the industrial system demonstrating the feasibility of our approach.", "fno": "660200a245", "keywords": [ "Computer Network Security", "Cyber Physical Systems", "Internet Of Things", "Learning Artificial Intelligence", "Production Engineering Computing", "Telemetry", "Heterogeneous Sensors", "Industrial Assembly Plant", "Anomaly Detection Algorithm", "Anomaly Detector", "Industrial System", "Novel Data Collection Framework", "Industrial Io T Systems", "Cyber Physical Systems", "Sensor Actuator Enabled Devices", "Physical Worlds", "Human Worlds", "Stringent Time Requirements", "Industrial Applications", "Io T Data", "Industrial Io T Architectural Framework", "Data Offloading", "Anomaly Detection", "Protocols", "Data Collection", "Cloud Computing", "Temperature Measurement", "Monitoring", "Artificial Intelligence" ], "authors": [ { "affiliation": "University of Messina", "fullName": "Fabrizio De Vita", "givenName": "Fabrizio", "surname": "De Vita", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Messina", "fullName": "Dario Bruneo", "givenName": "Dario", "surname": "Bruneo", "__typename": "ArticleAuthorType" }, { "affiliation": "Missouri University of Science and Technology", "fullName": "Sajal K. Das", "givenName": "Sajal K.", "surname": "Das", "__typename": "ArticleAuthorType" } ], "idPrefix": "iotdi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "245-251", "year": "2020", "issn": null, "isbn": "978-1-7281-6602-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "660200a238", "articleId": "1k0P6bDQiWY", "__typename": "AdjacentArticleType" }, "next": { "fno": "660200a252", "articleId": "1k0P5UGs5a0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/smc-it/2017/3462/0/3462a070", "title": "Telemetry Anomaly Detection System Using Machine Learning to Streamline Mission Operations", "doi": null, "abstractUrl": "/proceedings-article/smc-it/2017/3462a070/12OmNqJHFFx", "parentPublication": { "id": "proceedings/smc-it/2017/3462/0", "title": "2017 6th International Conference on Space Mission Challenges for Information Technology (SMC-IT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a120", "title": "Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a120/18jXHmqUz4s", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iotdi/2022/9641/0/964100a080", "title": "Poster Abstract: Explainable Sensor Data-Driven Anomaly Detection in Internet of Things Systems", "doi": null, "abstractUrl": "/proceedings-article/iotdi/2022/964100a080/1ErraVeIIsE", "parentPublication": { "id": "proceedings/iotdi/2022/9641/0", "title": "2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a760", "title": "Research on Intelligent Anomaly Detection Algorithm of Launch Vehicle Telemetry Data", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a760/1FUVGDbh2vK", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a294", "title": "A Case Study of Anomaly Detection in Industrial Environments", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a294/1fHkzVu8cmY", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2020/5809/0/580900a552", "title": "Mining Multivariate Discrete Event Sequences for Knowledge Discovery and Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/dsn/2020/580900a552/1lUFiDGaVYA", "parentPublication": { "id": "proceedings/dsn/2020/5809/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvidl/2020/9481/0/948100a581", "title": "Improving Anomaly Detection Fusion Method of Rotating Machinery Based on ANN and Isolation Forest", "doi": null, "abstractUrl": "/proceedings-article/cvidl/2020/948100a581/1pbearnOlnq", "parentPublication": { "id": "proceedings/cvidl/2020/9481/0", "title": "2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378018", "title": "Machine Learning Methods for Anomaly Detection in Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378018/1s64V1fuB1e", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2021/3483/0/348300a222", "title": "Anomaly detection in the time-series data of industrial plants using neural network architectures", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2021/348300a222/1xNNoaEHmOA", "parentPublication": { "id": "proceedings/bigdataservice/2021/3483/0", "title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2021/1252/0/125200a031", "title": "A Semi-Supervised Bayesian Anomaly Detection Technique for Diagnosing Faults in Industrial IoT Systems", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2021/125200a031/1xxcxbCumGI", "parentPublication": { "id": "proceedings/smartcomp/2021/1252/0", "title": "2021 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1r5431kxiAE", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "acronym": "trustcom", "groupId": "1800729", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1r545fmHihO", "doi": "10.1109/TrustCom50675.2020.00262", "title": "Securing Manufacturing Using Blockchain", "normalizedTitle": "Securing Manufacturing Using Blockchain", "abstract": "Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in the recent decade, various security frameworks have been designed for anomaly detection. While advanced ICS attacks use sequential phases to launch their final attacks, existing anomaly detection methods can only monitor a single source of data. However, analysis of multiple security data could provide more comprehensive and system-wide anomaly detection in industrial networks. In this paper, we present an anomaly detection framework for ICSs that consists of two stages: i) blockchain-based log management where the logs of ICS devices are collected in a secure and distributed manner, and ii) multi-source anomaly detection where the blockchain logs are analysed using multi-source deep learning which in turn provides a system wide anomaly detection method. We validated our framework using two ICS datasets: a factory automation dataset and a Secure Water Treatment (SWaT) dataset. These datasets contain physical and network level normal and abnormal traffic. The performance of our new framework is compared with single-source machine learning methods. The precision of our framework is 95% which is comparable with single-source anomaly detectors. However, multi-source analysis is more robust because it can detect anomalies from multiple sources simultaneously, while achieving comparable precision for each of the sources.", "abstracts": [ { "abstractType": "Regular", "content": "Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in the recent decade, various security frameworks have been designed for anomaly detection. While advanced ICS attacks use sequential phases to launch their final attacks, existing anomaly detection methods can only monitor a single source of data. However, analysis of multiple security data could provide more comprehensive and system-wide anomaly detection in industrial networks. In this paper, we present an anomaly detection framework for ICSs that consists of two stages: i) blockchain-based log management where the logs of ICS devices are collected in a secure and distributed manner, and ii) multi-source anomaly detection where the blockchain logs are analysed using multi-source deep learning which in turn provides a system wide anomaly detection method. We validated our framework using two ICS datasets: a factory automation dataset and a Secure Water Treatment (SWaT) dataset. These datasets contain physical and network level normal and abnormal traffic. The performance of our new framework is compared with single-source machine learning methods. The precision of our framework is 95% which is comparable with single-source anomaly detectors. However, multi-source analysis is more robust because it can detect anomalies from multiple sources simultaneously, while achieving comparable precision for each of the sources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to the rise of Industrial Control Systems (ICSs) cyber-attacks in the recent decade, various security frameworks have been designed for anomaly detection. While advanced ICS attacks use sequential phases to launch their final attacks, existing anomaly detection methods can only monitor a single source of data. However, analysis of multiple security data could provide more comprehensive and system-wide anomaly detection in industrial networks. In this paper, we present an anomaly detection framework for ICSs that consists of two stages: i) blockchain-based log management where the logs of ICS devices are collected in a secure and distributed manner, and ii) multi-source anomaly detection where the blockchain logs are analysed using multi-source deep learning which in turn provides a system wide anomaly detection method. We validated our framework using two ICS datasets: a factory automation dataset and a Secure Water Treatment (SWaT) dataset. These datasets contain physical and network level normal and abnormal traffic. The performance of our new framework is compared with single-source machine learning methods. The precision of our framework is 95% which is comparable with single-source anomaly detectors. However, multi-source analysis is more robust because it can detect anomalies from multiple sources simultaneously, while achieving comparable precision for each of the sources.", "fno": "438000b920", "keywords": [ "Blockchains", "Computer Network Security", "Factory Automation", "Industrial Control", "Learning Artificial Intelligence", "Telecommunication Traffic", "Multisource Analysis", "Single Source Anomaly Detectors", "Single Source Machine", "Abnormal Traffic", "Network Level", "Secure Water Treatment Dataset", "Factory Automation Dataset", "ICS Datasets", "Detection Method", "Multisource Deep Learning", "Blockchain Logs", "Multisource Anomaly Detection", "Secure Distributed Manner", "ICS Devices", "Anomaly Detection Framework", "Industrial Networks", "Comprehensive System Wide Anomaly Detection", "Multiple Security Data", "Anomaly Detection Methods", "Final Attacks", "Sequential Phases", "Advanced ICS Attacks", "Security Frameworks", "Industrial Control Systems Cyber Attacks", "Blockchain", "Integrated Circuits", "Privacy", "Industrial Control", "Blockchain", "Security", "Anomaly Detection", "Monitoring", "Industrial Control Systems Anomaly Detection Log Management Blockchain Deep Learning Sequence Classification" ], "authors": [ { "affiliation": "Queensland University of Technology (QUT)", "fullName": "Zahra Jadidi", "givenName": "Zahra", "surname": "Jadidi", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology (QUT)", "fullName": "Ali Dorri", "givenName": "Ali", "surname": "Dorri", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology (QUT)", "fullName": "Raja Jurdak", "givenName": "Raja", "surname": "Jurdak", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology (QUT)", "fullName": "Colin Fidge", "givenName": "Colin", "surname": "Fidge", "__typename": "ArticleAuthorType" } ], "idPrefix": "trustcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "1920-1925", "year": "2020", "issn": null, "isbn": "978-1-6654-0392-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "438000b910", "articleId": "1r54lL1CIp2", "__typename": "AdjacentArticleType" }, "next": { "fno": "438000b926", "articleId": "1r54lgtbQis", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsn/2017/0542/0/0542a261", "title": "Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks", "doi": null, "abstractUrl": "/proceedings-article/dsn/2017/0542a261/12OmNvSKO1V", "parentPublication": { "id": "proceedings/dsn/2017/0542/0", "title": "2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icii/2018/7771/0/777100a202", "title": "Current Cyber Security Challenges in ICS", "doi": null, "abstractUrl": "/proceedings-article/icii/2018/777100a202/17D45WKWnIV", "parentPublication": { "id": "proceedings/icii/2018/7771/0", "title": "2018 IEEE International Conference on Industrial Internet (ICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2022/1647/0/09767375", "title": "Design and Development of Automated Threat Hunting in Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2022/09767375/1Df7Wjr1dqU", "parentPublication": { "id": "proceedings/percom-workshops/2022/1647/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2022/1647/0/09767226", "title": "A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2022/09767226/1Df8dkjOWE8", "parentPublication": { "id": "proceedings/percom-workshops/2022/1647/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmaee/2022/4657/0/465700a025", "title": "An error neighborhood-based detection mechanism to improve the performance of anomaly detection in industrial control systems", "doi": null, "abstractUrl": "/proceedings-article/cmaee/2022/465700a025/1LAyVKkXiwg", "parentPublication": { "id": "proceedings/cmaee/2022/4657/0", "title": "2022 International Conference on Mechanical, Automation and Electrical Engineering (CMAEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2023/6451/0/10092008", "title": "Intrusion Detection System for Industrial Control Systems Based on Imbalanced Data", "doi": null, "abstractUrl": "/proceedings-article/isads/2023/10092008/1M9pU6D0FxK", "parentPublication": { "id": "proceedings/isads/2023/6451/0", "title": "2023 IEEE 15th International Symposium on Autonomous Decentralized System (ISADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2018/6808/0/08710993", "title": "A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2018/08710993/1axfHd0c9Yk", "parentPublication": { "id": "proceedings/ipccc/2018/6808/0", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0/000600a267", "title": "An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2019/000600a267/1cTIHHLzEpq", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0", "title": "2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a294", "title": "A Case Study of Anomaly Detection in Industrial Environments", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a294/1fHkzVu8cmY", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2022/02/09403989", "title": "DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems", "doi": null, "abstractUrl": "/journal/ec/2022/02/09403989/1sLHcmstHjy", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yQB4Fmf7vq", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yQB5Z4abUQ", "doi": "10.1109/TREX53765.2021.00006", "title": "The Enhanced Security in Process System - Evaluating Knowledge Assistance", "normalizedTitle": "The Enhanced Security in Process System - Evaluating Knowledge Assistance", "abstract": "We present evaluation results of our enhancements to the Security in Process System [14] developed by Lohfink et al. to support triage analysis in operational technology networks. To ensure fast and appropriate reactions to anomalies in device readings, this system communicates anomaly detection results and device readings to incorporate human expertise and experience. It exploits periodical behavior in the data combining spiral plots with results from anomaly detection. To support decisions, increase trust, and support cooperation in the system we enhanced it to be knowledge-assisted. A central knowledge base allows sharing knowledge between users and support during analysis. It consists of an ontology describing incidents, and a data base holding collections of exemplary sensor readings with annotations and visualization parameters. Related knowledge is proposed automatically and incorporated directly in the visualization to provide assistance that is closely coupled to the application, without additional hurdles. This integration is designed aiming on additional support for correct and fast detection of anomalies in the visualized device readings. We evaluate our enhancements to the Security in Process System in terms of effectiveness, efficiency, user satisfaction, and cognitive load with a detailed user study. Comparing the original and enhanced system, we are able to draw conclusions as to how our design narrows the knowledge gap between professional analysts and laymen. Furthermore, we present and discuss the results and impact on our future research.", "abstracts": [ { "abstractType": "Regular", "content": "We present evaluation results of our enhancements to the Security in Process System [14] developed by Lohfink et al. to support triage analysis in operational technology networks. To ensure fast and appropriate reactions to anomalies in device readings, this system communicates anomaly detection results and device readings to incorporate human expertise and experience. It exploits periodical behavior in the data combining spiral plots with results from anomaly detection. To support decisions, increase trust, and support cooperation in the system we enhanced it to be knowledge-assisted. A central knowledge base allows sharing knowledge between users and support during analysis. It consists of an ontology describing incidents, and a data base holding collections of exemplary sensor readings with annotations and visualization parameters. Related knowledge is proposed automatically and incorporated directly in the visualization to provide assistance that is closely coupled to the application, without additional hurdles. This integration is designed aiming on additional support for correct and fast detection of anomalies in the visualized device readings. We evaluate our enhancements to the Security in Process System in terms of effectiveness, efficiency, user satisfaction, and cognitive load with a detailed user study. Comparing the original and enhanced system, we are able to draw conclusions as to how our design narrows the knowledge gap between professional analysts and laymen. Furthermore, we present and discuss the results and impact on our future research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present evaluation results of our enhancements to the Security in Process System [14] developed by Lohfink et al. to support triage analysis in operational technology networks. To ensure fast and appropriate reactions to anomalies in device readings, this system communicates anomaly detection results and device readings to incorporate human expertise and experience. It exploits periodical behavior in the data combining spiral plots with results from anomaly detection. To support decisions, increase trust, and support cooperation in the system we enhanced it to be knowledge-assisted. A central knowledge base allows sharing knowledge between users and support during analysis. It consists of an ontology describing incidents, and a data base holding collections of exemplary sensor readings with annotations and visualization parameters. Related knowledge is proposed automatically and incorporated directly in the visualization to provide assistance that is closely coupled to the application, without additional hurdles. This integration is designed aiming on additional support for correct and fast detection of anomalies in the visualized device readings. We evaluate our enhancements to the Security in Process System in terms of effectiveness, efficiency, user satisfaction, and cognitive load with a detailed user study. Comparing the original and enhanced system, we are able to draw conclusions as to how our design narrows the knowledge gap between professional analysts and laymen. Furthermore, we present and discuss the results and impact on our future research.", "fno": "181700a001", "keywords": [ "Data Visualisation", "Knowledge Based Systems", "Knowledge Management", "Ontologies Artificial Intelligence", "Security Of Data", "Enhanced Security", "Knowledge Assistance", "Support Triage Analysis", "Operational Technology Networks", "Anomaly Detection Results", "Human Expertise", "Periodical Behavior", "Spiral Plots", "Central Knowledge Base", "Ontology Describing Incidents", "Data Base", "Exemplary Sensor Readings", "Visualization Parameters", "Related Knowledge", "Visualized Device Readings", "Original System", "Knowledge Gap", "Privacy", "Spirals", "Visual Analytics", "Knowledge Based Systems", "Data Visualization", "Tools", "Ontologies", "Security And Privacy Intrusion", "Anomaly Detection And Malware Mitigation", "Human Centered Computing", "Visualization Systems And Tools" ], "authors": [ { "affiliation": "Technische Universität Kaiserslautern,Germany", "fullName": "Anna-Pia Lohfink", "givenName": "Anna-Pia", "surname": "Lohfink", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Kaiserslautern,Germany", "fullName": "Vera M. Memmesheimer", "givenName": "Vera M.", "surname": "Memmesheimer", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Kaiserslautern,Germany", "fullName": "Frederike Gartzky", "givenName": "Frederike", "surname": "Gartzky", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Kaiserslautern,Germany", "fullName": "Christoph Garth", "givenName": "Christoph", "surname": "Garth", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2021", "issn": null, "isbn": "978-1-6654-1817-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yQB5VkxvMc", "name": "ptrex202118170-09619890s1-mm_181700a001.zip", "size": "1.76 MB", "location": "https://www.computer.org/csdl/api/v1/extra/ptrex202118170-09619890s1-mm_181700a001.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "181700z007", "articleId": "1yQB5nKcbyU", "__typename": "AdjacentArticleType" }, "next": { "fno": "181700a008", "articleId": "1yQB4TeSTT2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2006/0591/0/04035747", "title": "Interactive Visual Synthesis of Analytic Knowledge", "doi": null, "abstractUrl": "/proceedings-article/vast/2006/04035747/12OmNrMZpEE", "parentPublication": { "id": "proceedings/vast/2006/0591/0", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2016/0662/0/0662a392", "title": "A Knowledge Base Visual Analytics Technique for Semantic Web", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a392/12OmNyv7mla", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seke/1992/2830/0/00227944", "title": "Towards dynamic generation of knowledge-based environments for software process assistance", "doi": null, "abstractUrl": "/proceedings-article/seke/1992/00227944/12OmNzBOic5", "parentPublication": { "id": "proceedings/seke/1992/2830/0", "title": "Proceedings Fourth International Conference on Software Engineering and Knowledge Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1990/10/e1164", "title": "Visual Knowledge Engineering", "doi": null, "abstractUrl": "/journal/ts/1990/10/e1164/13rRUwkfB0V", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/07/08587186", "title": "Visual Analysis of Collective Anomalies Using Faceted High-Order Correlation Graphs", "doi": null, "abstractUrl": "/journal/tg/2020/07/08587186/17D45Vw15wQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585498", "title": "The Role of Explicit Knowledge: A Conceptual Model of Knowledge-Assisted Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585498/17D45XvMccM", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0/764700a168", "title": "Enhanced Knowledge Inference and Reasoning with New IP", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2020/764700a168/1pVHh254We4", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555492", "title": "Knowledge Rocks: Adding Knowledge Assistance to Visualization Systems", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555492/1xjQVW2XkGY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a032", "title": "Evaluating Forecasting, Knowledge, and Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a032/1yQB5vqv5Pa", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2021/2067/0/206700a030", "title": "A Multi-Scale Visual Analytics Approach for Exploring Biomedical Knowledge", "doi": null, "abstractUrl": "/proceedings-article/vahc/2021/206700a030/1z0ykZQLK0w", "parentPublication": { "id": "proceedings/vahc/2021/2067/0", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBbr", "title": "2009 International Conference on Computational Science and Engineering", "acronym": "cse", "groupId": "1002115", "volume": "4", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBBhN78", "doi": "10.1109/CSE.2009.137", "title": "Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social Networks", "normalizedTitle": "Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social Networks", "abstract": "In centralized virtual social networking platforms, models for sub-structures like sub-communities or groups such as Facebook's groups exist. We investigate in how far these declared groups are dense sub-networks in a study using declared groups in a German Facebook clone (StudiVZ) as an example. While many such groups are large and sparse ``pseudo´´-structures which should be seen as labels or tags for profile extension, the result of the study is that a substantial share of these declared groups (especially the smaller ones) have a high network density with respect to various measures of density. We conclude that these can be considered socially ``valid´´ models of sub-structures (groups, small sub-communities etc.). In a second line of thought we argue that decentralized / Peer-to-Peer Social Networking appears to be a very promising answer to the problem of many co-existing virtual social network platforms and the resulting problems of having to keep multiple identities and not being able to access the network overlapping the platform boundaries in a coherent manner. Both argumentations together imply that a suitable approach for modeling and demarcating sub-structures (e.g. sub-communities) in decentralized P2P social networking is necessary. We conclude by discussing candidate approaches for the problem.", "abstracts": [ { "abstractType": "Regular", "content": "In centralized virtual social networking platforms, models for sub-structures like sub-communities or groups such as Facebook's groups exist. We investigate in how far these declared groups are dense sub-networks in a study using declared groups in a German Facebook clone (StudiVZ) as an example. While many such groups are large and sparse ``pseudo´´-structures which should be seen as labels or tags for profile extension, the result of the study is that a substantial share of these declared groups (especially the smaller ones) have a high network density with respect to various measures of density. We conclude that these can be considered socially ``valid´´ models of sub-structures (groups, small sub-communities etc.). In a second line of thought we argue that decentralized / Peer-to-Peer Social Networking appears to be a very promising answer to the problem of many co-existing virtual social network platforms and the resulting problems of having to keep multiple identities and not being able to access the network overlapping the platform boundaries in a coherent manner. Both argumentations together imply that a suitable approach for modeling and demarcating sub-structures (e.g. sub-communities) in decentralized P2P social networking is necessary. We conclude by discussing candidate approaches for the problem.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In centralized virtual social networking platforms, models for sub-structures like sub-communities or groups such as Facebook's groups exist. We investigate in how far these declared groups are dense sub-networks in a study using declared groups in a German Facebook clone (StudiVZ) as an example. While many such groups are large and sparse ``pseudo´´-structures which should be seen as labels or tags for profile extension, the result of the study is that a substantial share of these declared groups (especially the smaller ones) have a high network density with respect to various measures of density. We conclude that these can be considered socially ``valid´´ models of sub-structures (groups, small sub-communities etc.). In a second line of thought we argue that decentralized / Peer-to-Peer Social Networking appears to be a very promising answer to the problem of many co-existing virtual social network platforms and the resulting problems of having to keep multiple identities and not being able to access the network overlapping the platform boundaries in a coherent manner. Both argumentations together imply that a suitable approach for modeling and demarcating sub-structures (e.g. sub-communities) in decentralized P2P social networking is necessary. We conclude by discussing candidate approaches for the problem.", "fno": "3823e304", "keywords": [ "Social Networking", "Decentralized Social Networking", "P 2 P Social Networking", "Dense Sub Networks", "Groups" ], "authors": [ { "affiliation": null, "fullName": "Georg Groh", "givenName": "Georg", "surname": "Groh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Verena Rappel", "givenName": "Verena", "surname": "Rappel", "__typename": "ArticleAuthorType" } ], "idPrefix": "cse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "304-311", "year": "2009", "issn": null, "isbn": "978-0-7695-3823-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3823e298", "articleId": "12OmNxGAKUv", "__typename": "AdjacentArticleType" }, "next": { "fno": "3823e312", "articleId": "12OmNwE9OBf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2014/5877/0/06921687", "title": "The same network - different communities? The multidimensional study of groups in the cyberspace", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921687/12OmNAXglNq", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainaw/2008/3096/0/3096b046", "title": "Finding Friend Groups in Blogosphere", "doi": null, "abstractUrl": "/proceedings-article/ainaw/2008/3096b046/12OmNC943yP", "parentPublication": { "id": "proceedings/ainaw/2008/3096/0", "title": "2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euromicro/2005/2431/0/01517776", "title": "A toolbar for efficient interaction in online communities", "doi": null, "abstractUrl": "/proceedings-article/euromicro/2005/01517776/12OmNvEhg1d", "parentPublication": { "id": "proceedings/euromicro/2005/2431/0", "title": "EUROMICRO Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408b236", "title": "Finding Communities in Dynamic Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408b236/12OmNvnwVlq", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apweb/2010/4012/0/4012a133", "title": "Effective Clustering of Dense and Concentrated Online Communities", "doi": null, "abstractUrl": "/proceedings-article/apweb/2010/4012a133/12OmNyuy9Ob", "parentPublication": { "id": "proceedings/apweb/2010/4012/0", "title": "Conference, International Asia-Pacific Web", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403760", "title": "Overlapping communities via k-connected ego centered groups", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403760/12OmNzTH15d", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2010/4108/0/4108a567", "title": "A Framework for Building Trust Based Communities in P2P Mobile Social Networks", "doi": null, "abstractUrl": "/proceedings-article/cit/2010/4108a567/12OmNzsJ7xg", "parentPublication": { "id": "proceedings/cit/2010/4108/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300a312", "title": "Continuous Geo-Social Group Monitoring over Moving Users", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300a312/1FwFboYjmOA", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381332", "title": "Proximity, Communities, and Attributes in Social Network Visualisation", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381332/1semDRI9JzW", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381439", "title": "Controlling Internal Structure of Communities on Graph Generator", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381439/1semypsPsFq", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF3b", "title": "2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)", "acronym": "ainaw", "groupId": "1001766", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNC943yP", "doi": "10.1109/WAINA.2008.156", "title": "Finding Friend Groups in Blogosphere", "normalizedTitle": "Finding Friend Groups in Blogosphere", "abstract": "In this work, we propose an algorithm based on transitive extension for finding friend groups in blogosphere to perform social network analysis. In today's blog service environment, the establishments of friend relationships are always unidirectional, and the recognition of both ends is not necessary. Therefore, general methods will find either too small or too few cliques from friend groups. This isbecause the bidirectional link is built incompletely in the social network under such circumstances. To solve this problem, we propose the 1.5-clique extension method to derive better social network structures for finding friend groups, and we use Wretch (www.wretch.cc) as a case for analysis. We further make a comparison among the results of finding groups in the original social network, and its 1-clique extension, 1.5-clique extension, and 2-cliqueextension. The experimental results suggest that our proposed method is effective and promising.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we propose an algorithm based on transitive extension for finding friend groups in blogosphere to perform social network analysis. In today's blog service environment, the establishments of friend relationships are always unidirectional, and the recognition of both ends is not necessary. Therefore, general methods will find either too small or too few cliques from friend groups. This isbecause the bidirectional link is built incompletely in the social network under such circumstances. To solve this problem, we propose the 1.5-clique extension method to derive better social network structures for finding friend groups, and we use Wretch (www.wretch.cc) as a case for analysis. We further make a comparison among the results of finding groups in the original social network, and its 1-clique extension, 1.5-clique extension, and 2-cliqueextension. The experimental results suggest that our proposed method is effective and promising.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we propose an algorithm based on transitive extension for finding friend groups in blogosphere to perform social network analysis. In today's blog service environment, the establishments of friend relationships are always unidirectional, and the recognition of both ends is not necessary. Therefore, general methods will find either too small or too few cliques from friend groups. This isbecause the bidirectional link is built incompletely in the social network under such circumstances. To solve this problem, we propose the 1.5-clique extension method to derive better social network structures for finding friend groups, and we use Wretch (www.wretch.cc) as a case for analysis. We further make a comparison among the results of finding groups in the original social network, and its 1-clique extension, 1.5-clique extension, and 2-cliqueextension. The experimental results suggest that our proposed method is effective and promising.", "fno": "3096b046", "keywords": [ "Friend Groups", "Blogosphere", "Transitive Extension", "Social Network Analysis" ], "authors": [ { "affiliation": null, "fullName": "Shih-Ta Kuan", "givenName": "Shih-Ta", "surname": "Kuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bang-Ye Wu", "givenName": "Bang-Ye", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wan-Jui Lee", "givenName": "Wan-Jui", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "ainaw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-03-01T00:00:00", "pubType": "proceedings", "pages": "1046-1050", "year": "2008", "issn": null, "isbn": "978-0-7695-3096-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3096b040", "articleId": "12OmNylboJW", "__typename": "AdjacentArticleType" }, "next": { "fno": "3096b051", "articleId": "12OmNx57HNX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2009/3823/4/3823e304", "title": "Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social Networks", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e304/12OmNBBhN78", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-cpscom/2010/4331/0/4331a831", "title": "Potential Friend Recommendation in Online Social Network", "doi": null, "abstractUrl": "/proceedings-article/greencom-cpscom/2010/4331a831/12OmNBKmXr9", "parentPublication": { "id": "proceedings/greencom-cpscom/2010/4331/0", "title": "IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isese/2005/9507/0/01541854", "title": "A friend in need is a friend indeed [software metrics and friend functions]", "doi": null, "abstractUrl": "/proceedings-article/isese/2005/01541854/12OmNqG0T25", "parentPublication": { "id": "proceedings/isese/2005/9507/0", "title": "2005 International Symposium on Empirical Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e278", "title": "Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social Network", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e278/12OmNx19k3M", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a684", "title": "Structural and Message Based Private Friend Recommendation", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a684/12OmNxXl5wk", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2008/3393/0/3393a184", "title": "VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking", "doi": null, "abstractUrl": "/proceedings-article/wimob/2008/3393a184/12OmNxwncxO", "parentPublication": { "id": "proceedings/wimob/2008/3393/0", "title": "2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2011/4375/0/4375a593", "title": "Different Approaches to Groups and Key Person Identification in Blogosphere", "doi": null, "abstractUrl": "/proceedings-article/asonam/2011/4375a593/12OmNynJMYF", "parentPublication": { "id": "proceedings/asonam/2011/4375/0", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithingscpscom/2011/4580/0/4580a602", "title": "Using Physical Context in a Mobile Social Networking Application for Improving Friend Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ithingscpscom/2011/4580a602/12OmNzuIjgl", "parentPublication": { "id": "proceedings/ithingscpscom/2011/4580/0", "title": "International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2010/02/mic2010020012", "title": "Guest Editors' Introduction: Social Computing in the Blogosphere", "doi": null, "abstractUrl": "/magazine/ic/2010/02/mic2010020012/13rRUwIF65z", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2018/6808/0/08710834", "title": "Socialite: Social Activity Mining and Friend Auto-labeling", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2018/08710834/1axfH1q30T6", "parentPublication": { "id": "proceedings/ipccc/2018/6808/0", "title": "2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBbr", "title": "2009 International Conference on Computational Science and Engineering", "acronym": "cse", "groupId": "1002115", "volume": "4", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBtiDC", "doi": "10.1109/CSE.2009.238", "title": "Representing Small Group Evolution", "normalizedTitle": "Representing Small Group Evolution", "abstract": "Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representation based on subgraphs that capture three important properties of social networks: leadership, team alignment or bonding among members, and diversity of expertise. When plotted on this representation, the evolution of a typical small group such as start-ups or street gangs has a spiral trajectory, moving toward a tentative fixed point as membership increases to two dozen or so. We show that a simple probabilistic model for recruitment and bonding can not explain these observations, and suggest that strategic moves among group members may come into play.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representation based on subgraphs that capture three important properties of social networks: leadership, team alignment or bonding among members, and diversity of expertise. When plotted on this representation, the evolution of a typical small group such as start-ups or street gangs has a spiral trajectory, moving toward a tentative fixed point as membership increases to two dozen or so. We show that a simple probabilistic model for recruitment and bonding can not explain these observations, and suggest that strategic moves among group members may come into play.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representation based on subgraphs that capture three important properties of social networks: leadership, team alignment or bonding among members, and diversity of expertise. When plotted on this representation, the evolution of a typical small group such as start-ups or street gangs has a spiral trajectory, moving toward a tentative fixed point as membership increases to two dozen or so. We show that a simple probabilistic model for recruitment and bonding can not explain these observations, and suggest that strategic moves among group members may come into play.", "fno": "3823e159", "keywords": [ "Social Networks", "Small Groups", "Dynamics", "Evolution", "Models" ], "authors": [ { "affiliation": null, "fullName": "Whitman Richards", "givenName": "Whitman", "surname": "Richards", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nicholas Wormald", "givenName": "Nicholas", "surname": "Wormald", "__typename": "ArticleAuthorType" } ], "idPrefix": "cse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "159-165", "year": "2009", "issn": null, "isbn": "978-0-7695-3823-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3823e151", "articleId": "12OmNy1SFQ8", "__typename": "AdjacentArticleType" }, "next": { "fno": "3823e166", "articleId": "12OmNB06laq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciii/2008/3435/2/3435b320", "title": "An Adaptive Evolution Mechanism for Growing Social Networks", "doi": null, "abstractUrl": "/proceedings-article/iciii/2008/3435b320/12OmNAqCtPe", "parentPublication": { "id": "proceedings/iciii/2008/3435/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsem/2012/4937/0/4937a107", "title": "Social Network Evolution: A Case Study of UK Directors", "doi": null, "abstractUrl": "/proceedings-article/icsem/2012/4937a107/12OmNqGA53I", "parentPublication": { "id": "proceedings/icsem/2012/4937/0", "title": "2012 Third International Conference on Services in Emerging Markets", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2011/4375/0/4375a247", "title": "Group Evolution Discovery in Social Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2011/4375a247/12OmNx38vUA", "parentPublication": { "id": "proceedings/asonam/2011/4375/0", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a679", "title": "Influence of the Dynamic Social Network Timeframe Type and Size on the Group Evolution Discovery", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a679/12OmNxHJ9pu", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kese/2009/3916/0/3916a124", "title": "Idea Evolution and Visualization in Team Creation", "doi": null, "abstractUrl": "/proceedings-article/kese/2009/3916a124/12OmNz61dnn", "parentPublication": { "id": "proceedings/kese/2009/3916/0", "title": "2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a275", "title": "A Local Behavior Model for Small Pedestrian Groups", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a275/12OmNzC5SEo", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2011/4607/2/4607b269", "title": "Exploring Structural Features in Predicting Social Network Evolution", "doi": null, "abstractUrl": "/proceedings-article/icmla/2011/4607b269/12OmNzCWG6V", "parentPublication": { "id": "proceedings/icmla/2011/4607/2", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2011/0445/0/04451040", "title": "Evolve: tool support for architecture evolution", "doi": null, "abstractUrl": "/proceedings-article/icse/2011/04451040/12OmNzFv4ec", "parentPublication": { "id": "proceedings/icse/2011/0445/0", "title": "2011 33rd International Conference on Software Engineering (ICSE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isecs/2009/3643/1/3643a582", "title": "Information System Evolution for Small Business", "doi": null, "abstractUrl": "/proceedings-article/isecs/2009/3643a582/12OmNzZmZsg", "parentPublication": { "id": "proceedings/isecs/2009/3643/2", "title": "Electronic Commerce and Security, International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09444851", "title": "Time-Capturing Dynamic Graph Embedding for Temporal Linkage Evolution", "doi": null, "abstractUrl": "/journal/tk/2023/01/09444851/1u51rZ1F5ew", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrMHOdd", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvmG80S", "doi": "10.1109/VAST.2016.7883511", "title": "How ideas flow across multiple social groups", "normalizedTitle": "How ideas flow across multiple social groups", "abstract": "Tracking how correlated ideas flow within and across multiple social groups facilitates the understanding of the transfer of information, opinions, and thoughts on social media. In this paper, we present IdeaFlow, a visual analytics system for analyzing the lead-lag changes within and across pre-defined social groups regarding a specific set of correlated ideas, each of which is described by a set of words. To model idea flows accurately, we develop a random-walk-based correlation model and integrate it with Bayesian conditional cointegration and a tensor-based technique. To convey complex lead-lag relationships over time, IdeaFlow combines the strengths of a bubble tree, a flow map, and a timeline. In particular, we develop a Voronoi-treemap-based bubble tree to help users get an overview of a set of ideas quickly. A correlated-clustering-based layout algorithm is used to simultaneously generate multiple flow maps with less ambiguity. We also introduce a focus+context timeline to explore huge amounts of temporal data at different levels of time granularity. Quantitative evaluation and case studies demonstrate the accuracy and effectiveness of IdeaFlow.", "abstracts": [ { "abstractType": "Regular", "content": "Tracking how correlated ideas flow within and across multiple social groups facilitates the understanding of the transfer of information, opinions, and thoughts on social media. In this paper, we present IdeaFlow, a visual analytics system for analyzing the lead-lag changes within and across pre-defined social groups regarding a specific set of correlated ideas, each of which is described by a set of words. To model idea flows accurately, we develop a random-walk-based correlation model and integrate it with Bayesian conditional cointegration and a tensor-based technique. To convey complex lead-lag relationships over time, IdeaFlow combines the strengths of a bubble tree, a flow map, and a timeline. In particular, we develop a Voronoi-treemap-based bubble tree to help users get an overview of a set of ideas quickly. A correlated-clustering-based layout algorithm is used to simultaneously generate multiple flow maps with less ambiguity. We also introduce a focus+context timeline to explore huge amounts of temporal data at different levels of time granularity. Quantitative evaluation and case studies demonstrate the accuracy and effectiveness of IdeaFlow.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tracking how correlated ideas flow within and across multiple social groups facilitates the understanding of the transfer of information, opinions, and thoughts on social media. In this paper, we present IdeaFlow, a visual analytics system for analyzing the lead-lag changes within and across pre-defined social groups regarding a specific set of correlated ideas, each of which is described by a set of words. To model idea flows accurately, we develop a random-walk-based correlation model and integrate it with Bayesian conditional cointegration and a tensor-based technique. To convey complex lead-lag relationships over time, IdeaFlow combines the strengths of a bubble tree, a flow map, and a timeline. In particular, we develop a Voronoi-treemap-based bubble tree to help users get an overview of a set of ideas quickly. A correlated-clustering-based layout algorithm is used to simultaneously generate multiple flow maps with less ambiguity. We also introduce a focus+context timeline to explore huge amounts of temporal data at different levels of time granularity. Quantitative evaluation and case studies demonstrate the accuracy and effectiveness of IdeaFlow.", "fno": "07883511", "keywords": [ "Lead", "Correlation", "Time Series Analysis", "Social Groups", "Social Network Services", "Visual Analytics", "Flow Map", "Idea Flow", "Lead Lag", "Focus Context", "Correlated Clustering" ], "authors": [ { "affiliation": "School of Software, Tsinghua University, China", "fullName": "Xiting Wang", "givenName": "Xiting", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Software, Tsinghua University, China", "fullName": "Shixia Liu", "givenName": "Shixia", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Software, Tsinghua University, China", "fullName": "Yang Chen", "givenName": "Yang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Michigan State University, United States of America", "fullName": "Tai-Quan Peng", "givenName": "Tai-Quan", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University, China", "fullName": "Jing Su", "givenName": "Jing", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "UNCC, United States of America", "fullName": "Jing Yang", "givenName": "Jing", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, United States of America", "fullName": "Baining Guo", "givenName": "Baining", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "51-60", "year": "2016", "issn": null, "isbn": "978-1-5090-5661-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07883510", "articleId": "12OmNBKmXoU", "__typename": "AdjacentArticleType" }, "next": { "fno": "07883512", "articleId": "12OmNBDQbnR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sccc/2013/0426/0/0426a100", "title": "Modeling Agreement in Social Groups Using Conceptual Agreement Theory", "doi": null, "abstractUrl": "/proceedings-article/sccc/2013/0426a100/12OmNzmclNt", "parentPublication": { "id": "proceedings/sccc/2013/0426/0", "title": "2013 32nd International Conference of the Chilean Computer Science Society (SCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08984335", "title": "PeckVis: A Visual Analytics Tool to Analyze Dominance Hierarchies in Small Groups", "doi": null, "abstractUrl": "/journal/tg/2020/04/08984335/1haTxOaV8eA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXD8", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxxdZCS", "doi": "10.1109/ICTAI.2011.44", "title": "HappyMovie: A Facebook Application for Recommending Movies to Groups", "normalizedTitle": "HappyMovie: A Facebook Application for Recommending Movies to Groups", "abstract": "The goal of this paper is to show a movie recommender system for groups of people, integrated in the social network Face book through an application called Happy movie. This application tries to mitigate certain limitations in existing group recommender systems, like obtaining the users profile or offering trading methods for users in order to reach a final agreement. The method used to make the group recommendation is based on three important features: personality, social trust and memory of past recommendations. This way we simulate in a more realistic way the argumentation process followed by groups of people when deciding a joint activity.", "abstracts": [ { "abstractType": "Regular", "content": "The goal of this paper is to show a movie recommender system for groups of people, integrated in the social network Face book through an application called Happy movie. This application tries to mitigate certain limitations in existing group recommender systems, like obtaining the users profile or offering trading methods for users in order to reach a final agreement. The method used to make the group recommendation is based on three important features: personality, social trust and memory of past recommendations. This way we simulate in a more realistic way the argumentation process followed by groups of people when deciding a joint activity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The goal of this paper is to show a movie recommender system for groups of people, integrated in the social network Face book through an application called Happy movie. This application tries to mitigate certain limitations in existing group recommender systems, like obtaining the users profile or offering trading methods for users in order to reach a final agreement. The method used to make the group recommendation is based on three important features: personality, social trust and memory of past recommendations. This way we simulate in a more realistic way the argumentation process followed by groups of people when deciding a joint activity.", "fno": "4596a239", "keywords": [ "Recommender Systems", "Groups", "Social Networks", "Personality", "Trust" ], "authors": [ { "affiliation": null, "fullName": "Lara Quijano-Sanchez", "givenName": "Lara", "surname": "Quijano-Sanchez", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Juan A. Recio-Garcia", "givenName": "Juan A.", "surname": "Recio-Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Belen Diaz-Agudo", "givenName": "Belen", "surname": "Diaz-Agudo", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "239-244", "year": "2011", "issn": "1082-3409", "isbn": "978-0-7695-4596-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4596a233", "articleId": "12OmNx9WSUh", "__typename": "AdjacentArticleType" }, "next": { "fno": "4596a245", "articleId": "12OmNB1wkGf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/micai/2013/2604/0/06714641", "title": "Matrix Factorization in Social Group Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/micai/2013/06714641/12OmNB0nWa2", "parentPublication": { "id": "proceedings/micai/2013/2604/0", "title": "2013 12th Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657163", "title": "Analysis of Terrorist Groups on Facebook", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657163/12OmNBAqZIN", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/artcom/2010/4201/0/4201a131", "title": "MPG-TAR: Mobile Process Groups Based Trust Aware Routing Protocol for MANETs", "doi": null, "abstractUrl": "/proceedings-article/artcom/2010/4201a131/12OmNBpmDKu", "parentPublication": { "id": "proceedings/artcom/2010/4201/0", "title": "Advances in Recent Technologies in Communication and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2010/4263/2/4263b121", "title": "Personality and Social Trust in Group Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ictai/2010/4263b121/12OmNCdk2Dm", "parentPublication": { "id": "proceedings/ictai/2010/4263/2", "title": "2010 22nd IEEE International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b537", "title": "Tailoring Group Package Recommendations to Large Heterogeneous Groups Based on Multi-criteria Optimization", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b537/12OmNwD1q0R", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a088", "title": "A Trust-Personality Mechanism for Emotion Compensation", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a088/12OmNxG1yCo", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837869", "title": "Recommending Packages to Groups", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837869/12OmNxwENyk", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2016/05/mex2016050040", "title": "A Social Influence Approach for Group User Modeling in Group Recommendation Systems", "doi": null, "abstractUrl": "/magazine/ex/2016/05/mex2016050040/13rRUxkYWDc", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08984335", "title": "PeckVis: A Visual Analytics Tool to Analyze Dominance Hierarchies in Small Groups", "doi": null, "abstractUrl": "/journal/tg/2020/04/08984335/1haTxOaV8eA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09195784", "title": "Overcoming Data Sparsity in Group Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/07/09195784/1n7hEZcV1O8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNANkoab", "title": "2013 32nd International Conference of the Chilean Computer Science Society (SCCC)", "acronym": "sccc", "groupId": "1001489", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmclNt", "doi": "10.1109/SCCC.2013.9", "title": "Modeling Agreement in Social Groups Using Conceptual Agreement Theory", "normalizedTitle": "Modeling Agreement in Social Groups Using Conceptual Agreement Theory", "abstract": "Many social phenomena can be viewed as processes in which individuals in social groups develop agreement (e.g., public opinion, the spreading of rumor, the formation of social and linguistic conventions). This study presents an Agent Based Model (ABM) based on Conceptual Agreement Theory (CAT), which models social agreement as a simplified communicational event in which an Observer (O) and Actor (A) exchange ideas about a concept C, and where O uses that information to infer whether A's conceptual state is the same as its own (i.e., to infer agreement). Agreement may be true (when O infers that A is thinking C and this is in fact the case, event a1) or illusory (when O infers that A is thinking C and this is not the case, event a2). In CAT, concepts that afford a1 or a2 become more salient in the minds of members of social groups. Results from the ABM show that, as our conceptual analyses suggested would be the case, the simulated social system selects concepts according to their usefulness to agents in promoting agreement among them. Furthermore, the ABM exhibits more complex dynamics where similar minded agents cluster and are able to retain useful concepts even when a different group of agents discards them.", "abstracts": [ { "abstractType": "Regular", "content": "Many social phenomena can be viewed as processes in which individuals in social groups develop agreement (e.g., public opinion, the spreading of rumor, the formation of social and linguistic conventions). This study presents an Agent Based Model (ABM) based on Conceptual Agreement Theory (CAT), which models social agreement as a simplified communicational event in which an Observer (O) and Actor (A) exchange ideas about a concept C, and where O uses that information to infer whether A's conceptual state is the same as its own (i.e., to infer agreement). Agreement may be true (when O infers that A is thinking C and this is in fact the case, event a1) or illusory (when O infers that A is thinking C and this is not the case, event a2). In CAT, concepts that afford a1 or a2 become more salient in the minds of members of social groups. Results from the ABM show that, as our conceptual analyses suggested would be the case, the simulated social system selects concepts according to their usefulness to agents in promoting agreement among them. Furthermore, the ABM exhibits more complex dynamics where similar minded agents cluster and are able to retain useful concepts even when a different group of agents discards them.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many social phenomena can be viewed as processes in which individuals in social groups develop agreement (e.g., public opinion, the spreading of rumor, the formation of social and linguistic conventions). This study presents an Agent Based Model (ABM) based on Conceptual Agreement Theory (CAT), which models social agreement as a simplified communicational event in which an Observer (O) and Actor (A) exchange ideas about a concept C, and where O uses that information to infer whether A's conceptual state is the same as its own (i.e., to infer agreement). Agreement may be true (when O infers that A is thinking C and this is in fact the case, event a1) or illusory (when O infers that A is thinking C and this is not the case, event a2). In CAT, concepts that afford a1 or a2 become more salient in the minds of members of social groups. Results from the ABM show that, as our conceptual analyses suggested would be the case, the simulated social system selects concepts according to their usefulness to agents in promoting agreement among them. Furthermore, the ABM exhibits more complex dynamics where similar minded agents cluster and are able to retain useful concepts even when a different group of agents discards them.", "fno": "0426a100", "keywords": [ "Cats", "Decision Trees", "Social Groups", "Observers", "Pragmatics", "Histograms", "Computer Science", "Illusory Agreement", "Agent Based Modelling", "Shared Meaning", "Conceptual Content", "True Agreement" ], "authors": [ { "affiliation": null, "fullName": "Sergio Chaigneau", "givenName": "Sergio", "surname": "Chaigneau", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Enrique Canessa", "givenName": "Enrique", "surname": "Canessa", "__typename": "ArticleAuthorType" } ], "idPrefix": "sccc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-11-01T00:00:00", "pubType": "proceedings", "pages": "100-104", "year": "2013", "issn": "1522-4902", "isbn": "978-1-5090-0426-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0426a095", "articleId": "12OmNCvLY0v", "__typename": "AdjacentArticleType" }, "next": { "fno": "0426a105", "articleId": "12OmNrAdstE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/socialcom/2013/5137/0/5137a228", "title": "Understanding How Learning Affects Agreement Process in Social Networks", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2013/5137a228/12OmNCbU2Yy", "parentPublication": { "id": "proceedings/socialcom/2013/5137/0", "title": "2013 International Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2011/4689/0/06363407", "title": "The Power of Collective Action: How Agents Get Rid of Useless Concepts without Even Noticing Their Futility", "doi": null, "abstractUrl": "/proceedings-article/sccc/2011/06363407/12OmNCbkQCB", "parentPublication": { "id": "proceedings/sccc/2011/4689/0", "title": "2011 30th International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icce/2002/1509/0/15090483", "title": "Social Challenges of Using Computers to Teach Socially Disadvantaged Groups in the New South Africa", "doi": null, "abstractUrl": "/proceedings-article/icce/2002/15090483/12OmNvUaNqh", "parentPublication": { "id": "proceedings/icce/2002/1509/0", "title": "Computers in Education, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883511", "title": "How ideas flow across multiple social groups", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883511/12OmNvmG80S", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042519", "title": "Visual analysis of stance markers in online social media", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042519/12OmNwO5LWS", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2010/4400/0/4400a139", "title": "The Spreading and Demise of Concepts in Social Groups", "doi": null, "abstractUrl": "/proceedings-article/sccc/2010/4400a139/12OmNx0A7B2", "parentPublication": { "id": "proceedings/sccc/2010/4400/0", "title": "2010 XXIX International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2011/4596/0/4596a239", "title": "HappyMovie: A Facebook Application for Recommending Movies to Groups", "doi": null, "abstractUrl": "/proceedings-article/ictai/2011/4596a239/12OmNxxdZCS", "parentPublication": { "id": "proceedings/ictai/2011/4596/0", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1991/2445/0/0185442", "title": "Approximate representation theory of finite groups", "doi": null, "abstractUrl": "/proceedings-article/focs/1991/0185442/12OmNzVXNVK", "parentPublication": { "id": "proceedings/focs/1991/2445/0", "title": "[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2000/08/l0769", "title": "Key Agreement in Dynamic Peer Groups", "doi": null, "abstractUrl": "/journal/td/2000/08/l0769/13rRUB7a10E", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400b053", "title": "WeDoCare: A System for Vulnerable Social Groups", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400b053/1jdDYqHDegM", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uGXcydptWU", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uGXBagDxtK", "doi": "10.1109/ICDE51399.2021.00018", "title": "Peer Learning Through Targeted Dynamic Groups Formation", "normalizedTitle": "Peer Learning Through Targeted Dynamic Groups Formation", "abstract": "Peer groups leverage the presence of knowledgeable individuals in order to increase the knowledge level of other participants. The &#x2018;smart&#x2019; formation of peer groups can thus play a crucial role in educational settings, including online social networks and learning platforms. Indeed, the targeted groups formation problem, where the objective is to maximize a measure of aggregate knowledge, has received considerable attention in recent literature. In this paper we initiate a dynamic variant of the problem that, unlike previous works, allows the change of group composition over time while still targeting to maximize the aggregated knowledge level. The problem is studied in a principled way, using a realistic learning gain function and for two different interaction modes among the group members. On the algorithmic side, we present DyGroups, a generic algorithmic framework that is greedy in nature and highly scalable. We present non-trivial proofs to demonstrate theoretical guarantees for DyGroups in a special case. We also present real peer learning experiments with humans, and perform synthetic data experiments to demonstrate the effectiveness of our proposed solutions by comparing against multiple appropriately selected baseline algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Peer groups leverage the presence of knowledgeable individuals in order to increase the knowledge level of other participants. The &#x2018;smart&#x2019; formation of peer groups can thus play a crucial role in educational settings, including online social networks and learning platforms. Indeed, the targeted groups formation problem, where the objective is to maximize a measure of aggregate knowledge, has received considerable attention in recent literature. In this paper we initiate a dynamic variant of the problem that, unlike previous works, allows the change of group composition over time while still targeting to maximize the aggregated knowledge level. The problem is studied in a principled way, using a realistic learning gain function and for two different interaction modes among the group members. On the algorithmic side, we present DyGroups, a generic algorithmic framework that is greedy in nature and highly scalable. We present non-trivial proofs to demonstrate theoretical guarantees for DyGroups in a special case. We also present real peer learning experiments with humans, and perform synthetic data experiments to demonstrate the effectiveness of our proposed solutions by comparing against multiple appropriately selected baseline algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Peer groups leverage the presence of knowledgeable individuals in order to increase the knowledge level of other participants. The ‘smart’ formation of peer groups can thus play a crucial role in educational settings, including online social networks and learning platforms. Indeed, the targeted groups formation problem, where the objective is to maximize a measure of aggregate knowledge, has received considerable attention in recent literature. In this paper we initiate a dynamic variant of the problem that, unlike previous works, allows the change of group composition over time while still targeting to maximize the aggregated knowledge level. The problem is studied in a principled way, using a realistic learning gain function and for two different interaction modes among the group members. On the algorithmic side, we present DyGroups, a generic algorithmic framework that is greedy in nature and highly scalable. We present non-trivial proofs to demonstrate theoretical guarantees for DyGroups in a special case. We also present real peer learning experiments with humans, and perform synthetic data experiments to demonstrate the effectiveness of our proposed solutions by comparing against multiple appropriately selected baseline algorithms.", "fno": "918400a121", "keywords": [ "Computer Aided Instruction", "Learning Artificial Intelligence", "Social Networking Online", "Learning Platforms", "Targeted Groups Formation Problem", "Aggregate Knowledge", "Dynamic Variant", "Group Composition", "Aggregated Knowledge Level", "Realistic Learning Gain Function", "Different Interaction Modes", "Group Members", "Generic Algorithmic Framework", "Peer Learning Experiments", "Targeted Dynamic Groups Formation", "Peer Groups Leverage", "Knowledgeable Individuals", "Educational Settings", "Online Social Networks", "Social Networking Online", "Atmospheric Measurements", "Heuristic Algorithms", "Conferences", "Aggregates", "Particle Measurements", "Data Engineering", "Peer Learning", "Groups Formation", "Dynamic Graph Partition" ], "authors": [ { "affiliation": "NJIT,CS", "fullName": "Dong Wei", "givenName": "Dong", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "NJIT,CS", "fullName": "Ioannis Koutis", "givenName": "Ioannis", "surname": "Koutis", "__typename": "ArticleAuthorType" }, { "affiliation": "NJIT,CS", "fullName": "Senjuti Basu Roy", "givenName": "Senjuti Basu", "surname": "Roy", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "121-132", "year": "2021", "issn": null, "isbn": "978-1-7281-9184-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "918400a109", "articleId": "1uGXEpv6mHu", "__typename": "AdjacentArticleType" }, "next": { "fno": "918400a133", "articleId": "1uGXKydJniw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/nca/2003/1938/0/19380131", "title": "Admission Control in Peer Groups", "doi": null, "abstractUrl": "/proceedings-article/nca/2003/19380131/12OmNAHEpDo", "parentPublication": { "id": "proceedings/nca/2003/1938/0", "title": "Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970237", "title": "A quantitative comparison on file folder structures of two groups of information workers", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970237/12OmNAJDBvb", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a175", "title": "The Impact of Cross-Age Peer Tutors on Knowledge Elaboration, Knowledge Convergence, and Group Performance in Computer Supported Collaborative Learning", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a175/12OmNAhfIwo", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e782", "title": "Understanding the Sharing Economy -- Drivers and Impediments for Participation in Peer-to-Peer Rental", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e782/12OmNBLdKLt", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2012/2698/0/06417478", "title": "BCE: A privacy-preserving common-friend estimation method for distributed online social networks without cryptography", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2012/06417478/12OmNvDZEZh", "parentPublication": { "id": "proceedings/chinacom/2012/2698/0", "title": "7th International Conference on Communications and Networking in China", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2010/6605/0/05470612", "title": "Privacy-preserving admission to mobile peer-to-peer groups", "doi": null, "abstractUrl": "/proceedings-article/percomw/2010/05470612/12OmNvjQ8Iy", "parentPublication": { "id": "proceedings/percomw/2010/6605/0", "title": "2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892d098", "title": "The Dynamics of Open, Peer-to-Peer Learning: What Factors Influence Participation in the P2P University?", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892d098/12OmNvjyxYr", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saint-w/2004/2050/0/20500552", "title": "Peer Group Rendezvous Using Intersection among Peer Groups on DHT", "doi": null, "abstractUrl": "/proceedings-article/saint-w/2004/20500552/12OmNx7ouZ8", "parentPublication": { "id": "proceedings/saint-w/2004/2050/0", "title": "2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saso/2015/7535/0/7535a031", "title": "Peer Matcher: Decentralized Partnership Formation", "doi": null, "abstractUrl": "/proceedings-article/saso/2015/7535a031/12OmNy5zsvu", "parentPublication": { "id": "proceedings/saso/2015/7535/0", "title": "2015 IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems (SASO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2022/8188/0/818800a207", "title": "Online Peer Feedback and Critical Thinking Skills: An Investigation from Students&#x0027; Perspectives in a Private University in Vietnam", "doi": null, "abstractUrl": "/proceedings-article/cste/2022/818800a207/1J7W4xfu2JO", "parentPublication": { "id": "proceedings/cste/2022/8188/0", "title": "2022 4th International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgXc", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNqH9hkn", "doi": "10.1109/ICCVW.2011.6130460", "title": "Spatially adaptive illumination modeling for background subtraction", "normalizedTitle": "Spatially adaptive illumination modeling for background subtraction", "abstract": "Background subtraction is important for many vision applications. Existing techniques can adapt to gradual changes in illumination but fail to cope with sudden changes often seen in indoor environment. In this paper, we propose a novel background subtraction technique that models the change of illumination as a regression function of spatial image coordinates. Such spatial dependency is significant when light sources are close to or within the scene. The regression function is learned from highly probable background regions and applied to the rest of the background models to compensate for the illumination change. While a single regression function is adequate for a smooth Lambertian surface, multiple regression functions are needed to handle depth discontinuities, shadows, and non-Lambertian surfaces. The change of illumination is first segmented and different regression functions are applied to different segments. Experimental results comparing our techniques with other schemes show better foreground segmentation during illumination change.", "abstracts": [ { "abstractType": "Regular", "content": "Background subtraction is important for many vision applications. Existing techniques can adapt to gradual changes in illumination but fail to cope with sudden changes often seen in indoor environment. In this paper, we propose a novel background subtraction technique that models the change of illumination as a regression function of spatial image coordinates. Such spatial dependency is significant when light sources are close to or within the scene. The regression function is learned from highly probable background regions and applied to the rest of the background models to compensate for the illumination change. While a single regression function is adequate for a smooth Lambertian surface, multiple regression functions are needed to handle depth discontinuities, shadows, and non-Lambertian surfaces. The change of illumination is first segmented and different regression functions are applied to different segments. Experimental results comparing our techniques with other schemes show better foreground segmentation during illumination change.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Background subtraction is important for many vision applications. Existing techniques can adapt to gradual changes in illumination but fail to cope with sudden changes often seen in indoor environment. In this paper, we propose a novel background subtraction technique that models the change of illumination as a regression function of spatial image coordinates. Such spatial dependency is significant when light sources are close to or within the scene. The regression function is learned from highly probable background regions and applied to the rest of the background models to compensate for the illumination change. While a single regression function is adequate for a smooth Lambertian surface, multiple regression functions are needed to handle depth discontinuities, shadows, and non-Lambertian surfaces. The change of illumination is first segmented and different regression functions are applied to different segments. Experimental results comparing our techniques with other schemes show better foreground segmentation during illumination change.", "fno": "06130460", "keywords": [ "Computer Vision", "Image Segmentation", "Regression Analysis", "Spatially Adaptive Illumination Modeling", "Background Subtraction", "Vision Application", "Indoor Environment", "Regression Function", "Spatial Image Coordinates", "Background Model", "Illumination Change", "Smooth Lambertian Surface", "Foreground Segmentation", "Lighting", "Adaptation Models", "Light Sources", "Training", "Cameras", "Support Vector Machines", "Image Color Analysis" ], "authors": [ { "affiliation": "Department of ECE, University of Kentucky, Lexington, USA", "fullName": "Jithendra K. Paruchuri", "givenName": "Jithendra K.", "surname": "Paruchuri", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of ECE, University of Kentucky, Lexington, USA", "fullName": "Edwin P. Sathiyamoorthy", "givenName": "Edwin P.", "surname": "Sathiyamoorthy", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of ECE, University of Kentucky, Lexington, USA", "fullName": "Sen-ching S. Cheung", "givenName": "Sen-ching S.", "surname": "Cheung", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of ECE, Old Dominion University, Norfolk, VA, USA", "fullName": "Chung-Hao Chen", "givenName": "Chung-Hao", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "1745-1752", "year": "2011", "issn": null, "isbn": "978-1-4673-0063-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06130459", "articleId": "12OmNAlvHIz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06130461", "articleId": "12OmNyRxFwU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2009/3718/0/3718a448", "title": "Global Illumination Compensation for Background Subtraction Using Gaussian-Based Background Difference Modeling", "doi": null, "abstractUrl": "/proceedings-article/avss/2009/3718a448/12OmNAkWvy0", "parentPublication": { "id": "proceedings/avss/2009/3718/0", "title": "2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfn/2010/3940/0/3940a024", "title": "Background Subtraction under Single Varying Illumination in Different Background Luminance", "doi": null, "abstractUrl": "/proceedings-article/icfn/2010/3940a024/12OmNBf94Xj", "parentPublication": { "id": "proceedings/icfn/2010/3940/0", "title": "Future Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437b159", "title": "Background Subtraction Using Local SVD Binary Pattern", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b159/12OmNBfqG4g", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2014/5720/0/5720a083", "title": "Illumination Invariant Measuring of Skin Pigmentation", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2014/5720a083/12OmNCd2rHp", "parentPublication": { "id": "proceedings/cgiv/2014/5720/0", "title": "2014 11th International Conference on Computer Graphics, Imaging and Visualization (CGIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2013/2540/0/06749323", "title": "Fast compensation of illumination changes for background subtraction", "doi": null, "abstractUrl": "/proceedings-article/aipr/2013/06749323/12OmNwdtwhr", "parentPublication": { "id": "proceedings/aipr/2013/2540/0", "title": "2013 IEEE Applied Imagery Pattern Recognition Workshop: Sensing for Control and Augmentation (AIPR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2013/0703/0/06636642", "title": "Edge-segment-based Background Modeling: Non-parametric online background update", "doi": null, "abstractUrl": "/proceedings-article/avss/2013/06636642/12OmNx7G5Zu", "parentPublication": { "id": "proceedings/avss/2013/0703/0", "title": "2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a110", "title": "An Adaptive Codebook Model for Change Detection with Dynamic Background", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a110/12OmNzTH0Rc", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/05/i0793", "title": "Integrating Motion, Illumination, and Structure in Video Sequences with Applications in Illumination-Invariant Tracking", "doi": null, "abstractUrl": "/journal/tp/2007/05/i0793/13rRUxBJhnL", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2022/6382/0/09959316", "title": "Background Subtraction Network Module Ensemble for Background Scene Adaptation", "doi": null, "abstractUrl": "/proceedings-article/avss/2022/09959316/1Iz59QR3ktO", "parentPublication": { "id": "proceedings/avss/2022/6382/0", "title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i077", "title": "Lighthouse: Predicting Lighting Volumes for Spatially-Coherent Illumination", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i077/1m3omNjwpW0", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4r3R2", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNx3q6Va", "doi": "10.1109/CVPR.2009.5206665", "title": "Robust shadow and illumination estimation using a mixture model", "normalizedTitle": "Robust shadow and illumination estimation using a mixture model", "abstract": "Illuminant estimation from shadows typically relies on accurate segmentation of the shadows and knowledge of exact 3D geometry, while shadow estimation is difficult in the presence of texture. These can be onerous requirements; in this paper we propose a graphical model to estimate the illumination environment and detect the shadows of a scene with textured surfaces from a single image and only coarse 3D information. We represent the illumination environment as a mixture of von Mises-Fisher distributions. Then, each shadow pixel becomes the combination of samples generated from this illumination environment. We integrate a number of low-level, illumination-invariant 2D cues in a graphical model to detect and estimate cast shadows on textured surfaces. Both 2D cues and approximate 3D reasoning are combined to infer a set of labels that identify the shadows in the image and estimate the positions, shapes and intensities of the light sources. Our results demonstrate that the probabilistic combination of multiple cues, unlike prior approaches, manages to differentiate both hard and soft shadows from the underlying surface texture even when we can only coarsely anticipate the effect of 3D geometry. We also experimentally demonstrate how correct estimation of the sharpness and shape of the light sources improves the augmented reality results.", "abstracts": [ { "abstractType": "Regular", "content": "Illuminant estimation from shadows typically relies on accurate segmentation of the shadows and knowledge of exact 3D geometry, while shadow estimation is difficult in the presence of texture. These can be onerous requirements; in this paper we propose a graphical model to estimate the illumination environment and detect the shadows of a scene with textured surfaces from a single image and only coarse 3D information. We represent the illumination environment as a mixture of von Mises-Fisher distributions. Then, each shadow pixel becomes the combination of samples generated from this illumination environment. We integrate a number of low-level, illumination-invariant 2D cues in a graphical model to detect and estimate cast shadows on textured surfaces. Both 2D cues and approximate 3D reasoning are combined to infer a set of labels that identify the shadows in the image and estimate the positions, shapes and intensities of the light sources. Our results demonstrate that the probabilistic combination of multiple cues, unlike prior approaches, manages to differentiate both hard and soft shadows from the underlying surface texture even when we can only coarsely anticipate the effect of 3D geometry. We also experimentally demonstrate how correct estimation of the sharpness and shape of the light sources improves the augmented reality results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Illuminant estimation from shadows typically relies on accurate segmentation of the shadows and knowledge of exact 3D geometry, while shadow estimation is difficult in the presence of texture. These can be onerous requirements; in this paper we propose a graphical model to estimate the illumination environment and detect the shadows of a scene with textured surfaces from a single image and only coarse 3D information. We represent the illumination environment as a mixture of von Mises-Fisher distributions. Then, each shadow pixel becomes the combination of samples generated from this illumination environment. We integrate a number of low-level, illumination-invariant 2D cues in a graphical model to detect and estimate cast shadows on textured surfaces. Both 2D cues and approximate 3D reasoning are combined to infer a set of labels that identify the shadows in the image and estimate the positions, shapes and intensities of the light sources. Our results demonstrate that the probabilistic combination of multiple cues, unlike prior approaches, manages to differentiate both hard and soft shadows from the underlying surface texture even when we can only coarsely anticipate the effect of 3D geometry. We also experimentally demonstrate how correct estimation of the sharpness and shape of the light sources improves the augmented reality results.", "fno": "05206665", "keywords": [ "Computational Geometry", "Computer Graphics", "Computer Vision", "Estimation Theory", "Robust Shadow", "Illumination Estimation", "3 D Geometry", "Graphical Model", "Von Mises Fisher Distribution", "Augmented Reality", "Robustness", "Lighting", "Light Sources", "Layout", "Shape", "Surface Texture", "Geometry", "Reflectivity", "Object Detection", "Image Segmentation" ], "authors": [ { "affiliation": "Image Analysis Lab, Computer Science Dept., Stony Brook University, NY, USA", "fullName": "Alexandros Panagopoulos", "givenName": "Alexandros", "surname": "Panagopoulos", "__typename": "ArticleAuthorType" }, { "affiliation": "Image Analysis Lab, Computer Science Dept., Stony Brook University, NY, USA", "fullName": "Dimitris Samaras", "givenName": "Dimitris", "surname": "Samaras", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratoire MAS, Ecole Centrale Paris, Chatenay-Malabry, France", "fullName": "Nikos Paragios", "givenName": "Nikos", "surname": "Paragios", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "651-658", "year": "2009", "issn": "1063-6919", "isbn": "978-1-4244-3992-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05206664", "articleId": "12OmNBziBb2", "__typename": "AdjacentArticleType" }, "next": { "fno": "05206666", "articleId": "12OmNwIYZzf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460513", "title": "Illumination normalization of face images with cast shadows", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460513/12OmNBQ2VPw", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130334", "title": "Illumination estimation from shadow borders", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130334/12OmNs4S8L5", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1999/0164/2/00790314", "title": "Illumination distribution from brightness in shadows: Adaptive estimation of illumination distribution with unknown reflectance properties in shadow regions", "doi": null, "abstractUrl": "/proceedings-article/iccv/1999/00790314/12OmNvAiSCT", "parentPublication": { "id": "proceedings/iccv/1999/0164/2", "title": "Proceedings of the Seventh IEEE International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836506", "title": "Reflectance and Illumination Estimation for Realistic Augmentations of Real Scenes", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836506/12OmNx5GTXK", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a192", "title": "[POSTER] Illumination Estimation Using Cast Shadows for Realistic Augmented Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a192/12OmNxX3uLh", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2014/7000/1/7000a039", "title": "Towards Illumination-Invariant 3D Reconstruction Using ToF RGB-D Cameras", "doi": null, "abstractUrl": "/proceedings-article/3dv/2014/7000a039/12OmNzT7OpK", "parentPublication": { "id": "proceedings/3dv/2014/7000/2", "title": "2014 2nd International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/05/i0793", "title": "Integrating Motion, Illumination, and Structure in Video Sequences with Applications in Illumination-Invariant Tracking", "doi": null, "abstractUrl": "/journal/tp/2007/05/i0793/13rRUxBJhnL", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/02/ttp2013020437", "title": "Simultaneous Cast Shadows, Illumination and Geometry Inference Using Hypergraphs", "doi": null, "abstractUrl": "/journal/tp/2013/02/ttp2013020437/13rRUyfKIEo", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/02/09018202", "title": "Detecting Specular Reflections and Cast Shadows to Estimate Reflectance and Illumination of Dynamic Indoor Scenes", "doi": null, "abstractUrl": "/journal/tg/2022/02/09018202/1hN4BrDSVHi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09557800", "title": "Neural Reflectance Capture in the View-Illumination Domain", "doi": null, "abstractUrl": "/journal/tg/2023/02/09557800/1xquQN6emfS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hVl7roiUlW", "doi": "10.1109/ICCV.2019.00418", "title": "A Dataset of Multi-Illumination Images in the Wild", "normalizedTitle": "A Dataset of Multi-Illumination Images in the Wild", "abstract": "Collections of images under a single, uncontrolled illumination have enabled the rapid advancement of core computer vision tasks like classification, detection, and segmentation. But even with modern learning techniques, many inverse problems involving lighting and material understanding remain too severely ill-posed to be solved with single-illumination datasets. The data simply does not contain the necessary supervisory signals. Multi-illumination datasets are notoriously hard to capture, so the data is typically collected at small scale, in controlled environments, either using multiple light sources, or robotic gantries. This leads to image collections that are not representative of the variety and complexity of real world scenes. We introduce a new multi-illumination dataset of more than 1000 real scenes, each captured in high dynamic range and high resolution, under 25 lighting conditions. We demonstrate the richness of this dataset by training state-of-the-art models for three challenging applications: single-image illumination estimation, image relighting, and mixed-illuminant white balance.", "abstracts": [ { "abstractType": "Regular", "content": "Collections of images under a single, uncontrolled illumination have enabled the rapid advancement of core computer vision tasks like classification, detection, and segmentation. But even with modern learning techniques, many inverse problems involving lighting and material understanding remain too severely ill-posed to be solved with single-illumination datasets. The data simply does not contain the necessary supervisory signals. Multi-illumination datasets are notoriously hard to capture, so the data is typically collected at small scale, in controlled environments, either using multiple light sources, or robotic gantries. This leads to image collections that are not representative of the variety and complexity of real world scenes. We introduce a new multi-illumination dataset of more than 1000 real scenes, each captured in high dynamic range and high resolution, under 25 lighting conditions. We demonstrate the richness of this dataset by training state-of-the-art models for three challenging applications: single-image illumination estimation, image relighting, and mixed-illuminant white balance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Collections of images under a single, uncontrolled illumination have enabled the rapid advancement of core computer vision tasks like classification, detection, and segmentation. But even with modern learning techniques, many inverse problems involving lighting and material understanding remain too severely ill-posed to be solved with single-illumination datasets. The data simply does not contain the necessary supervisory signals. Multi-illumination datasets are notoriously hard to capture, so the data is typically collected at small scale, in controlled environments, either using multiple light sources, or robotic gantries. This leads to image collections that are not representative of the variety and complexity of real world scenes. We introduce a new multi-illumination dataset of more than 1000 real scenes, each captured in high dynamic range and high resolution, under 25 lighting conditions. We demonstrate the richness of this dataset by training state-of-the-art models for three challenging applications: single-image illumination estimation, image relighting, and mixed-illuminant white balance.", "fno": "09008252", "keywords": [ "Computer Vision", "Image Colour Analysis", "Image Processing", "Image Sensors", "Inverse Problems", "Learning Artificial Intelligence", "Image Relighting", "Mixed Illuminant White Balance", "Multiillumination Images", "Single Illumination", "Uncontrolled Illumination", "Rapid Advancement", "Core Computer Vision Tasks", "Modern Learning Techniques", "Single Illumination Datasets", "Necessary Supervisory Signals", "Multiillumination Dataset", "Multiple Light Sources", "Image Collections", "25 Lighting Conditions", "Single Image Illumination Estimation", "Lighting", "Cameras", "Light Sources", "Dynamic Range", "Estimation", "Probes", "Computer Vision" ], "authors": [ { "affiliation": "MIT CSAIL", "fullName": "Lukas Murmann", "givenName": "Lukas", "surname": "Murmann", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe", "fullName": "Michael Gharbi", "givenName": "Michael", "surname": "Gharbi", "__typename": "ArticleAuthorType" }, { "affiliation": "MIT", "fullName": "Miika Aittala", "givenName": "Miika", "surname": "Aittala", "__typename": "ArticleAuthorType" }, { "affiliation": "MIT", "fullName": "Fredo Durand", "givenName": "Fredo", "surname": "Durand", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "4079-4088", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09009807", "articleId": "1hVlflURgCk", "__typename": "AdjacentArticleType" }, "next": { "fno": "09008541", "articleId": "1hVlbVEAL3a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460257", "title": "Face recognition with illumination distinction description", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460257/12OmNBPtJAA", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460513", "title": "Illumination normalization of face images with cast shadows", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460513/12OmNBQ2VPw", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/worv/2013/5646/0/06521924", "title": "Color-based detection robust to varying illumination spectrum", "doi": null, "abstractUrl": "/proceedings-article/worv/2013/06521924/12OmNqJq4EZ", "parentPublication": { "id": "proceedings/worv/2013/5646/0", "title": "2013 IEEE Workshop on Robot Vision (WORV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/camp/2003/7970/0/01598142", "title": "Illumination correction in digital images", "doi": null, "abstractUrl": "/proceedings-article/camp/2003/01598142/12OmNwErpWn", "parentPublication": { "id": "proceedings/camp/2003/7970/0", "title": "Computer Architectures for Machine Perception, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08511066", "title": "Automatic Spatially Varying Illumination Recovery of Indoor Scenes Based on a Single RGB-D Image", "doi": null, "abstractUrl": "/journal/tg/2020/04/08511066/14H4WOKjoti", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2018/9306/0/08707399", "title": "Object Recognition under Lighting Variations using Pre-Trained Networks", "doi": null, "abstractUrl": "/proceedings-article/aipr/2018/08707399/19ZL02bW2Va", "parentPublication": { "id": "proceedings/aipr/2018/9306/0", "title": "2018 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09887904", "title": "Fast and Accurate Illumination Estimation Using LDR Panoramic Images for Realistic Rendering", "doi": null, "abstractUrl": "/journal/tg/5555/01/09887904/1GBRnHyZ1bW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09904431", "title": "Neural Global Illumination: Interactive Indirect Illumination Prediction under Dynamic Area Lights", "doi": null, "abstractUrl": "/journal/tg/5555/01/09904431/1H0GdxnVnws", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a189", "title": "Deep Consistent Illumination in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a189/1gyslmCJMjK", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b194", "title": "Generative Models for Multi-Illumination Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b194/1yNioSxeNTa", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbDd", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "acronym": "acsat", "groupId": "1802667", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3FGl2", "doi": "10.1109/ACSAT.2013.45", "title": "Similarities and Dissimilarities between Character Frequencies of Written Text of Melayu, English, and Indonesian Languages", "normalizedTitle": "Similarities and Dissimilarities between Character Frequencies of Written Text of Melayu, English, and Indonesian Languages", "abstract": "This research paper present some statistical similarities and dissimilarities between the character frequencies of three languages, Malay, Indonesia and English. The reason for their comparison is that they all share a common symbol set (A-Z). It has been found, through investigations that statistically Malay and Indonesian language character frequencies are very close to each other. For example, character \"A\" \"N\" and \"E\" in both Malay and Indonesian languages have frequencies (19%, 20.4%), (10%, 9.33%) and (9%, 8.28%), respectively. However, the case of English is different, where characters \"E\", \"T\" and \"A\" come with three highest frequency occurring letters, respectively. An interesting observation is that in spite of some similarities and dissimilarities between the characters, all three language follow envelop of the frequencies identically rising and falling trend for all characters. Moreover, for all three languages, last four characters, \"W, X, Y, Z\", also exhibit lowest usage in their respective languages.", "abstracts": [ { "abstractType": "Regular", "content": "This research paper present some statistical similarities and dissimilarities between the character frequencies of three languages, Malay, Indonesia and English. The reason for their comparison is that they all share a common symbol set (A-Z). It has been found, through investigations that statistically Malay and Indonesian language character frequencies are very close to each other. For example, character \"A\" \"N\" and \"E\" in both Malay and Indonesian languages have frequencies (19%, 20.4%), (10%, 9.33%) and (9%, 8.28%), respectively. However, the case of English is different, where characters \"E\", \"T\" and \"A\" come with three highest frequency occurring letters, respectively. An interesting observation is that in spite of some similarities and dissimilarities between the characters, all three language follow envelop of the frequencies identically rising and falling trend for all characters. Moreover, for all three languages, last four characters, \"W, X, Y, Z\", also exhibit lowest usage in their respective languages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This research paper present some statistical similarities and dissimilarities between the character frequencies of three languages, Malay, Indonesia and English. The reason for their comparison is that they all share a common symbol set (A-Z). It has been found, through investigations that statistically Malay and Indonesian language character frequencies are very close to each other. For example, character \"A\" \"N\" and \"E\" in both Malay and Indonesian languages have frequencies (19%, 20.4%), (10%, 9.33%) and (9%, 8.28%), respectively. However, the case of English is different, where characters \"E\", \"T\" and \"A\" come with three highest frequency occurring letters, respectively. An interesting observation is that in spite of some similarities and dissimilarities between the characters, all three language follow envelop of the frequencies identically rising and falling trend for all characters. Moreover, for all three languages, last four characters, \"W, X, Y, Z\", also exhibit lowest usage in their respective languages.", "fno": "2758a192", "keywords": [ "Time Frequency Analysis", "Market Research", "Probability", "Computer Science", "Internet", "Information Systems", "Educational Institutions", "Indonesian", "Character Frequency", "Malayu" ], "authors": [ { "affiliation": null, "fullName": "Asadullah Shah", "givenName": "Asadullah", "surname": "Shah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aznan Zuhid Saidin", "givenName": "Aznan Zuhid", "surname": "Saidin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Imad Fakhri Taha", "givenName": "Imad Fakhri", "surname": "Taha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Akram M. Zeki", "givenName": "Akram M.", "surname": "Zeki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zeeshan Bhatti", "givenName": "Zeeshan", "surname": "Bhatti", "__typename": "ArticleAuthorType" } ], "idPrefix": "acsat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "192-194", "year": "2013", "issn": null, "isbn": "978-1-4799-2758-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2758a186", "articleId": "12OmNB8TUbv", "__typename": "AdjacentArticleType" }, "next": { "fno": "2758a195", "articleId": "12OmNBaT61f", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/1991/0003/0/00150198", "title": "Estimation of the frequencies of a complex sinusoidal noisy signal using fourth order statistics", "doi": null, "abstractUrl": "/proceedings-article/icassp/1991/00150198/12OmNBr4exM", "parentPublication": { "id": "proceedings/icassp/1991/0003/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a303", "title": "Deriving Data-Driven Insights from Climate Extreme Indices for the Continental US", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a303/12OmNqyUUyR", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2014/4435/0/4435a455", "title": "A Bibliometrics Review of CBMS Symposiums Papers from 1993 Till 2013", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a455/12OmNvk7K4I", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a136", "title": "Empirical Research into the Webquest Mode of English Writing Teaching in Institutes of Higher Vocational Education in China", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a136/12OmNwHQBiD", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2012/4668/0/4668a379", "title": "The Effect of Age on Formant Frequencies of Malay Children between 7-12", "doi": null, "abstractUrl": "/proceedings-article/isms/2012/4668a379/12OmNxQOjIm", "parentPublication": { "id": "proceedings/isms/2012/4668/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462222", "title": "Using modern graph analysis techniques on mind maps to help quantify learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462222/12OmNzBOhJg", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2022/9594/0/959400a172", "title": "Worldwide Gender Differences in Public Code Contributions and how they have been affected by the COVID-19 pandemic", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2022/959400a172/1Emrit3Q688", "parentPublication": { "id": "proceedings/icse-seis/2022/9594/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a345", "title": "An Effective Machine Learning Approach for English-Arabic Transliteration", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a345/1GNtj2GBWDK", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2019/5052/0/09035299", "title": "English vs Arabic Sentiment Analysis: A Survey Presenting 100 Work Studies, Resources and Tools", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2019/09035299/1ifhsKZr5C0", "parentPublication": { "id": "proceedings/aiccsa/2019/5052/0", "title": "2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2021/1411/0/141100a115", "title": "The Status Quo and Value of Western Yugur Language Research", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2021/141100a115/1wYlnWMHzfG", "parentPublication": { "id": "proceedings/icnlp/2021/1411/0", "title": "2021 3rd International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs4S8wy", "title": "2014 14th International Conference on Computational Science and Its Applications (ICCSA)", "acronym": "iccsa", "groupId": "1001290", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqNG3f5", "doi": "10.1109/ICCSA.2014.53", "title": "BetaConcept: A Program for Voronoi Diagrams, Dual Structures, and Complexes in the Plane", "normalizedTitle": "BetaConcept: A Program for Voronoi Diagrams, Dual Structures, and Complexes in the Plane", "abstract": "Voronoi diagrams are powerful for solving spatial problems among particles with different sizes. In particular, the Voronoi diagram of spheres, also called the additively-weighted Voronoi diagram, has proven its powerful capability for solving molecular biology/material science problems in an unified framework. Beta-complex is a generalization of (weighted) alpha-complex and they share similarities and dissimilarities. This paper presents the Beta Concept program which facilitates easy understanding of the powerful capability of the Voronoi diagram, its dual structure, and the beta-complex in the plane. Beta Concept is a Windows program with a graphic user interface written in the standard C++ language and is freely available at the Voronoi Diagram Research Center (http://voronoi.hanyang.ac.kr).", "abstracts": [ { "abstractType": "Regular", "content": "Voronoi diagrams are powerful for solving spatial problems among particles with different sizes. In particular, the Voronoi diagram of spheres, also called the additively-weighted Voronoi diagram, has proven its powerful capability for solving molecular biology/material science problems in an unified framework. Beta-complex is a generalization of (weighted) alpha-complex and they share similarities and dissimilarities. This paper presents the Beta Concept program which facilitates easy understanding of the powerful capability of the Voronoi diagram, its dual structure, and the beta-complex in the plane. Beta Concept is a Windows program with a graphic user interface written in the standard C++ language and is freely available at the Voronoi Diagram Research Center (http://voronoi.hanyang.ac.kr).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Voronoi diagrams are powerful for solving spatial problems among particles with different sizes. In particular, the Voronoi diagram of spheres, also called the additively-weighted Voronoi diagram, has proven its powerful capability for solving molecular biology/material science problems in an unified framework. Beta-complex is a generalization of (weighted) alpha-complex and they share similarities and dissimilarities. This paper presents the Beta Concept program which facilitates easy understanding of the powerful capability of the Voronoi diagram, its dual structure, and the beta-complex in the plane. Beta Concept is a Windows program with a graphic user interface written in the standard C++ language and is freely available at the Voronoi Diagram Research Center (http://voronoi.hanyang.ac.kr).", "fno": "4264a233", "keywords": [ "Probes", "Generators", "Proteins", "Shape", "Mice", "Educational Institutions", "Color", "GUI Program", "Voronoi Diagram Of Circles", "Additively Weighted Voronoi Diagram", "Quasi Triangulations", "Beta Complexes", "Beta Shapes", "Offset", "Blending" ], "authors": [ { "affiliation": null, "fullName": "Jae Kwan Kim", "givenName": "Jae Kwan", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Youngsong Cho", "givenName": "Youngsong", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mokwon Lee", "givenName": "Mokwon", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jehyun Cha", "givenName": "Jehyun", "surname": "Cha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chanyoung Song", "givenName": "Chanyoung", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Deok Soo Kim", "givenName": "Deok Soo", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Donguk Kim", "givenName": "Donguk", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccsa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "233-236", "year": "2014", "issn": null, "isbn": "978-1-4799-4264-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4264a229", "articleId": "12OmNvStcuK", "__typename": "AdjacentArticleType" }, "next": { "fno": "4264a237", "articleId": "12OmNCd2rsz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isvd/2009/3781/0/3781a137", "title": "Round-Tour Voronoi Diagrams", "doi": null, "abstractUrl": "/proceedings-article/isvd/2009/3781a137/12OmNB9bvii", "parentPublication": { "id": "proceedings/isvd/2009/3781/0", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770290", "title": "Information Space Regionalization Using Adaptive Multiplicatively Weighted Voronoi Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770290/12OmNClQ0vn", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2009/3701/0/3701a159", "title": "On Voronoi Diagrams for Lines in the Plane", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2009/3701a159/12OmNviZlqs", "parentPublication": { "id": "proceedings/iccsa/2009/3701/0", "title": "2009 International Conference on Computational Science and Its Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2011/4483/0/4483a127", "title": "Half-Plane Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/isvd/2011/4483a127/12OmNwHhoLd", "parentPublication": { "id": "proceedings/isvd/2011/4483/0", "title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2010/4112/0/4112a189", "title": "Voronoi Diagrams on Periodic Graphs", "doi": null, "abstractUrl": "/proceedings-article/isvd/2010/4112a189/12OmNwLOYTQ", "parentPublication": { "id": "proceedings/isvd/2010/4112/0", "title": "2010 International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2011/4483/0/4483a048", "title": "BetaMol: Molecular Modeling, Analysis, and Visualization Software Based on the Beta-Complex Derived from the Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/isvd/2011/4483a048/12OmNy4IF7B", "parentPublication": { "id": "proceedings/isvd/2011/4483/0", "title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2009/3781/0/3781a071", "title": "The Dual Voronoi Diagrams with Respect to Representational Bregman Divergences", "doi": null, "abstractUrl": "/proceedings-article/isvd/2009/3781a071/12OmNzT7Otc", "parentPublication": { "id": "proceedings/isvd/2009/3781/0", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2007/2869/0/28690260", "title": "On Sweep-plane Analysis of Laguerre Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/isvd/2007/28690260/12OmNzXWZFE", "parentPublication": { "id": "proceedings/isvd/2007/2869/0", "title": "4th International Symposium on Voronoi Diagrams in Science and Engineering (ISVD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1982/06/01676031", "title": "On k-Nearest Neighbor Voronoi Diagrams in the Plane", "doi": null, "abstractUrl": "/journal/tc/1982/06/01676031/13rRUy3xY6P", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08496780", "title": "Beta-complex versus Alpha-complex: Similarities and Dissimilarities", "doi": null, "abstractUrl": "/journal/tg/2020/04/08496780/14tNJlStZmz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mWa", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "acronym": "isvd", "groupId": "1001201", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwKYbuu", "doi": "10.1109/ISVD.2009.41", "title": "A Single Beta-Complex Solves All Geometry Problems in a Molecule", "normalizedTitle": "A Single Beta-Complex Solves All Geometry Problems in a Molecule", "abstract": "Geometry-related problems in bio-molecules are new challenges as well as opportunities for geometers since it is now strongly agreed that the shape of molecules mostly determines their functions. To analyze the shape of molecule, a systematic approach of handling the proximity among constituting atoms is inevitable. The Voronoi diagram of atoms and its derivative structures have proven their powerful capabilities on analyzing the structure problems of bio-molecules related with geometry or shape of molecules. In this paper, we show that a single ¯-complex of a molecule can be used to efficiently solve many bio-molecular problems which are based on some geometry among atoms in the molecule. We explain the ¯-complex in the context of molecular geometry and shape analysis based on the Voronoi diagram of atoms and the quasi-triangulation. We also compare the capabilities of ¯-complex with the (weighted) ®-complex and (weighted) ®-shape which are based on the power diagram.", "abstracts": [ { "abstractType": "Regular", "content": "Geometry-related problems in bio-molecules are new challenges as well as opportunities for geometers since it is now strongly agreed that the shape of molecules mostly determines their functions. To analyze the shape of molecule, a systematic approach of handling the proximity among constituting atoms is inevitable. The Voronoi diagram of atoms and its derivative structures have proven their powerful capabilities on analyzing the structure problems of bio-molecules related with geometry or shape of molecules. In this paper, we show that a single ¯-complex of a molecule can be used to efficiently solve many bio-molecular problems which are based on some geometry among atoms in the molecule. We explain the ¯-complex in the context of molecular geometry and shape analysis based on the Voronoi diagram of atoms and the quasi-triangulation. We also compare the capabilities of ¯-complex with the (weighted) ®-complex and (weighted) ®-shape which are based on the power diagram.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Geometry-related problems in bio-molecules are new challenges as well as opportunities for geometers since it is now strongly agreed that the shape of molecules mostly determines their functions. To analyze the shape of molecule, a systematic approach of handling the proximity among constituting atoms is inevitable. The Voronoi diagram of atoms and its derivative structures have proven their powerful capabilities on analyzing the structure problems of bio-molecules related with geometry or shape of molecules. In this paper, we show that a single ¯-complex of a molecule can be used to efficiently solve many bio-molecular problems which are based on some geometry among atoms in the molecule. We explain the ¯-complex in the context of molecular geometry and shape analysis based on the Voronoi diagram of atoms and the quasi-triangulation. We also compare the capabilities of ¯-complex with the (weighted) ®-complex and (weighted) ®-shape which are based on the power diagram.", "fno": "3781a254", "keywords": [ "Molecular Geometry Molecular Structure Voronoi Diagram Quasi Triangulation Beta Complex Beta Shape" ], "authors": [ { "affiliation": null, "fullName": "Deok-Soo Kim", "givenName": "Deok-Soo", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "isvd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "254-260", "year": "2009", "issn": null, "isbn": "978-0-7695-3781-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3781a245", "articleId": "12OmNwE9OLR", "__typename": "AdjacentArticleType" }, "next": { "fno": "3781a263", "articleId": "12OmNxzMo10", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/uksim/2016/0888/0/07796690", "title": "Simulation and Analysis of BDT Molecule with Au Electrodes as a Molecular Switch", "doi": null, "abstractUrl": "/proceedings-article/uksim/2016/07796690/12OmNCd2rO8", "parentPublication": { "id": "proceedings/uksim/2016/0888/0", "title": "2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2014/4677/0/4677a261", "title": "Molecular Geometry and BULL!", "doi": null, "abstractUrl": "/proceedings-article/cw/2014/4677a261/12OmNqEAT3W", "parentPublication": { "id": "proceedings/cw/2014/4677/0", "title": "2014 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1995/6921/0/69210123", "title": "A parallel algorithm for calculating the potential energy in DNA", "doi": null, "abstractUrl": "/proceedings-article/hicss/1995/69210123/12OmNrIJqux", "parentPublication": { "id": "proceedings/hicss/1995/6921/0", "title": "28th Hawaii International Conference on System Sciences (HICSS'95)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2006/0226/0/02260034", "title": "Energy-Field Optimization and Haptic-Based Molecular Docking and Assembly Search System for Computer-Aided Molecular Design (CAMD)", "doi": null, "abstractUrl": "/proceedings-article/haptics/2006/02260034/12OmNvJXeyZ", "parentPublication": { "id": "proceedings/haptics/2006/0226/0", "title": "2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2007/2869/0/28690189", "title": "\\beta-shape Based Computation of Blending Surfaces on a Molecule", "doi": null, "abstractUrl": "/proceedings-article/isvd/2007/28690189/12OmNwogh76", "parentPublication": { "id": "proceedings/isvd/2007/2869/0", "title": "4th International Symposium on Voronoi Diagrams in Science and Engineering (ISVD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2010/4112/0/4112a105", "title": "Searching Simplexes in Quasi-triangulation", "doi": null, "abstractUrl": "/proceedings-article/isvd/2010/4112a105/12OmNxvO00e", "parentPublication": { "id": "proceedings/isvd/2010/4112/0", "title": "2010 International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2011/4483/0/4483a048", "title": "BetaMol: Molecular Modeling, Analysis, and Visualization Software Based on the Beta-Complex Derived from the Voronoi Diagram", "doi": null, "abstractUrl": "/proceedings-article/isvd/2011/4483a048/12OmNy4IF7B", "parentPublication": { "id": "proceedings/isvd/2011/4483/0", "title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2009/3701/0/3701a145", "title": "Triangulation of Molecular Surfaces Using an Isosurface Continuation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2009/3701a145/12OmNzb7Zqw", "parentPublication": { "id": "proceedings/iccsa/2009/3701/0", "title": "2009 International Conference on Computational Science and Its Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876051", "title": "Ligand Excluded Surface: A New Type of Molecular Surface", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876051/13rRUwInvfa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a492", "title": "Heterogeneous Molecular Graph Neural Networks for Predicting Molecule Properties", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a492/1r54AY2cp9K", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFsmL3", "doi": "10.1109/BIBM.2017.8217629", "title": "Analyzing T cell receptor alpha/beta usage in binding to the pMHC", "normalizedTitle": "Analyzing T cell receptor alpha/beta usage in binding to the pMHC", "abstract": "T cells play a critical role in the adaptive immune response. They perform their function by recognizing infected cells presenting peptides on a specialized complex known as the MHC. The recognition process involves binding of the peptide-loaded MHC to the T cell receptor (TCR), a surface molecule comprised of an alpha and a beta chain. A large body of evidence suggests that T cells can respond to previously unseen pathogens, a phenomenon known as cross-reactivity. Cross-reactivity has important medical implications, as cross-reactive responses can be either protective or lead to disease. A possible mechanism that has been proposed to explain cross-reactivity is the differential usage of the alpha and beta chains, whereas one peptide can be recognized predominantly by the alpha chain and a different peptide by the beta chain. In this study we carry out a systematic analysis of a non-redundant set of 67 crystal structures, measuring TCR alpha/beta usage and its relationship with structural features of the interaction. Our results show a wide range of TCR alpha/beta usage in different complexes. Further, we find that alpha/beta usage significantly correlates with one of the docking angles between the TCR and the MHC.", "abstracts": [ { "abstractType": "Regular", "content": "T cells play a critical role in the adaptive immune response. They perform their function by recognizing infected cells presenting peptides on a specialized complex known as the MHC. The recognition process involves binding of the peptide-loaded MHC to the T cell receptor (TCR), a surface molecule comprised of an alpha and a beta chain. A large body of evidence suggests that T cells can respond to previously unseen pathogens, a phenomenon known as cross-reactivity. Cross-reactivity has important medical implications, as cross-reactive responses can be either protective or lead to disease. A possible mechanism that has been proposed to explain cross-reactivity is the differential usage of the alpha and beta chains, whereas one peptide can be recognized predominantly by the alpha chain and a different peptide by the beta chain. In this study we carry out a systematic analysis of a non-redundant set of 67 crystal structures, measuring TCR alpha/beta usage and its relationship with structural features of the interaction. Our results show a wide range of TCR alpha/beta usage in different complexes. Further, we find that alpha/beta usage significantly correlates with one of the docking angles between the TCR and the MHC.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "T cells play a critical role in the adaptive immune response. They perform their function by recognizing infected cells presenting peptides on a specialized complex known as the MHC. The recognition process involves binding of the peptide-loaded MHC to the T cell receptor (TCR), a surface molecule comprised of an alpha and a beta chain. A large body of evidence suggests that T cells can respond to previously unseen pathogens, a phenomenon known as cross-reactivity. Cross-reactivity has important medical implications, as cross-reactive responses can be either protective or lead to disease. A possible mechanism that has been proposed to explain cross-reactivity is the differential usage of the alpha and beta chains, whereas one peptide can be recognized predominantly by the alpha chain and a different peptide by the beta chain. In this study we carry out a systematic analysis of a non-redundant set of 67 crystal structures, measuring TCR alpha/beta usage and its relationship with structural features of the interaction. Our results show a wide range of TCR alpha/beta usage in different complexes. Further, we find that alpha/beta usage significantly correlates with one of the docking angles between the TCR and the MHC.", "fno": "08217629", "keywords": [ "Peptides", "Immune System", "Proteins", "Crystals", "Amino Acids", "Bioinformatics", "Informatics" ], "authors": [ { "affiliation": "School of Interdisciplinary Informatics, College of Information Science & Technology, University of Nebraska at Omaha, Omaha, Nebraska 68182, USA", "fullName": "Ryan Ehrlich", "givenName": "Ryan", "surname": "Ehrlich", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Interdisciplinary Informatics, College of Information Science & Technology, University of Nebraska at Omaha, Omaha, Nebraska 68182, USA", "fullName": "Dario Ghersi", "givenName": "Dario", "surname": "Ghersi", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "83-87", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217628", "articleId": "12OmNy9PrkZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217630", "articleId": "12OmNwDSdkc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2015/3854/0/07403682", "title": "Predicting candidate epitopes on Ebolaviruse for possible vaccine development", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403682/12OmNBigFv1", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2012/4723/0/4723a234", "title": "Prediction Model of MHC Class-II Binding Peptide Motifs Using Sequence Weighting Method for Vaccine Design", "doi": null, "abstractUrl": "/proceedings-article/icacc/2012/4723a234/12OmNCf1Dqa", "parentPublication": { "id": "proceedings/icacc/2012/4723/0", "title": "2012 International Conference on Advances in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706550", "title": "Template-based scoring functions for visualizing biological insights of H-2Kb-peptide-TCR complexes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706550/12OmNwEJ0Nq", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cerma/2008/3320/0/3320a434", "title": "CAINN - Weightless Alpha-Beta Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cerma/2008/3320a434/12OmNx8OumS", "parentPublication": { "id": "proceedings/cerma/2008/3320/0", "title": "Electronics, Robotics and Automotive Mechanics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703916", "title": "Positional preferences by 20 amino acids in beta sheets", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703916/12OmNxwWozb", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732451", "title": "Predicting immunogenic T-cell epitopes by combining various sequence-derived features", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732451/12OmNzDehc1", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/01/06654172", "title": "Quantifying Significance of MHC II Residues", "doi": null, "abstractUrl": "/journal/tb/2014/01/06654172/13rRUyfKIGa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/03/ttb2013030811", "title": "Quantitative Prediction of Peptide Binding to HLA-DP1 Protein", "doi": null, "abstractUrl": "/journal/tb/2013/03/ttb2013030811/13rRUyoPSNJ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313545", "title": "Long-Term Molecular Dynamics Simulations Reveal Flexibility Properties of a Free and TCR-Bound pMHC-I System", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313545/1qmg0J7JY2I", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09547808", "title": "An Attention Based Bidirectional LSTM Method to Predict the Binding of TCR and Epitope", "doi": null, "abstractUrl": "/journal/tb/2022/06/09547808/1x9ToPJdFMQ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwkhTjh", "title": "The Twenty-Third Southeastern Symposium on System Theory", "acronym": "ssst", "groupId": "1000732", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFsmMK", "doi": "10.1109/SSST.1991.138587", "title": "The response of the transfer function of an alpha-beta filter to various measurement models", "normalizedTitle": "The response of the transfer function of an alpha-beta filter to various measurement models", "abstract": "The response characteristics of the alpha-beta filter are used to quantify the filter's performance against different measurement models representing a target's trajectory. The transfer functions for an alpha-beta filter are used to derive closed form (solutions) expressions for smoothed position and velocity outputs for various measurement models. The filter's response to constant velocity targets is found to be the input plus a sinusoidal transient. Constant acceleration measurement models, in addition, yield a steady state bias that is a function of the filter parameters alpha and beta . Finally, the filter's response to a sinusoidal input is determined.<>", "abstracts": [ { "abstractType": "Regular", "content": "The response characteristics of the alpha-beta filter are used to quantify the filter's performance against different measurement models representing a target's trajectory. The transfer functions for an alpha-beta filter are used to derive closed form (solutions) expressions for smoothed position and velocity outputs for various measurement models. The filter's response to constant velocity targets is found to be the input plus a sinusoidal transient. Constant acceleration measurement models, in addition, yield a steady state bias that is a function of the filter parameters alpha and beta . Finally, the filter's response to a sinusoidal input is determined.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The response characteristics of the alpha-beta filter are used to quantify the filter's performance against different measurement models representing a target's trajectory. The transfer functions for an alpha-beta filter are used to derive closed form (solutions) expressions for smoothed position and velocity outputs for various measurement models. The filter's response to constant velocity targets is found to be the input plus a sinusoidal transient. Constant acceleration measurement models, in addition, yield a steady state bias that is a function of the filter parameters alpha and beta . Finally, the filter's response to a sinusoidal input is determined.", "fno": "00138587", "keywords": [ "Digital Filters", "Filtering And Prediction Theory", "Radar Equipment", "Transfer Functions", "Radar Equipment", "Transfer Function", "Alpha Beta Filter", "Measurement Models", "Response Characteristics", "Transfer Functions", "Filters", "Equations", "Position Measurement", "Velocity Measurement", "Radar Tracking", "Target Tracking", "Radar Measurements", "Transforms", "Predictive Models" ], "authors": [ { "affiliation": "Naval Surface Warfare Center, Dahlgren, VA, USA", "fullName": "J.E. Gray", "givenName": "J.E.", "surname": "Gray", "__typename": "ArticleAuthorType" }, { "affiliation": "Naval Surface Warfare Center, Dahlgren, VA, USA", "fullName": "W. Murray", "givenName": "W.", "surname": "Murray", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "389,390,391,392,393", "year": "1991", "issn": "0094-2898", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00138586", "articleId": "12OmNyQYtac", "__typename": "AdjacentArticleType" }, "next": { "fno": "00138588", "articleId": "12OmNqI04Oj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sice/2000/9805/0/00889644", "title": "A stability condition and steady state errors of an /spl alpha/-/spl beta/-/spl gamma/ filter for radar tracking", "doi": null, "abstractUrl": "/proceedings-article/sice/2000/00889644/12OmNBPc8vi", "parentPublication": { "id": "proceedings/sice/2000/9805/0", "title": "Proceedings of 39th Annual Conference of the Society of Instrument and Control Engineers - Japan (SICE 2000)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1997/7873/0/78730505", "title": "Range gate pull off (RGPO): detection, observability and /spl alpha/-/spl beta/ target tracking", "doi": null, "abstractUrl": "/proceedings-article/ssst/1997/78730505/12OmNqGA5lo", "parentPublication": { "id": "proceedings/ssst/1997/7873/0", "title": "Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1997/7873/0/78730070", "title": "Alpha-Beta Target Tracking and Track Rate Variations", "doi": null, "abstractUrl": "/proceedings-article/ssst/1997/78730070/12OmNvSKO3L", "parentPublication": { "id": "proceedings/ssst/1997/7873/0", "title": "Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/3/3305c604", "title": "On (Alpha, Beta) Fuzzy Subalgebras of BCH-Algebras", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305c604/12OmNvjyxzv", "parentPublication": { "id": "proceedings/fskd/2008/3305/3", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cerma/2008/3320/0/3320a434", "title": "CAINN - Weightless Alpha-Beta Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cerma/2008/3320a434/12OmNx8OumS", "parentPublication": { "id": "proceedings/cerma/2008/3320/0", "title": "Electronics, Robotics and Automotive Mechanics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1988/0847/0/00017106", "title": "The effect of missing data on the steady-state performance of an alpha , beta tracking filter", "doi": null, "abstractUrl": "/proceedings-article/ssst/1988/00017106/12OmNxisQWv", "parentPublication": { "id": "proceedings/ssst/1988/0847/0", "title": "The Twentieth Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2010/6812/1/05532986", "title": "Generalized (Alpha, Beta)-Fuzzy Interior Ideals in Semigroups", "doi": null, "abstractUrl": "/proceedings-article/cso/2010/05532986/12OmNzIUfSe", "parentPublication": { "id": "proceedings/cso/2010/6812/1", "title": "2010 Third International Joint Conference on Computational Science and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iitsi/2010/4020/0/4020a221", "title": "A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target", "doi": null, "abstractUrl": "/proceedings-article/iitsi/2010/4020a221/12OmNzZ5oha", "parentPublication": { "id": "proceedings/iitsi/2010/4020/0", "title": "Intelligent Information Technology and Security Informatics, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2015/01/06785996", "title": "Job-Level Alpha-Beta Search", "doi": null, "abstractUrl": "/journal/ci/2015/01/06785996/13rRUxYrbON", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/netcit/2022/9273/0/927300a089", "title": "Simulation Analysis of Radar Range Tracking Loop of Missing Radar Pulses", "doi": null, "abstractUrl": "/proceedings-article/netcit/2022/927300a089/1LSPLQB1kYw", "parentPublication": { "id": "proceedings/netcit/2022/9273/0", "title": "2022 2nd International Conference on Networking, Communications and Information Technology (NetCIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNASrawy", "title": "2006 3rd International Symposium on Voronoi Diagrams in Science and Engineering", "acronym": "isvd", "groupId": "1001201", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "17D45X0yjTw", "doi": "10.1109/ISVD.2006.35", "title": "The B-shape and B-complex for three-dimensional spheres", "normalizedTitle": "The B-shape and B-complex for three-dimensional spheres", "abstract": "In recent years, there have been extensive studies on biological systems such as proteins. Being one of the most important aspects, the geometry has been more important since the morphology of a molecular system is known to determine the critical functions of the molecule. In the study of the shape and the structure of a molecule, the representation of proximity information among atoms in the molecule is the most fundamental research issue. In this paper, we present a The beta-shape and beta-complex for three-dimensional spheres-shape and a The beta-shape and beta-complex for three-dimensional spheres-complex for a set of atoms with arbitrary sizes for a faster response to the topological queries among atoms. These concepts are the generalizations of the well-known a-shape and a- complex (and their weighted counterparts as well). To compute a The beta-shape and beta-complex for three-dimensional spheres-shape, we first compute the Voronoi diagram of atoms and then transform the Voronoi diagram to a quasi- triangulation which is the topological dual of the Voronoi diagram. Then, we compute a The beta-shape and beta-complex for three-dimensional spheres-complex from the quasi- triangulation by analyzing the valid intervals for each simplex in the quasi-triangulation. It is shown that a The beta-shape and beta-complex for three-dimensional spheres-complex can be computed in O(m) time in the worst case from the Voronoi diagram of atoms, where m is the number of simplices in the quasi-triangulation. Then, a The beta-shape and beta-complex for three-dimensional spheres-shape for a particular The beta-shape and beta-complex for three-dimensional spheres consisting of k simplices can be located O(log m + k) time in the worst case from the simplicies in the The beta-shape and beta-complex for three-dimensional spheres-complex sorted according to the interval values.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, there have been extensive studies on biological systems such as proteins. Being one of the most important aspects, the geometry has been more important since the morphology of a molecular system is known to determine the critical functions of the molecule. In the study of the shape and the structure of a molecule, the representation of proximity information among atoms in the molecule is the most fundamental research issue. In this paper, we present a The beta-shape and beta-complex for three-dimensional spheres-shape and a The beta-shape and beta-complex for three-dimensional spheres-complex for a set of atoms with arbitrary sizes for a faster response to the topological queries among atoms. These concepts are the generalizations of the well-known a-shape and a- complex (and their weighted counterparts as well). To compute a The beta-shape and beta-complex for three-dimensional spheres-shape, we first compute the Voronoi diagram of atoms and then transform the Voronoi diagram to a quasi- triangulation which is the topological dual of the Voronoi diagram. Then, we compute a The beta-shape and beta-complex for three-dimensional spheres-complex from the quasi- triangulation by analyzing the valid intervals for each simplex in the quasi-triangulation. It is shown that a The beta-shape and beta-complex for three-dimensional spheres-complex can be computed in O(m) time in the worst case from the Voronoi diagram of atoms, where m is the number of simplices in the quasi-triangulation. Then, a The beta-shape and beta-complex for three-dimensional spheres-shape for a particular The beta-shape and beta-complex for three-dimensional spheres consisting of k simplices can be located O(log m + k) time in the worst case from the simplicies in the The beta-shape and beta-complex for three-dimensional spheres-complex sorted according to the interval values.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, there have been extensive studies on biological systems such as proteins. Being one of the most important aspects, the geometry has been more important since the morphology of a molecular system is known to determine the critical functions of the molecule. In the study of the shape and the structure of a molecule, the representation of proximity information among atoms in the molecule is the most fundamental research issue. In this paper, we present a The beta-shape and beta-complex for three-dimensional spheres-shape and a The beta-shape and beta-complex for three-dimensional spheres-complex for a set of atoms with arbitrary sizes for a faster response to the topological queries among atoms. These concepts are the generalizations of the well-known a-shape and a- complex (and their weighted counterparts as well). To compute a The beta-shape and beta-complex for three-dimensional spheres-shape, we first compute the Voronoi diagram of atoms and then transform the Voronoi diagram to a quasi- triangulation which is the topological dual of the Voronoi diagram. Then, we compute a The beta-shape and beta-complex for three-dimensional spheres-complex from the quasi- triangulation by analyzing the valid intervals for each simplex in the quasi-triangulation. It is shown that a The beta-shape and beta-complex for three-dimensional spheres-complex can be computed in O(m) time in the worst case from the Voronoi diagram of atoms, where m is the number of simplices in the quasi-triangulation. Then, a The beta-shape and beta-complex for three-dimensional spheres-shape for a particular The beta-shape and beta-complex for three-dimensional spheres consisting of k simplices can be located O(log m + k) time in the worst case from the simplicies in the The beta-shape and beta-complex for three-dimensional spheres-complex sorted according to the interval values.", "fno": "04124813", "keywords": [ "Biology Computing", "Computational Complexity", "Computational Geometry", "Molecular Biophysics", "Molecular Configurations", "Beta Shape", "Beta Complex", "Three Dimensional Spheres", "Biological Systems", "Molecular System", "Topological Queries", "Voronoi Diagram", "Biological Systems", "Geometry", "Surface Morphology", "Atomic Measurements", "Protein Engineering", "Industrial Engineering", "Shape", "Systems Biology", "Solvents", "Surface Treatment" ], "authors": [ { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Jeongyeon Seo", "givenName": "Jeongyeon", "surname": "Seo", "__typename": "ArticleAuthorType" }, { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Youngsong Cho", "givenName": "Youngsong", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Cheol-Hyung Cho", "givenName": "Cheol-Hyung", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Donguk Kim", "givenName": "Donguk", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Joonghyun Ryu", "givenName": "Joonghyun", "surname": "Ryu", "__typename": "ArticleAuthorType" }, { "affiliation": "Hanyang University, Seoul, Korea", "fullName": "Deok-Soo Kim", "givenName": "Deok-Soo", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "isvd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "138-147", "year": "2006", "issn": null, "isbn": "0-7695-2630-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "26300132", "articleId": "12OmNAWYKFV", "__typename": "AdjacentArticleType" }, "next": { "fno": "26300148", "articleId": "12OmNBkP3zq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ectc/2017/6315/0/07999725", "title": "Interfacial Reaction and Microstructural Evolution between Au-Ge Solder and Electroless Ni-W-P Metallization in High Temperature Electronics Interconnects", "doi": null, "abstractUrl": "/proceedings-article/ectc/2017/07999725/12OmNBa2iFg", "parentPublication": { "id": "proceedings/ectc/2017/6315/0", "title": "2017 IEEE 67th Electronic Components and Technology Conference (ECTC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2007/2869/0/28690189", "title": "\\beta-shape Based Computation of Blending Surfaces on a Molecule", "doi": null, "abstractUrl": "/proceedings-article/isvd/2007/28690189/12OmNwogh76", "parentPublication": { "id": "proceedings/isvd/2007/2869/0", "title": "4th International Symposium on Voronoi Diagrams in Science and Engineering (ISVD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1988/0862/0/00196252", "title": "Multi-scale description of space curves and three-dimensional objects", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1988/00196252/12OmNx7ouPY", "parentPublication": { "id": "proceedings/cvpr/1988/0862/0", "title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703770", "title": "Eighth-Sphere Exposure: A three-dimensional solvent exposure measure", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703770/12OmNxQOjD5", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2011/4483/0/4483a170", "title": "An Algorithm for the Calculation of Volume and Surface of Unions of Spheres. Application for Solvation Shells", "doi": null, "abstractUrl": "/proceedings-article/isvd/2011/4483a170/12OmNyRxFHN", "parentPublication": { "id": "proceedings/isvd/2011/4483/0", "title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2010/6821/0/05444693", "title": "Haptic exploration of spheres: Techniques and initial experiments", "doi": null, "abstractUrl": "/proceedings-article/haptics/2010/05444693/12OmNzBOilN", "parentPublication": { "id": "proceedings/haptics/2010/6821/0", "title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/03/i0266", "title": "Accurate Recovery of Three-Dimensional Shape from Image Focus", "doi": null, "abstractUrl": "/journal/tp/1995/03/i0266/13rRUILtJrX", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1979/03/04766925", "title": "Decomposition of Three-Dimensional Objects into Spheres", "doi": null, "abstractUrl": "/journal/tp/1979/03/04766925/13rRUxAASTX", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1981/03/04767104", "title": "Three-Dimensional Shape Analysis Using Local Shape Descriptors", "doi": null, "abstractUrl": "/journal/tp/1981/03/04767104/13rRUxBa56X", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2012/06/06109276", "title": "Medial Spheres for Shape Approximation", "doi": null, "abstractUrl": "/journal/tp/2012/06/06109276/13rRUxOdD9s", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbV00", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBKEynJ", "doi": "10.1109/CVPR.2012.6248005", "title": "Recovering free space of indoor scenes from a single image", "normalizedTitle": "Recovering free space of indoor scenes from a single image", "abstract": "In this paper we consider the problem of recovering the free space of an indoor scene from its single image. We show that exploiting the box like geometric structure of furniture and constraints provided by the scene, allows us to recover the extent of major furniture objects in 3D. Our “boxy” detector localizes box shaped objects oriented parallel to the scene across different scales and object types, and thus blocks out the occupied space in the scene. To localize the objects more accurately in 3D we introduce a set of specially designed features that capture the floor contact points of the objects. Image based metrics are not very indicative of performance in 3D. We make the first attempt to evaluate single view based occupancy estimates for 3D errors and propose several task driven performance measures towards it. On our dataset of 592 indoor images marked with full 3D geometry of the scene, we show that: (a) our detector works well using image based metrics; (b) our refinement method produces significant improvements in localization in 3D; and (c) if one evaluates using 3D metrics, our method offers major improvements over other single view based scene geometry estimation methods.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we consider the problem of recovering the free space of an indoor scene from its single image. We show that exploiting the box like geometric structure of furniture and constraints provided by the scene, allows us to recover the extent of major furniture objects in 3D. Our “boxy” detector localizes box shaped objects oriented parallel to the scene across different scales and object types, and thus blocks out the occupied space in the scene. To localize the objects more accurately in 3D we introduce a set of specially designed features that capture the floor contact points of the objects. Image based metrics are not very indicative of performance in 3D. We make the first attempt to evaluate single view based occupancy estimates for 3D errors and propose several task driven performance measures towards it. On our dataset of 592 indoor images marked with full 3D geometry of the scene, we show that: (a) our detector works well using image based metrics; (b) our refinement method produces significant improvements in localization in 3D; and (c) if one evaluates using 3D metrics, our method offers major improvements over other single view based scene geometry estimation methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we consider the problem of recovering the free space of an indoor scene from its single image. We show that exploiting the box like geometric structure of furniture and constraints provided by the scene, allows us to recover the extent of major furniture objects in 3D. Our “boxy” detector localizes box shaped objects oriented parallel to the scene across different scales and object types, and thus blocks out the occupied space in the scene. To localize the objects more accurately in 3D we introduce a set of specially designed features that capture the floor contact points of the objects. Image based metrics are not very indicative of performance in 3D. We make the first attempt to evaluate single view based occupancy estimates for 3D errors and propose several task driven performance measures towards it. On our dataset of 592 indoor images marked with full 3D geometry of the scene, we show that: (a) our detector works well using image based metrics; (b) our refinement method produces significant improvements in localization in 3D; and (c) if one evaluates using 3D metrics, our method offers major improvements over other single view based scene geometry estimation methods.", "fno": "355P3A44", "keywords": [ "Image Edge Detection", "Detectors", "Feature Extraction", "Context", "Solid Modeling", "Context Modeling", "Standards" ], "authors": [ { "affiliation": "University of Illinois at Urbana Champaign", "fullName": "David Forsyth", "givenName": "David", "surname": "Forsyth", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Urbana Champaign", "fullName": "Derek Hoiem", "givenName": "Derek", "surname": "Hoiem", "__typename": "ArticleAuthorType" }, { "affiliation": "Nokia Research, Palo Alto, CA", "fullName": "Varsha Hedau", "givenName": "Varsha", "surname": "Hedau", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "2807-2814", "year": "2012", "issn": "1063-6919", "isbn": "978-1-4673-1226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "354P3A43", "articleId": "12OmNzwpUoT", "__typename": "AdjacentArticleType" }, "next": { "fno": "356P3A45", "articleId": "12OmNqBbHL5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/344P3A33", "title": "Bayesian geometric modeling of indoor scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/344P3A33/12OmNBt3qj0", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840c144", "title": "Support Surface Prediction in Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840c144/12OmNzRqdJl", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118d734", "title": "Orientational Pyramid Matching for Recognizing Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118d734/12OmNzYeB0G", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/04/ttp2013040882", "title": "Monocular Visual Scene Understanding: Understanding Multi-Object Traffic Scenes", "doi": null, "abstractUrl": "/journal/tp/2013/04/ttp2013040882/13rRUwdrdLY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/06/mcg2012060018", "title": "Efficiently Modeling 3D Scenes from a Single Image", "doi": null, "abstractUrl": "/magazine/cg/2012/06/mcg2012060018/13rRUxZRbre", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0913", "title": "3D-FRONT: 3D Furnished Rooms with layOuts and semaNTics", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0913/1BmEzQDqGek", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8541", "title": "PhotoScene: Photorealistic Material and Lighting Transfer for Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8541/1H1nmFHmaoE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a785", "title": "Learning Graph Variational Autoencoders with Constraints and Structured Priors for Conditional Indoor 3D Scene Generation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a785/1KxVq4DixWg", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08883084", "title": "Active Arrangement of Small Objects in 3D Indoor Scenes", "doi": null, "abstractUrl": "/journal/tg/2021/04/08883084/1epRSep15Wo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800d960", "title": "Learning 3D Semantic Scene Graphs From 3D Indoor Reconstructions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800d960/1m3nHniwEg0", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwWorE", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBscCTE", "doi": "10.1109/ICCVW.2009.5457631", "title": "An iterative scheme for motion-based scene segmentation", "normalizedTitle": "An iterative scheme for motion-based scene segmentation", "abstract": "We present an approach for dense estimation of motion and depth of a scene containing a multiple number of differently moving objects with the camera system itself being in motion. The estimates are used to segregate the image sequence into a number of independently moving objects by assigning the object hypothesis with maximum a posteriori (MAP) probability to each image point. Different to previous approaches in 3-dimensional (3D) scene analysis, we tackle this task by first simultaneously estimating motion and depth for a salient set of feature points in a recursive manner. Based on the evolving set of estimated motion profiles, the scene depth is recovered densely from spatially and temporally separated views. Given the dense depth map and the set of tracked motion estimates, the likelihood of each image point to belong to one of the distinct motion profiles can be determined and dense scene segmentation can be performed. Within our probabilistic model the expectation-maximization (EM) algorithm is used to solve the inherent missing data problem. A Markov Random Field (MRF) is used to express our expectations on spatial and temporal continuity of objects.", "abstracts": [ { "abstractType": "Regular", "content": "We present an approach for dense estimation of motion and depth of a scene containing a multiple number of differently moving objects with the camera system itself being in motion. The estimates are used to segregate the image sequence into a number of independently moving objects by assigning the object hypothesis with maximum a posteriori (MAP) probability to each image point. Different to previous approaches in 3-dimensional (3D) scene analysis, we tackle this task by first simultaneously estimating motion and depth for a salient set of feature points in a recursive manner. Based on the evolving set of estimated motion profiles, the scene depth is recovered densely from spatially and temporally separated views. Given the dense depth map and the set of tracked motion estimates, the likelihood of each image point to belong to one of the distinct motion profiles can be determined and dense scene segmentation can be performed. Within our probabilistic model the expectation-maximization (EM) algorithm is used to solve the inherent missing data problem. A Markov Random Field (MRF) is used to express our expectations on spatial and temporal continuity of objects.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an approach for dense estimation of motion and depth of a scene containing a multiple number of differently moving objects with the camera system itself being in motion. The estimates are used to segregate the image sequence into a number of independently moving objects by assigning the object hypothesis with maximum a posteriori (MAP) probability to each image point. Different to previous approaches in 3-dimensional (3D) scene analysis, we tackle this task by first simultaneously estimating motion and depth for a salient set of feature points in a recursive manner. Based on the evolving set of estimated motion profiles, the scene depth is recovered densely from spatially and temporally separated views. Given the dense depth map and the set of tracked motion estimates, the likelihood of each image point to belong to one of the distinct motion profiles can be determined and dense scene segmentation can be performed. Within our probabilistic model the expectation-maximization (EM) algorithm is used to solve the inherent missing data problem. A Markov Random Field (MRF) is used to express our expectations on spatial and temporal continuity of objects.", "fno": "05457631", "keywords": [ "Expectation Maximisation Algorithm", "Image Segmentation", "Image Sequences", "Markov Processes", "Motion Estimation", "Optical Tracking", "Probability", "Iterative Scheme", "Motion Based Scene Segmentation", "Dense Estimation", "Moving Object", "Camera System", "Image Sequence", "Object Hypothesis", "Maximum A Posteriori Probability", "Image Point", "3 D Scene Analysis", "Motion Estimation", "Scene Depth", "Dense Depth Map", "Motion Tracking", "Motion Profile", "Dense Scene Segmentation", "Probabilistic Model", "Expectation Maximization Algorithm", "EM Algorithm", "Markov Random Field", "Object Spatial Continuity", "Object Temporal Continuity", "Layout", "Motion Estimation", "Image Segmentation", "Cameras", "Image Sequences", "Image Analysis", "Recursive Estimation", "Motion Analysis", "Tracking", "Markov Random Fields" ], "authors": [ { "affiliation": "Department for Measurement and Control, University of Karlsruhe (TH), 76 131, Germany", "fullName": "Alexander Bachmann", "givenName": "Alexander", "surname": "Bachmann", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Anthropomatics University of Karlsruhe (TH), 76 131, Germany", "fullName": "Hildegard Kuehne", "givenName": "Hildegard", "surname": "Kuehne", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "735-742", "year": "2009", "issn": null, "isbn": "978-1-4244-4442-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05457630", "articleId": "12OmNwDACgI", "__typename": "AdjacentArticleType" }, "next": { "fno": "05457628", "articleId": "12OmNvqW6Zs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cccrv/2004/2127/0/01301486", "title": "Estimating camera motion through a 3D cluttered scene", "doi": null, "abstractUrl": "/proceedings-article/cccrv/2004/01301486/12OmNAH5dms", "parentPublication": { "id": "proceedings/cccrv/2004/2127/0", "title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/07780809", "title": "Dense Monocular Depth Estimation in Complex Dynamic Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/07780809/12OmNB8Cj8H", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457g891", "title": "Fast Multi-frame Stereo Scene Flow with Motion Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g891/12OmNwogh9r", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mnrao/1994/6435/0/00346231", "title": "Three dimensional transparent structure segmentation and multiple 3D motion estimation from monocular perspective image sequences", "doi": null, "abstractUrl": "/proceedings-article/mnrao/1994/00346231/12OmNx5Yvb5", "parentPublication": { "id": "proceedings/mnrao/1994/6435/0", "title": "Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/180P2A30", "title": "Structure and motion from scene registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/180P2A30/12OmNx7ouTk", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/1/81831073", "title": "Iterative motion-based segmentation for object-based video coding", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81831073/12OmNySXF2i", "parentPublication": { "id": "proceedings/icip/1997/8183/1", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402535", "title": "Dense multibody motion estimation and reconstruction from a handheld camera", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402535/12OmNz5s0RS", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139568", "title": "Direct motion stereo: Recovery of observer motion and scene structure", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139568/12OmNzb7ZsJ", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a627", "title": "Self-Supervised Monocular Scene Decomposition and Depth Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a627/1zWEmY41iPC", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgX5", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNC4wtse", "doi": "10.1109/ICCV.2009.5459391", "title": "Color constancy using 3D scene geometry", "normalizedTitle": "Color constancy using 3D scene geometry", "abstract": "The aim of color constancy is to remove the effect of the color of the light source. As color constancy is inherently an ill-posed problem, most of the existing color constancy algorithms are based on specific imaging assumptions such as the grey-world and white patch assumptions. In this paper, 3D geometry models are used to determine which color constancy method to use for the different geometrical regions found in images. To this end, images are first classified into stages (rough 3D geometry models). According to the stage models, images are divided into different regions using hard and soft segmentation. After that, the best color constancy algorithm is selected for each geometry segment. As a result, light source estimation is tuned to the global scene geometry. Our algorithm opens the possibility to estimate the remote scene illumination color, by distinguishing nearby light source from distant illuminants. Experiments on large scale image datasets show that the proposed algorithm outperforms state-of-the-art single color constancy algorithms with an improvement of almost 14% of median angular error. When using an ideal classifier (i.e, all of the test images are correctly classified into stages), the performance of the proposed method achieves an improvement of 31% of median angular error compared to the best-performing single color constancy algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "The aim of color constancy is to remove the effect of the color of the light source. As color constancy is inherently an ill-posed problem, most of the existing color constancy algorithms are based on specific imaging assumptions such as the grey-world and white patch assumptions. In this paper, 3D geometry models are used to determine which color constancy method to use for the different geometrical regions found in images. To this end, images are first classified into stages (rough 3D geometry models). According to the stage models, images are divided into different regions using hard and soft segmentation. After that, the best color constancy algorithm is selected for each geometry segment. As a result, light source estimation is tuned to the global scene geometry. Our algorithm opens the possibility to estimate the remote scene illumination color, by distinguishing nearby light source from distant illuminants. Experiments on large scale image datasets show that the proposed algorithm outperforms state-of-the-art single color constancy algorithms with an improvement of almost 14% of median angular error. When using an ideal classifier (i.e, all of the test images are correctly classified into stages), the performance of the proposed method achieves an improvement of 31% of median angular error compared to the best-performing single color constancy algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The aim of color constancy is to remove the effect of the color of the light source. As color constancy is inherently an ill-posed problem, most of the existing color constancy algorithms are based on specific imaging assumptions such as the grey-world and white patch assumptions. In this paper, 3D geometry models are used to determine which color constancy method to use for the different geometrical regions found in images. To this end, images are first classified into stages (rough 3D geometry models). According to the stage models, images are divided into different regions using hard and soft segmentation. After that, the best color constancy algorithm is selected for each geometry segment. As a result, light source estimation is tuned to the global scene geometry. Our algorithm opens the possibility to estimate the remote scene illumination color, by distinguishing nearby light source from distant illuminants. Experiments on large scale image datasets show that the proposed algorithm outperforms state-of-the-art single color constancy algorithms with an improvement of almost 14% of median angular error. When using an ideal classifier (i.e, all of the test images are correctly classified into stages), the performance of the proposed method achieves an improvement of 31% of median angular error compared to the best-performing single color constancy algorithm.", "fno": "05459391", "keywords": [ "Computational Geometry", "Image Colour Analysis", "Image Segmentation", "Color Constancy", "3 D Scene Geometry", "Hard Segmentation", "Soft Segmentation", "Light Source Estimation", "Remote Scene Illumination Color", "Median Angular Error", "Layout", "Geometry", "Light Sources", "Solid Modeling", "Image Segmentation", "Lighting", "Large Scale Systems", "Testing", "Error Correction", "Color" ], "authors": [ { "affiliation": "School of Computer and Information Technology, Beijing Jiaotong University, China", "fullName": "Rui Lu", "givenName": null, "surname": "Rui Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Intelligent Systems Lab Amsterdam, University of Amsterdam, Holland", "fullName": "Arjan Gijsenij", "givenName": "Arjan", "surname": "Gijsenij", "__typename": "ArticleAuthorType" }, { "affiliation": "Intelligent Systems Lab Amsterdam, University of Amsterdam, Holland", "fullName": "Theo Gevers", "givenName": "Theo", "surname": "Gevers", "__typename": "ArticleAuthorType" }, { "affiliation": "Intelligent Systems Lab Amsterdam, University of Amsterdam, Holland", "fullName": "Vladimir Nedović", "givenName": "Vladimir", "surname": "Nedović", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Information Technology, Beijing Jiaotong University, China", "fullName": "De Xu", "givenName": null, "surname": "De Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Intelligent Systems Lab Amsterdam, University of Amsterdam, Holland", "fullName": "Jan-Mark Geusebroek", "givenName": "Jan-Mark", "surname": "Geusebroek", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "1749-1756", "year": "2009", "issn": "1550-5499", "isbn": "978-1-4244-4420-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05459390", "articleId": "12OmNzdoMNs", "__typename": "AdjacentArticleType" }, "next": { "fno": "05459393", "articleId": "12OmNwlHSSZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2015/6964/0/07298838", "title": "Efficient illuminant estimation for color constancy using grey pixels", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298838/12OmNBsue72", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391a379", "title": "Convolutional Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a379/12OmNvjQ8Ej", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130331", "title": "Color constancy and non-uniform illumination: Can existing algorithms work?", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130331/12OmNvwTGAM", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995615", "title": "Evaluating combinational color constancy methods on real-world images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995615/12OmNy4r3VE", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206497", "title": "Physics-based edge evaluation for improved color constancy", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206497/12OmNzlD9mu", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420720", "title": "Color constancy under varying illumination", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420720/12OmNzlUKQX", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/05/06588227", "title": "Exemplar-Based Color Constancy and Multiple Illumination", "doi": null, "abstractUrl": "/journal/tp/2014/05/06588227/13rRUxcbnIm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a123", "title": "Deep Attention Network for Melanoma Detection Improved by Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a123/17D45WK5ApX", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800c267", "title": "A Multi-Hypothesis Approach to Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800c267/1m3nQsEkgAE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b194", "title": "Generative Models for Multi-Illumination Color Constancy", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b194/1yNioSxeNTa", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVT", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNCbCrQn", "doi": "10.1109/CVPR.2014.93", "title": "Single-View 3D Scene Parsing by Attributed Grammar", "normalizedTitle": "Single-View 3D Scene Parsing by Attributed Grammar", "abstract": "In this paper, we present an attributed grammar for parsing man-made outdoor scenes into semantic surfaces, and recovering its 3D model simultaneously. The grammar takes superpixels as its terminal nodes and use five production rules to generate the scene into a hierarchical parse graph. Each graph node actually correlates with a surface or a composite of surfaces in the 3D world or the 2D image. They are described by attributes for the global scene model, e.g. focal length, vanishing points, or the surface properties, e.g. surface normal, contact line with other surfaces, and relative spatial location etc. Each production rule is associated with some equations that constraint the attributes of the parent nodes and those of their children nodes. Given an input image, our goal is to construct a hierarchical parse graph by recursively applying the five grammar rules while preserving the attributes constraints. We develop an effective top-down/bottom-up cluster sampling procedure which can explore this constrained space efficiently. We evaluate our method on both public benchmarks and newly built datasets, and achieve state-of-the-art performances in terms of layout estimation and region segmentation. We also demonstrate that our method is able to recover detailed 3D model with relaxed Manhattan structures which clearly advances the state-of-the-arts of singleview 3D reconstruction.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present an attributed grammar for parsing man-made outdoor scenes into semantic surfaces, and recovering its 3D model simultaneously. The grammar takes superpixels as its terminal nodes and use five production rules to generate the scene into a hierarchical parse graph. Each graph node actually correlates with a surface or a composite of surfaces in the 3D world or the 2D image. They are described by attributes for the global scene model, e.g. focal length, vanishing points, or the surface properties, e.g. surface normal, contact line with other surfaces, and relative spatial location etc. Each production rule is associated with some equations that constraint the attributes of the parent nodes and those of their children nodes. Given an input image, our goal is to construct a hierarchical parse graph by recursively applying the five grammar rules while preserving the attributes constraints. We develop an effective top-down/bottom-up cluster sampling procedure which can explore this constrained space efficiently. We evaluate our method on both public benchmarks and newly built datasets, and achieve state-of-the-art performances in terms of layout estimation and region segmentation. We also demonstrate that our method is able to recover detailed 3D model with relaxed Manhattan structures which clearly advances the state-of-the-arts of singleview 3D reconstruction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present an attributed grammar for parsing man-made outdoor scenes into semantic surfaces, and recovering its 3D model simultaneously. The grammar takes superpixels as its terminal nodes and use five production rules to generate the scene into a hierarchical parse graph. Each graph node actually correlates with a surface or a composite of surfaces in the 3D world or the 2D image. They are described by attributes for the global scene model, e.g. focal length, vanishing points, or the surface properties, e.g. surface normal, contact line with other surfaces, and relative spatial location etc. Each production rule is associated with some equations that constraint the attributes of the parent nodes and those of their children nodes. Given an input image, our goal is to construct a hierarchical parse graph by recursively applying the five grammar rules while preserving the attributes constraints. We develop an effective top-down/bottom-up cluster sampling procedure which can explore this constrained space efficiently. We evaluate our method on both public benchmarks and newly built datasets, and achieve state-of-the-art performances in terms of layout estimation and region segmentation. We also demonstrate that our method is able to recover detailed 3D model with relaxed Manhattan structures which clearly advances the state-of-the-arts of singleview 3D reconstruction.", "fno": "5118a684", "keywords": [ "Grammar", "Three Dimensional Displays", "Layout", "Solid Modeling", "Mathematical Model", "Cameras", "Semantics", "Attributed Grammar", "Scene Parsing", "3 D" ], "authors": [ { "affiliation": null, "fullName": "Xiaobai Liu", "givenName": "Xiaobai", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yibiao Zhao", "givenName": "Yibiao", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Song-chun Zhu", "givenName": "Song-chun", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "684-691", "year": "2014", "issn": "1063-6919", "isbn": "978-1-4799-5118-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5118a676", "articleId": "12OmNx5Yv6j", "__typename": "AdjacentArticleType" }, "next": { "fno": "5118a692", "articleId": "12OmNzxyiDL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2010/6984/0/05540187", "title": "Detecting and parsing architecture at city scale from range data", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2010/05540187/12OmNAR1aV7", "parentPublication": { "id": "proceedings/cvpr/2010/6984/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/06977403", "title": "Multiple View Based Building Modeling with Multi-box Grammar", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/06977403/12OmNwCJOQw", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995319", "title": "Shape grammar parsing via Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995319/12OmNwIHorf", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/03/07889053", "title": "Single-View 3D Scene Reconstruction and Parsing by Attribute Grammar", "doi": null, "abstractUrl": "/journal/tp/2018/03/07889053/13rRUwdrdM2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2009/01/ttp2009010059", "title": "Bottom-Up/Top-Down Image Parsing with Attribute Grammar", "doi": null, "abstractUrl": "/journal/tp/2009/01/ttp2009010059/13rRUx0gegp", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/07/07990516", "title": "Attribute And-Or Grammar for Joint Parsing of Human Pose, Parts and Attributes", "doi": null, "abstractUrl": "/journal/tp/2018/07/07990516/13rRUx0gerc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1993/02/k0225", "title": "Parsing Electronic Circuits in a Logic Grammar", "doi": null, "abstractUrl": "/journal/tk/1993/02/k0225/13rRUxYIN4l", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2009/06/tts2009060780", "title": "Grammar Recovery from Parse Trees and Metrics-Guided Grammar Refactoring", "doi": null, "abstractUrl": "/journal/ts/2009/06/tts2009060780/13rRUyfbwsq", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000f899", "title": "Human-Centric Indoor Scene Synthesis Using Stochastic Grammar", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000f899/17D45W9KVIW", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09450016", "title": "Monocular 3D Pose Estimation via Pose Grammar and Data Augmentation", "doi": null, "abstractUrl": "/journal/tp/2022/10/09450016/1uiiOHx6LWU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgX5", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwD1q5T", "doi": "10.1109/ICCV.2009.5459211", "title": "Decomposing a scene into geometric and semantically consistent regions", "normalizedTitle": "Decomposing a scene into geometric and semantically consistent regions", "abstract": "High-level, or holistic, scene understanding involves reasoning about objects, regions, and the 3D relationships between them. This requires a representation above the level of pixels that can be endowed with high-level attributes such as class of object/region, its orientation, and (rough 3D) location within the scene. Towards this goal, we propose a region-based model which combines appearance and scene geometry to automatically decompose a scene into semantically meaningful regions. Our model is defined in terms of a unified energy function over scene appearance and structure. We show how this energy function can be learned from data and present an efficient inference technique that makes use of multiple over-segmentations of the image to propose moves in the energy-space. We show, experimentally, that our method achieves state-of-the-art performance on the tasks of both multi-class image segmentation and geometric reasoning. Finally, by understanding region classes and geometry, we show how our model can be used as the basis for 3D reconstruction of the scene.", "abstracts": [ { "abstractType": "Regular", "content": "High-level, or holistic, scene understanding involves reasoning about objects, regions, and the 3D relationships between them. This requires a representation above the level of pixels that can be endowed with high-level attributes such as class of object/region, its orientation, and (rough 3D) location within the scene. Towards this goal, we propose a region-based model which combines appearance and scene geometry to automatically decompose a scene into semantically meaningful regions. Our model is defined in terms of a unified energy function over scene appearance and structure. We show how this energy function can be learned from data and present an efficient inference technique that makes use of multiple over-segmentations of the image to propose moves in the energy-space. We show, experimentally, that our method achieves state-of-the-art performance on the tasks of both multi-class image segmentation and geometric reasoning. Finally, by understanding region classes and geometry, we show how our model can be used as the basis for 3D reconstruction of the scene.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "High-level, or holistic, scene understanding involves reasoning about objects, regions, and the 3D relationships between them. This requires a representation above the level of pixels that can be endowed with high-level attributes such as class of object/region, its orientation, and (rough 3D) location within the scene. Towards this goal, we propose a region-based model which combines appearance and scene geometry to automatically decompose a scene into semantically meaningful regions. Our model is defined in terms of a unified energy function over scene appearance and structure. We show how this energy function can be learned from data and present an efficient inference technique that makes use of multiple over-segmentations of the image to propose moves in the energy-space. We show, experimentally, that our method achieves state-of-the-art performance on the tasks of both multi-class image segmentation and geometric reasoning. Finally, by understanding region classes and geometry, we show how our model can be used as the basis for 3D reconstruction of the scene.", "fno": "05459211", "keywords": [ "Functions", "Image Reconstruction", "Image Segmentation", "Scene Decomposition", "Geometric Consistent Regions", "Semantically Consistent Regions", "Pixels", "Region Based Model", "Unified Energy Function", "Scene Appearance", "Scene Geometry", "Scene Structure", "Inference Technique", "Image Oversegmentation", "Multiclass Image Segmentation", "Scene Reconstruction", "Layout", "Image Segmentation", "Solid Modeling", "Geometry", "Image Reconstruction", "Computer Science", "Pixel", "Roads", "Image Decomposition", "Robustness" ], "authors": [ { "affiliation": "Dept. of Electrical Engineering, Stanford University, USA", "fullName": "Stephen Gould", "givenName": "Stephen", "surname": "Gould", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electrical Engineering, Stanford University, USA", "fullName": "Richard Fulton", "givenName": "Richard", "surname": "Fulton", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electrical Engineering, Stanford University, USA", "fullName": "Daphne Koller", "givenName": "Daphne", "surname": "Koller", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2009", "issn": "1550-5499", "isbn": "978-1-4244-4420-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05459236", "articleId": "12OmNvq5jsI", "__typename": "AdjacentArticleType" }, "next": { "fno": "05459208", "articleId": "12OmNvDI3Tn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2015/6683/0/6683b022", "title": "Finding Temporally Consistent Occlusion Boundaries in Videos Using Geometric Context", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683b022/12OmNBrV1OH", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/357P3A46", "title": "Joint 2D-3D temporally consistent semantic segmentation of street scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/357P3A46/12OmNrAdszh", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1994/6952/2/00413672", "title": "Realistic landscape modelling with high level of detail", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413672/12OmNrJRP0y", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2014/4985/0/06836125", "title": "Detecting 3D geometric boundaries of indoor scenes under varying lighting", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836125/12OmNvDI3WA", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2004/2244/0/01410396", "title": "Probabilistic classification based image regions labeling", "doi": null, "abstractUrl": "/proceedings-article/icig/2004/01410396/12OmNwEJ141", "parentPublication": { "id": "proceedings/icig/2004/2244/0", "title": "Proceedings. Third International Conference on Image and Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761022", "title": "3D ordinal constraint in spatial configuration for robust scene recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761022/12OmNwM6A1Z", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c156", "title": "Semantically-Aware Aerial Reconstruction from Multi-modal Data", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c156/12OmNy1SFBH", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e616", "title": "Geometry-Aware Deep Network for Single-Image Novel View Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e616/17D45WYQJ7K", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800a423", "title": "Semantic Implicit Neural Scene Representations With Semi-Supervised Training", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800a423/1qyxoFrZU88", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vg7AGzvxNC", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "acronym": "icvrv", "groupId": "1800579", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1vg846FgzWo", "doi": "10.1109/ICVRV51359.2020.00072", "title": "3D Reconstruction and Understanding of Indoor Scene Based on Single Image", "normalizedTitle": "3D Reconstruction and Understanding of Indoor Scene Based on Single Image", "abstract": "Given a photo of a room, through our automated system, try to reconstruct a three-dimensional scene similar to the photo. Among them, the indoor objects come from the objects in the ShapeNet model library, which enables our system to produce a high-quality output result. The method we use is to use a full convolutional neural network to train images and compare indicators, use Faster-RCNN to perform multitasking object recognition and target detection, and then iteratively optimize the position and proportion of objects in the room, so that the scene renders a three-dimensional map Best match with input photo.", "abstracts": [ { "abstractType": "Regular", "content": "Given a photo of a room, through our automated system, try to reconstruct a three-dimensional scene similar to the photo. Among them, the indoor objects come from the objects in the ShapeNet model library, which enables our system to produce a high-quality output result. The method we use is to use a full convolutional neural network to train images and compare indicators, use Faster-RCNN to perform multitasking object recognition and target detection, and then iteratively optimize the position and proportion of objects in the room, so that the scene renders a three-dimensional map Best match with input photo.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Given a photo of a room, through our automated system, try to reconstruct a three-dimensional scene similar to the photo. Among them, the indoor objects come from the objects in the ShapeNet model library, which enables our system to produce a high-quality output result. The method we use is to use a full convolutional neural network to train images and compare indicators, use Faster-RCNN to perform multitasking object recognition and target detection, and then iteratively optimize the position and proportion of objects in the room, so that the scene renders a three-dimensional map Best match with input photo.", "fno": "049700a292", "keywords": [ "Computer Vision", "Image Classification", "Image Recognition", "Image Reconstruction", "Image Representation", "Learning Artificial Intelligence", "Neural Nets", "Object Detection", "Object Recognition", "Rendering Computer Graphics", "Solid Modelling", "Input Photo", "3 D Reconstruction", "Indoor Scene", "Single Image", "Automated System", "Three Dimensional Scene", "Indoor Objects", "Shape Net Model Library", "High Quality Output Result", "Convolutional Neural Network", "Faster RCNN", "Multitasking Object Recognition", "Target Detection", "Scene Renders", "Three Dimensional Map Best Match", "Visualization", "Solid Modeling", "Three Dimensional Displays", "Monte Carlo Methods", "Neural Networks", "Object Detection", "Virtual Reality", "3 D Reconstruction And Understanding Of Indoor Scenes", "Markov Chain Monte Carlo", "FCN Neural Network", "Multitask Object Recognition And Target Detection Neural Network Faster RCNN" ], "authors": [ { "affiliation": "Software College Zhengzhou University,Zhengzhou,China", "fullName": "Junxiao Xue", "givenName": "Junxiao", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "Software College Zhengzhou University,Zhengzhou,China", "fullName": "Yuchun Tu", "givenName": "Yuchun", "surname": "Tu", "__typename": "ArticleAuthorType" }, { "affiliation": "Software College Zhengzhou University,Zhengzhou,China", "fullName": "Dai Sun", "givenName": "Dai", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvrv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "292-293", "year": "2020", "issn": "2375-141X", "isbn": "978-1-6654-0497-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1vg83wtH5Qs", "name": "picvrv202004970-09479822s1-mm_049700a292.zip", "size": "49.1 MB", "location": "https://www.computer.org/csdl/api/v1/extra/picvrv202004970-09479822s1-mm_049700a292.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "049700a287", "articleId": "1vg7UqDNZIY", "__typename": "AdjacentArticleType" }, "next": { "fno": "049700a294", "articleId": "1vg7Pg0aZ4A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dv/2014/7000/1/7000a139", "title": "Detailed 3D Model Driven Single View Scene Understanding", "doi": null, "abstractUrl": "/proceedings-article/3dv/2014/7000a139/12OmNAXxXid", "parentPublication": { "id": "proceedings/3dv/2014/7000/2", "title": "2014 2nd International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457c422", "title": "IM2CAD", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457c422/12OmNzV70p4", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08241434", "title": "MixedFusion: Real-Time Reconstruction of an Indoor Scene with Dynamic Objects", "doi": null, "abstractUrl": "/journal/tg/2018/12/08241434/14H4WM5G31S", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08531721", "title": "Data-Driven Indoor Scene Modeling from a Single Color Image with Iterative Object Segmentation and Model Retrieval", "doi": null, "abstractUrl": "/journal/tg/2020/04/08531721/17D45Xq6dDe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5183", "title": "Indoor Scene Generation from a Collection of Semantic-Segmented Depth Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5183/1BmFbxElKX6", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a785", "title": "Learning Graph Variational Autoencoders with Constraints and Structured Priors for Conditional Indoor 3D Scene Generation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a785/1KxVq4DixWg", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a317", "title": "Indoor Scene Reconstruction: From Panorama Images to CAD Models", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a317/1gyskCPmgco", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900n3799", "title": "Monte Carlo Scene Search for 3D Scene Understanding", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900n3799/1yeJ3a5CJhe", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i829", "title": "Holistic 3D Scene Understanding from a Single Image with Implicit Representation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i829/1yeLsqtovKg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800a106", "title": "SceneFormer: Indoor Scene Generation with Transformers", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800a106/1zWE85KaUSs", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyuPL0n", "title": "2018 IEEE International Conference on Big Data and Smart Computing (BigComp)", "acronym": "bigcomp", "groupId": "1803439", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYGlxw", "doi": "10.1109/BigComp.2018.00036", "title": "Ensemble Clustering Using Maximum Relative Density Path", "normalizedTitle": "Ensemble Clustering Using Maximum Relative Density Path", "abstract": "Ensemble clustering aims to obtain a better partition by aggregating different basic clustering results. Although many ensemble clustering algorithms have been proposed, they face two limitations. First, they often assume that basic clusterings were independent with each other and ignore their latent relationship. Second, they do not incorporate local information with global relationship when reconstructing point-to-point similarity matrix from basic clusterings. Accordingly, this paper presents a novel ensemble clustering approach, named Maximum Relative Density Path Accumulation (MRDPA). In this method, Relative k-nearest Neighbor Kernel Density (RNKD) and Higher Density nearest-Neighbor (HDN) are firstly applied to generate basic clusterings. These basic clusterings embody multi-scale characteristics for an input dataset with the changing of k in RNKD. Then, the maximum relative density path is defined to explore the global information in a constructed K-Nearest Neighbor (KNN) graph, and the point-to-cluster similarity and point-to-point similarity are derived from maximum relative density paths. Lastly, a final clustering is generated by a consensus function. MRDPA is evaluated on 2 synthetic datasets and 5 real datasets, and experiment results demonstrate that it outperforms established ensemble clustering algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Ensemble clustering aims to obtain a better partition by aggregating different basic clustering results. Although many ensemble clustering algorithms have been proposed, they face two limitations. First, they often assume that basic clusterings were independent with each other and ignore their latent relationship. Second, they do not incorporate local information with global relationship when reconstructing point-to-point similarity matrix from basic clusterings. Accordingly, this paper presents a novel ensemble clustering approach, named Maximum Relative Density Path Accumulation (MRDPA). In this method, Relative k-nearest Neighbor Kernel Density (RNKD) and Higher Density nearest-Neighbor (HDN) are firstly applied to generate basic clusterings. These basic clusterings embody multi-scale characteristics for an input dataset with the changing of k in RNKD. Then, the maximum relative density path is defined to explore the global information in a constructed K-Nearest Neighbor (KNN) graph, and the point-to-cluster similarity and point-to-point similarity are derived from maximum relative density paths. Lastly, a final clustering is generated by a consensus function. MRDPA is evaluated on 2 synthetic datasets and 5 real datasets, and experiment results demonstrate that it outperforms established ensemble clustering algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ensemble clustering aims to obtain a better partition by aggregating different basic clustering results. Although many ensemble clustering algorithms have been proposed, they face two limitations. First, they often assume that basic clusterings were independent with each other and ignore their latent relationship. Second, they do not incorporate local information with global relationship when reconstructing point-to-point similarity matrix from basic clusterings. Accordingly, this paper presents a novel ensemble clustering approach, named Maximum Relative Density Path Accumulation (MRDPA). In this method, Relative k-nearest Neighbor Kernel Density (RNKD) and Higher Density nearest-Neighbor (HDN) are firstly applied to generate basic clusterings. These basic clusterings embody multi-scale characteristics for an input dataset with the changing of k in RNKD. Then, the maximum relative density path is defined to explore the global information in a constructed K-Nearest Neighbor (KNN) graph, and the point-to-cluster similarity and point-to-point similarity are derived from maximum relative density paths. Lastly, a final clustering is generated by a consensus function. MRDPA is evaluated on 2 synthetic datasets and 5 real datasets, and experiment results demonstrate that it outperforms established ensemble clustering algorithms.", "fno": "364901a190", "keywords": [ "Data Analysis", "Nearest Neighbour Methods", "Pattern Clustering", "Ensemble Clustering Algorithms", "Reconstructing Point To Point Similarity Matrix", "Ensemble Clustering Approach", "Named Maximum Relative Density Path Accumulation", "Relative K Nearest Neighbor Kernel Density", "Higher Density Nearest Neighbor", "Point To Cluster Similarity", "Final Clustering", "Basic Clustering Results", "MRDPA", "RNKD", "HDN", "KNN", "K Nearest Neighbor Graph", "Clustering Algorithms", "Partitioning Algorithms", "Clustering Methods", "Kernel", "Trajectory", "Density Measurement", "Weight Measurement", "Relative Density Paths", "Ensemble Clustering", "Relative Density Reachability" ], "authors": [ { "affiliation": null, "fullName": "Ernan Li", "givenName": "Ernan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qingyong Li", "givenName": "Qingyong", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yangli-ao Geng", "givenName": "Yangli-ao", "surname": "Geng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Min Zheng", "givenName": "Min", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shiqing Wan", "givenName": "Shiqing", "surname": "Wan", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigcomp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-01-01T00:00:00", "pubType": "proceedings", "pages": "190-197", "year": "2018", "issn": "2375-9356", "isbn": "978-1-5386-3649-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "364901a184", "articleId": "12OmNvDqsJx", "__typename": "AdjacentArticleType" }, "next": { "fno": "364901a198", "articleId": "12OmNrJROVq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2015/3854/0/07403717", "title": "A multiplex-network based approach for clustering ensemble selection", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403717/12OmNwekjz5", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a627", "title": "Weighted-Object Ensemble Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a627/12OmNwxlrdZ", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256b199", "title": "Hierarchical Ensemble Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256b199/12OmNzuIje4", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/08/08438893", "title": "An Information-Theoretical Framework for Cluster Ensemble", "doi": null, "abstractUrl": "/journal/tk/2019/08/08438893/13rRUytF41Z", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2018/0169/0/016900a155", "title": "Ensemble Clustering with Novel Weighting Strategy", "doi": null, "abstractUrl": "/proceedings-article/cis/2018/016900a155/17D45WnnFWP", "parentPublication": { "id": "proceedings/cis/2018/0169/0", "title": "2018 14th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545488", "title": "Graph Embedding-Based Ensemble Learning for Image Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545488/17D45X7VTg9", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a337", "title": "Clustering Ensemble of Massive Data Based on Trusted Region", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a337/1BQiqkVoHXW", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/06/08906027", "title": "A Domain Adaptive Density Clustering Algorithm for Data With Varying Density Distribution", "doi": null, "abstractUrl": "/journal/tk/2021/06/08906027/1f5qKGU8lSo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09044397", "title": "RDMN: A Relative Density Measure Based on MST Neighborhood for Clustering Multi-Scale Datasets", "doi": null, "abstractUrl": "/journal/tk/2022/01/09044397/1kepUfDIGru", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscloud-edgecom/2020/6550/0/09170955", "title": "Clustering Ensembles Based on Probability Density Function Estimation", "doi": null, "abstractUrl": "/proceedings-article/cscloud-edgecom/2020/09170955/1mqcwNLCHQs", "parentPublication": { "id": "proceedings/cscloud-edgecom/2020/6550/0", "title": "2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir6", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xh13qI", "doi": "10.1109/ICPR.2018.8545816", "title": "Selective Ensemble Network for Accurate Crowd Density Estimation", "normalizedTitle": "Selective Ensemble Network for Accurate Crowd Density Estimation", "abstract": "This paper proposes a selective ensemble deep network architecture for crowd density estimation and people counting. In contrast to existing deep network-based methods, the proposed method incorporates two sub-networks for local density estimation: one to learn sparse density regions and one to learn dense density regions. Locally estimated density maps from the two sub-networks are selectively combined in ensemble fashion using a gating network to estimate an initial crowd density map. The initial density map is refined as a high resolution map, using another sub-network that draws on contextual information in the image. In training, a novel adaptive loss scheme is applied to resolve an ambiguity in the crowded region. the proposed scheme improves both density map accuracy and counting accuracy by adjusting the weighting value between density loss and counting loss according to the degree of crowdness and training epochs. Experiments using public datasets confirm that the proposed method outperforms state-of-the-art methods. Through self-evaluation, the effectiveness of each part in the network is also verified.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a selective ensemble deep network architecture for crowd density estimation and people counting. In contrast to existing deep network-based methods, the proposed method incorporates two sub-networks for local density estimation: one to learn sparse density regions and one to learn dense density regions. Locally estimated density maps from the two sub-networks are selectively combined in ensemble fashion using a gating network to estimate an initial crowd density map. The initial density map is refined as a high resolution map, using another sub-network that draws on contextual information in the image. In training, a novel adaptive loss scheme is applied to resolve an ambiguity in the crowded region. the proposed scheme improves both density map accuracy and counting accuracy by adjusting the weighting value between density loss and counting loss according to the degree of crowdness and training epochs. Experiments using public datasets confirm that the proposed method outperforms state-of-the-art methods. Through self-evaluation, the effectiveness of each part in the network is also verified.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a selective ensemble deep network architecture for crowd density estimation and people counting. In contrast to existing deep network-based methods, the proposed method incorporates two sub-networks for local density estimation: one to learn sparse density regions and one to learn dense density regions. Locally estimated density maps from the two sub-networks are selectively combined in ensemble fashion using a gating network to estimate an initial crowd density map. The initial density map is refined as a high resolution map, using another sub-network that draws on contextual information in the image. In training, a novel adaptive loss scheme is applied to resolve an ambiguity in the crowded region. the proposed scheme improves both density map accuracy and counting accuracy by adjusting the weighting value between density loss and counting loss according to the degree of crowdness and training epochs. Experiments using public datasets confirm that the proposed method outperforms state-of-the-art methods. Through self-evaluation, the effectiveness of each part in the network is also verified.", "fno": "08545816", "keywords": [ "Training", "Estimation", "Feature Extraction", "Image Resolution", "Network Architecture", "Surveillance", "Cameras" ], "authors": [ { "affiliation": "ASRI Department of Electrical and Computer Engineering, Perception and Intelligence Lab, Seoul National University, South Korea", "fullName": "Jiyeoup Jeong", "givenName": "Jiyeoup", "surname": "Jeong", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung Electronics, South Korea", "fullName": "Hawook Jeong", "givenName": "Hawook", "surname": "Jeong", "__typename": "ArticleAuthorType" }, { "affiliation": "ASRI Department of Electrical and Computer Engineering, Perception and Intelligence Lab, Seoul National University, South Korea", "fullName": "Jongin Lim", "givenName": "Jongin", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "ASRI Department of Electrical and Computer Engineering, Perception and Intelligence Lab, Seoul National University, South Korea", "fullName": "Jongwon Choi", "givenName": "Jongwon", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "ASRI Department of Electrical and Computer Engineering, Perception and Intelligence Lab, Seoul National University, South Korea", "fullName": "Sangdoo Yun", "givenName": "Sangdoo", "surname": "Yun", "__typename": "ArticleAuthorType" }, { "affiliation": "ASRI Department of Electrical and Computer Engineering, Perception and Intelligence Lab, Seoul National University, South Korea", "fullName": "Jin Young Choi", "givenName": "Jin Young", "surname": "Choi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "320-325", "year": "2018", "issn": "1051-4651", "isbn": "978-1-5386-3788-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08546193", "articleId": "17D45X0yjTJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08545577", "articleId": "17D45Wc1IIs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032b879", "title": "Generating High-Quality Crowd Density Maps Using Contextual Pyramid CNNs", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b879/12OmNym2bTM", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545683", "title": "Multi-scale Generative Adversarial Networks for Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545683/17D45XeKgn0", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300g126", "title": "Crowd Counting and Density Estimation by Trellis Encoder-Decoder Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300g126/1gysfpJRQXu", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g151", "title": "Learning Spatial Awareness to Improve Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g151/1hQqiotAZR6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300i381", "title": "Learn to Scale: Generating Multipolar Normalized Density Maps for Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300i381/1hVlaW1mK0E", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g141", "title": "Bayesian Loss for Crowd Count Estimation With Point Supervision", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g141/1hVljiHkz5K", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b130", "title": "Adaptive Density Map Generation for Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b130/1hVlpHpaPU4", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a231", "title": "The Density-Aware Estimation Network for Vehicle Counting in Traffic Surveillance System", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a231/1j9xE0jH7TW", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800e705", "title": "Attention Scaling for Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800e705/1m3nfPabQBi", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/03/09189836", "title": "Kernel-Based Density Map Generation for Dense Object Counting", "doi": null, "abstractUrl": "/journal/tp/2022/03/09189836/1mYZ9A07ZgA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCaLEnn", "title": "2012 IEEE Symposium on Computers and Communications (ISCC)", "acronym": "iscc", "groupId": "1000156", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOCWh7", "doi": "10.1109/ISCC.2012.6249262", "title": "Neural network equalization for frequency selective nonlinear MIMO channels", "normalizedTitle": "Neural network equalization for frequency selective nonlinear MIMO channels", "abstract": "In order to provide high data rate over wireless channels and improve the system capacity, Multiple-Input Multiple-Output (MIMO) wireless communication systems exploit spatial diversity by using multiple transmit and receive antennas. Moreover, to achieve high date rate and fulfill the power, MIMO systems are equipped with High Power Amplifiers (HPAs). However, HPAs cause nonlinear distortions and affect the receiver's performance. In this paper, we investigate the joint effects of HPA nonlinearity and frequency selective channel on the performance of MIMO receiver. Then, we propose two equalization schemes to compensate simultaneously nonlinear distortions and frequency selective channel effects. The first one is based on a feedforward Neural Network (NN) named (NN-MIMO-Receiver) and the second uses NN technique and LMS equalizer (LMS-NN-MIMO). The Levenberg-Marquardt algorithm (LM) is used for neural network training, which has proven [1] to exhibit a very good performance with lower computation complexity and faster convergence than other algorithms used in literature. These proposed methods are compared in term of Symbol Error Rate (SER) running under nonlinear frequency selective channel.", "abstracts": [ { "abstractType": "Regular", "content": "In order to provide high data rate over wireless channels and improve the system capacity, Multiple-Input Multiple-Output (MIMO) wireless communication systems exploit spatial diversity by using multiple transmit and receive antennas. Moreover, to achieve high date rate and fulfill the power, MIMO systems are equipped with High Power Amplifiers (HPAs). However, HPAs cause nonlinear distortions and affect the receiver's performance. In this paper, we investigate the joint effects of HPA nonlinearity and frequency selective channel on the performance of MIMO receiver. Then, we propose two equalization schemes to compensate simultaneously nonlinear distortions and frequency selective channel effects. The first one is based on a feedforward Neural Network (NN) named (NN-MIMO-Receiver) and the second uses NN technique and LMS equalizer (LMS-NN-MIMO). The Levenberg-Marquardt algorithm (LM) is used for neural network training, which has proven [1] to exhibit a very good performance with lower computation complexity and faster convergence than other algorithms used in literature. These proposed methods are compared in term of Symbol Error Rate (SER) running under nonlinear frequency selective channel.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to provide high data rate over wireless channels and improve the system capacity, Multiple-Input Multiple-Output (MIMO) wireless communication systems exploit spatial diversity by using multiple transmit and receive antennas. Moreover, to achieve high date rate and fulfill the power, MIMO systems are equipped with High Power Amplifiers (HPAs). However, HPAs cause nonlinear distortions and affect the receiver's performance. In this paper, we investigate the joint effects of HPA nonlinearity and frequency selective channel on the performance of MIMO receiver. Then, we propose two equalization schemes to compensate simultaneously nonlinear distortions and frequency selective channel effects. The first one is based on a feedforward Neural Network (NN) named (NN-MIMO-Receiver) and the second uses NN technique and LMS equalizer (LMS-NN-MIMO). The Levenberg-Marquardt algorithm (LM) is used for neural network training, which has proven [1] to exhibit a very good performance with lower computation complexity and faster convergence than other algorithms used in literature. These proposed methods are compared in term of Symbol Error Rate (SER) running under nonlinear frequency selective channel.", "fno": "IS014", "keywords": [ "Frequency Selective Channel", "Multiple Input Multiple Output MIMO", "High Power Amplifier HPA", "Neural Network NN", "LMS Equalizer" ], "authors": [ { "affiliation": "SUPCOM, Innov'Com Laboratory, Carthage University, Tunis, Tunisia", "fullName": "Oussama B. Belkacem", "givenName": "Oussama B.", "surname": "Belkacem", "__typename": "ArticleAuthorType" }, { "affiliation": "SUPCOM, Innov'Com Laboratory, Carthage University, Tunis, Tunisia", "fullName": "Rafik Zayani", "givenName": "Rafik", "surname": "Zayani", "__typename": "ArticleAuthorType" }, { "affiliation": "SUPCOM, Innov'Com Laboratory, Carthage University, Tunis, Tunisia", "fullName": "Mohamed L. Ammari", "givenName": "Mohamed L.", "surname": "Ammari", "__typename": "ArticleAuthorType" }, { "affiliation": "SUPCOM, Innov'Com Laboratory, Carthage University, Tunis, Tunisia", "fullName": "Ridha Bouallegue", "givenName": "Ridha", "surname": "Bouallegue", "__typename": "ArticleAuthorType" }, { "affiliation": "LAETITIA CNAM Paris, France", "fullName": "Daniel Roviras", "givenName": "Daniel", "surname": "Roviras", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "000018-000022", "year": "2012", "issn": "1530-1346", "isbn": "978-1-4673-2712-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "IS013", "articleId": "12OmNvSbBMN", "__typename": "AdjacentArticleType" }, "next": { "fno": "IS015", "articleId": "12OmNwMFMkj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2002/7402/3/05745098", "title": "Linear precoders and decoders designs for MIMO frequency selective channels", "doi": null, "abstractUrl": "/proceedings-article/icassp/2002/05745098/12OmNwp74z5", "parentPublication": { "id": "proceedings/icassp/2002/7402/3", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/6/3507f327", "title": "Equalization of Time-Variant Communications Channels via Adaptive AR Prefiltering", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507f327/12OmNwqx4aZ", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/elmar/2006/4403/0/04127534", "title": "ML MIMO-OFDM Time Synchronization/Channel Estimation for Unknown Frequency Selective Fading Channels", "doi": null, "abstractUrl": "/proceedings-article/elmar/2006/04127534/12OmNxFsmpE", "parentPublication": { "id": "proceedings/elmar/2006/4403/0", "title": "International Symposium ELMAR", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2006/2588/0/258800277", "title": "STC-MIMO Block Spread OFDM in Frequency Selective Rayleigh Fading Channels", "doi": null, "abstractUrl": "/proceedings-article/iscc/2006/258800277/12OmNxHJ9w7", "parentPublication": { "id": "proceedings/iscc/2006/2588/0", "title": "11th IEEE Symposium on Computers and Communications (ISCC'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfcc/2009/3591/0/3591a036", "title": "Neural Network Based MIMO-OFDM Channel Equalizer Using Comb-Type Pilot Arrangement", "doi": null, "abstractUrl": "/proceedings-article/icfcc/2009/3591a036/12OmNxisQR4", "parentPublication": { "id": "proceedings/icfcc/2009/3591/0", "title": "2009 International Conference on Future Computer and Communication (ICFCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icas-icns/2005/2450/0/24500045", "title": "Belief Propagation over MIMO Frequency Selective Fading Channels", "doi": null, "abstractUrl": "/proceedings-article/icas-icns/2005/24500045/12OmNy2agKF", "parentPublication": { "id": "proceedings/icas-icns/2005/2450/0", "title": "Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2009/2353/0/04960208", "title": "Diversity analysis of antenna selection over frequency-selective MIMO channels", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04960208/12OmNyyeWwY", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2009/2353/0/04960215", "title": "Linear receivers for frequency-selective MIMO channels with redundant linear precoding can achieve full diversity", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04960215/12OmNzUPptP", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2009/2353/0/04960171", "title": "Realizable equalizers for frequency selective MIMO channels with cochannel interference", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04960171/12OmNzayNmd", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2013/3755/0/06755009", "title": "A theoretical characterization and compensation of nonlinear distortion effects and performance analysis using polynomial model in MIMO OFDM systems under Rayleigh fading channel", "doi": null, "abstractUrl": "/proceedings-article/iscc/2013/06755009/12OmNzcxYYb", "parentPublication": { "id": "proceedings/iscc/2013/3755/0", "title": "2013 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzn38Kh", "title": "Intelligent Computation Technology and Automation, International Conference on", "acronym": "icicta", "groupId": "1002487", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNBt3qoX", "doi": "10.1109/ICICTA.2008.324", "title": "Nonlinear System Identification Using Dynamic Neural Networks Based on Genetic Algorithm", "normalizedTitle": "Nonlinear System Identification Using Dynamic Neural Networks Based on Genetic Algorithm", "abstract": "The structures of the four representative dynamic neural networks (NN) are presented. In order to compare the performance of different dynamic NN in the nonlinear system identification, they are used for identification of the same nonlinear dynamic system, using the genetic algorithm (GA) to train the weights of the Elman net, the modified Elman net, internal time-delayed recurrent NN and time-delayed NN. The simulation results show the generalization ability of the four dynamic NN and provide the high precision of model of the nonlinear dynamic system. It illustrates the advantages and disadvantages of the different dynamic NN.", "abstracts": [ { "abstractType": "Regular", "content": "The structures of the four representative dynamic neural networks (NN) are presented. In order to compare the performance of different dynamic NN in the nonlinear system identification, they are used for identification of the same nonlinear dynamic system, using the genetic algorithm (GA) to train the weights of the Elman net, the modified Elman net, internal time-delayed recurrent NN and time-delayed NN. The simulation results show the generalization ability of the four dynamic NN and provide the high precision of model of the nonlinear dynamic system. It illustrates the advantages and disadvantages of the different dynamic NN.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The structures of the four representative dynamic neural networks (NN) are presented. In order to compare the performance of different dynamic NN in the nonlinear system identification, they are used for identification of the same nonlinear dynamic system, using the genetic algorithm (GA) to train the weights of the Elman net, the modified Elman net, internal time-delayed recurrent NN and time-delayed NN. The simulation results show the generalization ability of the four dynamic NN and provide the high precision of model of the nonlinear dynamic system. It illustrates the advantages and disadvantages of the different dynamic NN.", "fno": "3357a213", "keywords": [ "Dynamic Neural Networks", "Nonlinear System Identification", "Genetic Algorithm" ], "authors": [ { "affiliation": null, "fullName": "Xinli Li", "givenName": "Xinli", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yan Bai", "givenName": "Yan", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Congzhi Huang", "givenName": "Congzhi", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-10-01T00:00:00", "pubType": "proceedings", "pages": "213-217", "year": "2008", "issn": null, "isbn": "978-0-7695-3357-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3357a209", "articleId": "12OmNBc1uyy", "__typename": "AdjacentArticleType" }, "next": { "fno": "3357a218", "articleId": "12OmNC2fGAH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icais/2002/1733/0/17330351", "title": "Nonlinear Hammerstein Model Identification Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icais/2002/17330351/12OmNAoUTqu", "parentPublication": { "id": "proceedings/icais/2002/1733/0", "title": "Proceedings 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/3/00914243", "title": "Recurrent neural networks for identification of nonlinear systems", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914243/12OmNB9t6vS", "parentPublication": { "id": "proceedings/cdc/2000/6638/3", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1994/6405/2/00471588", "title": "Identifying nonlinear dynamic systems using neural nets and evolutionary programming", "doi": null, "abstractUrl": "/proceedings-article/acssc/1994/00471588/12OmNBaT610", "parentPublication": { "id": "proceedings/acssc/1994/6405/1", "title": "Proceedings of 1994 28th Asilomar Conference on Signals, Systems and Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2009/3679/1/3679a607", "title": "Modeling of Nonlinear Deformation Considering Temperature and Hydrostatic Pressure Using Genetic-Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icie/2009/3679a607/12OmNBdrubd", "parentPublication": { "id": "proceedings/icie/2009/3679/1", "title": "2009 WASE International Conference on Information Engineering (ICIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2009/3600/1/3600a583", "title": "Genetic Algorithm Optimizing Neural Network for Short-Term Load Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600a583/12OmNro0HW0", "parentPublication": { "id": "proceedings/ifita/2009/3600/3", "title": "Information Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/2/3816b525", "title": "Dynamic Characteristics Identification of Magnetic Rheological Damper Based on Neural Network", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816b525/12OmNs5rl9b", "parentPublication": { "id": "proceedings/aici/2009/3816/2", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031a376", "title": "An Elman Neural Network Application on Dynamic Equivalents of Power System", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031a376/12OmNvk7K6w", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicrosp/1996/7456/0/74560305", "title": "Neural Methodology for Prediction and Identification of Non-linear Dynamic Systems", "doi": null, "abstractUrl": "/proceedings-article/nicrosp/1996/74560305/12OmNwcCIST", "parentPublication": { "id": "proceedings/nicrosp/1996/7456/0", "title": "Neural Networks for Identification, Control, and Robotics, International Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cca/2000/6562/0/00897426", "title": "Dynamic wavelet neural network for nonlinear dynamic system identification", "doi": null, "abstractUrl": "/proceedings-article/cca/2000/00897426/12OmNx3HIdk", "parentPublication": { "id": "proceedings/cca/2000/6562/0", "title": "Proceedings of the 2000 IEEE International Conference on Control Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/1/00912883", "title": "Output trajectory tracking using dynamic neural networks", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00912883/12OmNxYbT0s", "parentPublication": { "id": "proceedings/cdc/2000/6638/1", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3o6OXUoec", "doi": "10.1109/CVPR42600.2020.00470", "title": "Fast Symmetric Diffeomorphic Image Registration with Convolutional Neural Networks", "normalizedTitle": "Fast Symmetric Diffeomorphic Image Registration with Convolutional Neural Networks", "abstract": "Diffeomorphic deformable image registration is crucial in many medical image studies, as it offers unique, special features including topology preservation and invertibility of the transformation. Recent deep learning-based deformable image registration methods achieve fast image registration by leveraging a convolutional neural network (CNN) to learn the spatial transformation from the synthetic ground truth or the similarity metric. However, these approaches often ignore the topology preservation of the transformation and the smoothness of the transformation which is enforced by a global smoothing energy function alone. Moreover, deep learning-based approaches often estimate the displacement field directly, which cannot guarantee the existence of the inverse transformation. In this paper, we present a novel, efficient unsupervised symmetric image registration method which maximizes the similarity between images within the space of diffeomorphic maps and estimates both forward and inverse transformations simultaneously. We evaluate our method on 3D image registration with a large scale brain image dataset. Our method achieves state-of-the-art registration accuracy and running time while maintaining desirable diffeomorphic properties.", "abstracts": [ { "abstractType": "Regular", "content": "Diffeomorphic deformable image registration is crucial in many medical image studies, as it offers unique, special features including topology preservation and invertibility of the transformation. Recent deep learning-based deformable image registration methods achieve fast image registration by leveraging a convolutional neural network (CNN) to learn the spatial transformation from the synthetic ground truth or the similarity metric. However, these approaches often ignore the topology preservation of the transformation and the smoothness of the transformation which is enforced by a global smoothing energy function alone. Moreover, deep learning-based approaches often estimate the displacement field directly, which cannot guarantee the existence of the inverse transformation. In this paper, we present a novel, efficient unsupervised symmetric image registration method which maximizes the similarity between images within the space of diffeomorphic maps and estimates both forward and inverse transformations simultaneously. We evaluate our method on 3D image registration with a large scale brain image dataset. Our method achieves state-of-the-art registration accuracy and running time while maintaining desirable diffeomorphic properties.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diffeomorphic deformable image registration is crucial in many medical image studies, as it offers unique, special features including topology preservation and invertibility of the transformation. Recent deep learning-based deformable image registration methods achieve fast image registration by leveraging a convolutional neural network (CNN) to learn the spatial transformation from the synthetic ground truth or the similarity metric. However, these approaches often ignore the topology preservation of the transformation and the smoothness of the transformation which is enforced by a global smoothing energy function alone. Moreover, deep learning-based approaches often estimate the displacement field directly, which cannot guarantee the existence of the inverse transformation. In this paper, we present a novel, efficient unsupervised symmetric image registration method which maximizes the similarity between images within the space of diffeomorphic maps and estimates both forward and inverse transformations simultaneously. We evaluate our method on 3D image registration with a large scale brain image dataset. Our method achieves state-of-the-art registration accuracy and running time while maintaining desirable diffeomorphic properties.", "fno": "716800e643", "keywords": [ "Brain", "Deformation", "Image Registration", "Learning Artificial Intelligence", "Medical Image Processing", "Neural Nets", "3 D Image Registration", "Scale Brain Image Dataset", "State Of The Art Registration Accuracy", "Running Time", "Desirable Diffeomorphic Properties", "Fast Symmetric Diffeomorphic Image Registration", "Convolutional Neural Network", "Diffeomorphic Deformable Image Registration", "Medical Image Studies", "Special Features Including Topology Preservation", "Recent Deep Learning Based Deformable Image Registration Methods", "Fast Image Registration", "Spatial Transformation", "Synthetic Ground Truth", "Global Smoothing Energy Function", "Deep Learning Based Approaches", "Inverse Transformation", "Efficient Unsupervised Symmetric Image Registration Method", "Diffeomorphic Maps", "Image Registration", "Strain", "Topology", "Three Dimensional Displays", "Deformable Models", "Convolutional Neural Networks", "Brain" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology", "fullName": "Tony C.W. Mok", "givenName": "Tony C.W.", "surname": "Mok", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology", "fullName": "Albert C.S. Chung", "givenName": "Albert C.S.", "surname": "Chung", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "4643-4652", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800e633", "articleId": "1m3oh7ILqRq", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800e653", "articleId": "1m3os132gw0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2016/1437/0/1437a549", "title": "Population Shape Collapse in Large Deformation Registration of MR Brain Images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437a549/12OmNBc1uxU", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paciia/2008/3490/2/3490c201", "title": "Automatic Contour Generation of 4D CT by Deformable Registration", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490c201/12OmNxEBziL", "parentPublication": { "id": "paciia/2008/3490/2", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1997/7822/0/78221041", "title": "A Hybrid Framework for Surface Registration and Deformable Models", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1997/78221041/12OmNxTEiPy", "parentPublication": { "id": "proceedings/cvpr/1997/7822/0", "title": "Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2008/3243/0/3243a223", "title": "Fast Deformable Registration on the GPU: A CUDA Implementation of Demons", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2008/3243a223/12OmNxeut4x", "parentPublication": { "id": "proceedings/iccsa/2008/3243/0", "title": "2008 International Conference on Computational Sciences and Its Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/07/07987758", "title": "Collocation for Diffeomorphic Deformations in Medical Image Registration", "doi": null, "abstractUrl": "/journal/tp/2018/07/07987758/13rRUILc8gv", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a119", "title": "A variational Bayesian method for similarity learning in non-rigid image registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a119/1H1hKHuMzD2", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956119", "title": "Towards Positive Jacobian: Learn to Postprocess for Diffeomorphic Image Registration with Matrix Exponential", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956119/1IHoZfULyW4", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994849", "title": "Deep Learning Based Parametrization of Diffeomorphic Image Registration for the Application of Cardiac Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994849/1JC2JbxQmOY", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600b869", "title": "Diffeomorphic Image Registration with Neural Velocity Field", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600b869/1KxUErB8qwE", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09551747", "title": "Learning Deformable Image Registration From Optimization: Perspective, Modules, Bilevel Training and Beyond", "doi": null, "abstractUrl": "/journal/tp/2022/11/09551747/1xgx1kQT1Kg", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBKmXfp", "title": "Proceedings Visualization '92", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvbq", "doi": "10.1109/VISUAL.1992.235204", "title": "A scientific visualization renderer", "normalizedTitle": "A scientific visualization renderer", "abstract": "While scientific visualization systems share many requirements with other graphical applications, they also have special requirements that make solutions based on standard rendering hardware or software not entirely satisfactory. Those requirements are illustrated by describing the renderer used in a production scientific visualization system, Data Explorer. The requirements for a visualization renderer are discussed. Implementation techniques used to meet the requirements of parallelism, volume rendering of irregular data, clipping, and integration of rendering modalities are described. The renderer described is a software renderer, but it is hoped that the requirements and implementation presented might influence the design of future generations of rendering hardware.<>", "abstracts": [ { "abstractType": "Regular", "content": "While scientific visualization systems share many requirements with other graphical applications, they also have special requirements that make solutions based on standard rendering hardware or software not entirely satisfactory. Those requirements are illustrated by describing the renderer used in a production scientific visualization system, Data Explorer. The requirements for a visualization renderer are discussed. Implementation techniques used to meet the requirements of parallelism, volume rendering of irregular data, clipping, and integration of rendering modalities are described. The renderer described is a software renderer, but it is hoped that the requirements and implementation presented might influence the design of future generations of rendering hardware.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While scientific visualization systems share many requirements with other graphical applications, they also have special requirements that make solutions based on standard rendering hardware or software not entirely satisfactory. Those requirements are illustrated by describing the renderer used in a production scientific visualization system, Data Explorer. The requirements for a visualization renderer are discussed. Implementation techniques used to meet the requirements of parallelism, volume rendering of irregular data, clipping, and integration of rendering modalities are described. The renderer described is a software renderer, but it is hoped that the requirements and implementation presented might influence the design of future generations of rendering hardware.", "fno": "00235204", "keywords": [ "Data Visualisation", "Rendering Computer Graphics", "Scientific Visualization Renderer", "Data Explorer", "Parallelism", "Volume Rendering", "Irregular Data", "Clipping", "Rendering Modalities", "Rendering Computer Graphics", "Data Visualization", "Application Software", "Hardware", "Graphics", "Parallel Processing", "Aerospace Simulation", "Software Standards", "Production Systems", "Communication System Software" ], "authors": [ { "affiliation": "IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA", "fullName": "B. Lucas", "givenName": "B.", "surname": "Lucas", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "227,228,229,230,231,232,233,234", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00235203", "articleId": "12OmNzWx01t", "__typename": "AdjacentArticleType" }, "next": { "fno": "00235205", "articleId": "12OmNBubOVG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/supercomputing/1996/854/0/01392885", "title": "STREN: A Highly Scalable Parallel Stereo Terrain Renderer for Planetary Mission Simulations", "doi": null, "abstractUrl": "/proceedings-article/supercomputing/1996/01392885/12OmNC8MsyN", "parentPublication": { "id": "proceedings/supercomputing/1996/854/0", "title": "Proceedings of the 1996 ACM/IEEE Conference on Supercomputing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175811", "title": "A scientific visualization synthesizer", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175811/12OmNqGA538", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmpc/1992/2772/0/00234874", "title": "Scientific visualization theatre", "doi": null, "abstractUrl": "/proceedings-article/fmpc/1992/00234874/12OmNqHItD0", "parentPublication": { "id": "proceedings/fmpc/1992/2772/0", "title": "The Fourth Symposium on the Frontiers of Massively Parallel Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vv/2004/8781/0/87810009", "title": "A Fast High Accuracy Volume Renderer for Unstructured Data", "doi": null, "abstractUrl": "/proceedings-article/vv/2004/87810009/12OmNs0kyFD", "parentPublication": { "id": "proceedings/vv/2004/8781/0", "title": "Volume Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892246", "title": "Enhancements to VTK enabling scientific visualization in immersive environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892246/12OmNvmG7ZP", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2015/7673/0/7673a260", "title": "Linking Visualization and Scientific Understanding through Interactive Rendering of Large-Scale Data in Parallel Environment", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2015/7673a260/12OmNyRPgJQ", "parentPublication": { "id": "proceedings/icvrv/2015/7673/0", "title": "2015 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539599", "title": "OSPRay - A CPU Ray Tracing Framework for Scientific Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539599/13rRUyfKIHS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d907", "title": "Neural 3D Mesh Renderer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d907/17D45WHONlu", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08523628", "title": "Scientific Visualization as a Microservice", "doi": null, "abstractUrl": "/journal/tg/2020/04/08523628/17D45WaTkiH", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d992", "title": "GenDR: A Generalized Differentiable Renderer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d992/1H1hFjzHeDu", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBkfy", "title": "1991 Proceeding Visualization", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGA538", "doi": "10.1109/VISUAL.1991.175811", "title": "A scientific visualization synthesizer", "normalizedTitle": "A scientific visualization synthesizer", "abstract": "Methods for displaying scientific data using textures and raster operations rather than geometric techniques are described. The flexibility and simplicity of raster operations allow a greater choice of visualization techniques with only a small set of basic operations. In addition, texture mapping techniques that allow the representation of several variables simultaneously, without a high degree of clutter, are shown. The combination of traditional geometric techniques, image composition techniques, and image rendering techniques can be integrated into a single framework for the display of scientific data. A system for generating and operating on textures and images for the purposes of scientific visualization is presented. To illustrate its advantage, the development of bump maps for vector filters and contour lines is demonstrated.<>", "abstracts": [ { "abstractType": "Regular", "content": "Methods for displaying scientific data using textures and raster operations rather than geometric techniques are described. The flexibility and simplicity of raster operations allow a greater choice of visualization techniques with only a small set of basic operations. In addition, texture mapping techniques that allow the representation of several variables simultaneously, without a high degree of clutter, are shown. The combination of traditional geometric techniques, image composition techniques, and image rendering techniques can be integrated into a single framework for the display of scientific data. A system for generating and operating on textures and images for the purposes of scientific visualization is presented. To illustrate its advantage, the development of bump maps for vector filters and contour lines is demonstrated.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Methods for displaying scientific data using textures and raster operations rather than geometric techniques are described. The flexibility and simplicity of raster operations allow a greater choice of visualization techniques with only a small set of basic operations. In addition, texture mapping techniques that allow the representation of several variables simultaneously, without a high degree of clutter, are shown. The combination of traditional geometric techniques, image composition techniques, and image rendering techniques can be integrated into a single framework for the display of scientific data. A system for generating and operating on textures and images for the purposes of scientific visualization is presented. To illustrate its advantage, the development of bump maps for vector filters and contour lines is demonstrated.", "fno": "00175811", "keywords": [ "Computer Graphics", "Data Analysis", "Scientific Visualization Synthesizer", "Textures", "Raster Operations", "Geometric Techniques", "Image Composition Techniques", "Image Rendering Techniques", "Scientific Data", "Bump Maps", "Vector Filters", "Contour Lines", "Synthesizers", "Rendering Computer Graphics", "Data Visualization", "Laboratories", "Simultaneous Localization And Mapping", "Displays", "Filters", "Graphics", "Workstations", "Pixel" ], "authors": [ { "affiliation": "Lawrence Livermore Nat. Lab., CA, USA", "fullName": "R.A. Crawfis", "givenName": "R.A.", "surname": "Crawfis", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Livermore Nat. Lab., CA, USA", "fullName": "M.J. Allison", "givenName": "M.J.", "surname": "Allison", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "262,263,264,265,266,267", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00175810", "articleId": "12OmNxaNGlL", "__typename": "AdjacentArticleType" }, "next": { "fno": "00175812", "articleId": "12OmNzd7bvC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visual/1992/2897/0/00235204", "title": "A scientific visualization renderer", "doi": null, "abstractUrl": "/proceedings-article/visual/1992/00235204/12OmNAkWvbq", "parentPublication": { "id": "proceedings/visual/1992/2897/0", "title": "Proceedings Visualization '92", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175767", "title": "Scientific visualization from inside the metacomputer", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175767/12OmNAnuTmT", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175835", "title": "Designing a distributed scientific visualization tool", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175835/12OmNBfZSlm", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1989/1909/0/00301951", "title": "Engineering and scientific visualization using high-performance graphics workstations", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1989/00301951/12OmNC3FGb4", "parentPublication": { "id": "proceedings/cmpcon/1989/1909/0", "title": "COMPCON Spring 89", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmpc/1992/2772/0/00234874", "title": "Scientific visualization theatre", "doi": null, "abstractUrl": "/proceedings-article/fmpc/1992/00234874/12OmNqHItD0", "parentPublication": { "id": "proceedings/fmpc/1992/2772/0", "title": "The Fourth Symposium on the Frontiers of Massively Parallel Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpcon/1992/2655/0/00186755", "title": "Virtual environments in scientific visualization", "doi": null, "abstractUrl": "/proceedings-article/cmpcon/1992/00186755/12OmNxZBSDn", "parentPublication": { "id": "proceedings/cmpcon/1992/2655/0", "title": "COMPCON Spring 1992", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dvis/2014/6826/0/07160100", "title": "The evolution of three dimensional visualization for commanding the Mars rovers", "doi": null, "abstractUrl": "/proceedings-article/3dvis/2014/07160100/12OmNzw8jft", "parentPublication": { "id": "proceedings/3dvis/2014/6826/0", "title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/02/mcg2010020008", "title": "Integrating Visualization and Interaction Research to Improve Scientific Workflows", "doi": null, "abstractUrl": "/magazine/cg/2010/02/mcg2010020008/13rRUxBrGjo", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/04/08523628", "title": "Scientific Visualization as a Microservice", "doi": null, "abstractUrl": "/journal/tg/2020/04/08523628/17D45WaTkiH", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/drbsd-5/2019/6017/0/601700a001", "title": "Understanding Performance-Quality Trade-offs in Scientific Visualization Workflows with Lossy Compression", "doi": null, "abstractUrl": "/proceedings-article/drbsd-5/2019/601700a001/1gAwQKdZ9fi", "parentPublication": { "id": "proceedings/drbsd-5/2019/6017/0", "title": "2019 IEEE/ACM 5th International Workshop on Data Analysis and Reduction for Big Scientific Data (DRBSD-5)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }