data
dict |
|---|
{
"proceeding": {
"id": "12OmNrNh0vw",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"acronym": "icpr",
"groupId": "1000545",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAZOJUV",
"doi": "10.1109/ICPR.2014.716",
"title": "Discriminative Directional Texture and Color for Robust Target Tracking",
"normalizedTitle": "Discriminative Directional Texture and Color for Robust Target Tracking",
"abstract": "An efficient algorithm is proposed that enhances the traditional mean-shift color histogram based object tracking approaches. We propose prominent local directional pattern variance (LDPT) that can extract directional texture responses and with color we develop a color-texture histogram representation for the target. Experiments show superior performance that allows target to go under complex environment like illumination change, similar background color on which traditional methods fail.",
"abstracts": [
{
"abstractType": "Regular",
"content": "An efficient algorithm is proposed that enhances the traditional mean-shift color histogram based object tracking approaches. We propose prominent local directional pattern variance (LDPT) that can extract directional texture responses and with color we develop a color-texture histogram representation for the target. Experiments show superior performance that allows target to go under complex environment like illumination change, similar background color on which traditional methods fail.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "An efficient algorithm is proposed that enhances the traditional mean-shift color histogram based object tracking approaches. We propose prominent local directional pattern variance (LDPT) that can extract directional texture responses and with color we develop a color-texture histogram representation for the target. Experiments show superior performance that allows target to go under complex environment like illumination change, similar background color on which traditional methods fail.",
"fno": "06977428",
"keywords": [
"Image Colour Analysis",
"Image Texture",
"Target Tracking",
"Discriminative Directional Texture",
"Robust Target Tracking",
"Mean Shift Color Histogram Based Object Tracking Approach",
"Discriminative Directional Color",
"Directional Pattern Variance",
"LDPT",
"Directional Texture Responses Extraction",
"Color Texture Histogram Representation",
"Illumination Change",
"Similar Background Color",
"Target Tracking",
"Histograms",
"Image Color Analysis",
"Color",
"Kernel",
"Lighting"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci. & Eng., Indep. Univ. Bangladesh, Dhaka, Bangladesh",
"fullName": "Mahbub Murshed",
"givenName": "Mahbub",
"surname": "Murshed",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Comput. Sci. & Eng., East West Univ., Dhaka, Bangladesh",
"fullName": "Taskeed Jabid",
"givenName": "Taskeed",
"surname": "Jabid",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mobile R&D office, Mobile Comm., Samsung Electron. Co., Ltd., South Korea",
"fullName": "S. M. Zahid Ishraque",
"givenName": "S. M.",
"surname": "Zahid Ishraque",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-08-01T00:00:00",
"pubType": "proceedings",
"pages": "4176-4181",
"year": "2014",
"issn": "1051-4651",
"isbn": "978-1-4799-5209-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06977427",
"articleId": "12OmNqFJhNU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06977429",
"articleId": "12OmNyRg4eE",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2014/5209/0/5209c453",
"title": "A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209c453/12OmNA14Adb",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micai/2007/3124/0/3124a131",
"title": "Color Texture Histograms for Natural Images Interpretation",
"doi": null,
"abstractUrl": "/proceedings-article/micai/2007/3124a131/12OmNqI04PG",
"parentPublication": {
"id": "proceedings/micai/2007/3124/0",
"title": "2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pets/2013/5649/0/06523793",
"title": "Improved mean shift for multi-target tracking",
"doi": null,
"abstractUrl": "/proceedings-article/pets/2013/06523793/12OmNwwd2WG",
"parentPublication": {
"id": "proceedings/pets/2013/5649/0",
"title": "2013 IEEE International Workshop on Performance Evaluation of Tracking and Surveillance (PETS 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iptc/2010/4196/0/4196a626",
"title": "Particle Filtering Object Tracking Based on Texture and Color",
"doi": null,
"abstractUrl": "/proceedings-article/iptc/2010/4196a626/12OmNx5piYa",
"parentPublication": {
"id": "proceedings/iptc/2010/4196/0",
"title": "Intelligence Information Processing and Trusted Computing, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csma/2015/9166/0/9166a170",
"title": "A Template Update Cam Shift Algorithm Based on LTP Texture",
"doi": null,
"abstractUrl": "/proceedings-article/csma/2015/9166a170/12OmNxEjY4a",
"parentPublication": {
"id": "proceedings/csma/2015/9166/0",
"title": "2015 International Conference on Computer Science and Mechanical Automation (CSMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icgciot/2015/7910/0/07380556",
"title": "Image retrieval using color and texture binary patterns",
"doi": null,
"abstractUrl": "/proceedings-article/icgciot/2015/07380556/12OmNy5zspY",
"parentPublication": {
"id": "proceedings/icgciot/2015/7910/0",
"title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363082",
"title": "Online Pedestrian Tracking Using Ensemble Color Feature",
"doi": null,
"abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363082/12OmNzTppEx",
"parentPublication": {
"id": "proceedings/cit-iucc-dasc-picom/2015/0154/0",
"title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338569",
"title": "Particle filter based moving object tracking with adaptive observation model",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338569/12OmNzYwc5z",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisce/2018/5500/0/550000a112",
"title": "An Algorithm for Improving the Accuracy and Real-Time of Target Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2018/550000a112/17D45VTRop2",
"parentPublication": {
"id": "proceedings/icisce/2018/5500/0",
"title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnisc/2022/5351/0/535100a328",
"title": "Target Tracking Based on Spatiotemporal Saliency and Multiscale Appearance Cue Fusion",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2022/535100a328/1KYt0aYr3by",
"parentPublication": {
"id": "proceedings/icnisc/2022/5351/0",
"title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAkWvaW",
"title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)",
"acronym": "cis",
"groupId": "1001517",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC4eSBT",
"doi": "10.1109/CIS.2014.63",
"title": "Vehicle Color Recognition Based on License Plate Color",
"normalizedTitle": "Vehicle Color Recognition Based on License Plate Color",
"abstract": "As a significant feature of vehicle, the color feature plays an important role in the intelligent transportation systems. However, the color feature is easily affected by the variations of the lighting condition. In this paper, we present a new method for vehicle color recognition, which is based on license plate color. The color of license plate is recognized by the prior knowledge and the recognition result of the license plate, which is not sensitive to the variations of lighting condition. We select the vehicle ROI (region of interest) near the license plate, and convert the color space of the plate image and the vehicle ROI image from RGB to HSV. The vehicle color is identified by the relative location of the ROI color and the plate color in the spectrum. We verify the feasibility of our approach through a comparison experiment. Experiment results show that the color of license plate is helpful to recognize the vehicle color.",
"abstracts": [
{
"abstractType": "Regular",
"content": "As a significant feature of vehicle, the color feature plays an important role in the intelligent transportation systems. However, the color feature is easily affected by the variations of the lighting condition. In this paper, we present a new method for vehicle color recognition, which is based on license plate color. The color of license plate is recognized by the prior knowledge and the recognition result of the license plate, which is not sensitive to the variations of lighting condition. We select the vehicle ROI (region of interest) near the license plate, and convert the color space of the plate image and the vehicle ROI image from RGB to HSV. The vehicle color is identified by the relative location of the ROI color and the plate color in the spectrum. We verify the feasibility of our approach through a comparison experiment. Experiment results show that the color of license plate is helpful to recognize the vehicle color.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "As a significant feature of vehicle, the color feature plays an important role in the intelligent transportation systems. However, the color feature is easily affected by the variations of the lighting condition. In this paper, we present a new method for vehicle color recognition, which is based on license plate color. The color of license plate is recognized by the prior knowledge and the recognition result of the license plate, which is not sensitive to the variations of lighting condition. We select the vehicle ROI (region of interest) near the license plate, and convert the color space of the plate image and the vehicle ROI image from RGB to HSV. The vehicle color is identified by the relative location of the ROI color and the plate color in the spectrum. We verify the feasibility of our approach through a comparison experiment. Experiment results show that the color of license plate is helpful to recognize the vehicle color.",
"fno": "7434a264",
"keywords": [
"Image Color Analysis",
"Licenses",
"Color",
"Space Vehicles",
"Accuracy",
"Lighting",
"Spectrum",
"Vehicle Color Recognition",
"License Plate Color",
"HSV",
"Color Space"
],
"authors": [
{
"affiliation": null,
"fullName": "Yanmei Dong",
"givenName": "Yanmei",
"surname": "Dong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mingtao Pei",
"givenName": "Mingtao",
"surname": "Pei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiameng Qin",
"givenName": "Xiameng",
"surname": "Qin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-11-01T00:00:00",
"pubType": "proceedings",
"pages": "264-267",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-7434-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7434a260",
"articleId": "12OmNrkBwxO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7434a268",
"articleId": "12OmNy3AgBL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csci/2016/5510/0/07881455",
"title": "An Approach of Locating Korean Vehicle License Plate Based on Mathematical Morphology and Geometrical Features",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2016/07881455/12OmNAIdBUg",
"parentPublication": {
"id": "proceedings/csci/2016/5510/0",
"title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grc/2010/7964/0/05576175",
"title": "An Efficient Method for Correcting Vehicle License Plate Tilt",
"doi": null,
"abstractUrl": "/proceedings-article/grc/2010/05576175/12OmNvAAtEf",
"parentPublication": {
"id": "proceedings/grc/2010/7964/0",
"title": "2010 IEEE International Conference on Granular Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1994/6952/2/00413580",
"title": "Automatic recognition of a car license plate using color image processing",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1994/00413580/12OmNviZlK0",
"parentPublication": {
"id": "proceedings/icip/1994/6952/2",
"title": "Proceedings of 1st International Conference on Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2017/2939/0/08078467",
"title": "Suspected vehicle detection for driving without license plate using symmelets and edge connectivity",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2017/08078467/12OmNwe2IzF",
"parentPublication": {
"id": "proceedings/avss/2017/2939/0",
"title": "2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifita/2010/7621/2/05634808",
"title": "A Simple and Fast Method of Recognizing License Plate Number",
"doi": null,
"abstractUrl": "/proceedings-article/ifita/2010/05634808/12OmNwoPtAT",
"parentPublication": {
"id": "proceedings/ifita/2010/7621/2",
"title": "2010 International Forum on Information Technology and Applications (IFITA 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2015/6593/0/6593a336",
"title": "License Plate Location Based on Quantum Particle Swarm Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2015/6593a336/12OmNxZ2Giu",
"parentPublication": {
"id": "proceedings/dcabes/2015/6593/0",
"title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2007/2875/2/28750180",
"title": "An Efficient Method of Locating Vehicle License Plate",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2007/28750180/12OmNyQphcn",
"parentPublication": {
"id": "proceedings/icnc/2007/2875/2",
"title": "Third International Conference on Natural Computation (ICNC 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dmamh/2007/3065/0/30650042",
"title": "A Yellow License Plate Location Method Based on RGB Model of Color Image and Texture of Plate",
"doi": null,
"abstractUrl": "/proceedings-article/dmamh/2007/30650042/12OmNzgNY0t",
"parentPublication": {
"id": "proceedings/dmamh/2007/3065/0",
"title": "Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dmamh/2007/3065/0/30650047",
"title": "Color Prior Knowledge-Based License Plate Location Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/dmamh/2007/30650047/12OmNzlD9wA",
"parentPublication": {
"id": "proceedings/dmamh/2007/3065/0",
"title": "Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2016/4840/0/4840a403",
"title": "License Plate Segmentation and Recognition of Chinese Vehicle Based on BPNN",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2016/4840a403/12OmNzlUKtB",
"parentPublication": {
"id": "proceedings/cis/2016/4840/0",
"title": "2016 12th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1FY1bDsyg6Y",
"title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)",
"acronym": "cacml",
"groupId": "1847344",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1FY1nyrNpqE",
"doi": "10.1109/CACML55074.2022.00046",
"title": "Color image enhancement algorithm based on improved Retinex algorithm",
"normalizedTitle": "Color image enhancement algorithm based on improved Retinex algorithm",
"abstract": "In order to solve the problem of low expressiveness caused by color distortion and poor saturation when performing image enhancement with classic Retinex algorithm, this paper proposes a color image enhancement algorithm base on the improved Retinex algorithm. In this algorithm, the input image is decomposed into illumination component and reflection component base on Retinex theory first, then logarithmic transfor-mation and Gaussian filtering are performed on the illumination component of HSV color space to approximate the visual system's perception intensity to physical reflectance. Next, the estimated illumination value of scene is used to adjust the multi-scale reflection components of the input image, and to obtain a preliminarily enhanced image. Finally, a color correction factor is introduced into the initial enhanced image to obtain the final enhanced image base on gray world hypothesis. Experimental results show that compared with several classical Retinex algorithms, the proposed algorithm can effectively improve the brightness, contrast and visual information fidelity of the input image without color distortion.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to solve the problem of low expressiveness caused by color distortion and poor saturation when performing image enhancement with classic Retinex algorithm, this paper proposes a color image enhancement algorithm base on the improved Retinex algorithm. In this algorithm, the input image is decomposed into illumination component and reflection component base on Retinex theory first, then logarithmic transfor-mation and Gaussian filtering are performed on the illumination component of HSV color space to approximate the visual system's perception intensity to physical reflectance. Next, the estimated illumination value of scene is used to adjust the multi-scale reflection components of the input image, and to obtain a preliminarily enhanced image. Finally, a color correction factor is introduced into the initial enhanced image to obtain the final enhanced image base on gray world hypothesis. Experimental results show that compared with several classical Retinex algorithms, the proposed algorithm can effectively improve the brightness, contrast and visual information fidelity of the input image without color distortion.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to solve the problem of low expressiveness caused by color distortion and poor saturation when performing image enhancement with classic Retinex algorithm, this paper proposes a color image enhancement algorithm base on the improved Retinex algorithm. In this algorithm, the input image is decomposed into illumination component and reflection component base on Retinex theory first, then logarithmic transfor-mation and Gaussian filtering are performed on the illumination component of HSV color space to approximate the visual system's perception intensity to physical reflectance. Next, the estimated illumination value of scene is used to adjust the multi-scale reflection components of the input image, and to obtain a preliminarily enhanced image. Finally, a color correction factor is introduced into the initial enhanced image to obtain the final enhanced image base on gray world hypothesis. Experimental results show that compared with several classical Retinex algorithms, the proposed algorithm can effectively improve the brightness, contrast and visual information fidelity of the input image without color distortion.",
"fno": "829000a234",
"keywords": [
"Brightness",
"Gaussian Processes",
"Image Colour Analysis",
"Image Enhancement",
"Image Filtering",
"Illumination Component",
"Reflection Component Base",
"HSV Color Space",
"Visual System",
"Multiscale Reflection Components",
"Color Correction Factor",
"Color Distortion",
"Retinex Algorithm",
"Color Image Enhancement",
"Gaussian Filtering",
"Visualization",
"Machine Learning Algorithms",
"Image Color Analysis",
"Brightness",
"Lighting",
"Color",
"Distortion",
"Image Enhancement",
"Retinex Algorithm",
"Im Proved Grayscale World Hypothesis"
],
"authors": [
{
"affiliation": "Beijing University of Posts and Telecommunications, School of computer science(national pilot software engineering school BUPT),Beijing,China",
"fullName": "Yuhang Gao",
"givenName": "Yuhang",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing University of Posts and Telecommunications,BUPT,Beijing,China",
"fullName": "Chuhao Su",
"givenName": "Chuhao",
"surname": "Su",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing University of Posts and Telecommunications,BUPT,Beijing,China",
"fullName": "Zhaoheng Xu",
"givenName": "Zhaoheng",
"surname": "Xu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cacml",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-03-01T00:00:00",
"pubType": "proceedings",
"pages": "234-238",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8290-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "829000a228",
"articleId": "1FY1dKvynjG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "829000a239",
"articleId": "1FY1fWgm8eI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icisce/2016/2535/0/2535a083",
"title": "A Novel Illumination Compensation Method with Enhanced Retinex",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2016/2535a083/12OmNBpVPTp",
"parentPublication": {
"id": "proceedings/icisce/2016/2535/0",
"title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fit/2013/2503/0/2293a119",
"title": "A Color Image Enhancement Technique Using Multiscale Retinex",
"doi": null,
"abstractUrl": "/proceedings-article/fit/2013/2293a119/12OmNCgJe5q",
"parentPublication": {
"id": "proceedings/fit/2013/2503/0",
"title": "2013 11th International Conference on Frontiers of Information Technology (FIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2013/3211/0/3211a043",
"title": "Adaptive Multiscale Retinex for Image Contrast Enhancement",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2013/3211a043/12OmNylKAIs",
"parentPublication": {
"id": "proceedings/sitis/2013/3211/0",
"title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwecai/2022/7997/0/799700a196",
"title": "Fog image enhancement algorithm based on improved Retinex algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/iwecai/2022/799700a196/1CugoRvNIY0",
"parentPublication": {
"id": "proceedings/iwecai/2022/7997/0",
"title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a226",
"title": "Improved Retinex for low illumination image enhancement of nighttime traffic",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a226/1FUVQUrSrS0",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icftic/2022/2195/0/10075220",
"title": "RADFNet: A Low Illumination Image Enhancement Network Based on Retinex Model and Attention Mechanism",
"doi": null,
"abstractUrl": "/proceedings-article/icftic/2022/10075220/1LRlevyGzv2",
"parentPublication": {
"id": "proceedings/icftic/2022/2195/0",
"title": "2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisce/2019/3681/0/368100a249",
"title": "McCann's Retinex Enhancement Method Based on YUV for Space Station Image",
"doi": null,
"abstractUrl": "/proceedings-article/cisce/2019/368100a249/1cI5X9G1hgA",
"parentPublication": {
"id": "proceedings/cisce/2019/3681/0",
"title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200b186",
"title": "RDGAN: Retinex Decomposition Based Adversarial Learning for Low-Light Enhancement",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200b186/1cdOEOtxHby",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icwcsg/2021/2598/0/259800a241",
"title": "Low Illumination Image Enhancement Algorithm Combining Homomorphic Filtering and Retinex",
"doi": null,
"abstractUrl": "/proceedings-article/icwcsg/2021/259800a241/1yQBb3dzBfO",
"parentPublication": {
"id": "proceedings/icwcsg/2021/2598/0",
"title": "2021 International Conference on Wireless Communications and Smart Grid (ICWCSG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bcd/2021/7681/0/09581466",
"title": "A Low-illumination Image Enhancement Algorithm Based on Morphological-Retinex(MR) Operator",
"doi": null,
"abstractUrl": "/proceedings-article/bcd/2021/09581466/1yg0JuD9yQU",
"parentPublication": {
"id": "proceedings/bcd/2021/7681/0",
"title": "2021 IEEE/ACIS 6th International Conference on Big Data, Cloud Computing, and Data Science (BCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G55WEFExd6",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G56OCTnopq",
"doi": "10.1109/CVPRW56347.2022.00247",
"title": "CoRe: Color Regression for Multicolor Fashion Garments",
"normalizedTitle": "CoRe: Color Regression for Multicolor Fashion Garments",
"abstract": "Developing deep networks that analyze fashion garments has many real-world applications. Among all fashion attributes, color is one of the most important yet challenging to detect. Existing approaches are classification-based and thus cannot go beyond the list of discrete predefined color names. In this paper, we handle color detection as a regression problem to predict the exact RGB values. That’s why in addition to a first color classifier, we include a second regression stage for refinement in our newly proposed architecture. This second step combines two attention models: the first depends on the type of clothing, the second depends on the color previously detected by the classifier. Our final prediction is the weighted spatial pooling over the image pixels RGB values, where the illumination has been corrected. This architecture is modular and easily expanded to detect the RGBs of all colors in a multicolor garment. In our experiments, we show the benefits of each component of our architecture.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Developing deep networks that analyze fashion garments has many real-world applications. Among all fashion attributes, color is one of the most important yet challenging to detect. Existing approaches are classification-based and thus cannot go beyond the list of discrete predefined color names. In this paper, we handle color detection as a regression problem to predict the exact RGB values. That’s why in addition to a first color classifier, we include a second regression stage for refinement in our newly proposed architecture. This second step combines two attention models: the first depends on the type of clothing, the second depends on the color previously detected by the classifier. Our final prediction is the weighted spatial pooling over the image pixels RGB values, where the illumination has been corrected. This architecture is modular and easily expanded to detect the RGBs of all colors in a multicolor garment. In our experiments, we show the benefits of each component of our architecture.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Developing deep networks that analyze fashion garments has many real-world applications. Among all fashion attributes, color is one of the most important yet challenging to detect. Existing approaches are classification-based and thus cannot go beyond the list of discrete predefined color names. In this paper, we handle color detection as a regression problem to predict the exact RGB values. That’s why in addition to a first color classifier, we include a second regression stage for refinement in our newly proposed architecture. This second step combines two attention models: the first depends on the type of clothing, the second depends on the color previously detected by the classifier. Our final prediction is the weighted spatial pooling over the image pixels RGB values, where the illumination has been corrected. This architecture is modular and easily expanded to detect the RGBs of all colors in a multicolor garment. In our experiments, we show the benefits of each component of our architecture.",
"fno": "873900c251",
"keywords": [
"Clothing",
"Image Classification",
"Image Colour Analysis",
"Object Detection",
"Regression Analysis",
"Color Regression",
"Deep Networks",
"Fashion Garments",
"Real World Applications",
"Fashion Attributes",
"Discrete Predefined Color Names",
"Color Detection",
"Regression Problem",
"Exact RGB Values",
"Color Classifier",
"Regression Stage",
"Attention Models",
"Weighted Spatial Pooling",
"Co Re",
"Multicolor Fashion Garments",
"Image Pixel RGB Values",
"Visualization",
"Computer Vision",
"Image Color Analysis",
"Conferences",
"Clothing",
"Lighting",
"Computer Architecture"
],
"authors": [
{
"affiliation": "Sorbonne Université",
"fullName": "Alexandre Ramé",
"givenName": "Alexandre",
"surname": "Ramé",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sorbonne Université",
"fullName": "Arthur Douillard",
"givenName": "Arthur",
"surname": "Douillard",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Heuritech",
"fullName": "Charles Ollion",
"givenName": "Charles",
"surname": "Ollion",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "2251-2256",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8739-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "873900c246",
"articleId": "1G567IIZwCQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "873900c257",
"articleId": "1G56DrKDlDO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aici/2010/4225/1/4225a072",
"title": "The Color Tag Design and Color Model Study in Mirosot",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2010/4225a072/12OmNBTJINd",
"parentPublication": {
"id": "proceedings/aici/2010/4225/1",
"title": "Artificial Intelligence and Computational Intelligence, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2014/7434/0/7434a264",
"title": "Vehicle Color Recognition Based on License Plate Color",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2014/7434a264/12OmNC4eSBT",
"parentPublication": {
"id": "proceedings/cis/2014/7434/0",
"title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2011/2135/0/06120998",
"title": "A Power Law Transformation Predicting Lightness Conditions Based on Skin Color Space Detection",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2011/06120998/12OmNCga1SI",
"parentPublication": {
"id": "proceedings/trustcom/2011/2135/0",
"title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2012/4711/0/4711a444",
"title": "Class-Based Color Bag of Words for Fashion Retrieval",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2012/4711a444/12OmNqGiu9d",
"parentPublication": {
"id": "proceedings/icme/2012/4711/0",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2017/1034/0/1034c247",
"title": "What Makes a Style: Experimental Analysis of Fashion Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034c247/12OmNwDj17q",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2015/6683/0/6683a951",
"title": "Runway to Realway: Visual Analysis of Fashion",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2015/6683a951/12OmNy6qfN9",
"parentPublication": {
"id": "proceedings/wacv/2015/6683/0",
"title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/1990/2057/0/00139557",
"title": "An approach to color constancy using multiple images",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/1990/00139557/12OmNyoAAaW",
"parentPublication": {
"id": "proceedings/iccv/1990/2057/0",
"title": "Proceedings Third International Conference on Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdsba/2018/8431/0/843100a482",
"title": "Research on Color Expansion Method in Clothing Recommendation System",
"doi": null,
"abstractUrl": "/proceedings-article/icdsba/2018/843100a482/17D45VsBU19",
"parentPublication": {
"id": "proceedings/icdsba/2018/8431/0",
"title": "2018 2nd International Conference on Data Science and Business Analytics (ICDSBA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2022/0915/0/091500d142",
"title": "Tailor Me: An Editing Network for Fashion Attribute Shape Manipulation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500d142/1B12Lbh5SRa",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300f046",
"title": "Fashion++: Minimal Edits for Outfit Improvement",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300f046/1hVlvHKlUt2",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx8OunE",
"title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)",
"acronym": "icmip",
"groupId": "1814744",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCw3zan",
"doi": "10.1109/ICMIP.2017.44",
"title": "Removal of Uneven Illumination in Panorama Using Illumination Transfer",
"normalizedTitle": "Removal of Uneven Illumination in Panorama Using Illumination Transfer",
"abstract": "The composite images in a panorama may be captured in different light conditions, which leads to different colors of the same scene in consecutive images. The existing color smoothing methods only narrow the color difference in the connection of two images. The existing color correction methods fail when the illumination difference is large. So usually there are some seams or color blocks in the resulting panoramas. This paper proposes a new illumination correct and transfer method to keep the color consistency in a panorama. Firstly, it decomposes all the composite images into illumination and reflectance components based on the Retinex theory. Secondly, one of the above illumination components is selected as the ground truth illumination, and other illumination components are adjusted to the ground truth illumination based on a global illumination mapping model. Thirdly, all the adjusted illuminations are transferred back to the original images. Image stitching is performed with these adjusted images. Compared with the state of the art, the proposed method can generate consistent, nature illumination in panoramas without producing color blocks and residual seams, especially when the illumination difference is large.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The composite images in a panorama may be captured in different light conditions, which leads to different colors of the same scene in consecutive images. The existing color smoothing methods only narrow the color difference in the connection of two images. The existing color correction methods fail when the illumination difference is large. So usually there are some seams or color blocks in the resulting panoramas. This paper proposes a new illumination correct and transfer method to keep the color consistency in a panorama. Firstly, it decomposes all the composite images into illumination and reflectance components based on the Retinex theory. Secondly, one of the above illumination components is selected as the ground truth illumination, and other illumination components are adjusted to the ground truth illumination based on a global illumination mapping model. Thirdly, all the adjusted illuminations are transferred back to the original images. Image stitching is performed with these adjusted images. Compared with the state of the art, the proposed method can generate consistent, nature illumination in panoramas without producing color blocks and residual seams, especially when the illumination difference is large.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The composite images in a panorama may be captured in different light conditions, which leads to different colors of the same scene in consecutive images. The existing color smoothing methods only narrow the color difference in the connection of two images. The existing color correction methods fail when the illumination difference is large. So usually there are some seams or color blocks in the resulting panoramas. This paper proposes a new illumination correct and transfer method to keep the color consistency in a panorama. Firstly, it decomposes all the composite images into illumination and reflectance components based on the Retinex theory. Secondly, one of the above illumination components is selected as the ground truth illumination, and other illumination components are adjusted to the ground truth illumination based on a global illumination mapping model. Thirdly, all the adjusted illuminations are transferred back to the original images. Image stitching is performed with these adjusted images. Compared with the state of the art, the proposed method can generate consistent, nature illumination in panoramas without producing color blocks and residual seams, especially when the illumination difference is large.",
"fno": "5954a286",
"keywords": [
"Image Colour Analysis",
"Image Denoising",
"Image Enhancement",
"Image Segmentation",
"Lighting",
"Smoothing Methods",
"Uneven Illumination",
"Illumination Transfer",
"Composite Images",
"Consecutive Images",
"Color Difference",
"Illumination Difference",
"Color Blocks",
"Color Consistency",
"Reflectance Components",
"Illumination Components",
"Ground Truth Illumination",
"Global Illumination Mapping Model",
"Image Stitching",
"Nature Illumination",
"Color Smoothing Methods",
"Color Correction Methods",
"Lighting",
"Image Color Analysis",
"Reflectivity",
"Smoothing Methods",
"Histograms",
"Ice",
"Complexity Theory"
],
"authors": [
{
"affiliation": null,
"fullName": "Yue Wang",
"givenName": "Yue",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jin Zheng",
"givenName": "Jin",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qiuhao Tao",
"givenName": "Qiuhao",
"surname": "Tao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmip",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-03-01T00:00:00",
"pubType": "proceedings",
"pages": "286-290",
"year": "2017",
"issn": null,
"isbn": "978-1-5090-5954-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5954a281",
"articleId": "12OmNyr8Yf1",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5954a291",
"articleId": "12OmNz61dry",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/1992/2855/0/00223194",
"title": "Controlling illumination color to enhance object discriminability",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1992/00223194/12OmNAZfxNG",
"parentPublication": {
"id": "proceedings/cvpr/1992/2855/0",
"title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761220",
"title": "Illumination invariant spatio-colorimetric normalization",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761220/12OmNB6UIa3",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisce/2016/2535/0/2535a083",
"title": "A Novel Illumination Compensation Method with Enhanced Retinex",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2016/2535a083/12OmNBpVPTp",
"parentPublication": {
"id": "proceedings/icisce/2016/2535/0",
"title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cccrv/2004/2127/0/01301427",
"title": "Recovering the shading image under known illumination",
"doi": null,
"abstractUrl": "/proceedings-article/cccrv/2004/01301427/12OmNvDZF0N",
"parentPublication": {
"id": "proceedings/cccrv/2004/2127/0",
"title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pbmcv/1995/7021/0/00514684",
"title": "Reflectance analysis under solar illumination",
"doi": null,
"abstractUrl": "/proceedings-article/pbmcv/1995/00514684/12OmNxbW4O4",
"parentPublication": {
"id": "proceedings/pbmcv/1995/7021/0",
"title": "Proceedings of the Workshop on Physics-Based Modeling in Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/8391a621",
"title": "Illumination Robust Color Naming via Label Propagation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391a621/12OmNyQ7FTf",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2014/7000/1/7000a039",
"title": "Towards Illumination-Invariant 3D Reconstruction Using ToF RGB-D Cameras",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2014/7000a039/12OmNzT7OpK",
"parentPublication": {
"id": "proceedings/3dv/2014/7000/2",
"title": "2014 2nd International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1991/0003/0/00150912",
"title": "Estimation of illumination for color correction",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1991/00150912/12OmNzYNN8A",
"parentPublication": {
"id": "proceedings/icassp/1991/0003/0",
"title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2009/4420/0/05459239",
"title": "Image segmentation with simultaneous illumination and reflectance estimation: An energy minimization approach",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2009/05459239/12OmNzlUKIf",
"parentPublication": {
"id": "proceedings/iccv/2009/4420/0",
"title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545189",
"title": "Non-uniform Illumination Video Enhancement Based on Zone System and Fusion",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545189/17D45WXIkDg",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBrDqEq",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "2",
"displayVolume": "3",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrGsDpK",
"doi": "10.1109/CVPR.2000.854857",
"title": "360/spl times/360 mosaics",
"normalizedTitle": "360/spl times/360 mosaics",
"abstract": "Current mosaicing methods use narrow field of view cameras to acquire image data. This poses problems when computing a complete spherical mosaic. First, a large number of images are needed to capture a sphere. Second, errors in mosaicing make it difficult to complete the spherical mosaic without seams. Third, with a hand-held camera it is hard for the user to ensure complete coverage of the sphere. This paper presents two approaches to spherical mosaicing. The first is to rotate a 360 degree camera about a single axis to capture a sequence of 360 degree strips. The unknown rotations between the strips are estimated and the strips are blended together to obtain a spherical mosaic. The second approach seeks to significantly enhance the resolution of the computed mosaic by capturing 360 degree slices rather than strips. A variety of slice cameras are proposed that map a thin 360 degree sheet of rays onto a large image area. This results in the capture of high resolution slices despite the use of a low resolution video camera. A slice camera is rotated using a motorized turntable to obtain regular as well as stereoscopic spherical mosaics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Current mosaicing methods use narrow field of view cameras to acquire image data. This poses problems when computing a complete spherical mosaic. First, a large number of images are needed to capture a sphere. Second, errors in mosaicing make it difficult to complete the spherical mosaic without seams. Third, with a hand-held camera it is hard for the user to ensure complete coverage of the sphere. This paper presents two approaches to spherical mosaicing. The first is to rotate a 360 degree camera about a single axis to capture a sequence of 360 degree strips. The unknown rotations between the strips are estimated and the strips are blended together to obtain a spherical mosaic. The second approach seeks to significantly enhance the resolution of the computed mosaic by capturing 360 degree slices rather than strips. A variety of slice cameras are proposed that map a thin 360 degree sheet of rays onto a large image area. This results in the capture of high resolution slices despite the use of a low resolution video camera. A slice camera is rotated using a motorized turntable to obtain regular as well as stereoscopic spherical mosaics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Current mosaicing methods use narrow field of view cameras to acquire image data. This poses problems when computing a complete spherical mosaic. First, a large number of images are needed to capture a sphere. Second, errors in mosaicing make it difficult to complete the spherical mosaic without seams. Third, with a hand-held camera it is hard for the user to ensure complete coverage of the sphere. This paper presents two approaches to spherical mosaicing. The first is to rotate a 360 degree camera about a single axis to capture a sequence of 360 degree strips. The unknown rotations between the strips are estimated and the strips are blended together to obtain a spherical mosaic. The second approach seeks to significantly enhance the resolution of the computed mosaic by capturing 360 degree slices rather than strips. A variety of slice cameras are proposed that map a thin 360 degree sheet of rays onto a large image area. This results in the capture of high resolution slices despite the use of a low resolution video camera. A slice camera is rotated using a motorized turntable to obtain regular as well as stereoscopic spherical mosaics.",
"fno": "00854857",
"keywords": [
"Image Sequences",
"Image Resolution",
"Video Signal Processing",
"360 Spl Times 360 Mosaics",
"Narrow Field Of View Cameras",
"Image Data Acquisition",
"Spherical Mosaicing",
"360 Degree Camera Rotation",
"360 Degree Strip Sequence",
"Resolution",
"360 Degree Slices",
"Slice Cameras",
"Thin 360 Degree Ray Sheet",
"High Resolution Slices",
"Low Resolution Video Camera",
"Motorized Turntable",
"Stereoscopic Spherical Mosaics",
"Cameras",
"Strips",
"Lenses",
"Image Resolution",
"Computer Science",
"Layout",
"Image Sequences",
"Estimation Error",
"Motion Estimation",
"Contracts"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci., Columbia Univ., New York, NY, USA",
"fullName": "S.K. Nayar",
"givenName": "S.K.",
"surname": "Nayar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "A. Karmarkar",
"givenName": "A.",
"surname": "Karmarkar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-01-01T00:00:00",
"pubType": "proceedings",
"pages": "388,389,390,391,392,393,394,395",
"year": "2000",
"issn": "1063-6919",
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06622270",
"articleId": "12OmNxy4N1M",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06622276",
"articleId": "12OmNyQGSgV",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2000/0662/2/00854881",
"title": "Rectified mosaicing: mosaics without the curl",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2000/00854881/12OmNAH5dnl",
"parentPublication": {
"id": "proceedings/cvpr/2000/0662/2",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dimpvt/2012/4873/0/4873a065",
"title": "Dynamic Mosaics",
"doi": null,
"abstractUrl": "/proceedings-article/3dimpvt/2012/4873a065/12OmNqIzgSB",
"parentPublication": {
"id": "proceedings/3dimpvt/2012/4873/0",
"title": "2012 Second International Conference on 3D Imaging, Modeling, Processing, Visualization & Transmission",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2000/0662/2/06622388",
"title": "360 ? 360 Mosaics",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2000/06622388/12OmNvkpldN",
"parentPublication": {
"id": "proceedings/cvpr/2000/0662/2",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2004/8603/2/01394323",
"title": "Mosaic based view enlargement for moving objects in moving pictures",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394323/12OmNwp74sZ",
"parentPublication": {
"id": "proceedings/icme/2004/8603/2",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2000/0662/2/06622459",
"title": "Rectified Mosaicing: Mosaics without the Curl",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2000/06622459/12OmNxGAL43",
"parentPublication": {
"id": "proceedings/cvpr/2000/0662/2",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2001/1272/2/127220072",
"title": "3D Reconstruction from 360 x 360 Mosaics",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2001/127220072/12OmNyNzhxR",
"parentPublication": {
"id": "proceedings/cvpr/2001/1272/2",
"title": "Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2016/0641/0/07477620",
"title": "Constructing image mosaics using focus based depth analysis",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2016/07477620/12OmNyPQ4Rq",
"parentPublication": {
"id": "proceedings/wacv/2016/0641/0",
"title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2017/6647/0/07892271",
"title": "Upright adjustment of 360 spherical panoramas",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892271/12OmNzVoBwZ",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460249",
"title": "Estimating the precision of under-water video-mosaics",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460249/12OmNzZWbCk",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2003/7983/0/01227556",
"title": "A robust multi-primitive approach for image mosaicing",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2003/01227556/12OmNzaQogL",
"parentPublication": {
"id": "proceedings/aiccsa/2003/7983/0",
"title": "ACS/IEEE International Conference on Computer Systems and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxV4itF",
"title": "2017 IEEE Virtual Reality (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzVoBwZ",
"doi": "10.1109/VR.2017.7892271",
"title": "Upright adjustment of 360 spherical panoramas",
"normalizedTitle": "Upright adjustment of 360 spherical panoramas",
"abstract": "With the recent advent of 360 cameras, spherical panorama images are becoming more popular and widely available. In a spherical panorama, alignment of the scene orientation to the image axes is important for providing comfortable and pleasant viewing experiences using VR headsets and traditional displays. This paper presents an automatic framework for upright adjustment of 360 spherical panorama images without any prior information, such as depths and Gyro sensor data. We take the Atlanta world assumption and use the horizontal and vertical lines in the scene to formulate a cost function for upright adjustment. Our method produces visually pleasing results for a variety of real-world spherical panoramas in less than a second.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the recent advent of 360 cameras, spherical panorama images are becoming more popular and widely available. In a spherical panorama, alignment of the scene orientation to the image axes is important for providing comfortable and pleasant viewing experiences using VR headsets and traditional displays. This paper presents an automatic framework for upright adjustment of 360 spherical panorama images without any prior information, such as depths and Gyro sensor data. We take the Atlanta world assumption and use the horizontal and vertical lines in the scene to formulate a cost function for upright adjustment. Our method produces visually pleasing results for a variety of real-world spherical panoramas in less than a second.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the recent advent of 360 cameras, spherical panorama images are becoming more popular and widely available. In a spherical panorama, alignment of the scene orientation to the image axes is important for providing comfortable and pleasant viewing experiences using VR headsets and traditional displays. This paper presents an automatic framework for upright adjustment of 360 spherical panorama images without any prior information, such as depths and Gyro sensor data. We take the Atlanta world assumption and use the horizontal and vertical lines in the scene to formulate a cost function for upright adjustment. Our method produces visually pleasing results for a variety of real-world spherical panoramas in less than a second.",
"fno": "07892271",
"keywords": [
"Cameras",
"Image Segmentation",
"Cost Function",
"Three Dimensional Displays",
"Image Resolution",
"Image Edge Detection",
"Distortion",
"Spherical Panorama",
"Upright Adjustment"
],
"authors": [
{
"affiliation": "POSTECH, Korea",
"fullName": "Jinwoong Jung",
"givenName": "Jinwoong",
"surname": "Jung",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Adobe Research, USA",
"fullName": "Joon-Young Lee",
"givenName": "Joon-Young",
"surname": "Lee",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Adobe Resaerch, USA",
"fullName": "Byungmoon Kim",
"givenName": "Byungmoon",
"surname": "Kim",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "POSTECH, Korea",
"fullName": "Seungyong Lee",
"givenName": "Seungyong",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-01-01T00:00:00",
"pubType": "proceedings",
"pages": "251-252",
"year": "2017",
"issn": "2375-5334",
"isbn": "978-1-5090-6647-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07892270",
"articleId": "12OmNx76TEt",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07892272",
"articleId": "12OmNBqdr3B",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cw/2009/3791/0/3791a096",
"title": "Distortion Correction for Immersive Navigation in Spherical Image Environment",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2009/3791a096/12OmNAJVcFM",
"parentPublication": {
"id": "proceedings/cw/2009/3791/0",
"title": "2009 International Conference on CyberWorlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2000/0662/2/00854857",
"title": "360/spl times/360 mosaics",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2000/00854857/12OmNrGsDpK",
"parentPublication": {
"id": "proceedings/cvpr/2000/0662/2",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2007/1630/0/04409198",
"title": "Orientation and Pose recovery from Spherical Panoramas",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2007/04409198/12OmNxH9Xbd",
"parentPublication": {
"id": "proceedings/iccv/2007/1630/0",
"title": "2007 11th IEEE International Conference on Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/111P1C03",
"title": "Automatic upright adjustment of photographs",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/111P1C03/12OmNxWuibx",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2017/6067/0/08019492",
"title": "Spherical domain rate-distortion optimization for 360-degree video coding",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2017/08019492/12OmNzEmFHn",
"parentPublication": {
"id": "proceedings/icme/2017/6067/0",
"title": "2017 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2022/5670/0/567000a094",
"title": "SphereDepth: Panorama Depth Estimation from Spherical Domain",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2022/567000a094/1KYsrlGXN1m",
"parentPublication": {
"id": "proceedings/3dv/2022/5670/0",
"title": "2022 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798326",
"title": "Deep360Up: A Deep Learning-Based Approach for Automatic VR Image Upright Adjustment",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798326/1cJ14soO4x2",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089526",
"title": "CasualStereo: Casual Capture of Stereo Panoramas with Spherical Structure-from-Motion",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089526/1jIxed7r4Nq",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2423",
"title": "Tangent Images for Mitigating Spherical Distortion",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2423/1m3o7SSxlT2",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412505",
"title": "Generalized Shortest Path-based Superpixels for Accurate Segmentation of Spherical Images",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412505/1tmjVnYFpSM",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCmpcMP",
"title": "IEEE International Conference on Computational Photography (ICCP)",
"acronym": "iccp",
"groupId": "1800125",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzgwmPd",
"doi": "10.1109/ICCPHOT.2011.5753115",
"title": "Gigapixel Computational Imaging",
"normalizedTitle": "Gigapixel Computational Imaging",
"abstract": "Today, consumer cameras produce photographs with tens of millions of pixels. The recent trend in image sensor resolution seems to suggest that we will soon have cameras with billions of pixels. However, the resolution of any camera is fundamentally limited by geometric aberrations. We derive a scaling law that shows that, by using computations to correct for aberrations, we can create cameras with unprecedented resolution that have low lens complexity and compact form factor. In this paper, we present an architecture for gigapixel imaging that is compact and utilizes a simple optical design. The architecture consists of a ball lens shared by several small planar sensors, and a post-capture image processing stage. Several variants of this architecture are shown for capturing a contiguous hemispherical field of view as well as a complete spherical field of view. We demonstrate the effectiveness of our architecture by showing example images captured with two proof-of-concept gigapixel cameras.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Today, consumer cameras produce photographs with tens of millions of pixels. The recent trend in image sensor resolution seems to suggest that we will soon have cameras with billions of pixels. However, the resolution of any camera is fundamentally limited by geometric aberrations. We derive a scaling law that shows that, by using computations to correct for aberrations, we can create cameras with unprecedented resolution that have low lens complexity and compact form factor. In this paper, we present an architecture for gigapixel imaging that is compact and utilizes a simple optical design. The architecture consists of a ball lens shared by several small planar sensors, and a post-capture image processing stage. Several variants of this architecture are shown for capturing a contiguous hemispherical field of view as well as a complete spherical field of view. We demonstrate the effectiveness of our architecture by showing example images captured with two proof-of-concept gigapixel cameras.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Today, consumer cameras produce photographs with tens of millions of pixels. The recent trend in image sensor resolution seems to suggest that we will soon have cameras with billions of pixels. However, the resolution of any camera is fundamentally limited by geometric aberrations. We derive a scaling law that shows that, by using computations to correct for aberrations, we can create cameras with unprecedented resolution that have low lens complexity and compact form factor. In this paper, we present an architecture for gigapixel imaging that is compact and utilizes a simple optical design. The architecture consists of a ball lens shared by several small planar sensors, and a post-capture image processing stage. Several variants of this architecture are shown for capturing a contiguous hemispherical field of view as well as a complete spherical field of view. We demonstrate the effectiveness of our architecture by showing example images captured with two proof-of-concept gigapixel cameras.",
"fno": "05753115",
"keywords": [
"Computational Complexity",
"Computational Geometry",
"Image Processing",
"Image Sensors",
"Gigapixel Computational Imaging",
"Consumer Cameras",
"Image Sensor Resolution",
"Geometric Aberrations",
"Lens Complexity",
"Compact Form Factor",
"Ball Lens",
"Planar Sensors",
"Post Capture Image Processing Stage",
"Lenses",
"Cameras",
"Sensor Arrays",
"Image Resolution",
"Pixel"
],
"authors": [
{
"affiliation": "Columbia University, 120th St, New York, 10027, USA",
"fullName": "Oliver S. Cossairt",
"givenName": "Oliver S.",
"surname": "Cossairt",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Columbia University, 120th St, New York, 10027, USA",
"fullName": "Daniel Miau",
"givenName": "Daniel",
"surname": "Miau",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Columbia University, 120th St, New York, 10027, USA",
"fullName": "Shree K. Nayar",
"givenName": "Shree K.",
"surname": "Nayar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-04-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2011",
"issn": null,
"isbn": "978-1-61284-707-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05753131",
"articleId": "1h0GSml6I1O",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05753116",
"articleId": "12OmNvkGW9o",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccp/2010/7023/0/05585092",
"title": "Rich image capture with plenoptic cameras",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2010/05585092/12OmNAYGls3",
"parentPublication": {
"id": "proceedings/iccp/2010/7023/0",
"title": "2010 IEEE International Conference on Computational Photography (ICCP 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2013/3022/0/3022a037",
"title": "External Mask Based Depth and Light Field Camera",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2013/3022a037/12OmNCctfnA",
"parentPublication": {
"id": "proceedings/iccvw/2013/3022/0",
"title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2009/4534/0/05559008",
"title": "The focused plenoptic camera",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2009/05559008/12OmNqI04FS",
"parentPublication": {
"id": "proceedings/iccp/2009/4534/0",
"title": "IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131537",
"title": "Acquiring precise range information from camera motion",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131537/12OmNwogh3d",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851d717",
"title": "Depth from Semi-Calibrated Stereo and Defocus",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851d717/12OmNyQpgXL",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2014/5188/0/06831814",
"title": "Improving resolution and depth-of-field of light field cameras using a hybrid imaging system",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2014/06831814/12OmNyaoDEw",
"parentPublication": {
"id": "proceedings/iccp/2014/5188/0",
"title": "2014 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2011/01/mcg2011010049",
"title": "A Digital Gigapixel Large-Format Tile-Scan Camera",
"doi": null,
"abstractUrl": "/magazine/cg/2011/01/mcg2011010049/13rRUILLkG6",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/10/07744676",
"title": "The Light Field Attachment: Turning a DSLR into a Light Field Camera Using a Low Budget Camera Ring",
"doi": null,
"abstractUrl": "/journal/tg/2017/10/07744676/13rRUxCitJi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/12/ttg2013122886",
"title": "Acuity-Driven Gigapixel Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2013/12/ttg2013122886/13rRUxD9gXI",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800d265",
"title": "PANDA: A Gigapixel-Level Human-Centric Video Dataset",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800d265/1m3nTNCstNe",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H1j2J77tJe",
"doi": "10.1109/CVPR52688.2022.00461",
"title": "Speed up Object Detection on Gigapixel-level Images with Patch Arrangement",
"normalizedTitle": "Speed up Object Detection on Gigapixel-level Images with Patch Arrangement",
"abstract": "With the appearance of super high-resolution (e.g., gigapixel-level) images, performing efficient object detection on such images becomes an important issue. Most ex-isting works for efficient object detection on high-resolution images focus on generating local patches where objects may exist, and then every patch is detected independently. How-ever, when the image resolution reaches gigapixel-level, they will suffer from a huge time cost for detecting numerous patches. Different from them, we devise a novel patch ar-rangement frameworkfor fast object detection on gigapixel-level images. Under this framework, a Patch Arrangement Network (PAN) is proposed to accelerate the detection by determining which patches could be packed together into a compact canvas. Specifically, PAN consists of (1) a Patch Filter Module (PFM) (2) a Patch Packing Module (PPM). PFM filters patch candidates by learning to select patches between two granularities. Subsequently, from the remaining patches, PPM determines how to pack these patches to-gether into a smaller number of canvases. Meanwhile, it generates an ideal layout of patches on canvas. These can-vases are fed to the detector to get final results. Experiments show that our method could improve the inference speed on gigapixel-level images by 5 x while maintaining great performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the appearance of super high-resolution (e.g., gigapixel-level) images, performing efficient object detection on such images becomes an important issue. Most ex-isting works for efficient object detection on high-resolution images focus on generating local patches where objects may exist, and then every patch is detected independently. How-ever, when the image resolution reaches gigapixel-level, they will suffer from a huge time cost for detecting numerous patches. Different from them, we devise a novel patch ar-rangement frameworkfor fast object detection on gigapixel-level images. Under this framework, a Patch Arrangement Network (PAN) is proposed to accelerate the detection by determining which patches could be packed together into a compact canvas. Specifically, PAN consists of (1) a Patch Filter Module (PFM) (2) a Patch Packing Module (PPM). PFM filters patch candidates by learning to select patches between two granularities. Subsequently, from the remaining patches, PPM determines how to pack these patches to-gether into a smaller number of canvases. Meanwhile, it generates an ideal layout of patches on canvas. These can-vases are fed to the detector to get final results. Experiments show that our method could improve the inference speed on gigapixel-level images by 5 x while maintaining great performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the appearance of super high-resolution (e.g., gigapixel-level) images, performing efficient object detection on such images becomes an important issue. Most ex-isting works for efficient object detection on high-resolution images focus on generating local patches where objects may exist, and then every patch is detected independently. How-ever, when the image resolution reaches gigapixel-level, they will suffer from a huge time cost for detecting numerous patches. Different from them, we devise a novel patch ar-rangement frameworkfor fast object detection on gigapixel-level images. Under this framework, a Patch Arrangement Network (PAN) is proposed to accelerate the detection by determining which patches could be packed together into a compact canvas. Specifically, PAN consists of (1) a Patch Filter Module (PFM) (2) a Patch Packing Module (PPM). PFM filters patch candidates by learning to select patches between two granularities. Subsequently, from the remaining patches, PPM determines how to pack these patches to-gether into a smaller number of canvases. Meanwhile, it generates an ideal layout of patches on canvas. These can-vases are fed to the detector to get final results. Experiments show that our method could improve the inference speed on gigapixel-level images by 5 x while maintaining great performance.",
"fno": "694600e643",
"keywords": [
"Image Resolution",
"Object Detection",
"Gigapixel Level Images",
"Object Detection",
"High Resolution Images",
"Patch Candidates",
"Patch Arrangement Network",
"PAN",
"Patch Filter Module",
"PFM",
"Patch Packing Module",
"PPM",
"Computer Vision",
"Image Resolution",
"Image Recognition",
"Costs",
"Layout",
"Object Detection",
"Reinforcement Learning",
"Recognition Detection",
"Categorization",
"Retrieval Efficient Learning And Inferences"
],
"authors": [
{
"affiliation": "Shanghai Jiao Tong University,China",
"fullName": "Jiahao Fan",
"givenName": "Jiahao",
"surname": "Fan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,China",
"fullName": "Huabin Liu",
"givenName": "Huabin",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,China",
"fullName": "Wenjie Yang",
"givenName": "Wenjie",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Heriot- Watt University,Malaysia",
"fullName": "John See",
"givenName": "John",
"surname": "See",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,China",
"fullName": "Aixin Zhang",
"givenName": "Aixin",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University,China",
"fullName": "Weiyao Lin",
"givenName": "Weiyao",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "4643-4653",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "694600e633",
"articleId": "1H0L69YPBXq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600e652",
"articleId": "1H1imhkUdwI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2016/8851/0/8851c424",
"title": "Patch-Based Convolutional Neural Network for Whole Slide Tissue Image Classification",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851c424/12OmNBTawy9",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/117P1C09",
"title": "Reconstruction of super-resolution lung 4D-CT using patch-based sparse representation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/117P1C09/12OmNCy2L1C",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2014/4717/0/06890650",
"title": "Robust face super-resolution via position-patch neighborhood preserving",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2014/06890650/12OmNxaNGjN",
"parentPublication": {
"id": "proceedings/icmew/2014/4717/0",
"title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2014/3244/0/3244a227",
"title": "Efficient Example-Based Super-Resolution of Single Text Images Based on Selective Patch Processing",
"doi": null,
"abstractUrl": "/proceedings-article/das/2014/3244a227/12OmNzZEAsO",
"parentPublication": {
"id": "proceedings/das/2014/3244/0",
"title": "2014 11th IAPR International Workshop on Document Analysis Systems (DAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2011/707/0/05753115",
"title": "Gigapixel Computational Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2011/05753115/12OmNzgwmPd",
"parentPublication": {
"id": "proceedings/iccp/2011/707/0",
"title": "IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2010/08/ttp2010081489",
"title": "The Patch Transform",
"doi": null,
"abstractUrl": "/journal/tp/2010/08/ttp2010081489/13rRUwd9CH7",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/12/ttg2013122886",
"title": "Acuity-Driven Gigapixel Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2013/12/ttg2013122886/13rRUxD9gXI",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600o4953",
"title": "Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600o4953/1H1nh1Xh7S8",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020938",
"title": "Distilling Knowledge from Ensembles of Cluster-Constrained-Attention Multiple-Instance Learners for Whole Slide Image Classification",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020938/1KfQZVea80M",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900c351",
"title": "Differentiable Patch Selection for Image Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900c351/1yeJIg8sdzO",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cJ0xj4MoVO",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"acronym": "icmew",
"groupId": "1801805",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cJ0DlWmsak",
"doi": "10.1109/ICMEW.2019.00079",
"title": "Gigapixel-Level Image Crowd Counting using Csrnet",
"normalizedTitle": "Gigapixel-Level Image Crowd Counting using Csrnet",
"abstract": "In this paper, we introduced our work in gigapixel crowd counting, the main challenges of this task are about three aspects. First, there is no model or device permitting us to train a network using gigapixel image or do detecting straightly on them. So we segment these images into small pieces in size of 19201200 to train our network. The second problem is that all the images contain thousands of people which form extremely congested scenes. Our solution is using Dilated Convolution Neural Network which showed good performance on understanding highly congested scenes. The third thing is about accuracy of counting. We will do three times of counting in different scales(origin, 16 times small, 256 times small) and calculate the weighted mean of them as final result.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we introduced our work in gigapixel crowd counting, the main challenges of this task are about three aspects. First, there is no model or device permitting us to train a network using gigapixel image or do detecting straightly on them. So we segment these images into small pieces in size of 19201200 to train our network. The second problem is that all the images contain thousands of people which form extremely congested scenes. Our solution is using Dilated Convolution Neural Network which showed good performance on understanding highly congested scenes. The third thing is about accuracy of counting. We will do three times of counting in different scales(origin, 16 times small, 256 times small) and calculate the weighted mean of them as final result.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we introduced our work in gigapixel crowd counting, the main challenges of this task are about three aspects. First, there is no model or device permitting us to train a network using gigapixel image or do detecting straightly on them. So we segment these images into small pieces in size of 19201200 to train our network. The second problem is that all the images contain thousands of people which form extremely congested scenes. Our solution is using Dilated Convolution Neural Network which showed good performance on understanding highly congested scenes. The third thing is about accuracy of counting. We will do three times of counting in different scales(origin, 16 times small, 256 times small) and calculate the weighted mean of them as final result.",
"fno": "921400a426",
"keywords": [
"Convolutional Neural Nets",
"Image Segmentation",
"Gigapixel Level Image Crowd Counting",
"Gigapixel Crowd Counting",
"Gigapixel Image",
"Extremely Congested Scenes",
"Highly Congested Scenes",
"Dilated Convolution Neural Network",
"CSR Net",
"Training",
"Task Analysis",
"Agriculture",
"Convolutional Neural Networks",
"Image Resolution",
"Conferences",
"CSR Net",
"Crowd Counting",
"Crowd Density Estimation",
"Multi Scale"
],
"authors": [
{
"affiliation": "Shanghai JiaoTong University",
"fullName": "Zhijie Cao",
"givenName": "Zhijie",
"surname": "Cao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ShanghaiTech University",
"fullName": "Renyou Yan",
"givenName": "Renyou",
"surname": "Yan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai University",
"fullName": "Yiyong Huang",
"givenName": "Yiyong",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yoke Intelligence",
"fullName": "Zhiru Shi",
"givenName": "Zhiru",
"surname": "Shi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmew",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-07-01T00:00:00",
"pubType": "proceedings",
"pages": "426-428",
"year": "2019",
"issn": null,
"isbn": "978-1-5386-9214-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "921400z005",
"articleId": "1cJ0yeLkbQI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "921400z021",
"articleId": "1cJ0C3vlRUQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccp/2011/707/0/05753115",
"title": "Gigapixel Computational Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2011/05753115/12OmNzgwmPd",
"parentPublication": {
"id": "proceedings/iccp/2011/707/0",
"title": "IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600e643",
"title": "Speed up Object Detection on Gigapixel-level Images with Patch Arrangement",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600e643/1H1j2J77tJe",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/02/08809829",
"title": "Neural Image Compression for Gigapixel Histopathology Image Analysis",
"doi": null,
"abstractUrl": "/journal/tp/2021/02/08809829/1cHE1dHMloc",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2019/0990/0/08909889",
"title": "Inverse Attention Guided Deep Crowd Counting Network",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2019/08909889/1febNdRmiwU",
"parentPublication": {
"id": "proceedings/avss/2019/0990/0",
"title": "2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300b002",
"title": "Multi-Level Bottom-Top and Top-Bottom Feature Fusion for Crowd Counting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300b002/1hVlD4YJgQg",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300e521",
"title": "DECCNet: Depth Enhanced Crowd Counting",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300e521/1i5mwlyfScU",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/06/09153156",
"title": "NWPU-Crowd: A Large-Scale Benchmark for Crowd Counting and Localization",
"doi": null,
"abstractUrl": "/journal/tp/2021/06/09153156/1lSW4SQvAZy",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800d265",
"title": "PANDA: A Gigapixel-Level Human-Centric Video Dataset",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800d265/1m3nTNCstNe",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800e705",
"title": "Attention Scaling for Crowd Counting",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800e705/1m3nfPabQBi",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/11/09547729",
"title": "GigaMVS: A Benchmark for Ultra-Large-Scale Gigapixel-Level 3D Reconstruction",
"doi": null,
"abstractUrl": "/journal/tp/2022/11/09547729/1x9Tv1542aY",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy2agRS",
"title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"acronym": "cad-graphics",
"groupId": "1001488",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBQC8er",
"doi": "10.1109/CADGraphics.2013.37",
"title": "Inversion Free and Topology Compatible Tetrahedral Mesh Warping Driven by Boundary Surface Deformation",
"normalizedTitle": "Inversion Free and Topology Compatible Tetrahedral Mesh Warping Driven by Boundary Surface Deformation",
"abstract": "Warping a tetrahedral mesh driven by boundary surface deformation is useful in many applications. Although some methods have been developed to transform the mesh to conform to the deformed boundary surface, it is still a challenging problem to construct an inversion free warped mesh maintaining a compatible topology. In this paper, these two problems are solved by a novel method that combines radial basis function (RBF)-based warping and adaptive mesh refinement. We iteratively transform the mesh using RBF-based warping with a safe step size to ensure that no element is inverted. The use of the RBF-based warping ensures a smooth warping and thus generates a high-quality warped volumetric mesh. To avoid too small step sizes, we refine the elements that are potentially inverted. The refinement is performed on the original and the warped meshes in the same way so as to maintain compatible topology between them. The results of our method can be used in many areas such as finite element simulation and shape interpolation. We demonstrate the effectiveness of our method with a set of examples.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Warping a tetrahedral mesh driven by boundary surface deformation is useful in many applications. Although some methods have been developed to transform the mesh to conform to the deformed boundary surface, it is still a challenging problem to construct an inversion free warped mesh maintaining a compatible topology. In this paper, these two problems are solved by a novel method that combines radial basis function (RBF)-based warping and adaptive mesh refinement. We iteratively transform the mesh using RBF-based warping with a safe step size to ensure that no element is inverted. The use of the RBF-based warping ensures a smooth warping and thus generates a high-quality warped volumetric mesh. To avoid too small step sizes, we refine the elements that are potentially inverted. The refinement is performed on the original and the warped meshes in the same way so as to maintain compatible topology between them. The results of our method can be used in many areas such as finite element simulation and shape interpolation. We demonstrate the effectiveness of our method with a set of examples.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Warping a tetrahedral mesh driven by boundary surface deformation is useful in many applications. Although some methods have been developed to transform the mesh to conform to the deformed boundary surface, it is still a challenging problem to construct an inversion free warped mesh maintaining a compatible topology. In this paper, these two problems are solved by a novel method that combines radial basis function (RBF)-based warping and adaptive mesh refinement. We iteratively transform the mesh using RBF-based warping with a safe step size to ensure that no element is inverted. The use of the RBF-based warping ensures a smooth warping and thus generates a high-quality warped volumetric mesh. To avoid too small step sizes, we refine the elements that are potentially inverted. The refinement is performed on the original and the warped meshes in the same way so as to maintain compatible topology between them. The results of our method can be used in many areas such as finite element simulation and shape interpolation. We demonstrate the effectiveness of our method with a set of examples.",
"fno": "06815000",
"keywords": [
"Topology",
"Silicon",
"Solid Modeling",
"Computational Modeling",
"Design Automation",
"Surface Treatment",
"Trajectory",
"Adaptive Refinement",
"Tetrahedral Mesh",
"RBF Based Mapping",
"Inversion Free Mesh"
],
"authors": [
{
"affiliation": null,
"fullName": "Wenjing Zhang",
"givenName": "Wenjing",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yuewen Ma",
"givenName": "Yuewen",
"surname": "Ma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianmin Zheng",
"givenName": "Jianmin",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cad-graphics",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-11-01T00:00:00",
"pubType": "proceedings",
"pages": "228-235",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-2576-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06814999",
"articleId": "12OmNzcPAd7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06815001",
"articleId": "12OmNxwncFM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2012/1226/0/007P1A07",
"title": "Scene warping: Layer-based stereoscopic image resizing",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/007P1A07/12OmNAiFI8D",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isdea/2014/4261/0/4261a153",
"title": "An Image Warping Technology Based Automatic Ceramic Surface Pattern Generation Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2014/4261a153/12OmNBNM8N5",
"parentPublication": {
"id": "proceedings/isdea/2014/4261/0",
"title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2002/7498/0/7498balmelli",
"title": "Volume Warping for Adaptive Isosurface Extraction",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2002/7498balmelli/12OmNqFJhHx",
"parentPublication": {
"id": "proceedings/ieee-vis/2002/7498/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sma/1997/7867/0/78670205",
"title": "Warping as a Modelling Tool for CSG/Implicit Models",
"doi": null,
"abstractUrl": "/proceedings-article/sma/1997/78670205/12OmNwD1q61",
"parentPublication": {
"id": "proceedings/sma/1997/7867/0",
"title": "Shape Modeling and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cad-graphics/2013/2576/0/06815055",
"title": "Scalable Mesh Deformation with Controllable Stiffness",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2013/06815055/12OmNyS6RAH",
"parentPublication": {
"id": "proceedings/cad-graphics/2013/2576/0",
"title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgi/2001/1007/0/10070363",
"title": "Mosaic and Warping for Forward Moving Images",
"doi": null,
"abstractUrl": "/proceedings-article/cgi/2001/10070363/12OmNyS6RPl",
"parentPublication": {
"id": "proceedings/cgi/2001/1007/0",
"title": "Proceedings. Computer Graphics International 2001",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2017/06/mcg2017060076",
"title": "Deferred Warping",
"doi": null,
"abstractUrl": "/magazine/cg/2017/06/mcg2017060076/13rRUB6Sq4U",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06942245",
"title": "Foldover-Free Mesh Warping for Constrained Texture Mapping",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06942245/13rRUwInvB9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09150774",
"title": "Reposing Humans by Warping 3D Features",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09150774/1lPHptj4436",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428254",
"title": "BWIN: A Bilateral Warping Method for Video Frame Interpolation",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428254/1uim3aLZCZq",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqHItAr",
"title": "Proceedings of International Conference on Image Processing",
"acronym": "icip",
"groupId": "1000349",
"volume": "3",
"displayVolume": "3",
"year": "1997",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvjQ8U3",
"doi": "10.1109/ICIP.1997.632197",
"title": "Motion compensation using region constrained warping predictio",
"normalizedTitle": "Motion compensation using region constrained warping predictio",
"abstract": "A region constrained warping prediction (RCWP) is proposed for motion compensation based on segmentation information. In contrast to the conventional warping prediction, the RCWP scheme allows motion discontinuities (MD) in the motion field which usually exist along the boundaries of moving objects. For the mesh points located on the boundaries, multiple motion vectors are assigned, and only one motion vector is assigned for the others as in conventional warping prediction. Since the motion field affects the segmentation result and vice versa, an iterative refinement scheme should be adopted. Experimental results have shown that the proposed motion compensation scheme based on the RCWP provides a better performance than the conventional motion compensation schemes.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A region constrained warping prediction (RCWP) is proposed for motion compensation based on segmentation information. In contrast to the conventional warping prediction, the RCWP scheme allows motion discontinuities (MD) in the motion field which usually exist along the boundaries of moving objects. For the mesh points located on the boundaries, multiple motion vectors are assigned, and only one motion vector is assigned for the others as in conventional warping prediction. Since the motion field affects the segmentation result and vice versa, an iterative refinement scheme should be adopted. Experimental results have shown that the proposed motion compensation scheme based on the RCWP provides a better performance than the conventional motion compensation schemes.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A region constrained warping prediction (RCWP) is proposed for motion compensation based on segmentation information. In contrast to the conventional warping prediction, the RCWP scheme allows motion discontinuities (MD) in the motion field which usually exist along the boundaries of moving objects. For the mesh points located on the boundaries, multiple motion vectors are assigned, and only one motion vector is assigned for the others as in conventional warping prediction. Since the motion field affects the segmentation result and vice versa, an iterative refinement scheme should be adopted. Experimental results have shown that the proposed motion compensation scheme based on the RCWP provides a better performance than the conventional motion compensation schemes.",
"fno": "81833618",
"keywords": [
"Motion Compensation Motion Compensation Region Constrained Warping Prediction Image Segmentation Motion Discontinuities Motion Field Mesh Points Moving Object Boundary Motion Vectors Iterative Refinement Scheme Experimental Results Performance Motion Estimation Iterative Search Procedure"
],
"authors": [
{
"affiliation": "Lab. of Image Commun., Seoul Nat. Univ., South Korea",
"fullName": "Dong-Il Chang",
"givenName": "Dong-Il",
"surname": "Chang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lab. of Image Commun., Seoul Nat. Univ., South Korea",
"fullName": "Joonhyun Sung",
"givenName": "Joonhyun",
"surname": "Sung",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Lab. of Image Commun., Seoul Nat. Univ., South Korea",
"fullName": "Choong Woong Lee",
"givenName": "Choong Woong",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icip",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1997-10-01T00:00:00",
"pubType": "proceedings",
"pages": "618",
"year": "1997",
"issn": null,
"isbn": "0-8186-8183-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "81833614",
"articleId": "12OmNyKa6gP",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00632217",
"articleId": "12OmNAoDif0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwseEQY",
"title": "2010 First International Conference on Networking and Distributed Computing",
"acronym": "icndc",
"groupId": "1800193",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzIUfNJ",
"doi": "10.1109/ICNDC.2010.19",
"title": "Multicast-Tree Construction and Streaming Mechanism for Intra 802.16 Mesh Networks",
"normalizedTitle": "Multicast-Tree Construction and Streaming Mechanism for Intra 802.16 Mesh Networks",
"abstract": "This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-trees. The second stage applies an interference-aware Steiner tree to connect the source to each multicast sub-tree. Finally, an algorithm generates the final multicast tree topology. Simulation results reveal that the proposed approach outperforms others in the construction of a multicast tree and significantly reduces the interference of a mesh network.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-trees. The second stage applies an interference-aware Steiner tree to connect the source to each multicast sub-tree. Finally, an algorithm generates the final multicast tree topology. Simulation results reveal that the proposed approach outperforms others in the construction of a multicast tree and significantly reduces the interference of a mesh network.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-trees. The second stage applies an interference-aware Steiner tree to connect the source to each multicast sub-tree. Finally, an algorithm generates the final multicast tree topology. Simulation results reveal that the proposed approach outperforms others in the construction of a multicast tree and significantly reduces the interference of a mesh network.",
"fno": "05645398",
"keywords": [
"Electromagnetic Wave Interference",
"Multicast Communication",
"Trees Mathematics",
"Wireless Mesh Networks",
"Multicast Tree Construction",
"Streaming Mechanism",
"Intra 802 16 Mesh Networks",
"Priority Based Algorithm",
"Interference Aware Steiner Tree",
"Steiner Trees",
"Receivers",
"Interference",
"Wi MAX",
"Mesh Networks",
"Topology",
"Buildings",
"Wi Max Mesh",
"Multicast Tree",
"Interference",
"Steiner Tree"
],
"authors": [
{
"affiliation": null,
"fullName": "Huan-Wen Tsai",
"givenName": "Huan-Wen",
"surname": "Tsai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hsu-Cheng Lin",
"givenName": "Hsu-Cheng",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chih-Lun Chou",
"givenName": "Chih-Lun",
"surname": "Chou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sheng-Tzong Cheng",
"givenName": "Sheng-Tzong",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icndc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "48-52",
"year": "2010",
"issn": "2165-4999",
"isbn": "978-1-4244-8382-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05645397",
"articleId": "12OmNASraxi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05645399",
"articleId": "12OmNz5apNf",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/mass/2015/9101/0/9101a208",
"title": "Software Defined Mobile Multicast",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2015/9101a208/12OmNBh8gQy",
"parentPublication": {
"id": "proceedings/mass/2015/9101/0",
"title": "2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nca/2013/5043/0/06623662",
"title": "Overlay Multicast Protocol with Proxy Districts for Dynamic Wireless Sensor Networks",
"doi": null,
"abstractUrl": "/proceedings-article/nca/2013/06623662/12OmNCdBDMa",
"parentPublication": {
"id": "proceedings/nca/2013/5043/0",
"title": "2013 IEEE 12th International Symposium on Network Computing and Applications (NCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-icess/2011/4538/0/4538a628",
"title": "A Broadcast Tree-Based Centralized Scheduling Mechanism for IEEE 802.16 Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a628/12OmNqAU6CB",
"parentPublication": {
"id": "proceedings/hpcc-icess/2011/4538/0",
"title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nas/2010/4134/0/4134a171",
"title": "Interference-Aware Multicast in Wireless Mesh Networks with Directional Antennas",
"doi": null,
"abstractUrl": "/proceedings-article/nas/2010/4134a171/12OmNwDj17W",
"parentPublication": {
"id": "proceedings/nas/2010/4134/0",
"title": "2010 IEEE Fifth International Conference on Networking, Architecture, and Storage",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/music/2012/1956/0/4727a154",
"title": "Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/music/2012/4727a154/12OmNxxvAMT",
"parentPublication": {
"id": "proceedings/music/2012/1956/0",
"title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcs/2018/6871/0/687101a132",
"title": "Optimal Service Function Tree Embedding for NFV Enabled Multicast",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/2018/687101a132/12OmNySXEXe",
"parentPublication": {
"id": "proceedings/icdcs/2018/6871/0",
"title": "2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccn/1998/9014/0/90140304",
"title": "Low-Cost, Bounded-Delay Multicast Routing for QoS-Based Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icccn/1998/90140304/12OmNzsJ7tp",
"parentPublication": {
"id": "proceedings/icccn/1998/9014/0",
"title": "Computer Communications and Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fcst/2010/7779/0/05575464",
"title": "OM: Opportunistic Multicast Routing for Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/fcst/2010/05575464/12OmNzyYica",
"parentPublication": {
"id": "proceedings/fcst/2010/7779/0",
"title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2014/08/06495455",
"title": "An Approximation Algorithm for Constructing Degree-Dependent Node-Weighted Multicast Trees",
"doi": null,
"abstractUrl": "/journal/td/2014/08/06495455/13rRUEgs2Bz",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/2015/04/06851127",
"title": "High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/journal/tm/2015/04/06851127/13rRUwvT9h1",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNs4S8vM",
"title": "Computer Technology and Development, International Conference on",
"acronym": "icctd",
"groupId": "1003009",
"volume": "2",
"displayVolume": "2",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzmclB2",
"doi": "10.1109/ICCTD.2009.153",
"title": "Implementation of 2-Pass Mesh Warping Algorithm by Using Bezier Curve",
"normalizedTitle": "Implementation of 2-Pass Mesh Warping Algorithm by Using Bezier Curve",
"abstract": "In this paper, successfully we implemented 2-pass mesh warping algorithm by using Bezier curve for warping the images and various video effects that consists two passes. We obtained enchanting results on various images. Mainly its applications are remote sensing, movies and advertisements.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, successfully we implemented 2-pass mesh warping algorithm by using Bezier curve for warping the images and various video effects that consists two passes. We obtained enchanting results on various images. Mainly its applications are remote sensing, movies and advertisements.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, successfully we implemented 2-pass mesh warping algorithm by using Bezier curve for warping the images and various video effects that consists two passes. We obtained enchanting results on various images. Mainly its applications are remote sensing, movies and advertisements.",
"fno": "3892b296",
"keywords": [
"Bezier Curve",
"Mesh",
"Warping"
],
"authors": [
{
"affiliation": null,
"fullName": "Vilas Lambture",
"givenName": "Vilas",
"surname": "Lambture",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Abhay Gaidhani",
"givenName": "Abhay",
"surname": "Gaidhani",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shashikant Kamble",
"givenName": "Shashikant",
"surname": "Kamble",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icctd",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "296-297",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3892-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05360171",
"articleId": "12OmNvmG81t",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3892b298",
"articleId": "12OmNyprnsc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icis/2007/2841/0/284100212",
"title": "Bezier Curve-Based Character Descriptor Considering Shape Information",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2007/284100212/12OmNAYGlr5",
"parentPublication": {
"id": "proceedings/icis/2007/2841/0",
"title": "2007 International Conference on Computer and Information Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2008/3359/0/3359a154",
"title": "G3 Transition Curve Between Two Straight Lines",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2008/3359a154/12OmNAq3hHs",
"parentPublication": {
"id": "proceedings/cgiv/2008/3359/0",
"title": "2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2007/2996/0/29960071",
"title": "Geodesic Bezier Curves: a Tool for Modeling on Triangulations",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2007/29960071/12OmNBrlPD1",
"parentPublication": {
"id": "proceedings/sibgrapi/2007/2996/0",
"title": "XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icetet/2010/4246/0/4246a267",
"title": "Exploring Rational Bezier Curves through Iterated Function Systems",
"doi": null,
"abstractUrl": "/proceedings-article/icetet/2010/4246a267/12OmNrAdsxY",
"parentPublication": {
"id": "proceedings/icetet/2010/4246/0",
"title": "Emerging Trends in Engineering & Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2001/1263/0/12630276",
"title": "A Bezier Curve-Based Approach to Shape Description for Chinese Calligraphy Characters",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2001/12630276/12OmNxT56zP",
"parentPublication": {
"id": "proceedings/icdar/2001/1263/0",
"title": "Proceedings of Sixth International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2008/3381/0/3381a635",
"title": "Study on Bezier Curve Applications of Pelvis Trajectory of Virtual Human Walking",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2008/3381a635/12OmNy3iFid",
"parentPublication": {
"id": "proceedings/cw/2008/3381/0",
"title": "2008 International Conference on Cyberworlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2010/4166/0/4166a063",
"title": "Fuzzy Interpolation Rational Bezier Curve",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2010/4166a063/12OmNy6HQTu",
"parentPublication": {
"id": "proceedings/cgiv/2010/4166/0",
"title": "2010 Seventh International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itcc/2005/2315/2/231520095",
"title": "A Generic Shape Descriptor using Bezier Curves",
"doi": null,
"abstractUrl": "/proceedings-article/itcc/2005/231520095/12OmNzRqdFN",
"parentPublication": {
"id": "proceedings/itcc/2005/2315/1",
"title": "Proceedings. ITCC 2005 International Conference on Information Technology: Coding and Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2010/4166/0/4166a068",
"title": "Differential Evolution Optimization for Bezier Curve Fitting",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2010/4166a068/12OmNzYNNjl",
"parentPublication": {
"id": "proceedings/cgiv/2010/4166/0",
"title": "2010 Seventh International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iptc/2010/4196/0/4196a021",
"title": "Tension Spline Fitting with Bezier Curve",
"doi": null,
"abstractUrl": "/proceedings-article/iptc/2010/4196a021/12OmNzZEAGt",
"parentPublication": {
"id": "proceedings/iptc/2010/4196/0",
"title": "Intelligence Information Processing and Trusted Computing, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwtn3tc",
"title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)",
"acronym": "fcst",
"groupId": "1001309",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzyYica",
"doi": "10.1109/FCST.2010.102",
"title": "OM: Opportunistic Multicast Routing for Wireless Mesh Networks",
"normalizedTitle": "OM: Opportunistic Multicast Routing for Wireless Mesh Networks",
"abstract": "Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in wireless mesh networks, likewise, network coding popularly investigated by many institutes is another approach of enhancing the throughput in wireless networks. How to combine the both techniques is an interesting research. To our knowledge, this is still an open issue to implement the multicast routing in wireless mesh networks simultaneously employing the both mechanisms. In this paper, we propose an efficient multicast protocol based on the opportunistic routing and network coding. Additionally, we also provide an ETX (expected number of transmissions) based cost metric formula of the multicast sub-group. Extensive simulation reveals that the performance of the novel presented multicast routing protocol outperforms the conventional multicast routing protocol in wireless mesh networks.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in wireless mesh networks, likewise, network coding popularly investigated by many institutes is another approach of enhancing the throughput in wireless networks. How to combine the both techniques is an interesting research. To our knowledge, this is still an open issue to implement the multicast routing in wireless mesh networks simultaneously employing the both mechanisms. In this paper, we propose an efficient multicast protocol based on the opportunistic routing and network coding. Additionally, we also provide an ETX (expected number of transmissions) based cost metric formula of the multicast sub-group. Extensive simulation reveals that the performance of the novel presented multicast routing protocol outperforms the conventional multicast routing protocol in wireless mesh networks.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Opportunistic routing is a recent routing paradigm that achieves high throughput in the face of universally lossy wireless links in wireless mesh networks, likewise, network coding popularly investigated by many institutes is another approach of enhancing the throughput in wireless networks. How to combine the both techniques is an interesting research. To our knowledge, this is still an open issue to implement the multicast routing in wireless mesh networks simultaneously employing the both mechanisms. In this paper, we propose an efficient multicast protocol based on the opportunistic routing and network coding. Additionally, we also provide an ETX (expected number of transmissions) based cost metric formula of the multicast sub-group. Extensive simulation reveals that the performance of the novel presented multicast routing protocol outperforms the conventional multicast routing protocol in wireless mesh networks.",
"fno": "05575464",
"keywords": [
"Multicast Protocols",
"Routing Protocols",
"Wireless Mesh Networks",
"Opportunistic Multicast Routing",
"Wireless Mesh Networks",
"Lossy Wireless Links",
"Network Coding",
"Routing Protocol",
"Routing",
"Routing Protocols",
"Wireless Communication",
"Steiner Trees",
"Wireless Mesh Networks",
"Network Coding",
"Multicast",
"Opportunistic Routing",
"Network Coding",
"Wireless Mesh Networks"
],
"authors": [
{
"affiliation": null,
"fullName": "Yang WenZhong",
"givenName": "Yang",
"surname": "WenZhong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Huang ChuanHe",
"givenName": "Huang",
"surname": "ChuanHe",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wang Bo",
"givenName": "Wang",
"surname": "Bo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhang ZhenYu",
"givenName": "Zhang",
"surname": "ZhenYu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wang Tong",
"givenName": "Wang",
"surname": "Tong",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fcst",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "173-179",
"year": "2010",
"issn": "2159-6301",
"isbn": "978-1-4244-7779-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05575589",
"articleId": "12OmNxWcHcX",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05575466",
"articleId": "12OmNAk5HOk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icnp/2008/2506/0/04697020",
"title": "CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding",
"doi": null,
"abstractUrl": "/proceedings-article/icnp/2008/04697020/12OmNqFa5pE",
"parentPublication": {
"id": "proceedings/icnp/2008/2506/0",
"title": "2008 IEEE International Conference on Network Protocols",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mass/2011/4469/0/4469a600",
"title": "Efficient Opportunistic Multicast via Tree Backbone for Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2011/4469a600/12OmNro0I4R",
"parentPublication": {
"id": "proceedings/mass/2011/4469/0",
"title": "Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mass/2009/5114/0/05336936",
"title": "Multicast routing and channel assignment in wireless mesh networks",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2009/05336936/12OmNwF0BOs",
"parentPublication": {
"id": "proceedings/mass/2009/5114/0",
"title": "2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcn/2006/0418/0/04116588",
"title": "Protecting Multicast Sessions in Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2006/04116588/12OmNxeusZO",
"parentPublication": {
"id": "proceedings/lcn/2006/0418/0",
"title": "Proceedings. 2006 31st IEEE Conference on Local Computer Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/music/2012/1956/0/4727a154",
"title": "Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/music/2012/4727a154/12OmNxxvAMT",
"parentPublication": {
"id": "proceedings/music/2012/1956/0",
"title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcn/2012/1565/0/06423630",
"title": "An opportunistic multicast routing protocol for wireless mesh networks",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2012/06423630/12OmNzd7bPP",
"parentPublication": {
"id": "proceedings/lcn/2012/1565/0",
"title": "37th Annual IEEE Conference on Local Computer Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/2009/12/ttm2009121622",
"title": "SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/journal/tm/2009/12/ttm2009121622/13rRUNvgzau",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/2015/04/06851127",
"title": "High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/journal/tm/2015/04/06851127/13rRUwvT9h1",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/2011/05/ttm2011050653",
"title": "Secure High-Throughput Multicast Routing in Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/journal/tm/2011/05/ttm2011050653/13rRUxBrGhz",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2010/02/05332276",
"title": "Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks",
"doi": null,
"abstractUrl": "/journal/nt/2010/02/05332276/13rRUxYIMS3",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqG0SVs",
"title": "Data Compression Conference",
"acronym": "dcc",
"groupId": "1000177",
"volume": "0",
"displayVolume": "0",
"year": "1997",
"__typename": "ProceedingType"
},
"article": {
"id": "1dPod9utbMs",
"doi": "10.1109/DCC.1997.582124",
"title": "Parametric warping for motion estimation",
"normalizedTitle": "Parametric warping for motion estimation",
"abstract": "Summary form only given. In warping (also known as mesh-based) motion estimation, motion vectors at individual pixels are computed through an interpolation of a subsampled set of motion vectors. A method for calculating optimal warping coefficients was introduced previously. This algorithm finds the interpolation coefficients, at each individual pixel location (within a block), such that the mean squared luminance errors are minimized. It has been observed that optimal coefficients vary widely with time and across different sequences. This observation motivates the optimization of the warping coefficients locally in time. However, doing so requires the encoder to transmit the coefficients to the decoder. Assuming a 16/spl times/16 block and four floating point coefficients per pixel, this would require a considerable overhead in bitrate. Especially in low bitrate regimes, such overhead is likely to be unacceptable. This paper proposes a parametric class of functions to represent the warping interpolation kernels. More specifically, we propose to use the two-parameter family of functions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Summary form only given. In warping (also known as mesh-based) motion estimation, motion vectors at individual pixels are computed through an interpolation of a subsampled set of motion vectors. A method for calculating optimal warping coefficients was introduced previously. This algorithm finds the interpolation coefficients, at each individual pixel location (within a block), such that the mean squared luminance errors are minimized. It has been observed that optimal coefficients vary widely with time and across different sequences. This observation motivates the optimization of the warping coefficients locally in time. However, doing so requires the encoder to transmit the coefficients to the decoder. Assuming a 16/spl times/16 block and four floating point coefficients per pixel, this would require a considerable overhead in bitrate. Especially in low bitrate regimes, such overhead is likely to be unacceptable. This paper proposes a parametric class of functions to represent the warping interpolation kernels. More specifically, we propose to use the two-parameter family of functions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Summary form only given. In warping (also known as mesh-based) motion estimation, motion vectors at individual pixels are computed through an interpolation of a subsampled set of motion vectors. A method for calculating optimal warping coefficients was introduced previously. This algorithm finds the interpolation coefficients, at each individual pixel location (within a block), such that the mean squared luminance errors are minimized. It has been observed that optimal coefficients vary widely with time and across different sequences. This observation motivates the optimization of the warping coefficients locally in time. However, doing so requires the encoder to transmit the coefficients to the decoder. Assuming a 16/spl times/16 block and four floating point coefficients per pixel, this would require a considerable overhead in bitrate. Especially in low bitrate regimes, such overhead is likely to be unacceptable. This paper proposes a parametric class of functions to represent the warping interpolation kernels. More specifically, we propose to use the two-parameter family of functions.",
"fno": "00582124",
"keywords": [
"Motion Estimation",
"Image Coding",
"Interpolation",
"Image Sequences",
"Parameter Estimation",
"Optimisation",
"Parametric Warping",
"Motion Estimation",
"Motion Vectors",
"Pixels",
"Image Sequences",
"Optimal Warping Coefficients",
"Algorithm",
"Interpolation Coefficients",
"Mean Squared Luminance Errors",
"Encoder",
"Decoder",
"Floating Point Coefficients",
"Two Parameter Functions",
"Warping Interpolation Kernels",
"Experiments",
"Motion Estimation",
"Interpolation",
"Bit Rate",
"Decoding",
"Kernel",
"Degradation",
"Estimation Error"
],
"authors": [
{
"affiliation": "Dept. of Electr. & Comput. Eng., Rice Univ., Houston, TX, USA",
"fullName": "A. Nosratinia",
"givenName": "A.",
"surname": "Nosratinia",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1997-01-01T00:00:00",
"pubType": "proceedings",
"pages": "460-460",
"year": "1997",
"issn": "1068-0314",
"isbn": "0-8186-7761-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "77610459",
"articleId": "12OmNxUdv92",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00582126",
"articleId": "1dUndbC5pcs",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icip/1994/6952/1/00413331",
"title": "An image warping approach to image sequence interpolation",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1994/00413331/12OmNBhHtcm",
"parentPublication": {
"id": "proceedings/icip/1994/6952/3",
"title": "Proceedings of 1st International Conference on Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2004/8603/1/01394247",
"title": "Optimized DCT domain motion vector estimation in frame skipped transcoding",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394247/12OmNCmGNQN",
"parentPublication": {
"id": "proceedings/icme/2004/8603/1",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/07410844",
"title": "Dual-Feature Warping-Based Motion Model Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/07410844/12OmNyL0Tkn",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2006/9753/0/04042365",
"title": "Motion estimation method through adaptive deformable variable-sized rectangular meshes using warping function",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2006/04042365/12OmNyNQSJz",
"parentPublication": {
"id": "proceedings/isspit/2006/9753/0",
"title": "2006 IEEE International Symposium on Signal Processing and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1994/1775/2/00389496",
"title": "Motion compensated video sequence interpolation using digital image warping",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1994/00389496/12OmNyYm2En",
"parentPublication": {
"id": "proceedings/icassp/1994/1775/2",
"title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2018/6857/0/685700a127",
"title": "Geometry-Based Motion Vector Scaling for Omnidirectional Video Coding",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2018/685700a127/17D45WrVfZp",
"parentPublication": {
"id": "proceedings/ism/2018/6857/0",
"title": "2018 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/10038566",
"title": "Content-aware Warping for View Synthesis",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/10038566/1KxPVE9pkxG",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600f038",
"title": "Enhanced Bi-directional Motion Estimation for Video Frame Interpolation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600f038/1KxVxZgWSsg",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/03/08840983",
"title": "MEMC-Net: Motion Estimation and Motion Compensation Driven Neural Network for Video Interpolation and Enhancement",
"doi": null,
"abstractUrl": "/journal/tp/2021/03/08840983/1doNwUnSB0I",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428254",
"title": "BWIN: A Bilateral Warping Method for Video Frame Interpolation",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428254/1uim3aLZCZq",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNApcua3",
"title": "Symposium on Interactive Ray Tracing",
"acronym": "rt",
"groupId": "1001330",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBkfRgn",
"doi": "10.1109/RT.2008.4634638",
"title": "Accelerated building and ray tracing of restricted BSP trees",
"normalizedTitle": "Accelerated building and ray tracing of restricted BSP trees",
"abstract": "We present algorithms for building and ray tracing restricted BSP trees. The build algorithm uses a dynamic programming technique to compute coefficients that allow efficient calculation of the surface area heuristic. This algorithm reduces asymptotic runtime, and has significant impact on tree building time. Additionally, we make several simple observations which lead to very fast ray-tree traversal of RBSPs. Our new traversal algorithm is based on state-of-the-art kd-tree traversal algorithms, and effectively increases the speed of ray tracing RBSPs by an order of magnitude. We show that RBSP trees are not only practical to build, but that RBSP trees are nearly as fast to ray trace as kd-trees, generally accepted as the fastest ray acceleration structure.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present algorithms for building and ray tracing restricted BSP trees. The build algorithm uses a dynamic programming technique to compute coefficients that allow efficient calculation of the surface area heuristic. This algorithm reduces asymptotic runtime, and has significant impact on tree building time. Additionally, we make several simple observations which lead to very fast ray-tree traversal of RBSPs. Our new traversal algorithm is based on state-of-the-art kd-tree traversal algorithms, and effectively increases the speed of ray tracing RBSPs by an order of magnitude. We show that RBSP trees are not only practical to build, but that RBSP trees are nearly as fast to ray trace as kd-trees, generally accepted as the fastest ray acceleration structure.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present algorithms for building and ray tracing restricted BSP trees. The build algorithm uses a dynamic programming technique to compute coefficients that allow efficient calculation of the surface area heuristic. This algorithm reduces asymptotic runtime, and has significant impact on tree building time. Additionally, we make several simple observations which lead to very fast ray-tree traversal of RBSPs. Our new traversal algorithm is based on state-of-the-art kd-tree traversal algorithms, and effectively increases the speed of ray tracing RBSPs by an order of magnitude. We show that RBSP trees are not only practical to build, but that RBSP trees are nearly as fast to ray trace as kd-trees, generally accepted as the fastest ray acceleration structure.",
"fno": "04634638",
"keywords": [
"Ray Tracing",
"Tree Data Structures",
"Ray Tracing",
"Restricted BSP Trees",
"Build Algorithm",
"Dynamic Programming",
"Tree Building Time",
"Face",
"Ray Tracing",
"Equations",
"Buildings",
"Heuristic Algorithms",
"Algorithm Design And Analysis",
"Benchmark Testing",
"RBSP",
"Ray Tracing",
"Construction",
"I 3 3 Computer Graphics Picture Image Generation Display Algorithms",
"I 3 6 Computer Graphics Methodology And Techniques Graphics Data Structures And Data Types"
],
"authors": [
{
"affiliation": "University of California, Davis, USA",
"fullName": "Brian C. Budge",
"givenName": "Brian C.",
"surname": "Budge",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Desert Research Institute, USA",
"fullName": "Daniel Coming",
"givenName": "Daniel",
"surname": "Coming",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Desert Research Institute, USA",
"fullName": "Derek Norpchen",
"givenName": "Derek",
"surname": "Norpchen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, Davis, USA",
"fullName": "Kenneth I. Joy",
"givenName": "Kenneth I.",
"surname": "Joy",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "rt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-08-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04634637",
"articleId": "12OmNvpw7dh",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04634640",
"articleId": "12OmNyvY9rf",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/rt/2008/2741/0/04634647",
"title": "Accelerating ray tracing using constrained tetrahedralizations",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2008/04634647/12OmNBaT600",
"parentPublication": {
"id": "proceedings/rt/2008/2741/0",
"title": "Symposium on Interactive Ray Tracing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061547",
"title": "On building fast kd-Trees for Ray Tracing, and on doing that in O(N log N)",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061547/12OmNCcKQAt",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbac-pad/2009/3857/0/3857a041",
"title": "kD-Tree Traversal Implementations for Ray Tracing on Massive Multiprocessors: A Comparative Study",
"doi": null,
"abstractUrl": "/proceedings-article/sbac-pad/2009/3857a041/12OmNvJXeAz",
"parentPublication": {
"id": "proceedings/sbac-pad/2009/3857/0",
"title": "Computer Architecture and High Performance Computing, Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2008/2741/0/04634637",
"title": "Ray tracing with the BSP tree",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2008/04634637/12OmNvpw7dh",
"parentPublication": {
"id": "proceedings/rt/2008/2741/0",
"title": "Symposium on Interactive Ray Tracing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061544",
"title": "RT-DEFORM: Interactive Ray Tracing of Dynamic Scenes using BVHs",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061544/12OmNwErpUk",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061546",
"title": "Omnidirectional Ray Tracing Traversal Algorithm for kd-trees",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061546/12OmNxEBzeX",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2007/1629/0/04342591",
"title": "A Study of Restricted BSP Trees for Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342591/12OmNyyO8KT",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061552",
"title": "The Quantized kd-Tree: Efficient Ray Tracing of Compressed Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061552/12OmNzh5yZ1",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06960897",
"title": "HART: A Hybrid Architecture for Ray Tracing Animated Scenes",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06960897/13rRUNvgyWp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cecit/2021/3757/0/375700b168",
"title": "Stackless KD-Tree Traversal For Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/cecit/2021/375700b168/1CdEOBZgTVC",
"parentPublication": {
"id": "proceedings/cecit/2021/3757/0",
"title": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNApcua3",
"title": "Symposium on Interactive Ray Tracing",
"acronym": "rt",
"groupId": "1001330",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvpw7dh",
"doi": "10.1109/RT.2008.4634637",
"title": "Ray tracing with the BSP tree",
"normalizedTitle": "Ray tracing with the BSP tree",
"abstract": "One of the most fundamental concepts in computer graphics is binary space subdivision. In its purest form, this concept leads to binary space partitioning trees (BSP trees) with arbitrarily oriented space partitioning planes. In practice, however, most algorithms use kd-trees-a special case of BSP trees that restrict themselves to axis-aligned planes-since BSP trees are believed to be numerically unstable, costly to traverse, and intractable to build well. In this paper, we show that this is not true. Furthermore, after optimizing our general BSP traversal to also have a fast kd-tree style traversal path for axis-aligned splitting planes, we show it is indeed possible to build a general BSP based ray tracer that is highly competitive with state of the art BVH and kd-tree based systems. We demonstrate our ray tracer on a variety of scenes, and show that it is always competitive with-and often superior to-state of the art BVH and kd-tree based ray tracers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "One of the most fundamental concepts in computer graphics is binary space subdivision. In its purest form, this concept leads to binary space partitioning trees (BSP trees) with arbitrarily oriented space partitioning planes. In practice, however, most algorithms use kd-trees-a special case of BSP trees that restrict themselves to axis-aligned planes-since BSP trees are believed to be numerically unstable, costly to traverse, and intractable to build well. In this paper, we show that this is not true. Furthermore, after optimizing our general BSP traversal to also have a fast kd-tree style traversal path for axis-aligned splitting planes, we show it is indeed possible to build a general BSP based ray tracer that is highly competitive with state of the art BVH and kd-tree based systems. We demonstrate our ray tracer on a variety of scenes, and show that it is always competitive with-and often superior to-state of the art BVH and kd-tree based ray tracers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "One of the most fundamental concepts in computer graphics is binary space subdivision. In its purest form, this concept leads to binary space partitioning trees (BSP trees) with arbitrarily oriented space partitioning planes. In practice, however, most algorithms use kd-trees-a special case of BSP trees that restrict themselves to axis-aligned planes-since BSP trees are believed to be numerically unstable, costly to traverse, and intractable to build well. In this paper, we show that this is not true. Furthermore, after optimizing our general BSP traversal to also have a fast kd-tree style traversal path for axis-aligned splitting planes, we show it is indeed possible to build a general BSP based ray tracer that is highly competitive with state of the art BVH and kd-tree based systems. We demonstrate our ray tracer on a variety of scenes, and show that it is always competitive with-and often superior to-state of the art BVH and kd-tree based ray tracers.",
"fno": "04634637",
"keywords": [
"Computer Graphics",
"Ray Tracing",
"Tree Data Structures",
"Ray Tracing",
"Computer Graphics",
"Binary Space Partitioning Trees",
"Kd Trees",
"Axis Aligned Splitting Planes",
"Acceleration",
"Buildings",
"Distance Measurement",
"Ray Tracing",
"Data Structures",
"Complexity Theory",
"Art"
],
"authors": [
{
"affiliation": "University of Utah, USA",
"fullName": "Thiago Ize",
"givenName": "Thiago",
"surname": "Ize",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Intel Corp, USA",
"fullName": "Ingo Wald",
"givenName": "Ingo",
"surname": "Wald",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NVIDIA, University of Utah, USA",
"fullName": "Steven G. Parker",
"givenName": "Steven G.",
"surname": "Parker",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "rt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-08-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04634636",
"articleId": "12OmNBQkwYi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04634638",
"articleId": "12OmNBkfRgn",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/rt/2008/2741/0/04634647",
"title": "Accelerating ray tracing using constrained tetrahedralizations",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2008/04634647/12OmNBaT600",
"parentPublication": {
"id": "proceedings/rt/2008/2741/0",
"title": "Symposium on Interactive Ray Tracing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2008/2741/0/04634638",
"title": "Accelerated building and ray tracing of restricted BSP trees",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2008/04634638/12OmNBkfRgn",
"parentPublication": {
"id": "proceedings/rt/2008/2741/0",
"title": "Symposium on Interactive Ray Tracing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061547",
"title": "On building fast kd-Trees for Ray Tracing, and on doing that in O(N log N)",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061547/12OmNCcKQAt",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2007/1629/0/04342598",
"title": "Realtime Ray Tracing on GPU with BVH-based Packet Traversal",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342598/12OmNqJZgLN",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbac-pad/2009/3857/0/3857a041",
"title": "kD-Tree Traversal Implementations for Ray Tracing on Massive Multiprocessors: A Comparative Study",
"doi": null,
"abstractUrl": "/proceedings-article/sbac-pad/2009/3857a041/12OmNvJXeAz",
"parentPublication": {
"id": "proceedings/sbac-pad/2009/3857/0",
"title": "Computer Architecture and High Performance Computing, Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2006/0693/0/04061544",
"title": "RT-DEFORM: Interactive Ray Tracing of Dynamic Scenes using BVHs",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2006/04061544/12OmNwErpUk",
"parentPublication": {
"id": "proceedings/rt/2006/0693/0",
"title": "IEEE Symposium on Interactive Ray Tracing 2006",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2007/1629/0/04342591",
"title": "A Study of Restricted BSP Trees for Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342591/12OmNyyO8KT",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06960897",
"title": "HART: A Hybrid Architecture for Ray Tracing Animated Scenes",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06960897/13rRUNvgyWp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cecit/2021/3757/0/375700b168",
"title": "Stackless KD-Tree Traversal For Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/cecit/2021/375700b168/1CdEOBZgTVC",
"parentPublication": {
"id": "proceedings/cecit/2021/3757/0",
"title": "2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2020/8468/0/846800a042",
"title": "Spatial Partitioning Strategies for Memory-Efficient Ray Tracing of Particles",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2020/846800a042/1pZ0TM9iMHm",
"parentPublication": {
"id": "proceedings/ldav/2020/8468/0",
"title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1LSP7qPzqTK",
"title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)",
"acronym": "hpcc-dss-smartcity-dependsys",
"groupId": "10074610",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1LSPd946Y1y",
"doi": "10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00040",
"title": "RTA: an Efficient SIMD Architecture for Ray Tracing",
"normalizedTitle": "RTA: an Efficient SIMD Architecture for Ray Tracing",
"abstract": "In recent years, real-time ray tracing has attracted considerable attention with the increasing demand for photo-realistic graphics and rapid advances in CPUs/GPUs. However, efficient hardware architecture is challenging due to branches and high computation intensity for ray tracing. In this paper, we present a novel ray tracing hardware architecture called RTA (Ray Tracing Accelerator) to improve hardware efficiency. RTA has two key features: 1) an area-efficient T&I pipeline adopts three optimization strategies; 2) the configuration of two Ray Traversal units has the highest ray tracing efficiency. Combined with these, we implement our system at RTL level with agile chip development. Experimental results demonstrate that RTA's performance achieves <tex>Z_$2.83\\times$_Z</tex> higher than other academic and commercial architectures in a similar area.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In recent years, real-time ray tracing has attracted considerable attention with the increasing demand for photo-realistic graphics and rapid advances in CPUs/GPUs. However, efficient hardware architecture is challenging due to branches and high computation intensity for ray tracing. In this paper, we present a novel ray tracing hardware architecture called RTA (Ray Tracing Accelerator) to improve hardware efficiency. RTA has two key features: 1) an area-efficient T&I pipeline adopts three optimization strategies; 2) the configuration of two Ray Traversal units has the highest ray tracing efficiency. Combined with these, we implement our system at RTL level with agile chip development. Experimental results demonstrate that RTA's performance achieves <tex>$2.83\\times$</tex> higher than other academic and commercial architectures in a similar area.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In recent years, real-time ray tracing has attracted considerable attention with the increasing demand for photo-realistic graphics and rapid advances in CPUs/GPUs. However, efficient hardware architecture is challenging due to branches and high computation intensity for ray tracing. In this paper, we present a novel ray tracing hardware architecture called RTA (Ray Tracing Accelerator) to improve hardware efficiency. RTA has two key features: 1) an area-efficient T&I pipeline adopts three optimization strategies; 2) the configuration of two Ray Traversal units has the highest ray tracing efficiency. Combined with these, we implement our system at RTL level with agile chip development. Experimental results demonstrate that RTA's performance achieves - higher than other academic and commercial architectures in a similar area.",
"fno": "199300a043",
"keywords": [
"Graphics Processing Units",
"Parallel Processing",
"Ray Tracing",
"Photo Realistic Graphics",
"Ray Tracing Accelerator",
"Ray Traversal Units",
"Realtime Ray Tracing",
"SIMD Architecture",
"Graphics",
"High Performance Computing",
"Computational Modeling",
"Pipelines",
"Computer Architecture",
"Ray Tracing",
"Real Time Systems",
"Computer Graphics",
"Hardware Architecture",
"Ren Dering",
"Ray Tracing"
],
"authors": [
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Run Yan",
"givenName": "Run",
"surname": "Yan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Libo Huang",
"givenName": "Libo",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Hui Guo",
"givenName": "Hui",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huawei 2012 Labs,Beijing,China",
"fullName": "Yashuai Lü",
"givenName": "Yashuai",
"surname": "Lü",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Ling Yang",
"givenName": "Ling",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Nong Xiao",
"givenName": "Nong",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Li Shen",
"givenName": "Li",
"surname": "Shen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer, National University of Defense Technology,Changsha,China",
"fullName": "Yongwen Wang",
"givenName": "Yongwen",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hpcc-dss-smartcity-dependsys",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "43-50",
"year": "2022",
"issn": null,
"isbn": "979-8-3503-1993-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "199300a035",
"articleId": "1LSPv0jkZSE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "199300a051",
"articleId": "1LSPEq38oqA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/rt/2007/1629/0/04342586",
"title": "Ray-Strips: A Compact Mesh Representation for Interactive Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342586/12OmNASILFQ",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fpgm/2001/2667/0/01420938",
"title": "Reconfigurable Designs for Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/fpgm/2001/01420938/12OmNAq3hO7",
"parentPublication": {
"id": "proceedings/fpgm/2001/2667/0",
"title": "The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccd/2010/8936/0/05647555",
"title": "Efficient MIMD architectures for high-performance ray tracing",
"doi": null,
"abstractUrl": "/proceedings-article/iccd/2010/05647555/12OmNx8OuAD",
"parentPublication": {
"id": "proceedings/iccd/2010/8936/0",
"title": "2010 IEEE International Conference on Computer Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a087",
"title": "SIMD Friendly Ray Tracing on GPU",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a087/12OmNxFaLiE",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2007/1629/0/04342599",
"title": "Towards Hardware Ray Tracing using Fixed Point Arithmetic",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342599/12OmNy5hRnZ",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rt/2007/1629/0/04342585",
"title": "Interactive Ray Tracing of Arbitrary Implicits with SIMD Interval Arithmetic",
"doi": null,
"abstractUrl": "/proceedings-article/rt/2007/04342585/12OmNyq0zMM",
"parentPublication": {
"id": "proceedings/rt/2007/1629/0",
"title": "IEEE/ EG Symposium on Interactive Ray Tracing 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06960897",
"title": "HART: A Hybrid Architecture for Ray Tracing Animated Scenes",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06960897/13rRUNvgyWp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/09/06081859",
"title": "Combining Single and Packet-Ray Tracing for Arbitrary Ray Distributions on the Intel MIC Architecture",
"doi": null,
"abstractUrl": "/journal/tg/2012/09/06081859/13rRUwInvJe",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2022/6272/0/627200a263",
"title": "Vulkan-Sim: A GPU Architecture Simulator for Ray Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2022/627200a263/1HMSwhI3lO8",
"parentPublication": {
"id": "proceedings/micro/2022/6272/0",
"title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2020/8468/0/846800a042",
"title": "Spatial Partitioning Strategies for Memory-Efficient Ray Tracing of Particles",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2020/846800a042/1pZ0TM9iMHm",
"parentPublication": {
"id": "proceedings/ldav/2020/8468/0",
"title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrMHOd6",
"title": "2016 49th Hawaii International Conference on System Sciences (HICSS)",
"acronym": "hicss",
"groupId": "1000730",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAPSMpH",
"doi": "10.1109/HICSS.2016.624",
"title": "Empowering Business Users to Explore Visual Data Through Boundary Objects and Storytelling",
"normalizedTitle": "Empowering Business Users to Explore Visual Data Through Boundary Objects and Storytelling",
"abstract": "This research is inspired by two important industry trends: (i) a growing demand for visual analytic (VA) across all industry sectors, and ii) serious shortage of VA skills on the market, especially among business professionals. This project focuses on the following practice-inspired research question: \"How to empower business users to develop visual data exploration skills?\" This paper describes a VA pilot project conducted at an industry, rather than organizational level. We focused on a challenge of gradual development of VA skills among industry professionals from the Australian Cooperative and Mutual Enterprises (CMEs) sector, which is considered to be of national importance for the Australian economy and society. The CME sector also plays significant economic and social roles in the lives of over one billion members worldwide. Following the principles of action design research, the paper describes a method of gradual development of VA skills using visual stories as boundary objects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This research is inspired by two important industry trends: (i) a growing demand for visual analytic (VA) across all industry sectors, and ii) serious shortage of VA skills on the market, especially among business professionals. This project focuses on the following practice-inspired research question: \"How to empower business users to develop visual data exploration skills?\" This paper describes a VA pilot project conducted at an industry, rather than organizational level. We focused on a challenge of gradual development of VA skills among industry professionals from the Australian Cooperative and Mutual Enterprises (CMEs) sector, which is considered to be of national importance for the Australian economy and society. The CME sector also plays significant economic and social roles in the lives of over one billion members worldwide. Following the principles of action design research, the paper describes a method of gradual development of VA skills using visual stories as boundary objects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This research is inspired by two important industry trends: (i) a growing demand for visual analytic (VA) across all industry sectors, and ii) serious shortage of VA skills on the market, especially among business professionals. This project focuses on the following practice-inspired research question: \"How to empower business users to develop visual data exploration skills?\" This paper describes a VA pilot project conducted at an industry, rather than organizational level. We focused on a challenge of gradual development of VA skills among industry professionals from the Australian Cooperative and Mutual Enterprises (CMEs) sector, which is considered to be of national importance for the Australian economy and society. The CME sector also plays significant economic and social roles in the lives of over one billion members worldwide. Following the principles of action design research, the paper describes a method of gradual development of VA skills using visual stories as boundary objects.",
"fno": "5670f032",
"keywords": [
"Data Visualization",
"Industries",
"Organizations",
"Context",
"Visual Analytics",
"Storytelling",
"Data Visualisation",
"Visual Analytics",
"Business Users",
"Boundary Objects"
],
"authors": [
{
"affiliation": null,
"fullName": "Olivera Marjanovic",
"givenName": "Olivera",
"surname": "Marjanovic",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hicss",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2016-01-01T00:00:00",
"pubType": "proceedings",
"pages": "5032-5041",
"year": "2016",
"issn": "1530-1605",
"isbn": "978-0-7695-5670-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5670f022",
"articleId": "12OmNyywxG9",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5670f042",
"articleId": "12OmNxbW4S1",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cbi/2016/3231/1/3231a113",
"title": "Adaptive Enterprise Resilience Management: Adaptive Action Design Research in Financial Services Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/cbi/2016/3231a113/12OmNAHEpzH",
"parentPublication": {
"id": "proceedings/cbi/2016/3231/2",
"title": "2016 IEEE 18th Conference on Business Informatics (CBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2013/4892/0/4892b505",
"title": "Case Study: Successful Deployment of Industry-University Collaborative Visual Analytics Research",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892b505/12OmNAolGTi",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2011/9618/0/05718945",
"title": "Leadership Behaviors in Information Technology Project Management: An Exploratory Study",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2011/05718945/12OmNAq3hQT",
"parentPublication": {
"id": "proceedings/hicss/2011/9618/0",
"title": "2011 44th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2015/7367/0/7367b138",
"title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m",
"parentPublication": {
"id": "proceedings/hicss/2015/7367/0",
"title": "2015 48th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2013/3073/0/06606666",
"title": "Industry involvement in ICT curriculum: A comparative survey",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2013/06606666/12OmNrAv3J6",
"parentPublication": {
"id": "proceedings/icse/2013/3073/0",
"title": "2013 35th International Conference on Software Engineering (ICSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2018/1424/0/142401a140",
"title": "A Visual Analytics Approach for Equipment Condition Monitoring in Smart Factories of Process Industry",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2018/142401a140/12OmNy2rS1M",
"parentPublication": {
"id": "proceedings/pacificvis/2018/1424/0",
"title": "2018 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/01/07534883",
"title": "Characterizing Guidance in Visual Analytics",
"doi": null,
"abstractUrl": "/journal/tg/2017/01/07534883/13rRUxBa568",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06908006",
"title": "Personal Visualization and Personal Visual Analytics",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08019873",
"title": "SkyLens: Visual Analysis of Skyline on Multi-Dimensional Data",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08019873/13rRUygT7n3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2018/1174/0/08659145",
"title": "Rethinking Engineering Leadership",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2018/08659145/18j8Y8qSdEI",
"parentPublication": {
"id": "proceedings/fie/2018/1174/0",
"title": "2018 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAWpylb",
"title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum",
"acronym": "ipdpsw",
"groupId": "1800044",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCdk2Sw",
"doi": "10.1109/IPDPSW.2012.11",
"title": "A Block-Asynchronous Relaxation Method for Graphics Processing Units",
"normalizedTitle": "A Block-Asynchronous Relaxation Method for Graphics Processing Units",
"abstract": "In this paper, we analyze the potential of asynchronous relaxation methods on Graphics Processing Units (GPUs). For this purpose, we developed a set of asynchronous iteration algorithms in CUDA and compared them with a parallel implementation of synchronous relaxation methods on CPU-based systems. For a set of test matrices taken from the University of Florida Matrix Collection we monitor the convergence behavior, the average iteration time and the total time-to-solution time. Analyzing the results, we observe that even for our most basic asynchronous relaxation scheme, despite its lower convergence rate compared to the Gauss-Seidel relaxation (that we expected), the asynchronous iteration running on GPUs is still able to provide solution approximations of certain accuracy in considerably shorter time than Gauss-Seidel running on CPUs. Hence, it overcompensates for the slower convergence by exploiting the scalability and the good fit of the asynchronous schemes for the highly parallel GPU architectures. Further, enhancing the most basic asynchronous approach with hybrid schemes -- using multiple iterations within the \"sub domain\" handled by a GPU thread block and Jacobi-like asynchronous updates across the \"boundaries\", subject to tuning various parameters -- we manage to not only recover the loss of global convergence but often accelerate convergence of up to two times (compared to the standard but difficult to parallelize Gauss-Seidel type of schemes), while keeping the execution time of a global iteration practically the same. This shows the high potential of the asynchronous methods not only as a stand alone numerical solver for linear systems of equations fulfilling certain convergence conditions but more importantly as a smoother in multigrid methods. Due to the explosion of parallelism in today's architecture designs, the significance and the need for asynchronous methods, as the ones described in this work, is expected to grow.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we analyze the potential of asynchronous relaxation methods on Graphics Processing Units (GPUs). For this purpose, we developed a set of asynchronous iteration algorithms in CUDA and compared them with a parallel implementation of synchronous relaxation methods on CPU-based systems. For a set of test matrices taken from the University of Florida Matrix Collection we monitor the convergence behavior, the average iteration time and the total time-to-solution time. Analyzing the results, we observe that even for our most basic asynchronous relaxation scheme, despite its lower convergence rate compared to the Gauss-Seidel relaxation (that we expected), the asynchronous iteration running on GPUs is still able to provide solution approximations of certain accuracy in considerably shorter time than Gauss-Seidel running on CPUs. Hence, it overcompensates for the slower convergence by exploiting the scalability and the good fit of the asynchronous schemes for the highly parallel GPU architectures. Further, enhancing the most basic asynchronous approach with hybrid schemes -- using multiple iterations within the \"sub domain\" handled by a GPU thread block and Jacobi-like asynchronous updates across the \"boundaries\", subject to tuning various parameters -- we manage to not only recover the loss of global convergence but often accelerate convergence of up to two times (compared to the standard but difficult to parallelize Gauss-Seidel type of schemes), while keeping the execution time of a global iteration practically the same. This shows the high potential of the asynchronous methods not only as a stand alone numerical solver for linear systems of equations fulfilling certain convergence conditions but more importantly as a smoother in multigrid methods. Due to the explosion of parallelism in today's architecture designs, the significance and the need for asynchronous methods, as the ones described in this work, is expected to grow.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we analyze the potential of asynchronous relaxation methods on Graphics Processing Units (GPUs). For this purpose, we developed a set of asynchronous iteration algorithms in CUDA and compared them with a parallel implementation of synchronous relaxation methods on CPU-based systems. For a set of test matrices taken from the University of Florida Matrix Collection we monitor the convergence behavior, the average iteration time and the total time-to-solution time. Analyzing the results, we observe that even for our most basic asynchronous relaxation scheme, despite its lower convergence rate compared to the Gauss-Seidel relaxation (that we expected), the asynchronous iteration running on GPUs is still able to provide solution approximations of certain accuracy in considerably shorter time than Gauss-Seidel running on CPUs. Hence, it overcompensates for the slower convergence by exploiting the scalability and the good fit of the asynchronous schemes for the highly parallel GPU architectures. Further, enhancing the most basic asynchronous approach with hybrid schemes -- using multiple iterations within the \"sub domain\" handled by a GPU thread block and Jacobi-like asynchronous updates across the \"boundaries\", subject to tuning various parameters -- we manage to not only recover the loss of global convergence but often accelerate convergence of up to two times (compared to the standard but difficult to parallelize Gauss-Seidel type of schemes), while keeping the execution time of a global iteration practically the same. This shows the high potential of the asynchronous methods not only as a stand alone numerical solver for linear systems of equations fulfilling certain convergence conditions but more importantly as a smoother in multigrid methods. Due to the explosion of parallelism in today's architecture designs, the significance and the need for asynchronous methods, as the ones described in this work, is expected to grow.",
"fno": "4676a113",
"keywords": [
"Jacobian Matrices",
"Convergence",
"Graphics Processing Unit",
"Synchronization",
"Linear Systems",
"Equations",
"Educational Institutions",
"Jacobi Method",
"Asynchronous Relaxation",
"Chaotic Iteration",
"Graphics Processing Units GP Us"
],
"authors": [
{
"affiliation": null,
"fullName": "Hartwig Anzt",
"givenName": "Hartwig",
"surname": "Anzt",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stanimire Tomov",
"givenName": "Stanimire",
"surname": "Tomov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jack Dongarra",
"givenName": "Jack",
"surname": "Dongarra",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Vincent Heuveline",
"givenName": "Vincent",
"surname": "Heuveline",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipdpsw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-05-01T00:00:00",
"pubType": "proceedings",
"pages": "113-124",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-0974-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4676a099",
"articleId": "12OmNzwHvbY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4676a125",
"articleId": "12OmNrF2DOG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dcabes/2011/4415/0/4415a010",
"title": "Chaotic Relaxation Asynchronous Iterative Parallel Algorithm and its Implementation",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2011/4415a010/12OmNBQTJg9",
"parentPublication": {
"id": "proceedings/dcabes/2011/4415/0",
"title": "2011 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmcsn/2012/4738/0/4738a214",
"title": "Determined the Optimum Relaxation Parameter for the 7-point Laplacian",
"doi": null,
"abstractUrl": "/proceedings-article/cmcsn/2012/4738a214/12OmNC3Xhtq",
"parentPublication": {
"id": "proceedings/cmcsn/2012/4738/0",
"title": "Computing, Measurement, Control and Sensor Network, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/1993/4370/0/0366817",
"title": "Efficient out-of-core algorithms for linear relaxation using blocking covers",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1993/0366817/12OmNwdL7r7",
"parentPublication": {
"id": "proceedings/focs/1993/4370/0",
"title": "Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/1988/0878/0/00028336",
"title": "Multiresolution relaxation: experiments and evaluations",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/1988/00028336/12OmNxE2n0P",
"parentPublication": {
"id": "proceedings/icpr/1988/0878/0",
"title": "9th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/1989/1986/0/00076980",
"title": "PGS and PLUCGS-two new matrix solution techniques for general circuit simulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/1989/00076980/12OmNxR5UUa",
"parentPublication": {
"id": "proceedings/iccad/1989/1986/0",
"title": "1989 IEEE International Conference on Computer-Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/infcom/1991/694/0/00147605",
"title": "Convergence of synchronous and asynchronous algorithms in multiclass networks",
"doi": null,
"abstractUrl": "/proceedings-article/infcom/1991/00147605/12OmNzBwGDV",
"parentPublication": {
"id": "proceedings/infcom/1991/694/0",
"title": "IEEE INFCOM '91 - Communications Societies Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdp/2017/6058/0/07912656",
"title": "Asynchronous Power Flow on Graphic Processing Units",
"doi": null,
"abstractUrl": "/proceedings-article/pdp/2017/07912656/12OmNzgwmMx",
"parentPublication": {
"id": "proceedings/pdp/2017/6058/0",
"title": "2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/async/2008/3107/0/3107a095",
"title": "Block-Level Relaxation for Timing-Robust Asynchronous Circuits Based on Eager Evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/async/2008/3107a095/12OmNzvhvvX",
"parentPublication": {
"id": "proceedings/async/2008/3107/0",
"title": "2008 14th IEEE International Symposium on Asynchronous Circuits and Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1971/02/01671811",
"title": "The Accelerated Relaxation Method for Linear Inequalities",
"doi": null,
"abstractUrl": "/journal/tc/1971/02/01671811/13rRUxBa5vY",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/1994/06/mcg1994060048",
"title": "Radiosity and Relaxation Methods",
"doi": null,
"abstractUrl": "/magazine/cg/1994/06/mcg1994060048/13rRUzpzeHE",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBgQFM0",
"title": "2017 46th International Conference on Parallel Processing (ICPP)",
"acronym": "icpp",
"groupId": "1000540",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCzb9zq",
"doi": "10.1109/ICPP.2017.20",
"title": "Constrained Tensor Factorization with Accelerated AO-ADMM",
"normalizedTitle": "Constrained Tensor Factorization with Accelerated AO-ADMM",
"abstract": "Low-rank sparse tensor factorization is a populartool for analyzing multi-way data and is used in domainssuch as recommender systems, precision healthcare, and cybersecurity.Imposing constraints on a factorization, such asnon-negativity or sparsity, is a natural way of encoding priorknowledge of the multi-way data. While constrained factorizationsare useful for practitioners, they can greatly increasefactorization time due to slower convergence and computationaloverheads. Recently, a hybrid of alternating optimization andalternating direction method of multipliers (AO-ADMM) wasshown to have both a high convergence rate and the ability tonaturally incorporate a variety of popular constraints. In thiswork, we present a parallelization strategy and two approachesfor accelerating AO-ADMM. By redefining the convergencecriteria of the inner ADMM iterations, we are able to splitthe data in a way that not only accelerates the per-iterationconvergence, but also speeds up the execution of the ADMMiterations due to efficient use of cache resources. Secondly,we develop a method of exploiting dynamic sparsity in thefactors to speed up tensor-matrix kernels. These combinedadvancements achieve up to 8 speedup over the state-of-the art on a variety of real-world sparse tensors.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Low-rank sparse tensor factorization is a populartool for analyzing multi-way data and is used in domainssuch as recommender systems, precision healthcare, and cybersecurity.Imposing constraints on a factorization, such asnon-negativity or sparsity, is a natural way of encoding priorknowledge of the multi-way data. While constrained factorizationsare useful for practitioners, they can greatly increasefactorization time due to slower convergence and computationaloverheads. Recently, a hybrid of alternating optimization andalternating direction method of multipliers (AO-ADMM) wasshown to have both a high convergence rate and the ability tonaturally incorporate a variety of popular constraints. In thiswork, we present a parallelization strategy and two approachesfor accelerating AO-ADMM. By redefining the convergencecriteria of the inner ADMM iterations, we are able to splitthe data in a way that not only accelerates the per-iterationconvergence, but also speeds up the execution of the ADMMiterations due to efficient use of cache resources. Secondly,we develop a method of exploiting dynamic sparsity in thefactors to speed up tensor-matrix kernels. These combinedadvancements achieve up to 8 speedup over the state-of-the art on a variety of real-world sparse tensors.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Low-rank sparse tensor factorization is a populartool for analyzing multi-way data and is used in domainssuch as recommender systems, precision healthcare, and cybersecurity.Imposing constraints on a factorization, such asnon-negativity or sparsity, is a natural way of encoding priorknowledge of the multi-way data. While constrained factorizationsare useful for practitioners, they can greatly increasefactorization time due to slower convergence and computationaloverheads. Recently, a hybrid of alternating optimization andalternating direction method of multipliers (AO-ADMM) wasshown to have both a high convergence rate and the ability tonaturally incorporate a variety of popular constraints. In thiswork, we present a parallelization strategy and two approachesfor accelerating AO-ADMM. By redefining the convergencecriteria of the inner ADMM iterations, we are able to splitthe data in a way that not only accelerates the per-iterationconvergence, but also speeds up the execution of the ADMMiterations due to efficient use of cache resources. Secondly,we develop a method of exploiting dynamic sparsity in thefactors to speed up tensor-matrix kernels. These combinedadvancements achieve up to 8 speedup over the state-of-the art on a variety of real-world sparse tensors.",
"fno": "1042a111",
"keywords": [
"Tensile Stress",
"Convergence",
"Optimization",
"Acceleration",
"Kernel",
"Sparse Matrices",
"Matrices"
],
"authors": [
{
"affiliation": null,
"fullName": "Shaden Smith",
"givenName": "Shaden",
"surname": "Smith",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alec Beri",
"givenName": "Alec",
"surname": "Beri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "George Karypis",
"givenName": "George",
"surname": "Karypis",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-08-01T00:00:00",
"pubType": "proceedings",
"pages": "111-120",
"year": "2017",
"issn": "2332-5690",
"isbn": "978-1-5386-1042-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "1042a101",
"articleId": "12OmNqHItvn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "1042a121",
"articleId": "12OmNvStcvl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457d862",
"title": "Hyperspectral Image Super-Resolution via Non-local Sparse Tensor Factorization",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457d862/12OmNqIQSfz",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2015/9504/0/9504a805",
"title": "Variable Selection for Efficient Nonnegative Tensor Factorization",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2015/9504a805/12OmNqyDjnf",
"parentPublication": {
"id": "proceedings/icdm/2015/9504/0",
"title": "2015 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2013/5108/0/5108b199",
"title": "Non-negative Multiple Tensor Factorization",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2013/5108b199/12OmNxdDFM3",
"parentPublication": {
"id": "proceedings/icdm/2013/5108/0",
"title": "2013 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2016/8796/0/07425796",
"title": "Architecture of 4-way tensor factorization for context-aware recommendations",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2016/07425796/12OmNyKa63M",
"parentPublication": {
"id": "proceedings/bigcomp/2016/8796/0",
"title": "2016 International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2017/06/08089452",
"title": "Fast Tensor Factorization for Accurate Internet Anomaly Detection",
"doi": null,
"abstractUrl": "/journal/nt/2017/06/08089452/13rRUwInvpl",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2017/01/07569093",
"title": "Fully Scalable Methods for Distributed Tensor Factorization",
"doi": null,
"abstractUrl": "/journal/tk/2017/01/07569093/13rRUwbaqLW",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2019/09/08449114",
"title": "Accelerated and Inexact Soft-Impute for Large-Scale Matrix and Tensor Completion",
"doi": null,
"abstractUrl": "/journal/tk/2019/09/08449114/13rRUytWF9Q",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2018/9159/0/08595009",
"title": "Variational Bayesian Inference for Robust Streaming Tensor Factorization and Completion",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2018/08595009/17D45VTRoEE",
"parentPublication": {
"id": "proceedings/icdm/2018/9159/0",
"title": "2018 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2018/9159/0/915800b446",
"title": "Variational Bayesian Inference for Robust Streaming Tensor Factorization and Completion",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2018/915800b446/18rqV78Yifm",
"parentPublication": {
"id": "proceedings/icdm/2018/9159/0",
"title": "2018 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102786",
"title": "Multi-View Subspace Clustering via Non-Convex Tensor Rank Minimization",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102786/1kwrlDWKgzS",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhKh",
"title": "2016 7th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems (ScalA)",
"acronym": "scala",
"groupId": "1805696",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxwncnt",
"doi": "10.1109/ScalA.2016.007",
"title": "Left-Preconditioned Communication-Avoiding Conjugate Gradient Methods for Multiphase CFD Simulations on the K Computer",
"normalizedTitle": "Left-Preconditioned Communication-Avoiding Conjugate Gradient Methods for Multiphase CFD Simulations on the K Computer",
"abstract": "The left-preconditioned communication avoiding conjugate gradient (LP-CA-CG) method is applied to the pressure Poisson equation in the multiphase CFD code JUPITER. The arithmetic intensity of the LP-CA-CG method is analyzed, and is dramatically improved by loop splitting for inner product operations and for three term recurrence operations. Two LPCA-CG solvers with block Jacobi preconditioning and with underlap preconditioning are developed. The former is developed based on a hybrid CA approach, in which CA is applied only to global collective communications for inner product operations. The latter is a full CA approach, in which CA is applied also to local point-to-point communications in sparse matrix-vector (SpMV) operations and preconditioning. CA-SpMV requires additional computation for overlapping regions. CA-preconditiong is enabled by underlap preconditioning, which approximates preconditioning for overlapping regions by point Jacobi preconditioning. It is shown that on the K computer, the former is faster, because the performance of local point-to-point communications scales well, and the convergence property becomes worse with underlap preconditioning. The LP-CA-CG solver shows good strong scaling up to 30,000 nodes, where the LP-CA-CG solver achieved higher performance than the original CG solver by reducing the cost of global collective communications by 69 percent.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The left-preconditioned communication avoiding conjugate gradient (LP-CA-CG) method is applied to the pressure Poisson equation in the multiphase CFD code JUPITER. The arithmetic intensity of the LP-CA-CG method is analyzed, and is dramatically improved by loop splitting for inner product operations and for three term recurrence operations. Two LPCA-CG solvers with block Jacobi preconditioning and with underlap preconditioning are developed. The former is developed based on a hybrid CA approach, in which CA is applied only to global collective communications for inner product operations. The latter is a full CA approach, in which CA is applied also to local point-to-point communications in sparse matrix-vector (SpMV) operations and preconditioning. CA-SpMV requires additional computation for overlapping regions. CA-preconditiong is enabled by underlap preconditioning, which approximates preconditioning for overlapping regions by point Jacobi preconditioning. It is shown that on the K computer, the former is faster, because the performance of local point-to-point communications scales well, and the convergence property becomes worse with underlap preconditioning. The LP-CA-CG solver shows good strong scaling up to 30,000 nodes, where the LP-CA-CG solver achieved higher performance than the original CG solver by reducing the cost of global collective communications by 69 percent.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The left-preconditioned communication avoiding conjugate gradient (LP-CA-CG) method is applied to the pressure Poisson equation in the multiphase CFD code JUPITER. The arithmetic intensity of the LP-CA-CG method is analyzed, and is dramatically improved by loop splitting for inner product operations and for three term recurrence operations. Two LPCA-CG solvers with block Jacobi preconditioning and with underlap preconditioning are developed. The former is developed based on a hybrid CA approach, in which CA is applied only to global collective communications for inner product operations. The latter is a full CA approach, in which CA is applied also to local point-to-point communications in sparse matrix-vector (SpMV) operations and preconditioning. CA-SpMV requires additional computation for overlapping regions. CA-preconditiong is enabled by underlap preconditioning, which approximates preconditioning for overlapping regions by point Jacobi preconditioning. It is shown that on the K computer, the former is faster, because the performance of local point-to-point communications scales well, and the convergence property becomes worse with underlap preconditioning. The LP-CA-CG solver shows good strong scaling up to 30,000 nodes, where the LP-CA-CG solver achieved higher performance than the original CG solver by reducing the cost of global collective communications by 69 percent.",
"fno": "07836592",
"keywords": [
"Computational Fluid Dynamics",
"Flow Simulation",
"Jacobian Matrices",
"Matrix Multiplication",
"Multiphase Flow",
"Poisson Equation",
"Sparse Matrices",
"Vectors",
"Multiphase CFD Simulations",
"K Computer",
"LP CA CG Method",
"Left Preconditioned Communication Avoiding Conjugate Gradient Method",
"Pressure Poisson Equation",
"JUPITER Multiphase CFD Code",
"Loop Splitting",
"Inner Product Operations",
"Block Jacobi Preconditioning",
"Underlap Preconditioning",
"Hybrid CA Approach",
"Global Collective Communications",
"Full CA Approach",
"Local Point To Point Communications",
"Sparse Matrix Vector Operations",
"CA Sp MV",
"Overlapping Regions",
"CA Preconditiong",
"Convergence Property",
"Jacobian Matrices",
"Convergence",
"Program Processors",
"Computational Modeling",
"Jupiter",
"Computers",
"Computational Fluid Dynamics",
"Sparse Matrices",
"Gradient Method",
"Optimization",
"Fluid Dynamics"
],
"authors": [
{
"affiliation": null,
"fullName": "Akie Mayumi",
"givenName": "Akie",
"surname": "Mayumi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yasuhiro Idomura",
"givenName": "Yasuhiro",
"surname": "Idomura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Takuya Ina",
"givenName": "Takuya",
"surname": "Ina",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Susumu Yamada",
"givenName": "Susumu",
"surname": "Yamada",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Toshiyuki Imamura",
"givenName": "Toshiyuki",
"surname": "Imamura",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "scala",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-11-01T00:00:00",
"pubType": "proceedings",
"pages": "17-24",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-5222-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07836591",
"articleId": "12OmNrJAecn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07836593",
"articleId": "12OmNBQC8bd",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipdps/2015/8649/0/8649a723",
"title": "Exploring Shared-Memory Optimizations for an Unstructured Mesh CFD Application on Modern Parallel Systems",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2015/8649a723/12OmNAOKnXz",
"parentPublication": {
"id": "proceedings/ipdps/2015/8649/0",
"title": "2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/1990/2055/0/00129949",
"title": "A parallel block-diagonal preconditioned conjugate-gradient solution algorithm for circuit and device simulations",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/1990/00129949/12OmNzcxZqn",
"parentPublication": {
"id": "proceedings/iccad/1990/2055/0",
"title": "1990 IEEE International Conference on Computer-Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b438",
"title": "CFD Numerical Simulation of Exhaust Muffler",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b438/12OmNzzfTm6",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipcw/2015/8717/0/8717a019",
"title": "Integrated Moisture Separator Design Using CFD",
"doi": null,
"abstractUrl": "/proceedings-article/hipcw/2015/8717a019/12OmNzzfTmU",
"parentPublication": {
"id": "proceedings/hipcw/2015/8717/0",
"title": "2015 IEEE 22nd International Conference on High Performance Computing Workshops (HiPCW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2009/03/mcs2009030068",
"title": "A Customized Python Module for CFD Flow Analysis within VisTrails",
"doi": null,
"abstractUrl": "/magazine/cs/2009/03/mcs2009030068/13rRUyeTVlL",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scala/2018/0176/0/017600a017",
"title": "Communication Avoiding Multigrid Preconditioned Conjugate Gradient Method for Extreme Scale Multiphase CFD Simulations",
"doi": null,
"abstractUrl": "/proceedings-article/scala/2018/017600a017/18jXKefKL6g",
"parentPublication": {
"id": "proceedings/scala/2018/0176/0",
"title": "2018 IEEE/ACM 9th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems (scalA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scala/2019/5989/0/598900a001",
"title": "GPU Acceleration of Communication Avoiding Chebyshev Basis Conjugate Gradient Solver for Multiphase CFD Simulations",
"doi": null,
"abstractUrl": "/proceedings-article/scala/2019/598900a001/1grNUkoYFbi",
"parentPublication": {
"id": "proceedings/scala/2019/5989/0",
"title": "2019 IEEE/ACM 10th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems (ScalA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/candarw/2020/9919/0/991900a191",
"title": "Modernising an Industrial CFD Application",
"doi": null,
"abstractUrl": "/proceedings-article/candarw/2020/991900a191/1rqEH7D22vS",
"parentPublication": {
"id": "proceedings/candarw/2020/9919/0",
"title": "2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ia3/2021/1126/0/112600a019",
"title": "Accelerating unstructured-grid CFD algorithms on NVIDIA and AMD GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ia3/2021/112600a019/1zHHUjJAvUA",
"parentPublication": {
"id": "proceedings/ia3/2021/1126/0",
"title": "2021 IEEE/ACM 11th Workshop on Irregular Applications: Architectures and Algorithms (IA3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scala/2021/1128/0/112800a001",
"title": "Iterative methods with mixed-precision preconditioning for ill-conditioned linear systems in multiphase CFD simulations",
"doi": null,
"abstractUrl": "/proceedings-article/scala/2021/112800a001/1zHJ3yi7ijS",
"parentPublication": {
"id": "proceedings/scala/2021/1128/0",
"title": "2021 12th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems (ScalA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxWcH14",
"title": "2013 Ninth International Conference on Computational Intelligence and Security (CIS)",
"acronym": "cis",
"groupId": "1001517",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy50geh",
"doi": "10.1109/CIS.2013.85",
"title": "Preconditioned AOR Iterative Method for M-Matrix",
"normalizedTitle": "Preconditioned AOR Iterative Method for M-Matrix",
"abstract": "In this paper, we propose a new selection mode of 'r, t' for the preconditioner I+C and analyze the convergence performance of the preconditioned AOR iterative method induced by this preconditioner. For a nonsingular M-matrix, we show that the preconditioned AOR iterative method with this choice and the preconditioned methods advised by Evans et al. are all convergent, and that the preconditioned method with the preconditioner I+C has faster convergence speed than the original AOR method. Finally, the limit numerical results are provided to support the obtained results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we propose a new selection mode of 'r, t' for the preconditioner I+C and analyze the convergence performance of the preconditioned AOR iterative method induced by this preconditioner. For a nonsingular M-matrix, we show that the preconditioned AOR iterative method with this choice and the preconditioned methods advised by Evans et al. are all convergent, and that the preconditioned method with the preconditioner I+C has faster convergence speed than the original AOR method. Finally, the limit numerical results are provided to support the obtained results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we propose a new selection mode of 'r, t' for the preconditioner I+C and analyze the convergence performance of the preconditioned AOR iterative method induced by this preconditioner. For a nonsingular M-matrix, we show that the preconditioned AOR iterative method with this choice and the preconditioned methods advised by Evans et al. are all convergent, and that the preconditioned method with the preconditioner I+C has faster convergence speed than the original AOR method. Finally, the limit numerical results are provided to support the obtained results.",
"fno": "06746421",
"keywords": [
"Iterative Methods",
"Convergence",
"Vectors",
"Jacobian Matrices",
"Educational Institutions",
"Art",
"Acceleration",
"Spectral Radius",
"Preconditioned AOR Iterative Method",
"Mmatrix",
"Irreducible M Matrix"
],
"authors": [
{
"affiliation": null,
"fullName": "Qiufang Xue",
"givenName": "Qiufang",
"surname": "Xue",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xingbao Gao",
"givenName": "Xingbao",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoguang Liu",
"givenName": "Xiaoguang",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "372-376",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-2549-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06746420",
"articleId": "12OmNzBOhzs",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06746422",
"articleId": "12OmNAS9zzd",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2008/3502/0/3502a803",
"title": "A Recommendation System for Preconditioned Iterative Solvers",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2008/3502a803/12OmNClQ0z6",
"parentPublication": {
"id": "proceedings/icdm/2008/3502/0",
"title": "2008 Eighth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2011/688/0/05954525",
"title": "Improvement of Preconditioned GAOR Iterative Method for L-matrices",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2011/05954525/12OmNxGSmfm",
"parentPublication": {
"id": "proceedings/icic/2011/688/0",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/2003/762/0/01257664",
"title": "Efficient iterative time preconditioners for harmonic balance RF circuit simulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/2003/01257664/12OmNxj233N",
"parentPublication": {
"id": "proceedings/iccad/2003/762/0",
"title": "ICCAD-2003. International Conference on Computer Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsee/2012/4647/2/4647b003",
"title": "The New Preconditioned SOR Method for M-matrices",
"doi": null,
"abstractUrl": "/proceedings-article/iccsee/2012/4647b003/12OmNxwWoIF",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2013/5004/0/5004a910",
"title": "A Fast Preconditioned Iterative Solver for Unsteady Incompressible Flow Problems",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2013/5004a910/12OmNxymo5m",
"parentPublication": {
"id": "proceedings/iccis/2013/5004/0",
"title": "2013 International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifita/2009/3600/1/3600a382",
"title": "Preconditioned Gauss-Seidel Iterative Method for Linear Systems",
"doi": null,
"abstractUrl": "/proceedings-article/ifita/2009/3600a382/12OmNylKB2x",
"parentPublication": {
"id": "proceedings/ifita/2009/3600/3",
"title": "Information Technology and Applications, International Forum on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1992/0532/3/00226264",
"title": "Preconditioned iterative methods for solving Toeplitz-plus-Hankel systems",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1992/00226264/12OmNzwZ6ti",
"parentPublication": {
"id": "proceedings/icassp/1992/0532/3",
"title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisai/2021/0692/0/069200b097",
"title": "Block Triangular Preconditioner Based on Accelerated AOR Splitting Method for Generalized Saddle Point Problem",
"doi": null,
"abstractUrl": "/proceedings-article/cisai/2021/069200b097/1BmO64bbRbG",
"parentPublication": {
"id": "proceedings/cisai/2021/0692/0",
"title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093265",
"title": "Two-Grid Preconditioned Solver for Bundle Adjustment",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093265/1jPbpxzpGdG",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aemcse/2021/1596/0/159600b055",
"title": "A preconditioned accelerated matrix multi-splitting iteration method for linear complementarity problems of H-matrices",
"doi": null,
"abstractUrl": "/proceedings-article/aemcse/2021/159600b055/1wcdArHm4QU",
"parentPublication": {
"id": "proceedings/aemcse/2021/1596/0",
"title": "2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKiqL",
"title": "2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)",
"acronym": "dasc-picom-datacom-cyberscitech",
"groupId": "1001364",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45VsBTWn",
"doi": "10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00069",
"title": "Improved Fast-ICA for Change Detection of Multi Temporal Remote Sensing Images",
"normalizedTitle": "Improved Fast-ICA for Change Detection of Multi Temporal Remote Sensing Images",
"abstract": "When the selection of the initial points in the Fast-Independent Component Analysis (Fast-ICA) algorithm is far from the minimum point, the problem of convergence may not be convergent, and an improved Fast-ICA algorithm based on the damped Newton method is proposed. The algorithm adds one dimension search along the direction of Newton iteration, thus ensuring the convergence of Fast-ICA algorithm. Secondly, the Contourlet transform is combined with the improved Fast-ICA. When using the combined method for change detection, the initial transformation of remote sensing image is first used by Contourlet transform; secondly, the modified Fast-ICA algorithm is used to detect the change; then the image after the change detection is invert with Contourlet; finally, the image is segmented by threshold value, and the change results are obtained. The experimental results show that, compared with the change detection results based on the traditional Fast-ICA algorithm, the proposed method can effectively separate the information of the change, and the detection precision is higher.",
"abstracts": [
{
"abstractType": "Regular",
"content": "When the selection of the initial points in the Fast-Independent Component Analysis (Fast-ICA) algorithm is far from the minimum point, the problem of convergence may not be convergent, and an improved Fast-ICA algorithm based on the damped Newton method is proposed. The algorithm adds one dimension search along the direction of Newton iteration, thus ensuring the convergence of Fast-ICA algorithm. Secondly, the Contourlet transform is combined with the improved Fast-ICA. When using the combined method for change detection, the initial transformation of remote sensing image is first used by Contourlet transform; secondly, the modified Fast-ICA algorithm is used to detect the change; then the image after the change detection is invert with Contourlet; finally, the image is segmented by threshold value, and the change results are obtained. The experimental results show that, compared with the change detection results based on the traditional Fast-ICA algorithm, the proposed method can effectively separate the information of the change, and the detection precision is higher.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "When the selection of the initial points in the Fast-Independent Component Analysis (Fast-ICA) algorithm is far from the minimum point, the problem of convergence may not be convergent, and an improved Fast-ICA algorithm based on the damped Newton method is proposed. The algorithm adds one dimension search along the direction of Newton iteration, thus ensuring the convergence of Fast-ICA algorithm. Secondly, the Contourlet transform is combined with the improved Fast-ICA. When using the combined method for change detection, the initial transformation of remote sensing image is first used by Contourlet transform; secondly, the modified Fast-ICA algorithm is used to detect the change; then the image after the change detection is invert with Contourlet; finally, the image is segmented by threshold value, and the change results are obtained. The experimental results show that, compared with the change detection results based on the traditional Fast-ICA algorithm, the proposed method can effectively separate the information of the change, and the detection precision is higher.",
"fno": "751800a357",
"keywords": [
"Geophysical Image Processing",
"Independent Component Analysis",
"Newton Method",
"Object Detection",
"Remote Sensing",
"Multitemporal Remote Sensing",
"Improved Fast ICA Algorithm",
"Remote Sensing Image",
"Modified Fast ICA Algorithm",
"Change Detection Results",
"Contourlet Transform",
"Fast Independent Component Analysis Algorithm",
"Damped Newton Method",
"Newton Iteration",
"Remote Sensing",
"Change Detection Algorithms",
"Entropy",
"Transforms",
"Convergence",
"Jacobian Matrices",
"Newton Method",
"Remote Sensing Image",
"Independent Component Analysis",
"Change Detection",
"Damped Newton Method",
"Contourlet"
],
"authors": [
{
"affiliation": null,
"fullName": "Jingyu Yang",
"givenName": "Jingyu",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhengdong Ma",
"givenName": "Zhengdong",
"surname": "Ma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianwu Dang",
"givenName": "Jianwu",
"surname": "Dang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Linjing Wei",
"givenName": "Linjing",
"surname": "Wei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yangping Wang",
"givenName": "Yangping",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dasc-picom-datacom-cyberscitech",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-08-01T00:00:00",
"pubType": "proceedings",
"pages": "357-361",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-7518-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "751800a353",
"articleId": "17D45WgziOj",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "751800a362",
"articleId": "17D45WXIkCR",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cgiv/2007/2928/0/29280397",
"title": "A Novel Approach for Change Detection in Remote Sensing Image Based on Saliency Map",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2007/29280397/12OmNAkWvK0",
"parentPublication": {
"id": "proceedings/cgiv/2007/2928/0",
"title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aped/2010/4045/0/4045a066",
"title": "Application and Future Development of Land Use Change Detection Based on Remote Sensing Technology in China",
"doi": null,
"abstractUrl": "/proceedings-article/aped/2010/4045a066/12OmNAmVH4T",
"parentPublication": {
"id": "proceedings/aped/2010/4045/0",
"title": "2010 Asia-Pacific Conference on Power Electronics and Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esiat/2009/3682/1/3682a481",
"title": "An Object-Based Approach for Forest-Cover Change Detection using Multi-Temporal High-Resolution Remote Sensing Data",
"doi": null,
"abstractUrl": "/proceedings-article/esiat/2009/3682a481/12OmNCfjeBp",
"parentPublication": {
"id": "proceedings/esiat/2009/3682/1",
"title": "Environmental Science and Information Application Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ihmsc/2011/4444/2/4444b119",
"title": "Change Detection of Multi-temporal Remote Sensing Data Using Wavelet-Based Fusion and K-Means Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/ihmsc/2011/4444b119/12OmNvSbBCD",
"parentPublication": {
"id": "proceedings/ihmsc/2011/4444/2",
"title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2012/4676/0/4676b898",
"title": "Parallel Multi-Temporal Remote Sensing Image Change Detection on GPU",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2012/4676b898/12OmNwIHowL",
"parentPublication": {
"id": "proceedings/ipdpsw/2012/4676/0",
"title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ettandgrs/2008/3563/2/3563b476",
"title": "Remote Sensing and Spatial Overlaying Analysis Based Spatially Sampling for Monitoring Urban Land Change",
"doi": null,
"abstractUrl": "/proceedings-article/ettandgrs/2008/3563b476/12OmNx38vMP",
"parentPublication": {
"id": "ettandgrs/2008/3563/2",
"title": "Education Technology and Training & Geoscience and Remote Sensing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apcip/2009/3699/2/3699b189",
"title": "Change Detection from Remote Sensing Imageries Using Spectral Change Vector Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/apcip/2009/3699b189/12OmNzYwc8D",
"parentPublication": {
"id": "proceedings/apcip/2009/3699/1",
"title": "Information Processing, Asia-Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imsccs/2006/2581/1/25810188",
"title": "River Change Detection Based on Remote Sensing Image and Vector",
"doi": null,
"abstractUrl": "/proceedings-article/imsccs/2006/25810188/12OmNzd7bgU",
"parentPublication": {
"id": "proceedings/imsccs/2006/2581/1",
"title": "Computer and Computational Sciences, International Multi-Symposiums on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dicta/2008/3456/0/3456a104",
"title": "Sequential Transmission of Remote Sensing Data Using a Linear Model to Update Change",
"doi": null,
"abstractUrl": "/proceedings-article/dicta/2008/3456a104/12OmNzwZ6wq",
"parentPublication": {
"id": "proceedings/dicta/2008/3456/0",
"title": "2008 Digital Image Computing: Techniques and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssiai/2020/5745/0/09094603",
"title": "Cycle-Consistent Adversarial Networks for Realistic Pervasive Change Generation in Remote Sensing Imagery",
"doi": null,
"abstractUrl": "/proceedings-article/ssiai/2020/09094603/1jVQEmC59L2",
"parentPublication": {
"id": "proceedings/ssiai/2020/5745/0",
"title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwcl7K3",
"title": "2010 Third International Symposium on Information Processing",
"acronym": "isip",
"groupId": "1001769",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNApcuds",
"doi": "10.1109/ISIP.2010.67",
"title": "Basketball Court Detection Based on Adaptive Gaussian Mixture Model and the Application in Basketball Video Annotation",
"normalizedTitle": "Basketball Court Detection Based on Adaptive Gaussian Mixture Model and the Application in Basketball Video Annotation",
"abstract": "Basketball court detection is the key step of video annotation, however the court present different color when using different camera or in different play court. In this paper the adaptive Gaussian Mixture Model (GMM) is used to build the model of the basketball court, which is used in the basketball video annotation. The proposed algorithm extracts the main color of the court’s main color using the GMM and IEM. Under these conditions the basketball video is annotated into in-play and close-up. Experimental results show that the proposed algorithms are effective.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Basketball court detection is the key step of video annotation, however the court present different color when using different camera or in different play court. In this paper the adaptive Gaussian Mixture Model (GMM) is used to build the model of the basketball court, which is used in the basketball video annotation. The proposed algorithm extracts the main color of the court’s main color using the GMM and IEM. Under these conditions the basketball video is annotated into in-play and close-up. Experimental results show that the proposed algorithms are effective.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Basketball court detection is the key step of video annotation, however the court present different color when using different camera or in different play court. In this paper the adaptive Gaussian Mixture Model (GMM) is used to build the model of the basketball court, which is used in the basketball video annotation. The proposed algorithm extracts the main color of the court’s main color using the GMM and IEM. Under these conditions the basketball video is annotated into in-play and close-up. Experimental results show that the proposed algorithms are effective.",
"fno": "4261a368",
"keywords": [
"Basketball Video Annotation",
"Court Detection",
"AGMM",
"IEM"
],
"authors": [
{
"affiliation": null,
"fullName": "Liu Yun",
"givenName": "Liu",
"surname": "Yun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Huang Chao",
"givenName": "Huang",
"surname": "Chao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Liu Xueying",
"givenName": "Liu",
"surname": "Xueying",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isip",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "368-371",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4261-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4261a363",
"articleId": "12OmNqGA59I",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4261a372",
"articleId": "12OmNxcdG3o",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338571",
"title": "Cost-effective camera pose estimation for basketball analysis using radon transform",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338571/12OmNBBzomo",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdma/2012/4772/0/4772a376",
"title": "Electronic Court Rule Lines",
"doi": null,
"abstractUrl": "/proceedings-article/icdma/2012/4772a376/12OmNqG0T2q",
"parentPublication": {
"id": "proceedings/icdma/2012/4772/0",
"title": "2012 Third International Conference on Digital Manufacturing & Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2000/0580/0/05800320",
"title": "Video Annotation for Content-based Retrieval using Human Behavior Analysis and Domain Knowledge",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2000/05800320/12OmNqGA5hi",
"parentPublication": {
"id": "proceedings/fg/2000/0580/0",
"title": "Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icig/2011/4541/0/4541a553",
"title": "Hand Detection Using Robust Color Correction and Gaussian Mixture Model",
"doi": null,
"abstractUrl": "/proceedings-article/icig/2011/4541a553/12OmNvrdI6d",
"parentPublication": {
"id": "proceedings/icig/2011/4541/0",
"title": "Image and Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2011/0844/0/06027356",
"title": "Speeded up Gaussian Mixture Model algorithm for background subtraction",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2011/06027356/12OmNweBUFE",
"parentPublication": {
"id": "proceedings/avss/2011/0844/0",
"title": "2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2011/4559/0/4559a046",
"title": "The Improved Gaussian Mixture Model Based on Motion Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a046/12OmNxWcH2w",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460389",
"title": "Image annotation using adapted Gaussian mixture model",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460389/12OmNylsZTI",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2011/4353/2/05751088",
"title": "Image Semantic Annotation Based on Gaussian Mixture Model",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2011/05751088/12OmNzTppI7",
"parentPublication": {
"id": "icicta/2011/4353/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118240",
"title": "Court Reconstruction for Camera Calibration in Broadcast Basketball Videos",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118240/13rRUwInvl4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitbs/2021/4854/0/485400a630",
"title": "Automatic Detection Approach of Basketball Track in Sports Video",
"doi": null,
"abstractUrl": "/proceedings-article/icitbs/2021/485400a630/1wB6HjUn7jy",
"parentPublication": {
"id": "proceedings/icitbs/2021/4854/0",
"title": "2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzSh1aC",
"title": "2012 Third International Conference on Digital Manufacturing & Automation",
"acronym": "icdma",
"groupId": "1800272",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqG0T2q",
"doi": "10.1109/ICDMA.2012.91",
"title": "Electronic Court Rule Lines",
"normalizedTitle": "Electronic Court Rule Lines",
"abstract": "In this paper, multiple electronic court rule line representations with controlled LED light bars are proposed. The various court rule lines can be represented by the LED light bars which are controlled by 8051 MCU. In our designed system, the distinct rule lines can be shown for basketball, badminton, and volleyball courts, respectively. By this novel design, the drawbacks of overlapped and confused rule lines in the traditional courts can be improved. On other hand, this design can help the sportsmen to recognize relative rule lines and their positions. Furthermore, the pressure sensors are also considered into our design as an aiding judge system for the referees. In addition, when the player shot ball into the basket, the LED light bars of the court rule will flash and the recorded sound will be played with the sound module. Particularly, the RFID module is also considered as an electronic key to help user to get the authorization of the electronic court rule line system. This electronic court rule line system not only helps sportsmen and referees, but also connects them with audiences.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, multiple electronic court rule line representations with controlled LED light bars are proposed. The various court rule lines can be represented by the LED light bars which are controlled by 8051 MCU. In our designed system, the distinct rule lines can be shown for basketball, badminton, and volleyball courts, respectively. By this novel design, the drawbacks of overlapped and confused rule lines in the traditional courts can be improved. On other hand, this design can help the sportsmen to recognize relative rule lines and their positions. Furthermore, the pressure sensors are also considered into our design as an aiding judge system for the referees. In addition, when the player shot ball into the basket, the LED light bars of the court rule will flash and the recorded sound will be played with the sound module. Particularly, the RFID module is also considered as an electronic key to help user to get the authorization of the electronic court rule line system. This electronic court rule line system not only helps sportsmen and referees, but also connects them with audiences.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, multiple electronic court rule line representations with controlled LED light bars are proposed. The various court rule lines can be represented by the LED light bars which are controlled by 8051 MCU. In our designed system, the distinct rule lines can be shown for basketball, badminton, and volleyball courts, respectively. By this novel design, the drawbacks of overlapped and confused rule lines in the traditional courts can be improved. On other hand, this design can help the sportsmen to recognize relative rule lines and their positions. Furthermore, the pressure sensors are also considered into our design as an aiding judge system for the referees. In addition, when the player shot ball into the basket, the LED light bars of the court rule will flash and the recorded sound will be played with the sound module. Particularly, the RFID module is also considered as an electronic key to help user to get the authorization of the electronic court rule line system. This electronic court rule line system not only helps sportsmen and referees, but also connects them with audiences.",
"fno": "4772a376",
"keywords": [
"Radiofrequency Identification",
"Light Emitting Diodes",
"Algorithms",
"Bars",
"Consumer Electronics",
"Relays",
"Electronic Enforcement System",
"Light Emitting Diode LED",
"LED Light Bar",
"Microprocessor",
"Court Rule Line",
"Radio Frequency Identification RFID"
],
"authors": [
{
"affiliation": null,
"fullName": "Wel-Ming Ni",
"givenName": "Wel-Ming",
"surname": "Ni",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Li-Shan Ma",
"givenName": "Li-Shan",
"surname": "Ma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chih-Hung Wu",
"givenName": "Chih-Hung",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chun-Chieh Wang",
"givenName": "Chun-Chieh",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "De-En Zhan",
"givenName": "De-En",
"surname": "Zhan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yi-Shu Cheng",
"givenName": "Yi-Shu",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jun-Qi Wang",
"givenName": "Jun-Qi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-07-01T00:00:00",
"pubType": "proceedings",
"pages": "376-379",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-2217-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4772a373",
"articleId": "12OmNCdk2Dz",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4772a380",
"articleId": "12OmNxjjEiG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2010/4109/0/4109b916",
"title": "Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109b916/12OmNvwTGAf",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mipr/2018/1857/0/185701a146",
"title": "Entity Resolution Using Logistic Regression as an extension to the Rule-Based Oyster System",
"doi": null,
"abstractUrl": "/proceedings-article/mipr/2018/185701a146/12OmNzWfp4m",
"parentPublication": {
"id": "proceedings/mipr/2018/1857/0",
"title": "2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2019/4528/0/452800a150",
"title": "Logic-Based Online Complex Event Rule Learning with Weight Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2019/452800a150/1fHjNmZ32hy",
"parentPublication": {
"id": "proceedings/dsc/2019/4528/0",
"title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAXxXaK",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"acronym": "iccv",
"groupId": "1000149",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwp74LB",
"doi": "10.1109/ICCV.2017.239",
"title": "Am I a Baller? Basketball Performance Assessment from First-Person Videos",
"normalizedTitle": "Am I a Baller? Basketball Performance Assessment from First-Person Videos",
"abstract": "This paper presents a method to assess a basketball player's performance from his/her first-person video. A key challenge lies in the fact that the evaluation metric is highly subjective and specific to a particular evaluator. We leverage the first-person camera to address this challenge. The spatiotemporal visual semantics provided by a first-person view allows us to reason about the camera wearer's actions while he/she is participating in an unscripted basketball game. Our method takes a player's first-person video and provides a player's performance measure that is specific to an evaluator's preference. To achieve this goal, we first use a convolutional LSTM network to detect atomic basketball events from first-person videos. Our network's ability to zoom-in to the salient regions addresses the issue of a severe camera wearer's head movement in first-person videos. The detected atomic events are then passed through the Gaussian mixtures to construct a highly non-linear visual spatiotemporal basketball assessment feature. Finally, we use this feature to learn a basketball assessment model from pairs of labeled first-person basketball videos, for which a basketball expert indicates, which of the two players is better. We demonstrate that despite not knowing the basketball evaluator's criterion, our model learns to accurately assess the players in real-world games. Furthermore, our model can also discover basketball events that contribute positively and negatively to a player's performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a method to assess a basketball player's performance from his/her first-person video. A key challenge lies in the fact that the evaluation metric is highly subjective and specific to a particular evaluator. We leverage the first-person camera to address this challenge. The spatiotemporal visual semantics provided by a first-person view allows us to reason about the camera wearer's actions while he/she is participating in an unscripted basketball game. Our method takes a player's first-person video and provides a player's performance measure that is specific to an evaluator's preference. To achieve this goal, we first use a convolutional LSTM network to detect atomic basketball events from first-person videos. Our network's ability to zoom-in to the salient regions addresses the issue of a severe camera wearer's head movement in first-person videos. The detected atomic events are then passed through the Gaussian mixtures to construct a highly non-linear visual spatiotemporal basketball assessment feature. Finally, we use this feature to learn a basketball assessment model from pairs of labeled first-person basketball videos, for which a basketball expert indicates, which of the two players is better. We demonstrate that despite not knowing the basketball evaluator's criterion, our model learns to accurately assess the players in real-world games. Furthermore, our model can also discover basketball events that contribute positively and negatively to a player's performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a method to assess a basketball player's performance from his/her first-person video. A key challenge lies in the fact that the evaluation metric is highly subjective and specific to a particular evaluator. We leverage the first-person camera to address this challenge. The spatiotemporal visual semantics provided by a first-person view allows us to reason about the camera wearer's actions while he/she is participating in an unscripted basketball game. Our method takes a player's first-person video and provides a player's performance measure that is specific to an evaluator's preference. To achieve this goal, we first use a convolutional LSTM network to detect atomic basketball events from first-person videos. Our network's ability to zoom-in to the salient regions addresses the issue of a severe camera wearer's head movement in first-person videos. The detected atomic events are then passed through the Gaussian mixtures to construct a highly non-linear visual spatiotemporal basketball assessment feature. Finally, we use this feature to learn a basketball assessment model from pairs of labeled first-person basketball videos, for which a basketball expert indicates, which of the two players is better. We demonstrate that despite not knowing the basketball evaluator's criterion, our model learns to accurately assess the players in real-world games. Furthermore, our model can also discover basketball events that contribute positively and negatively to a player's performance.",
"fno": "1032c196",
"keywords": [
"Cameras",
"Gaussian Processes",
"Image Motion Analysis",
"Learning Artificial Intelligence",
"Mixture Models",
"Sport",
"Video Signal Processing",
"Nonlinear Visual Spatiotemporal Basketball Assessment Feature",
"Basketball Assessment Model",
"Labeled First Person Basketball Videos",
"Basketball Expert",
"Basketball Performance Assessment",
"Basketball Player",
"First Person Camera",
"First Person View",
"Unscripted Basketball Game",
"Atomic Basketball Events",
"Spatiotemporal Visual Semantics",
"Convolutional LSTM Network",
"Salient Regions",
"Head Movement",
"Gaussian Mixtures",
"Videos",
"Cameras",
"Visualization",
"Spatiotemporal Phenomena",
"Games",
"Predictive Models"
],
"authors": [
{
"affiliation": null,
"fullName": "Gedas Bertasius",
"givenName": "Gedas",
"surname": "Bertasius",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hyun Soo Park",
"givenName": "Hyun Soo",
"surname": "Park",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stella X. Yu",
"givenName": "Stella X.",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianbo Shi",
"givenName": "Jianbo",
"surname": "Shi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-10-01T00:00:00",
"pubType": "proceedings",
"pages": "2196-2204",
"year": "2017",
"issn": "2380-7504",
"isbn": "978-1-5386-1032-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "1032c186",
"articleId": "12OmNwGqBpF",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "1032c205",
"articleId": "12OmNyqiaOb",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccvw/2017/1034/0/1034c313",
"title": "Temporal Localization and Spatial Segmentation of Joint Attention in Multiple First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034c313/12OmNrIJqAw",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2014/4308/0/4308a526",
"title": "Action and Interaction Recognition in First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2014/4308a526/12OmNvnwViH",
"parentPublication": {
"id": "proceedings/cvprw/2014/4308/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2014/4311/0/4311a063",
"title": "Salient Event Detection in Basketball Mobile Videos",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2014/4311a063/12OmNxTEiRJ",
"parentPublication": {
"id": "proceedings/ism/2014/4311/0",
"title": "2014 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457e734",
"title": "Identifying First-Person Camera Wearers in Third-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457e734/12OmNzCWG4a",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457b206",
"title": "Predicting Behaviors of Basketball Players from First Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457b206/12OmNzgeLBh",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118240",
"title": "Court Reconstruction for Camera Calibration in Broadcast Basketball Videos",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118240/13rRUwInvl4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/11/08103030",
"title": "Ego-Surfing: Person Localization in First-Person Videos Using Ego-Motion Signatures",
"doi": null,
"abstractUrl": "/journal/tp/2018/11/08103030/143fgZGvn0s",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000h593",
"title": "Future Person Localization in First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000h593/17D45Vw15sY",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000h396",
"title": "Actor and Observer: Joint Modeling of First and Third-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000h396/17D45WODaoX",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000f889",
"title": "Egocentric Basketball Motion Planning from a Single First-Person Image",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f889/17D45XlyDuT",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxwENve",
"title": "2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)",
"acronym": "mipr",
"groupId": "1825825",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxFsmFH",
"doi": "10.1109/MIPR.2018.00090",
"title": "Comprehensive Dataset of Broadcast Soccer Videos",
"normalizedTitle": "Comprehensive Dataset of Broadcast Soccer Videos",
"abstract": "In the absence of a rich dataset, sports video analysis remains a challenging task. Shot analysis, event detection, and player tracking are important aspects of soccer game research, however currently available datasets focus mainly on single-type annotations, and have several limitations when applied to full video analysis; these include a lack of training samples, temporal annotations, and rich labels of different types. In this paper, we focus on broadcast soccer videos and present a comprehensive dataset for analysis. In its current version, the dataset contains 222 broadcast soccer videos, totaling 170 video hours. The dataset covers three annotation types: (1) A shot boundary with two shot transition types, and shot type annotations with five shot types; (2) Event annotations with 11 event labels, and a story annotation with 15 story labels at coarser granularity; and (3) bounding boxes of the players under analysis in a subset of 19908 video frames. We hope that the introduction of this dataset will enable the research community to develop soccer video analysis techniques.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the absence of a rich dataset, sports video analysis remains a challenging task. Shot analysis, event detection, and player tracking are important aspects of soccer game research, however currently available datasets focus mainly on single-type annotations, and have several limitations when applied to full video analysis; these include a lack of training samples, temporal annotations, and rich labels of different types. In this paper, we focus on broadcast soccer videos and present a comprehensive dataset for analysis. In its current version, the dataset contains 222 broadcast soccer videos, totaling 170 video hours. The dataset covers three annotation types: (1) A shot boundary with two shot transition types, and shot type annotations with five shot types; (2) Event annotations with 11 event labels, and a story annotation with 15 story labels at coarser granularity; and (3) bounding boxes of the players under analysis in a subset of 19908 video frames. We hope that the introduction of this dataset will enable the research community to develop soccer video analysis techniques.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the absence of a rich dataset, sports video analysis remains a challenging task. Shot analysis, event detection, and player tracking are important aspects of soccer game research, however currently available datasets focus mainly on single-type annotations, and have several limitations when applied to full video analysis; these include a lack of training samples, temporal annotations, and rich labels of different types. In this paper, we focus on broadcast soccer videos and present a comprehensive dataset for analysis. In its current version, the dataset contains 222 broadcast soccer videos, totaling 170 video hours. The dataset covers three annotation types: (1) A shot boundary with two shot transition types, and shot type annotations with five shot types; (2) Event annotations with 11 event labels, and a story annotation with 15 story labels at coarser granularity; and (3) bounding boxes of the players under analysis in a subset of 19908 video frames. We hope that the introduction of this dataset will enable the research community to develop soccer video analysis techniques.",
"fno": "185701a418",
"keywords": [
"Image Motion Analysis",
"Object Detection",
"Object Tracking",
"Sport",
"Video Signal Processing",
"Comprehensive Dataset",
"Shot Transition Types",
"Story Annotation",
"Soccer Video Analysis Techniques",
"Sports Video Analysis",
"Shot Analysis",
"Soccer Game Research",
"Single Type Annotations",
"Temporal Annotations",
"Event Annotations",
"Broadcast Soccer Videos",
"Event Detection",
"Player Tracking",
"Shot Boundary",
"Coarser Granularity",
"Videos",
"Games",
"Event Detection",
"Visualization",
"Object Tracking",
"Soccer Video Dataset",
"Shot Boundary Detection",
"Shot Classification",
"Event Detection",
"Visual Object Tracking"
],
"authors": [
{
"affiliation": null,
"fullName": "Junqing Yu",
"givenName": "Junqing",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Aiping Lei",
"givenName": "Aiping",
"surname": "Lei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zikai Song",
"givenName": "Zikai",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tingting Wang",
"givenName": "Tingting",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hengyou Cai",
"givenName": "Hengyou",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Na Feng",
"givenName": "Na",
"surname": "Feng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mipr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-04-01T00:00:00",
"pubType": "proceedings",
"pages": "418-423",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-1857-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "185701a412",
"articleId": "12OmNzQR1rl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "185701a424",
"articleId": "12OmNAq3hQC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bigmm/2015/8688/0/8688a064",
"title": "Temporal Multiple Correspondence Analysis for Big Data Mining in Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/bigmm/2015/8688a064/12OmNvmXJ6S",
"parentPublication": {
"id": "proceedings/bigmm/2015/8688/0",
"title": "2015 IEEE International Conference on Multimedia Big Data (BigMM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2015/9711/0/5720a774",
"title": "Injury Mechanism Classification in Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2015/5720a774/12OmNyQYtu5",
"parentPublication": {
"id": "proceedings/iccvw/2015/9711/0",
"title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000b792",
"title": "SoccerNet: A Scalable Dataset for Action Spotting in Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000b792/17D45Wuc33l",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2022/0915/0/091500c141",
"title": "Transductive Weakly-Supervised Player Detection using Soccer Broadcast Videos",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500c141/1B13zMZjj9e",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900d490",
"title": "SoccerNet-Tracking: Multiple Object Tracking Dataset and Benchmark in Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900d490/1G56YcMtuko",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600c439",
"title": "Fine-Grained Visual Dribbling Style Analysis for Soccer Videos With Augmented Dribble Energy Image",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600c439/1iTve1btAnS",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2020/1485/0/09106051",
"title": "Automatic Key Moment Extraction and Highlights Generation Based on Comprehensive Soccer Video Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2020/09106051/1kwqzyORt2o",
"parentPublication": {
"id": "proceedings/icmew/2020/1485/0",
"title": "2020 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09150981",
"title": "Event detection in coarsely annotated sports videos via parallel multi receptive field 1D convolutions",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09150981/1lPHv2kMgBa",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800n3123",
"title": "A Context-Aware Loss Function for Action Spotting in Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800n3123/1m3nYp7w98s",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900e503",
"title": "SoccerNet-v2: A Dataset and Benchmarks for Holistic Understanding of Broadcast Soccer Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900e503/1wzs1AsDs5i",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxQOjzV",
"title": "2014 IEEE International Symposium on Multimedia (ISM)",
"acronym": "ism",
"groupId": "1001094",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxTEiRJ",
"doi": "10.1109/ISM.2014.67",
"title": "Salient Event Detection in Basketball Mobile Videos",
"normalizedTitle": "Salient Event Detection in Basketball Mobile Videos",
"abstract": "Modern smartphones have become the most popular means for recording videos. In fact, thanks to their portability, smartphones allow for recording anything and at any moment of our everyday life. One common occasion is represented by sport happenings, where people often record their favourite team or players. Automatic analysis of such videos is important for enabling applications such as automatic organization, browsing and summarization of the content. This paper proposes novel algorithms for the detection of salient events in videos recorded at basketball games. The novel approach consists of jointly analyzing visual data and magnetometer data. The magnetometer data provides information about the horizontal orientation of the camera. The proposed joint analysis allows for a reduced number of false positives and for a reduced computational complexity. The algorithms are tested on data captured during real basketball games. The experimental results clearly show the advantages of the proposed approach.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Modern smartphones have become the most popular means for recording videos. In fact, thanks to their portability, smartphones allow for recording anything and at any moment of our everyday life. One common occasion is represented by sport happenings, where people often record their favourite team or players. Automatic analysis of such videos is important for enabling applications such as automatic organization, browsing and summarization of the content. This paper proposes novel algorithms for the detection of salient events in videos recorded at basketball games. The novel approach consists of jointly analyzing visual data and magnetometer data. The magnetometer data provides information about the horizontal orientation of the camera. The proposed joint analysis allows for a reduced number of false positives and for a reduced computational complexity. The algorithms are tested on data captured during real basketball games. The experimental results clearly show the advantages of the proposed approach.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Modern smartphones have become the most popular means for recording videos. In fact, thanks to their portability, smartphones allow for recording anything and at any moment of our everyday life. One common occasion is represented by sport happenings, where people often record their favourite team or players. Automatic analysis of such videos is important for enabling applications such as automatic organization, browsing and summarization of the content. This paper proposes novel algorithms for the detection of salient events in videos recorded at basketball games. The novel approach consists of jointly analyzing visual data and magnetometer data. The magnetometer data provides information about the horizontal orientation of the camera. The proposed joint analysis allows for a reduced number of false positives and for a reduced computational complexity. The algorithms are tested on data captured during real basketball games. The experimental results clearly show the advantages of the proposed approach.",
"fno": "4311a063",
"keywords": [
"Videos",
"Cameras",
"Magnetometers",
"Visualization",
"Detectors",
"Games",
"Magnetic Analysis",
"Video",
"Basketball",
"Detection",
"Event",
"Mobile"
],
"authors": [
{
"affiliation": null,
"fullName": "Francesco Cricri",
"givenName": "Francesco",
"surname": "Cricri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sujeet Mate",
"givenName": "Sujeet",
"surname": "Mate",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Igor D.D. Curcio",
"givenName": "Igor D.D.",
"surname": "Curcio",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Moncef Gabbouj",
"givenName": "Moncef",
"surname": "Gabbouj",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ism",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-12-01T00:00:00",
"pubType": "proceedings",
"pages": "63-70",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4311-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4311a055",
"articleId": "12OmNyUWR8A",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4311a071",
"articleId": "12OmNAY79qa",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2017/1032/0/1032c196",
"title": "Am I a Baller? Basketball Performance Assessment from First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c196/12OmNwp74LB",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851d043",
"title": "Detecting Events and Key Actors in Multi-person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851d043/12OmNxjjEcU",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2016/0641/0/07477705",
"title": "Automatic video editing for sensor-rich videos",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2016/07477705/12OmNzcxZm7",
"parentPublication": {
"id": "proceedings/wacv/2016/0641/0",
"title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457b206",
"title": "Predicting Behaviors of Basketball Players from First Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457b206/12OmNzgeLBh",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-euc/2013/5088/0/06832192",
"title": "Interference-Resistant Heading Measurement for Location-Based Mobile Services",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-euc/2013/06832192/12OmNzkMlGs",
"parentPublication": {
"id": "proceedings/hpcc-euc/2013/5088/0",
"title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percom/2018/3224/0/08444573",
"title": "DeepMag: Sniffing Mobile Apps in Magnetic Field through Deep Convolutional Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/percom/2018/08444573/13bd1gJ1v0i",
"parentPublication": {
"id": "proceedings/percom/2018/3224/0",
"title": "2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2017/11/07779036",
"title": "Summarizing Unconstrained Videos Using Salient Montages",
"doi": null,
"abstractUrl": "/journal/tp/2017/11/07779036/13rRUNvgzba",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118240",
"title": "Court Reconstruction for Camera Calibration in Broadcast Basketball Videos",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118240/13rRUwInvl4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tm/5555/01/09707637",
"title": "SmartMagnet: Proximity-Based Access Control for IoT Devices with Smartphones and Magnets",
"doi": null,
"abstractUrl": "/journal/tm/5555/01/09707637/1APlxucExwY",
"parentPublication": {
"id": "trans/tm",
"title": "IEEE Transactions on Mobile Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2019/2607/1/260701a676",
"title": "An Energy Efficient Pedestrian Heading Estimation Algorithm using Smartphones",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2019/260701a676/1cYiCCl5Wlq",
"parentPublication": {
"id": "proceedings/compsac/2019/2607/1",
"title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyoiYVr",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzgeLBh",
"doi": "10.1109/CVPR.2017.133",
"title": "Predicting Behaviors of Basketball Players from First Person Videos",
"normalizedTitle": "Predicting Behaviors of Basketball Players from First Person Videos",
"abstract": "This paper presents a method to predict the future movements (location and gaze direction) of basketball players as a whole from their first person videos. The predicted behaviors reflect an individual physical space that affords to take the next actions while conforming to social behaviors by engaging to joint attention. Our key innovation is to use the 3D reconstruction of multiple first person cameras to automatically annotate each others visual semantics of social configurations. We leverage two learning signals uniquely embedded in first person videos. Individually, a first person video records the visual semantics of a spatial and social layout around a person that allows associating with past similar situations. Collectively, first person videos follow joint attention that can link the individuals to a group. We learn the egocentric visual semantics of group movements using a Siamese neural network to retrieve future trajectories. We consolidate the retrieved trajectories from all players by maximizing a measure of social compatibility-the gaze alignment towards joint attention predicted by their social formation, where the dynamics of joint attention is learned by a long-term recurrent convolutional network. This allows us to characterize which social configuration is more plausible and predict future group trajectories.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a method to predict the future movements (location and gaze direction) of basketball players as a whole from their first person videos. The predicted behaviors reflect an individual physical space that affords to take the next actions while conforming to social behaviors by engaging to joint attention. Our key innovation is to use the 3D reconstruction of multiple first person cameras to automatically annotate each others visual semantics of social configurations. We leverage two learning signals uniquely embedded in first person videos. Individually, a first person video records the visual semantics of a spatial and social layout around a person that allows associating with past similar situations. Collectively, first person videos follow joint attention that can link the individuals to a group. We learn the egocentric visual semantics of group movements using a Siamese neural network to retrieve future trajectories. We consolidate the retrieved trajectories from all players by maximizing a measure of social compatibility-the gaze alignment towards joint attention predicted by their social formation, where the dynamics of joint attention is learned by a long-term recurrent convolutional network. This allows us to characterize which social configuration is more plausible and predict future group trajectories.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a method to predict the future movements (location and gaze direction) of basketball players as a whole from their first person videos. The predicted behaviors reflect an individual physical space that affords to take the next actions while conforming to social behaviors by engaging to joint attention. Our key innovation is to use the 3D reconstruction of multiple first person cameras to automatically annotate each others visual semantics of social configurations. We leverage two learning signals uniquely embedded in first person videos. Individually, a first person video records the visual semantics of a spatial and social layout around a person that allows associating with past similar situations. Collectively, first person videos follow joint attention that can link the individuals to a group. We learn the egocentric visual semantics of group movements using a Siamese neural network to retrieve future trajectories. We consolidate the retrieved trajectories from all players by maximizing a measure of social compatibility-the gaze alignment towards joint attention predicted by their social formation, where the dynamics of joint attention is learned by a long-term recurrent convolutional network. This allows us to characterize which social configuration is more plausible and predict future group trajectories.",
"fno": "0457b206",
"keywords": [
"Behavioural Sciences Computing",
"Gaze Tracking",
"Image Reconstruction",
"Learning Artificial Intelligence",
"Recurrent Neural Nets",
"Stereo Image Processing",
"Video Signal Processing",
"Social Layout",
"First Person Videos",
"Joint Attention",
"Social Configuration",
"Individual Physical Space",
"Social Behaviors",
"Person Video",
"Spatial Layout",
"Basketball Player Behavior Prediction",
"3 D Reconstruction",
"Multiple First Person Cameras",
"Social Configurations",
"Learning Signals",
"Egocentric Visual Semantics Learning",
"Siamese Neural Network",
"Social Compatibility",
"Gaze Alignment",
"Social Formation",
"Long Term Recurrent Convolutional Network",
"Group Trajectory Prediction",
"Gaze Direction",
"Trajectory",
"Visualization",
"Videos",
"Cameras",
"Semantics",
"Three Dimensional Displays",
"Optical Imaging"
],
"authors": [
{
"affiliation": null,
"fullName": "Shan Su",
"givenName": "Shan",
"surname": "Su",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jung Pyo Hong",
"givenName": "Jung Pyo",
"surname": "Hong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianbo Shi",
"givenName": "Jianbo",
"surname": "Shi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hyun Soo Park",
"givenName": "Hyun Soo",
"surname": "Park",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1206-1215",
"year": "2017",
"issn": "1063-6919",
"isbn": "978-1-5386-0457-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "0457b196",
"articleId": "12OmNCwlaey",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "0457b216",
"articleId": "12OmNAq3hFY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccvw/2017/1034/0/1034c313",
"title": "Temporal Localization and Spatial Segmentation of Joint Attention in Multiple First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034c313/12OmNrIJqAw",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2014/4308/0/4308a526",
"title": "Action and Interaction Recognition in First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2014/4308a526/12OmNvnwViH",
"parentPublication": {
"id": "proceedings/cvprw/2014/4308/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032c196",
"title": "Am I a Baller? Basketball Performance Assessment from First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c196/12OmNwp74LB",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460961",
"title": "Automated person segmentation in videos",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460961/12OmNyKa60t",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457e734",
"title": "Identifying First-Person Camera Wearers in Third-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457e734/12OmNzCWG4a",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457e654",
"title": "PoseTrack: Joint Multi-person Pose Estimation and Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457e654/12OmNzVGcPx",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118240",
"title": "Court Reconstruction for Camera Calibration in Broadcast Basketball Videos",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118240/13rRUwInvl4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/11/08103030",
"title": "Ego-Surfing: Person Localization in First-Person Videos Using Ego-Motion Signatures",
"doi": null,
"abstractUrl": "/journal/tp/2018/11/08103030/143fgZGvn0s",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000h593",
"title": "Future Person Localization in First-Person Videos",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000h593/17D45Vw15sY",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2021/03/08742620",
"title": "Person Re-Identification over Encrypted Outsourced Surveillance Videos",
"doi": null,
"abstractUrl": "/journal/tq/2021/03/08742620/1b15qn0OsJq",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1m3n9N02qgE",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1m3omhxRQmk",
"doi": "10.1109/CVPR42600.2020.01364",
"title": "End-to-End Camera Calibration for Broadcast Videos",
"normalizedTitle": "End-to-End Camera Calibration for Broadcast Videos",
"abstract": "The increasing number of vision-based tracking systems deployed in production have necessitated fast, robust camera calibration. In the domain of sport, the majority of current work focuses on sports where lines and intersections are easy to extract, and appearance is relatively consistent across venues. However, for more challenging sports like basketball, those techniques are not sufficient. In this paper, we propose an end-to-end approach for single moving camera calibration across challenging scenarios in sports. Our method contains three key modules: 1) area-based court segmentation, 2) camera pose estimation with embedded templates, 3) homography prediction via a spatial transform network (STN). All three modules are connected, enabling end-to-end training. We evaluate our method on a new college basketball dataset and demonstrate state of the art performance in variable and dynamic environments. We also validate our method on the World Cup 2014 dataset to show its competitive performance against the state-of-the-art methods. Lastly, we show that our method is two orders of magnitude faster than the previous state of the art on both datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The increasing number of vision-based tracking systems deployed in production have necessitated fast, robust camera calibration. In the domain of sport, the majority of current work focuses on sports where lines and intersections are easy to extract, and appearance is relatively consistent across venues. However, for more challenging sports like basketball, those techniques are not sufficient. In this paper, we propose an end-to-end approach for single moving camera calibration across challenging scenarios in sports. Our method contains three key modules: 1) area-based court segmentation, 2) camera pose estimation with embedded templates, 3) homography prediction via a spatial transform network (STN). All three modules are connected, enabling end-to-end training. We evaluate our method on a new college basketball dataset and demonstrate state of the art performance in variable and dynamic environments. We also validate our method on the World Cup 2014 dataset to show its competitive performance against the state-of-the-art methods. Lastly, we show that our method is two orders of magnitude faster than the previous state of the art on both datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The increasing number of vision-based tracking systems deployed in production have necessitated fast, robust camera calibration. In the domain of sport, the majority of current work focuses on sports where lines and intersections are easy to extract, and appearance is relatively consistent across venues. However, for more challenging sports like basketball, those techniques are not sufficient. In this paper, we propose an end-to-end approach for single moving camera calibration across challenging scenarios in sports. Our method contains three key modules: 1) area-based court segmentation, 2) camera pose estimation with embedded templates, 3) homography prediction via a spatial transform network (STN). All three modules are connected, enabling end-to-end training. We evaluate our method on a new college basketball dataset and demonstrate state of the art performance in variable and dynamic environments. We also validate our method on the World Cup 2014 dataset to show its competitive performance against the state-of-the-art methods. Lastly, we show that our method is two orders of magnitude faster than the previous state of the art on both datasets.",
"fno": "716800n3624",
"keywords": [
"Calibration",
"Cameras",
"Computer Vision",
"Image Motion Analysis",
"Image Segmentation",
"Object Tracking",
"Pose Estimation",
"Sport",
"Video Signal Processing",
"Spatial Transform Network",
"STN",
"College Basketball Dataset",
"End To End Training",
"Key Modules",
"Single Moving Camera Calibration",
"End To End Approach",
"Challenging Sports",
"Robust Camera Calibration",
"Broadcast Videos",
"End To End Camera Calibration",
"Cameras",
"Semantics",
"Calibration",
"Image Segmentation",
"Task Analysis",
"Videos"
],
"authors": [
{
"affiliation": "Stats Perform",
"fullName": "Long Sha",
"givenName": "Long",
"surname": "Sha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stats Perform",
"fullName": "Jennifer Hobbs",
"givenName": "Jennifer",
"surname": "Hobbs",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stats Perform",
"fullName": "Panna Felsen",
"givenName": "Panna",
"surname": "Felsen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stats Perform",
"fullName": "Xinyu Wei",
"givenName": "Xinyu",
"surname": "Wei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stats Perform",
"fullName": "Patrick Lucey",
"givenName": "Patrick",
"surname": "Lucey",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stats Perform",
"fullName": "Sujoy Ganguly",
"givenName": "Sujoy",
"surname": "Ganguly",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "13624-13633",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7168-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "716800n3614",
"articleId": "1m3ni9LoCOY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "716800n3634",
"articleId": "1m3nYVQMu1G",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/1994/6265/1/00576263",
"title": "Online color camera calibration",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/1994/00576263/12OmNBLdKIw",
"parentPublication": {
"id": "proceedings/icpr/1994/6265/1",
"title": "Proceedings of 12th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscv/1995/7190/0/71900169",
"title": "Dynamic camera calibration",
"doi": null,
"abstractUrl": "/proceedings-article/iscv/1995/71900169/12OmNwl8GCC",
"parentPublication": {
"id": "proceedings/iscv/1995/7190/0",
"title": "Computer Vision, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2017/6724/0/07926553",
"title": "Robot-to-Camera Calibration: A Generic Approach Using 6D Detections",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2017/07926553/12OmNxRF6YV",
"parentPublication": {
"id": "proceedings/irc/2017/6724/0",
"title": "2017 First IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1992/2720/0/00220033",
"title": "Linear camera calibration",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1992/00220033/12OmNyLiuwo",
"parentPublication": {
"id": "proceedings/robot/1992/2720/0",
"title": "Proceedings 1992 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2016/5510/0/07881443",
"title": "A Comparison between Camera Calibration Software Toolboxes",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2016/07881443/12OmNzxyiP9",
"parentPublication": {
"id": "proceedings/csci/2016/5510/0",
"title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118240",
"title": "Court Reconstruction for Camera Calibration in Broadcast Basketball Videos",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118240/13rRUwInvl4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000c354",
"title": "A Perceptual Measure for Deep Single Image Camera Calibration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000c354/17D45XuDNGz",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200q6208",
"title": "CTRL-C: Camera calibration TRansformer with Line-Classification",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200q6208/1BmIOkkSQUg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600b166",
"title": "TVCalib: Camera Calibration for Sports Field Registration in Soccer",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600b166/1KxVyU11izS",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900n3129",
"title": "Wide-Baseline Multi-Camera Calibration using Person Re-Identification",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900n3129/1yeJOtC0sjS",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxuXcvQ",
"title": "2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)",
"acronym": "bigdataservice",
"groupId": "1808984",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAlvHVX",
"doi": "10.1109/BigDataService.2018.00039",
"title": "A Novel Method of Overrun Risk Measurement and Assessment Using Large Scale QAR Data",
"normalizedTitle": "A Novel Method of Overrun Risk Measurement and Assessment Using Large Scale QAR Data",
"abstract": "Currently, all of China's major commercial aircrafts have used QAR (Quick Access Recorder) to collect flight data. Considering that the large scale of QAR data both in the amount and high feature dimension, QAR data can be applied only 10% of its potential value. Moreover, how to measure the overrun risk for flight overrun issue is rarely involved. In this paper, we proposed a novel approach to evaluate the overrun risk using large scale QAR data. The main process of our approach is to find out the most important factors affecting the flight safety in the landing phase using extracted 76 variables from 2000+ factors. Then 6,395 flight cases were divided into two classes using overrun dangerous line. Finally, three machine-learning models were used to examine the links between overrun risk index and these flight parameters. Results indicate that the most risky factors for overrun incidents in landing phase are long touchdown distances and releasing brake too early in deceleration stage according to our experiments. We also give several suggestions to avoid flight overrun.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Currently, all of China's major commercial aircrafts have used QAR (Quick Access Recorder) to collect flight data. Considering that the large scale of QAR data both in the amount and high feature dimension, QAR data can be applied only 10% of its potential value. Moreover, how to measure the overrun risk for flight overrun issue is rarely involved. In this paper, we proposed a novel approach to evaluate the overrun risk using large scale QAR data. The main process of our approach is to find out the most important factors affecting the flight safety in the landing phase using extracted 76 variables from 2000+ factors. Then 6,395 flight cases were divided into two classes using overrun dangerous line. Finally, three machine-learning models were used to examine the links between overrun risk index and these flight parameters. Results indicate that the most risky factors for overrun incidents in landing phase are long touchdown distances and releasing brake too early in deceleration stage according to our experiments. We also give several suggestions to avoid flight overrun.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Currently, all of China's major commercial aircrafts have used QAR (Quick Access Recorder) to collect flight data. Considering that the large scale of QAR data both in the amount and high feature dimension, QAR data can be applied only 10% of its potential value. Moreover, how to measure the overrun risk for flight overrun issue is rarely involved. In this paper, we proposed a novel approach to evaluate the overrun risk using large scale QAR data. The main process of our approach is to find out the most important factors affecting the flight safety in the landing phase using extracted 76 variables from 2000+ factors. Then 6,395 flight cases were divided into two classes using overrun dangerous line. Finally, three machine-learning models were used to examine the links between overrun risk index and these flight parameters. Results indicate that the most risky factors for overrun incidents in landing phase are long touchdown distances and releasing brake too early in deceleration stage according to our experiments. We also give several suggestions to avoid flight overrun.",
"fno": "511901a213",
"keywords": [
"Aerospace Instrumentation",
"Aerospace Safety",
"Aircraft",
"Data Recording",
"Recorders",
"Risk Analysis",
"Overrun Risk Measurement",
"Quick Access Recorder",
"Flight Safety",
"Landing Phase",
"Overrun Incidents",
"Flight Overrun",
"QAR Data",
"China",
"Risk Assessment",
"Deceleration Stage",
"Accidents",
"Aircraft",
"Aircraft Propulsion",
"Brakes",
"Engines",
"Atmospheric Modeling",
"Indexes",
"Risk Assessment",
"QAR Data",
"Overrun Risk Mea Surement",
"Random Forest",
"SVM"
],
"authors": [
{
"affiliation": null,
"fullName": "Hao Lv",
"givenName": "Hao",
"surname": "Lv",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianjun Yu",
"givenName": "Jianjun",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tongyu Zhu",
"givenName": "Tongyu",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bigdataservice",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-03-01T00:00:00",
"pubType": "proceedings",
"pages": "213-220",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-5119-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "511901a208",
"articleId": "12OmNzWx01q",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "511901a221",
"articleId": "12OmNrGKevo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dcabes/2017/2162/0/2162a215",
"title": "Airport Intelligent Dispatching Model Based on Double Queue and Tabu Search",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2017/2162a215/12OmNyFU72Z",
"parentPublication": {
"id": "proceedings/dcabes/2017/2162/0",
"title": "2017 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbr-lars/2012/4906/0/4906a051",
"title": "Simulation Platform for Quadricopter: Using Matlab/Simulink and X-Plane",
"doi": null,
"abstractUrl": "/proceedings-article/sbr-lars/2012/4906a051/12OmNzBwGKf",
"parentPublication": {
"id": "proceedings/sbr-lars/2012/4906/0",
"title": "Brazilian Robotics Symposium and Latin American Robotics Symposium (SBR-LARS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmcce/2017/2628/0/2628a053",
"title": "Review of Vertical Take-Off and Landing Aircraft",
"doi": null,
"abstractUrl": "/proceedings-article/icmcce/2017/2628a053/12OmNzEmFEA",
"parentPublication": {
"id": "proceedings/icmcce/2017/2628/0",
"title": "2017 Second International Conference on Mechanical, Control and Computer Engineering (ICMCCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmeas/2022/6305/0/630500a263",
"title": "Planning of Flight Simulator Data Package Flight Test for Civil Aircraft",
"doi": null,
"abstractUrl": "/proceedings-article/icmeas/2022/630500a263/1I8wCIvut6o",
"parentPublication": {
"id": "proceedings/icmeas/2022/6305/0",
"title": "2022 8th International Conference on Mechanical Engineering and Automation Science (ICMEAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icuems/2020/8832/0/09151829",
"title": "Study on Flight Risk Assessment Method Based on Bow-Tie and Bayesian Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icuems/2020/09151829/1lRlXfuvfeo",
"parentPublication": {
"id": "proceedings/icuems/2020/8832/0",
"title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifeea/2020/9627/0/962700a987",
"title": "Research on Implementation of Parameterized Landing Gear Analysis Model",
"doi": null,
"abstractUrl": "/proceedings-article/ifeea/2020/962700a987/1rvCwdfLzDG",
"parentPublication": {
"id": "proceedings/ifeea/2020/9627/0",
"title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmcce/2020/2314/0/231400a460",
"title": "MBSE-based functional hazard assessment of civil aircraft braking system",
"doi": null,
"abstractUrl": "/proceedings-article/icmcce/2020/231400a460/1tzyOQ5bCH6",
"parentPublication": {
"id": "proceedings/icmcce/2020/2314/0",
"title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aemcse/2021/1596/0/159600b328",
"title": "Study of Design Means to Discourage Errors Resulting from Flight Crew Operating Landing Gear Control Lever",
"doi": null,
"abstractUrl": "/proceedings-article/aemcse/2021/159600b328/1wcdqHdqbWE",
"parentPublication": {
"id": "proceedings/aemcse/2021/1596/0",
"title": "2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmeas/2021/9768/0/976800a160",
"title": "Analysis Of The Wings And Powerplant Changes At The Time Of Civil Aircraft Variant Development",
"doi": null,
"abstractUrl": "/proceedings-article/icmeas/2021/976800a160/1zuuPNSy6oE",
"parentPublication": {
"id": "proceedings/icmeas/2021/9768/0",
"title": "2021 7th International Conference on Mechanical Engineering and Automation Science (ICMEAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmeas/2021/9768/0/976800a113",
"title": "Research on Handling Risk Assessment for Civil Airplane under Dual Engine Failure",
"doi": null,
"abstractUrl": "/proceedings-article/icmeas/2021/976800a113/1zuuQ5x5lXq",
"parentPublication": {
"id": "proceedings/icmeas/2021/9768/0",
"title": "2021 7th International Conference on Mechanical Engineering and Automation Science (ICMEAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAOsMGm",
"title": "IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)",
"acronym": "dsn",
"groupId": "1000192",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBPc8wP",
"doi": "10.1109/DSN.2012.6263939",
"title": "Perspectives on software safety case development for unmanned aircraft",
"normalizedTitle": "Perspectives on software safety case development for unmanned aircraft",
"abstract": "We describe our experience with the ongoing development of a safety case for an unmanned aircraft system (UAS), emphasizing autopilot software safety assurance. Our approach combines formal and non-formal reasoning, yielding a semi-automatically assembled safety case, in which part of the argument for autopilot software safety is automatically generated from formal methods. This paper provides a discussion of our experiences pertaining to (a) the methodology for creating and structuring safety arguments containing heterogeneous reasoning and information (b) the comprehensibility of, and the confidence in, the arguments created, and (c) the implications of development and safety assurance processes. The considerations for assuring aviation software safety, when using an approach such as the one in this paper, are also discussed in the context of the relevant standards and existing (process-based) certification guidelines.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We describe our experience with the ongoing development of a safety case for an unmanned aircraft system (UAS), emphasizing autopilot software safety assurance. Our approach combines formal and non-formal reasoning, yielding a semi-automatically assembled safety case, in which part of the argument for autopilot software safety is automatically generated from formal methods. This paper provides a discussion of our experiences pertaining to (a) the methodology for creating and structuring safety arguments containing heterogeneous reasoning and information (b) the comprehensibility of, and the confidence in, the arguments created, and (c) the implications of development and safety assurance processes. The considerations for assuring aviation software safety, when using an approach such as the one in this paper, are also discussed in the context of the relevant standards and existing (process-based) certification guidelines.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We describe our experience with the ongoing development of a safety case for an unmanned aircraft system (UAS), emphasizing autopilot software safety assurance. Our approach combines formal and non-formal reasoning, yielding a semi-automatically assembled safety case, in which part of the argument for autopilot software safety is automatically generated from formal methods. This paper provides a discussion of our experiences pertaining to (a) the methodology for creating and structuring safety arguments containing heterogeneous reasoning and information (b) the comprehensibility of, and the confidence in, the arguments created, and (c) the implications of development and safety assurance processes. The considerations for assuring aviation software safety, when using an approach such as the one in this paper, are also discussed in the context of the relevant standards and existing (process-based) certification guidelines.",
"fno": "027",
"keywords": [
"Aviation Software",
"Software Safety",
"Safety Cases",
"Unmanned Aircraft",
"Formal Methods"
],
"authors": [
{
"affiliation": "SGT / NASA Ames Research Center, Moffett Field, CA 94035, USA",
"fullName": "Ewen Denney",
"givenName": "Ewen",
"surname": "Denney",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "SGT / NASA Ames Research Center, Moffett Field, CA 94035, USA",
"fullName": "Ganesh Pai",
"givenName": "Ganesh",
"surname": "Pai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, University of York, UK",
"fullName": "Ibrahim Habli",
"givenName": "Ibrahim",
"surname": "Habli",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dsn",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2012",
"issn": "1530-0889",
"isbn": "978-1-4673-1624-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "026",
"articleId": "12OmNvDI3QH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "028",
"articleId": "12OmNyvY9Aa",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hase/2015/8111/0/8111a255",
"title": "Applying Safety Case Pattern to Generate Assurance Cases for Safety-Critical Systems",
"doi": null,
"abstractUrl": "/proceedings-article/hase/2015/8111a255/12OmNB8kHOp",
"parentPublication": {
"id": "proceedings/hase/2015/8111/0",
"title": "2015 IEEE 16th International Symposium on High Assurance Systems Engineering (HASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hase/2015/8111/0/8111a052",
"title": "Formal Foundations for Hierarchical Safety Cases",
"doi": null,
"abstractUrl": "/proceedings-article/hase/2015/8111a052/12OmNB8kHVF",
"parentPublication": {
"id": "proceedings/hase/2015/8111/0",
"title": "2015 IEEE 16th International Symposium on High Assurance Systems Engineering (HASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mediacom/2010/4136/0/4136a045",
"title": "Fuzzy Comprehensive Evaluation of Civil Aviation Safety Supervisor",
"doi": null,
"abstractUrl": "/proceedings-article/mediacom/2010/4136a045/12OmNBOCWuj",
"parentPublication": {
"id": "proceedings/mediacom/2010/4136/0",
"title": "2010 International Conference on Multimedia Communications (Mediacom 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wosocer/2011/4617/0/4617a001",
"title": "Challenges for an Open and Evolutionary Approach to Safety Assurance and Certification of Safety-Critical Systems",
"doi": null,
"abstractUrl": "/proceedings-article/wosocer/2011/4617a001/12OmNCfSqU8",
"parentPublication": {
"id": "proceedings/wosocer/2011/4617/0",
"title": "Software Certification, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issre/2016/9002/0/9002a435",
"title": "Domain Arguments in Safety Critical Software Development",
"doi": null,
"abstractUrl": "/proceedings-article/issre/2016/9002a435/12OmNroijjL",
"parentPublication": {
"id": "proceedings/issre/2016/9002/0",
"title": "2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issrew/2013/2552/0/06688924",
"title": "Evidence arguments for using formal methods in software certification",
"doi": null,
"abstractUrl": "/proceedings-article/issrew/2013/06688924/12OmNy4r421",
"parentPublication": {
"id": "proceedings/issrew/2013/2552/0",
"title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wasa/2016/2571/0/2571a010",
"title": "Development of a Safety Case Editor with Assessment Features",
"doi": null,
"abstractUrl": "/proceedings-article/wasa/2016/2571a010/12OmNylbovg",
"parentPublication": {
"id": "proceedings/wasa/2016/2571/0",
"title": "2016 Workshop on Automotive Systems/Software Architectures (WASA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn/2014/2233/0/2233a630",
"title": "A Design and Implementation of an Assurance Case Language",
"doi": null,
"abstractUrl": "/proceedings-article/dsn/2014/2233a630/12OmNz6iOro",
"parentPublication": {
"id": "proceedings/dsn/2014/2233/0",
"title": "2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smc-it/2011/4446/0/4446a010",
"title": "Building a Safety Case for a Safety-Critical NASA Space Vehicle Software System",
"doi": null,
"abstractUrl": "/proceedings-article/smc-it/2011/4446a010/12OmNzaQobd",
"parentPublication": {
"id": "proceedings/smc-it/2011/4446/0",
"title": "Space Mission Challenges for Information Technology, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/2021/05/08674543",
"title": "Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces",
"doi": null,
"abstractUrl": "/journal/ts/2021/05/08674543/18IlAJ3Spdm",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyPQ4DS",
"title": "2009 International Conference on Advanced Computer Control",
"acronym": "icacc",
"groupId": "1002695",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNynsbBv",
"doi": "10.1109/ICACC.2009.26",
"title": "The Simulation Algorithm Design of the Safety Margin for an Aircraft Accident",
"normalizedTitle": "The Simulation Algorithm Design of the Safety Margin for an Aircraft Accident",
"abstract": "An aircraft accident decision is studied under the view of system safety, with the simulation for the overrun speed and time if it rejected takeoff (RTO), and the consequence would be slighter, saving many lives. It is believed in this paper that continuing to climb when catching fire is the worst decision with the heaviest lost in lives. The simulation algorithm is compiled to compute the overrun speed and time at the end of runway to evaluate the safety margin after RTO at high running speed. Its result also shows that the 90 second rule for evacuating is a key element to obey to make decision, having higher order constrain than V1. A few events are discussed to verify the safety margin.",
"abstracts": [
{
"abstractType": "Regular",
"content": "An aircraft accident decision is studied under the view of system safety, with the simulation for the overrun speed and time if it rejected takeoff (RTO), and the consequence would be slighter, saving many lives. It is believed in this paper that continuing to climb when catching fire is the worst decision with the heaviest lost in lives. The simulation algorithm is compiled to compute the overrun speed and time at the end of runway to evaluate the safety margin after RTO at high running speed. Its result also shows that the 90 second rule for evacuating is a key element to obey to make decision, having higher order constrain than V1. A few events are discussed to verify the safety margin.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "An aircraft accident decision is studied under the view of system safety, with the simulation for the overrun speed and time if it rejected takeoff (RTO), and the consequence would be slighter, saving many lives. It is believed in this paper that continuing to climb when catching fire is the worst decision with the heaviest lost in lives. The simulation algorithm is compiled to compute the overrun speed and time at the end of runway to evaluate the safety margin after RTO at high running speed. Its result also shows that the 90 second rule for evacuating is a key element to obey to make decision, having higher order constrain than V1. A few events are discussed to verify the safety margin.",
"fno": "3516a680",
"keywords": [
"Aircraft Accident",
"Rejected Takeoff",
"System Safety",
"Safety Margin",
"System Simulation"
],
"authors": [
{
"affiliation": null,
"fullName": "Zhao Wenzhi",
"givenName": "Zhao",
"surname": "Wenzhi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yang Weiwei",
"givenName": "Yang",
"surname": "Weiwei",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icacc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-01-01T00:00:00",
"pubType": "proceedings",
"pages": "680-684",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3516-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3516a675",
"articleId": "12OmNBBhN4U",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3516a762",
"articleId": "12OmNvjgWqt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dsn/2012/1624/0/027",
"title": "Perspectives on software safety case development for unmanned aircraft",
"doi": null,
"abstractUrl": "/proceedings-article/dsn/2012/027/12OmNBPc8wP",
"parentPublication": {
"id": "proceedings/dsn/2012/1624/0",
"title": "IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/2/3357c466",
"title": "Safety Assessment Based on Accident, Traffic Flow and Facilities Characteristics in Rural Freeways",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357c466/12OmNBuL1c3",
"parentPublication": {
"id": "icicta/2008/3357/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoip/2010/4252/2/4252b097",
"title": "Parameters Calibration for Car-Following Model Based Desired Safety Margin",
"doi": null,
"abstractUrl": "/proceedings-article/icoip/2010/4252b097/12OmNCaLEnV",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/3/4077e260",
"title": "Safety Factor Analysis for Traffic Accident Scene Based on Computer Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077e260/12OmNqIhFZO",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciii/2009/3876/3/3876c185",
"title": "Types and Characteristics of Safety Accidents Induced by Metro Construction",
"doi": null,
"abstractUrl": "/proceedings-article/iciii/2009/3876c185/12OmNwHhp3G",
"parentPublication": {
"id": "proceedings/iciii/2009/3876/3",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/car/2009/3519/0/3519a037",
"title": "Optimal Allocation for Complex Systems' Safety",
"doi": null,
"abstractUrl": "/proceedings-article/car/2009/3519a037/12OmNxFaLvx",
"parentPublication": {
"id": "proceedings/car/2009/3519/0",
"title": "2009 International Asia Conference on Informatics in Control, Automation and Robotics. CAR 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccms/2010/3941/1/3941a215",
"title": "A Novel Quantified Method for Flight Operation Safety",
"doi": null,
"abstractUrl": "/proceedings-article/iccms/2010/3941a215/12OmNxvwoUJ",
"parentPublication": {
"id": "proceedings/iccms/2010/3941/3",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2009/3804/1/3804a408",
"title": "Safety Evaluation of Traffic Accident Scene Based on Artificial Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2009/3804a408/12OmNyv7mct",
"parentPublication": {
"id": "proceedings/icicta/2009/3804/1",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grc/2012/2310/0/06468701",
"title": "Trend analysis for stock margin of safety on attribute theory",
"doi": null,
"abstractUrl": "/proceedings-article/grc/2012/06468701/12OmNzaQopu",
"parentPublication": {
"id": "proceedings/grc/2012/2310/0",
"title": "2012 IEEE International Conference on Granular Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2004/01/q0066",
"title": "A Systems-Theoretic Approach to Safety in Software-Intensive Systems",
"doi": null,
"abstractUrl": "/journal/tq/2004/01/q0066/13rRUwdrdM5",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzcxYUW",
"title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)",
"acronym": "icicta",
"groupId": "1002487",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyqRnqo",
"doi": "10.1109/ICICTA.2014.184",
"title": "System Dynamic Analysis on Behavior-Based Safety in an LNG Enterprise",
"normalizedTitle": "System Dynamic Analysis on Behavior-Based Safety in an LNG Enterprise",
"abstract": "Unsafe behavior of workers is the key cause of accidents in production. Behavior-based safety model has been developed to catch all aspects of workers' behavior safety to improve the enterprise safety level. To study the complex cause-effect relationship between the safety input and workers' behavior safety in the mining enterprise, questionnaire investigations have been adopted in the mining enterprise. And mutual or recursive causality to understand the dynamics of behavior safety system has been analyzed by the information feedback in the system dynamic simulation, which is in accordance with the results of the questionnaires. Using the system dynamics software, Vensim PLE 5.4b, simulation cases about the mining enterprise workers' safety behavior system have been made to show the process of workers' behavior safety improvement and different factor increments. It is proved that the developing tendency of safety level of the mining enterprise can be predicted by system dynamic simulation and simulation results can provide support for the making of decisions on safety input.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Unsafe behavior of workers is the key cause of accidents in production. Behavior-based safety model has been developed to catch all aspects of workers' behavior safety to improve the enterprise safety level. To study the complex cause-effect relationship between the safety input and workers' behavior safety in the mining enterprise, questionnaire investigations have been adopted in the mining enterprise. And mutual or recursive causality to understand the dynamics of behavior safety system has been analyzed by the information feedback in the system dynamic simulation, which is in accordance with the results of the questionnaires. Using the system dynamics software, Vensim PLE 5.4b, simulation cases about the mining enterprise workers' safety behavior system have been made to show the process of workers' behavior safety improvement and different factor increments. It is proved that the developing tendency of safety level of the mining enterprise can be predicted by system dynamic simulation and simulation results can provide support for the making of decisions on safety input.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Unsafe behavior of workers is the key cause of accidents in production. Behavior-based safety model has been developed to catch all aspects of workers' behavior safety to improve the enterprise safety level. To study the complex cause-effect relationship between the safety input and workers' behavior safety in the mining enterprise, questionnaire investigations have been adopted in the mining enterprise. And mutual or recursive causality to understand the dynamics of behavior safety system has been analyzed by the information feedback in the system dynamic simulation, which is in accordance with the results of the questionnaires. Using the system dynamics software, Vensim PLE 5.4b, simulation cases about the mining enterprise workers' safety behavior system have been made to show the process of workers' behavior safety improvement and different factor increments. It is proved that the developing tendency of safety level of the mining enterprise can be predicted by system dynamic simulation and simulation results can provide support for the making of decisions on safety input.",
"fno": "6636a760",
"keywords": [
"Safety",
"Psychology",
"Accidents",
"Analytical Models",
"Employee Welfare",
"Training",
"Simulation",
"System Dynamic",
"Behavior Based Safety"
],
"authors": [
{
"affiliation": null,
"fullName": "Yan-Yan Chu",
"givenName": "Yan-Yan",
"surname": "Chu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lin-Jun Huang",
"givenName": "Lin-Jun",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qian-Xi Zhang",
"givenName": "Qian-Xi",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dong Liang",
"givenName": "Dong",
"surname": "Liang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icicta",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-10-01T00:00:00",
"pubType": "proceedings",
"pages": "760-764",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-6636-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "6636a754",
"articleId": "12OmNAXPyjp",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "6636a765",
"articleId": "12OmNA0dMRY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wkdd/2010/5397/0/05432681",
"title": "Coal Enterprises Safety Investment Efficiency Analysis Based on Data Envelopment",
"doi": null,
"abstractUrl": "/proceedings-article/wkdd/2010/05432681/12OmNrJAe0T",
"parentPublication": {
"id": "proceedings/wkdd/2010/5397/0",
"title": "2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifcsta/2009/3930/2/3930b061",
"title": "Mining Safety Information Management System Based on B/S and C/S Mixed Code",
"doi": null,
"abstractUrl": "/proceedings-article/ifcsta/2009/3930b061/12OmNvAiSuT",
"parentPublication": {
"id": "proceedings/ifcsta/2009/3930/2",
"title": "Computer Science-Technology and Applications, International Forum on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ncm/2009/3769/0/3769b032",
"title": "Behavior Safety Integration Management and Control System for Coal Enterprises",
"doi": null,
"abstractUrl": "/proceedings-article/ncm/2009/3769b032/12OmNviZlKv",
"parentPublication": {
"id": "proceedings/ncm/2009/3769/0",
"title": "Networked Computing and Advanced Information Management, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn-w/2016/3688/0/3688a200",
"title": "Safety Engineering for Autonomous Vehicles",
"doi": null,
"abstractUrl": "/proceedings-article/dsn-w/2016/3688a200/12OmNx6PiFa",
"parentPublication": {
"id": "proceedings/dsn-w/2016/3688/0",
"title": "2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/4/3735d413",
"title": "The Safety Evaluation on Road Passenger Transportation Enterprises Based on Modified AHP method",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735d413/12OmNxisQUH",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/4",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoin/2018/2290/0/08343186",
"title": "Increasing the efficiency of labor protection in the enterprise",
"doi": null,
"abstractUrl": "/proceedings-article/icoin/2018/08343186/12OmNxw5B5B",
"parentPublication": {
"id": "proceedings/icoin/2018/2290/0",
"title": "2018 International Conference on Information Networking (ICOIN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07122340",
"title": "Designing Serious Games for Safety Education: “Learn to Brace” versus Traditional Pictorials for Aircraft Passengers",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07122340/13rRUEgarsJ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciibms/2018/7516/3/08549993",
"title": "Research on Risk Management of Gas Safety based on Big Data",
"doi": null,
"abstractUrl": "/proceedings-article/iciibms/2018/08549993/17D45XoXP3c",
"parentPublication": {
"id": "proceedings/iciibms/2018/7516/3",
"title": "2018 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seams/2016/4187/0/4187a115",
"title": "Using Dynamic Adaptive Systems in Safety-Critical Domains",
"doi": null,
"abstractUrl": "/proceedings-article/seams/2016/4187a115/1D86ozuSpUY",
"parentPublication": {
"id": "proceedings/seams/2016/4187/0",
"title": "2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/05/08998361",
"title": "Presence, Mixed Reality, and Risk-Taking Behavior: A Study in Safety Interventions",
"doi": null,
"abstractUrl": "/journal/tg/2020/05/08998361/1hpPBmpcsXm",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKipN",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WYQJ71",
"doi": "10.1109/BigData.2017.8258561",
"title": "Road safety estimation utilizing big and heterogeneous vehicle recorder data",
"normalizedTitle": "Road safety estimation utilizing big and heterogeneous vehicle recorder data",
"abstract": "We present a method for estimating road safety using large-scale and heterogeneous vehicle recorder data. Our assamption in this study is that occurrences of traffic accidents on crossings could be estimated by their road shape, driving behaviors over them, and photos taken by dash cams. Utilizing 3 years dataset from 1,500 drivers in a fleet delivery company, we try to detect risky crossings based on supervised machine learning. Results show that our method provides good performance, and can extract potentially risky crossings.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a method for estimating road safety using large-scale and heterogeneous vehicle recorder data. Our assamption in this study is that occurrences of traffic accidents on crossings could be estimated by their road shape, driving behaviors over them, and photos taken by dash cams. Utilizing 3 years dataset from 1,500 drivers in a fleet delivery company, we try to detect risky crossings based on supervised machine learning. Results show that our method provides good performance, and can extract potentially risky crossings.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a method for estimating road safety using large-scale and heterogeneous vehicle recorder data. Our assamption in this study is that occurrences of traffic accidents on crossings could be estimated by their road shape, driving behaviors over them, and photos taken by dash cams. Utilizing 3 years dataset from 1,500 drivers in a fleet delivery company, we try to detect risky crossings based on supervised machine learning. Results show that our method provides good performance, and can extract potentially risky crossings.",
"fno": "08258561",
"keywords": [
"Accidents",
"Road Safety",
"Cams",
"Vehicles",
"Companies",
"Feature Extraction",
"Mobility Big Data",
"Vehicle Recorder",
"Dash Cam",
"Road Safety Assesment",
"Traffic Accident"
],
"authors": [
{
"affiliation": "Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba Meguro-ku, Tokyo, JAPAN, 153-8505",
"fullName": "Masashi Toyoda",
"givenName": "Masashi",
"surname": "Toyoda",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba Meguro-ku, Tokyo, JAPAN, 153-8505",
"fullName": "Daisaku Yokoyama",
"givenName": "Daisaku",
"surname": "Yokoyama",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba Meguro-ku, Tokyo, JAPAN, 153-8505",
"fullName": "Junpei Komiyama",
"givenName": "Junpei",
"surname": "Komiyama",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba Meguro-ku, Tokyo, JAPAN, 153-8505",
"fullName": "Masahiko Itoh",
"givenName": "Masahiko",
"surname": "Itoh",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "4841-4842",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2715-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08258560",
"articleId": "17D45XreC72",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08258562",
"articleId": "17D45WwsQ7I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmtma/2009/3583/3/3583c479",
"title": "Analysis of the Relation between Highway Horizontal Curve and Traffic Safety",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583c479/12OmNAR1b1u",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/2/3357c433",
"title": "Research on the Safety Quality Standards System of Road Transportation Enterprises",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357c433/12OmNAYoKwI",
"parentPublication": {
"id": "icicta/2008/3357/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ivs/2005/8961/0/01505122",
"title": "Monte Carlo road safety reasoning",
"doi": null,
"abstractUrl": "/proceedings-article/ivs/2005/01505122/12OmNAoDhUb",
"parentPublication": {
"id": "proceedings/ivs/2005/8961/0",
"title": "2005 IEEE Intelligent Vehicles Symposium Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iis/2009/3618/0/3618a171",
"title": "Evaluation of the Chengdu City Road Traffic Safety Based on Means of Weighted Average and AHP",
"doi": null,
"abstractUrl": "/proceedings-article/iis/2009/3618a171/12OmNB8kHSo",
"parentPublication": {
"id": "proceedings/iis/2009/3618/0",
"title": "2009 International Conference on Industrial and Information Systems (IIS 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2011/4296/3/4296e203",
"title": "Rural Road Traffic Safety Improving Countermeasures",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2011/4296e203/12OmNvqmUMq",
"parentPublication": {
"id": "proceedings/icmtma/2011/4296/3",
"title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/4/3735d413",
"title": "The Safety Evaluation on Road Passenger Transportation Enterprises Based on Modified AHP method",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735d413/12OmNxisQUH",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/4",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/2/3357c513",
"title": "Test of Urban Road Traffic Facilities on the Driving Safety",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357c513/12OmNyKJiAR",
"parentPublication": {
"id": "icicta/2008/3357/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2011/4296/3/4296e716",
"title": "The Challenges and Opportunities on Road Safety in China",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2011/4296e716/12OmNynsbyY",
"parentPublication": {
"id": "proceedings/icmtma/2011/4296/3",
"title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/2/3357c446",
"title": "Road Safety Evaluation System Based on Virtual Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357c446/12OmNzvhvAY",
"parentPublication": {
"id": "icicta/2008/3357/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2021/2463/0/246300a402",
"title": "Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2021/246300a402/1wLcBsluNJS",
"parentPublication": {
"id": "proceedings/compsac/2021/2463/0",
"title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KpBpkR1qBq",
"title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)",
"acronym": "icekim",
"groupId": "1841184",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KpBIXuCUq4",
"doi": "10.1109/ICEKIM55072.2022.00091",
"title": "Development and Exploration of Serious Games for Anti-bullying Education : ——The Experience of Developing the Software of Anti-bullying Serious Games",
"normalizedTitle": "Development and Exploration of Serious Games for Anti-bullying Education : ——The Experience of Developing the Software of Anti-bullying Serious Games",
"abstract": "It is a requirement of the Education Supervision Committee of the State Council of China to conduct safety education on bullying prevention for primary and middle school students. Combining a large amount of knowledge about school bullying in psychology, the author developed an online anti-bullying serious game, which adopted the latest technology of Internet web game engine (Html5, Javascript, Egret, etc.), artificial intelligence speech synthesis technology, image processing technology, the mechanism, dynamics and aesthetic framework of game design. The author used the JSON data format to define and organize the data structure and loosely coupled the game’s program logic and storyline, making the game easy to expand and more flexible. The author also designed the multi-scenario, multi-option, and multi-user game system architecture, which enables the game to serve the schools and educational institutions nationally. This paper describes the critical knowledge and technology of game development and points out a feasible technical route for developing relevant serious games at home and abroad. At the same time, it expounds on the author’s experience in the game development process and how to apply serious games in anti-bullying education widely.",
"abstracts": [
{
"abstractType": "Regular",
"content": "It is a requirement of the Education Supervision Committee of the State Council of China to conduct safety education on bullying prevention for primary and middle school students. Combining a large amount of knowledge about school bullying in psychology, the author developed an online anti-bullying serious game, which adopted the latest technology of Internet web game engine (Html5, Javascript, Egret, etc.), artificial intelligence speech synthesis technology, image processing technology, the mechanism, dynamics and aesthetic framework of game design. The author used the JSON data format to define and organize the data structure and loosely coupled the game’s program logic and storyline, making the game easy to expand and more flexible. The author also designed the multi-scenario, multi-option, and multi-user game system architecture, which enables the game to serve the schools and educational institutions nationally. This paper describes the critical knowledge and technology of game development and points out a feasible technical route for developing relevant serious games at home and abroad. At the same time, it expounds on the author’s experience in the game development process and how to apply serious games in anti-bullying education widely.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "It is a requirement of the Education Supervision Committee of the State Council of China to conduct safety education on bullying prevention for primary and middle school students. Combining a large amount of knowledge about school bullying in psychology, the author developed an online anti-bullying serious game, which adopted the latest technology of Internet web game engine (Html5, Javascript, Egret, etc.), artificial intelligence speech synthesis technology, image processing technology, the mechanism, dynamics and aesthetic framework of game design. The author used the JSON data format to define and organize the data structure and loosely coupled the game’s program logic and storyline, making the game easy to expand and more flexible. The author also designed the multi-scenario, multi-option, and multi-user game system architecture, which enables the game to serve the schools and educational institutions nationally. This paper describes the critical knowledge and technology of game development and points out a feasible technical route for developing relevant serious games at home and abroad. At the same time, it expounds on the author’s experience in the game development process and how to apply serious games in anti-bullying education widely.",
"fno": "166600a376",
"keywords": [
"Artificial Intelligence",
"Computer Aided Instruction",
"Educational Institutions",
"Internet",
"Serious Games Computing",
"Software Engineering",
"Anti Bullying Education",
"Anti Bullying Serious Games",
"Artificial Intelligence Speech Synthesis Technology",
"Bullying Prevention",
"China",
"Data Structure",
"Education Supervision Committee",
"Educational Institutions",
"Game Design",
"Game Development Process",
"Game Program Logic",
"Image Processing Technology",
"Internet Web Game Engine",
"JSON Data Format",
"Middle School Students",
"Multiuser Game System Architecture",
"Primary School Students",
"Safety Education",
"Software Development",
"Education",
"Systems Architecture",
"Psychology",
"Games",
"Software",
"Serious Games",
"Safety",
"Anti Bullying Education",
"Serious Game",
"Egret"
],
"authors": [
{
"affiliation": "Chinese Academy of Sciences,Key Laboratory of Behavioral Science, Institute of Psychology,Beijing,China,100101",
"fullName": "Ting Li",
"givenName": "Ting",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chinese Academy of Sciences,Key Laboratory of Behavioral Science, Institute of Psychology,Beijing,China,100101",
"fullName": "Hui-Jie Li",
"givenName": "Hui-Jie",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icekim",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-01-01T00:00:00",
"pubType": "proceedings",
"pages": "376-380",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-1666-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "166600a371",
"articleId": "1KpBLv8OtlC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "166600a381",
"articleId": "1KpBSqTvp1C",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vsmm/2009/3790/0/3790a221",
"title": "Serious Games & Cultural Heritage: A Case Study of Prehistoric Caves",
"doi": null,
"abstractUrl": "/proceedings-article/vsmm/2009/3790a221/12OmNAOKnQM",
"parentPublication": {
"id": "proceedings/vsmm/2009/3790/0",
"title": "Virtual Systems and MultiMedia, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2011/4419/0/4419a172",
"title": "Usability of Serious Games for Health",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2011/4419a172/12OmNCbU35Q",
"parentPublication": {
"id": "proceedings/vs-games/2011/4419/0",
"title": "Games and Virtual Worlds for Serious Applications, Conference in",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2009/3588/0/3588a161",
"title": "Cross-Disciplinary Approaches for Developing Serious Games in Higher Education",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2009/3588a161/12OmNrMZpAy",
"parentPublication": {
"id": "proceedings/vs-games/2009/3588/0",
"title": "Games and Virtual Worlds for Serious Applications, Conference in",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2009/3791/0/3791a071",
"title": "Virtual Humans in Serious Games",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2009/3791a071/12OmNxxNbPm",
"parentPublication": {
"id": "proceedings/cw/2009/3791/0",
"title": "2009 International Conference on CyberWorlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2009/3711/0/3711a021",
"title": "A Conceptual Framework for Serious Games",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2009/3711a021/12OmNy5hRfe",
"parentPublication": {
"id": "proceedings/icalt/2009/3711/0",
"title": "Advanced Learning Technologies, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2009/3588/0/3588a182",
"title": "Tabletop Prototyping of Serious Games for 'Soft Skills' Training",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2009/3588a182/12OmNznkK2a",
"parentPublication": {
"id": "proceedings/vs-games/2009/3588/0",
"title": "Games and Virtual Worlds for Serious Applications, Conference in",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07122340",
"title": "Designing Serious Games for Safety Education: “Learn to Brace” versus Traditional Pictorials for Aircraft Passengers",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07122340/13rRUEgarsJ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eitt/2021/2757/0/275700a299",
"title": "Avatarizing Children with Autism Spectrum Disorder into Serious Games for Social Communication Skill Intervention",
"doi": null,
"abstractUrl": "/proceedings-article/eitt/2021/275700a299/1AFsrorE4A8",
"parentPublication": {
"id": "proceedings/eitt/2021/2757/0",
"title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09928013",
"title": "A Graph-based Approach for Adaptive Serious Games",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09928013/1J4CvTjDZtK",
"parentPublication": {
"id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0",
"title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2020/5237/0/523700a166",
"title": "Robot Framework for Anti-Bullying in Saudi Schools",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2020/523700a166/1pP3Vfddvdm",
"parentPublication": {
"id": "proceedings/irc/2020/5237/0",
"title": "2020 Fourth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1wLcd132uKA",
"title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)",
"acronym": "compsac",
"groupId": "1000143",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1wLcBsluNJS",
"doi": "10.1109/COMPSAC51774.2021.00063",
"title": "Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings",
"normalizedTitle": "Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings",
"abstract": "Quantifying the effects of adverse weather conditions on road traffic is crucial for several reasons, among which monitoring traffic safety, managing vehicle fleets, and ensuring autonomous vehicle security and performance. This paper studies the incidence of adverse weather effects on road traffic safety. The aim is to assign a unified risk level to all spatial regions sharing the same context (e.g., the highly populated areas), which reflects the impact of adverse weather events on road accident occurrences. The proposed approach relies on an incomplete set of historical accident data, which report weather-related accident occurrences in specific risky areas. To estimate the percontext risk level we propose to analyze the weather element measurements acquired by meteorological stations spread over the analyzed area. The series of adverse weather events are embedded into a high-dimensional embedding space to enable the identification of temporal event patterns similar to those observed in risky areas. The experimental results show the effectiveness of the proposed approach in a real case study.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Quantifying the effects of adverse weather conditions on road traffic is crucial for several reasons, among which monitoring traffic safety, managing vehicle fleets, and ensuring autonomous vehicle security and performance. This paper studies the incidence of adverse weather effects on road traffic safety. The aim is to assign a unified risk level to all spatial regions sharing the same context (e.g., the highly populated areas), which reflects the impact of adverse weather events on road accident occurrences. The proposed approach relies on an incomplete set of historical accident data, which report weather-related accident occurrences in specific risky areas. To estimate the percontext risk level we propose to analyze the weather element measurements acquired by meteorological stations spread over the analyzed area. The series of adverse weather events are embedded into a high-dimensional embedding space to enable the identification of temporal event patterns similar to those observed in risky areas. The experimental results show the effectiveness of the proposed approach in a real case study.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Quantifying the effects of adverse weather conditions on road traffic is crucial for several reasons, among which monitoring traffic safety, managing vehicle fleets, and ensuring autonomous vehicle security and performance. This paper studies the incidence of adverse weather effects on road traffic safety. The aim is to assign a unified risk level to all spatial regions sharing the same context (e.g., the highly populated areas), which reflects the impact of adverse weather events on road accident occurrences. The proposed approach relies on an incomplete set of historical accident data, which report weather-related accident occurrences in specific risky areas. To estimate the percontext risk level we propose to analyze the weather element measurements acquired by meteorological stations spread over the analyzed area. The series of adverse weather events are embedded into a high-dimensional embedding space to enable the identification of temporal event patterns similar to those observed in risky areas. The experimental results show the effectiveness of the proposed approach in a real case study.",
"fno": "246300a402",
"keywords": [
"Meteorology",
"Risk Analysis",
"Road Accidents",
"Road Safety",
"Road Traffic",
"Road Vehicles",
"Time Series",
"Traffic Engineering Computing",
"Road Traffic Safety",
"Time Series Embeddings",
"Autonomous Vehicle Security",
"Unified Risk Level",
"Adverse Weather Events",
"Historical Accident Data",
"Weather Element Measurements",
"Vehicle Fleets Management",
"Meteorological Stations",
"Temporal Event Patterns",
"Road Accidents",
"Roads",
"Conferences",
"Time Series Analysis",
"Software",
"Safety",
"Security",
"Internet Of Things",
"Weather Data",
"Weather Related Road Accidents",
"Time Series Embeddings"
],
"authors": [
{
"affiliation": "Politecnico di Torino,Dipartimento di Automatica e Informatica,Turin,Italy,10129",
"fullName": "Jacopo Fior",
"givenName": "Jacopo",
"surname": "Fior",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Politecnico di Torino,Dipartimento di Automatica e Informatica,Turin,Italy,10129",
"fullName": "Luca Cagliero",
"givenName": "Luca",
"surname": "Cagliero",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-07-01T00:00:00",
"pubType": "proceedings",
"pages": "402-407",
"year": "2021",
"issn": "0730-3157",
"isbn": "978-1-6654-2463-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "246300a396",
"articleId": "1wLcjTlqhdS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "246300a408",
"articleId": "1wLciipmElG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmtma/2009/3583/3/3583c479",
"title": "Analysis of the Relation between Highway Horizontal Curve and Traffic Safety",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583c479/12OmNAR1b1u",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2016/2312/0/2312a077",
"title": "An Analysis of Road Segment Traffic Safety Based on Accident Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2016/2312a077/12OmNAWYKBc",
"parentPublication": {
"id": "proceedings/icmtma/2016/2312/0",
"title": "2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisce/2017/3013/0/3013b153",
"title": "Research on Dynamic Route Planning under Adverse Weather",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2017/3013b153/12OmNAXxXcu",
"parentPublication": {
"id": "proceedings/icisce/2017/3013/0",
"title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/paciia/2008/3490/1/3490a879",
"title": "Design of In-Vehicle Comprehensive Acquisition System on Freeway Condition under Adverse Weather",
"doi": null,
"abstractUrl": "/proceedings-article/paciia/2008/3490a879/12OmNvjgWqJ",
"parentPublication": {
"id": "proceedings/paciia/2008/3490/1",
"title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2016/8796/0/07425986",
"title": "Extraction of weather information on road using CCTV video",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2016/07425986/12OmNzcxZny",
"parentPublication": {
"id": "proceedings/bigcomp/2016/8796/0",
"title": "2016 International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2013/0400/0/06572632",
"title": "AVRA Bangladesh collection, analysis & visualization of road accident data in Bangladesh",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2013/06572632/12OmNzkMlOB",
"parentPublication": {
"id": "proceedings/iciev/2013/0400/0",
"title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2018/9385/0/938500a514",
"title": "Decision Support System for the Analysis of Traffic Accident Big Data",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2018/938500a514/19RSsly32aA",
"parentPublication": {
"id": "proceedings/sitis/2018/9385/0",
"title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0/666700a390",
"title": "A Comparative Study of Machine Learning Algorithms to Predict Road Accident Severity",
"doi": null,
"abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2021/666700a390/1BrAFwVfWw0",
"parentPublication": {
"id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0",
"title": "2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09413109",
"title": "Multimodal End-to-End Learning for Autonomous Steering in Adverse Road and Weather Conditions",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09413109/1tmjlMgjGG4",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscsic/2021/1627/0/162700a067",
"title": "A Novel Multi-Model Machine Learning Approach to Real-Time Road Accident Prediction and Driving Behavior Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iscsic/2021/162700a067/1zzppPTbK3m",
"parentPublication": {
"id": "proceedings/iscsic/2021/1627/0",
"title": "2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": [
{
"id": "1xwffzqcOpa",
"videoExt": "mp4",
"videoType": {
"featured": false,
"recommended": false,
"sponsored": false,
"__typename": "VideoTypesType"
},
"article": {
"id": "1wLcBsluNJS",
"fno": "246300a402",
"issueNum": null,
"pubType": "proceedings",
"volume": "0",
"year": "2021",
"idPrefix": "compsac",
"doi": "10.1109/COMPSAC51774.2021.00063",
"title": "Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings",
"__typename": "ArticleType"
},
"channel": {
"id": "1xvX5qkErBu",
"title": "COMPSAC 2021",
"status": "1",
"featured": false,
"defaultVideoId": "1xvX5cz6Dtu",
"category": {
"id": "1xvX5lT1WiQ",
"title": "Proceeding",
"type": "proceeding",
"__typename": "VideoCategoryType"
},
"__typename": "VideoChannelType"
},
"year": "2021",
"title": "Estimating the incidence of adverse weather effects on road traffic safety using time series embeddings",
"description": "Quantifying the effects of adverse weather conditions on road traffic is crucial for several reasons, among which monitoring traffic safety, managing vehicle fleets, and ensuring autonomous vehicle security and performance. This paper studies the incidence of adverse weather effects on road traffic safety. The aim is to assign a unified risk level to all spatial regions sharing the same context (e.g., the highly populated areas), which reflects the impact of adverse weather events on road accident occurrences. The proposed approach relies on an incomplete set of historical accident data, which report weather-related accident occurrences in specific risky areas. To estimate the percontext risk level we propose to analyze the weather element measurements acquired by meteorological stations spread over the analyzed area. The series of adverse weather events are embedded into a high-dimensional embedding space to enable the identification of temporal event patterns similar to those observed in risky areas. The experimental results show the effectiveness of the proposed approach in a real case study.",
"keywords": [
{
"id": "1xvX5I2jhAY",
"title": "Conferences",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xvX5PnBSes",
"title": "Software",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xvX76x8M3S",
"title": "Security",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xvX8RIb4Uo",
"title": "Safety",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xw1geJ6dig",
"title": "Roads",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xw6IhKWyqY",
"title": "Time series analysis",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xwffHIxY64",
"title": "Road accidents",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xwffJTnqSI",
"title": "Internet-of-Things",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xwffM1EvuM",
"title": "Weather data",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xwffOj0KgU",
"title": "Weather-related road accidents",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xwffQoaesg",
"title": "Time series embeddings",
"status": "1",
"__typename": "VideoKeywordsType"
}
],
"speakers": [
{
"firstName": "Jacopo",
"lastName": "Fior",
"affiliation": "Politecnico di Torino,Dipartimento di Automatica e Informatica,Turin,Italy,10129",
"__typename": "SpeakerType"
},
{
"firstName": "Luca",
"lastName": "Cagliero",
"affiliation": "Politecnico di Torino,Dipartimento di Automatica e Informatica,Turin,Italy,10129",
"__typename": "SpeakerType"
}
],
"created": "2021-10-08T00:00:00",
"updated": "2021-10-08T00:00:00",
"imageThumbnailUrl": "thumbnails/1xwffzqcOpa.jpeg",
"runningTime": "00:08:38",
"aspectRatio": "16:9",
"metrics": {
"views": "0",
"likes": "0",
"__typename": "VideoMetricsType"
},
"notShowInVideoLib": false,
"__typename": "VideoType"
}
]
}
|
{
"proceeding": {
"id": "1zL1CunfrGM",
"title": "2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)",
"acronym": "icaa",
"groupId": "1842748",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zL1KuXCIaA",
"doi": "10.1109/ICAA53760.2021.00162",
"title": "Research on Active Intervention Technology of Aircraft Wake Dissipation",
"normalizedTitle": "Research on Active Intervention Technology of Aircraft Wake Dissipation",
"abstract": "Wake vortex is one of the main factors that affect the safety and efficiency of civil aviation operation. The current wake separation ensures the operation safety at the expense of capacity. Therefore, it is very important to find a way of artificial intervention to accelerate the dissipation of wake vortex. In this paper, the active intervention methods at home and abroad are summarized, and numerical simulation method is used to simulate the wake dissipation at the entrance of runway, which adds plate line and proves that it can effectively accelerate the wake dissipation near the ground.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Wake vortex is one of the main factors that affect the safety and efficiency of civil aviation operation. The current wake separation ensures the operation safety at the expense of capacity. Therefore, it is very important to find a way of artificial intervention to accelerate the dissipation of wake vortex. In this paper, the active intervention methods at home and abroad are summarized, and numerical simulation method is used to simulate the wake dissipation at the entrance of runway, which adds plate line and proves that it can effectively accelerate the wake dissipation near the ground.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Wake vortex is one of the main factors that affect the safety and efficiency of civil aviation operation. The current wake separation ensures the operation safety at the expense of capacity. Therefore, it is very important to find a way of artificial intervention to accelerate the dissipation of wake vortex. In this paper, the active intervention methods at home and abroad are summarized, and numerical simulation method is used to simulate the wake dissipation at the entrance of runway, which adds plate line and proves that it can effectively accelerate the wake dissipation near the ground.",
"fno": "373000a891",
"keywords": [
"Aircraft",
"Airports",
"Numerical Analysis",
"Vortices",
"Wakes",
"Civil Aviation Operation",
"Current Wake Separation",
"Operation Safety",
"Artificial Intervention",
"Wake Vortex",
"Active Intervention Methods",
"Numerical Simulation Method",
"Active Intervention Technology",
"Aircraft Wake Dissipation",
"Automation",
"Numerical Simulation",
"Safety",
"Aircraft"
],
"authors": [
{
"affiliation": "Civil Aviation Flight University of China,College of Air Traffic Management,Deyang,China",
"fullName": "Hao Wang",
"givenName": "Hao",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Civil Aviation Flight University of China,College of Air Traffic Management,Deyang,China",
"fullName": "Weijun Pan",
"givenName": "Weijun",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Civil Aviation Flight University of China,College of Air Traffic Management,Deyang,China",
"fullName": "Yuming Luc",
"givenName": "Yuming",
"surname": "Luc",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Civil Aviation Flight University of China,College of Air Traffic Management,Deyang,China",
"fullName": "Sirui Zheng",
"givenName": "Sirui",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icaa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-06-01T00:00:00",
"pubType": "proceedings",
"pages": "891-894",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-3730-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "373000a884",
"articleId": "1zL1LLFkVfG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "373000a895",
"articleId": "1zL1WaXx9D2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hpcasia/1997/7901/0/79010744",
"title": "Numerical simulations of wake structure generated by rotating blades using a time marching, free vortex blob method",
"doi": null,
"abstractUrl": "/proceedings-article/hpcasia/1997/79010744/12OmNB9t6rl",
"parentPublication": {
"id": "proceedings/hpcasia/1997/7901/0",
"title": "High Performance Computing and Grid in Asia Pacific Region, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/shpcc/1992/2775/0/00232675",
"title": "Unsteady flow simulation using an MIMD computer",
"doi": null,
"abstractUrl": "/proceedings-article/shpcc/1992/00232675/12OmNBpEeXt",
"parentPublication": {
"id": "proceedings/shpcc/1992/2775/0",
"title": "1992 Proceedings Scalable High Performance Computing Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isdea/2010/4212/1/4212a095",
"title": "A New Integrated Radar Cross Section Analysis Method for Penetration Aircraft",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2010/4212a095/12OmNCeK2cI",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1994/6627/0/00346328",
"title": "3D visualization of unsteady 2D airplane wake vortices",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1994/00346328/12OmNroij7B",
"parentPublication": {
"id": "proceedings/visual/1994/6627/0",
"title": "Proceedings Visualization '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dodugc/2004/2259/0/01420855",
"title": "Flow past a stationary and moving cylinder: DNS at Re=10,000",
"doi": null,
"abstractUrl": "/proceedings-article/dodugc/2004/01420855/12OmNxy4MYL",
"parentPublication": {
"id": "proceedings/dodugc/2004/2259/0",
"title": "Proceedings. Users Group Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacc/2009/3516/0/3516a680",
"title": "The Simulation Algorithm Design of the Safety Margin for an Aircraft Accident",
"doi": null,
"abstractUrl": "/proceedings-article/icacc/2009/3516a680/12OmNynsbBv",
"parentPublication": {
"id": "proceedings/icacc/2009/3516/0",
"title": "2009 International Conference on Advanced Computer Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dodugc/2004/2259/0/01420856",
"title": "High-accuracy DNS of supersonic base flows and control of the near wake",
"doi": null,
"abstractUrl": "/proceedings-article/dodugc/2004/01420856/12OmNyuPKXl",
"parentPublication": {
"id": "proceedings/dodugc/2004/2259/0",
"title": "Proceedings. Users Group Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/1998/01/00661249",
"title": "Statistical estimation of average power dissipation using nonparametric techniques",
"doi": null,
"abstractUrl": "/journal/si/1998/01/00661249/13rRUILtJiY",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/01592705",
"title": "Numerical Simulation and Immersive Visualization of Hairpin Vortices",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/01592705/1D85OmvXRV6",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a368",
"title": "Scheduling Strategy of Virtual Device Based on Wake-up and Semi-sleep Mode",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a368/1FUUq1IeOPK",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1zurmFX8iL6",
"title": "2021 34th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"acronym": "sibgrapi",
"groupId": "1000131",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zurn3PI1dC",
"doi": "10.1109/SIBGRAPI54419.2021.00013",
"title": "A New Focus+Context Visualization Technique for Inspecting Black Oil Reservoir Models",
"normalizedTitle": "A New Focus+Context Visualization Technique for Inspecting Black Oil Reservoir Models",
"abstract": "In this paper, we propose a new visualization technique to inspect simulated black oil reservoir models. Numerical reservoir simulation is widely used in the oil & gas industry to predict and plan the exploration of petroleum fields. Of particular interest, it is crucial to understand the physical phenomena around injector and producer wells: how is the distribution of pressure, how oil/gas/water saturation varies over time, and others. Traditional visualization techniques only provide local insights, being hard to understand the three-dimension physical behavior. Another challenge is to handle today’s massive models. We propose an efficient and effective focus+context visualization technique employing a cutaway approach, having the wells as objects of interest. We explore cone-shaped and box-shaped view-dependent cutting surfaces. We also allow the user to control the cutting surface aperture freely and to freeze the cut to gain motion parallax depth cues during model exploration. The proposed rendering algorithm runs on GPU, delivering real-time frame rate even for large reservoir models.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we propose a new visualization technique to inspect simulated black oil reservoir models. Numerical reservoir simulation is widely used in the oil & gas industry to predict and plan the exploration of petroleum fields. Of particular interest, it is crucial to understand the physical phenomena around injector and producer wells: how is the distribution of pressure, how oil/gas/water saturation varies over time, and others. Traditional visualization techniques only provide local insights, being hard to understand the three-dimension physical behavior. Another challenge is to handle today’s massive models. We propose an efficient and effective focus+context visualization technique employing a cutaway approach, having the wells as objects of interest. We explore cone-shaped and box-shaped view-dependent cutting surfaces. We also allow the user to control the cutting surface aperture freely and to freeze the cut to gain motion parallax depth cues during model exploration. The proposed rendering algorithm runs on GPU, delivering real-time frame rate even for large reservoir models.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we propose a new visualization technique to inspect simulated black oil reservoir models. Numerical reservoir simulation is widely used in the oil & gas industry to predict and plan the exploration of petroleum fields. Of particular interest, it is crucial to understand the physical phenomena around injector and producer wells: how is the distribution of pressure, how oil/gas/water saturation varies over time, and others. Traditional visualization techniques only provide local insights, being hard to understand the three-dimension physical behavior. Another challenge is to handle today’s massive models. We propose an efficient and effective focus+context visualization technique employing a cutaway approach, having the wells as objects of interest. We explore cone-shaped and box-shaped view-dependent cutting surfaces. We also allow the user to control the cutting surface aperture freely and to freeze the cut to gain motion parallax depth cues during model exploration. The proposed rendering algorithm runs on GPU, delivering real-time frame rate even for large reservoir models.",
"fno": "235400a025",
"keywords": [
"Data Visualisation",
"Gas Industry",
"Hydrocarbon Reservoirs",
"Inspection",
"Petroleum Industry",
"Production Engineering Computing",
"Rendering Computer Graphics",
"Model Exploration",
"Numerical Reservoir Simulation",
"Oil Amp Gas Industry",
"Petroleum Fields",
"Injector",
"Producer Wells",
"Massive Models",
"Focus Context Visualization",
"3 D Physical Behavior",
"Box Shaped View Dependent Cutting Surfaces",
"Rendering Algorithm",
"Black Oil Reservoir Models",
"Oil Gas Water Saturation",
"Cutting Surface Aperture",
"Visualization",
"Oils",
"Graphics Processing Units",
"Predictive Models",
"Reservoirs",
"Rendering Computer Graphics",
"Real Time Systems",
"Cutaway",
"Focus Context",
"Scientific Visualization",
"GPU Rendering",
"Reservoir Model"
],
"authors": [
{
"affiliation": "Pontifical Catholic University,Tecgraf/PUC-Rio Institute,Computer Science Department,Rio de Janeiro,Brazil",
"fullName": "Luiz Felipe Netto",
"givenName": "Luiz Felipe",
"surname": "Netto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pontifical Catholic University,Tecgraf/PUC-Rio Institute,Computer Science Department,Rio de Janeiro,Brazil",
"fullName": "Waldemar Celes",
"givenName": "Waldemar",
"surname": "Celes",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sibgrapi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "25-32",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2354-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "235400a017",
"articleId": "1zurtEgv09a",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "235400a033",
"articleId": "1zurrTfGfYY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0/751800b016",
"title": "Parallel Study of 3-D Oil Reservoir Data Visualization Tool Using Hybrid Distributed/Shared-Memory Models",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2018/751800b016/17D45W2WyzK",
"parentPublication": {
"id": "proceedings/dasc-picom-datacom-cyberscitech/2018/7518/0",
"title": "2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitbs/2019/1307/0/130700a618",
"title": "Study on Seepage Characteristics and Complex Well Pattern in Low Permeability Reservoir",
"doi": null,
"abstractUrl": "/proceedings-article/icitbs/2019/130700a618/18AuYia0lq0",
"parentPublication": {
"id": "proceedings/icitbs/2019/1307/0",
"title": "2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gcrait/2022/8192/0/819200a716",
"title": "Study on geological structure characteristics of Lamadian oilfield test area based on gptmap software",
"doi": null,
"abstractUrl": "/proceedings-article/gcrait/2022/819200a716/1Hcncu50nzq",
"parentPublication": {
"id": "proceedings/gcrait/2022/8192/0",
"title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gcrait/2022/8192/0/819200a787",
"title": "Study on energy supplement strategy of carbon dioxide huff and puff in horizontal well of tight oil sandstone reservoir",
"doi": null,
"abstractUrl": "/proceedings-article/gcrait/2022/819200a787/1HcnfKmbKrS",
"parentPublication": {
"id": "proceedings/gcrait/2022/8192/0",
"title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gcrait/2022/8192/0/819200a704",
"title": "Effect of polymer application on reservoir physical properties in oil and gas field production",
"doi": null,
"abstractUrl": "/proceedings-article/gcrait/2022/819200a704/1Hcno4neCXu",
"parentPublication": {
"id": "proceedings/gcrait/2022/8192/0",
"title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wceea/2022/5952/0/595200a001",
"title": "Research of downhole data communication for simultaneous production of separate layer oil wells",
"doi": null,
"abstractUrl": "/proceedings-article/wceea/2022/595200a001/1J7WH1veZos",
"parentPublication": {
"id": "proceedings/wceea/2022/5952/0",
"title": "2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiotcs/2022/3410/0/341000a256",
"title": "Evaluation of Reservoir Non-Homogeneity Based on Random Forest",
"doi": null,
"abstractUrl": "/proceedings-article/aiotcs/2022/341000a256/1MuZO25f4uk",
"parentPublication": {
"id": "proceedings/aiotcs/2022/3410/0",
"title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisce/2019/3681/0/368100a109",
"title": "Development Effect Evaluation and Injection-Production System Adjustment of Water Flooding Reservoir",
"doi": null,
"abstractUrl": "/proceedings-article/cisce/2019/368100a109/1cI61mDUAy4",
"parentPublication": {
"id": "proceedings/cisce/2019/3681/0",
"title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbi/2019/0650/1/065001a391",
"title": "Machine Classification of Pore Space for Hydrocarbon Reservoir Characterization",
"doi": null,
"abstractUrl": "/proceedings-article/cbi/2019/065001a391/1cI6v6WB2PC",
"parentPublication": {
"id": "cbi/2019/0650/1",
"title": "2019 IEEE 21st Conference on Business Informatics (CBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2019/5227/0/522700a131",
"title": "GPU-Based Rendering of Arbitrarily Complex Cutting Surfaces for Black Oil Reservoir Models",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2019/522700a131/1fHlpF1XdF6",
"parentPublication": {
"id": "proceedings/sibgrapi/2019/5227/0",
"title": "2019 32nd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBNM8Mu",
"title": "2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)",
"acronym": "waina",
"groupId": "1001766",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwE9On3",
"doi": "10.1109/WAINA.2018.00150",
"title": "Energy Saving and Collision-Free Motion Planning for Oblivious Robots",
"normalizedTitle": "Energy Saving and Collision-Free Motion Planning for Oblivious Robots",
"abstract": "In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection.",
"fno": "539501a591",
"keywords": [
"Collision Avoidance",
"Mobile Robots",
"Multi Robot Systems",
"Energy Saving",
"Look Compute Move Cycles",
"LCM Cycles",
"Euclidean Plane",
"Colored Points",
"Distributed Computing",
"Oblivious Robots",
"Collision Free Motion Planning",
"Color",
"Robot Kinematics",
"Trajectory",
"Complexity Theory",
"Collision Avoidance",
"Planning",
"Distributed Algorithms",
"Mobile Robots",
"Trajectory Complexity",
"Energy Minimization"
],
"authors": [
{
"affiliation": null,
"fullName": "Alfredo Navarra",
"givenName": "Alfredo",
"surname": "Navarra",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Diletta Cacciagrano",
"givenName": "Diletta",
"surname": "Cacciagrano",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "waina",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-05-01T00:00:00",
"pubType": "proceedings",
"pages": "591-596",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-5395-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "539501a585",
"articleId": "12OmNyeWdDo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "539501a597",
"articleId": "12OmNxw5Bd8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/robot/1988/0852/0/00012049",
"title": "On-line generation of collision-free trajectories for multiple robots",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1988/00012049/12OmNA0dMKo",
"parentPublication": {
"id": "proceedings/robot/1988/0852/0",
"title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1988/0852/0/00012127",
"title": "Collision detection for planning collision-free motion of two robot arms",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1988/00012127/12OmNCzsKGC",
"parentPublication": {
"id": "proceedings/robot/1988/0852/0",
"title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iros/1995/7108/2/71082510",
"title": "Fuzzy collision avoidance for industrial robots",
"doi": null,
"abstractUrl": "/proceedings-article/iros/1995/71082510/12OmNwswg58",
"parentPublication": {
"id": "proceedings/iros/1995/7108/2",
"title": "Intelligent Robots and Systems, IEEE/RSJ International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2018/4368/0/436801a733",
"title": "Complete Visitability for Autonomous Robots on Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2018/436801a733/12OmNxeutg8",
"parentPublication": {
"id": "proceedings/ipdps/2018/4368/0",
"title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131661",
"title": "Collision avoidance for two SCARA robots",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131661/12OmNyq0zMW",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2018/5555/0/555501a829",
"title": "Mutual Visibility for Robots with Lights Tolerating Light Faults",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2018/555501a829/12OmNyvY9p0",
"parentPublication": {
"id": "proceedings/ipdpsw/2018/5555/0",
"title": "2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iros/1995/7108/2/71082027",
"title": "Action observation in collision-free motion planning for mobile robots",
"doi": null,
"abstractUrl": "/proceedings-article/iros/1995/71082027/12OmNyyO8Nv",
"parentPublication": {
"id": "proceedings/iros/1995/7108/2",
"title": "Intelligent Robots and Systems, IEEE/RSJ International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpads/2018/7308/0/08644621",
"title": "Relaxed Collision Constraints Based on Interval Superposition Principle in a DMPC Scheme",
"doi": null,
"abstractUrl": "/proceedings-article/icpads/2018/08644621/17QjJf2Hdtv",
"parentPublication": {
"id": "proceedings/icpads/2018/7308/0",
"title": "2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bwcca/2010/4236/0/05633813",
"title": "A Motion Planning of Swarm Robots Using Genetic Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/bwcca/2010/05633813/183rAfQ0GDa",
"parentPublication": {
"id": "proceedings/bwcca/2010/4236/0",
"title": "2010 International Conference on Broadband, Wireless Computing, Communication and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aitest/2019/0492/0/049200a121",
"title": "Stress Testing of Single-Arm Robots Through Constraint-Based Generation of Continuous Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/aitest/2019/049200a121/1aIRQ6LrZKg",
"parentPublication": {
"id": "proceedings/aitest/2019/0492/0",
"title": "2019 IEEE International Conference On Artificial Intelligence Testing (AITest)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvpw7hy",
"title": "2015 4th Eastern European Regional Conference on the Engineering of Computer Based Systems (ECBS-EERC)",
"acronym": "ecbs-eerc",
"groupId": "1002918",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwp74CX",
"doi": "10.1109/ECBS-EERC.2015.24",
"title": "A Planning Method to Obtain Good Quality Paths for Autonomous Cars",
"normalizedTitle": "A Planning Method to Obtain Good Quality Paths for Autonomous Cars",
"abstract": "Path planning among obstacles for nonholonomic systems is a widely researched area nowadays, but it is still one of the most challenging problems in autonomous navigation. We have recently presented a rapidly exploring random tree based global planner (RTR) and a steering method (C*CS) for car-like vehicles, which uses circular and straight movements. With the aid of these two methods it is possible to obtain a feasible path, even in narrow spaces and in situations requiring non-trivial maneuvers. This paper presents an improved solution for environments, where not all obstacles are known at the beginning and these are discovered during the motion of the robot. We also introduce an extension to the presented algorithm to achieve paths of better quality, i.e. more similar to a reasonable path generated by a human driver.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Path planning among obstacles for nonholonomic systems is a widely researched area nowadays, but it is still one of the most challenging problems in autonomous navigation. We have recently presented a rapidly exploring random tree based global planner (RTR) and a steering method (C*CS) for car-like vehicles, which uses circular and straight movements. With the aid of these two methods it is possible to obtain a feasible path, even in narrow spaces and in situations requiring non-trivial maneuvers. This paper presents an improved solution for environments, where not all obstacles are known at the beginning and these are discovered during the motion of the robot. We also introduce an extension to the presented algorithm to achieve paths of better quality, i.e. more similar to a reasonable path generated by a human driver.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Path planning among obstacles for nonholonomic systems is a widely researched area nowadays, but it is still one of the most challenging problems in autonomous navigation. We have recently presented a rapidly exploring random tree based global planner (RTR) and a steering method (C*CS) for car-like vehicles, which uses circular and straight movements. With the aid of these two methods it is possible to obtain a feasible path, even in narrow spaces and in situations requiring non-trivial maneuvers. This paper presents an improved solution for environments, where not all obstacles are known at the beginning and these are discovered during the motion of the robot. We also introduce an extension to the presented algorithm to achieve paths of better quality, i.e. more similar to a reasonable path generated by a human driver.",
"fno": "7967a104",
"keywords": [
"Planning",
"Collision Avoidance",
"Robot Sensing Systems",
"Vehicles",
"Turning",
"Heuristic Algorithms",
"Narrow Spaces",
"Nonholonomic Motion Planning",
"Rapidly Exploring Random Trees",
"Changing Environments"
],
"authors": [
{
"affiliation": null,
"fullName": "Domokos Kiss",
"givenName": "Domokos",
"surname": "Kiss",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Gabor Csorvasi",
"givenName": "Gabor",
"surname": "Csorvasi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Akos Nagy",
"givenName": "Akos",
"surname": "Nagy",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ecbs-eerc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-08-01T00:00:00",
"pubType": "proceedings",
"pages": "104-110",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-7967-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7967a098",
"articleId": "12OmNzahcg6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7967a111",
"articleId": "12OmNvSKNQI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icseng/2017/0610/0/0610a218",
"title": "Monotone Paths with Visibility Properties",
"doi": null,
"abstractUrl": "/proceedings-article/icseng/2017/0610a218/12OmNBp52K3",
"parentPublication": {
"id": "proceedings/icseng/2017/0610/0",
"title": "2017 25th International Conference on Systems Engineering (ICSEng)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2014/5179/0/06850799",
"title": "Path planning algorithm development for autonomous vacuum cleaner robots",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2014/06850799/12OmNwEJ0Nd",
"parentPublication": {
"id": "proceedings/iciev/2014/5179/0",
"title": "2014 International Conference on Informatics, Electronics & Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ecmsm/2015/6972/0/07208710",
"title": "Formation control of mobile robots with obstacle avoidance using fuzzy artificial potential field",
"doi": null,
"abstractUrl": "/proceedings-article/ecmsm/2015/07208710/12OmNwkR5vG",
"parentPublication": {
"id": "proceedings/ecmsm/2015/6972/0",
"title": "2015 IEEE International Workshop of Electronics, Control, Measurement, Signals and their application to Mechatronics (ECMSM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2018/4368/0/436801a733",
"title": "Complete Visitability for Autonomous Robots on Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2018/436801a733/12OmNxeutg8",
"parentPublication": {
"id": "proceedings/ipdps/2018/4368/0",
"title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csit/2018/4152/0/08486385",
"title": "Map Generation and Path Planning for Autonomous Mobile Robot in Static Environments Using GA",
"doi": null,
"abstractUrl": "/proceedings-article/csit/2018/08486385/14jQfPU3yrE",
"parentPublication": {
"id": "proceedings/csit/2018/4152/0",
"title": "2018 8th International Conference on Computer Science and Information Technology (CSIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2019/9245/0/924500a017",
"title": "LEO: Liquid Exploration Online",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2019/924500a017/18M7fI1XGdW",
"parentPublication": {
"id": "proceedings/irc/2019/9245/0",
"title": "2019 Third IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2019/9245/0/924500a250",
"title": "Single Pixel Time-of-Flight Sensors for Object Detection and Self-Detection in Three-Sectional Single-Arm Robot Manipulators",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2019/924500a250/18M7hocbdDO",
"parentPublication": {
"id": "proceedings/irc/2019/9245/0",
"title": "2019 Third IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300a886",
"title": "Small Obstacle Avoidance Based on RGB-D Semantic Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300a886/1i5mJseG4j6",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300a018",
"title": "Socially-Aware Multi-agent Velocity Obstacle Based Navigation for Nonholonomic Vehicles",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300a018/1nkDmLRKgEg",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-&-icivpr/2020/9331/0/09306573",
"title": "Pathfinder: A Fog Assisted Vision-Based System for Optimal Path Selection of Service Robots",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306573/1qcifGUp82I",
"parentPublication": {
"id": "proceedings/iciev-&-icivpr/2020/9331/0",
"title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCvLY1R",
"title": "Proceedings of Computer Animation '94",
"acronym": "ca",
"groupId": "1000121",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx38vWD",
"doi": "10.1109/CA.1994.324004",
"title": "Terrain reasoning for human locomotion",
"normalizedTitle": "Terrain reasoning for human locomotion",
"abstract": "We describe a real-time model of terrain traversal by simulated human agents. Agent navigation includes a variety of simulated sensors, terrain reasoning with behavioral constraints, and detailed simulation of a variety of locomotion techniques. The path through the terrain is incrementally computed by a behavioral reasoning system configuring a behavioral feedback network. A number of sensors acquire information on object range, passageways, obstacles, terrain type, exposure to hostile agents, and so on. The behavioral reasoner weighs this information along with collision avoidance, cost, danger minimization, locomotion types, and other behaviors available to the agent and incrementally attempts to reach a goal location. Since the system is reactive, it can respond to moving obstacles, changing terrain, or unexpected events due to hostile agents or the effects of limited perception. A motor-level component provides general locomotion, including curved path walking and running that work in real-time with human figures.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "We describe a real-time model of terrain traversal by simulated human agents. Agent navigation includes a variety of simulated sensors, terrain reasoning with behavioral constraints, and detailed simulation of a variety of locomotion techniques. The path through the terrain is incrementally computed by a behavioral reasoning system configuring a behavioral feedback network. A number of sensors acquire information on object range, passageways, obstacles, terrain type, exposure to hostile agents, and so on. The behavioral reasoner weighs this information along with collision avoidance, cost, danger minimization, locomotion types, and other behaviors available to the agent and incrementally attempts to reach a goal location. Since the system is reactive, it can respond to moving obstacles, changing terrain, or unexpected events due to hostile agents or the effects of limited perception. A motor-level component provides general locomotion, including curved path walking and running that work in real-time with human figures.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We describe a real-time model of terrain traversal by simulated human agents. Agent navigation includes a variety of simulated sensors, terrain reasoning with behavioral constraints, and detailed simulation of a variety of locomotion techniques. The path through the terrain is incrementally computed by a behavioral reasoning system configuring a behavioral feedback network. A number of sensors acquire information on object range, passageways, obstacles, terrain type, exposure to hostile agents, and so on. The behavioral reasoner weighs this information along with collision avoidance, cost, danger minimization, locomotion types, and other behaviors available to the agent and incrementally attempts to reach a goal location. Since the system is reactive, it can respond to moving obstacles, changing terrain, or unexpected events due to hostile agents or the effects of limited perception. A motor-level component provides general locomotion, including curved path walking and running that work in real-time with human figures.",
"fno": "00324004",
"keywords": [
"Computer Animation",
"Spatial Reasoning",
"Path Planning",
"Computational Geometry",
"Real Time Systems",
"Human Locomotion",
"Real Time Model",
"Terrain Traversal",
"Simulated Human Agents",
"Agent Navigation",
"Simulated Sensors",
"Locomotion Techniques",
"Behavioral Reasoning System",
"Behavioral Feedback Network",
"Hostile Agents",
"Collision Avoidance",
"Danger Minimization",
"Locomotion Types",
"Moving Obstacles",
"Limited Perception",
"Motor Level Component",
"Curved Path Walking",
"Running",
"Human Figures",
"Humans",
"Navigation",
"Artificial Intelligence",
"Computational Modeling",
"Feedback",
"Computer Networks",
"Rain",
"Collision Avoidance",
"Costs",
"Sensor Phenomena And Characterization"
],
"authors": [
{
"affiliation": "Center for Human Modeling & Simulation, Pennsylvania Univ., Philadelphia, PA, USA",
"fullName": "B.D. Reich",
"givenName": "B.D.",
"surname": "Reich",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Human Modeling & Simulation, Pennsylvania Univ., Philadelphia, PA, USA",
"fullName": "Hyeongseok Ko",
"givenName": null,
"surname": "Hyeongseok Ko",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Human Modeling & Simulation, Pennsylvania Univ., Philadelphia, PA, USA",
"fullName": "W. Becket",
"givenName": "W.",
"surname": "Becket",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Human Modeling & Simulation, Pennsylvania Univ., Philadelphia, PA, USA",
"fullName": "N.I. Badler",
"givenName": "N.I.",
"surname": "Badler",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ca",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "76,77,78,79,80,81,82",
"year": "1994",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00324003",
"articleId": "12OmNzllxYW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00324005",
"articleId": "12OmNBTs7By",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pg/2000/0868/0/08680429",
"title": "Animation of Human Locomotion Using Sagittal Elevation Angles",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2000/08680429/12OmNCdk2Lo",
"parentPublication": {
"id": "proceedings/pg/2000/0868/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131811",
"title": "Study of dynamic biped locomotion on rugged terrain-derivation and application of the linear inverted pendulum mode",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131811/12OmNvqW6Uz",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aihas/1994/6440/0/00390499",
"title": "Design of terrain reasoning database for CCTT",
"doi": null,
"abstractUrl": "/proceedings-article/aihas/1994/00390499/12OmNzX6ciI",
"parentPublication": {
"id": "proceedings/aihas/1994/6440/0",
"title": "Fifth Annual Conference on AI, and Planning in High Autonomy Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2016/0842/0/07460045",
"title": "Collision avoidance in the presence of a virtual agent in small-scale virtual environments",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2016/07460045/12OmNzaQoPf",
"parentPublication": {
"id": "proceedings/3dui/2016/0842/0",
"title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131593",
"title": "An efficient terrain acquisition algorithm for a mobile robot",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131593/12OmNzcPAqy",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2013/2246/0/2246a064",
"title": "Navigation Maps for Virtual Travelers",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2013/2246a064/12OmNzcxZkp",
"parentPublication": {
"id": "proceedings/cw/2013/2246/0",
"title": "2013 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/07/07946183",
"title": "Walking with Virtual People: Evaluation of Locomotion Interfaces in Dynamic Environments",
"doi": null,
"abstractUrl": "/journal/tg/2018/07/07946183/13rRUEgs2C2",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hdis/2022/9144/0/09991677",
"title": "Study on the Influence of Complex Terrain on Optimal Sensor Layout",
"doi": null,
"abstractUrl": "/proceedings-article/hdis/2022/09991677/1JwPYEHDjEc",
"parentPublication": {
"id": "proceedings/hdis/2022/9144/0",
"title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2022/7260/0/726000a172",
"title": "Generating Robot-Dependent Cost Maps for Off-Road Environments Using Locomotion Experiments and Earth Observation Data",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2022/726000a172/1KckdvxkBDG",
"parentPublication": {
"id": "proceedings/irc/2022/7260/0",
"title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2022/7260/0/726000a103",
"title": "State Estimation for Hybrid Locomotion of Driving-Stepping Quadrupeds",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2022/726000a103/1Kckhe8Ichi",
"parentPublication": {
"id": "proceedings/irc/2022/7260/0",
"title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCaLEnE",
"title": "2014 International Conference on Computer & Communication Engineering (ICCCE)",
"acronym": "iccce",
"groupId": "1002119",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxGj9Ik",
"doi": "10.1109/ICCCE.2014.15",
"title": "Vision Aided Path Planning for Mobile Robot",
"normalizedTitle": "Vision Aided Path Planning for Mobile Robot",
"abstract": "Path planning is very important for autonomous mobile robots to navigate from the beginning to the ending position. Vision aided path planning for mobile robot system is discussed in this paper. The paper reveals the accounts from a historical overview and provides a study on how to develop a single vision system for a mobile robot, which implements an obstacle avoidance algorithm, detecting the objects by the colour. Also, we aim at highlighting and analyzing the use of single vision cameras such as webcam in providing data and useful information required for navigation purposes. The system is able to detect obstacles and provide position information from the image of indoor environment. The result is accurate enough to detect the static obstacles and avoid any possible contact with that obstacle. Thus, it is best suggested that the proposed colour approach would be significant as a navigational aid for the autonomous mobile robot.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Path planning is very important for autonomous mobile robots to navigate from the beginning to the ending position. Vision aided path planning for mobile robot system is discussed in this paper. The paper reveals the accounts from a historical overview and provides a study on how to develop a single vision system for a mobile robot, which implements an obstacle avoidance algorithm, detecting the objects by the colour. Also, we aim at highlighting and analyzing the use of single vision cameras such as webcam in providing data and useful information required for navigation purposes. The system is able to detect obstacles and provide position information from the image of indoor environment. The result is accurate enough to detect the static obstacles and avoid any possible contact with that obstacle. Thus, it is best suggested that the proposed colour approach would be significant as a navigational aid for the autonomous mobile robot.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Path planning is very important for autonomous mobile robots to navigate from the beginning to the ending position. Vision aided path planning for mobile robot system is discussed in this paper. The paper reveals the accounts from a historical overview and provides a study on how to develop a single vision system for a mobile robot, which implements an obstacle avoidance algorithm, detecting the objects by the colour. Also, we aim at highlighting and analyzing the use of single vision cameras such as webcam in providing data and useful information required for navigation purposes. The system is able to detect obstacles and provide position information from the image of indoor environment. The result is accurate enough to detect the static obstacles and avoid any possible contact with that obstacle. Thus, it is best suggested that the proposed colour approach would be significant as a navigational aid for the autonomous mobile robot.",
"fno": "7635a005",
"keywords": [
"Computers",
"Abstracts",
"Path Planning",
"Mobile Robots",
"Collision Avoidance",
"Cameras",
"Robot Vision Systems",
"Indoor Environment",
"Vision",
"Path Planning",
"Mobile Robot",
"Obstacle Avoidance",
"Vision Cameras"
],
"authors": [
{
"affiliation": null,
"fullName": "M.A. Rashidan",
"givenName": "M.A.",
"surname": "Rashidan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Y.M. Mustafah",
"givenName": "Y.M.",
"surname": "Mustafah",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "S.B.A. Hamid",
"givenName": "S.B.A.",
"surname": "Hamid",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Y.A.M. Shawgi",
"givenName": "Y.A.M.",
"surname": "Shawgi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "N.K.A.M. Rashid",
"givenName": "N.K.A.M.",
"surname": "Rashid",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccce",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-09-01T00:00:00",
"pubType": "proceedings",
"pages": "5-8",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-7635-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7635a001",
"articleId": "12OmNxVV5SI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7635a009",
"articleId": "12OmNA0MZ04",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icfcc/2009/3591/0/3591a164",
"title": "Using Genetic Algorithm for a Mobile Robot Path Planning",
"doi": null,
"abstractUrl": "/proceedings-article/icfcc/2009/3591a164/12OmNBr4eOE",
"parentPublication": {
"id": "proceedings/icfcc/2009/3591/0",
"title": "2009 International Conference on Future Computer and Communication (ICFCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2012/4637/0/4637a670",
"title": "The Navigation of Mobile Robot Based on Stereo Vision",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2012/4637a670/12OmNC943yg",
"parentPublication": {
"id": "proceedings/icicta/2012/4637/0",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoip/2010/4252/2/4252b565",
"title": "The Obstacle Avoidance and Navigation Based on Stereo Vision for Mobile Robot",
"doi": null,
"abstractUrl": "/proceedings-article/icoip/2010/4252b565/12OmNx76TM9",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cine/2017/2529/0/2529a088",
"title": "Application of Deep Q-Learning for Wheel Mobile Robot Navigation",
"doi": null,
"abstractUrl": "/proceedings-article/cine/2017/2529a088/12OmNxAlA3c",
"parentPublication": {
"id": "proceedings/cine/2017/2529/0",
"title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bwss/2012/4942/0/4942a060",
"title": "An Evolutionary Learning Approach for Robot Path Planning with Fuzzy Obstacle Detection and Avoidance in a Multi-agent Environment",
"doi": null,
"abstractUrl": "/proceedings-article/bwss/2012/4942a060/12OmNy3iFuv",
"parentPublication": {
"id": "proceedings/bwss/2012/4942/0",
"title": "2012 Third Brazilian Workshop on Social Simulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcecs/2008/3555/0/3555a182",
"title": "Autonomous Mobile Robot: Path Planning Using Backward Chaining",
"doi": null,
"abstractUrl": "/proceedings-article/wcecs/2008/3555a182/12OmNzdoMn2",
"parentPublication": {
"id": "proceedings/wcecs/2008/3555/0",
"title": "World Congress on Engineering and Computer Science, Advances in Electrical and Electronics Engineering - IAENG Special Edition of the",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2006/2528/2/04021728",
"title": "RL-ART2 Neural Network Based Mobile Robot Path Planning",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2006/04021728/141Anq3Hwpd",
"parentPublication": {
"id": "proceedings/isda/2006/2528/2",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csit/2018/4152/0/08486385",
"title": "Map Generation and Path Planning for Autonomous Mobile Robot in Static Environments Using GA",
"doi": null,
"abstractUrl": "/proceedings-article/csit/2018/08486385/14jQfPU3yrE",
"parentPublication": {
"id": "proceedings/csit/2018/4152/0",
"title": "2018 8th International Conference on Computer Science and Information Technology (CSIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2021/1660/0/166000a035",
"title": "Multi-Robot Coverage Path Planning based on Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2021/166000a035/1BzY8VErBg4",
"parentPublication": {
"id": "proceedings/cse/2021/1660/0",
"title": "2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a067",
"title": "Robotic Path Planning Strategy Based on Improved Artificial Potential Field",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a067/1rCg8gIG8Pm",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOibU",
"title": "2011 IEEE International Conference on Automation Science and Engineering",
"acronym": "case",
"groupId": "1001095",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzzP5Pk",
"doi": "10.1109/CASE.2011.6042462",
"title": "Mixed-integer programming for optimal path planning of robotic manipulators",
"normalizedTitle": "Mixed-integer programming for optimal path planning of robotic manipulators",
"abstract": "One of the fundamental problems in the field of robotic motion planning is to safely and efficiently drive the end effector of a robotic manipulator to a specified goal position. Here, safety refers to the requirement that the robotic manipulator must have no collision with surrounding obstacles, and efficiency requires that some predefined cost function is minimized. In addition, kinematic and dynamic constraints have to be satisfied. These requirements lead to non-convex optimization problems, which may be approximated by mixed-integer linear programs (MILPs). The solution of the latter, however, is often intolerably complex due to a huge number of binary decision variables. In the present paper, we consider motion planning scenarios with polyhedral obstacles and velocity constraints for the joint positions of the robotic manipulator. We provide a geometric result whose application leads to MILPs with drastically reduced numbers of binary decision variables. Computational efficiency is demonstrated for two- and three-link manipulators interacting with obstacles, where the number of simplex steps during the MILP solution is reduced by a factor of roughly 200 over previous methods. We also demonstrate the application of the proposed method to an industrial robot.",
"abstracts": [
{
"abstractType": "Regular",
"content": "One of the fundamental problems in the field of robotic motion planning is to safely and efficiently drive the end effector of a robotic manipulator to a specified goal position. Here, safety refers to the requirement that the robotic manipulator must have no collision with surrounding obstacles, and efficiency requires that some predefined cost function is minimized. In addition, kinematic and dynamic constraints have to be satisfied. These requirements lead to non-convex optimization problems, which may be approximated by mixed-integer linear programs (MILPs). The solution of the latter, however, is often intolerably complex due to a huge number of binary decision variables. In the present paper, we consider motion planning scenarios with polyhedral obstacles and velocity constraints for the joint positions of the robotic manipulator. We provide a geometric result whose application leads to MILPs with drastically reduced numbers of binary decision variables. Computational efficiency is demonstrated for two- and three-link manipulators interacting with obstacles, where the number of simplex steps during the MILP solution is reduced by a factor of roughly 200 over previous methods. We also demonstrate the application of the proposed method to an industrial robot.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "One of the fundamental problems in the field of robotic motion planning is to safely and efficiently drive the end effector of a robotic manipulator to a specified goal position. Here, safety refers to the requirement that the robotic manipulator must have no collision with surrounding obstacles, and efficiency requires that some predefined cost function is minimized. In addition, kinematic and dynamic constraints have to be satisfied. These requirements lead to non-convex optimization problems, which may be approximated by mixed-integer linear programs (MILPs). The solution of the latter, however, is often intolerably complex due to a huge number of binary decision variables. In the present paper, we consider motion planning scenarios with polyhedral obstacles and velocity constraints for the joint positions of the robotic manipulator. We provide a geometric result whose application leads to MILPs with drastically reduced numbers of binary decision variables. Computational efficiency is demonstrated for two- and three-link manipulators interacting with obstacles, where the number of simplex steps during the MILP solution is reduced by a factor of roughly 200 over previous methods. We also demonstrate the application of the proposed method to an industrial robot.",
"fno": "06042462",
"keywords": [
"Binary Decision Diagrams",
"Collision Avoidance",
"Concave Programming",
"End Effectors",
"Industrial Manipulators",
"Integer Programming",
"Manipulator Dynamics",
"Manipulator Kinematics",
"Mobile Robots",
"Mixed Integer Programming",
"Optimal Path Planning",
"Robotic Manipulators",
"Robotic Motion Planning",
"End Effector",
"Predefined Cost Function Minimization",
"Kinematic Constraints",
"Dynamic Constraints",
"Nonconvex Optimization Problems",
"Binary Decision Variables",
"Polyhedral Obstacles",
"Velocity Constraints",
"Industrial Robot",
"Joints",
"Collision Avoidance",
"End Effectors",
"Planning",
"Service Robots"
],
"authors": [
{
"affiliation": "Institute of Control and System Theory, Department of Electrical Engineering and Computer Science, University of Kassel, Germany",
"fullName": "Hao Ding",
"givenName": "Hao",
"surname": "Ding",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of the Federal Armed Forces Munich, Dept. Aerospace Eng., D-85577 Neubiberg (Munich), Germany",
"fullName": "Gunther Reißig",
"givenName": "Gunther",
"surname": "Reißig",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Control and System Theory, Department of Electrical Engineering and Computer Science, University of Kassel, Germany",
"fullName": "Dominic Groß",
"givenName": "Dominic",
"surname": "Groß",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Control and System Theory, Department of Electrical Engineering and Computer Science, University of Kassel, Germany",
"fullName": "Olaf Stursberg",
"givenName": "Olaf",
"surname": "Stursberg",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "case",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-08-01T00:00:00",
"pubType": "proceedings",
"pages": "133-138",
"year": "2011",
"issn": "2161-8070",
"isbn": "978-1-4577-1732-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06042461",
"articleId": "12OmNzyGHbU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06042463",
"articleId": "12OmNx38vOc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/robot/1989/1938/0/00099976",
"title": "Kinetic limitations on the use of redundancy in robotic manipulators",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1989/00099976/12OmNBtCCzo",
"parentPublication": {
"id": "proceedings/robot/1989/1938/0",
"title": "1989 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/med/2009/4684/0/05164665",
"title": "Optimal motion planning for robotic manipulators with dynamic obstacles using mixed-integer linear programming",
"doi": null,
"abstractUrl": "/proceedings-article/med/2009/05164665/12OmNCcbE2X",
"parentPublication": {
"id": "proceedings/med/2009/4684/0",
"title": "Mediterranean Conference on Control and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/case/2012/0430/0/06386389",
"title": "Collision detection using band designed Disturbance Observer",
"doi": null,
"abstractUrl": "/proceedings-article/case/2012/06386389/12OmNqzcvSD",
"parentPublication": {
"id": "proceedings/case/2012/0430/0",
"title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131955",
"title": "Reformulation of dynamic manipulability ellipsoid for robotic manipulators",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131955/12OmNrEL2C3",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131708",
"title": "Optimal placement of robotic manipulators using multiple kinematic criteria",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131708/12OmNwbukkD",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1988/0852/0/00012076",
"title": "Global time optimal motions of robotic manipulators in the presence of obstacles",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1988/00012076/12OmNxTEiR9",
"parentPublication": {
"id": "proceedings/robot/1988/0852/0",
"title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cerma/2008/3320/0/3320a508",
"title": "The Laplacian Artificial Potential Field (LAPF) for the Path Planning of Robotic Manipulators",
"doi": null,
"abstractUrl": "/proceedings-article/cerma/2008/3320a508/12OmNxYtu2I",
"parentPublication": {
"id": "proceedings/cerma/2008/3320/0",
"title": "Electronics, Robotics and Automotive Mechanics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1989/1938/0/00100226",
"title": "Bounded error interpolates for manipulators with prismatic and revolute joints",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1989/00100226/12OmNzBOig2",
"parentPublication": {
"id": "proceedings/robot/1989/1938/0",
"title": "1989 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/inciscos/2019/5581/0/558100a244",
"title": "Null-Space Based Control Applied to a Formation of Aerial Manipulators in Congested Environment",
"doi": null,
"abstractUrl": "/proceedings-article/inciscos/2019/558100a244/1iHUGOHvonm",
"parentPublication": {
"id": "proceedings/inciscos/2019/5581/0",
"title": "2019 International Conference on Information Systems and Computer Science (INCISCOS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscsic/2021/1627/0/162700a318",
"title": "Segmented Inverse Kinematics and Trajectory Planning of Quasi-continuous Manipulator",
"doi": null,
"abstractUrl": "/proceedings-article/iscsic/2021/162700a318/1zzpqmJgs48",
"parentPublication": {
"id": "proceedings/iscsic/2021/1627/0",
"title": "2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "13bd1eJgoi5",
"title": "2018 IEEE/ACM 4th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS)",
"acronym": "sescps",
"groupId": "1808866",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "13bd1gQYgER",
"doi": null,
"title": "Toward Explainable Multi-Objective Probabilistic Planning",
"normalizedTitle": "Toward Explainable Multi-Objective Probabilistic Planning",
"abstract": "Use of multi-objective probabilistic planning to synthesize behavior of CPSs can play an important role in engineering systems that must self-optimize for multiple quality objectives and operate under uncertainty. However, the reasoning behind automated planning is opaque to end-users. They may not understand why a particular behavior is generated, and therefore not be able to calibrate their confidence in the systems working properly. To address this problem, we propose a method to automatically generate verbal explanation of multi-objective probabilistic planning, that explains why a particular behavior is generated on the basis of the optimization objectives. Our explanation method involves describing objective values of a generated behavior and explaining any tradeoff made to reconcile competing objectives. We contribute: (i) an explainable planning representation that facilitates explanation generation, and (ii) an algorithm for generating contrastive justification as explanation for why a generated behavior is best with respect to the planning objectives. We demonstrate our approach on a mobile robot case study.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Use of multi-objective probabilistic planning to synthesize behavior of CPSs can play an important role in engineering systems that must self-optimize for multiple quality objectives and operate under uncertainty. However, the reasoning behind automated planning is opaque to end-users. They may not understand why a particular behavior is generated, and therefore not be able to calibrate their confidence in the systems working properly. To address this problem, we propose a method to automatically generate verbal explanation of multi-objective probabilistic planning, that explains why a particular behavior is generated on the basis of the optimization objectives. Our explanation method involves describing objective values of a generated behavior and explaining any tradeoff made to reconcile competing objectives. We contribute: (i) an explainable planning representation that facilitates explanation generation, and (ii) an algorithm for generating contrastive justification as explanation for why a generated behavior is best with respect to the planning objectives. We demonstrate our approach on a mobile robot case study.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Use of multi-objective probabilistic planning to synthesize behavior of CPSs can play an important role in engineering systems that must self-optimize for multiple quality objectives and operate under uncertainty. However, the reasoning behind automated planning is opaque to end-users. They may not understand why a particular behavior is generated, and therefore not be able to calibrate their confidence in the systems working properly. To address this problem, we propose a method to automatically generate verbal explanation of multi-objective probabilistic planning, that explains why a particular behavior is generated on the basis of the optimization objectives. Our explanation method involves describing objective values of a generated behavior and explaining any tradeoff made to reconcile competing objectives. We contribute: (i) an explainable planning representation that facilitates explanation generation, and (ii) an algorithm for generating contrastive justification as explanation for why a generated behavior is best with respect to the planning objectives. We demonstrate our approach on a mobile robot case study.",
"fno": "572801a019",
"keywords": [
"Mobile Robots",
"Multi Robot Systems",
"Optimisation",
"Planning Artificial Intelligence",
"Multiobjective Probabilistic Planning",
"Multiple Quality Objectives",
"Automated Planning",
"Particular Behavior",
"Optimization Objectives",
"Competing Objectives",
"Explainable Planning Representation",
"Explanation Generation",
"Planning Objectives",
"Planning",
"Robots",
"Collision Avoidance",
"Probabilistic Logic",
"Optimization",
"Observers",
"Uncertainty",
"Explainable Planning",
"Probabilistic Planning",
"Multi Objective Planning"
],
"authors": [
{
"affiliation": null,
"fullName": "Roykrong Sukkerd",
"givenName": "Roykrong",
"surname": "Sukkerd",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Reid Simmons",
"givenName": "Reid",
"surname": "Simmons",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "David Garlan",
"givenName": "David",
"surname": "Garlan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sescps",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-05-01T00:00:00",
"pubType": "proceedings",
"pages": "19-25",
"year": "2018",
"issn": null,
"isbn": "978-1-4503-5728-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "572801a013",
"articleId": "13bd1sx4Zss",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "572801a026",
"articleId": "13bd1gzWkQ7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wetice/2017/1759/0/1759a066",
"title": "Towards Formal Planning for Quality-Aware Self-Adaptive Systems",
"doi": null,
"abstractUrl": "/proceedings-article/wetice/2017/1759a066/12OmNAlvHWK",
"parentPublication": {
"id": "proceedings/wetice/2017/1759/0",
"title": "2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sescps/2016/4171/0/4171a015",
"title": "Multiscale Time Abstractions for Long-Range Planning under Uncertainty",
"doi": null,
"abstractUrl": "/proceedings-article/sescps/2016/4171a015/12OmNBiygtw",
"parentPublication": {
"id": "proceedings/sescps/2016/4171/0",
"title": "2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icat/2017/3337/0/08171616",
"title": "Path planning using adaptive burs of free configuration space",
"doi": null,
"abstractUrl": "/proceedings-article/icat/2017/08171616/12OmNsd6vl9",
"parentPublication": {
"id": "proceedings/icat/2017/3337/0",
"title": "2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icseng/2017/0610/0/0610a011",
"title": "A Framework for Safe Navigation of Unmanned Aerial Vehicles in Unknown Environments",
"doi": null,
"abstractUrl": "/proceedings-article/icseng/2017/0610a011/12OmNvjgWCJ",
"parentPublication": {
"id": "proceedings/icseng/2017/0610/0",
"title": "2017 25th International Conference on Systems Engineering (ICSEng)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2010/4215/0/4215a421",
"title": "Motion Planning and Animation Variety Using Dance Motion Clips",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2010/4215a421/12OmNxeutcq",
"parentPublication": {
"id": "proceedings/cw/2010/4215/0",
"title": "2010 International Conference on Cyberworlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07127016",
"title": "Planning Motions and Placements for Virtual Demonstrators",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07127016/13rRUxBa5c3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bwcca/2010/4236/0/05633813",
"title": "A Motion Planning of Swarm Robots Using Genetic Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/bwcca/2010/05633813/183rAfQ0GDa",
"parentPublication": {
"id": "proceedings/bwcca/2010/4236/0",
"title": "2010 International Conference on Broadband, Wireless Computing, Communication and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600c928",
"title": "P<sup>3</sup>IV: Probabilistic Procedure Planning from Instructional Videos with Weak Supervision",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600c928/1H1hPUaJ5a8",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asap/2019/1601/0/160100a185",
"title": "A Programmable Architecture for Robot Motion Planning Acceleration",
"doi": null,
"abstractUrl": "/proceedings-article/asap/2019/160100a185/1d5kEJFJXPO",
"parentPublication": {
"id": "proceedings/asap/2019/1601/2160-052X",
"title": "2019 IEEE 30th International Conference on Application-specific Systems, Architectures and Processors (ASAP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2020/5237/0/523700a172",
"title": "How to find assembly plans (fast): Hierarchical state space partitioning for efficient multi-robot assembly",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2020/523700a172/1pP3TL8WbrW",
"parentPublication": {
"id": "proceedings/irc/2020/5237/0",
"title": "2020 Fourth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBtl1zF",
"title": "2010 International Conference on Broadband, Wireless Computing, Communication and Applications",
"acronym": "bwcca",
"groupId": "1800183",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "183rAfQ0GDa",
"doi": "10.1109/BWCCA.2010.128",
"title": "A Motion Planning of Swarm Robots Using Genetic Algorithm",
"normalizedTitle": "A Motion Planning of Swarm Robots Using Genetic Algorithm",
"abstract": "In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm searches a path, which the center of robot swarm should follow, within a Voronoi diagram of the free space. The motion planning is a genetic algorithm based on artificial potential models. The potential functions are used as a repulsion to keep robots away from obstacles and as an attraction/repulsion to keep robot swarm within a certain distance. With Voronoi diagram and potential models, the algorithm plans safe paths efficiently and the formation of robot swarm is also maintained.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm searches a path, which the center of robot swarm should follow, within a Voronoi diagram of the free space. The motion planning is a genetic algorithm based on artificial potential models. The potential functions are used as a repulsion to keep robots away from obstacles and as an attraction/repulsion to keep robot swarm within a certain distance. With Voronoi diagram and potential models, the algorithm plans safe paths efficiently and the formation of robot swarm is also maintained.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm searches a path, which the center of robot swarm should follow, within a Voronoi diagram of the free space. The motion planning is a genetic algorithm based on artificial potential models. The potential functions are used as a repulsion to keep robots away from obstacles and as an attraction/repulsion to keep robot swarm within a certain distance. With Voronoi diagram and potential models, the algorithm plans safe paths efficiently and the formation of robot swarm is also maintained.",
"fno": "05633813",
"keywords": [
"Computational Geometry",
"Genetic Algorithms",
"Mobile Robots",
"Motion Control",
"Multi Robot Systems",
"Path Planning",
"Motion Planning",
"Swarm Robots",
"Potential Based Genetic Algorithm",
"Formation Control",
"Global Path Planning Algorithm",
"Voronoi Diagram",
"Robot Kinematics",
"Collision Avoidance",
"Biological Cells",
"Trajectory",
"Planning",
"Swarm Robotics",
"Formation Control",
"Voronoi Diagram",
"Artificial Potential Filed",
"Genetic Algorithm"
],
"authors": [
{
"affiliation": null,
"fullName": "Chien-Chou Lin",
"givenName": "Chien-Chou",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Po-Yuan Hsiao",
"givenName": "Po-Yuan",
"surname": "Hsiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kun-Cheng Chen",
"givenName": "Kun-Cheng",
"surname": "Chen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bwcca",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-11-01T00:00:00",
"pubType": "proceedings",
"pages": "538-543",
"year": "2010",
"issn": null,
"isbn": "978-1-4244-8448-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05633811",
"articleId": "183rAfI3UZi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05633814",
"articleId": "183rAfgOqv8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aihas/1990/2043/0/00093932",
"title": "Robot task and movement planning",
"doi": null,
"abstractUrl": "/proceedings-article/aihas/1990/00093932/12OmNvjyy3G",
"parentPublication": {
"id": "proceedings/aihas/1990/2043/0",
"title": "1990 Simulation and Planning in High Autonomy Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2018/5395/0/539501a591",
"title": "Energy Saving and Collision-Free Motion Planning for Oblivious Robots",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2018/539501a591/12OmNwE9On3",
"parentPublication": {
"id": "proceedings/waina/2018/5395/0",
"title": "2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ecmsm/2015/6972/0/07208710",
"title": "Formation control of mobile robots with obstacle avoidance using fuzzy artificial potential field",
"doi": null,
"abstractUrl": "/proceedings-article/ecmsm/2015/07208710/12OmNwkR5vG",
"parentPublication": {
"id": "proceedings/ecmsm/2015/6972/0",
"title": "2015 IEEE International Workshop of Electronics, Control, Measurement, Signals and their application to Mechatronics (ECMSM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fit/2016/5300/0/5300a319",
"title": "Coverage Path Planning of Mobile Robots Using Rational Quadratic Bézier Spline",
"doi": null,
"abstractUrl": "/proceedings-article/fit/2016/5300a319/12OmNxj235M",
"parentPublication": {
"id": "proceedings/fit/2016/5300/0",
"title": "2016 International Conference on Frontiers of Information Technology (FIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icarsc/2016/2255/0/07781993",
"title": "Convex Shape Generation by Robotic Swarm",
"doi": null,
"abstractUrl": "/proceedings-article/icarsc/2016/07781993/12OmNyxFKcP",
"parentPublication": {
"id": "proceedings/icarsc/2016/2255/0",
"title": "2016 International Conference on Autonomous Robot Systems and Competitions (ICARSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iros/1995/7108/2/71082027",
"title": "Action observation in collision-free motion planning for mobile robots",
"doi": null,
"abstractUrl": "/proceedings-article/iros/1995/71082027/12OmNyyO8Nv",
"parentPublication": {
"id": "proceedings/iros/1995/7108/2",
"title": "Intelligent Robots and Systems, IEEE/RSJ International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2017/6724/0/07926524",
"title": "Multi-robot Planning for Non-overlapping Operator Attention Allocation",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2017/07926524/12OmNzwZ6p9",
"parentPublication": {
"id": "proceedings/irc/2017/6724/0",
"title": "2017 First IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2018/06/07878613",
"title": "Swarm Robots Search for Multiple Targets Based on an Improved Grouping Strategy",
"doi": null,
"abstractUrl": "/journal/tb/2018/06/07878613/17D45XERmlP",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2019/9245/0/924500a117",
"title": "A 3D Robot Self Filter for Next Best View Planning",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2019/924500a117/18M7eAOokEw",
"parentPublication": {
"id": "proceedings/irc/2019/9245/0",
"title": "2019 Third IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2020/5237/0/523700a298",
"title": "A Deep Learning-Based Autonomous Robot Manipulator for Sorting Application",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2020/523700a298/1pP3THAnRnO",
"parentPublication": {
"id": "proceedings/irc/2020/5237/0",
"title": "2020 Fourth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxwENvc",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"acronym": "icassp",
"groupId": "1000002",
"volume": "3",
"displayVolume": "3",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBKmXnp",
"doi": "10.1109/ICASSP.2004.1326472",
"title": "Using shape distributions as priors in a curve evolution framework",
"normalizedTitle": "Using shape distributions as priors in a curve evolution framework",
"abstract": "We propose a novel framework for constructing and using a shape prior in a curve evolution framework. The prior shape information is captured through shape distributions, which are histograms of features derived from the shape boundary. The resulting prior captures perceptual shape similarity, is robust to small sample size, and is flexible. We further derive a curve evolution force that corresponds to this prior. This enables us to use this prior to perform tasks such as mean shape calculation and image segmentation within a curve evolution framework.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We propose a novel framework for constructing and using a shape prior in a curve evolution framework. The prior shape information is captured through shape distributions, which are histograms of features derived from the shape boundary. The resulting prior captures perceptual shape similarity, is robust to small sample size, and is flexible. We further derive a curve evolution force that corresponds to this prior. This enables us to use this prior to perform tasks such as mean shape calculation and image segmentation within a curve evolution framework.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We propose a novel framework for constructing and using a shape prior in a curve evolution framework. The prior shape information is captured through shape distributions, which are histograms of features derived from the shape boundary. The resulting prior captures perceptual shape similarity, is robust to small sample size, and is flexible. We further derive a curve evolution force that corresponds to this prior. This enables us to use this prior to perform tasks such as mean shape calculation and image segmentation within a curve evolution framework.",
"fno": "01326472",
"keywords": [
"Image Sampling",
"Image Segmentation",
"Statistical Distributions",
"Shape Distributions",
"Curve Evolution Force",
"Shape Prior Construction",
"Feature Histograms",
"Perceptual Shape Similarity",
"Mean Shape Calculation",
"Image Segmentation",
"Image Processing Applications",
"Image Segmentation",
"Shape Measurement",
"Training Data",
"Histograms",
"Robustness",
"Image Processing",
"Principal Component Analysis",
"Deformable Models",
"Data Mining",
"Smoothing Methods"
],
"authors": [
{
"affiliation": "Electr. & Comput. Eng. Dept., Boston Univ., MA, USA",
"fullName": "A. Litvin",
"givenName": "A.",
"surname": "Litvin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Electr. & Comput. Eng. Dept., Boston Univ., MA, USA",
"fullName": "W.C. Karl",
"givenName": "W.C.",
"surname": "Karl",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icassp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-01-01T00:00:00",
"pubType": "proceedings",
"pages": "iii-25-8 vol.3",
"year": "2004",
"issn": "1520-6149",
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01326471",
"articleId": "12OmNCcbDXZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01326473",
"articleId": "12OmNwtWfDN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2000/0662/1/06621361",
"title": "Tomographic Reconstruction Using Curve Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2000/06621361/12OmNBU1jK1",
"parentPublication": {
"id": "proceedings/cvpr/2000/0662/1",
"title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/1995/7042/0/70420834",
"title": "Adaptive shape evolution using blending",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/1995/70420834/12OmNCmpcNR",
"parentPublication": {
"id": "proceedings/iccv/1995/7042/0",
"title": "Computer Vision, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/2/252120304",
"title": "Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/252120304/12OmNCvcLH3",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/2",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cimca/2006/2731/0/04052839",
"title": "Curve Shape Modification and Similarity Evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/cimca/2006/04052839/12OmNCzsKFD",
"parentPublication": {
"id": "proceedings/cimca/2006/2731/0",
"title": "2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2009/3992/0/05206854",
"title": "Shape evolution for rigid and nonrigid shape registration and recovery",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206854/12OmNwx3Qag",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mmbia/1996/7367/0/73670234",
"title": "A Computationally Efficient Shape Analysis via Level Sets",
"doi": null,
"abstractUrl": "/proceedings-article/mmbia/1996/73670234/12OmNzdoMv3",
"parentPublication": {
"id": "proceedings/mmbia/1996/7367/0",
"title": "Mathematical Methods in Biomedical Image Analysis, IEEE Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2002/7402/4/05745427",
"title": "Image segmentation based on prior probabilistic shape models",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2002/05745427/12OmNzxgHvA",
"parentPublication": {
"id": "proceedings/icassp/2002/7402/4",
"title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2008/08/ttp2008081385",
"title": "A Framework for Image Segmentation Using Shape Models and Kernel Space Shape Priors",
"doi": null,
"abstractUrl": "/journal/tp/2008/08/ttp2008081385/13rRUEgs2N3",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2006/08/i1352",
"title": "Affine-Invariant Geometric Shape Priors for Region-Based Active Contours",
"doi": null,
"abstractUrl": "/journal/tp/2006/08/i1352/13rRUNvyam4",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2007/06/i0945",
"title": "Curve/Surface Representation and Evolution Using Vector Level Sets with Application to the Shape-Based Segmentation Problem",
"doi": null,
"abstractUrl": "/journal/tp/2007/06/i0945/13rRUxly96C",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzlUKpE",
"title": "2010 International Conference of Information Science and Management Engineering. ISME 2010",
"acronym": "isme",
"groupId": "1800131",
"volume": "2",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvrMUhI",
"doi": "10.1109/ISME.2010.103",
"title": "Surface Matching by Using the Simple Strategy in the Application of Automotive Styling",
"normalizedTitle": "Surface Matching by Using the Simple Strategy in the Application of Automotive Styling",
"abstract": "A reverse transformation method based on the projective area overlapping has been presented for the surface matching in the application of automotive styling from 2-D to 3-D. The matching criteria and the objective function have also been discussed and used in the simulation matching. The simple evolutionary strategy has been implemented into the system and evaluated to realise the optimal matching. The simulation results demonstrate that the strategy applied here can tackle the surface matching problem.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A reverse transformation method based on the projective area overlapping has been presented for the surface matching in the application of automotive styling from 2-D to 3-D. The matching criteria and the objective function have also been discussed and used in the simulation matching. The simple evolutionary strategy has been implemented into the system and evaluated to realise the optimal matching. The simulation results demonstrate that the strategy applied here can tackle the surface matching problem.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A reverse transformation method based on the projective area overlapping has been presented for the surface matching in the application of automotive styling from 2-D to 3-D. The matching criteria and the objective function have also been discussed and used in the simulation matching. The simple evolutionary strategy has been implemented into the system and evaluated to realise the optimal matching. The simulation results demonstrate that the strategy applied here can tackle the surface matching problem.",
"fno": "05573834",
"keywords": [
"Automotive Engineering",
"Surface Matching",
"Automotive Styling",
"Reverse Transformation Method",
"Evolutionary Strategy",
"Sketch Processing",
"Automotive Engineering",
"Shape",
"Parametric Statistics",
"Feature Extraction",
"Pixel",
"Solid Modeling",
"Automotive Components",
"Surface",
"Matching",
"Strategy",
"Automotive",
"Styling"
],
"authors": [
{
"affiliation": null,
"fullName": "Qiang Li",
"givenName": "Qiang",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xi Wang",
"givenName": "Xi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nan Qi",
"givenName": "Nan",
"surname": "Qi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yanping Tang",
"givenName": "Yanping",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "R.M. Newman",
"givenName": "R.M.",
"surname": "Newman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "253-256",
"year": "2010",
"issn": null,
"isbn": "978-1-4244-7669-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05573837",
"articleId": "12OmNAWpyyC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05573835",
"articleId": "12OmNzYwceB",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/1988/0862/0/00196246",
"title": "Surface classification: hypothesis testing and parameter estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1988/00196246/12OmNASILVT",
"parentPublication": {
"id": "proceedings/cvpr/1988/0862/0",
"title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcse/2010/4303/1/4303a299",
"title": "A Simple 3-D Surface Reconstruction Method",
"doi": null,
"abstractUrl": "/proceedings-article/wcse/2010/4303a299/12OmNAo45B2",
"parentPublication": {
"id": "wcse/2010/4303/1",
"title": "2010 Second World Congress on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/2/3962c220",
"title": "Fairing Method for Automotive Panels Based on Skinning Surface",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962c220/12OmNxG1yGb",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/2",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isme/2010/4132/2/4132b253",
"title": "Surface Matching by Using the Simple Strategy in the Application of Automotive Styling",
"doi": null,
"abstractUrl": "/proceedings-article/isme/2010/4132b253/12OmNyoiZ4F",
"parentPublication": {
"id": "proceedings/isme/2010/4132/2",
"title": "Information Science and Management Engineering, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/1999/0164/2/01641098",
"title": "Free-Form Surface Registration Using Surface Signatures",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/1999/01641098/12OmNzIl3DW",
"parentPublication": {
"id": "proceedings/iccv/1999/0164/2",
"title": "Proceedings of the Seventh IEEE International Conference on Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isme/2010/4132/2/4132b257",
"title": "Comparison of the Evolutionary Strategies for the Surface Matching Based on Projective Area",
"doi": null,
"abstractUrl": "/proceedings-article/isme/2010/4132b257/12OmNzYNNkm",
"parentPublication": {
"id": "proceedings/isme/2010/4132/2",
"title": "Information Science and Management Engineering, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isme/2010/7669/2/05573835",
"title": "Comparison of the Evolutionary Strategies for the Surface Matching Based on Projective Area",
"doi": null,
"abstractUrl": "/proceedings-article/isme/2010/05573835/12OmNzYwceB",
"parentPublication": {
"id": "proceedings/isme/2010/7669/2",
"title": "2010 International Conference of Information Science and Management Engineering. ISME 2010",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2007/01/mcg2007010060",
"title": "Sketch-Based 3D-Shape Creation for Industrial Styling Design",
"doi": null,
"abstractUrl": "/magazine/cg/2007/01/mcg2007010060/13rRUwh80J8",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900c267",
"title": "GP22: A Car Styling Dataset for Automotive Designers",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900c267/1G575jZEozS",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdp/2021/1455/0/145500a266",
"title": "Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain",
"doi": null,
"abstractUrl": "/proceedings-article/pdp/2021/145500a266/1sZ2GSsEoKY",
"parentPublication": {
"id": "proceedings/pdp/2021/1455/0",
"title": "2021 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrIJqwx",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"acronym": "icdh",
"groupId": "1802037",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwkR5vZ",
"doi": "10.1109/ICDH.2014.44",
"title": "3D Virtual Garments Deformation Method Based on Size-Driven",
"normalizedTitle": "3D Virtual Garments Deformation Method Based on Size-Driven",
"abstract": "Realistic garment modeling is a hot issues in the garment simulation and has great applications in world. However, modeling virtual garment is a complex process whether using the geometrical-based or physical-based approach. So how to construct the realistic garment to meet the needs of application is very important. In order to solve this problem, in this paper, a garment deformation method based on size-driven is reported. A garment model is often initially customized for the particular shape of a specific human body, and it will not generically fit other bodies with different shapes. The purpose in our approach is to deform the existing garment to a new one to fit the target body. The deformation is based on the main size differences between the source model and target one. According to the pattern design rules, the key size information of body can be used to generate different pattern size, the deformation function is built so that the differences between the source and the target garment have been computed. The experiment results demonstrate that our method can get a believable deformation result.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Realistic garment modeling is a hot issues in the garment simulation and has great applications in world. However, modeling virtual garment is a complex process whether using the geometrical-based or physical-based approach. So how to construct the realistic garment to meet the needs of application is very important. In order to solve this problem, in this paper, a garment deformation method based on size-driven is reported. A garment model is often initially customized for the particular shape of a specific human body, and it will not generically fit other bodies with different shapes. The purpose in our approach is to deform the existing garment to a new one to fit the target body. The deformation is based on the main size differences between the source model and target one. According to the pattern design rules, the key size information of body can be used to generate different pattern size, the deformation function is built so that the differences between the source and the target garment have been computed. The experiment results demonstrate that our method can get a believable deformation result.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Realistic garment modeling is a hot issues in the garment simulation and has great applications in world. However, modeling virtual garment is a complex process whether using the geometrical-based or physical-based approach. So how to construct the realistic garment to meet the needs of application is very important. In order to solve this problem, in this paper, a garment deformation method based on size-driven is reported. A garment model is often initially customized for the particular shape of a specific human body, and it will not generically fit other bodies with different shapes. The purpose in our approach is to deform the existing garment to a new one to fit the target body. The deformation is based on the main size differences between the source model and target one. According to the pattern design rules, the key size information of body can be used to generate different pattern size, the deformation function is built so that the differences between the source and the target garment have been computed. The experiment results demonstrate that our method can get a believable deformation result.",
"fno": "4284a192",
"keywords": [
"Clothing",
"Three Dimensional Displays",
"Solid Modeling",
"Deformable Models",
"Computational Modeling",
"Mathematical Model",
"Educational Institutions",
"Deformation",
"Garment Modelling",
"Resizing"
],
"authors": [
{
"affiliation": null,
"fullName": "Jianping Wang",
"givenName": "Jianping",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ruomei Wang",
"givenName": "Ruomei",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fan Zhou",
"givenName": "Fan",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdh",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-11-01T00:00:00",
"pubType": "proceedings",
"pages": "192-197",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4284-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4284a185",
"articleId": "12OmNx76TM7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4284a198",
"articleId": "12OmNC17hWN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dv/2014/7000/1/7000a171",
"title": "A Layered Model of Human Body and Garment Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2014/7000a171/12OmNCf1DwE",
"parentPublication": {
"id": "proceedings/3dv/2014/7000/2",
"title": "2014 2nd International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2014/6854/0/6854a058",
"title": "Animation of Refitted 3D Garment Models for Reshaped Bodies",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2014/6854a058/12OmNvAiSyg",
"parentPublication": {
"id": "proceedings/icvrv/2014/6854/0",
"title": "2014 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2014/4284/0/4284a180",
"title": "An Improved Texture Mapping Model Based on Mesh Parameterization in 3D Garments",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a180/12OmNxAlA30",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2021/3176/0/09667070",
"title": "UV-based reconstruction of 3D garments from a single RGB image",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2021/09667070/1A6BtIpyi88",
"parentPublication": {
"id": "proceedings/fg/2021/3176/0",
"title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scset/2022/7876/0/787600a204",
"title": "Research on Improving Garment Fit through CLO 3D Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/scset/2022/787600a204/1ANM2D8v5MA",
"parentPublication": {
"id": "proceedings/scset/2022/7876/0",
"title": "2022 International Seminar on Computer Science and Engineering Technology (SCSET)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f451",
"title": "DeePSD: Automatic Deep Skinning And Pose Space Deformation For 3D Garment Animation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f451/1BmHGfGgmic",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600i130",
"title": "SNUG: Self-Supervised Neural Dynamic Garments",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600i130/1H1mT62lup2",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/01/09145703",
"title": "GarNet++: Improving Fast and Accurate Static 3D Cloth Draping by Curvature Loss",
"doi": null,
"abstractUrl": "/journal/tp/2022/01/09145703/1lE02EJHeo0",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2021/0191/0/019100b416",
"title": "DeepDraper: Fast and Accurate 3D Garment Draping over a 3D Human Body",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2021/019100b416/1yNirBDl984",
"parentPublication": {
"id": "proceedings/iccvw/2021/0191/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900l1758",
"title": "Self-Supervised Collision Handling via Generative 3D Garment Models for Virtual Try-On",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900l1758/1yeLegPnV2E",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrIJqwx",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"acronym": "icdh",
"groupId": "1802037",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxisQTp",
"doi": "10.1109/ICDH.2014.75",
"title": "Semantic-Oriented Shape Exploration for Car Styling",
"normalizedTitle": "Semantic-Oriented Shape Exploration for Car Styling",
"abstract": "This paper aims to provide a more convenient interaction approach for users who can manipulate or build his pleasurable car model by adjusting semantic properties. Since specific aesthetic property is determined by semantic key lines, adjusting these lines obeying particular curve styling property will manipulate car model semantically. An interface is designed to change styling properties with modification value, rather than geometrical operating on control points directly. Furthermore, styling properties are integrated together to reshape the model semantically. This method reshapes the parametric car model using morph able models in design language automatically. Users can realize different semantic modification with some options in the interface for creative design.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper aims to provide a more convenient interaction approach for users who can manipulate or build his pleasurable car model by adjusting semantic properties. Since specific aesthetic property is determined by semantic key lines, adjusting these lines obeying particular curve styling property will manipulate car model semantically. An interface is designed to change styling properties with modification value, rather than geometrical operating on control points directly. Furthermore, styling properties are integrated together to reshape the model semantically. This method reshapes the parametric car model using morph able models in design language automatically. Users can realize different semantic modification with some options in the interface for creative design.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper aims to provide a more convenient interaction approach for users who can manipulate or build his pleasurable car model by adjusting semantic properties. Since specific aesthetic property is determined by semantic key lines, adjusting these lines obeying particular curve styling property will manipulate car model semantically. An interface is designed to change styling properties with modification value, rather than geometrical operating on control points directly. Furthermore, styling properties are integrated together to reshape the model semantically. This method reshapes the parametric car model using morph able models in design language automatically. Users can realize different semantic modification with some options in the interface for creative design.",
"fno": "4284a368",
"keywords": [
"Shape",
"Semantics",
"Mathematical Model",
"Deformable Models",
"Wheels",
"Educational Institutions",
"Acceleration",
"Cubic Bezier Curve",
"Semantic Oriented",
"Industrial Design",
"Styling Property",
"Morphable Models"
],
"authors": [
{
"affiliation": null,
"fullName": "Wang Bo",
"givenName": "Wang",
"surname": "Bo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Li Bao-Jun",
"givenName": "Li",
"surname": "Bao-Jun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hu Ping",
"givenName": "Hu",
"surname": "Ping",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Song Ming-Liang",
"givenName": "Song",
"surname": "Ming-Liang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdh",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-11-01T00:00:00",
"pubType": "proceedings",
"pages": "368-373",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4284-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4284a361",
"articleId": "12OmNAhfIxJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4284a374",
"articleId": "12OmNx3q6Zz",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdma/2012/4772/0/4772a129",
"title": "A Study on Crashworthiness of Rhombus Concept Car",
"doi": null,
"abstractUrl": "/proceedings-article/icdma/2012/4772a129/12OmNvkplji",
"parentPublication": {
"id": "proceedings/icdma/2012/4772/0",
"title": "2012 Third International Conference on Digital Manufacturing & Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2007/01/mcg2007010060",
"title": "Sketch-Based 3D-Shape Creation for Industrial Styling Design",
"doi": null,
"abstractUrl": "/magazine/cg/2007/01/mcg2007010060/13rRUwh80J8",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2017/03/07467534",
"title": "Ahura: A Heuristic-Based Racer for the Open Racing Car Simulator",
"doi": null,
"abstractUrl": "/journal/ci/2017/03/07467534/13rRUy0qnJ7",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itme/2018/7744/0/774400a775",
"title": "Design of Two-Wheel Balance Car Based on STM32",
"doi": null,
"abstractUrl": "/proceedings-article/itme/2018/774400a775/17D45XERmkw",
"parentPublication": {
"id": "proceedings/itme/2018/7744/0",
"title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcmeim/2021/2172/0/217200a448",
"title": "Structure Design and Manufacture of Thermal Car",
"doi": null,
"abstractUrl": "/proceedings-article/wcmeim/2021/217200a448/1ANLpRETbNe",
"parentPublication": {
"id": "proceedings/wcmeim/2021/2172/0",
"title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiam/2021/1732/0/173200a461",
"title": "Evaluation of Vehicle Body Styling Based on AHP and EWM Method",
"doi": null,
"abstractUrl": "/proceedings-article/aiam/2021/173200a461/1BzTLoQyR7a",
"parentPublication": {
"id": "proceedings/aiam/2021/1732/0",
"title": "2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900c267",
"title": "GP22: A Car Styling Dataset for Automotive Designers",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900c267/1G575jZEozS",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600l1214",
"title": "Retrieval-based Spatially Adaptive Normalization for Semantic Image Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600l1214/1H0OB5YoBwc",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300d189",
"title": "Class-Based Styling: Real-Time Localized Style Transfer with Semantic Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300d189/1i5mBjqvedq",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900a950",
"title": "Towards Semantic Travel Behavior Prediction for Private Car Users",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900a950/1t7n2KNcF5S",
"parentPublication": {
"id": "proceedings/hpcc-dss-smartcity/2020/7649/0",
"title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzcxYVM",
"title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)",
"acronym": "icfhr",
"groupId": "1000298",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzahc5i",
"doi": "10.1109/ICFHR.2012.201",
"title": "Evolution Maps for Connected Components in Text Documents",
"normalizedTitle": "Evolution Maps for Connected Components in Text Documents",
"abstract": "For highly degraded text documents, common tasks such as binarization and line extraction, remain difficult tasks. Equipped with a reliable information regarding the distribution of character dimensions in the document, one can improve results of these algorithms significantly. We introduce a novel perspective of the image data which maps the evolution of connected components along the change in gray scale threshold. We use these maps to provide a robust algorithm for extracting information about character dimensions in degraded documents, and demonstrate improvement in binarization results using this information. We analyze statistically the characteristics of the evolution maps for text documents, and compare our results with ground truth data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "For highly degraded text documents, common tasks such as binarization and line extraction, remain difficult tasks. Equipped with a reliable information regarding the distribution of character dimensions in the document, one can improve results of these algorithms significantly. We introduce a novel perspective of the image data which maps the evolution of connected components along the change in gray scale threshold. We use these maps to provide a robust algorithm for extracting information about character dimensions in degraded documents, and demonstrate improvement in binarization results using this information. We analyze statistically the characteristics of the evolution maps for text documents, and compare our results with ground truth data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "For highly degraded text documents, common tasks such as binarization and line extraction, remain difficult tasks. Equipped with a reliable information regarding the distribution of character dimensions in the document, one can improve results of these algorithms significantly. We introduce a novel perspective of the image data which maps the evolution of connected components along the change in gray scale threshold. We use these maps to provide a robust algorithm for extracting information about character dimensions in degraded documents, and demonstrate improvement in binarization results using this information. We analyze statistically the characteristics of the evolution maps for text documents, and compare our results with ground truth data.",
"fno": "06424427",
"keywords": [
"Character Recognition",
"Document Image Processing",
"Text Analysis",
"Evolution Maps",
"Connected Components",
"Text Document",
"Binarization",
"Line Extraction",
"Reliable Information",
"Image Data",
"Gray Scale Threshold",
"Robust Algorithm",
"Information Extraction",
"Character Dimensions",
"Ground Truth Data",
"Noise",
"Histograms",
"Estimation",
"Degradation",
"Educational Institutions",
"Robustness",
"Degraded Documents",
"Connected Components Analysis",
"Binarization"
],
"authors": [
{
"affiliation": null,
"fullName": "Ofer Biller",
"givenName": "Ofer",
"surname": "Biller",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Klara Kedem",
"givenName": "Klara",
"surname": "Kedem",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Itshak Dinstein",
"givenName": "Itshak",
"surname": "Dinstein",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jihad El-Sana",
"givenName": "Jihad",
"surname": "El-Sana",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icfhr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-09-01T00:00:00",
"pubType": "proceedings",
"pages": "405-410",
"year": "2012",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06424426",
"articleId": "12OmNzgwmRQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06424428",
"articleId": "12OmNwCJOOH",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdar/2013/4999/0/06628595",
"title": "Quality Evaluation of Ancient Digitized Documents for Binarization Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628595/12OmNAlNiMJ",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628596",
"title": "Adaptative Smart-Binarization Method: For Images of Business Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628596/12OmNBC8ABR",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628616",
"title": "Application of Phase-Based Features and Denoising in Postprocessing and Binarization of Historical Document Images",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628616/12OmNxT56AP",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761546",
"title": "An evaluation survey of binarization algorithms on historical documents",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761546/12OmNxaw5bY",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981086",
"title": "Local Co-occurrence and Contrast Mapping for Document Image Binarization",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981086/12OmNy3iFmk",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/act/2010/4269/0/05675839",
"title": "A Thresholding Algorithm for Text/Background Segmentation in Degraded Handwritten Jawi Documents",
"doi": null,
"abstractUrl": "/proceedings-article/act/2010/05675839/12OmNyRPgML",
"parentPublication": {
"id": "proceedings/act/2010/4269/0",
"title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981114",
"title": "Recognizing Glagolitic Characters in Degraded Historical Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981114/12OmNyoSbgX",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2007/2822/1/04378715",
"title": "Human Image Preference and Document Degradation Models",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2007/04378715/12OmNyugz2x",
"parentPublication": {
"id": "proceedings/icdar/2007/2822/1",
"title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvgip/2008/3476/0/3476a701",
"title": "Degraded Document Image Enhancement Using Hybrid Thresholding and Mathematical Morphology",
"doi": null,
"abstractUrl": "/proceedings-article/icvgip/2008/3476a701/12OmNzd7bRu",
"parentPublication": {
"id": "proceedings/icvgip/2008/3476/0",
"title": "Computer Vision, Graphics & Image Processing, Indian Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545409",
"title": "A Hybrid Deep Architecture for Robust Recognition of Text Lines of Degraded Printed Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545409/17D45VWpMyC",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1A6Bmtfk8WA",
"title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)",
"acronym": "fg",
"groupId": "1000065",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1A6BtIpyi88",
"doi": "10.1109/FG52635.2021.9667070",
"title": "UV-based reconstruction of 3D garments from a single RGB image",
"normalizedTitle": "UV-based reconstruction of 3D garments from a single RGB image",
"abstract": "Garments are highly detailed and dynamic objects made up of particles that interact with each other and with other objects, making the task of 2D to 3D garment reconstruction extremely challenging. Therefore, having a lightweight 3D representation capable of modelling fine details is of great importance. This work presents a deep learning framework based on Generative Adversarial Networks (GANs) to reconstruct 3D garment models from a single RGB image. It has the peculiarity of using UV maps to represent 3D data, a lightweight representation capable of dealing with high-resolution details and wrinkles. With this model and kind of 3D representation, we achieve state-of-the-art results on the CLOTH3D++ dataset, generating good quality and realistic garment reconstructions regardless of the garment topology and shape, human pose, occlusions and lightning.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Garments are highly detailed and dynamic objects made up of particles that interact with each other and with other objects, making the task of 2D to 3D garment reconstruction extremely challenging. Therefore, having a lightweight 3D representation capable of modelling fine details is of great importance. This work presents a deep learning framework based on Generative Adversarial Networks (GANs) to reconstruct 3D garment models from a single RGB image. It has the peculiarity of using UV maps to represent 3D data, a lightweight representation capable of dealing with high-resolution details and wrinkles. With this model and kind of 3D representation, we achieve state-of-the-art results on the CLOTH3D++ dataset, generating good quality and realistic garment reconstructions regardless of the garment topology and shape, human pose, occlusions and lightning.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Garments are highly detailed and dynamic objects made up of particles that interact with each other and with other objects, making the task of 2D to 3D garment reconstruction extremely challenging. Therefore, having a lightweight 3D representation capable of modelling fine details is of great importance. This work presents a deep learning framework based on Generative Adversarial Networks (GANs) to reconstruct 3D garment models from a single RGB image. It has the peculiarity of using UV maps to represent 3D data, a lightweight representation capable of dealing with high-resolution details and wrinkles. With this model and kind of 3D representation, we achieve state-of-the-art results on the CLOTH3D++ dataset, generating good quality and realistic garment reconstructions regardless of the garment topology and shape, human pose, occlusions and lightning.",
"fno": "09667070",
"keywords": [
"Clothing",
"Clothing Industry",
"Image Colour Analysis",
"Image Reconstruction",
"Learning Artificial Intelligence",
"Pose Estimation",
"Solid Modelling",
"UV Based Reconstruction",
"Single RGB Image",
"Garments",
"Dynamic Objects",
"3 D Garment Reconstruction",
"Lightweight 3 D Representation",
"Deep Learning Framework",
"Generative Adversarial Networks",
"3 D Garment Models",
"UV Maps",
"Lightweight Representation",
"High Resolution Details",
"Kind",
"CLOTH 3 D",
"Realistic Garment Reconstructions",
"Garment Topology",
"Solid Modeling",
"Three Dimensional Displays",
"Shape",
"Network Topology",
"Clothing",
"Lightning",
"Lighting"
],
"authors": [
{
"affiliation": "Universitat Politècnica de Catalunya (UPC),Facultat d'Informàtica de Barcelona (FIB),Barcelona,Spain",
"fullName": "Albert Rial-Farràs",
"givenName": "Albert",
"surname": "Rial-Farràs",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Vision Center (CVC),Barcelona,Spain",
"fullName": "Meysam Madadi",
"givenName": "Meysam",
"surname": "Madadi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universitat de Barcelona (UB),Facultat de Matemàtiques i Informàtica,Barcelona,Spain",
"fullName": "Sergio Escalera",
"givenName": "Sergio",
"surname": "Escalera",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fg",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-3176-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09667003",
"articleId": "1A6Bnxdmiac",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09666972",
"articleId": "1A6BFNxOxGM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdh/2014/4284/0/4284a192",
"title": "3D Virtual Garments Deformation Method Based on Size-Driven",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a192/12OmNwkR5vZ",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2014/4284/0/4284a180",
"title": "An Improved Texture Mapping Model Based on Mesh Parameterization in 3D Garments",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a180/12OmNxAlA30",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2014/4284/0/4284a299",
"title": "Semantic Segmentation and Labeling of 3D Garments",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a299/12OmNzaQozi",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200d304",
"title": "GarmentNets: Category-Level Pose Estimation for Garments via Canonical Space Shape Completion",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200d304/1BmILRj6ydO",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200m2654",
"title": "Learning Anchored Unsigned Distance Functions with Gradient Direction Alignment for Single-view Garment Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200m2654/1BmJ9U7w5A4",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/02/09760157",
"title": "DeepCloth: Neural Garment Representation for Shape and Style Editing",
"doi": null,
"abstractUrl": "/journal/tp/2023/02/09760157/1CHsxU4NX8I",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600d835",
"title": "Registering Explicit to Implicit: Towards High-Fidelity Garment mesh Reconstruction from Single Images",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600d835/1H0Lx9QOs9i",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600i130",
"title": "SNUG: Self-Supervised Neural Dynamic Garments",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600i130/1H1mT62lup2",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2022/9633/0/963300a024",
"title": "Dense 3D Face Reconstruction from a Single RGB Image",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2022/963300a024/1Lz24fdFD32",
"parentPublication": {
"id": "proceedings/cse/2022/9633/0",
"title": "2022 IEEE 25th International Conference on Computational Science and Engineering (CSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/mu/2022/01/09667322",
"title": "Garment Style Creator: Using StarGAN for Image-to-Image Translation of Multidomain Garments",
"doi": null,
"abstractUrl": "/magazine/mu/2022/01/09667322/1zMCigzYI6c",
"parentPublication": {
"id": "mags/mu",
"title": "IEEE MultiMedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H1mT62lup2",
"doi": "10.1109/CVPR52688.2022.00797",
"title": "SNUG: Self-Supervised Neural Dynamic Garments",
"normalizedTitle": "SNUG: Self-Supervised Neural Dynamic Garments",
"abstract": "We present a self-supervised method to learn dynamic 3D deformations of garments worn by parametric human bodies. State-of-the-art data-driven approaches to model 3D garment deformations are trained using supervised strategies that require large datasets, usually obtained by expensive physics-based simulation methods or professional multi-camera capture setups. In contrast, we propose a new training scheme that removes the need for ground-truth samples, enabling self-supervised training of dynamic 3D garment deformations. Our key contribution is to realize that physics-based deformation models, traditionally solved in a frame-by-frame basis by implicit integrators, can be recasted as an optimization problem. We leverage such optimization-based scheme to formulate a set of physics-based loss terms that can be used to train neural networks without precomputing ground-truth data. This allows us to learn models for interactive garments, including dynamic deformations and fine wrinkles, with a two orders of magnitude speed up in training time compared to state-of-the-art supervised methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a self-supervised method to learn dynamic 3D deformations of garments worn by parametric human bodies. State-of-the-art data-driven approaches to model 3D garment deformations are trained using supervised strategies that require large datasets, usually obtained by expensive physics-based simulation methods or professional multi-camera capture setups. In contrast, we propose a new training scheme that removes the need for ground-truth samples, enabling self-supervised training of dynamic 3D garment deformations. Our key contribution is to realize that physics-based deformation models, traditionally solved in a frame-by-frame basis by implicit integrators, can be recasted as an optimization problem. We leverage such optimization-based scheme to formulate a set of physics-based loss terms that can be used to train neural networks without precomputing ground-truth data. This allows us to learn models for interactive garments, including dynamic deformations and fine wrinkles, with a two orders of magnitude speed up in training time compared to state-of-the-art supervised methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a self-supervised method to learn dynamic 3D deformations of garments worn by parametric human bodies. State-of-the-art data-driven approaches to model 3D garment deformations are trained using supervised strategies that require large datasets, usually obtained by expensive physics-based simulation methods or professional multi-camera capture setups. In contrast, we propose a new training scheme that removes the need for ground-truth samples, enabling self-supervised training of dynamic 3D garment deformations. Our key contribution is to realize that physics-based deformation models, traditionally solved in a frame-by-frame basis by implicit integrators, can be recasted as an optimization problem. We leverage such optimization-based scheme to formulate a set of physics-based loss terms that can be used to train neural networks without precomputing ground-truth data. This allows us to learn models for interactive garments, including dynamic deformations and fine wrinkles, with a two orders of magnitude speed up in training time compared to state-of-the-art supervised methods.",
"fno": "694600i130",
"keywords": [
"Cameras",
"Clothing",
"Clothing Industry",
"Deformation",
"Learning Artificial Intelligence",
"Neural Nets",
"Optimisation",
"Pose Estimation",
"Solid Modelling",
"Expensive Physics Based",
"Professional Multicamera Capture Setups",
"Training Scheme",
"Ground Truth Samples",
"Self Supervised Training",
"Dynamic 3 D Garment Deformations",
"Physics Based Deformation Models",
"Frame By Frame Basis",
"Leverage Such Optimization Based Scheme",
"Physics Based Loss Terms",
"Neural Networks",
"Ground Truth Data",
"Interactive Garments",
"Dynamic Deformations",
"Training Time",
"State Of The Art Supervised Methods",
"Self Supervised Neural Dynamic",
"Self Supervised Method",
"Parametric Human Bodies",
"State Of The Art Data Driven Approaches",
"Model 3 D Garment Deformations",
"Supervised Strategies",
"Deformable Models",
"Training",
"Solid Modeling",
"Three Dimensional Displays",
"Tracking",
"Clothing",
"Dynamics"
],
"authors": [
{
"affiliation": "Universidad Rey Juan Carlos,Spain",
"fullName": "Igor Santesteban",
"givenName": "Igor",
"surname": "Santesteban",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Rey Juan Carlos,Spain",
"fullName": "Miguel A. Otaduy",
"givenName": "Miguel A.",
"surname": "Otaduy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Rey Juan Carlos,Spain",
"fullName": "Dan Casas",
"givenName": "Dan",
"surname": "Casas",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "8130-8140",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1H1mT1TsvGE",
"name": "pcvpr202269460-09879054s1-mm_694600i130.zip",
"size": "13.6 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09879054s1-mm_694600i130.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "694600i121",
"articleId": "1H1ljfoapoY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600i141",
"articleId": "1H1mW0pifSM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdh/2014/4284/0/4284a192",
"title": "3D Virtual Garments Deformation Method Based on Size-Driven",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a192/12OmNwkR5vZ",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2014/4284/0/4284a299",
"title": "Semantic Segmentation and Labeling of 3D Garments",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a299/12OmNzaQozi",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2021/3176/0/09667070",
"title": "UV-based reconstruction of 3D garments from a single RGB image",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2021/09667070/1A6BtIpyi88",
"parentPublication": {
"id": "proceedings/fg/2021/3176/0",
"title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600e461",
"title": "GarSim: Particle Based Neural Garment Simulator",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600e461/1L6Lw7vXtMQ",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crc/2019/4620/0/462000a057",
"title": "Category Classification of Deformable Object using Hybrid Dynamic Model for Robotic Grasping",
"doi": null,
"abstractUrl": "/proceedings-article/crc/2019/462000a057/1iTuJHuBQDC",
"parentPublication": {
"id": "proceedings/crc/2019/4620/0",
"title": "2019 4th International Conference on Control, Robotics and Cybernetics (CRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2021/0191/0/019100b416",
"title": "DeepDraper: Fast and Accurate 3D Garment Draping over a 3D Human Body",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2021/019100b416/1yNirBDl984",
"parentPublication": {
"id": "proceedings/iccvw/2021/0191/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900l1758",
"title": "Self-Supervised Collision Handling via Generative 3D Garment Models for Virtual Try-On",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900l1758/1yeLegPnV2E",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2021/1298/0/129800a040",
"title": "A VR Application for the Virtual Fitting of Fashion Garments on Avatars",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a040/1yeQGzhOswM",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2021/1298/0",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800a879",
"title": "PhysXNet: A Customizable Approach for Learning Cloth Dynamics on Dressed People",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800a879/1zWE4tqeYHm",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800a373",
"title": "Deep Physics-aware Inference of Cloth Deformation for Monocular Human Performance Capture",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800a373/1zWEhX4bw76",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1yfxDjRGMmc",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"acronym": "ismar-adjunct",
"groupId": "1810084",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1yeQGzhOswM",
"doi": "10.1109/ISMAR-Adjunct54149.2021.00018",
"title": "A VR Application for the Virtual Fitting of Fashion Garments on Avatars",
"normalizedTitle": "A VR Application for the Virtual Fitting of Fashion Garments on Avatars",
"abstract": "In this paper, we present an interactive Virtual Reality (VR) application for fashion designers that aims to offer an immersive environment for accurately visualizing and testing garments in the design process. The VR environment simulates a designer’s fitting room, offering close up inspection of an avatar wearing a garment in a plethora of movements. This, in turn, offers to the designer a better perspective of how the final product will look, fit and behave. In implementing the proposed application, we first review the option in game engines and libraries to support a realistic avatargarment simulation, and propose a methodology for transforming the production-designed garments into a format that can be used in game engine cloth simulations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present an interactive Virtual Reality (VR) application for fashion designers that aims to offer an immersive environment for accurately visualizing and testing garments in the design process. The VR environment simulates a designer’s fitting room, offering close up inspection of an avatar wearing a garment in a plethora of movements. This, in turn, offers to the designer a better perspective of how the final product will look, fit and behave. In implementing the proposed application, we first review the option in game engines and libraries to support a realistic avatargarment simulation, and propose a methodology for transforming the production-designed garments into a format that can be used in game engine cloth simulations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present an interactive Virtual Reality (VR) application for fashion designers that aims to offer an immersive environment for accurately visualizing and testing garments in the design process. The VR environment simulates a designer’s fitting room, offering close up inspection of an avatar wearing a garment in a plethora of movements. This, in turn, offers to the designer a better perspective of how the final product will look, fit and behave. In implementing the proposed application, we first review the option in game engines and libraries to support a realistic avatargarment simulation, and propose a methodology for transforming the production-designed garments into a format that can be used in game engine cloth simulations.",
"fno": "129800a040",
"keywords": [
"Avatars",
"Clothing",
"Retail Data Processing",
"VR Application",
"Virtual Fitting",
"Fashion Garments",
"Interactive Virtual Reality Application",
"Fashion Designers",
"Immersive Environment",
"Garment",
"VR Environment",
"Game Engines",
"Production Designed Garments",
"Game Engine Cloth Simulations",
"Realistic Avatar Garment Simulation",
"Solid Modeling",
"Visualization",
"Computational Modeling",
"Avatars",
"Clothing",
"Fitting",
"Games",
"Human Centered Computing",
"Human Computer Interaction HCI",
"Interaction Paradigms",
"Virtual Reality"
],
"authors": [
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Orestis Sarakatsanos",
"givenName": "Orestis",
"surname": "Sarakatsanos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Elisavet Chatzilari",
"givenName": "Elisavet",
"surname": "Chatzilari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Spiros Nikolopoulos",
"givenName": "Spiros",
"surname": "Nikolopoulos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Ioannis Kompatsiaris",
"givenName": "Ioannis",
"surname": "Kompatsiaris",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Dongjoe Shin",
"givenName": "Dongjoe",
"surname": "Shin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "David Gavilan",
"givenName": "David",
"surname": "Gavilan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute CERTH,Greece",
"fullName": "Jim Downing",
"givenName": "Jim",
"surname": "Downing",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ismar-adjunct",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "40-45",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1298-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "129800a034",
"articleId": "1yeQTF80sH6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "129800a046",
"articleId": "1yeQMDuQA0g",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cw/2014/4677/0/4677a047",
"title": "Image-Based Virtual Fitting System with Garment Image Reshaping",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2014/4677a047/12OmNrAv3LL",
"parentPublication": {
"id": "proceedings/cw/2014/4677/0",
"title": "2014 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isccs/2011/4443/0/4443a178",
"title": "The 3D Digital Technology of Fashion Design",
"doi": null,
"abstractUrl": "/proceedings-article/isccs/2011/4443a178/12OmNyRPgAK",
"parentPublication": {
"id": "proceedings/isccs/2011/4443/0",
"title": "Computer Science and Society, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2014/4284/0/4284a299",
"title": "Semantic Segmentation and Labeling of 3D Garments",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2014/4284a299/12OmNzaQozi",
"parentPublication": {
"id": "proceedings/icdh/2014/4284/0",
"title": "2014 5th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07127019",
"title": "Styling Evolution for Tight-Fitting Garments",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07127019/13rRUxYIN4a",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2021/3176/0/09667070",
"title": "UV-based reconstruction of 3D garments from a single RGB image",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2021/09667070/1A6BtIpyi88",
"parentPublication": {
"id": "proceedings/fg/2021/3176/0",
"title": "2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scset/2022/7876/0/787600a204",
"title": "Research on Improving Garment Fit through CLO 3D Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/scset/2022/787600a204/1ANM2D8v5MA",
"parentPublication": {
"id": "proceedings/scset/2022/7876/0",
"title": "2022 International Seminar on Computer Science and Engineering Technology (SCSET)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200d304",
"title": "GarmentNets: Category-Level Pose Estimation for Garments via Canonical Space Shape Completion",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200d304/1BmILRj6ydO",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900c251",
"title": "CoRe: Color Regression for Multicolor Fashion Garments",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900c251/1G56OCTnopq",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600i130",
"title": "SNUG: Self-Supervised Neural Dynamic Garments",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600i130/1H1mT62lup2",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956089",
"title": "FitGAN: Fit- and Shape-Realistic Generative Adversarial Networks for Fashion",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956089/1IHqz3SBHIk",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1CJbEwHHqEg",
"title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1CJcxEyRQ64",
"doi": "10.1109/VR51125.2022.00106",
"title": "Redirecting Desktop Interface Input to Animate Cross-Reality Avatars",
"normalizedTitle": "Redirecting Desktop Interface Input to Animate Cross-Reality Avatars",
"abstract": "We present and evaluate methods to redirect desktop inputs such as eye gaze and mouse pointing to a VR-embedded avatar. We use these methods to build a novel interface that allows a desktop user to give presentations in remote VR meetings such as conferences or classrooms. Recent work on such VR meetings suggests a substantial number of users continue to use desktop interfaces due to ergonomic or technical factors. Our approach enables desk-top and immersed users to better share virtual worlds, by allowing desktop-based users to have more engaging or present \"cross-reality\" avatars. The described redirection methods consider mouse pointing and drawing for a presentation, eye-tracked gaze towards audience members, hand tracking for gesturing, and associated avatar motions such as head and torso movement. A study compared different levels of desktop avatar control and headset-based control. Study results suggest that users consider the enhanced desktop avatar to be human-like and lively and draw more attention than a conventionally animated desktop avatar, implying that our interface and methods could be useful for future cross-reality remote learning tools.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present and evaluate methods to redirect desktop inputs such as eye gaze and mouse pointing to a VR-embedded avatar. We use these methods to build a novel interface that allows a desktop user to give presentations in remote VR meetings such as conferences or classrooms. Recent work on such VR meetings suggests a substantial number of users continue to use desktop interfaces due to ergonomic or technical factors. Our approach enables desk-top and immersed users to better share virtual worlds, by allowing desktop-based users to have more engaging or present \"cross-reality\" avatars. The described redirection methods consider mouse pointing and drawing for a presentation, eye-tracked gaze towards audience members, hand tracking for gesturing, and associated avatar motions such as head and torso movement. A study compared different levels of desktop avatar control and headset-based control. Study results suggest that users consider the enhanced desktop avatar to be human-like and lively and draw more attention than a conventionally animated desktop avatar, implying that our interface and methods could be useful for future cross-reality remote learning tools.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present and evaluate methods to redirect desktop inputs such as eye gaze and mouse pointing to a VR-embedded avatar. We use these methods to build a novel interface that allows a desktop user to give presentations in remote VR meetings such as conferences or classrooms. Recent work on such VR meetings suggests a substantial number of users continue to use desktop interfaces due to ergonomic or technical factors. Our approach enables desk-top and immersed users to better share virtual worlds, by allowing desktop-based users to have more engaging or present \"cross-reality\" avatars. The described redirection methods consider mouse pointing and drawing for a presentation, eye-tracked gaze towards audience members, hand tracking for gesturing, and associated avatar motions such as head and torso movement. A study compared different levels of desktop avatar control and headset-based control. Study results suggest that users consider the enhanced desktop avatar to be human-like and lively and draw more attention than a conventionally animated desktop avatar, implying that our interface and methods could be useful for future cross-reality remote learning tools.",
"fno": "961700a843",
"keywords": [
"Avatars",
"Computer Aided Instruction",
"Computer Animation",
"Ergonomics",
"Human Computer Interaction",
"User Interfaces",
"Virtual Reality",
"Eye Gaze",
"Mouse",
"VR Embedded Avatar",
"Desktop User",
"Presentation",
"Remote VR Meetings",
"Substantial Number",
"Desktop Interfaces",
"Ergonomic Factors",
"Technical Factors",
"Share Virtual Worlds",
"Redirection Methods",
"Eye Tracked Gaze",
"Hand Tracking",
"Associated Avatar Motions",
"Torso Movement",
"Study Compared Different Levels",
"Desktop Avatar Control",
"Headset Based Control",
"Enhanced Desktop Avatar",
"Conventionally Animated Desktop Avatar",
"Future Cross Reality Remote Learning Tools",
"Desktop Interface Input",
"Animate Cross Reality Avatars",
"Desktop Inputs",
"Torso",
"Three Dimensional Displays",
"Tracking",
"Distance Learning",
"Avatars",
"Design Methodology",
"Ergonomics",
"Human Centered Computing",
"Human Computer Interaction HCI",
"Interaction Paradigms",
"Virtual Reality",
"Human Centered Computing",
"Interaction Design",
"Interaction Design Pro Cess And Methods",
"User Interface Design"
],
"authors": [
{
"affiliation": "CACS VR Lab University of Louisiana at Lafayette",
"fullName": "Jason W. Woodworth",
"givenName": "Jason W.",
"surname": "Woodworth",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CACS VR Lab University of Louisiana at Lafayette",
"fullName": "David Broussard",
"givenName": "David",
"surname": "Broussard",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CACS VR Lab University of Louisiana at Lafayette",
"fullName": "Christoph W. Borst",
"givenName": "Christoph W.",
"surname": "Borst",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-03-01T00:00:00",
"pubType": "proceedings",
"pages": "843-851",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9617-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1CJctBpgUyQ",
"name": "pvr202296170-09756781s1-mm_961700a843.zip",
"size": "147 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pvr202296170-09756781s1-mm_961700a843.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "961700a832",
"articleId": "1CJbR6qnKdW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "961700a853",
"articleId": "1CJc1joJpzG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dui/2009/3965/0/04811206",
"title": "The influence of input device characteristics on spatial perception in desktop-based 3D applications",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2009/04811206/12OmNC8dgiu",
"parentPublication": {
"id": "proceedings/3dui/2009/3965/0",
"title": "2009 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2017/6647/0/07892339",
"title": "Simulating anthropomorphic upper body actions in virtual reality using head and hand motion data",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892339/12OmNCmGO1G",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446229",
"title": "Any “Body” There? Avatar Visibility Effects in a Virtual Reality Game",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446229/13bd1fHrlRx",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/05/08648222",
"title": "The Virtual Caliper: Rapid Creation of Metrically Accurate Avatars from 3D Measurements",
"doi": null,
"abstractUrl": "/journal/tg/2019/05/08648222/17QjJf0qqr2",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a818",
"title": "Towards Controlling Whole Body Avatars with Partial Body-Tracking and Environmental Information",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a818/1CJeftFqI5W",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797789",
"title": "VR-Replay: Capturing and Replaying Avatars in VR for Asynchronous 3D Collaborative Design",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797789/1cJ0ZaKBbJS",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aivr/2020/7463/0/746300a060",
"title": "Photorealistic avatars to enhance the efficacy of Selfattachment psychotherapy",
"doi": null,
"abstractUrl": "/proceedings-article/aivr/2020/746300a060/1qpzCwDcDKM",
"parentPublication": {
"id": "proceedings/aivr/2020/7463/0",
"title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2021/4057/0/405700a284",
"title": "An Interface for Enhanced Teacher Awareness of Student Actions and Attention in a VR Classroom",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2021/405700a284/1tnXZIKSGAM",
"parentPublication": {
"id": "proceedings/vrw/2021/4057/0",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2021/0158/0/015800a050",
"title": "The Effects of Virtual Avatar Visibility on Pointing Interpretation by Observers in 3D Environments",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2021/015800a050/1yeDa4aaGY0",
"parentPublication": {
"id": "proceedings/ismar/2021/0158/0",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2021/1298/0/129800a139",
"title": "VR Collaboration in Large Companies: An Interview Study on the Role of Avatars",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a139/1yeQK6CDe3C",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2021/1298/0",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1tnWwqMuCzu",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"acronym": "vrw",
"groupId": "1836626",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1tnXsX6EMBa",
"doi": "10.1109/VRW52623.2021.00240",
"title": "[DC] Privacy in VR: Empowering Users with Emotional Privacy from Verbal and Non-verbal Behavior of Their Avatars",
"normalizedTitle": "[DC] Privacy in VR: Empowering Users with Emotional Privacy from Verbal and Non-verbal Behavior of Their Avatars",
"abstract": "The next paradigm for social and collaborative VR applications is heavily based on the real time behavior of tracked avatars for rich communication. Industry giants are actively focusing on producing photo-realistic avatars with facial and body movement tracking of real time captured verbal and non-verbal cues. This enables applications to convey the user’s actual emotive expressions and behaviors through a virtual avatar, enabling the exchange of rich communication. However, the capability exposes individualized patterns of users without providing any opportunity to filter out undesired tracking before expressing them in front of a crowd, and thus can expose privacy problems. In order to address the trade-off between rich communication and privacy in VR, my PhD dissertation is focusing on providing rich user behaviors using verbal and non-verbal cues through VR avatars, while also providing a protective layer to eliminate unwanted or unneeded leaking of emotions or movements, and thus providing a more-trusted collaborative VR experience.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The next paradigm for social and collaborative VR applications is heavily based on the real time behavior of tracked avatars for rich communication. Industry giants are actively focusing on producing photo-realistic avatars with facial and body movement tracking of real time captured verbal and non-verbal cues. This enables applications to convey the user’s actual emotive expressions and behaviors through a virtual avatar, enabling the exchange of rich communication. However, the capability exposes individualized patterns of users without providing any opportunity to filter out undesired tracking before expressing them in front of a crowd, and thus can expose privacy problems. In order to address the trade-off between rich communication and privacy in VR, my PhD dissertation is focusing on providing rich user behaviors using verbal and non-verbal cues through VR avatars, while also providing a protective layer to eliminate unwanted or unneeded leaking of emotions or movements, and thus providing a more-trusted collaborative VR experience.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The next paradigm for social and collaborative VR applications is heavily based on the real time behavior of tracked avatars for rich communication. Industry giants are actively focusing on producing photo-realistic avatars with facial and body movement tracking of real time captured verbal and non-verbal cues. This enables applications to convey the user’s actual emotive expressions and behaviors through a virtual avatar, enabling the exchange of rich communication. However, the capability exposes individualized patterns of users without providing any opportunity to filter out undesired tracking before expressing them in front of a crowd, and thus can expose privacy problems. In order to address the trade-off between rich communication and privacy in VR, my PhD dissertation is focusing on providing rich user behaviors using verbal and non-verbal cues through VR avatars, while also providing a protective layer to eliminate unwanted or unneeded leaking of emotions or movements, and thus providing a more-trusted collaborative VR experience.",
"fno": "405700a715",
"keywords": [
"Avatars",
"Data Privacy",
"Emotion Recognition",
"Groupware",
"Virtual Reality",
"Industry Giants",
"Photo Realistic Avatars",
"Facial Body Movement Tracking",
"Nonverbal Cues",
"Virtual Avatar",
"Rich Communication",
"Undesired Tracking",
"Privacy Problems",
"Rich User",
"VR Avatars",
"Collaborative VR Experience",
"DC Privacy",
"Emotional Privacy",
"Social VR Applications",
"Collaborative VR Applications",
"Time Behavior",
"Tracked Avatars",
"Privacy",
"Solid Modeling",
"Emotion Recognition",
"Tracking",
"Avatars",
"Computational Modeling",
"Conferences",
"Human Centered Computing",
"Human Computer Interaction HCI",
"Virtual Reality",
"Behavior Tracked Avatar Embodiment Facial Emotion Privacy"
],
"authors": [
{
"affiliation": "University of Canterbury,HIT Lab NZ,Christchurch,New Zealand",
"fullName": "Dilshani Kumarapeli",
"givenName": "Dilshani",
"surname": "Kumarapeli",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vrw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-03-01T00:00:00",
"pubType": "proceedings",
"pages": "715-716",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4057-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "405700a713",
"articleId": "1tnX59fALbG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "405700a717",
"articleId": "1tnXrUsEHYc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2017/6647/0/07892339",
"title": "Simulating anthropomorphic upper body actions in virtual reality using head and hand motion data",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892339/12OmNCmGO1G",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2017/6647/0/07892240",
"title": "Rapid one-shot acquisition of dynamic VR avatars",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892240/12OmNwGZNLp",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2017/6647/0/07892372",
"title": "Demonstration: Rapid one-shot acquisition of dynamic VR avatars",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892372/12OmNz2C1zq",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118232",
"title": "The Effects of Avatars, Stereo Vision and Display Size on Reaching and Motion Reproduction",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118232/13rRUwdIOUQ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a338",
"title": "Behaviour Privacy: Non-verbal Threats in Avatar-based VR Systems",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a338/1CJdHyNSlOM",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a856",
"title": "Creating 3D Personal Avatars with High Quality Facial Expressions for Telecommunication and Telepresence",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a856/1CJezdpzDMI",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797789",
"title": "VR-Replay: Capturing and Replaying Avatars in VR for Asynchronous 3D Collaborative Design",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797789/1cJ0ZaKBbJS",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089518",
"title": "SPA: Verbal Interactions between Agents and Avatars in Shared Virtual Environments using Propositional Planning",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089518/1jIxcUvDJBu",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aivr/2020/7463/0/746300a068",
"title": "Verbal Mimicry Predicts Social Distance and Social Attraction to an Outgroup Member in Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/aivr/2020/746300a068/1qpzC44fheg",
"parentPublication": {
"id": "proceedings/aivr/2020/7463/0",
"title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900n3054",
"title": "High-fidelity Face Tracking for AR/VR via Deep Lighting Adaptation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900n3054/1yeJQDZEydy",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwMXnuX",
"title": "2009 IEEE Symposium on 3D User Interfaces",
"acronym": "3dui",
"groupId": "1001623",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBAqZFl",
"doi": "10.1109/3DUI.2009.4811204",
"title": "Effects of tracking technology, latency, and spatial jitter on object movement",
"normalizedTitle": "Effects of tracking technology, latency, and spatial jitter on object movement",
"abstract": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and 3D object movement tasks. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used as a baseline comparison. We then present an experiment based on ISO 9241-9, which measures performance characteristics of pointing devices. We artificially introduce latency and jitter to the mouse and compared the results to the 3D tracker. Results indicate that latency has a much stronger effect on human performance than low amounts of spatial jitter. In a second study, we use a subset of conditions from the first to test latency and jitter on 3D object movement. The results indicate that large, uncharacterized jitter “spikes” significantly impact 3D performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and 3D object movement tasks. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used as a baseline comparison. We then present an experiment based on ISO 9241-9, which measures performance characteristics of pointing devices. We artificially introduce latency and jitter to the mouse and compared the results to the 3D tracker. Results indicate that latency has a much stronger effect on human performance than low amounts of spatial jitter. In a second study, we use a subset of conditions from the first to test latency and jitter on 3D object movement. The results indicate that large, uncharacterized jitter “spikes” significantly impact 3D performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and 3D object movement tasks. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used as a baseline comparison. We then present an experiment based on ISO 9241-9, which measures performance characteristics of pointing devices. We artificially introduce latency and jitter to the mouse and compared the results to the 3D tracker. Results indicate that latency has a much stronger effect on human performance than low amounts of spatial jitter. In a second study, we use a subset of conditions from the first to test latency and jitter on 3D object movement. The results indicate that large, uncharacterized jitter “spikes” significantly impact 3D performance.",
"fno": "04811204",
"keywords": [],
"authors": [
{
"affiliation": "Department of Computer Science&Engineering, York University, Toronto, Ontario, Canada",
"fullName": "Robert J. Teather",
"givenName": "Robert J.",
"surname": "Teather",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science&Engineering, York University, Toronto, Ontario, Canada",
"fullName": "Andriy Pavlovych",
"givenName": "Andriy",
"surname": "Pavlovych",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science&Engineering, York University, Toronto, Ontario, Canada",
"fullName": "Wolfgang Stuerzlinger",
"givenName": "Wolfgang",
"surname": "Stuerzlinger",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science&Engineering, York University, Toronto, Ontario, Canada",
"fullName": "I. Scott MacKenzie",
"givenName": "I. Scott",
"surname": "MacKenzie",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dui",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-03-01T00:00:00",
"pubType": "proceedings",
"pages": "43-50",
"year": "2009",
"issn": null,
"isbn": "978-1-4244-3965-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04811217",
"articleId": "12OmNvo67BD",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04811205",
"articleId": "12OmNAio6Ze",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2009/3943/0/04811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811029/12OmNBqv2g2",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2012/1204/0/06184214",
"title": "Poster: Investigating one-eyed and stereo cursors for 3D pointing tasks",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2012/06184214/12OmNC8dggJ",
"parentPublication": {
"id": "proceedings/3dui/2012/1204/0",
"title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2008/2047/0/04476590",
"title": "Assessing the Effects of Orientation and Device on (Constrained) 3D Movement Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2008/04476590/12OmNrAv40k",
"parentPublication": {
"id": "proceedings/3dui/2008/2047/0",
"title": "2008 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itc/2003/2063/0/20630058",
"title": "Effects of Deterministic Jitter in a Cable on Jitter Tolerance Measurements",
"doi": null,
"abstractUrl": "/proceedings-article/itc/2003/20630058/12OmNvSbBIA",
"parentPublication": {
"id": "proceedings/itc/2003/2063/0",
"title": "International Test Conference, 2003. Proceedings. ITC 2003.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446195",
"title": "Effects of Latency Jitter on Simulator Sickness in a Search Task",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446195/13bd1AIBM29",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07127051",
"title": "The Effects of Low Latency on Pointing and Steering Tasks",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07127051/13rRUxOdD2I",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a310",
"title": "My Eyes Hurt: Effects of Jitter in 3D Gaze Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a310/1CJdbzCNHUc",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798038",
"title": "Effects of 3D Rotational Jitter and Selection Methods on 3D Pointing Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798038/1cJ1eVQaSKQ",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089661",
"title": "Simultaneous Run-Time Measurement of Motion-to-Photon Latency and Latency Jitter",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089661/1jIxfrGAC8o",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/searis/2017/6274/0/09183433",
"title": "A Latency and Latency Jitter Simulation Framework with OSVR",
"doi": null,
"abstractUrl": "/proceedings-article/searis/2017/09183433/1mLMmvps0rC",
"parentPublication": {
"id": "proceedings/searis/2017/6274/0",
"title": "2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNASrawz",
"title": "2009 IEEE Virtual Reality Conference",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBqv2g2",
"doi": "10.1109/VR.2009.4811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"normalizedTitle": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"abstract": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and a 3D movement. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used for baseline comparison. We present an experiment based on ISO 9241-9, which measures performance of pointing devices. We added latency and jitter to the mouse and compared it to a 3D tracker. Results indicate that latency has a stronger effect on performance than small spatial jitter. A second experiment found that erratic jitter \"spikes\" can affect 3D movement performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and a 3D movement. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used for baseline comparison. We present an experiment based on ISO 9241-9, which measures performance of pointing devices. We added latency and jitter to the mouse and compared it to a 3D tracker. Results indicate that latency has a stronger effect on performance than small spatial jitter. A second experiment found that erratic jitter \"spikes\" can affect 3D movement performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We investigate the effects of input device latency and spatial jitter on 2D pointing tasks and a 3D movement. First, we characterize jitter and latency in a 3D tracking device and an optical mouse used for baseline comparison. We present an experiment based on ISO 9241-9, which measures performance of pointing devices. We added latency and jitter to the mouse and compared it to a 3D tracker. Results indicate that latency has a stronger effect on performance than small spatial jitter. A second experiment found that erratic jitter \"spikes\" can affect 3D movement performance.",
"fno": "04811029",
"keywords": [
"Jitter",
"Mouse Controllers Computers",
"Spatial Jitter",
"3 D Pointing",
"2 D Pointing",
"Input Device Latency",
"3 D Tracking Device",
"Optical Mouse",
"ISO 9241 9",
"Erratic Jitter",
"Pointing Devices",
"Delay",
"Jitter",
"Mice",
"ISO Standards",
"Virtual Reality",
"Optical Sensors",
"Optical Devices",
"Displays",
"Target Tracking",
"Multimedia Systems",
"Latency",
"Jitter",
"Fitts Law",
"3 D Manipulation",
"H 5 1 Information Interfaces And Presentation Multimedia Information Systems Virtual Reality"
],
"authors": [
{
"affiliation": "York University, Toronto, Canada 4700 Keele Street, Toronto, ON M3J 1P3, Canada rteather@cse.yorku.ca",
"fullName": "Robert J. Teather",
"givenName": "Robert J.",
"surname": "Teather",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "York University, Toronto, Canada 4700 Keele Street, Toronto, ON M3J 1P3, Canada andriyp@cse.yorku.ca",
"fullName": "Andriy Pavlovych",
"givenName": "Andriy",
"surname": "Pavlovych",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "York University, Toronto, Canada 4700 Keele Street, Toronto, ON M3J 1P3, Canada wolfgang@cse.yorku.ca",
"fullName": "Wolfgang Stuerzlinger",
"givenName": "Wolfgang",
"surname": "Stuerzlinger",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-03-01T00:00:00",
"pubType": "proceedings",
"pages": "229-230",
"year": "2009",
"issn": "1087-8270",
"isbn": "978-1-4244-3943-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04811026",
"articleId": "12OmNyLiuq3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04811020",
"articleId": "12OmNxHrymk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dui/2009/3965/0/04811204",
"title": "Effects of tracking technology, latency, and spatial jitter on object movement",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2009/04811204/12OmNBAqZFl",
"parentPublication": {
"id": "proceedings/3dui/2009/3965/0",
"title": "2009 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2012/1204/0/06184214",
"title": "Poster: Investigating one-eyed and stereo cursors for 3D pointing tasks",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2012/06184214/12OmNC8dggJ",
"parentPublication": {
"id": "proceedings/3dui/2012/1204/0",
"title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607621",
"title": "Investigation and evaluation of pointing modalities for interactive stereoscopic 3D TV",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607621/12OmNzUgdi1",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2008/2153/0/04813448",
"title": "Real-time 3D pointing gesture recognition in mobile space",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2008/04813448/12OmNzahc3t",
"parentPublication": {
"id": "proceedings/fg/2008/2153/0",
"title": "2008 8th IEEE International Conference on Automatic Face & Gesture Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446195",
"title": "Effects of Latency Jitter on Simulator Sickness in a Search Task",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446195/13bd1AIBM29",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08447552",
"title": "Pointing at Wiggle 3D Displays",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08447552/13bd1tl2oml",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07127051",
"title": "The Effects of Low Latency on Pointing and Steering Tasks",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07127051/13rRUxOdD2I",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798038",
"title": "Effects of 3D Rotational Jitter and Selection Methods on 3D Pointing Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798038/1cJ1eVQaSKQ",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089661",
"title": "Simultaneous Run-Time Measurement of Motion-to-Photon Latency and Latency Jitter",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089661/1jIxfrGAC8o",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/searis/2017/6274/0/09183433",
"title": "A Latency and Latency Jitter Simulation Framework with OSVR",
"doi": null,
"abstractUrl": "/proceedings-article/searis/2017/09183433/1mLMmvps0rC",
"parentPublication": {
"id": "proceedings/searis/2017/6274/0",
"title": "2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzuIjed",
"title": "Computer Science and Software Engineering, International Conference on",
"acronym": "csse",
"groupId": "1002553",
"volume": "2",
"displayVolume": "2",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCzb9xe",
"doi": "10.1109/CSSE.2008.1310",
"title": "Effect of Start Position on Human Performance in Steering Tasks",
"normalizedTitle": "Effect of Start Position on Human Performance in Steering Tasks",
"abstract": "The steering law has been a robust and powerful model for studying steering tasks in human-computer interaction. This paper investigated the effect of four kinds of start position (left, right, top and bottom) on human performance in straight and circular steering tasks respectively. Experimental results showed that the steering law still held for all of the four start positions for both straight and circular steering tasks. No statistically significant differences of the user performance, such as MT (Movement Time), SD (Standard Deviation), and OPM (Out of Path Movement) were observed among the four start positions in the circular steering task. However, there was significant difference of the value of SD among the four start positions in the straight steering task. Vertical steering resulted in more SD than horizontal steering. These results will be useful for further research and experiment design.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The steering law has been a robust and powerful model for studying steering tasks in human-computer interaction. This paper investigated the effect of four kinds of start position (left, right, top and bottom) on human performance in straight and circular steering tasks respectively. Experimental results showed that the steering law still held for all of the four start positions for both straight and circular steering tasks. No statistically significant differences of the user performance, such as MT (Movement Time), SD (Standard Deviation), and OPM (Out of Path Movement) were observed among the four start positions in the circular steering task. However, there was significant difference of the value of SD among the four start positions in the straight steering task. Vertical steering resulted in more SD than horizontal steering. These results will be useful for further research and experiment design.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The steering law has been a robust and powerful model for studying steering tasks in human-computer interaction. This paper investigated the effect of four kinds of start position (left, right, top and bottom) on human performance in straight and circular steering tasks respectively. Experimental results showed that the steering law still held for all of the four start positions for both straight and circular steering tasks. No statistically significant differences of the user performance, such as MT (Movement Time), SD (Standard Deviation), and OPM (Out of Path Movement) were observed among the four start positions in the circular steering task. However, there was significant difference of the value of SD among the four start positions in the straight steering task. Vertical steering resulted in more SD than horizontal steering. These results will be useful for further research and experiment design.",
"fno": "3336d098",
"keywords": [
"Start Position",
"Steering Task",
"Steering Law",
"Human Performance"
],
"authors": [
{
"affiliation": null,
"fullName": "Xiaolei Zhou",
"givenName": "Xiaolei",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiangshi Ren",
"givenName": "Xiangshi",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yue Hui",
"givenName": "Yue",
"surname": "Hui",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "csse",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1098-1101",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3336-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3336d094",
"articleId": "12OmNwF0BXv",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3336d102",
"articleId": "12OmNAKcNLo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmtma/2009/3583/2/3583b355",
"title": "Simulation on Steering Stability of 4WS Tractor Semi-trailer",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583b355/12OmNAWpyom",
"parentPublication": {
"id": "proceedings/icmtma/2009/3583/2",
"title": "2009 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccie/2010/4026/2/4026b175",
"title": "Compare the Starting Methods of the Position-Sensorless BLDC Motor",
"doi": null,
"abstractUrl": "/proceedings-article/ccie/2010/4026b175/12OmNvAAtvX",
"parentPublication": {
"id": "proceedings/ccie/2010/4026/2",
"title": "Computing, Control and Industrial Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnisc/2016/8838/0/07946011",
"title": "An Empirical Study of Operational Bias in Steering Tasks for Different User Groups",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2016/07946011/12OmNvC0sXg",
"parentPublication": {
"id": "proceedings/icnisc/2016/8838/0",
"title": "2016 International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2011/0039/0/05759416",
"title": "Modeling object pursuit for 3D interactive tasks in virtual reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2011/05759416/12OmNwGIczK",
"parentPublication": {
"id": "proceedings/vr/2011/0039/0",
"title": "2011 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2011/0039/0/05759443",
"title": "Comparing steering-based travel techniques for search tasks in a CAVE",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2011/05759443/12OmNwI8cc6",
"parentPublication": {
"id": "proceedings/vr/2011/0039/0",
"title": "2011 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2010/6846/0/05444724",
"title": "Revisiting path steering for 3D manipulation tasks",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2010/05444724/12OmNxAlzYX",
"parentPublication": {
"id": "proceedings/3dui/2010/6846/0",
"title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icinis/2013/2809/0/2809a070",
"title": "Age-Related Performance Assessment in Steering Tasks by Different Instruction Sets",
"doi": null,
"abstractUrl": "/proceedings-article/icinis/2013/2809a070/12OmNxEBz8l",
"parentPublication": {
"id": "proceedings/icinis/2013/2809/0",
"title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisis/2009/3575/0/3575a144",
"title": "Decision Model for a Robot to Start Communicating with a Human",
"doi": null,
"abstractUrl": "/proceedings-article/cisis/2009/3575a144/12OmNxWLThC",
"parentPublication": {
"id": "proceedings/cisis/2009/3575/0",
"title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2003/1882/0/18820149",
"title": "Human Movement Performance in Relation to Path Constraint - The Law of Steering in Locomotion",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2003/18820149/12OmNxeM469",
"parentPublication": {
"id": "proceedings/vr/2003/1882/0",
"title": "Proceedings IEEE Virtual Reality 2003",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcmeim/2021/2172/0/217200a297",
"title": "The AGV Guidance of Giant Grinding-polishing Coalescence Robot by Machine Vision and Ackermann Steering System Design",
"doi": null,
"abstractUrl": "/proceedings-article/wcmeim/2021/217200a297/1ANLxY23qGA",
"parentPublication": {
"id": "proceedings/wcmeim/2021/2172/0",
"title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzgeLGe",
"title": "2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)",
"acronym": "peccs",
"groupId": "1810007",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvqEvMR",
"doi": "",
"title": "The Leap Motion movement for 2D pointing tasks: Characterisation and comparison to other devices",
"normalizedTitle": "The Leap Motion movement for 2D pointing tasks: Characterisation and comparison to other devices",
"abstract": "In this paper we present the results from an experiment designed to characterize the Leap Motion movement in 2D pointing tasks and compare it to a mouse and touchpad. We used the ISO 9241-9 multi-directional tapping test for comparing the devices, and we analyse the results using standard throughput and error rate measures as well as additional accuracy measures such as target re-entry, task axis crossing, movement direction change, orthogonal direction change, movement variability, movement offset, and movement error. We also present the results from the ISO 9241-9 assessment of comfort questionnaire, and our observations from the participant's postures when using the Leap Motion device. Results indicate that the Leap Motion performs poorly in these tasks when compared to a mouse or touchpad.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper we present the results from an experiment designed to characterize the Leap Motion movement in 2D pointing tasks and compare it to a mouse and touchpad. We used the ISO 9241-9 multi-directional tapping test for comparing the devices, and we analyse the results using standard throughput and error rate measures as well as additional accuracy measures such as target re-entry, task axis crossing, movement direction change, orthogonal direction change, movement variability, movement offset, and movement error. We also present the results from the ISO 9241-9 assessment of comfort questionnaire, and our observations from the participant's postures when using the Leap Motion device. Results indicate that the Leap Motion performs poorly in these tasks when compared to a mouse or touchpad.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper we present the results from an experiment designed to characterize the Leap Motion movement in 2D pointing tasks and compare it to a mouse and touchpad. We used the ISO 9241-9 multi-directional tapping test for comparing the devices, and we analyse the results using standard throughput and error rate measures as well as additional accuracy measures such as target re-entry, task axis crossing, movement direction change, orthogonal direction change, movement variability, movement offset, and movement error. We also present the results from the ISO 9241-9 assessment of comfort questionnaire, and our observations from the participant's postures when using the Leap Motion device. Results indicate that the Leap Motion performs poorly in these tasks when compared to a mouse or touchpad.",
"fno": "07483727",
"keywords": [
"Performance Measurement",
"Interaction Device",
"Leap Motion",
"HCI",
"Pointing Devices",
"Performance Evaluation",
"Selection Tasks"
],
"authors": [
{
"affiliation": "CITAR/School of Arts, Portuguese Catholic University, Porto, Portugal",
"fullName": "Manuel César Bessa Seixas",
"givenName": "Manuel César",
"surname": "Bessa Seixas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CITAR/School of Arts, Portuguese Catholic University, Porto, Portugal",
"fullName": "Jorge C. S. Cardoso",
"givenName": "Jorge C. S.",
"surname": "Cardoso",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "INESC TEC/FEUP, University of Porto, Porto, Portugal",
"fullName": "Maria Teresa Galvâo Dias",
"givenName": "Maria Teresa Galvâo",
"surname": "Dias",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "peccs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-02-01T00:00:00",
"pubType": "proceedings",
"pages": "15-24",
"year": "2015",
"issn": null,
"isbn": "978-989-758-137-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07483726",
"articleId": "12OmNyNQSLo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07483728",
"articleId": "12OmNqIzgXK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dui/2009/3965/0/04811204",
"title": "Effects of tracking technology, latency, and spatial jitter on object movement",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2009/04811204/12OmNBAqZFl",
"parentPublication": {
"id": "proceedings/3dui/2009/3965/0",
"title": "2009 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2009/3943/0/04811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811029/12OmNBqv2g2",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iswc/2006/0597/0/04067722",
"title": "Evaluation of Four Wearable Computer Pointing Devices for Drag and Drop Tasks when Stationary and Walking",
"doi": null,
"abstractUrl": "/proceedings-article/iswc/2006/04067722/12OmNCxtyNw",
"parentPublication": {
"id": "proceedings/iswc/2006/0597/0",
"title": "2006 10th IEEE International Symposium on Wearable Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2008/2047/0/04476590",
"title": "Assessing the Effects of Orientation and Device on (Constrained) 3D Movement Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2008/04476590/12OmNrAv40k",
"parentPublication": {
"id": "proceedings/3dui/2008/2047/0",
"title": "2008 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icstw/2018/6352/0/635201a204",
"title": "Modelling Hand Gestures to Test Leap Motion Controlled Applications",
"doi": null,
"abstractUrl": "/proceedings-article/icstw/2018/635201a204/12OmNwfb6Tk",
"parentPublication": {
"id": "proceedings/icstw/2018/6352/0",
"title": "2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2011/0063/0/05759222",
"title": "Pointing at 3D targets in a stereo head-tracked virtual environment",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2011/05759222/12OmNx5piPD",
"parentPublication": {
"id": "proceedings/3dui/2011/0063/0",
"title": "2011 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2017/3588/0/3588a341",
"title": "Evaluate Leap Motion Control for Multiple Hand Posture Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2017/3588a341/12OmNyrIaAc",
"parentPublication": {
"id": "proceedings/svr/2017/3588/0",
"title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2014/3624/0/06798866",
"title": "Poster: Exploring the integrality and separability of the Leap Motion Controller for direct manipulation 3D interaction",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2014/06798866/12OmNyvoXhi",
"parentPublication": {
"id": "proceedings/3dui/2014/3624/0",
"title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2016/0806/0/07550836",
"title": "Digital scrum board using leap motion",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2016/07550836/12OmNywfKz1",
"parentPublication": {
"id": "proceedings/icis/2016/0806/0",
"title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607621",
"title": "Investigation and evaluation of pointing modalities for interactive stereoscopic 3D TV",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607621/12OmNzUgdi1",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAsTgX7",
"title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)",
"acronym": "3dui",
"groupId": "1001623",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxAlzYX",
"doi": "10.1109/3DUI.2010.5444724",
"title": "Revisiting path steering for 3D manipulation tasks",
"normalizedTitle": "Revisiting path steering for 3D manipulation tasks",
"abstract": "The law of path steering, as proposed by Accot and Zhai, describes a quantitative relationship between human temporal performance and the path's spatial characteristics. The steering law is formulated as a continuous goal crossing task, in which a large number of goals are crossed along the path. The steering law has been verified empirically for locomotion, in which a virtual driving task through straight and circular paths was performed. We revisit the path steering law for manipulation tasks in desktop virtual environments. We have conducted controlled experiments in which users operate a pen input device to steer a virtual ball through paths of varying length, width, curvature and orientation. Our results indicate that, although the steering law provides a good description of overall task time as a function of index of difficulty ID = L/W, where L and W are the path length and width, it does not account for other relevant factors. We specifically show that the influence of curvature can be modeled by a percentage increase in steering time, independent of index of difficulty. The path orientation relative to the viewing direction has a more complex effect on the steering law, which is moreover for instance asymmetric, i.e. it differs when moving to the left or right. A detailed analysis of our results indicates that a 3D steering movement can probably not be modeled as a sequence of individual goal crossing subtasks. Rather, we can postulate that the overall steering task is likely better described as a sequence of smaller movements that are closer to ballistic movements. One argument for this is that we established that the time for subtrials with continuous steering is related to ID by a power law, with an exponent in the range 0.5-0.6, rather than being equal to 1 as required by the steering law.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The law of path steering, as proposed by Accot and Zhai, describes a quantitative relationship between human temporal performance and the path's spatial characteristics. The steering law is formulated as a continuous goal crossing task, in which a large number of goals are crossed along the path. The steering law has been verified empirically for locomotion, in which a virtual driving task through straight and circular paths was performed. We revisit the path steering law for manipulation tasks in desktop virtual environments. We have conducted controlled experiments in which users operate a pen input device to steer a virtual ball through paths of varying length, width, curvature and orientation. Our results indicate that, although the steering law provides a good description of overall task time as a function of index of difficulty ID = L/W, where L and W are the path length and width, it does not account for other relevant factors. We specifically show that the influence of curvature can be modeled by a percentage increase in steering time, independent of index of difficulty. The path orientation relative to the viewing direction has a more complex effect on the steering law, which is moreover for instance asymmetric, i.e. it differs when moving to the left or right. A detailed analysis of our results indicates that a 3D steering movement can probably not be modeled as a sequence of individual goal crossing subtasks. Rather, we can postulate that the overall steering task is likely better described as a sequence of smaller movements that are closer to ballistic movements. One argument for this is that we established that the time for subtrials with continuous steering is related to ID by a power law, with an exponent in the range 0.5-0.6, rather than being equal to 1 as required by the steering law.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The law of path steering, as proposed by Accot and Zhai, describes a quantitative relationship between human temporal performance and the path's spatial characteristics. The steering law is formulated as a continuous goal crossing task, in which a large number of goals are crossed along the path. The steering law has been verified empirically for locomotion, in which a virtual driving task through straight and circular paths was performed. We revisit the path steering law for manipulation tasks in desktop virtual environments. We have conducted controlled experiments in which users operate a pen input device to steer a virtual ball through paths of varying length, width, curvature and orientation. Our results indicate that, although the steering law provides a good description of overall task time as a function of index of difficulty ID = L/W, where L and W are the path length and width, it does not account for other relevant factors. We specifically show that the influence of curvature can be modeled by a percentage increase in steering time, independent of index of difficulty. The path orientation relative to the viewing direction has a more complex effect on the steering law, which is moreover for instance asymmetric, i.e. it differs when moving to the left or right. A detailed analysis of our results indicates that a 3D steering movement can probably not be modeled as a sequence of individual goal crossing subtasks. Rather, we can postulate that the overall steering task is likely better described as a sequence of smaller movements that are closer to ballistic movements. One argument for this is that we established that the time for subtrials with continuous steering is related to ID by a power law, with an exponent in the range 0.5-0.6, rather than being equal to 1 as required by the steering law.",
"fno": "05444724",
"keywords": [
"Desktop Virtual Environment",
"Path Steering Law",
"3 D Manipulation Task",
"Human Temporal Performance",
"Spatial Characteristic",
"Continuous Goal Crossing Task",
"Locomotion",
"Virtual Driving Task"
],
"authors": [
{
"affiliation": "CWI, Amsterdam, Netherlands",
"fullName": "Lei Liu",
"givenName": null,
"surname": "Lei Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Eindhoven Univ. of Technol., Eindhoven, Netherlands",
"fullName": "Jean-Bernard Martens",
"givenName": "Jean-Bernard",
"surname": "Martens",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "CWI, Amsterdam, Netherlands",
"fullName": "Robert van Liere",
"givenName": "Robert",
"surname": "van Liere",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dui",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-03-01T00:00:00",
"pubType": "proceedings",
"pages": "39-46",
"year": "2010",
"issn": null,
"isbn": "978-1-4244-6846-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05444723",
"articleId": "12OmNyL0TAN",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05444721",
"articleId": "12OmNCdBDQK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csse/2008/3336/2/3336d098",
"title": "Effect of Start Position on Human Performance in Steering Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336d098/12OmNCzb9xe",
"parentPublication": {
"id": "proceedings/csse/2008/3336/6",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/1/3357a869",
"title": "Control of Four-Wheel-Steering Vehicle Using GA Fuzzy Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357a869/12OmNvFHfEi",
"parentPublication": {
"id": "proceedings/icicta/2008/3357/1",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2011/0039/0/05759416",
"title": "Modeling object pursuit for 3D interactive tasks in virtual reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2011/05759416/12OmNwGIczK",
"parentPublication": {
"id": "proceedings/vr/2011/0039/0",
"title": "2011 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/3/4077e505",
"title": "Study on Dynamics Simulation for Vehicle Steering Maneuverability",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077e505/12OmNxFaLia",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2003/1882/0/18820149",
"title": "Human Movement Performance in Relation to Path Constraint - The Law of Steering in Locomotion",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2003/18820149/12OmNxeM469",
"parentPublication": {
"id": "proceedings/vr/2003/1882/0",
"title": "Proceedings IEEE Virtual Reality 2003",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdma/2012/4772/0/4772a851",
"title": "Study on the Initial State of Pedestrian in Accident Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/icdma/2012/4772a851/12OmNyxXlkL",
"parentPublication": {
"id": "proceedings/icdma/2012/4772/0",
"title": "2012 Third International Conference on Digital Manufacturing & Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2000/6478/0/64780011",
"title": "A Computational Steering System for Studying Microwave Interactions with Space-Borne Bodies",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2000/64780011/12OmNzayNr8",
"parentPublication": {
"id": "proceedings/ieee-vis/2000/6478/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/07/06143941",
"title": "Modeling Object Pursuit for Desktop Virtual Reality",
"doi": null,
"abstractUrl": "/journal/tg/2012/07/06143941/13rRUwjGoFY",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcmeim/2021/2172/0/217200a093",
"title": "Technical Characteristics Analysis of Automotive Electronic Steering System",
"doi": null,
"abstractUrl": "/proceedings-article/wcmeim/2021/217200a093/1ANLDDqBFao",
"parentPublication": {
"id": "proceedings/wcmeim/2021/2172/0",
"title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2019/05/08735919",
"title": "BEAMES: Interactive Multimodel Steering, Selection, and Inspection for Regression Tasks",
"doi": null,
"abstractUrl": "/magazine/cg/2019/05/08735919/1aNOrENWwXS",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrkjVbR",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzUgdi1",
"doi": "10.1109/ICME.2013.6607621",
"title": "Investigation and evaluation of pointing modalities for interactive stereoscopic 3D TV",
"normalizedTitle": "Investigation and evaluation of pointing modalities for interactive stereoscopic 3D TV",
"abstract": "The recent proliferation of stereoscopic three dimensional (3D) video technology has fostered a large body of research into 3D video capture, production, compression and delivery. However, little research has been dedicated to the design practices of stereoscopic 3D video interaction. Interaction tasks such as pointing and selection are critical to the consumer's experience of the 3D video technology. This paper presents investigation of pointing modalities in the context of stereoscopic 3D television (TV). Adopting the ISO 9241-9 standard for multi-directional tapping task, the conducted user study compares and evaluates three pointing modalities: standard mouse-based interaction, virtual laser pointer implemented using Wiimote, and hand movement modality using Kinect. The results suggest that the virtual laser pointer modality is more advantageous than other modalities in terms of user performance and user comfort. In addition, this paper discusses the impact of disparity levels on the pointing tasks.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The recent proliferation of stereoscopic three dimensional (3D) video technology has fostered a large body of research into 3D video capture, production, compression and delivery. However, little research has been dedicated to the design practices of stereoscopic 3D video interaction. Interaction tasks such as pointing and selection are critical to the consumer's experience of the 3D video technology. This paper presents investigation of pointing modalities in the context of stereoscopic 3D television (TV). Adopting the ISO 9241-9 standard for multi-directional tapping task, the conducted user study compares and evaluates three pointing modalities: standard mouse-based interaction, virtual laser pointer implemented using Wiimote, and hand movement modality using Kinect. The results suggest that the virtual laser pointer modality is more advantageous than other modalities in terms of user performance and user comfort. In addition, this paper discusses the impact of disparity levels on the pointing tasks.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The recent proliferation of stereoscopic three dimensional (3D) video technology has fostered a large body of research into 3D video capture, production, compression and delivery. However, little research has been dedicated to the design practices of stereoscopic 3D video interaction. Interaction tasks such as pointing and selection are critical to the consumer's experience of the 3D video technology. This paper presents investigation of pointing modalities in the context of stereoscopic 3D television (TV). Adopting the ISO 9241-9 standard for multi-directional tapping task, the conducted user study compares and evaluates three pointing modalities: standard mouse-based interaction, virtual laser pointer implemented using Wiimote, and hand movement modality using Kinect. The results suggest that the virtual laser pointer modality is more advantageous than other modalities in terms of user performance and user comfort. In addition, this paper discusses the impact of disparity levels on the pointing tasks.",
"fno": "06607621",
"keywords": [
"Three Dimensional Displays",
"Mice",
"TV",
"Stereo Image Processing",
"ISO Standards",
"Laser Applications",
"ISO 9241 9",
"Stereoscopic 3 D",
"Wiimote",
"Kinect",
"Interaction",
"Pointing",
"Fitts Law"
],
"authors": [
{
"affiliation": "I-Lab, Centre for Vision, Speech and Signal Processing, University of Surrey, UK",
"fullName": "Haiyue Yuan",
"givenName": "Haiyue",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "I-Lab, Centre for Vision, Speech and Signal Processing, University of Surrey, UK",
"fullName": "Janko Calic",
"givenName": "Janko",
"surname": "Calic",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "I-Lab, Centre for Vision, Speech and Signal Processing, University of Surrey, UK",
"fullName": "Anil Fernando",
"givenName": "Anil",
"surname": "Fernando",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "I-Lab, Centre for Vision, Speech and Signal Processing, University of Surrey, UK",
"fullName": "Ahmet Kondoz",
"givenName": "Ahmet",
"surname": "Kondoz",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2013",
"issn": "1945-7871",
"isbn": "978-1-4799-0015-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06607620",
"articleId": "12OmNx1Iw9T",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06607622",
"articleId": "12OmNAlNizp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmip/2017/5954/0/5954a123",
"title": "No-Reference Stereoscopic Image Quality Assessment Using Natural Scene Statistics",
"doi": null,
"abstractUrl": "/proceedings-article/icmip/2017/5954a123/12OmNAndiqC",
"parentPublication": {
"id": "proceedings/icmip/2017/5954/0",
"title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2012/2027/0/06266227",
"title": "User Requirements Elicitation of Stereoscopic 3D Video Interaction",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2012/06266227/12OmNB7Lvyi",
"parentPublication": {
"id": "proceedings/icmew/2012/2027/0",
"title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2009/3943/0/04811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811029/12OmNBqv2g2",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2012/4725/0/4725a001",
"title": "Virtual Table -- Teleporter: Image Processing and Rendering for Horizontal Stereoscopic Display",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2012/4725a001/12OmNCdBDSH",
"parentPublication": {
"id": "proceedings/svr/2012/4725/0",
"title": "2012 14th Symposium on Virtual and Augmented Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icig/2004/2244/0/01410460",
"title": "Approaches to H.264-based stereoscopic video coding",
"doi": null,
"abstractUrl": "/proceedings-article/icig/2004/01410460/12OmNvAiStp",
"parentPublication": {
"id": "proceedings/icig/2004/2244/0",
"title": "Proceedings. Third International Conference on Image and Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2013/2840/0/2840a073",
"title": "Joint Subspace Stabilization for Stereoscopic Video",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2013/2840a073/12OmNxT56Af",
"parentPublication": {
"id": "proceedings/iccv/2013/2840/0",
"title": "2013 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2011/348/0/06012099",
"title": "MVC based scalable codec enhancing frame-compatible stereoscopic video",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2011/06012099/12OmNzVGcCN",
"parentPublication": {
"id": "proceedings/icme/2011/348/0",
"title": "2011 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08447552",
"title": "Pointing at Wiggle 3D Displays",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08447552/13bd1tl2oml",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b655",
"title": "Warping-Based Stereoscopic 3D Video Retargeting With Depth Remapping",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b655/18j8LvV2AJG",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797975",
"title": "Do Head-Mounted Display Stereo Deficiencies Affect 3D Pointing Tasks in AR and VR?",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797975/1cJ0L4GQvSM",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzVGcJn",
"title": "2008 8th IEEE International Conference on Automatic Face & Gesture Recognition",
"acronym": "fg",
"groupId": "1000065",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzahc3t",
"doi": "10.1109/AFGR.2008.4813448",
"title": "Real-time 3D pointing gesture recognition in mobile space",
"normalizedTitle": "Real-time 3D pointing gesture recognition in mobile space",
"abstract": "In this paper, we present a real-time 3D pointing gesture recognition algorithm for natural human-robot interaction (HRI). The recognition errors in previous pointing gesture recognition algorithms are mainly caused by the low performance of the hands tracking module and by the unreliability of the direction estimate itself, therefore our proposed algorithm uses 3D particle filter for achieving reliability in hand tracking and cascade hidden Markov model (HMM) for a robust estimate for the pointing direction. When someone enters the field of view of the camera, his or her face and two hands are located and tracked using the particle filters. The first stage HMM takes the hand position estimate and maps it to a more accurate position by modeling the kinematic characteristics of finger pointing. The resulting 3D coordinates are used as an input to the second stage HMM that discriminates pointing gestures from others. Finally the pointing direction is estimated in the case of pointing state. The proposed method can deal with both large and small pointing gestures. The experiment shows better than 89% gesture recognition results and 99% target selection results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present a real-time 3D pointing gesture recognition algorithm for natural human-robot interaction (HRI). The recognition errors in previous pointing gesture recognition algorithms are mainly caused by the low performance of the hands tracking module and by the unreliability of the direction estimate itself, therefore our proposed algorithm uses 3D particle filter for achieving reliability in hand tracking and cascade hidden Markov model (HMM) for a robust estimate for the pointing direction. When someone enters the field of view of the camera, his or her face and two hands are located and tracked using the particle filters. The first stage HMM takes the hand position estimate and maps it to a more accurate position by modeling the kinematic characteristics of finger pointing. The resulting 3D coordinates are used as an input to the second stage HMM that discriminates pointing gestures from others. Finally the pointing direction is estimated in the case of pointing state. The proposed method can deal with both large and small pointing gestures. The experiment shows better than 89% gesture recognition results and 99% target selection results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present a real-time 3D pointing gesture recognition algorithm for natural human-robot interaction (HRI). The recognition errors in previous pointing gesture recognition algorithms are mainly caused by the low performance of the hands tracking module and by the unreliability of the direction estimate itself, therefore our proposed algorithm uses 3D particle filter for achieving reliability in hand tracking and cascade hidden Markov model (HMM) for a robust estimate for the pointing direction. When someone enters the field of view of the camera, his or her face and two hands are located and tracked using the particle filters. The first stage HMM takes the hand position estimate and maps it to a more accurate position by modeling the kinematic characteristics of finger pointing. The resulting 3D coordinates are used as an input to the second stage HMM that discriminates pointing gestures from others. Finally the pointing direction is estimated in the case of pointing state. The proposed method can deal with both large and small pointing gestures. The experiment shows better than 89% gesture recognition results and 99% target selection results.",
"fno": "04813448",
"keywords": [
"Gesture Recognition",
"Hidden Markov Models",
"Human Robot Interaction",
"Object Detection",
"Particle Filtering Numerical Methods",
"Robot Vision",
"Stereo Image Processing",
"Real Time 3 D Pointing Gesture Recognition",
"Mobile Space",
"Natural Human Robot Interaction",
"Hand Tracking",
"Pointing Direction Estimation",
"3 D Particle Filter",
"Cascade Hidden Markov Model",
"Hand Position Estimation",
"Kinematic Characteristics",
"Target Selection",
"Face Detection",
"Hidden Markov Models",
"Particle Tracking",
"Robustness",
"Humans",
"Mice",
"Particle Filters",
"Fingers",
"Target Recognition",
"Target Tracking"
],
"authors": [
{
"affiliation": "Department of Computer Science and Engineering, Korea University, Korea",
"fullName": "Chang-Beom Park",
"givenName": "Chang-Beom",
"surname": "Park",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Engineering, Korea University, Korea",
"fullName": "Myung-Cheol Roh",
"givenName": "Myung-Cheol",
"surname": "Roh",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Engineering, Korea University, Korea",
"fullName": "Seong-Whan Lee",
"givenName": "Seong-Whan",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fg",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-09-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": null,
"isbn": "978-1-4244-2153-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04813447",
"articleId": "12OmNzZWbME",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04813449",
"articleId": "12OmNx4gUyg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fg/2004/2122/0/21220565",
"title": "3D-Tracking of Head and Hands for Pointing Gesture Recognition in a Human-Robot Interaction Scenario",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2004/21220565/12OmNA0MZ1u",
"parentPublication": {
"id": "proceedings/fg/2004/2122/0",
"title": "Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2004/2122/0/21220577",
"title": "Real-Time Pointing Gesture Recognition for an Immersive Environment",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2004/21220577/12OmNB836Nx",
"parentPublication": {
"id": "proceedings/fg/2004/2122/0",
"title": "Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2007/1016/0/04284820",
"title": "A Real-Time Hand Gesture Recognition Method",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2007/04284820/12OmNs0kyyW",
"parentPublication": {
"id": "proceedings/icme/2007/1016/0",
"title": "2007 International Conference on Multimedia & Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2007/1016/0/04284817",
"title": "A Vision-Based Real-Time Pointing Arm Gesture Tracking and Recognition System",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2007/04284817/12OmNyRPgHT",
"parentPublication": {
"id": "proceedings/icme/2007/1016/0",
"title": "2007 International Conference on Multimedia & Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2015/9795/0/9795a849",
"title": "Pointing Gesture Recognition Using Robot Head Control",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2015/9795a849/12OmNz4SOqV",
"parentPublication": {
"id": "proceedings/csci/2015/9795/0",
"title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2004/2128/4/212840965",
"title": "Arm-Pointing Gesture Interface Using Surrounded Stereo Cameras System",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2004/212840965/12OmNzw8j1n",
"parentPublication": {
"id": "proceedings/icpr/2004/2128/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08447552",
"title": "Pointing at Wiggle 3D Displays",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08447552/13bd1tl2oml",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1999/09/i0884",
"title": "Parametric Hidden Markov Models for Gesture Recognition",
"doi": null,
"abstractUrl": "/journal/tp/1999/09/i0884/13rRUwIF6mf",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a590",
"title": "Augmented Reality Fitts' Law Input Comparison Between Touchpad, Pointing Gesture, and Raycast",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a590/1CJcB3cmKuk",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2022/5325/0/532500a404",
"title": "Comparing the Fidelity of Contemporary Pointing with Controller Interactions on Performance of Personal Space Target Selection",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2022/532500a404/1JrRlimqMKc",
"parentPublication": {
"id": "proceedings/ismar/2022/5325/0",
"title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "13bd1eJgoia",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "13bd1AIBM29",
"doi": "10.1109/VR.2018.8446195",
"title": "Effects of Latency Jitter on Simulator Sickness in a Search Task",
"normalizedTitle": "Effects of Latency Jitter on Simulator Sickness in a Search Task",
"abstract": "Low latency is a fundamental requirement for Virtual Reality (VR) systems to reduce the potential risks of cybersickness and to increase effectiveness, efficiency and user experience. In contrast to the effects of uniform latency degradation, the influence of latency jitter on user experience in VR is not well researched, although today's consumer VR systems are vulnerable in this respect. In this work we report on the impact of latency jitter on cybersickness in HMD-based VR environments. Test subjects are given a search task in Virtual Reality, provoking both head rotation and translation. One group experienced artificially added latency jitter in the tracking data of their head-mounted display. The introduced jitter pattern was a replication of a real-world latency behavior extracted and analyzed from an existing example VR-system. The effects of the introduced latency jitter were measured based on self-reports simulator sickness questionnaire (SSQ) and by taking physiological measurements. We found a significant increase in self-reported simulator sickness. We therefore argue that measure and control of latency based on average values taken at a few time intervals is not enough to assure a required timeliness behavior but that latency jitter needs to be considered when designing experiences for Virtual Reality.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Low latency is a fundamental requirement for Virtual Reality (VR) systems to reduce the potential risks of cybersickness and to increase effectiveness, efficiency and user experience. In contrast to the effects of uniform latency degradation, the influence of latency jitter on user experience in VR is not well researched, although today's consumer VR systems are vulnerable in this respect. In this work we report on the impact of latency jitter on cybersickness in HMD-based VR environments. Test subjects are given a search task in Virtual Reality, provoking both head rotation and translation. One group experienced artificially added latency jitter in the tracking data of their head-mounted display. The introduced jitter pattern was a replication of a real-world latency behavior extracted and analyzed from an existing example VR-system. The effects of the introduced latency jitter were measured based on self-reports simulator sickness questionnaire (SSQ) and by taking physiological measurements. We found a significant increase in self-reported simulator sickness. We therefore argue that measure and control of latency based on average values taken at a few time intervals is not enough to assure a required timeliness behavior but that latency jitter needs to be considered when designing experiences for Virtual Reality.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Low latency is a fundamental requirement for Virtual Reality (VR) systems to reduce the potential risks of cybersickness and to increase effectiveness, efficiency and user experience. In contrast to the effects of uniform latency degradation, the influence of latency jitter on user experience in VR is not well researched, although today's consumer VR systems are vulnerable in this respect. In this work we report on the impact of latency jitter on cybersickness in HMD-based VR environments. Test subjects are given a search task in Virtual Reality, provoking both head rotation and translation. One group experienced artificially added latency jitter in the tracking data of their head-mounted display. The introduced jitter pattern was a replication of a real-world latency behavior extracted and analyzed from an existing example VR-system. The effects of the introduced latency jitter were measured based on self-reports simulator sickness questionnaire (SSQ) and by taking physiological measurements. We found a significant increase in self-reported simulator sickness. We therefore argue that measure and control of latency based on average values taken at a few time intervals is not enough to assure a required timeliness behavior but that latency jitter needs to be considered when designing experiences for Virtual Reality.",
"fno": "08446195",
"keywords": [
"Helmet Mounted Displays",
"Human Factors",
"Jitter",
"Virtual Reality",
"Cybersickness",
"User Experience",
"Uniform Latency Degradation",
"Consumer VR Systems",
"HMD Based VR Environments",
"Search Task",
"Head Rotation",
"Translation",
"Tracking Data",
"Head Mounted Display",
"Real World Latency Behavior",
"Sickness Questionnaire",
"Physiological Measurements",
"Self Reported Simulator Sickness",
"Required Timeliness Behavior",
"Designing Experiences",
"Latency Jitter",
"Virtual Reality Systems",
"Jitter Pattern",
"Jitter",
"Task Analysis",
"Virtual Reality",
"Delays",
"Probability Distribution",
"Tracking",
"D 1 3 Programming Techniques Concurrent Programming Parallel Programming",
"D 4 8 Operating Systems Performance Measurements",
"H 5 1 Information Interfaces And Presentation Multimedia Information Systems Artificial",
"Augmented",
"And Virtual Realities"
],
"authors": [
{
"affiliation": "University of Würzburg",
"fullName": "Jan-Philipp Stauffert",
"givenName": "Jan-Philipp",
"surname": "Stauffert",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Würzburg",
"fullName": "Florian Niebling",
"givenName": "Florian",
"surname": "Niebling",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Würzburg",
"fullName": "Marc Erich Latoschik",
"givenName": "Marc Erich",
"surname": "Latoschik",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-03-01T00:00:00",
"pubType": "proceedings",
"pages": "121-127",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-3365-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08446194",
"articleId": "13bd1gzWkQm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08446432",
"articleId": "13bd1fKQxs2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2009/3943/0/04811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811029/12OmNBqv2g2",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446346",
"title": "Reducing VR Sickness Through Peripheral Visual Effects",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446346/13bd1fHrlRY",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798297",
"title": "Unifying Research to Address Motion Sickness",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798297/1cJ13JSUePK",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089513",
"title": "Comparative Evaluation of the Effects of Motion Control on Cybersickness in Immersive Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089513/1jIx7SE9LiM",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089661",
"title": "Simultaneous Run-Time Measurement of Motion-to-Photon Latency and Latency Jitter",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089661/1jIxfrGAC8o",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090580",
"title": "A Study on the Effects of Head Mounted Displays Movement and Image Movement on Virtual Reality Sickness",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090580/1jIxns5TwxG",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090674",
"title": "Guided Sine Fitting for Latency Estimation in Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090674/1jIxz0q4g00",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/searis/2017/6274/0/09183433",
"title": "A Latency and Latency Jitter Simulation Framework with OSVR",
"doi": null,
"abstractUrl": "/proceedings-article/searis/2017/09183433/1mLMmvps0rC",
"parentPublication": {
"id": "proceedings/searis/2017/6274/0",
"title": "2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2021/4057/0/405700a735",
"title": "[DC] Towards Universal VR Sickness Mitigation Strategies",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2021/405700a735/1tnXDI2lhHq",
"parentPublication": {
"id": "proceedings/vrw/2021/4057/0",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2021/4057/0/405700a380",
"title": "Evaluating VR Sickness in VR Locomotion Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2021/405700a380/1tnXc1raaxq",
"parentPublication": {
"id": "proceedings/vrw/2021/4057/0",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cI6akLvAuQ",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cJ1eVQaSKQ",
"doi": "10.1109/VR.2019.8798038",
"title": "Effects of 3D Rotational Jitter and Selection Methods on 3D Pointing Tasks",
"normalizedTitle": "Effects of 3D Rotational Jitter and Selection Methods on 3D Pointing Tasks",
"abstract": "3D pointing is an integral part of Virtual Reality interaction. Typical pointing devices rely on 3D trackers and are thus subject to fluctuations in the reported pose, i.e., jitter. In this work, we explored how different levels of rotational jitter affect pointing performance and if different selection methods can mitigate the effects of jitter. Towards this, we designed a Fitts' Law experiment with three selection methods. In the first method, subjects used a single controller to position and select the object. In the second method, subjects used the controller in their dominant hand to point at objects and the trigger button of a second controller, held in their non-dominant hand, to select objects. Finally, subjects used the controller in their dominant hand to point the objects and pressed the space bar on a keyboard to select the object in the third condition. During the pointing task we added five different levels of jitter: no jitter, ±0.5°, ±1°, and ±2° uniform noise, as well as White Gaussian noise with 1° standard deviation. Results showed that the Gaussian noise and ±2° of jitters significantly reduced the throughput of the participants. Moreover, subjects made fewer errors when they performed the experiment with two controllers. Our results inform the design of 3D user interfaces, input devices and interaction techniques.",
"abstracts": [
{
"abstractType": "Regular",
"content": "3D pointing is an integral part of Virtual Reality interaction. Typical pointing devices rely on 3D trackers and are thus subject to fluctuations in the reported pose, i.e., jitter. In this work, we explored how different levels of rotational jitter affect pointing performance and if different selection methods can mitigate the effects of jitter. Towards this, we designed a Fitts' Law experiment with three selection methods. In the first method, subjects used a single controller to position and select the object. In the second method, subjects used the controller in their dominant hand to point at objects and the trigger button of a second controller, held in their non-dominant hand, to select objects. Finally, subjects used the controller in their dominant hand to point the objects and pressed the space bar on a keyboard to select the object in the third condition. During the pointing task we added five different levels of jitter: no jitter, ±0.5°, ±1°, and ±2° uniform noise, as well as White Gaussian noise with 1° standard deviation. Results showed that the Gaussian noise and ±2° of jitters significantly reduced the throughput of the participants. Moreover, subjects made fewer errors when they performed the experiment with two controllers. Our results inform the design of 3D user interfaces, input devices and interaction techniques.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "3D pointing is an integral part of Virtual Reality interaction. Typical pointing devices rely on 3D trackers and are thus subject to fluctuations in the reported pose, i.e., jitter. In this work, we explored how different levels of rotational jitter affect pointing performance and if different selection methods can mitigate the effects of jitter. Towards this, we designed a Fitts' Law experiment with three selection methods. In the first method, subjects used a single controller to position and select the object. In the second method, subjects used the controller in their dominant hand to point at objects and the trigger button of a second controller, held in their non-dominant hand, to select objects. Finally, subjects used the controller in their dominant hand to point the objects and pressed the space bar on a keyboard to select the object in the third condition. During the pointing task we added five different levels of jitter: no jitter, ±0.5°, ±1°, and ±2° uniform noise, as well as White Gaussian noise with 1° standard deviation. Results showed that the Gaussian noise and ±2° of jitters significantly reduced the throughput of the participants. Moreover, subjects made fewer errors when they performed the experiment with two controllers. Our results inform the design of 3D user interfaces, input devices and interaction techniques.",
"fno": "08798038",
"keywords": [
"Gaussian Noise",
"Human Computer Interaction",
"Jitter",
"Mouse Controllers Computers",
"Virtual Reality",
"Rotational Jitter",
"Pointing Performance",
"Dominant Hand",
"Nondominant Hand",
"3 D User Interfaces",
"3 D Pointing Tasks",
"Pointing Devices",
"Selection Methods",
"Virtual Reality Interaction",
"Trigger Button",
"Uniform Noise",
"White Gaussian Noise",
"Standard Deviation",
"Jitter",
"Three Dimensional Displays",
"Task Analysis",
"Performance Evaluation",
"Keyboards",
"Gaussian Noise",
"Standards",
"Human Centered Computing",
"Virtual Reality",
"Keyboards",
"Pointing Devices"
],
"authors": [
{
"affiliation": "School of Interactive Arts + Technology (SIAT), Simon Fraser University, Vancouver, Canada",
"fullName": "Anil Ufuk Batmaz",
"givenName": "Anil Ufuk",
"surname": "Batmaz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Interactive Arts + Technology (SIAT), Simon Fraser University, Vancouver, Canada",
"fullName": "Wolfgang Stuerzlinger",
"givenName": "Wolfgang",
"surname": "Stuerzlinger",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1687-1692",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-1377-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08797964",
"articleId": "1cJ0T0JVisE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08797869",
"articleId": "1cJ0LTyanRu",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/date/2008/3/0/04484881",
"title": "Digital bit stream jitter testing using jitter expansion",
"doi": null,
"abstractUrl": "/proceedings-article/date/2008/04484881/12OmNAP1YWU",
"parentPublication": {
"id": "proceedings/date/2008/3/0",
"title": "Design, Automation & Test in Europe. DATE'08",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2009/3943/0/04811029",
"title": "Effects of Latency and Spatial Jitter on 2D and 3D Pointing",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811029/12OmNBqv2g2",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/islped/2008/8109/0/81090021",
"title": "Enhancing beneficial jitter using phase-shifted clock distribution",
"doi": null,
"abstractUrl": "/proceedings-article/islped/2008/81090021/12OmNrAMF2p",
"parentPublication": {
"id": "proceedings/islped/2008/8109/0",
"title": "Low Power Electronics and Design, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itc/2009/4868/0/05355727",
"title": "New modeling methods for bounded Gaussian jitter (BGJ)/noise (BGN) and their applications in jitter/noise estimation/testing",
"doi": null,
"abstractUrl": "/proceedings-article/itc/2009/05355727/12OmNvmXJ6Z",
"parentPublication": {
"id": "proceedings/itc/2009/4868/0",
"title": "2009 International Test Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vts/2015/7597/0/07116248",
"title": "A low cost jitter separation and characterization method",
"doi": null,
"abstractUrl": "/proceedings-article/vts/2015/07116248/12OmNzFMFjX",
"parentPublication": {
"id": "proceedings/vts/2015/7597/0",
"title": "2015 IEEE 33rd VLSI Test Symposium (VTS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pcspa/2010/4180/0/4180b240",
"title": "Statistical Analysis and Verification of the Satellite Line of Sight Pointing Jitter",
"doi": null,
"abstractUrl": "/proceedings-article/pcspa/2010/4180b240/12OmNzzfTqs",
"parentPublication": {
"id": "proceedings/pcspa/2010/4180/0",
"title": "Pervasive Computing, Signal Porcessing and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a310",
"title": "My Eyes Hurt: Effects of Jitter in 3D Gaze Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a310/1CJdbzCNHUc",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797975",
"title": "Do Head-Mounted Display Stereo Deficiencies Affect 3D Pointing Tasks in AR and VR?",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797975/1cJ0L4GQvSM",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2019/4540/0/08864589",
"title": "The Golden Bullet: A Comparative Study for Target Acquisition, Pointing and Shooting",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2019/08864589/1e5ZtZ7mbZK",
"parentPublication": {
"id": "proceedings/vs-games/2019/4540/0",
"title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2021/4057/0/405700a189",
"title": "Effects of Different Auditory Feedback Frequencies in Virtual Reality 3D Pointing Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2021/405700a189/1tnWFBgcYAo",
"parentPublication": {
"id": "proceedings/vrw/2021/4057/0",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyfdOIW",
"title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)",
"acronym": "3dui",
"groupId": "1001623",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwIHow8",
"doi": "10.1109/3DUI.2012.6184195",
"title": "Comparison of a two-handed interface to a wand interface and a mouse interface for fundamental 3D tasks",
"normalizedTitle": "Comparison of a two-handed interface to a wand interface and a mouse interface for fundamental 3D tasks",
"abstract": "This paper describes a two-handed interface that enables intuitive interaction with 3D multimedia environments. Two user studies demonstrated the effectiveness of the two-handed interface in fundamental 3D object manipulation and viewpoint manipulation tasks. Trained participants docked and constructed 3D objects 4.5-4.7 times as fast as a standard mouse interface and 1.3-2.5 times as fast as a standard one-handed wand interface. 19 of 20 participants preferred the two-handed interface over the mouse and wand interfaces. 16 participants felt very comfortable with the two-handed interface and 4 felt comfortable. No statistically significant differences in performance were found between monoscopic and stereoscopic displays although 17 of 20 participants preferred the stereoscopic display over the monoscopic display.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper describes a two-handed interface that enables intuitive interaction with 3D multimedia environments. Two user studies demonstrated the effectiveness of the two-handed interface in fundamental 3D object manipulation and viewpoint manipulation tasks. Trained participants docked and constructed 3D objects 4.5-4.7 times as fast as a standard mouse interface and 1.3-2.5 times as fast as a standard one-handed wand interface. 19 of 20 participants preferred the two-handed interface over the mouse and wand interfaces. 16 participants felt very comfortable with the two-handed interface and 4 felt comfortable. No statistically significant differences in performance were found between monoscopic and stereoscopic displays although 17 of 20 participants preferred the stereoscopic display over the monoscopic display.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper describes a two-handed interface that enables intuitive interaction with 3D multimedia environments. Two user studies demonstrated the effectiveness of the two-handed interface in fundamental 3D object manipulation and viewpoint manipulation tasks. Trained participants docked and constructed 3D objects 4.5-4.7 times as fast as a standard mouse interface and 1.3-2.5 times as fast as a standard one-handed wand interface. 19 of 20 participants preferred the two-handed interface over the mouse and wand interfaces. 16 participants felt very comfortable with the two-handed interface and 4 felt comfortable. No statistically significant differences in performance were found between monoscopic and stereoscopic displays although 17 of 20 participants preferred the stereoscopic display over the monoscopic display.",
"fno": "06184195",
"keywords": [
"Three Dimensional Displays",
"Visualization",
"Stereo Image Processing",
"Manipulators",
"Training",
"Games",
"Mice",
"Wand",
"3 D Interaction",
"Degrees Of Freedom",
"Object And Viewpoint Manipulation",
"Two Handed Interface",
"Mouse"
],
"authors": [
{
"affiliation": null,
"fullName": "U. Schultheis",
"givenName": "U.",
"surname": "Schultheis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "J. Jerald",
"givenName": "J.",
"surname": "Jerald",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "F. Toledo",
"givenName": "F.",
"surname": "Toledo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "A. Yoganandan",
"givenName": "A.",
"surname": "Yoganandan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "P. Mlyniec",
"givenName": "P.",
"surname": "Mlyniec",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dui",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-03-01T00:00:00",
"pubType": "proceedings",
"pages": "117-124",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-1204-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06184194",
"articleId": "12OmNzDehdV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06184196",
"articleId": "12OmNBtCCFM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dui/2011/0063/0/05759245",
"title": "Reality-based User Interface System (RUIS)",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2011/05759245/12OmNAgGwhm",
"parentPublication": {
"id": "proceedings/3dui/2011/0063/0",
"title": "2011 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2014/3624/0/06798857",
"title": "Poster: Evaluation of a smart tablet's interface for 3D interaction",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2014/06798857/12OmNC3Xhrk",
"parentPublication": {
"id": "proceedings/3dui/2014/3624/0",
"title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2007/0905/0/04161002",
"title": "Interscopic User Interface Concepts for Fish Tank Virtual Reality Systems",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2007/04161002/12OmNvkplbf",
"parentPublication": {
"id": "proceedings/vr/2007/0905/0",
"title": "2007 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2015/6026/1/07163164",
"title": "3D interaction design: Increasing the stimulus-response correspondence by using stereoscopic vision",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2015/07163164/12OmNxR5UKi",
"parentPublication": {
"id": "proceedings/fg/2015/6026/5",
"title": "2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dvis/2014/6826/0/07160095",
"title": "Beyond the classical monoscopic 3D in graph analytics: An experimental study of the impact of stereoscopy",
"doi": null,
"abstractUrl": "/proceedings-article/3dvis/2014/07160095/12OmNxwENmo",
"parentPublication": {
"id": "proceedings/3dvis/2014/6826/0",
"title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wevr/2015/1725/0/07151689",
"title": "Binocular eye-tracking for the control of a 3D immersive multimedia user interface",
"doi": null,
"abstractUrl": "/proceedings-article/wevr/2015/07151689/12OmNzUxO9j",
"parentPublication": {
"id": "proceedings/wevr/2015/1725/0",
"title": "2015 IEEE 1st Workshop on Everyday Virtual Reality (WEVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2015/7204/0/7204a015",
"title": "5* Magic Wand: An RGBD Camera-Based 5 DoF User Interface for 3D Interaction",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2015/7204a015/12OmNzdoMpn",
"parentPublication": {
"id": "proceedings/svr/2015/7204/0",
"title": "2015 XVII Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2014/7981/0/7981b616",
"title": "The Interactive Design and Performance Study of Instrument Panels Based on the Single-Handed Keyboard Mouse",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2014/7981b616/12OmNznkJYs",
"parentPublication": {
"id": "proceedings/cse/2014/7981/0",
"title": "2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/04/08302393",
"title": "Driver Behavior and Performance with Augmented Reality Pedestrian Collision Warning: An Outdoor User Study",
"doi": null,
"abstractUrl": "/journal/tg/2018/04/08302393/13rRUwInvJm",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/1995/07/r7020",
"title": "Two-Handed Spatial Interface Tools for Neurosurgical Planning",
"doi": null,
"abstractUrl": "/magazine/co/1995/07/r7020/13rRUxC0Szg",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBaT60w",
"title": "2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)",
"acronym": "fg",
"groupId": "1000065",
"volume": "1",
"displayVolume": "1",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx7G61x",
"doi": "10.1109/FG.2015.7163120",
"title": "3D interaction design: Increasing the stimulus-response correspondence by using stereoscopic vision",
"normalizedTitle": "3D interaction design: Increasing the stimulus-response correspondence by using stereoscopic vision",
"abstract": "This paper presents a hand-based interaction approach for grabbing and manipulating virtual objects within immersive virtual environments. Considering the stimulus-response of humans, interacting with objects is easier if depth information is provided by stereoscopic vision. However, most people are used to work in monoscopic virtual environments. Therefore, we propose a case study, to analyze if an interaction approach using stereoscopic vision, compared to a conventional monoscopic vision, results in a higher user acceptance and stimulus-response correspondence. Our interaction approach is based on a robust and fast running 3D hand- and head-tracking provided by Microsoft's Kinect. We present a simple non-collision-based method for grabbing and manipulating objects within a 3D virtual environment. By tracking the head, the user is able to move within the environment and interact depending on his current position. The use of stereoscopic vision allows a natural and instinctive hand interaction with the augmented object. Finally, the experimental results and studies show how the use of stereoscopic vision improves the mental mapping and thus the user acceptance and stimulus-response correspondence in consideration of using the here presented interaction approach.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a hand-based interaction approach for grabbing and manipulating virtual objects within immersive virtual environments. Considering the stimulus-response of humans, interacting with objects is easier if depth information is provided by stereoscopic vision. However, most people are used to work in monoscopic virtual environments. Therefore, we propose a case study, to analyze if an interaction approach using stereoscopic vision, compared to a conventional monoscopic vision, results in a higher user acceptance and stimulus-response correspondence. Our interaction approach is based on a robust and fast running 3D hand- and head-tracking provided by Microsoft's Kinect. We present a simple non-collision-based method for grabbing and manipulating objects within a 3D virtual environment. By tracking the head, the user is able to move within the environment and interact depending on his current position. The use of stereoscopic vision allows a natural and instinctive hand interaction with the augmented object. Finally, the experimental results and studies show how the use of stereoscopic vision improves the mental mapping and thus the user acceptance and stimulus-response correspondence in consideration of using the here presented interaction approach.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a hand-based interaction approach for grabbing and manipulating virtual objects within immersive virtual environments. Considering the stimulus-response of humans, interacting with objects is easier if depth information is provided by stereoscopic vision. However, most people are used to work in monoscopic virtual environments. Therefore, we propose a case study, to analyze if an interaction approach using stereoscopic vision, compared to a conventional monoscopic vision, results in a higher user acceptance and stimulus-response correspondence. Our interaction approach is based on a robust and fast running 3D hand- and head-tracking provided by Microsoft's Kinect. We present a simple non-collision-based method for grabbing and manipulating objects within a 3D virtual environment. By tracking the head, the user is able to move within the environment and interact depending on his current position. The use of stereoscopic vision allows a natural and instinctive hand interaction with the augmented object. Finally, the experimental results and studies show how the use of stereoscopic vision improves the mental mapping and thus the user acceptance and stimulus-response correspondence in consideration of using the here presented interaction approach.",
"fno": "07163120",
"keywords": [
"Three Dimensional Displays",
"Stereo Image Processing",
"Virtual Environments",
"Cameras",
"Head",
"Tracking",
"Sensors"
],
"authors": [
{
"affiliation": "Univ. of Appl. Sci. Wurzburg-Schweinfurt, Wurzburg, Germany",
"fullName": "Toni Fetzer",
"givenName": "Toni",
"surname": "Fetzer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Univ. of Appl. Sci. Wurzburg-Schweinfurt, Wurzburg, Germany",
"fullName": "Christian Petry",
"givenName": "Christian",
"surname": "Petry",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Univ. of Appl. Sci. Wurzburg-Schweinfurt, Wurzburg, Germany",
"fullName": "Frank Deinzer",
"givenName": "Frank",
"surname": "Deinzer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Univ. of Appl. Sci. Wurzburg-Schweinfurt, Wurzburg, Germany",
"fullName": "Karsten Huffstadt",
"givenName": "Karsten",
"surname": "Huffstadt",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fg",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-05-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2015",
"issn": null,
"isbn": "978-1-4799-6026-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07163119",
"articleId": "12OmNC1Guai",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07163121",
"articleId": "12OmNyQGS7p",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2010/6237/0/05444790",
"title": "Change blindness phenomena for stereoscopic projection systems",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2010/05444790/12OmNBTs7wG",
"parentPublication": {
"id": "proceedings/vr/2010/6237/0",
"title": "2010 IEEE Virtual Reality Conference (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2012/4836/0/4836a001",
"title": "A Motion Parallax Rendering Approach to Real-time Stereoscopic Visualization for Aircraft Virtual Assembly",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2012/4836a001/12OmNwseERI",
"parentPublication": {
"id": "proceedings/icvrv/2012/4836/0",
"title": "2012 International Conference on Virtual Reality and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2014/7978/0/7978a147",
"title": "Speed Estimation Using Stereoscopic Effect",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2014/7978a147/12OmNxETa4w",
"parentPublication": {
"id": "proceedings/sitis/2014/7978/0",
"title": "2014 Tenth International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2015/6026/1/07163164",
"title": "3D interaction design: Increasing the stimulus-response correspondence by using stereoscopic vision",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2015/07163164/12OmNxR5UKi",
"parentPublication": {
"id": "proceedings/fg/2015/6026/5",
"title": "2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dvis/2014/6826/0/07160095",
"title": "Beyond the classical monoscopic 3D in graph analytics: An experimental study of the impact of stereoscopy",
"doi": null,
"abstractUrl": "/proceedings-article/3dvis/2014/07160095/12OmNxwENmo",
"parentPublication": {
"id": "proceedings/3dvis/2014/6826/0",
"title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2016/04/mcg2016040056",
"title": "The Accuracy of Gauge-Figure Tasks in Monoscopic and Stereo Displays",
"doi": null,
"abstractUrl": "/magazine/cg/2016/04/mcg2016040056/13rRUwhpBGF",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118242",
"title": "Towards An Understanding of Mobile Touch Navigation in a Stereoscopic Viewing Environment for 3D Data Exploration",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118242/13rRUxlgxOk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797876",
"title": "Live Stereoscopic 3D Image with Constant Capture Direction of 360° Cameras for High-Quality Visual Telepresence",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797876/1cJ0HMTqjOU",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798126",
"title": "Interaction Design for Selection and Manipulation on Immersive Touch Table Display Systems for 3D Geographic Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798126/1cJ167T0YHm",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2019/4540/0/08864578",
"title": "Mono-Stereoscopic Camera in a Virtual Reality Environment: Case Study in Cybersickness",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2019/08864578/1e5Zs94AhSE",
"parentPublication": {
"id": "proceedings/vs-games/2019/4540/0",
"title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cI6akLvAuQ",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cJ167T0YHm",
"doi": "10.1109/VR.2019.8798126",
"title": "Interaction Design for Selection and Manipulation on Immersive Touch Table Display Systems for 3D Geographic Visualization",
"normalizedTitle": "Interaction Design for Selection and Manipulation on Immersive Touch Table Display Systems for 3D Geographic Visualization",
"abstract": "Geographic visualizations are, due to the limited need for vertical navigation, suitable for touch tables. In this poster we consider the design of interaction design for selection and manipulation through touch on the screen used for the display of 3D geographic visualization-in our case the visualization of and interaction with drone traffic over rural and urban areas-focusing on moving from a monoscopic to a more immersive, stereoscopic touch table, and how this move affects the interaction design. With a monoscopic display our stereoscopic vision uses the graphics to perceive the location of the surface, and touch interaction can naturally and intuitively be performed on top of 3D objects. Moving to stereocopic display, for increased sense of immersion, the graphics no longer provide visual cues about the location of the screen. We argue that this motivates modification of the design principles, with an alternative interaction design as a result.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Geographic visualizations are, due to the limited need for vertical navigation, suitable for touch tables. In this poster we consider the design of interaction design for selection and manipulation through touch on the screen used for the display of 3D geographic visualization-in our case the visualization of and interaction with drone traffic over rural and urban areas-focusing on moving from a monoscopic to a more immersive, stereoscopic touch table, and how this move affects the interaction design. With a monoscopic display our stereoscopic vision uses the graphics to perceive the location of the surface, and touch interaction can naturally and intuitively be performed on top of 3D objects. Moving to stereocopic display, for increased sense of immersion, the graphics no longer provide visual cues about the location of the screen. We argue that this motivates modification of the design principles, with an alternative interaction design as a result.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Geographic visualizations are, due to the limited need for vertical navigation, suitable for touch tables. In this poster we consider the design of interaction design for selection and manipulation through touch on the screen used for the display of 3D geographic visualization-in our case the visualization of and interaction with drone traffic over rural and urban areas-focusing on moving from a monoscopic to a more immersive, stereoscopic touch table, and how this move affects the interaction design. With a monoscopic display our stereoscopic vision uses the graphics to perceive the location of the surface, and touch interaction can naturally and intuitively be performed on top of 3D objects. Moving to stereocopic display, for increased sense of immersion, the graphics no longer provide visual cues about the location of the screen. We argue that this motivates modification of the design principles, with an alternative interaction design as a result.",
"fno": "08798126",
"keywords": [
"Data Visualisation",
"Geographic Information Systems",
"Stereo Image Processing",
"Touch Sensitive Screens",
"User Interfaces",
"Geographic Visualizations",
"Touch Tables",
"Rural Areas Focusing",
"Urban Areas Focusing",
"Stereoscopic Touch Table",
"Monoscopic Display",
"Touch Interaction",
"Stereocopic Display",
"Visual Cues",
"Alternative Interaction Design",
"Immersive Touch Table Display Systems",
"3 D Geographic Visualization",
"Vertical Navigation",
"Three Dimensional Displays",
"Stereo Image Processing",
"Visualization",
"Touch Sensitive Screens",
"Rendering Computer Graphics",
"Software"
],
"authors": [
{
"affiliation": "Media and Information Technology, Linköping University, Sweden",
"fullName": "Karljohan E. Lundin Palmerius",
"givenName": "Karljohan E. Lundin",
"surname": "Palmerius",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Media and Information Technology, Linköping University, Sweden",
"fullName": "Jonas Lundberg",
"givenName": "Jonas",
"surname": "Lundberg",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1064-1065",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-1377-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08798017",
"articleId": "1cJ0YUTkHao",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08797772",
"articleId": "1cJ0HR0k6CQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dui/2009/3965/0/04811219",
"title": "Poster: Interscopic multi-touch surfaces: Using bimanual interaction for intuitive manipulation of spatial data",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2009/04811219/12OmNwCaCw0",
"parentPublication": {
"id": "proceedings/3dui/2009/3965/0",
"title": "2009 IEEE Symposium on 3D User Interfaces",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2013/4795/0/06549380",
"title": "Touch & move: A portable stereoscopic multi-touch table",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2013/06549380/12OmNxXCGEs",
"parentPublication": {
"id": "proceedings/vr/2013/4795/0",
"title": "2013 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2016/0842/0/07460025",
"title": "Indirect touch manipulation for interaction with stereoscopic displays",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2016/07460025/12OmNxwENpw",
"parentPublication": {
"id": "proceedings/3dui/2016/0842/0",
"title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/09/08409988",
"title": "HapTable: An Interactive Tabletop Providing Online Haptic Feedback for Touch Gestures",
"doi": null,
"abstractUrl": "/journal/tg/2019/09/08409988/13rRUIM2VBO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/05/07118242",
"title": "Towards An Understanding of Mobile Touch Navigation in a Stereoscopic Viewing Environment for 3D Data Exploration",
"doi": null,
"abstractUrl": "/journal/tg/2016/05/07118242/13rRUxlgxOk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/so/1991/02/s2093",
"title": "Touch Screens Now Offer Compelling Uses",
"doi": null,
"abstractUrl": "/magazine/so/1991/02/s2093/13rRUyfbwow",
"parentPublication": {
"id": "mags/so",
"title": "IEEE Software",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/netcit/2021/0070/0/007000a413",
"title": "Computer Intelligent Evaluation Model and Algorithm Optimization of Driving Distraction from In-Vehicle Information System Secondary Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/netcit/2021/007000a413/1BERZUQlEoU",
"parentPublication": {
"id": "proceedings/netcit/2021/0070/0",
"title": "2021 International Conference on Networking, Communications and Information Technology (NetCIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnisc/2022/5351/0/535100a753",
"title": "Design of a Programmable Touch Keyboard",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2022/535100a753/1KYtpnuy7Kg",
"parentPublication": {
"id": "proceedings/icnisc/2022/5351/0",
"title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icftic/2022/2195/0/10075179",
"title": "Feature Recognition and Data Analysis Strategy for Touch Screen Objects Based on Camera Array",
"doi": null,
"abstractUrl": "/proceedings-article/icftic/2022/10075179/1LRl4YhFqQU",
"parentPublication": {
"id": "proceedings/icftic/2022/2195/0",
"title": "2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2020/0497/0/049700a253",
"title": "Multi-touch Simulation System for Sand Painting",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2020/049700a253/1vg8dCS9bhu",
"parentPublication": {
"id": "proceedings/icvrv/2020/0497/0",
"title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyjLoSc",
"title": "2015 IEEE Frontiers in Education Conference (FIE)",
"acronym": "fie",
"groupId": "1000297",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqIzgWt",
"doi": "10.1109/FIE.2015.7344322",
"title": "Students learn more with less text that covers the same core topics",
"normalizedTitle": "Students learn more with less text that covers the same core topics",
"abstract": "For textbooks on technical topics, the typical amount of text used is more than what many college students will read. Some teachers observe, and students report, that students commonly skim such text. As such, a writing style that aggressively minimizes text while still teaching the core technical topic may improve student learning; if text is short enough, students may then read and study the text more carefully. The objective of this study was to compare the effect of text quantity on amount learned. We created and compared content styles using a lesson that taught Google search techniques. The two main content styles were normal text and minimal text. The normal text style included 6–12 sentences followed by 1–3 examples. The minimal text style included 1–2 sentences followed by 1–3 examples. We conducted a randomized control study with 168 participants enrolled in a college-level Introduction to Computing course for non-computing majors. Each participant was randomly assigned one lesson style. We provided a pre-lesson and post-lesson quiz, each with ten questions. Additionally, the participants completed background and follow-up surveys. The study was part of a course homework assignment, so self-selection bias was limited. The course is primarily taken by non-majors and covers the basics of Word, Excel, and HTML. An improvement score is a participant's post-lesson minus pre-lesson quiz scores. The average improvement score for minimal text was 2.4 (6.5 − 4.1), which is higher (p-value < 0.01) than the average improvement score for normal text of 1.1 (5.1 − 4.0). Thus, teaching the same topic using less text led to more learning. The conclusion is not that materials should be watered down, but rather that great attention should be paid to using minimal text while teaching the same core topics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "For textbooks on technical topics, the typical amount of text used is more than what many college students will read. Some teachers observe, and students report, that students commonly skim such text. As such, a writing style that aggressively minimizes text while still teaching the core technical topic may improve student learning; if text is short enough, students may then read and study the text more carefully. The objective of this study was to compare the effect of text quantity on amount learned. We created and compared content styles using a lesson that taught Google search techniques. The two main content styles were normal text and minimal text. The normal text style included 6–12 sentences followed by 1–3 examples. The minimal text style included 1–2 sentences followed by 1–3 examples. We conducted a randomized control study with 168 participants enrolled in a college-level Introduction to Computing course for non-computing majors. Each participant was randomly assigned one lesson style. We provided a pre-lesson and post-lesson quiz, each with ten questions. Additionally, the participants completed background and follow-up surveys. The study was part of a course homework assignment, so self-selection bias was limited. The course is primarily taken by non-majors and covers the basics of Word, Excel, and HTML. An improvement score is a participant's post-lesson minus pre-lesson quiz scores. The average improvement score for minimal text was 2.4 (6.5 − 4.1), which is higher (p-value < 0.01) than the average improvement score for normal text of 1.1 (5.1 − 4.0). Thus, teaching the same topic using less text led to more learning. The conclusion is not that materials should be watered down, but rather that great attention should be paid to using minimal text while teaching the same core topics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "For textbooks on technical topics, the typical amount of text used is more than what many college students will read. Some teachers observe, and students report, that students commonly skim such text. As such, a writing style that aggressively minimizes text while still teaching the core technical topic may improve student learning; if text is short enough, students may then read and study the text more carefully. The objective of this study was to compare the effect of text quantity on amount learned. We created and compared content styles using a lesson that taught Google search techniques. The two main content styles were normal text and minimal text. The normal text style included 6–12 sentences followed by 1–3 examples. The minimal text style included 1–2 sentences followed by 1–3 examples. We conducted a randomized control study with 168 participants enrolled in a college-level Introduction to Computing course for non-computing majors. Each participant was randomly assigned one lesson style. We provided a pre-lesson and post-lesson quiz, each with ten questions. Additionally, the participants completed background and follow-up surveys. The study was part of a course homework assignment, so self-selection bias was limited. The course is primarily taken by non-majors and covers the basics of Word, Excel, and HTML. An improvement score is a participant's post-lesson minus pre-lesson quiz scores. The average improvement score for minimal text was 2.4 (6.5 − 4.1), which is higher (p-value < 0.01) than the average improvement score for normal text of 1.1 (5.1 − 4.0). Thus, teaching the same topic using less text led to more learning. The conclusion is not that materials should be watered down, but rather that great attention should be paid to using minimal text while teaching the same core topics.",
"fno": "07344322",
"keywords": [
"Education",
"Google",
"Writing",
"Usability",
"Length Measurement",
"Atmospheric Measurements",
"Particle Measurements",
"STEM",
"Digital Learning",
"Digital Education",
"Digital Content",
"Lesson Assessment",
"Text Length",
"Minimal Text",
"College Education",
"College Textbooks"
],
"authors": [
{
"affiliation": "Dept. of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA",
"fullName": "Alex Edgcomb",
"givenName": "Alex",
"surname": "Edgcomb",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA",
"fullName": "Frank Vahid",
"givenName": "Frank",
"surname": "Vahid",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA",
"fullName": "Roman Lysecky",
"givenName": "Roman",
"surname": "Lysecky",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fie",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-5",
"year": "2015",
"issn": null,
"isbn": "978-1-4799-8454-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07344321",
"articleId": "12OmNBKEyy3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07344323",
"articleId": "12OmNBsLPi8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/rew/2017/3488/0/3488a132",
"title": "Learn More, Pay Less! Lessons Learned from Applying the Wizard-of-Oz Technique for Exploring Mobile App Requirements",
"doi": null,
"abstractUrl": "/proceedings-article/rew/2017/3488a132/12OmNASraWb",
"parentPublication": {
"id": "proceedings/rew/2017/3488/0",
"title": "2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "19wAFbtuF2w",
"title": "2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)",
"acronym": "percom-workshops",
"groupId": "1000552",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "19wAFSyy31C",
"doi": "10.1109/PERCOMW.2017.7917643",
"title": "Using wrist-worn sensors to measure and compare physical activity changes for patients undergoing rehabilitation",
"normalizedTitle": "Using wrist-worn sensors to measure and compare physical activity changes for patients undergoing rehabilitation",
"abstract": "Wrist-worn sensors have increased in popularity in health care settings. As the use of wrist-worn sensors increases, a better understanding is needed of how to detect changes in behavior as well as an ability to quantify such changes. We introduce a statistical method to address this need. In this study, we used Fitbit Charge Heart Rate devices with two separate populations to continuously record data. There were eight participants in the healthy control group and nine in the hospitalized inpatient rehabilitation group. We performed comparisons both within the groups and between groups on the gathered step count and heart rate data. The inpatient rehabilitation group showed improved step count changes between the first half of the study participation and the second half. Heart rate did not show significant changes for either the healthy control group or inpatient rehabilitation group across time. We conclude that our statistical change analysis applied to wrist-worn sensors can effectively detect changes in physical activity that provides valuable information to patients as well as their healthcare care providers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Wrist-worn sensors have increased in popularity in health care settings. As the use of wrist-worn sensors increases, a better understanding is needed of how to detect changes in behavior as well as an ability to quantify such changes. We introduce a statistical method to address this need. In this study, we used Fitbit Charge Heart Rate devices with two separate populations to continuously record data. There were eight participants in the healthy control group and nine in the hospitalized inpatient rehabilitation group. We performed comparisons both within the groups and between groups on the gathered step count and heart rate data. The inpatient rehabilitation group showed improved step count changes between the first half of the study participation and the second half. Heart rate did not show significant changes for either the healthy control group or inpatient rehabilitation group across time. We conclude that our statistical change analysis applied to wrist-worn sensors can effectively detect changes in physical activity that provides valuable information to patients as well as their healthcare care providers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Wrist-worn sensors have increased in popularity in health care settings. As the use of wrist-worn sensors increases, a better understanding is needed of how to detect changes in behavior as well as an ability to quantify such changes. We introduce a statistical method to address this need. In this study, we used Fitbit Charge Heart Rate devices with two separate populations to continuously record data. There were eight participants in the healthy control group and nine in the hospitalized inpatient rehabilitation group. We performed comparisons both within the groups and between groups on the gathered step count and heart rate data. The inpatient rehabilitation group showed improved step count changes between the first half of the study participation and the second half. Heart rate did not show significant changes for either the healthy control group or inpatient rehabilitation group across time. We conclude that our statistical change analysis applied to wrist-worn sensors can effectively detect changes in physical activity that provides valuable information to patients as well as their healthcare care providers.",
"fno": "07917643",
"keywords": [
"Health Care",
"Patient Rehabilitation",
"Sensors",
"Statistical Analysis",
"Wrist Worn Sensors",
"Physical Activity Changes",
"Patient Rehabilitation",
"Health Care Settings",
"Fitbit Charge Heart Rate Devices",
"Statistical Method",
"Healthy Control Group",
"Hospitalized Inpatient Rehabilitation Group",
"Heart Rate Data",
"Inpatient Rehabilitation Group",
"Healthcare Providers",
"Heart Rate",
"Legged Locomotion",
"Monitoring",
"Sensors",
"Sociology",
"Statistics",
"Wrist",
"Physical Activity Monitoring",
"Wearable Sensors",
"Fitbit",
"Fitness Tracking",
"Inpatient Rehabilitation",
"Pervasive Computing"
],
"authors": [
{
"affiliation": "School of Biological Sciences, Washington State University, Pullman, United States of America",
"fullName": "Jordana Dahmen",
"givenName": "Jordana",
"surname": "Dahmen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Mathematics and Computer Science, Whitworth University, Spokane, WA, United States of America",
"fullName": "Alyssa La Fleur",
"givenName": "Alyssa",
"surname": "La Fleur",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical Engineering and Computer Science, Washington State University, Pullman, United States of America",
"fullName": "Gina Sprint",
"givenName": "Gina",
"surname": "Sprint",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical Engineering and Computer Science, Washington State University, Pullman, United States of America",
"fullName": "Diane Cook",
"givenName": "Diane",
"surname": "Cook",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "St. Luke's Rehabilitation Institute, Spokane, WA, United States of America",
"fullName": "Douglas L. Weeks",
"givenName": "Douglas L.",
"surname": "Weeks",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "percom-workshops",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-03-01T00:00:00",
"pubType": "proceedings",
"pages": "667-672",
"year": "2017",
"issn": null,
"isbn": "978-1-5090-4338-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07917642",
"articleId": "19wAKidhqRW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07917644",
"articleId": "19wAJhpXiN2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdmw/2015/8493/0/8493a164",
"title": "Activity Recognition Using Wrist-Worn Sensors for Human Performance Evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a164/12OmNBTJID4",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2016/0662/0/0662a325",
"title": "Human-Computer Interaction in Healthcare: How to Support Patients during Their Wrist Rehabilitation",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2016/0662a325/12OmNCga1N7",
"parentPublication": {
"id": "proceedings/icsc/2016/0662/0",
"title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percomw/2015/8425/0/07134102",
"title": "Gait, wrist, and sensors: Detecting freezing of gait in Parkinson's disease from wrist movement",
"doi": null,
"abstractUrl": "/proceedings-article/percomw/2015/07134102/12OmNyRxFuE",
"parentPublication": {
"id": "proceedings/percomw/2015/8425/0",
"title": "2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iri/2015/6656/0/6656a491",
"title": "A Low-Cost Haptic System for Wrist Rehabilitation",
"doi": null,
"abstractUrl": "/proceedings-article/iri/2015/6656a491/12OmNyS6RBf",
"parentPublication": {
"id": "proceedings/iri/2015/6656/0",
"title": "2015 IEEE International Conference on Information Reuse and Integration (IRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iswc/2010/9046/0/05665867",
"title": "Tactor placement in wrist worn wearables",
"doi": null,
"abstractUrl": "/proceedings-article/iswc/2010/05665867/12OmNz2TCzq",
"parentPublication": {
"id": "proceedings/iswc/2010/9046/0",
"title": "International Symposium on Wearable Computers (ISWC) 2010",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percomw/2018/3227/0/08480406",
"title": "Decoupling Screen Size and Gesture Size for Wrist Worn Devices",
"doi": null,
"abstractUrl": "/proceedings-article/percomw/2018/08480406/17D45WXIkGP",
"parentPublication": {
"id": "proceedings/percomw/2018/3227/0",
"title": "2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percomw/2018/3227/0/08480345",
"title": "Firearm Detection Using Wrist Worn Tri-Axis Accelerometer Signals",
"doi": null,
"abstractUrl": "/proceedings-article/percomw/2018/08480345/17D45Wc1IKs",
"parentPublication": {
"id": "proceedings/percomw/2018/3227/0",
"title": "2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itme/2022/1015/0/101500a131",
"title": "Design of Wrist Rehabilitation Robot",
"doi": null,
"abstractUrl": "/proceedings-article/itme/2022/101500a131/1M4runEn5cs",
"parentPublication": {
"id": "proceedings/itme/2022/1015/0",
"title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percom-workshops/2019/9151/0/08730581",
"title": "Wrist-Worn Capacitive Sensor for Activity and Physical Collaboration Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/percom-workshops/2019/08730581/1aDSzDtW34s",
"parentPublication": {
"id": "proceedings/percom-workshops/2019/9151/0",
"title": "2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percom-workshops/2021/0424/0/09430986",
"title": "WristO2: Reliable Peripheral Oxygen Saturation Readings from Wrist-Worn Pulse Oximeters",
"doi": null,
"abstractUrl": "/proceedings-article/percom-workshops/2021/09430986/1tROOUD6jJe",
"parentPublication": {
"id": "proceedings/percom-workshops/2021/0424/0",
"title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1FUSEgqo6oU",
"title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"acronym": "vl-hcc",
"groupId": "1001007",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1FUSGT8NCjS",
"doi": "10.1109/VL/HCC53370.2022.9833107",
"title": "Is Assertion Roulette still a test smell? An experiment from the perspective of testing education",
"normalizedTitle": "Is Assertion Roulette still a test smell? An experiment from the perspective of testing education",
"abstract": "Test smells are commonly perceived as having a negative impact on software maintainability and correctness. Research has shown that Assertion Roulette is the most pervasive smell in industrial and open-source systems. However, some recent studies argue that the impact of Assertion Roulette is not as severe as previously believed, and developers usually consider it acceptable.The controversy over the impact of Assertion Roulette also exists in the area of testing education. To assess the impact of Assertion Roulette, we conducted a controlled empirical study with 42 CS students. We recruited participants from two populations, CS1 and a graduate testing course, to see what role experience may have in terms of this test smell’s impact. Participants were tasked with implementing a project in Java that passes provided JUnit tests. Through analysis of student-authored source code, we measured the impact of Assertion Roulette using code quality measures and testing behavior measures. Our findings show that the impact of Assertion Roulette on students in this study was minimal. Though students with exposure to the test smell began testing significantly later, they performed similarly in terms of programming quality measures. Thus, it would seem the Assertion Roulette smell is no longer a smell at all, even for less experienced populations like students.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Test smells are commonly perceived as having a negative impact on software maintainability and correctness. Research has shown that Assertion Roulette is the most pervasive smell in industrial and open-source systems. However, some recent studies argue that the impact of Assertion Roulette is not as severe as previously believed, and developers usually consider it acceptable.The controversy over the impact of Assertion Roulette also exists in the area of testing education. To assess the impact of Assertion Roulette, we conducted a controlled empirical study with 42 CS students. We recruited participants from two populations, CS1 and a graduate testing course, to see what role experience may have in terms of this test smell’s impact. Participants were tasked with implementing a project in Java that passes provided JUnit tests. Through analysis of student-authored source code, we measured the impact of Assertion Roulette using code quality measures and testing behavior measures. Our findings show that the impact of Assertion Roulette on students in this study was minimal. Though students with exposure to the test smell began testing significantly later, they performed similarly in terms of programming quality measures. Thus, it would seem the Assertion Roulette smell is no longer a smell at all, even for less experienced populations like students.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Test smells are commonly perceived as having a negative impact on software maintainability and correctness. Research has shown that Assertion Roulette is the most pervasive smell in industrial and open-source systems. However, some recent studies argue that the impact of Assertion Roulette is not as severe as previously believed, and developers usually consider it acceptable.The controversy over the impact of Assertion Roulette also exists in the area of testing education. To assess the impact of Assertion Roulette, we conducted a controlled empirical study with 42 CS students. We recruited participants from two populations, CS1 and a graduate testing course, to see what role experience may have in terms of this test smell’s impact. Participants were tasked with implementing a project in Java that passes provided JUnit tests. Through analysis of student-authored source code, we measured the impact of Assertion Roulette using code quality measures and testing behavior measures. Our findings show that the impact of Assertion Roulette on students in this study was minimal. Though students with exposure to the test smell began testing significantly later, they performed similarly in terms of programming quality measures. Thus, it would seem the Assertion Roulette smell is no longer a smell at all, even for less experienced populations like students.",
"fno": "09833107",
"keywords": [
"Visualization",
"Codes",
"Atmospheric Measurements",
"Sociology",
"Particle Measurements",
"Statistics",
"Task Analysis",
"Test Smell",
"Assertion Roulette",
"Computer Science Education",
"Testing Education"
],
"authors": [
{
"affiliation": "North Carolina State University,Department of Computer Science",
"fullName": "Gina R. Bai",
"givenName": "Gina R.",
"surname": "Bai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "North Carolina State University,Department of Computer Science",
"fullName": "Kai Presler-Marshall",
"givenName": "Kai",
"surname": "Presler-Marshall",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Kent State University,Department of Sociology",
"fullName": "Susan R. Fisk",
"givenName": "Susan R.",
"surname": "Fisk",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "North Carolina State University,Department of Computer Science",
"fullName": "Kathryn T. Stolee",
"givenName": "Kathryn T.",
"surname": "Stolee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vl-hcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-09-01T00:00:00",
"pubType": "proceedings",
"pages": "1-7",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-4214-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09832962",
"articleId": "1FUSFGSHUxq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09832961",
"articleId": "1FUSJFbq2cg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icnisc/2016/8838/0/07945968",
"title": "Improved Roulette Wheel Selection-Based Genetic Algorithm for TSP",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2016/07945968/12OmNBtUdOR",
"parentPublication": {
"id": "proceedings/icnisc/2016/8838/0",
"title": "2016 International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2016/1790/0/07757598",
"title": "“Teaching is learning”: Pedagogical material created and evaluated by students",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2016/07757598/12OmNrMZpzn",
"parentPublication": {
"id": "proceedings/fie/2016/1790/0",
"title": "2016 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2013/5089/0/5089a099",
"title": "Olfactory Measurement System to Quantify the Ability to Smell Using Pulse Ejection",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2013/5089a099/12OmNvJXeDw",
"parentPublication": {
"id": "proceedings/ichi/2013/5089/0",
"title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2016/2020/0/07498369",
"title": "Using Memetic Algorithm for instance coreference resolution",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2016/07498369/12OmNwc3wAZ",
"parentPublication": {
"id": "proceedings/icde/2016/2020/0",
"title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2012/4976/0/06395007",
"title": "Equal-Width Partitioning Roulette Wheel Selection in Genetic Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2012/06395007/12OmNyjccB5",
"parentPublication": {
"id": "proceedings/taai/2012/4976/0",
"title": "2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2020/7081/0/708100a492",
"title": "An Improved Particle Swarm Optimization Algorithm Based on Entropy and Fitness of Particles",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2020/708100a492/1iERBVYnEMo",
"parentPublication": {
"id": "proceedings/icmtma/2020/7081/0",
"title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090573",
"title": "On the Usage of the Simulator Sickness Questionnaire for Virtual Reality Research",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090573/1jIxobU7Q3e",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-companion/2020/7122/0/712200a149",
"title": "An Empirical Study on the Evolution of Test Smell",
"doi": null,
"abstractUrl": "/proceedings-article/icse-companion/2020/712200a149/1pcSHVCglxK",
"parentPublication": {
"id": "proceedings/icse-companion/2020/7122/0",
"title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2020/8961/0/09274262",
"title": "The Effect of Motivation on Learners' Performance and Satisfaction under Flipped Strategy in Discrete Math",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2020/09274262/1phRx5e8ksE",
"parentPublication": {
"id": "proceedings/fie/2020/8961/0",
"title": "2020 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2020/8961/0/09274011",
"title": "Considerations in the development of a follow-up exploratory quantitative design for student's motivation regarding to work industry-related activities in higher engineering education",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2020/09274011/1phRzOaiI9i",
"parentPublication": {
"id": "proceedings/fie/2020/8961/0",
"title": "2020 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1iERzv8QOwU",
"title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"acronym": "icmtma",
"groupId": "1002837",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1iERBVYnEMo",
"doi": "10.1109/ICMTMA50254.2020.00112",
"title": "An Improved Particle Swarm Optimization Algorithm Based on Entropy and Fitness of Particles",
"normalizedTitle": "An Improved Particle Swarm Optimization Algorithm Based on Entropy and Fitness of Particles",
"abstract": "Particle swarm optimization (PSO) is an algorithmic technique for optimization by solving a wide range of optimization problem. This paper presents an improved PSO. The proposed algorithm consists of two parts. Firstly, population initialization method based on entropy is proposed. Secondly, an improved accelerated learning coefficient is proposed. In this algorithm, a modified velocity updating formula of the particle is used, where the randomness in the course of updating particle velocity and the acceleration coefficient is relatively decreased. The entropy of each dimension is calculated to decrease the randomness of swarm and increase population diversity. Each particle has a different learning rate according to its fitness during evolution, which can balance the global and local searching ability of the population and avoid falling into local optimum. Experimental results show that, the proposed algorithm remarkably improves the ability of PSO to jump out of the local optima and significantly enhance the convergence precision.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Particle swarm optimization (PSO) is an algorithmic technique for optimization by solving a wide range of optimization problem. This paper presents an improved PSO. The proposed algorithm consists of two parts. Firstly, population initialization method based on entropy is proposed. Secondly, an improved accelerated learning coefficient is proposed. In this algorithm, a modified velocity updating formula of the particle is used, where the randomness in the course of updating particle velocity and the acceleration coefficient is relatively decreased. The entropy of each dimension is calculated to decrease the randomness of swarm and increase population diversity. Each particle has a different learning rate according to its fitness during evolution, which can balance the global and local searching ability of the population and avoid falling into local optimum. Experimental results show that, the proposed algorithm remarkably improves the ability of PSO to jump out of the local optima and significantly enhance the convergence precision.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Particle swarm optimization (PSO) is an algorithmic technique for optimization by solving a wide range of optimization problem. This paper presents an improved PSO. The proposed algorithm consists of two parts. Firstly, population initialization method based on entropy is proposed. Secondly, an improved accelerated learning coefficient is proposed. In this algorithm, a modified velocity updating formula of the particle is used, where the randomness in the course of updating particle velocity and the acceleration coefficient is relatively decreased. The entropy of each dimension is calculated to decrease the randomness of swarm and increase population diversity. Each particle has a different learning rate according to its fitness during evolution, which can balance the global and local searching ability of the population and avoid falling into local optimum. Experimental results show that, the proposed algorithm remarkably improves the ability of PSO to jump out of the local optima and significantly enhance the convergence precision.",
"fno": "708100a492",
"keywords": [
"Convergence",
"Entropy",
"Particle Swarm Optimisation",
"Random Processes",
"Search Problems",
"Improved PSO",
"Population Initialization Method",
"Improved Accelerated Learning Coefficient",
"Modified Velocity Updating Formula",
"Particle Velocity",
"Acceleration Coefficient",
"Population Diversity",
"Improved Particle Swarm Optimization Algorithm",
"Algorithmic Technique",
"Particle Swarm Optimization",
"Entropy",
"Randomness",
"Learning Rate",
"Convergence Precision",
"Mechatronics",
"Automation",
"Atmospheric Measurements",
"Sociology",
"Particle Measurements",
"Entropy",
"Statistics",
"Particle Swarm Optimization",
"Initialization Population Based On Entropy",
"Acceleration Coefficient"
],
"authors": [
{
"affiliation": "Qujing Normal College",
"fullName": "Huafen Yang",
"givenName": "Huafen",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Qujing Normal College",
"fullName": "Yong Li",
"givenName": "Yong",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Qujing Normal College",
"fullName": "Lihua Yang",
"givenName": "Lihua",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Qujing Normal College",
"fullName": "Qian Wu",
"givenName": "Qian",
"surname": "Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmtma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-02-01T00:00:00",
"pubType": "proceedings",
"pages": "492-496",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7081-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "708100a488",
"articleId": "1iERCNPCMXm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "708100a497",
"articleId": "1iERLQueFG0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iita/2009/3859/2/3859b336",
"title": "Particle Swarm Optimization with Hybrid Velocity Updating Strategies",
"doi": null,
"abstractUrl": "/proceedings-article/iita/2009/3859b336/12OmNwIHorN",
"parentPublication": {
"id": "proceedings/iita/2009/3859/2",
"title": "2009 Third International Symposium on Intelligent Information Technology Application",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esiat/2009/3682/3/3682c645",
"title": "A Parallel Chaos Particle Swarm Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/esiat/2009/3682c645/12OmNxGALgq",
"parentPublication": {
"id": "proceedings/esiat/2009/3682/3",
"title": "Environmental Science and Information Application Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isai/2016/1585/0/1585a432",
"title": "A Modified Particle Swarm Optimization Algorithm Using Uniform Design",
"doi": null,
"abstractUrl": "/proceedings-article/isai/2016/1585a432/12OmNy2agSe",
"parentPublication": {
"id": "proceedings/isai/2016/1585/0",
"title": "2016 International Conference on Information System and Artificial Intelligence (ISAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsee/2012/4647/1/4647a545",
"title": "A Novel Hybrid Differential Evolution and Particle Swarm Optimization Algorithm for Binary CSPs",
"doi": null,
"abstractUrl": "/proceedings-article/iccsee/2012/4647a545/12OmNyQGS4k",
"parentPublication": {
"id": "proceedings/iccsee/2012/4647/2",
"title": "Computer Science and Electronics Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iih-msp/2007/2994/2/29940346",
"title": "A Modified Particle Swarm Optimization Algorithm with Dynamic Adaptive",
"doi": null,
"abstractUrl": "/proceedings-article/iih-msp/2007/29940346/12OmNyoAA3W",
"parentPublication": {
"id": "proceedings/iih-msp/2007/2994/2",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cason/2010/4202/0/4202a023",
"title": "Particle Swarm Optimization Based on Self-organizing Topology Driven by Fitness",
"doi": null,
"abstractUrl": "/proceedings-article/cason/2010/4202a023/12OmNzWfpaK",
"parentPublication": {
"id": "proceedings/cason/2010/4202/0",
"title": "Computational Aspects of Social Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2012/4893/0/4893a113",
"title": "Parameter Identification of Nonlinear Systems Using a Particle Swarm Optimization Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2012/4893a113/12OmNzcxZmu",
"parentPublication": {
"id": "proceedings/icnc/2012/4893/0",
"title": "2012 Third International Conference on Networking and Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciicii/2017/2434/0/2434a266",
"title": "Particle Swarm Optimization with Gaussian Disturbance",
"doi": null,
"abstractUrl": "/proceedings-article/iciicii/2017/2434a266/12OmNzwpUeR",
"parentPublication": {
"id": "proceedings/iciicii/2017/2434/0",
"title": "2017 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2018/06/07919205",
"title": "A Grouping Particle Swarm Optimizer with Personal-Best-Position Guidance for Large Scale Optimization",
"doi": null,
"abstractUrl": "/journal/tb/2018/06/07919205/17D45VsBU6X",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2022/4627/0/462700a336",
"title": "A particle swarm optimization with fitness-distance balance strategy",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2022/462700a336/1M9pXtetGbm",
"parentPublication": {
"id": "proceedings/cis/2022/4627/0",
"title": "2022 18th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G9DtzCwrjW",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G9DSLVRz1K",
"doi": "10.1109/ICME52920.2022.9859600",
"title": "Source-ID-Tracker: Source Face Identity Protection in Face Swapping",
"normalizedTitle": "Source-ID-Tracker: Source Face Identity Protection in Face Swapping",
"abstract": "Swapping faces with deep learning technology to generate realistic fake videos/images (a.k.a, deepfakes) has drawn great public con-cerns recently. Numerous approaches have been proposed to iden-tify fake contents; however, less work has been dedicated to pro-tecting the source faces in an active way. In this paper, we stand for a legitimate faceswap service provider and present an approach called Source-ID- Tracker (SIDT), which aims to protect the identity of source faces in deepfakes from malicious uses. As a plug-in, the encoder of SIDT implicitly embeds a source face image into a deep-fake image while ensuring the resultant encoded image is visually indistinguishable from the deepfake image. After sharing through social media, the embedded source face and its identity can still be recovered with a decoder. Experimental results show that the pro-posed model achieves a promising performance, in terms of reconstruction quality and attribution inference accuracy, in revealing the hidden source face.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Swapping faces with deep learning technology to generate realistic fake videos/images (a.k.a, deepfakes) has drawn great public con-cerns recently. Numerous approaches have been proposed to iden-tify fake contents; however, less work has been dedicated to pro-tecting the source faces in an active way. In this paper, we stand for a legitimate faceswap service provider and present an approach called Source-ID- Tracker (SIDT), which aims to protect the identity of source faces in deepfakes from malicious uses. As a plug-in, the encoder of SIDT implicitly embeds a source face image into a deep-fake image while ensuring the resultant encoded image is visually indistinguishable from the deepfake image. After sharing through social media, the embedded source face and its identity can still be recovered with a decoder. Experimental results show that the pro-posed model achieves a promising performance, in terms of reconstruction quality and attribution inference accuracy, in revealing the hidden source face.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Swapping faces with deep learning technology to generate realistic fake videos/images (a.k.a, deepfakes) has drawn great public con-cerns recently. Numerous approaches have been proposed to iden-tify fake contents; however, less work has been dedicated to pro-tecting the source faces in an active way. In this paper, we stand for a legitimate faceswap service provider and present an approach called Source-ID- Tracker (SIDT), which aims to protect the identity of source faces in deepfakes from malicious uses. As a plug-in, the encoder of SIDT implicitly embeds a source face image into a deep-fake image while ensuring the resultant encoded image is visually indistinguishable from the deepfake image. After sharing through social media, the embedded source face and its identity can still be recovered with a decoder. Experimental results show that the pro-posed model achieves a promising performance, in terms of reconstruction quality and attribution inference accuracy, in revealing the hidden source face.",
"fno": "09859600",
"keywords": [
"Deep Learning Artificial Intelligence",
"Video Codecs",
"Video Coding",
"SIDT",
"Source Face Image",
"Resultant Encoded Image",
"Deepfake Image",
"Embedded Source Face",
"Hidden Source Face",
"Source ID Tracker",
"Source Face Identity Protection",
"Face Swapping",
"Deep Learning Technology",
"Fake Contents",
"Legitimate Faceswap Service Provider",
"Source ID Tracker",
"Deep Learning",
"Deepfakes",
"Visualization",
"Social Networking Online",
"Pipelines",
"Streaming Media",
"Decoding",
"Face Swapping",
"Active Protection",
"Face Recovery"
],
"authors": [
{
"affiliation": "Shenzhen University,Guangdong Key Lab of Intelligent Information Processing, Shenzhen Key Lab of Media Security,Shenzhen,China",
"fullName": "Yuzhen Lin",
"givenName": "Yuzhen",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shenzhen University,Guangdong Key Lab of Intelligent Information Processing, Shenzhen Key Lab of Media Security,Shenzhen,China",
"fullName": "Han Chen",
"givenName": "Han",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Electronics and Mechanical Engineering, Roma Tre University,Department of Industrial,Rome,Italy",
"fullName": "Emanuele Maiorana",
"givenName": "Emanuele",
"surname": "Maiorana",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Electronics and Mechanical Engineering, Roma Tre University,Department of Industrial,Rome,Italy",
"fullName": "Patrizio Campisi",
"givenName": "Patrizio",
"surname": "Campisi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shenzhen University,Guangdong Key Lab of Intelligent Information Processing, Shenzhen Key Lab of Media Security,Shenzhen,China",
"fullName": "Bin Li",
"givenName": "Bin",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8563-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09859632",
"articleId": "1G9Eys1sYog",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09859610",
"articleId": "1G9EdGX4rx6",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvprw/2022/8739/0/873900c857",
"title": "DeSI: Deepfake Source Identifier for Social Media",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900c857/1G56tLpS2A0",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mipr/2022/9548/0/954800a210",
"title": "Detection-by-Simulation: Exposing DeepFake via Simulating Forgery using Face Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/mipr/2022/954800a210/1GvdbaUBuG4",
"parentPublication": {
"id": "proceedings/mipr/2022/9548/0",
"title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600h622",
"title": "Region-Aware Face Swapping",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600h622/1H0N5YS0poI",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600o4900",
"title": "DeepFake Disrupter: The Detector of DeepFake Is My Friend",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600o4900/1H1lQVg6sGQ",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956052",
"title": "Aggregating Layers for Deepfake Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956052/1IHoXijlV4s",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956520",
"title": "Evading Deepfake Detectors via High Quality Face Pre-Processing Methods",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956520/1IHqc3ZvLUY",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/5555/01/10035845",
"title": "Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack",
"doi": null,
"abstractUrl": "/journal/tq/5555/01/10035845/1KrcdrD92gg",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600b369",
"title": "My Face My Choice: Privacy Enhancing Deepfakes for Social Media Anonymization",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600b369/1KxVw2QcxTa",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005683",
"title": "Classifying Genuine Face images from Disguised Face Images",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005683/1hJsdSd6AdG",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428173",
"title": "Visually Maintained Image Disturbance Against Deepfake Face Swapping",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428173/1uilYBaJuCY",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H0Ncx9nVbW",
"doi": "10.1109/CVPR52688.2022.00395",
"title": "Pix2NeRF: Unsupervised Conditional <tex>Z_$\\pi$_Z</tex>-GAN for Single Image to Neural Radiance Fields Translation",
"normalizedTitle": "Pix2NeRF: Unsupervised Conditional --GAN for Single Image to Neural Radiance Fields Translation",
"abstract": "We propose a pipeline to generate Neural Radiance Fields (NeRF) of an object or a scene of a specific class, conditioned on a single input image. This is a challenging task, as training NeRF requires multiple views of the same scene, coupled with corresponding poses, which are hard to obtain. Our method is based on <tex>Z_$\\pi$_Z</tex>-GAN, a generative model for unconditional 3D-aware image synthesis, which maps random latent codes to radiance fields of a class of objects. We jointly optimize (1) the <tex>Z_$\\pi$_Z</tex>-GAN objective to utilize its high-fidelity 3D-aware generation and (2) a carefully designed reconstruction objective. The latter includes an encoder coupled with <tex>Z_$\\pi$_Z</tex>-GAN generator to form an autoencoder. Unlike previous few-shot NeRF approaches, our pipeline is unsupervised, capable of being trained with independent images without 3D, multi-view, or pose supervision. Applications of our pipeline include 3d avatar generation, object-centric novel view synthesis with a single input image, and 3d-aware super-resolution, to name a few.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We propose a pipeline to generate Neural Radiance Fields (NeRF) of an object or a scene of a specific class, conditioned on a single input image. This is a challenging task, as training NeRF requires multiple views of the same scene, coupled with corresponding poses, which are hard to obtain. Our method is based on <tex>$\\pi$</tex>-GAN, a generative model for unconditional 3D-aware image synthesis, which maps random latent codes to radiance fields of a class of objects. We jointly optimize (1) the <tex>$\\pi$</tex>-GAN objective to utilize its high-fidelity 3D-aware generation and (2) a carefully designed reconstruction objective. The latter includes an encoder coupled with <tex>$\\pi$</tex>-GAN generator to form an autoencoder. Unlike previous few-shot NeRF approaches, our pipeline is unsupervised, capable of being trained with independent images without 3D, multi-view, or pose supervision. Applications of our pipeline include 3d avatar generation, object-centric novel view synthesis with a single input image, and 3d-aware super-resolution, to name a few.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We propose a pipeline to generate Neural Radiance Fields (NeRF) of an object or a scene of a specific class, conditioned on a single input image. This is a challenging task, as training NeRF requires multiple views of the same scene, coupled with corresponding poses, which are hard to obtain. Our method is based on --GAN, a generative model for unconditional 3D-aware image synthesis, which maps random latent codes to radiance fields of a class of objects. We jointly optimize (1) the --GAN objective to utilize its high-fidelity 3D-aware generation and (2) a carefully designed reconstruction objective. The latter includes an encoder coupled with --GAN generator to form an autoencoder. Unlike previous few-shot NeRF approaches, our pipeline is unsupervised, capable of being trained with independent images without 3D, multi-view, or pose supervision. Applications of our pipeline include 3d avatar generation, object-centric novel view synthesis with a single input image, and 3d-aware super-resolution, to name a few.",
"fno": "694600d971",
"keywords": [
"Avatars",
"Image Motion Analysis",
"Image Reconstruction",
"Image Resolution",
"Learning Artificial Intelligence",
"Solid Modelling",
"3 D Aware Super Resolution",
"Pix 2 Ne RF",
"Unsupervised Conditional Pi GAN",
"Single Image",
"Neural Radiance Fields Translation",
"Pipeline",
"Single Input Image",
"Training Ne RF",
"Corresponding Poses",
"Generative Model",
"3 D Aware Image Synthesis",
"Maps Random Latent Codes",
"Pi GAN Objective",
"High Fidelity 3 D Aware Generation",
"Carefully Designed Reconstruction Objective",
"Pi GAN Generator",
"Ne RF Approaches",
"Independent Images",
"3 D Avatar Generation",
"Object Centric Novel View Synthesis",
"Training",
"Visualization",
"Three Dimensional Displays",
"Social Networking Online",
"Pipelines",
"Superresolution",
"Computer Architecture"
],
"authors": [
{
"affiliation": "ETH Zürich",
"fullName": "Shengqu Cai",
"givenName": "Shengqu",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich",
"fullName": "Anton Obukhov",
"givenName": "Anton",
"surname": "Obukhov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MPI for Informatics ETH Zürich",
"fullName": "Dengxin Dai",
"givenName": "Dengxin",
"surname": "Dai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich KU Leuven",
"fullName": "Luc Van Gool",
"givenName": "Luc",
"surname": "Van Gool",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "3971-3980",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1H0Nctv9Cww",
"name": "pcvpr202269460-09878703s1-mm_694600d971.zip",
"size": "3.28 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09878703s1-mm_694600d971.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "694600d961",
"articleId": "1H1iQTjcfEA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600d981",
"articleId": "1H0KHmQGhEs",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200g331",
"title": "GNeRF: GAN-based Neural Radiance Field without Posed Camera",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g331/1BmJQBF2gCI",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f753",
"title": "Editing Conditional Radiance Fields",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f753/1BmLkbx0k6c",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iotdi/2022/9641/0/964100a156",
"title": "<tex>Z_$\\pi$_Z</tex>-Configurator: Enabling Efficient Configuration of Pipelined Applications on the Edge",
"doi": null,
"abstractUrl": "/proceedings-article/iotdi/2022/964100a156/1ErrbbTWBVu",
"parentPublication": {
"id": "proceedings/iotdi/2022/9641/0",
"title": "2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600s8366",
"title": "AR-NeRF: Unsupervised Learning of Depth and Defocus Effects from Natural Images with Aperture Rendering Neural Radiance Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600s8366/1H1jJ8eYZCo",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600f428",
"title": "Point-NeRF: Point-based Neural Radiance Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600f428/1H1mrGLgvra",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/09944955",
"title": "<inline-formula><tex-math notation=\"LaTeX\">Z_$kt$_Z</tex-math></inline-formula>-Safety: Graph Release via <inline-formula><tex-math notation=\"LaTeX\">Z_$k$_Z</tex-math></inline-formula>-Anonymity and <inline-formula><tex-math notation=\"LaTeX\">Z_$t$_Z</tex-math></inline-formula>-Closeness",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/09944955/1IbM9dSufYI",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600c966",
"title": "3D GAN Inversion with Pose Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600c966/1L8quvqCEhO",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600a724",
"title": "CG-NeRF: Conditional Generative Neural Radiance Fields for 3D-aware Image Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600a724/1LiO7xF1g6A",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ec/5555/01/10122516",
"title": "D <inline-formula><tex-math notation=\"LaTeX\">Z_$i$_Z</tex-math></inline-formula> E<inline-formula><tex-math notation=\"LaTeX\">Z_$v$_Z</tex-math></inline-formula>D: Disruptive Event Detection from Dynamic Datastreams using Continual Machine Learning: A Case Study with Twitter",
"doi": null,
"abstractUrl": "/journal/ec/5555/01/10122516/1N0sCe7Jmg0",
"parentPublication": {
"id": "trans/ec",
"title": "IEEE Transactions on Emerging Topics in Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900f795",
"title": "pi-GAN: Periodic Implicit Generative Adversarial Networks for 3D-Aware Image Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900f795/1yeHLCAKNVu",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KfQshha0dW",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "10020192",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KfSe5Vmi88",
"doi": "10.1109/BigData55660.2022.10020314",
"title": "Pre-train Graph Neural Networks for Brain Network Analysis (Extended Abstract)",
"normalizedTitle": "Pre-train Graph Neural Networks for Brain Network Analysis (Extended Abstract)",
"abstract": "Human brains, controlling behaviors and cognition, are at the center of complex neurobiological systems. Recent studies in neuroscience and neuroimaging analysis have reached a consensus that interactions among brain regions of interest (ROIs) are driving factors for neural development and disorders. Graph neural networks (GNNs) as a powerful tool for analyzing graph-structured data are naturally applied to the analysis of brain networks. However, training of deep learning models including GNNs often requires a significant amount of labeled data. Due to the complicated data acquisition process and restrictions on data sharing, brain network datasets are still small compared to other types of graphs (e.g., social networks, molecules, proteins). Moreover, real clinical tasks (e.g., mental disorder analysis) are often conducted on local datasets with even smaller scales and larger noises. To this end, we propose to leverage pre-training to capture the intrinsic brain network structures regardless of specific clinical outcomes, for obtaining GNN models that are easily adaptable to downstream tasks. Specifically, (1) we design brain-network-oriented unsupervised pre-training techniques to utilize large-scale brain imaging studies without highly relevant task labels; (2) we develop a data-driven parcellation atlas mapping pipeline to facilitate effective knowledge transfer across studies with different ROI systems. The proposed framework is validated with various GNN models, with extensive empirical results demonstrating consistent improvement in performance as well as robustness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Human brains, controlling behaviors and cognition, are at the center of complex neurobiological systems. Recent studies in neuroscience and neuroimaging analysis have reached a consensus that interactions among brain regions of interest (ROIs) are driving factors for neural development and disorders. Graph neural networks (GNNs) as a powerful tool for analyzing graph-structured data are naturally applied to the analysis of brain networks. However, training of deep learning models including GNNs often requires a significant amount of labeled data. Due to the complicated data acquisition process and restrictions on data sharing, brain network datasets are still small compared to other types of graphs (e.g., social networks, molecules, proteins). Moreover, real clinical tasks (e.g., mental disorder analysis) are often conducted on local datasets with even smaller scales and larger noises. To this end, we propose to leverage pre-training to capture the intrinsic brain network structures regardless of specific clinical outcomes, for obtaining GNN models that are easily adaptable to downstream tasks. Specifically, (1) we design brain-network-oriented unsupervised pre-training techniques to utilize large-scale brain imaging studies without highly relevant task labels; (2) we develop a data-driven parcellation atlas mapping pipeline to facilitate effective knowledge transfer across studies with different ROI systems. The proposed framework is validated with various GNN models, with extensive empirical results demonstrating consistent improvement in performance as well as robustness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Human brains, controlling behaviors and cognition, are at the center of complex neurobiological systems. Recent studies in neuroscience and neuroimaging analysis have reached a consensus that interactions among brain regions of interest (ROIs) are driving factors for neural development and disorders. Graph neural networks (GNNs) as a powerful tool for analyzing graph-structured data are naturally applied to the analysis of brain networks. However, training of deep learning models including GNNs often requires a significant amount of labeled data. Due to the complicated data acquisition process and restrictions on data sharing, brain network datasets are still small compared to other types of graphs (e.g., social networks, molecules, proteins). Moreover, real clinical tasks (e.g., mental disorder analysis) are often conducted on local datasets with even smaller scales and larger noises. To this end, we propose to leverage pre-training to capture the intrinsic brain network structures regardless of specific clinical outcomes, for obtaining GNN models that are easily adaptable to downstream tasks. Specifically, (1) we design brain-network-oriented unsupervised pre-training techniques to utilize large-scale brain imaging studies without highly relevant task labels; (2) we develop a data-driven parcellation atlas mapping pipeline to facilitate effective knowledge transfer across studies with different ROI systems. The proposed framework is validated with various GNN models, with extensive empirical results demonstrating consistent improvement in performance as well as robustness.",
"fno": "10020314",
"keywords": [
"Biomedical MRI",
"Brain",
"Data Acquisition",
"Data Analysis",
"Graph Theory",
"Learning Artificial Intelligence",
"Medical Image Processing",
"Neural Nets",
"Neurophysiology",
"Brain Network Analysis",
"Brain Network Datasets",
"Brain Networks",
"Brain Regions",
"Brain Network Oriented Unsupervised Pre Training Techniques",
"Complicated Data Acquisition Process",
"Data Sharing",
"Data Driven Parcellation",
"Disorders",
"Graph Structured Data",
"Human Brains",
"Intrinsic Brain Network Structures",
"Large Scale Brain Imaging Studies",
"Leverage Pre Training",
"Mental Disorder Analysis",
"Neural Development",
"Neuroimaging Analysis",
"Pre Train Graph Neural Networks",
"Proteins",
"Neuroimaging",
"Training",
"Proteins",
"Social Networking Online",
"Pipelines",
"Big Data",
"Brain Modeling",
"Brain Network Analysis",
"Pre Training",
"GNN"
],
"authors": [
{
"affiliation": "Emory University,Department of Computer Science,Atlanta,GA,United States",
"fullName": "Yi Yang",
"givenName": "Yi",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Emory University,Department of Computer Science,Atlanta,GA,United States",
"fullName": "Hejie Cui",
"givenName": "Hejie",
"surname": "Cui",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Emory University,Department of Computer Science,Atlanta,GA,United States",
"fullName": "Carl Yang",
"givenName": "Carl",
"surname": "Yang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "4993-4994",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "10020662",
"articleId": "1KfRfxx1ApW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "10020955",
"articleId": "1KfS1ySJjEc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/big-data/2021/3902/0/09671402",
"title": "Improving Brain Dysfunction Prediction by GAN: A Functional-Connectivity Generator Approach",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671402/1A8gOxcpdD2",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09903566",
"title": "Graph Neural Networks in Network Neuroscience",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09903566/1GZogth7KFy",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09994963",
"title": "BrainVGAE: End-to-End Graph Neural Networks for Noisy fMRI Dataset",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09994963/1JC2Pa2luPS",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020862",
"title": "Transformer-Based Hierarchical Clustering for Brain Network Analysis (Extended Abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020862/1KfRcnEX2vK",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020640",
"title": "Comparing Shallow and Deep Graph Models for Brain Network Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020640/1KfRj2Rw2Yw",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020992",
"title": "BrainGB: A Benchmark for Brain Network Analysis with Graph Neural Networks (Extended Abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020992/1KfRvhc2qQM",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020955",
"title": "Learning Task-Aware Effective Brain Connectivity for fMRI Analysis with Graph Neural Networks (Extended Abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020955/1KfS1ySJjEc",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2020/9574/0/957400b065",
"title": "BPARC: A novel spatio-temporal (4D) data-driven brain parcellation scheme based on deep residual networks",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2020/957400b065/1pBMmIZzgRO",
"parentPublication": {
"id": "proceedings/bibe/2020/9574/0",
"title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313316",
"title": "Academic journal recommendation for human neuroimaging studies via brain activation-based filtering",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313316/1qmg9gZrr1u",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/03/09540311",
"title": "Eigen-GNN: A Graph Structure Preserving Plug-in for GNNs",
"doi": null,
"abstractUrl": "/journal/tk/2023/03/09540311/1wWCbkQuLrG",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyqRneg",
"title": "2010 IEEE Symposium on Visual Analytics Science and Technology",
"acronym": "vast",
"groupId": "1001630",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "1iCAmnTV5Uk",
"doi": "10.1109/VAST.2010.5649054",
"title": "VAST 2010 Challenge: Arms dealings and pandemics",
"normalizedTitle": "VAST 2010 Challenge: Arms dealings and pandemics",
"abstract": "The 5<sup>th</sup> VAST Challenge consisted of three mini-challenges that involved both intelligence analysis and bioinformatics. Teams could solve one, two or all three mini-challenges and assess the overall situation to enter the Grand Challenge. Mini-challenge one involved text reports about people and events giving information about arms dealers, situations in various countries and linkages between different countries. Mini-challenge two involved hospital admission and death records from various countries providing information about the spread of a world wide pandemic. Mini-challenge three involved genetic data to be used to identify the origin of the pandemic and the most dangerous viral mutations. The Grand Challenge was to determine how these various mini-challenges were connected. As always the goal was to analyze the data and provide novel interactive visualizations useful in the analytic process. We received 58 submissions in total and gave 15 awards.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The 5<sup>th</sup> VAST Challenge consisted of three mini-challenges that involved both intelligence analysis and bioinformatics. Teams could solve one, two or all three mini-challenges and assess the overall situation to enter the Grand Challenge. Mini-challenge one involved text reports about people and events giving information about arms dealers, situations in various countries and linkages between different countries. Mini-challenge two involved hospital admission and death records from various countries providing information about the spread of a world wide pandemic. Mini-challenge three involved genetic data to be used to identify the origin of the pandemic and the most dangerous viral mutations. The Grand Challenge was to determine how these various mini-challenges were connected. As always the goal was to analyze the data and provide novel interactive visualizations useful in the analytic process. We received 58 submissions in total and gave 15 awards.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The 5th VAST Challenge consisted of three mini-challenges that involved both intelligence analysis and bioinformatics. Teams could solve one, two or all three mini-challenges and assess the overall situation to enter the Grand Challenge. Mini-challenge one involved text reports about people and events giving information about arms dealers, situations in various countries and linkages between different countries. Mini-challenge two involved hospital admission and death records from various countries providing information about the spread of a world wide pandemic. Mini-challenge three involved genetic data to be used to identify the origin of the pandemic and the most dangerous viral mutations. The Grand Challenge was to determine how these various mini-challenges were connected. As always the goal was to analyze the data and provide novel interactive visualizations useful in the analytic process. We received 58 submissions in total and gave 15 awards.",
"fno": "05649054",
"keywords": [
"Bioinformatics",
"Data Analysis",
"Medical Administrative Data Processing",
"Weapons",
"VAST 2010 Challenge",
"Arms Dealings",
"Pandemics",
"Intelligence Analysis",
"Bioinformatics",
"Grand Challenge",
"Minichallenge",
"Text Reports",
"Hospital Admission",
"Death Records",
"Genetic Data",
"Dangerous Viral Mutations",
"Interactive Visualizations",
"Data Visualization",
"Pandemics",
"Genetics",
"Task Analysis",
"Visual Analytics",
"Social Networking Online",
"Software",
"Visual Analytics",
"Human Information Interaction",
"Sense Making",
"Evaluation",
"Metrics",
"Contest"
],
"authors": [
{
"affiliation": "University of Massachusetts Lowell",
"fullName": "Georges Grinstein",
"givenName": "Georges",
"surname": "Grinstein",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Massachusetts Lowell",
"fullName": "Shawn Konecni",
"givenName": "Shawn",
"surname": "Konecni",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Maryland",
"fullName": "Catherine Plaisant",
"givenName": "Catherine",
"surname": "Plaisant",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pacific Northwest National Laboratory",
"fullName": "Jean Scholtz",
"givenName": "Jean",
"surname": "Scholtz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pacific Northwest National Laboratory",
"fullName": "Mark Whiting",
"givenName": "Mark",
"surname": "Whiting",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vast",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "263-264",
"year": "2010",
"issn": null,
"isbn": "978-1-4244-9488-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05649074",
"articleId": "12OmNApu5vH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05651204",
"articleId": "1eof34V7mPS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vast/2014/6227/0/07042536",
"title": "VAST challenge 2014: The Kronos incident",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2014/07042536/12OmNscOUhM",
"parentPublication": {
"id": "proceedings/vast/2014/6227/0",
"title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2014/6227/0/07042574",
"title": "VAST 2014: Summary on Mini Challenge 3 work",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2014/07042574/12OmNvDI3Rg",
"parentPublication": {
"id": "proceedings/vast/2014/6227/0",
"title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2015/9783/0/07347638",
"title": "VAST Challenge 2015: Mayhem at dinofun world",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2015/07347638/12OmNvs4vol",
"parentPublication": {
"id": "proceedings/vast/2015/9783/0",
"title": "2015 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2012/4752/0/06400529",
"title": "VAST Challenge 2012: Visual analytics for big data",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2012/06400529/12OmNwlqhST",
"parentPublication": {
"id": "proceedings/vast/2012/4752/0",
"title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2017/3163/0/08585503",
"title": "VAST Challenge 2017: Mystery at the Wildlife Preserve",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2017/08585503/17D45WHONqn",
"parentPublication": {
"id": "proceedings/vast/2017/3163/0",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2017/3163/0/08585677",
"title": "VAST Mini-Challenge 1",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2017/08585677/17D45WK5Aox",
"parentPublication": {
"id": "proceedings/vast/2017/3163/0",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2017/3163/0/08585461",
"title": "VAST Challenge 2017: Mini-challenge 1",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2017/08585461/17D45XfSET1",
"parentPublication": {
"id": "proceedings/vast/2017/3163/0",
"title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2018/6861/0/08802465",
"title": "VAST Challenge 2018: Suspense at the Wildlife Preserve",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2018/08802465/1cJ6Xt2YBRS",
"parentPublication": {
"id": "proceedings/vast/2018/6861/0",
"title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2010/9488/0/05653042",
"title": "Data ingestion and evidence marshalling in Jigsaw VAST 2010 Mini Challenge 1 award: Good support for data ingest",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2010/05653042/1eof2WlsGd2",
"parentPublication": {
"id": "proceedings/vast/2010/9488/0",
"title": "2010 IEEE Symposium on Visual Analytics Science and Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2022/04/09463738",
"title": "VAST 2020 Contest Challenge: GraphMatchMaker—Visual Analytics for Graph Comparison and Matching",
"doi": null,
"abstractUrl": "/magazine/cg/2022/04/09463738/1uFxpjx356w",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrAdsts",
"title": "Proceedings of HCC 2001. IEEE Symposium on Human-Centric Computing Languages and Environments",
"acronym": "hcc",
"groupId": "1000339",
"volume": "0",
"displayVolume": "0",
"year": "2001",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBTs7D9",
"doi": "10.1109/HCC.2001.995230",
"title": "Shapely hierarchical graph transformation",
"normalizedTitle": "Shapely hierarchical graph transformation",
"abstract": "Diagrams can be represented by graphs, and the animation and transformation of diagrams can be modeled by graph transformation. This paper studies extensions of graphs and graph transformation that are important for programming with graphs: /spl middot/ We extend graphs by a notion of hierarchy that supports value composition, and define hierarchical graph transformation in an intuitive way that resembles term rewriting. /spl middot/ We require that admissable shapes for hierarchical graphs are specified by context free graph grammars, in order to set up a type discipline for shapely hierarchical graph transformation. The resulting computational model shall be the basis of the visual language DIAPLAN for programming with graphs that represent diagrams.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Diagrams can be represented by graphs, and the animation and transformation of diagrams can be modeled by graph transformation. This paper studies extensions of graphs and graph transformation that are important for programming with graphs: /spl middot/ We extend graphs by a notion of hierarchy that supports value composition, and define hierarchical graph transformation in an intuitive way that resembles term rewriting. /spl middot/ We require that admissable shapes for hierarchical graphs are specified by context free graph grammars, in order to set up a type discipline for shapely hierarchical graph transformation. The resulting computational model shall be the basis of the visual language DIAPLAN for programming with graphs that represent diagrams.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Diagrams can be represented by graphs, and the animation and transformation of diagrams can be modeled by graph transformation. This paper studies extensions of graphs and graph transformation that are important for programming with graphs: /spl middot/ We extend graphs by a notion of hierarchy that supports value composition, and define hierarchical graph transformation in an intuitive way that resembles term rewriting. /spl middot/ We require that admissable shapes for hierarchical graphs are specified by context free graph grammars, in order to set up a type discipline for shapely hierarchical graph transformation. The resulting computational model shall be the basis of the visual language DIAPLAN for programming with graphs that represent diagrams.",
"fno": "00995230",
"keywords": [
"Graph Grammars",
"Rewriting Systems",
"Visual Languages",
"Graphs",
"Graph Transformation",
"Computational Model",
"Visual Language",
"DIAPLAN",
"Programming With Graphs",
"Graph Grammars",
"Context Free Grammars",
"Term Rewriting",
"Shape",
"Unified Modeling Language",
"Computational Modeling",
"Computer Science",
"Labeling",
"Vocabulary"
],
"authors": [
{
"affiliation": "Technologiezentrum Informatik, Bremen Univ., Germany",
"fullName": "B. Hoffmann",
"givenName": "B.",
"surname": "Hoffmann",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2001-01-01T00:00:00",
"pubType": "proceedings",
"pages": "30,31,32,33,34,35,36,37",
"year": "2001",
"issn": null,
"isbn": "0-7803-7198-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00995229",
"articleId": "12OmNzkMlMf",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00995231",
"articleId": "12OmNrkT7Hj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsoft-pt/2014/8079/0/07292569",
"title": "Propagating model refactorings to graph transformation rules",
"doi": null,
"abstractUrl": "/proceedings-article/icsoft-pt/2014/07292569/12OmNBh8gUy",
"parentPublication": {
"id": "proceedings/icsoft-pt/2014/8079/0",
"title": "2014 9th International Conference on Software Paradigm Trends (ICSOFT-PT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iri/2018/2659/0/265901a511",
"title": "A Graph Transformation Approach to Generate Analysable Maude Specifications from UML Interaction Overview Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/iri/2018/265901a511/12OmNvSbBLI",
"parentPublication": {
"id": "proceedings/iri/2018/2659/0",
"title": "2018 IEEE International Conference on Information Reuse and Integration (IRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2008/2357/0/04594644",
"title": "A software environment for practical graph applications",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2008/04594644/12OmNwDACxJ",
"parentPublication": {
"id": "proceedings/cit/2008/2357/0",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icctd/2009/3892/1/3892a201",
"title": "Verification and Validation of Activity Diagrams Using Graph Transformation",
"doi": null,
"abstractUrl": "/proceedings-article/icctd/2009/3892a201/12OmNwJgAMd",
"parentPublication": {
"id": "proceedings/icctd/2009/3892/1",
"title": "2009 International Conference on Computer Technology and Development (ICCTD 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsacw/2014/3578/0/3578a740",
"title": "A Meta-model Transformation from UML Activity Diagrams to Event-B Models",
"doi": null,
"abstractUrl": "/proceedings-article/compsacw/2014/3578a740/12OmNy1SFRO",
"parentPublication": {
"id": "proceedings/compsacw/2014/3578/0",
"title": "2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2005/2443/0/01509496",
"title": "Animated simulation of integrated UML behavioral models based on graph transformation",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2005/01509496/12OmNy2rRVp",
"parentPublication": {
"id": "proceedings/vlhcc/2005/2443/0",
"title": "Proceedings. 2005 IEEE Symposium on Visual Languages and Human-Centric Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wsc/2003/8131/1/01261474",
"title": "Computer automated multi-paradigm modelling: meta-modelling and graph transformation",
"doi": null,
"abstractUrl": "/proceedings-article/wsc/2003/01261474/12OmNy4IEW9",
"parentPublication": {
"id": "proceedings/wsc/2003/8131/1",
"title": "Proceedings of the 2003 Winter Simulation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2009/4672/0/05202298",
"title": "Transforming UML models to colored petri nets models using graph grammars",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2009/05202298/12OmNy6ZrZP",
"parentPublication": {
"id": "proceedings/iscc/2009/4672/0",
"title": "2009 IEEE Symposium on Computers and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisa/2014/4443/0/06847468",
"title": "Test Case Generation from Cause-Effect Graph Based on Model Transformation",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2014/06847468/12OmNzd7bB9",
"parentPublication": {
"id": "proceedings/icisa/2014/4443/0",
"title": "2014 International Conference on Information Science and Applications (ICISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cniot/2022/6910/0/691000a191",
"title": "A Formalization and Transformation Method of UML Model",
"doi": null,
"abstractUrl": "/proceedings-article/cniot/2022/691000a191/1EOEgOkIt3O",
"parentPublication": {
"id": "proceedings/cniot/2022/6910/0",
"title": "2022 3rd International Conference on Computing, Networks and Internet of Things (CNIOT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwCJOY5",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC8uRuk",
"doi": "10.1109/BigData.2015.7364100",
"title": "Performance of graph reconstruction method for large-scale web graph analysis",
"normalizedTitle": "Performance of graph reconstruction method for large-scale web graph analysis",
"abstract": "We have already proposed a graph analysis method that could shorten the analysis time by reconstructing a web graph. In our proposed method, a web graph is reconstructed for parallel distributed processing of possible graphs by clustering a web graph and reconstructing the web graph for Compression Graph and Cluster Graphs. Compression Graph represents the relationship between clusters, whereas Cluster Graph contains nodes belonging to each cluster. When analyzing Compression Graph and Cluster Graphs, they can be processed in parallel because there is no relationship between Compression Graph and Cluster Graphs. Further examining our previous study in which we considered a small web graph, in the present paper, we discuss the performance of the proposed method on a large-scale web graph by experiments.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We have already proposed a graph analysis method that could shorten the analysis time by reconstructing a web graph. In our proposed method, a web graph is reconstructed for parallel distributed processing of possible graphs by clustering a web graph and reconstructing the web graph for Compression Graph and Cluster Graphs. Compression Graph represents the relationship between clusters, whereas Cluster Graph contains nodes belonging to each cluster. When analyzing Compression Graph and Cluster Graphs, they can be processed in parallel because there is no relationship between Compression Graph and Cluster Graphs. Further examining our previous study in which we considered a small web graph, in the present paper, we discuss the performance of the proposed method on a large-scale web graph by experiments.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We have already proposed a graph analysis method that could shorten the analysis time by reconstructing a web graph. In our proposed method, a web graph is reconstructed for parallel distributed processing of possible graphs by clustering a web graph and reconstructing the web graph for Compression Graph and Cluster Graphs. Compression Graph represents the relationship between clusters, whereas Cluster Graph contains nodes belonging to each cluster. When analyzing Compression Graph and Cluster Graphs, they can be processed in parallel because there is no relationship between Compression Graph and Cluster Graphs. Further examining our previous study in which we considered a small web graph, in the present paper, we discuss the performance of the proposed method on a large-scale web graph by experiments.",
"fno": "07364100",
"keywords": [
"Distributed Processing",
"Clustering Algorithms",
"Algorithm Design And Analysis",
"Data Mining",
"Big Data",
"Reconstruction Algorithms",
"Electronic Mail"
],
"authors": [
{
"affiliation": "Future University Hakodate, Hokkaido, Japan",
"fullName": "Ryota Takei",
"givenName": "Ryota",
"surname": "Takei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Future University Hakodate, Hokkaido, Japan",
"fullName": "Ayahiko Niimi",
"givenName": "Ayahiko",
"surname": "Niimi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-10-01T00:00:00",
"pubType": "proceedings",
"pages": "2852-2854",
"year": "2015",
"issn": null,
"isbn": "978-1-4799-9926-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07364099",
"articleId": "12OmNAT0mLU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07364101",
"articleId": "12OmNy2rRT5",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipdpsw/2016/3682/0/3682a892",
"title": "Towards a Distributed Large-Scale Dynamic Graph Data Store",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2016/3682a892/12OmNrJiCZ0",
"parentPublication": {
"id": "proceedings/ipdpsw/2016/3682/0",
"title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2015/9504/0/9504a829",
"title": "Measuring Large-Scale Dynamic Graph Similarity by RICom: RWR with Intergraph Compression",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2015/9504a829/12OmNwF0C9b",
"parentPublication": {
"id": "proceedings/icdm/2015/9504/0",
"title": "2015 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2016/2020/0/07498235",
"title": "I/O efficient Core Graph Decomposition at web scale",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2016/07498235/12OmNwp74uS",
"parentPublication": {
"id": "proceedings/icde/2016/2020/0",
"title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2016/8796/0/07425944",
"title": "On efficiently summarizing a large dynamic graph",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2016/07425944/12OmNy5R3DG",
"parentPublication": {
"id": "proceedings/bigcomp/2016/8796/0",
"title": "2016 International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/05/v0669",
"title": "ASK-GraphView: A Large Scale Graph Visualization System",
"doi": null,
"abstractUrl": "/journal/tg/2006/05/v0669/13rRUwkfAZ7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671984",
"title": "Efficient Scalable Temporal Web Graph Store",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671984/1A8hsKf1Rew",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbd/2019/5141/0/514100a084",
"title": "Execution Feature Extraction and Prediction for Large-Scale Graph Processing Applications",
"doi": null,
"abstractUrl": "/proceedings-article/cbd/2019/514100a084/1fw1P8kpK2k",
"parentPublication": {
"id": "proceedings/cbd/2019/5141/0",
"title": "2019 Seventh International Conference on Advanced Cloud and Big Data (CBD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2019/6092/0/609200a127",
"title": "NOLGP: A Novel Optimized Large-Scale Graph Partitioning Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2019/609200a127/1i5m547pL3y",
"parentPublication": {
"id": "proceedings/cis/2019/6092/0",
"title": "2019 15th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2019/4752/0/09212939",
"title": "Distributed Generation of Large-Scale 3D Dense Point Cloud for Accurate Multi-View Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2019/09212939/1nHRQAzPXDa",
"parentPublication": {
"id": "proceedings/icvrv/2019/4752/0",
"title": "2019 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09377898",
"title": "Understanding Coarsening for Embedding Large-Scale Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09377898/1s64Z0SNZwQ",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqEjhZ9",
"title": "IEEE Pacific Visualization Symposium 2008",
"acronym": "pacificvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz6iOku",
"doi": "10.1109/PACIFICVIS.2008.4475481",
"title": "A Treemap Based Method for Rapid Layout of Large Graphs",
"normalizedTitle": "A Treemap Based Method for Rapid Layout of Large Graphs",
"abstract": "Abstract graphs or networks are a commonly recurring data type in many fields. In order to visualize such graphs effectively, the graph must be laid out on the screen coherently. Many algorithms exist to do this, but many of these algorithms tend to be very slow when the input graph is large. This paper presents a new approach to the large graph layout problem, which quickly generates an effective layout. This new method proceeds by generating a clustering hierarchy for the graph, applying a treemap to this hierarchy, and finally placing the graph vertices in their associated regions in the treemap. It is ideal for interactive systems where operations such as semantic zooming are to be performed, since most of the work is done in the initial hierarchy calculation, and it takes very little work to recalculate the layout. This method is also valuable in that the resulting layout can be used as the input to an iterative algorithm (e.g., a force directed method), which greatly reduces the number of iterations required to converge to a near optimal layout.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Abstract graphs or networks are a commonly recurring data type in many fields. In order to visualize such graphs effectively, the graph must be laid out on the screen coherently. Many algorithms exist to do this, but many of these algorithms tend to be very slow when the input graph is large. This paper presents a new approach to the large graph layout problem, which quickly generates an effective layout. This new method proceeds by generating a clustering hierarchy for the graph, applying a treemap to this hierarchy, and finally placing the graph vertices in their associated regions in the treemap. It is ideal for interactive systems where operations such as semantic zooming are to be performed, since most of the work is done in the initial hierarchy calculation, and it takes very little work to recalculate the layout. This method is also valuable in that the resulting layout can be used as the input to an iterative algorithm (e.g., a force directed method), which greatly reduces the number of iterations required to converge to a near optimal layout.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Abstract graphs or networks are a commonly recurring data type in many fields. In order to visualize such graphs effectively, the graph must be laid out on the screen coherently. Many algorithms exist to do this, but many of these algorithms tend to be very slow when the input graph is large. This paper presents a new approach to the large graph layout problem, which quickly generates an effective layout. This new method proceeds by generating a clustering hierarchy for the graph, applying a treemap to this hierarchy, and finally placing the graph vertices in their associated regions in the treemap. It is ideal for interactive systems where operations such as semantic zooming are to be performed, since most of the work is done in the initial hierarchy calculation, and it takes very little work to recalculate the layout. This method is also valuable in that the resulting layout can be used as the input to an iterative algorithm (e.g., a force directed method), which greatly reduces the number of iterations required to converge to a near optimal layout.",
"fno": "04475481",
"keywords": [
"Data Visualisation",
"Iterative Methods",
"Trees Mathematics",
"Treemap Based Method",
"Rapid Layout",
"Abstract Graphs",
"Large Graph Layout Problem",
"Clustering Hierarchy",
"Graph Vertices",
"Interactive Systems",
"Semantic Zooming",
"Iterative Algorithm",
"Tree Graphs",
"Layout",
"Iterative Algorithms",
"Clustering Algorithms",
"Data Visualization",
"Interactive Systems",
"Testing",
"Acceleration",
"Hardware",
"I 3 6 Computing Methodologies Computer Graphics Methodologies And Techniques"
],
"authors": [
{
"affiliation": "University of California, Davis. muelder@cs.ucdavis.edu",
"fullName": "Chris Muelder",
"givenName": "Chris",
"surname": "Muelder",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, Davis. ma@cs.ucdavis.edu",
"fullName": "Kwan-Liu Ma",
"givenName": "Kwan-Liu",
"surname": "Ma",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pacificvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-03-01T00:00:00",
"pubType": "proceedings",
"pages": "231-238",
"year": "2008",
"issn": "2165-8765",
"isbn": "978-1-4244-1966-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04475480",
"articleId": "12OmNC17hWv",
"__typename": "AdjacentArticleType"
},
"next": null,
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2007/2900/0/29000447",
"title": "Combining DagMaps and Sugiyama Layout for the Navigation of Hierarchical Data",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2007/29000447/12OmNBKEyz7",
"parentPublication": {
"id": "proceedings/iv/2007/2900/0",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2005/2790/0/01532148",
"title": "Importance-driven visualization layouts for large time series data",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2005/01532148/12OmNBkfRme",
"parentPublication": {
"id": "proceedings/ieee-infovis/2005/2790/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2008/1966/0/04475475",
"title": "Interactive Visual Analysis of the NSF Funding Information",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2008/04475475/12OmNvlxJvf",
"parentPublication": {
"id": "proceedings/pacificvis/2008/1966/0",
"title": "IEEE Pacific Visualization Symposium 2008",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl/1993/3970/0/00269620",
"title": "Layout-independent fisheye views of nested graphs",
"doi": null,
"abstractUrl": "/proceedings-article/vl/1993/00269620/12OmNvq5jzV",
"parentPublication": {
"id": "proceedings/vl/1993/3970/0",
"title": "Proceedings 1993 IEEE Symposium on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/date/2009/3781/0/05090670",
"title": "Analog layout synthesis - Recent advances in topological approaches",
"doi": null,
"abstractUrl": "/proceedings-article/date/2009/05090670/12OmNvvc5O1",
"parentPublication": {
"id": "proceedings/date/2009/3781/0",
"title": "2009 Design, Automation & Test in Europe Conference & Exhibition (DATE'09)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/1997/8189/0/81890002",
"title": "H3: laying out large directed graphs in 3D hyperbolic space",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/1997/81890002/12OmNwEJ10t",
"parentPublication": {
"id": "proceedings/ieee-infovis/1997/8189/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2001/1342/0/13420073",
"title": "Ordered Treemap Layouts",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2001/13420073/12OmNySosIO",
"parentPublication": {
"id": "proceedings/ieee-infovis/2001/1342/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2012/4752/0/06400512",
"title": "Pixel-oriented Treemap for multiple displays",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2012/06400512/12OmNz61dti",
"parentPublication": {
"id": "proceedings/vast/2012/4752/0",
"title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/05/v0805",
"title": "Visual Exploration of Complex Time-Varying Graphs",
"doi": null,
"abstractUrl": "/journal/tg/2006/05/v0805/13rRUxBa5x5",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1286",
"title": "Visualizing Changes of Hierarchical Data using Treemaps",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1286/13rRUy0qnLA",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNC3XhhD",
"title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)",
"acronym": "icde",
"groupId": "1000178",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzSQdpn",
"doi": "10.1109/ICDE.2014.6816676",
"title": "Pagrol: Parallel graph olap over large-scale attributed graphs",
"normalizedTitle": "Pagrol: Parallel graph olap over large-scale attributed graphs",
"abstract": "Attributed graphs are becoming important tools for modeling information networks, such as the Web and various social networks (e.g. Facebook, LinkedIn, Twitter). However, it is computationally challenging to manage and analyze attributed graphs to support effective decision making. In this paper, we propose, Pagrol, a parallel graph OLAP (Online Analytical Processing) system over attributed graphs. In particular, Pagrol introduces a new conceptual Hyper Graph Cube model (which is an attributed-graph analogue of the data cube model for relational DBMS) to aggregate attributed graphs at different granularities and levels. The proposed model supports different queries as well as a new set of graph OLAP Roll-Up/Drill-Down operations. Furthermore, on the basis of Hyper Graph Cube, Pagrol provides an efficient MapReduce-based parallel graph cubing algorithm, MRGraph-Cubing, to compute the graph cube for an attributed graph. Pagrol employs numerous optimization techniques: (a) a self-contained join strategy to minimize I/O cost; (b) a scheme that groups cuboids into batches so as to minimize redundant computations; (c) a cost-based scheme to allocate the batches into bags (each with a small number of batches); and (d) an efficient scheme to process a bag using a single MapReduce job. Results of extensive experimental studies using both real Facebook and synthetic datasets on a 128-node cluster show that Pagrol is effective, efficient and scalable.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Attributed graphs are becoming important tools for modeling information networks, such as the Web and various social networks (e.g. Facebook, LinkedIn, Twitter). However, it is computationally challenging to manage and analyze attributed graphs to support effective decision making. In this paper, we propose, Pagrol, a parallel graph OLAP (Online Analytical Processing) system over attributed graphs. In particular, Pagrol introduces a new conceptual Hyper Graph Cube model (which is an attributed-graph analogue of the data cube model for relational DBMS) to aggregate attributed graphs at different granularities and levels. The proposed model supports different queries as well as a new set of graph OLAP Roll-Up/Drill-Down operations. Furthermore, on the basis of Hyper Graph Cube, Pagrol provides an efficient MapReduce-based parallel graph cubing algorithm, MRGraph-Cubing, to compute the graph cube for an attributed graph. Pagrol employs numerous optimization techniques: (a) a self-contained join strategy to minimize I/O cost; (b) a scheme that groups cuboids into batches so as to minimize redundant computations; (c) a cost-based scheme to allocate the batches into bags (each with a small number of batches); and (d) an efficient scheme to process a bag using a single MapReduce job. Results of extensive experimental studies using both real Facebook and synthetic datasets on a 128-node cluster show that Pagrol is effective, efficient and scalable.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Attributed graphs are becoming important tools for modeling information networks, such as the Web and various social networks (e.g. Facebook, LinkedIn, Twitter). However, it is computationally challenging to manage and analyze attributed graphs to support effective decision making. In this paper, we propose, Pagrol, a parallel graph OLAP (Online Analytical Processing) system over attributed graphs. In particular, Pagrol introduces a new conceptual Hyper Graph Cube model (which is an attributed-graph analogue of the data cube model for relational DBMS) to aggregate attributed graphs at different granularities and levels. The proposed model supports different queries as well as a new set of graph OLAP Roll-Up/Drill-Down operations. Furthermore, on the basis of Hyper Graph Cube, Pagrol provides an efficient MapReduce-based parallel graph cubing algorithm, MRGraph-Cubing, to compute the graph cube for an attributed graph. Pagrol employs numerous optimization techniques: (a) a self-contained join strategy to minimize I/O cost; (b) a scheme that groups cuboids into batches so as to minimize redundant computations; (c) a cost-based scheme to allocate the batches into bags (each with a small number of batches); and (d) an efficient scheme to process a bag using a single MapReduce job. Results of extensive experimental studies using both real Facebook and synthetic datasets on a 128-node cluster show that Pagrol is effective, efficient and scalable.",
"fno": "06816676",
"keywords": [
"Aggregates",
"Computational Modeling",
"Cities And Towns",
"Lattices",
"Educational Institutions",
"Decision Making",
"Warehousing"
],
"authors": [
{
"affiliation": "NUS Graduate School of Integrative Science and Engineering, National University of Singapore, Singapore",
"fullName": "Zhengkui Wang",
"givenName": "Zhengkui",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NUS Graduate School of Integrative Science and Engineering, National University of Singapore, Singapore",
"fullName": "Qi Fan",
"givenName": "Qi",
"surname": "Fan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computing, National University of Singapore, Singapore",
"fullName": "Huiju Wang",
"givenName": "Huiju",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NUS Graduate School of Integrative Science and Engineering, National University of Singapore, Singapore",
"fullName": "Kian-Lee Tan",
"givenName": "Kian-Lee",
"surname": "Tan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, University of California at Santa Barbara, USA",
"fullName": "Divyakant Agrawal",
"givenName": "Divyakant",
"surname": "Agrawal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, University of California at Santa Barbara, USA",
"fullName": "Amr El Abbadi",
"givenName": "Amr",
"surname": "El Abbadi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icde",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-03-01T00:00:00",
"pubType": "proceedings",
"pages": "496-507",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-2555-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06816675",
"articleId": "12OmNyuy9Qu",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06816677",
"articleId": "12OmNyQYto7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icde/2010/5445/0/05447749",
"title": "T-Warehouse: Visual OLAP analysis on trajectory data",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2010/05447749/12OmNB8TUa8",
"parentPublication": {
"id": "proceedings/icde/2010/5445/0",
"title": "2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdew/2013/5303/0/06547453",
"title": "Ranking outlier nodes in subspaces of attributed graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdew/2013/06547453/12OmNCwCLsS",
"parentPublication": {
"id": "proceedings/icdew/2013/5303/0",
"title": "2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdew/2015/8442/0/07129548",
"title": "Efficient OLAP operations for RDF analytics",
"doi": null,
"abstractUrl": "/proceedings-article/icdew/2015/07129548/12OmNwFicZN",
"parentPublication": {
"id": "proceedings/icdew/2015/8442/0",
"title": "2015 31st IEEE International Conference on Data Engineering Workshops (ICDEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2015/0163/0/0163a250",
"title": "Local Knowledge Discovery in Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2015/0163a250/12OmNy6ZrYd",
"parentPublication": {
"id": "proceedings/ictai/2015/0163/0",
"title": "2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2016/2020/0/07498291",
"title": "OLAP over probabilistic data cubes I: Aggregating, materializing, and querying",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2016/07498291/12OmNzXWZMq",
"parentPublication": {
"id": "proceedings/icde/2016/2020/0",
"title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2007/01/04016519",
"title": "Computing Iceberg Cubes by Top-Down and Bottom-Up Integration: The StarCubing Approach",
"doi": null,
"abstractUrl": "/journal/tk/2007/01/04016519/13rRUx0xPJ0",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2007/07/k0903",
"title": "Efficient Computation of Iceberg Cubes by Bounding Aggregate Functions",
"doi": null,
"abstractUrl": "/journal/tk/2007/07/k0903/13rRUxCitJF",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2010/01/ttk2010010090",
"title": "Modeling Massive RFID Data Sets: A Gateway-Based Movement Graph Approach",
"doi": null,
"abstractUrl": "/journal/tk/2010/01/ttk2010010090/13rRUy3gn7T",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2018/9288/0/928800a219",
"title": "MinerLSD: Efficient Local Pattern Mining on Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2018/928800a219/18jXy2pmyR2",
"parentPublication": {
"id": "proceedings/icdmw/2018/9288/0",
"title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2017/4993/0/09069120",
"title": "Efficiently Clustering Very Large Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2017/09069120/1j9xTMF2UyA",
"parentPublication": {
"id": "proceedings/asonam/2017/4993/0",
"title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1hJrHq07uw0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1hJsdeaOrJu",
"doi": "10.1109/BigData47090.2019.9006115",
"title": "InfDetect: a Large Scale Graph-based Fraud Detection System for E-Commerce Insurance",
"normalizedTitle": "InfDetect: a Large Scale Graph-based Fraud Detection System for E-Commerce Insurance",
"abstract": "The insurance industry has been creating innovative products around the emerging online shopping activities. Such ecommerce insurance is designed to protect buyers from potential risks such as impulse purchases and counterfeits. Fraudulent claims towards online insurance typically involve multiple parties such as buyers, sellers, and express companies, and they could lead to heavy financial losses. In order to uncover the relations behind organized fraudsters and detect fraudulent claims, we developed a large-scale insurance fraud detection system, i.e., InfDetect, which provides interfaces for commonly used graphs, standard data processing procedures, and a uniform graph learning platform. InfDetect is able to process big graphs containing up to 100 millions of nodes and billions of edges.In this paper, we investigate different graphs to facilitate fraudster mining, such as a device-sharing graph, a transaction graph, a friendship graph, and a buyer-seller graph. These graphs are fed to a uniform graph learning platform containing supervised and unsupervised graph learning algorithms. Cases on widely applied e-commerce insurance are described to demonstrate the usage and capability of our system. InfDetect has successfully detected thousands of fraudulent claims and saved over tens of thousands of dollars daily.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The insurance industry has been creating innovative products around the emerging online shopping activities. Such ecommerce insurance is designed to protect buyers from potential risks such as impulse purchases and counterfeits. Fraudulent claims towards online insurance typically involve multiple parties such as buyers, sellers, and express companies, and they could lead to heavy financial losses. In order to uncover the relations behind organized fraudsters and detect fraudulent claims, we developed a large-scale insurance fraud detection system, i.e., InfDetect, which provides interfaces for commonly used graphs, standard data processing procedures, and a uniform graph learning platform. InfDetect is able to process big graphs containing up to 100 millions of nodes and billions of edges.In this paper, we investigate different graphs to facilitate fraudster mining, such as a device-sharing graph, a transaction graph, a friendship graph, and a buyer-seller graph. These graphs are fed to a uniform graph learning platform containing supervised and unsupervised graph learning algorithms. Cases on widely applied e-commerce insurance are described to demonstrate the usage and capability of our system. InfDetect has successfully detected thousands of fraudulent claims and saved over tens of thousands of dollars daily.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The insurance industry has been creating innovative products around the emerging online shopping activities. Such ecommerce insurance is designed to protect buyers from potential risks such as impulse purchases and counterfeits. Fraudulent claims towards online insurance typically involve multiple parties such as buyers, sellers, and express companies, and they could lead to heavy financial losses. In order to uncover the relations behind organized fraudsters and detect fraudulent claims, we developed a large-scale insurance fraud detection system, i.e., InfDetect, which provides interfaces for commonly used graphs, standard data processing procedures, and a uniform graph learning platform. InfDetect is able to process big graphs containing up to 100 millions of nodes and billions of edges.In this paper, we investigate different graphs to facilitate fraudster mining, such as a device-sharing graph, a transaction graph, a friendship graph, and a buyer-seller graph. These graphs are fed to a uniform graph learning platform containing supervised and unsupervised graph learning algorithms. Cases on widely applied e-commerce insurance are described to demonstrate the usage and capability of our system. InfDetect has successfully detected thousands of fraudulent claims and saved over tens of thousands of dollars daily.",
"fno": "09006115",
"keywords": [
"Data Mining",
"Electronic Commerce",
"Fraud",
"Graph Theory",
"Insurance Data Processing",
"Learning Artificial Intelligence",
"Retail Data Processing",
"Inf Detect",
"Insurance Industry",
"Innovative Products",
"Online Shopping Activities",
"Ecommerce Insurance",
"Impulse Purchases",
"Counterfeits",
"Fraudulent Claims",
"Online Insurance",
"Express Companies",
"Financial Losses",
"Organized Fraudsters",
"Standard Data Processing Procedures",
"Uniform Graph Learning Platform",
"Device Sharing Graph",
"Transaction Graph",
"Friendship Graph",
"Buyer Seller Graph",
"Supervised Graph Learning Algorithms",
"Unsupervised Graph Learning Algorithms",
"E Commerce Insurance",
"Insurance Fraud Detection System",
"Graph Based Fraud Detection System",
"Insurance",
"Artificial Intelligence",
"Feature Extraction",
"Companies",
"Data Processing",
"Security",
"Labeling",
"Graph Learning",
"Network Learning",
"E Commerce Insurance",
"Fraud Detection System"
],
"authors": [
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Cen Chen",
"givenName": "Cen",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Chen Liang",
"givenName": "Chen",
"surname": "Liang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Jianbin Lin",
"givenName": "Jianbin",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Li Wang",
"givenName": "Li",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Ziqi Liu",
"givenName": "Ziqi",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Xinxing Yang",
"givenName": "Xinxing",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Jun Zhou",
"givenName": "Jun",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,San Francisco,USA",
"fullName": "Yang Shuang",
"givenName": "Yang",
"surname": "Shuang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ant Financial Services Group,AI Department,Hangzhou,China",
"fullName": "Yuan Qi",
"givenName": "Yuan",
"surname": "Qi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1765-1773",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-0858-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09006048",
"articleId": "1hJsu4lY0PS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09006103",
"articleId": "1hJsjZYpqDe",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ic3/2017/3077/0/08284299",
"title": "Fraud detection and frequent pattern matching in insurance claims using data mining techniques",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2017/08284299/12OmNANBZrf",
"parentPublication": {
"id": "proceedings/ic3/2017/3077/0",
"title": "2017 Tenth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2016/2312/0/2312a660",
"title": "Study on Traffic Accident Investigation and Site Survey Evidence Based on Motor Vehicle Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2016/2312a660/12OmNAXPyio",
"parentPublication": {
"id": "proceedings/icmtma/2016/2312/0",
"title": "2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cso/2011/4335/0/4335b276",
"title": "Random Rough Subspace Based Neural Network Ensemble for Insurance Fraud Detection",
"doi": null,
"abstractUrl": "/proceedings-article/cso/2011/4335b276/12OmNAYGltt",
"parentPublication": {
"id": "proceedings/cso/2011/4335/0",
"title": "2011 Fourth International Joint Conference on Computational Sciences and Optimization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2015/9926/0/07363893",
"title": "Investigating insurance fraud using social media",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2015/07363893/12OmNrAdsyk",
"parentPublication": {
"id": "proceedings/big-data/2015/9926/0",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itng/2010/3984/0/3984b282",
"title": "Development and Optimization of Information Systems for Health Insurance Billing",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2010/3984b282/12OmNyQph0H",
"parentPublication": {
"id": "proceedings/itng/2010/3984/0",
"title": "Information Technology: New Generations, Third International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aibt/2021/3267/0/326700a101",
"title": "Lightning Insurance: A Fast Claim, High Accuracy Insurance Platform Based on Blockchain Technology and NASNET Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/aibt/2021/326700a101/1AINvBkygc8",
"parentPublication": {
"id": "proceedings/aibt/2021/3267/0",
"title": "2021 International Conference on Artificial Intelligence and Blockchain Technology (AIBT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/blockchain/2021/1760/0/176000a055",
"title": "ClaimChain: Secure Blockchain Platform for Handling Insurance Claims Processing",
"doi": null,
"abstractUrl": "/proceedings-article/blockchain/2021/176000a055/1AqxBfKSwec",
"parentPublication": {
"id": "proceedings/blockchain/2021/1760/0",
"title": "2021 IEEE International Conference on Blockchain (Blockchain)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859871",
"title": "Hierarchical Multi-Modal Fusion on Dynamic Heterogeneous Graph for Health Insurance Fraud Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859871/1G9ELjH8sYU",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/10081495",
"title": "FraudAuditor: A Visual Analytics Approach for Collusive Fraud in Health Insurance",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/10081495/1LRbQCd2D7O",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iri/2021/3875/0/387500a049",
"title": "Agentless Insurance Model Based on Modern Artificial Intelligence",
"doi": null,
"abstractUrl": "/proceedings-article/iri/2021/387500a049/1yBGa9m4NUc",
"parentPublication": {
"id": "proceedings/iri/2021/3875/0",
"title": "2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyYm2wA",
"title": "Asia-Pacific Symposium on Visualisation 2007",
"acronym": "apvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCwlajz",
"doi": "10.1109/APVIS.2007.329289",
"title": "A comparison of vertex ordering algorithms for large graph visualization",
"normalizedTitle": "A comparison of vertex ordering algorithms for large graph visualization",
"abstract": "In this study, we examine the use of graph ordering algorithms for visual analysis of data sets using visual similarity matrices. Visual similarity matrices display the relationships between data items in a dot-matrix plot format, with the axes labeled with the data items and points drawn if there is a relationship between two data items. The biggest challenge for displaying data using this representation is finding an ordering of the data items that reveals the internal structure of the data set. Poor orderings are indistinguishable from noise whereas a good ordering can reveal complex and subtle features of the data. We consider three general classes of algorithms for generating orderings: simple graph theoretic algorithms, symbolic sparse matrix reordering algorithms, and spectral decomposition algorithms. We apply each algorithm to synthetic and real world data sets and evaluate each algorithm for interpretability (i.e., does the algorithm lead to images with usable visual features?) and stability (i.e., does the algorithm consistently produce similar results?). We also provide a detailed discussion of the results for each algorithm across the different graph types and include a discussion of some strategies for using ordering algorithms for data analysis based on these results",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this study, we examine the use of graph ordering algorithms for visual analysis of data sets using visual similarity matrices. Visual similarity matrices display the relationships between data items in a dot-matrix plot format, with the axes labeled with the data items and points drawn if there is a relationship between two data items. The biggest challenge for displaying data using this representation is finding an ordering of the data items that reveals the internal structure of the data set. Poor orderings are indistinguishable from noise whereas a good ordering can reveal complex and subtle features of the data. We consider three general classes of algorithms for generating orderings: simple graph theoretic algorithms, symbolic sparse matrix reordering algorithms, and spectral decomposition algorithms. We apply each algorithm to synthetic and real world data sets and evaluate each algorithm for interpretability (i.e., does the algorithm lead to images with usable visual features?) and stability (i.e., does the algorithm consistently produce similar results?). We also provide a detailed discussion of the results for each algorithm across the different graph types and include a discussion of some strategies for using ordering algorithms for data analysis based on these results",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this study, we examine the use of graph ordering algorithms for visual analysis of data sets using visual similarity matrices. Visual similarity matrices display the relationships between data items in a dot-matrix plot format, with the axes labeled with the data items and points drawn if there is a relationship between two data items. The biggest challenge for displaying data using this representation is finding an ordering of the data items that reveals the internal structure of the data set. Poor orderings are indistinguishable from noise whereas a good ordering can reveal complex and subtle features of the data. We consider three general classes of algorithms for generating orderings: simple graph theoretic algorithms, symbolic sparse matrix reordering algorithms, and spectral decomposition algorithms. We apply each algorithm to synthetic and real world data sets and evaluate each algorithm for interpretability (i.e., does the algorithm lead to images with usable visual features?) and stability (i.e., does the algorithm consistently produce similar results?). We also provide a detailed discussion of the results for each algorithm across the different graph types and include a discussion of some strategies for using ordering algorithms for data analysis based on these results",
"fno": "04126232",
"keywords": [
"Data Analysis",
"Vertex Ordering Algorithm",
"Graph Visualization",
"Graph Ordering Algorithm",
"Visual Similarity Matrix",
"Dot Matrix Plot Format",
"Graph Theoretic Algorithm",
"Symbolic Sparse Matrix Reordering Algorithm",
"Spectral Decomposition Algorithm"
],
"authors": [
{
"affiliation": "Open Syst. Lab., Indiana Univ., Bloomington, IN",
"fullName": "C. Mueller",
"givenName": "C.",
"surname": "Mueller",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Open Syst. Lab., Indiana Univ., Bloomington, IN",
"fullName": "B. Martin",
"givenName": "B.",
"surname": "Martin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Open Syst. Lab., Indiana Univ., Bloomington, IN",
"fullName": "A. Lumsdaine",
"givenName": "A.",
"surname": "Lumsdaine",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "apvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-02-01T00:00:00",
"pubType": "proceedings",
"pages": "141-148",
"year": "2007",
"issn": null,
"isbn": "1-4244-0808-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04126231",
"articleId": "12OmNzYeARq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04126233",
"articleId": "12OmNzUgdhW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2009/5949/0/05407546",
"title": "A gradient-based ordering for MIMO decoding",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2009/05407546/12OmNAFFdGw",
"parentPublication": {
"id": "proceedings/isspit/2009/5949/0",
"title": "2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2011/4477/0/4477a561",
"title": "Efficient Graph Comparison and Visualization Using GPU",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2011/4477a561/12OmNALCNrV",
"parentPublication": {
"id": "proceedings/cse/2011/4477/0",
"title": "2011 14th IEEE International Conference on Computational Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2008/3299/0/3299a566",
"title": "Evolutionary Approaches to Linear Ordering Problem",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2008/3299a566/12OmNBqv27O",
"parentPublication": {
"id": "proceedings/dexa/2008/3299/0",
"title": "2008 19th International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcs/1997/7813/0/78130492",
"title": "Characterization of message ordering specifications and protocols",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/1997/78130492/12OmNrkT7HA",
"parentPublication": {
"id": "proceedings/icdcs/1997/7813/0",
"title": "Proceedings of 17th International Conference on Distributed Computing Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vv/1998/9180/0/91800087",
"title": "An Exact Interactive Time Visibility Ordering Algorithm for Polyhedral Cell Complexes",
"doi": null,
"abstractUrl": "/proceedings-article/vv/1998/91800087/12OmNxA3YRD",
"parentPublication": {
"id": "proceedings/vv/1998/9180/0",
"title": "Volume Visualization and Graphics, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/1994/653/0/01600385",
"title": "BDD Variable Ordering for Interacting Finite State Machines",
"doi": null,
"abstractUrl": "/proceedings-article/dac/1994/01600385/12OmNxX3up0",
"parentPublication": {
"id": "proceedings/dac/1994/653/0",
"title": "1994 31st Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ica3pp/2002/1512/0/15120028",
"title": "An Analysis of Update Ordering in a Cluster of Replicated Servers",
"doi": null,
"abstractUrl": "/proceedings-article/ica3pp/2002/15120028/12OmNzlUKxG",
"parentPublication": {
"id": "proceedings/ica3pp/2002/1512/0",
"title": "Algorithms and Architectures for Parallel Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1996/09/t0993",
"title": "Improving the Variable Ordering of OBDDs Is NP-Complete",
"doi": null,
"abstractUrl": "/journal/tc/1996/09/t0993/13rRUwhpBNe",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/1994/04/k0501",
"title": "Rule Ordering in Bottom-Up Fixpoint Evaluation of Logic Programs",
"doi": null,
"abstractUrl": "/journal/tk/1994/04/k0501/13rRUygT7fr",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a245",
"title": "Reinforcement Learning Based Query Vertex Ordering Model for Subgraph Matching",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a245/1FwFqmSJYAw",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBUAvUQ",
"title": "Information Visualization, IEEE Symposium on",
"acronym": "ieee-infovis",
"groupId": "1000371",
"volume": "0",
"displayVolume": "0",
"year": "2003",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz5JBZx",
"doi": "10.1109/INFVIS.2003.1249030",
"title": "Using Multilevel Call Matrices in Large Software Projects",
"normalizedTitle": "Using Multilevel Call Matrices in Large Software Projects",
"abstract": "Traditionally, node link diagrams are the prime choice when it comes to visualizing software architectures. However, node link diagrams often fall short when used to visualize large graph structures. In this paper we investigate the use of call matrices as visual aids in the management of large software projects. We argue that call matrices have a number of advantages over traditional node link diagrams when the main object of interest is the link instead of the node. Matrix visualizations can provide stable and crisp layouts of large graphs and are inherently well suited for large multilevel visualizations because of their recursive structure. We discuss a number of visualization issues, using a very large software project currently under development at Philips Medical Systems as a running example.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Traditionally, node link diagrams are the prime choice when it comes to visualizing software architectures. However, node link diagrams often fall short when used to visualize large graph structures. In this paper we investigate the use of call matrices as visual aids in the management of large software projects. We argue that call matrices have a number of advantages over traditional node link diagrams when the main object of interest is the link instead of the node. Matrix visualizations can provide stable and crisp layouts of large graphs and are inherently well suited for large multilevel visualizations because of their recursive structure. We discuss a number of visualization issues, using a very large software project currently under development at Philips Medical Systems as a running example.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Traditionally, node link diagrams are the prime choice when it comes to visualizing software architectures. However, node link diagrams often fall short when used to visualize large graph structures. In this paper we investigate the use of call matrices as visual aids in the management of large software projects. We argue that call matrices have a number of advantages over traditional node link diagrams when the main object of interest is the link instead of the node. Matrix visualizations can provide stable and crisp layouts of large graphs and are inherently well suited for large multilevel visualizations because of their recursive structure. We discuss a number of visualization issues, using a very large software project currently under development at Philips Medical Systems as a running example.",
"fno": "20550029",
"keywords": [
"Software Visualization",
"Multilevel Visualization",
"Call Matrix"
],
"authors": [
{
"affiliation": "Technische Universiteit Eindhoven, The Netherlands",
"fullName": "Frank van Ham",
"givenName": "Frank van",
"surname": "Ham",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-infovis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2003-10-01T00:00:00",
"pubType": "proceedings",
"pages": "29",
"year": "2003",
"issn": null,
"isbn": "0-7695-2055-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "20550028",
"articleId": "12OmNBVrjlQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "20550030",
"articleId": "12OmNzTYBNQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2011/935/0/05742389",
"title": "Multilevel agglomerative edge bundling for visualizing large graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y",
"parentPublication": {
"id": "proceedings/pacificvis/2011/935/0",
"title": "2011 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a592",
"title": "Towards an Aesthetic Dimensions Framework for Dynamic Graph Visualisations",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a592/12OmNymjN1G",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/12/ttg2012122457",
"title": "Compressed Adjacency Matrices: Untangling Gene Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tg/2012/12/ttg2012122457/13rRUNvyakM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/10/08438968",
"title": "Node-Link or Adjacency Matrices: Old Question, New Insights",
"doi": null,
"abstractUrl": "/journal/tg/2019/10/08438968/13rRUwjoNx8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122268",
"title": "Developing and Evaluating Quilts for the Depiction of Large Layered Graphs",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122268/13rRUwwJWFK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2018/03/mcg2018030090",
"title": "Application-Driven Design: Help Students Understand Employment and See the “Big Picture”",
"doi": null,
"abstractUrl": "/magazine/cg/2018/03/mcg2018030090/13rRUx0xPOi",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/12/06876036",
"title": "Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2014/12/06876036/13rRUxZ0o1D",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/01/07539318",
"title": "Evaluation of Graph Sampling: A Visualization Perspective",
"doi": null,
"abstractUrl": "/journal/tg/2017/01/07539318/13rRUxZzAhI",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/11/06787045",
"title": "How to Display Group Information on Node-Link Diagrams: An Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2014/11/06787045/13rRUyY28Yz",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1302",
"title": "NodeTrix: a Hybrid Visualization of Social Networks",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1302/13rRUyYjKa7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzTH0FY",
"title": "2011 IEEE 11th International Conference on Data Mining",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzyGH9T",
"doi": "10.1109/ICDM.2011.59",
"title": "Document Clustering via Matrix Representation",
"normalizedTitle": "Document Clustering via Matrix Representation",
"abstract": "Vector Space Model (VSM) is widely used to represent documents and web pages. It is simple and easy to deal computationally, but it also oversimplifies a document into a vector, susceptible to noise, and cannot explicitly represent underlying topics of a document. A matrix representation of document is proposed in this paper: rows represent distinct terms and columns represent cohesive segments. The matrix model views a document as a set of segments, and each segment is a probability distribution over a limited number of latent topics which can be mapped to clustering structures. The latent topic extraction based on the matrix representation of documents is formulated as a constraint optimization problem in which each matrix (i.e., a document) A_i is factorized into a common base determined by non-negative matrices L and R^\\top, and a non-negative weight matrix M_i such that the sum of reconstruction error on all documents is minimized. Empirical evaluation demonstrates that it is feasible to use the matrix model for document clustering: (1) compared with vector representation, using matrix representation improves clustering quality consistently, and the proposed approach achieves a relative accuracy improvement up to 66\\% on the studied datasets, and (2) the proposed method outperforms baseline methods such as k-means and NMF, and complements the state-of-the-art methods like LDA and PLSI. Furthermore, the proposed matrix model allows more refined information retrieval at a segment level instead of at a document level, which enables the return of more relevant documents in information retrieval tasks.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Vector Space Model (VSM) is widely used to represent documents and web pages. It is simple and easy to deal computationally, but it also oversimplifies a document into a vector, susceptible to noise, and cannot explicitly represent underlying topics of a document. A matrix representation of document is proposed in this paper: rows represent distinct terms and columns represent cohesive segments. The matrix model views a document as a set of segments, and each segment is a probability distribution over a limited number of latent topics which can be mapped to clustering structures. The latent topic extraction based on the matrix representation of documents is formulated as a constraint optimization problem in which each matrix (i.e., a document) A_i is factorized into a common base determined by non-negative matrices L and R^\\top, and a non-negative weight matrix M_i such that the sum of reconstruction error on all documents is minimized. Empirical evaluation demonstrates that it is feasible to use the matrix model for document clustering: (1) compared with vector representation, using matrix representation improves clustering quality consistently, and the proposed approach achieves a relative accuracy improvement up to 66\\% on the studied datasets, and (2) the proposed method outperforms baseline methods such as k-means and NMF, and complements the state-of-the-art methods like LDA and PLSI. Furthermore, the proposed matrix model allows more refined information retrieval at a segment level instead of at a document level, which enables the return of more relevant documents in information retrieval tasks.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Vector Space Model (VSM) is widely used to represent documents and web pages. It is simple and easy to deal computationally, but it also oversimplifies a document into a vector, susceptible to noise, and cannot explicitly represent underlying topics of a document. A matrix representation of document is proposed in this paper: rows represent distinct terms and columns represent cohesive segments. The matrix model views a document as a set of segments, and each segment is a probability distribution over a limited number of latent topics which can be mapped to clustering structures. The latent topic extraction based on the matrix representation of documents is formulated as a constraint optimization problem in which each matrix (i.e., a document) A_i is factorized into a common base determined by non-negative matrices L and R^\\top, and a non-negative weight matrix M_i such that the sum of reconstruction error on all documents is minimized. Empirical evaluation demonstrates that it is feasible to use the matrix model for document clustering: (1) compared with vector representation, using matrix representation improves clustering quality consistently, and the proposed approach achieves a relative accuracy improvement up to 66\\% on the studied datasets, and (2) the proposed method outperforms baseline methods such as k-means and NMF, and complements the state-of-the-art methods like LDA and PLSI. Furthermore, the proposed matrix model allows more refined information retrieval at a segment level instead of at a document level, which enables the return of more relevant documents in information retrieval tasks.",
"fno": "4408a804",
"keywords": [
"Document Clustering",
"Document Representation",
"Matrix Representation",
"Non Negative Matrix Approximation"
],
"authors": [
{
"affiliation": null,
"fullName": "Xufei Wang",
"givenName": "Xufei",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jiliang Tang",
"givenName": "Jiliang",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Huan Liu",
"givenName": "Huan",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "804-813",
"year": "2011",
"issn": "1550-4786",
"isbn": "978-0-7695-4408-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4408a794",
"articleId": "12OmNz2C1lL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4408a814",
"articleId": "12OmNrEL2BT",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wism/2010/4224/1/4224a297",
"title": "Study on Application of Document Representation Model Based on Query and Content Information in Website Search Engine",
"doi": null,
"abstractUrl": "/proceedings-article/wism/2010/4224a297/12OmNC2fGrY",
"parentPublication": {
"id": "proceedings/wism/2010/4224/1",
"title": "Web Information Systems and Mining, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ic3/2015/7947/0/07346657",
"title": "Leveraging probabilistic segmentation to document clustering",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2015/07346657/12OmNrAMEJR",
"parentPublication": {
"id": "proceedings/ic3/2015/7947/0",
"title": "2015 Eighth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/digitel/2010/3993/0/3993a185",
"title": "Document Clustering Method Using Weighted Semantic Features and Cluster Similarity",
"doi": null,
"abstractUrl": "/proceedings-article/digitel/2010/3993a185/12OmNs0kyER",
"parentPublication": {
"id": "proceedings/digitel/2010/3993/0",
"title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2012/4905/0/4905a201",
"title": "Robust Nonnegative Matrix Factorization via Half-Quadratic Minimization",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2012/4905a201/12OmNvpew83",
"parentPublication": {
"id": "proceedings/icdm/2012/4905/0",
"title": "2012 IEEE 12th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a541",
"title": "Weighted Feature Subset Non-negative Matrix Factorization and Its Applications to Document Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a541/12OmNwF0C8W",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eee/2005/2274/0/22740353",
"title": "Learning the Kernel Matrix for XML Document Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/eee/2005/22740353/12OmNxxdZHx",
"parentPublication": {
"id": "proceedings/eee/2005/2274/0",
"title": "Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2011/4513/1/4513a015",
"title": "Phoneme Based Representation for Vietnamese Web Page Classification",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2011/4513a015/12OmNyrIav3",
"parentPublication": {
"id": "proceedings/wi-iat/2011/4513/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2012/4905/0/4905b092",
"title": "Sparse Subspace Representation for Spectral Document Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2012/4905b092/12OmNzwZ6m0",
"parentPublication": {
"id": "proceedings/icdm/2012/4905/0",
"title": "2012 IEEE 12th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1998/03/i0294",
"title": "Document Representation and Its Application to Page Decomposition",
"doi": null,
"abstractUrl": "/journal/tp/1998/03/i0294/13rRUEgs2MT",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2004/10/k1279",
"title": "Efficient Phrase-Based Document Indexing for Web Document Clustering",
"doi": null,
"abstractUrl": "/journal/tk/2004/10/k1279/13rRUxDIthx",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1hJrHq07uw0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1hJshpgTpWE",
"doi": "10.1109/BigData47090.2019.9006118",
"title": "Representation Learning in Heterogeneous Professional Social Networks with Ambiguous Social Connections",
"normalizedTitle": "Representation Learning in Heterogeneous Professional Social Networks with Ambiguous Social Connections",
"abstract": "Network representations have been shown to improve performance within a variety of tasks, including classification, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social networks (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength-aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Network representations have been shown to improve performance within a variety of tasks, including classification, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social networks (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength-aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Network representations have been shown to improve performance within a variety of tasks, including classification, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social networks (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength-aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches.",
"fno": "09006118",
"keywords": [
"Graph Theory",
"Learning Artificial Intelligence",
"Random Processes",
"Social Networking Online",
"Low Dimensional Node Representations",
"Heterogeneous Professional Social Networks",
"Ambiguous Social Connections",
"General Heterogeneous Network Representation Learning Model",
"Star 2 Vec",
"Social Connection",
"Facebook",
"Social Circle Classification",
"Member Entity Link Predictions",
"Network Representations",
"Moderate Sized Networks",
"Real World Heterogeneous Social Networks",
"Star 2 Vec Embeddings",
"Linked In Economic Graph",
"Biological System Modeling",
"Linked In",
"Task Analysis",
"Heterogeneous Networks",
"Economics",
"Reliability",
"Network Representation",
"Heterogeneous Professional Social Networks"
],
"authors": [
{
"affiliation": "LinkedIn",
"fullName": "Baoxu Shi",
"givenName": "Baoxu",
"surname": "Shi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LinkedIn",
"fullName": "Jaewon Yang",
"givenName": "Jaewon",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Notre Dame",
"fullName": "Tim Weninger",
"givenName": "Tim",
"surname": "Weninger",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Pinterest",
"fullName": "Jing How",
"givenName": "Jing",
"surname": "How",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LinkedIn",
"fullName": "Qi He",
"givenName": "Qi",
"surname": "He",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1928-1937",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-0858-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09006545",
"articleId": "1hJs9jWJjQ4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09006443",
"articleId": "1hJsfwzLLwc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/collaboratecom/2012/2740/0/06450904",
"title": "An entity-based platform for the integration of social and scientific services",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2012/06450904/12OmNASraGu",
"parentPublication": {
"id": "proceedings/collaboratecom/2012/2740/0",
"title": "2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493a240",
"title": "Multiresolution Mutual Information Method for Social Network Entity Resolution",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a240/12OmNBKmXei",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imsccs/2007/3039/0/30390322",
"title": "Community Ranking in Social Network",
"doi": null,
"abstractUrl": "/proceedings-article/imsccs/2007/30390322/12OmNBTs7pc",
"parentPublication": {
"id": "proceedings/imsccs/2007/3039/0",
"title": "2007 Second International Multisymposium on Computer and Computational Sciences - IMSCCS '07",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbd/2017/1072/0/1072a194",
"title": "A Multidimensional Comprehensive Recommendation Method Based on Social Network",
"doi": null,
"abstractUrl": "/proceedings-article/cbd/2017/1072a194/12OmNs5rkLW",
"parentPublication": {
"id": "proceedings/cbd/2017/1072/0",
"title": "2017 Fifth International Conference on Advanced Cloud and Big Data (CBD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2015/9504/0/9504b057",
"title": "Learning Career Mobility and Human Activity Patterns for Job Change Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2015/9504b057/12OmNx4Q6C3",
"parentPublication": {
"id": "proceedings/icdm/2015/9504/0",
"title": "2015 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2016/5670/0/5670c156",
"title": "Getting a Job via Career-Oriented Social Networking Sites: The Weakness of Ties",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2016/5670c156/12OmNxEjXO7",
"parentPublication": {
"id": "proceedings/hicss/2016/5670/0",
"title": "2016 49th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2015/9795/0/9795a220",
"title": "Evaluate the International Talents in Professional Social Networks Using the Entropy Weight Method",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2015/9795a220/12OmNxuo0l4",
"parentPublication": {
"id": "proceedings/csci/2015/9795/0",
"title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2015/3854/0/07403540",
"title": "Social ties and checkin sites: Connections and latent structures in Location Based Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2015/07403540/12OmNyk2ZWO",
"parentPublication": {
"id": "proceedings/asonam/2015/3854/0",
"title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pac/2017/1027/0/1027a013",
"title": "LinkedIn Salary: A System for Secure Collection and Presentation of Structured Compensation Insights to Job Seekers",
"doi": null,
"abstractUrl": "/proceedings-article/pac/2017/1027a013/12OmNyoiZbz",
"parentPublication": {
"id": "proceedings/pac/2017/1027/0",
"title": "2017 IEEE Symposium on Privacy-Aware Computing (PAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/05/v0677",
"title": "MatrixExplorer: a Dual-Representation System to Explore Social Networks",
"doi": null,
"abstractUrl": "/journal/tg/2006/05/v0677/13rRUwInuWp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNASrawG",
"title": "Proceedings of 1993 IEEE International Conference on Computer Design ICCD'93",
"acronym": "iccd",
"groupId": "1000129",
"volume": "0",
"displayVolume": "0",
"year": "1993",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvStcwf",
"doi": "10.1109/ICCD.1993.393406",
"title": "Hardware verification using symbolic state transition graphs",
"normalizedTitle": "Hardware verification using symbolic state transition graphs",
"abstract": "A new approach for hardware verification using symbolic state transition graphs (implemented in BDDs) is presented. We propose a novel idea, a symbolic state transition graph (STG), which can represent finite state machines FSM in terms of the relations between symbolic input variables, state variables, and output results, rather than the exact input-output bit patterns. Compared to conventional STG methods, the symbolic STG is more concise, higher-level, has fewer states and is easier to specify. Based on the transition relation method and an event-driven scheduling technique to compute the symbolic states, we propose two algorithms to verify the circuit implementation with respect to its symbolic STGs. The algorithms can be used to find out a necessary condition for the implementation to satisfy the specification, which can be used for the allocation of design errors.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "A new approach for hardware verification using symbolic state transition graphs (implemented in BDDs) is presented. We propose a novel idea, a symbolic state transition graph (STG), which can represent finite state machines FSM in terms of the relations between symbolic input variables, state variables, and output results, rather than the exact input-output bit patterns. Compared to conventional STG methods, the symbolic STG is more concise, higher-level, has fewer states and is easier to specify. Based on the transition relation method and an event-driven scheduling technique to compute the symbolic states, we propose two algorithms to verify the circuit implementation with respect to its symbolic STGs. The algorithms can be used to find out a necessary condition for the implementation to satisfy the specification, which can be used for the allocation of design errors.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A new approach for hardware verification using symbolic state transition graphs (implemented in BDDs) is presented. We propose a novel idea, a symbolic state transition graph (STG), which can represent finite state machines FSM in terms of the relations between symbolic input variables, state variables, and output results, rather than the exact input-output bit patterns. Compared to conventional STG methods, the symbolic STG is more concise, higher-level, has fewer states and is easier to specify. Based on the transition relation method and an event-driven scheduling technique to compute the symbolic states, we propose two algorithms to verify the circuit implementation with respect to its symbolic STGs. The algorithms can be used to find out a necessary condition for the implementation to satisfy the specification, which can be used for the allocation of design errors.",
"fno": "00393406",
"keywords": [
"Formal Verification",
"Finite State Machines",
"Graph Theory",
"Scheduling",
"State Space Methods",
"Logic Testing",
"Binary Decision Diagrams",
"Design Error Allocation",
"Symbolic State Transition Graphs",
"Hardware Verification",
"Finite State Machines",
"Symbolic Input Variables",
"State Variables",
"Output Results",
"Transition Relation Method",
"Event Driven Scheduling Technique",
"Circuit Implementation",
"Specification",
"Hardware",
"Algorithm Design And Analysis",
"Data Structures",
"Boolean Functions",
"Circuit Simulation",
"Computational Modeling",
"Registers",
"Industrial Relations",
"Input Variables",
"Job Shop Scheduling"
],
"authors": [
{
"affiliation": "Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan",
"fullName": "P. Chen",
"givenName": "P.",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "J.-M. Shyu",
"givenName": "J.-M.",
"surname": "Shyu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "L.-G. Chen",
"givenName": "L.-G.",
"surname": "Chen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccd",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1993-01-01T00:00:00",
"pubType": "proceedings",
"pages": "54,55,56,57",
"year": "1993",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00393405",
"articleId": "12OmNClQ0rj",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00393407",
"articleId": "12OmNBlofME",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccad/1992/3010/0/00279389",
"title": "A generalized state assignment theory for transformations on signal transition graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/1992/00279389/12OmNAP1YZv",
"parentPublication": {
"id": "proceedings/iccad/1992/3010/0",
"title": "1992 IEEE/ACM International Conference on Computer-Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/1992/2822/0/00227821",
"title": "Solving the state assignment problem for signal transition graphs",
"doi": null,
"abstractUrl": "/proceedings-article/dac/1992/00227821/12OmNBaBuU5",
"parentPublication": {
"id": "proceedings/dac/1992/2822/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpc/2009/3998/0/05090069",
"title": "Structure transition graphs: An ECG for program comprehension?",
"doi": null,
"abstractUrl": "/proceedings-article/icpc/2009/05090069/12OmNBqdr4l",
"parentPublication": {
"id": "proceedings/icpc/2009/3998/0",
"title": "2009 IEEE 17th International Conference on Program Comprehension (ICPC 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edtc/1995/7039/0/70390325",
"title": "Checking signal transition graph implementability by symbolic BDD traversal",
"doi": null,
"abstractUrl": "/proceedings-article/edtc/1995/70390325/12OmNrJAdUY",
"parentPublication": {
"id": "proceedings/edtc/1995/7039/0",
"title": "European Design and Test Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2006/2556/0/25560047",
"title": "On the Complexity of Consistency and Complete State Coding for Signal Transition Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2006/25560047/12OmNroijd8",
"parentPublication": {
"id": "proceedings/acsd/2006/2556/0",
"title": "Sixth International Conference on Application of Concurrency to System Design (ACSD'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/test/1990/9064/0/00114065",
"title": "State transition graph analysis as a key to BIST fault coverage",
"doi": null,
"abstractUrl": "/proceedings-article/test/1990/00114065/12OmNvlg8jG",
"parentPublication": {
"id": "proceedings/test/1990/9064/0",
"title": "1990 International Test Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2003/1887/0/18870061",
"title": "A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2003/18870061/12OmNx5GUcf",
"parentPublication": {
"id": "proceedings/acsd/2003/1887/0",
"title": "Third International Conference on Application of Concurrency to System Design, 2003. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aspdac/1998/4425/0/00669440",
"title": "On the CSC property of signal transition graph specifications for asynchronous circuit design",
"doi": null,
"abstractUrl": "/proceedings-article/aspdac/1998/00669440/12OmNx7ouUs",
"parentPublication": {
"id": "proceedings/aspdac/1998/4425/0",
"title": "Proceedings of 1998 Asia and South Pacific Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2018/8023/0/802300a115",
"title": "Abstract State Transition Graphs for Model-Based Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2018/802300a115/17D45VTRoA8",
"parentPublication": {
"id": "proceedings/bracis/2018/8023/0",
"title": "2018 7th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2019/4253/0/425300a263",
"title": "Laplacian using Abstract State Transition Graphs: A Framework for Skill Acquisition",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2019/425300a263/1fHkJ24R6X6",
"parentPublication": {
"id": "proceedings/bracis/2019/4253/0",
"title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAWpylc",
"title": "2010 International Symposium on Voronoi Diagrams in Science and Engineering",
"acronym": "isvd",
"groupId": "1001201",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwLOYTQ",
"doi": "10.1109/ISVD.2010.26",
"title": "Voronoi Diagrams on Periodic Graphs",
"normalizedTitle": "Voronoi Diagrams on Periodic Graphs",
"abstract": "A periodic graph models various natural and artficial periodic patterns with repetitions of a given static graph, and have vast applications in crystallography, scheduling, VLSI circuits and systems of uniform recurrence equations. This paper considers a graph Voronoi diagram for a given subset of vertices on a periodic graph. The simplest two-dimensional periodic graph is a square lattice, and the Voronoi diagram on the lattice geometrically corresponds to the Z_$L_1$_Z Voronoi diagram in the plane. We extend this geometric relation for the two-dimensional periodic graphs, including the honeycomb lattice, kagom\\'{e} lattice and two-dimensional periodic graph with small static graph. For these graphs, the graph Voronoi diagram can be represented implicitly by Voronoi diagrams with respect to appropriate convex-distance functions with extra elaborations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A periodic graph models various natural and artficial periodic patterns with repetitions of a given static graph, and have vast applications in crystallography, scheduling, VLSI circuits and systems of uniform recurrence equations. This paper considers a graph Voronoi diagram for a given subset of vertices on a periodic graph. The simplest two-dimensional periodic graph is a square lattice, and the Voronoi diagram on the lattice geometrically corresponds to the $L_1$ Voronoi diagram in the plane. We extend this geometric relation for the two-dimensional periodic graphs, including the honeycomb lattice, kagom\\'{e} lattice and two-dimensional periodic graph with small static graph. For these graphs, the graph Voronoi diagram can be represented implicitly by Voronoi diagrams with respect to appropriate convex-distance functions with extra elaborations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A periodic graph models various natural and artficial periodic patterns with repetitions of a given static graph, and have vast applications in crystallography, scheduling, VLSI circuits and systems of uniform recurrence equations. This paper considers a graph Voronoi diagram for a given subset of vertices on a periodic graph. The simplest two-dimensional periodic graph is a square lattice, and the Voronoi diagram on the lattice geometrically corresponds to the - Voronoi diagram in the plane. We extend this geometric relation for the two-dimensional periodic graphs, including the honeycomb lattice, kagom\\'{e} lattice and two-dimensional periodic graph with small static graph. For these graphs, the graph Voronoi diagram can be represented implicitly by Voronoi diagrams with respect to appropriate convex-distance functions with extra elaborations.",
"fno": "4112a189",
"keywords": [
"Periodic Graphs",
"Shortest Paths",
"Graph Voronoi Diagrams"
],
"authors": [
{
"affiliation": null,
"fullName": "Norie Fu",
"givenName": "Norie",
"surname": "Fu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hiroshi Imai",
"givenName": "Hiroshi",
"surname": "Imai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sonoko Moriyama",
"givenName": "Sonoko",
"surname": "Moriyama",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isvd",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-06-01T00:00:00",
"pubType": "proceedings",
"pages": "189-198",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4112-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4112a181",
"articleId": "12OmNyNQSKY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4112a199",
"articleId": "12OmNAgoV97",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isvd/2009/3781/0/3781a137",
"title": "Round-Tour Voronoi Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2009/3781a137/12OmNB9bvii",
"parentPublication": {
"id": "proceedings/isvd/2009/3781/0",
"title": "2009 Sixth International Symposium on Voronoi Diagrams",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2010/4112/0/4112a023",
"title": "Revisiting Hyperbolic Voronoi Diagrams from Theoretical, Applied and Generalized Viewpoints",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2010/4112a023/12OmNvDZEYn",
"parentPublication": {
"id": "proceedings/isvd/2010/4112/0",
"title": "2010 International Symposium on Voronoi Diagrams in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsa/2009/3701/0/3701a159",
"title": "On Voronoi Diagrams for Lines in the Plane",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2009/3701a159/12OmNviZlqs",
"parentPublication": {
"id": "proceedings/iccsa/2009/3701/0",
"title": "2009 International Conference on Computational Science and Its Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgi/1997/7825/0/78250230",
"title": "Geodesic Voronoi Diagrams on Parametric Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/cgi/1997/78250230/12OmNwDACyS",
"parentPublication": {
"id": "proceedings/cgi/1997/7825/0",
"title": "Computer Graphics International Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2011/4483/0/4483a177",
"title": "Computing 2D Periodic Centroidal Voronoi Tessellation",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2011/4483a177/12OmNwHhoTy",
"parentPublication": {
"id": "proceedings/isvd/2011/4483/0",
"title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsa/2010/3999/0/3999a074",
"title": "Hyperbolic Voronoi Diagrams Made Easy",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2010/3999a074/12OmNxVDuKN",
"parentPublication": {
"id": "proceedings/iccsa/2010/3999/0",
"title": "2010 International Conference on Computational Science and Its Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2009/3781/0/3781a183",
"title": "Balancing Graph Voronoi Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2009/3781a183/12OmNxwWou7",
"parentPublication": {
"id": "proceedings/isvd/2009/3781/0",
"title": "2009 Sixth International Symposium on Voronoi Diagrams",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2011/4483/0/4483a192",
"title": "Updates on Voronoi Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2011/4483a192/12OmNy314iJ",
"parentPublication": {
"id": "proceedings/isvd/2011/4483/0",
"title": "2011 Eighth International Symposium on Voronoi Diagrams in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2009/3781/0/3781a071",
"title": "The Dual Voronoi Diagrams with Respect to Representational Bregman Divergences",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2009/3781a071/12OmNzT7Otc",
"parentPublication": {
"id": "proceedings/isvd/2009/3781/0",
"title": "2009 Sixth International Symposium on Voronoi Diagrams",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvd/2009/3781/0/3781a053",
"title": "Approximate Shortest Path Queries in Graphs Using Voronoi Duals",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2009/3781a053/12OmNzdoMXc",
"parentPublication": {
"id": "proceedings/isvd/2009/3781/0",
"title": "2009 Sixth International Symposium on Voronoi Diagrams",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBqdr6P",
"title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)",
"acronym": "vlhcc",
"groupId": "1001007",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNypIYEz",
"doi": "10.1109/VLHCC.2010.31",
"title": "TimeSpiderTrees: A Novel Visual Metaphor for Dynamic Compound Graphs",
"normalizedTitle": "TimeSpiderTrees: A Novel Visual Metaphor for Dynamic Compound Graphs",
"abstract": "Graphs are a mathematical method to model relations between objects. The most common metaphor to visualize graphs is the node-link technique, which typically suffers from visual clutter caused by many edge crossings. Much research has been done on the development of sophisticated algorithms aimed at enhancing the layout with respect to edge crossings and a series of other aesthetic criteria. In this paper we propose a novel visual metaphor, called Time-SpiderTrees, which is based on a radial layout. In our technique, relations are visually indicated by orientation instead of connectedness to circumvent the problem of edge crossings. The strength of this novel visualization technique lies in the visual encoding of time-series relational data in a single view without animation, which helps to preserve the mental map and hence to reduce cognitive efforts.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graphs are a mathematical method to model relations between objects. The most common metaphor to visualize graphs is the node-link technique, which typically suffers from visual clutter caused by many edge crossings. Much research has been done on the development of sophisticated algorithms aimed at enhancing the layout with respect to edge crossings and a series of other aesthetic criteria. In this paper we propose a novel visual metaphor, called Time-SpiderTrees, which is based on a radial layout. In our technique, relations are visually indicated by orientation instead of connectedness to circumvent the problem of edge crossings. The strength of this novel visualization technique lies in the visual encoding of time-series relational data in a single view without animation, which helps to preserve the mental map and hence to reduce cognitive efforts.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graphs are a mathematical method to model relations between objects. The most common metaphor to visualize graphs is the node-link technique, which typically suffers from visual clutter caused by many edge crossings. Much research has been done on the development of sophisticated algorithms aimed at enhancing the layout with respect to edge crossings and a series of other aesthetic criteria. In this paper we propose a novel visual metaphor, called Time-SpiderTrees, which is based on a radial layout. In our technique, relations are visually indicated by orientation instead of connectedness to circumvent the problem of edge crossings. The strength of this novel visualization technique lies in the visual encoding of time-series relational data in a single view without animation, which helps to preserve the mental map and hence to reduce cognitive efforts.",
"fno": "05635217",
"keywords": [
"Computational Geometry",
"Data Visualisation",
"Trees Mathematics",
"Time Spider Trees",
"Visual Metaphor",
"Dynamic Compound Graph",
"Graph Visualization",
"Node Link Technique",
"Visual Clutter",
"Edge Crossing",
"Visualization Technique",
"Time Series Relational Data",
"Mental Map",
"Visualization",
"Layout",
"Image Edge Detection",
"Europe",
"Animation",
"Heuristic Algorithms",
"Focusing"
],
"authors": [
{
"affiliation": null,
"fullName": "Michael Burch",
"givenName": "Michael",
"surname": "Burch",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Michael Fritz",
"givenName": "Michael",
"surname": "Fritz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fabian Beck",
"givenName": "Fabian",
"surname": "Beck",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stephan Diehl",
"givenName": "Stephan",
"surname": "Diehl",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vlhcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-09-01T00:00:00",
"pubType": "proceedings",
"pages": "168-175",
"year": "2010",
"issn": "1943-6092",
"isbn": "978-1-4244-8485-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05635218",
"articleId": "12OmNxjjEcP",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05635222",
"articleId": "12OmNrAv3ZK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hcc/2001/7198/0/00995296",
"title": "Towards the conceptions of visualization language and visualization metaphor",
"doi": null,
"abstractUrl": "/proceedings-article/hcc/2001/00995296/12OmNrkT7uI",
"parentPublication": {
"id": "proceedings/hcc/2001/7198/0",
"title": "Proceedings of HCC 2001. IEEE Symposium on Human-Centric Computing Languages and Environments",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2016/0252/0/07739664",
"title": "Visual analysis of compound graphs",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2016/07739664/12OmNx7G5RX",
"parentPublication": {
"id": "proceedings/vlhcc/2016/0252/0",
"title": "2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl/1999/0216/0/02160246",
"title": "Does Metaphor Increase Visual Language Usability?",
"doi": null,
"abstractUrl": "/proceedings-article/vl/1999/02160246/12OmNx8Ouym",
"parentPublication": {
"id": "proceedings/vl/1999/0216/0",
"title": "Visual Languages, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2014/6854/0/6854a130",
"title": "A Hybrid Visual Analytics Approach to Dynamic Space-Based Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2014/6854a130/12OmNzAohUL",
"parentPublication": {
"id": "proceedings/icvrv/2014/6854/0",
"title": "2014 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nsw/2011/1049/0/06004630",
"title": "Time spring layout for visualization of dynamic social networks",
"doi": null,
"abstractUrl": "/proceedings-article/nsw/2011/06004630/12OmNzvhvAx",
"parentPublication": {
"id": "proceedings/nsw/2011/1049/0",
"title": "IEEE Network Science Workshop",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1990/01/t0124",
"title": "Crossing Minimization in Linear Embeddings of Graphs",
"doi": null,
"abstractUrl": "/journal/tc/1990/01/t0124/13rRUxASuRL",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiai-aai/2022/9755/0/975500a158",
"title": "Visual Metaphor Construction for Image and Description of Fashion Goods",
"doi": null,
"abstractUrl": "/proceedings-article/iiai-aai/2022/975500a158/1GU76ZDnDlS",
"parentPublication": {
"id": "proceedings/iiai-aai/2022/9755/0",
"title": "2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2022/9156/0/09966401",
"title": "Exploration Tool for Effectively Interpreting the Visual Metaphor Process of Sentiment Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2022/09966401/1IT0DG3tHPO",
"parentPublication": {
"id": "proceedings/ldav/2022/9156/0",
"title": "2022 IEEE 12th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2018/6861/0/08802457",
"title": "TimeMatrix: Visual Representation for Temporal Pattern Detection in Dynamic Networks, VAST 2018 Mini-Challenge 3",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2018/08802457/1cJ6YACp4sg",
"parentPublication": {
"id": "proceedings/vast/2018/6861/0",
"title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/10/08423100",
"title": "The Effect of Edge Bundling and Seriation on Sensemaking of Biclusters in Bipartite Graphs",
"doi": null,
"abstractUrl": "/journal/tg/2019/10/08423100/1d3e5UbWqis",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx3q6UM",
"title": "2017 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC)",
"acronym": "async",
"groupId": "1000014",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz6iONl",
"doi": "10.1109/ASYNC.2017.24",
"title": "Waveform Transition Graphs: A Designer-Friendly Formalism for Asynchronous Behaviours",
"normalizedTitle": "Waveform Transition Graphs: A Designer-Friendly Formalism for Asynchronous Behaviours",
"abstract": "The paper proposes a new formal model for describing asynchronous behaviours involving the interplay of causality, concurrency and choice. The model is called Waveform Transition Graphs. Its main aim is simplifying the learning process for industrial engineers in accessing powerful synthesis tools provided for Signal Transition Graphs by sacrificing some of the expressive power of the latter. This formalism is developed based on feedback from engineers of Dialog Semiconductor.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper proposes a new formal model for describing asynchronous behaviours involving the interplay of causality, concurrency and choice. The model is called Waveform Transition Graphs. Its main aim is simplifying the learning process for industrial engineers in accessing powerful synthesis tools provided for Signal Transition Graphs by sacrificing some of the expressive power of the latter. This formalism is developed based on feedback from engineers of Dialog Semiconductor.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper proposes a new formal model for describing asynchronous behaviours involving the interplay of causality, concurrency and choice. The model is called Waveform Transition Graphs. Its main aim is simplifying the learning process for industrial engineers in accessing powerful synthesis tools provided for Signal Transition Graphs by sacrificing some of the expressive power of the latter. This formalism is developed based on feedback from engineers of Dialog Semiconductor.",
"fno": "2749a073",
"keywords": [
"Asynchronous Circuits",
"Graphs",
"Logic Design",
"Network Synthesis",
"Waveform Transition Graphs",
"Designer Friendly Formalism",
"Asynchronous Behaviours",
"Powerful Synthesis Tools",
"Signal Transition Graphs",
"Concurrent Computing",
"Tools",
"Integrated Circuit Modeling",
"Computational Modeling",
"Petri Nets",
"Semiconductor Device Modeling",
"Three Dimensional Displays"
],
"authors": [
{
"affiliation": null,
"fullName": "Jordi Cortadella",
"givenName": "Jordi",
"surname": "Cortadella",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alberto Moreno",
"givenName": "Alberto",
"surname": "Moreno",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Danil Sokolov",
"givenName": "Danil",
"surname": "Sokolov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alex Yakovlev",
"givenName": "Alex",
"surname": "Yakovlev",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "David Lloyd",
"givenName": "David",
"surname": "Lloyd",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "async",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-05-01T00:00:00",
"pubType": "proceedings",
"pages": "73-74",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2749-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2749a065",
"articleId": "12OmNvDI40D",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2749a075",
"articleId": "12OmNxHrygU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wvl/1992/3090/0/00275751",
"title": "An execution model for demonstration-based visual languages",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1992/00275751/12OmNApLGur",
"parentPublication": {
"id": "proceedings/wvl/1992/3090/0",
"title": "Proceedings IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsea/2008/3372/0/3372a421",
"title": "System Design with Object Oriented Petri Nets Formalism",
"doi": null,
"abstractUrl": "/proceedings-article/icsea/2008/3372a421/12OmNBt3qjH",
"parentPublication": {
"id": "proceedings/icsea/2008/3372/0",
"title": "Software Engineering Advances, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2013/5035/0/5035a110",
"title": "On Cyclic Behaviour of Unbounded Petri Nets",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2013/5035a110/12OmNCcKQJO",
"parentPublication": {
"id": "proceedings/acsd/2013/5035/0",
"title": "2013 13th International Conference on Application of Concurrency to System Design (ACSD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fgcn/2008/3431/2/3431b201",
"title": "Formalism of the Access Control Model Based on the Marqued Petri Nets",
"doi": null,
"abstractUrl": "/proceedings-article/fgcn/2008/3431b201/12OmNvrMUjT",
"parentPublication": {
"id": "proceedings/fgcn/2008/3431/1",
"title": "Future Generation Communication and Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2016/2589/0/2589a065",
"title": "Products of Transition Systems and Additions of Petri Nets",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2016/2589a065/12OmNx3q71v",
"parentPublication": {
"id": "proceedings/acsd/2016/2589/0",
"title": "2016 16th International Conference on Application of Concurrency to System Design (ACSD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2003/1887/0/18870051",
"title": "Detecting State Coding Conflicts in STG Unfoldings Using SAT",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2003/18870051/12OmNx7ov6E",
"parentPublication": {
"id": "proceedings/acsd/2003/1887/0",
"title": "Third International Conference on Application of Concurrency to System Design, 2003. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/real/1993/4480/0/00393487",
"title": "A new Petri net based formalism for specification, design and analysis of real-time systems",
"doi": null,
"abstractUrl": "/proceedings-article/real/1993/00393487/12OmNxQOjEn",
"parentPublication": {
"id": "proceedings/real/1993/4480/0",
"title": "1993 Proceedings Real-Time Systems Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsd/2004/2077/0/20770016",
"title": "Logic Synthesis for Asynchronous Circuits Based on Petri Net Unfoldings and Incremental SAT",
"doi": null,
"abstractUrl": "/proceedings-article/acsd/2004/20770016/12OmNxdDFHJ",
"parentPublication": {
"id": "proceedings/acsd/2004/2077/0",
"title": "Proceedings. Fourth International Conference on Application of Concurrency to System Design, 2004. ACSD 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/2003/762/0/01257625",
"title": "Weibull based analytical waveform model",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/2003/01257625/12OmNyFU73f",
"parentPublication": {
"id": "proceedings/iccad/2003/762/0",
"title": "ICCAD-2003. International Conference on Computer Aided Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/async/2019/4747/0/474700a060",
"title": "Synthesis from Waveform Transition Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/async/2019/474700a060/1dIKOe4zhsc",
"parentPublication": {
"id": "proceedings/async/2019/4747/0",
"title": "2019 25th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyRxFmg",
"title": "2009 International Conference on Advances in Social Network Analysis and Mining",
"acronym": "asonam",
"groupId": "1002866",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAo45I0",
"doi": "10.1109/ASONAM.2009.12",
"title": "Predicting Links in Social Networks Using Text Mining and SNA",
"normalizedTitle": "Predicting Links in Social Networks Using Text Mining and SNA",
"abstract": "Lately there is great progress in business organizations perception towards social aspects. Competitive organizations need to create innovation and segregate in the market. Business interactions help reaching those goals but finding the effective interactions is a challenge. We propose a prediction method, based on Social Networks Analysis (SNA) and text data mining (TDM), for predicting which nodes in a social network will be linked next. The network which is used to demonstrate the proposed prediction method is composed of academic co-authors who collaborated on writing articles. Without loss of generality, the academic co-authoring network demonstrates the proposed prediction procedure due to its similarity to other networks, such as business co-operation networks. The results show that the best prediction is achieved by incorporating TDM with SNA.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Lately there is great progress in business organizations perception towards social aspects. Competitive organizations need to create innovation and segregate in the market. Business interactions help reaching those goals but finding the effective interactions is a challenge. We propose a prediction method, based on Social Networks Analysis (SNA) and text data mining (TDM), for predicting which nodes in a social network will be linked next. The network which is used to demonstrate the proposed prediction method is composed of academic co-authors who collaborated on writing articles. Without loss of generality, the academic co-authoring network demonstrates the proposed prediction procedure due to its similarity to other networks, such as business co-operation networks. The results show that the best prediction is achieved by incorporating TDM with SNA.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Lately there is great progress in business organizations perception towards social aspects. Competitive organizations need to create innovation and segregate in the market. Business interactions help reaching those goals but finding the effective interactions is a challenge. We propose a prediction method, based on Social Networks Analysis (SNA) and text data mining (TDM), for predicting which nodes in a social network will be linked next. The network which is used to demonstrate the proposed prediction method is composed of academic co-authors who collaborated on writing articles. Without loss of generality, the academic co-authoring network demonstrates the proposed prediction procedure due to its similarity to other networks, such as business co-operation networks. The results show that the best prediction is achieved by incorporating TDM with SNA.",
"fno": "3689a131",
"keywords": [
"Social Network",
"Prediction Social Network Analysis",
"Styling"
],
"authors": [
{
"affiliation": null,
"fullName": "Alon Bartal",
"givenName": "Alon",
"surname": "Bartal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Elan Sasson",
"givenName": "Elan",
"surname": "Sasson",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Gilad Ravid",
"givenName": "Gilad",
"surname": "Ravid",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "asonam",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-07-01T00:00:00",
"pubType": "proceedings",
"pages": "131-136",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3689-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3689a125",
"articleId": "12OmNyKJibl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3689a137",
"articleId": "12OmNyoiZa7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/uic-atc/2009/3737/0/3737a440",
"title": "Hidden Community Mining under the RST/POSL Framework",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc/2009/3737a440/12OmNBBQZrB",
"parentPublication": {
"id": "proceedings/uic-atc/2009/3737/0",
"title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2009/3689/0/3689a417",
"title": "Investigation of Network Structure in Taiwan Automobile Industry",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2009/3689a417/12OmNBbaH9u",
"parentPublication": {
"id": "proceedings/asonam/2009/3689/0",
"title": "2009 International Conference on Advances in Social Network Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a347",
"title": "Theft Gang Discovery Using Co-offending Knowledge and SNA",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a347/12OmNBqv285",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/socialinformatics/2012/5015/0/5015a304",
"title": "Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data",
"doi": null,
"abstractUrl": "/proceedings-article/socialinformatics/2012/5015a304/12OmNCgrD5S",
"parentPublication": {
"id": "proceedings/socialinformatics/2012/5015/0",
"title": "International Conference on Social Informatics (SocialInformatics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2012/4905/0/4905a755",
"title": "Predicting Links in Multi-relational and Heterogeneous Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2012/4905a755/12OmNrEL2xD",
"parentPublication": {
"id": "proceedings/icdm/2012/4905/0",
"title": "2012 IEEE 12th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csie/2009/3507/7/3507g391",
"title": "Architecture Model of Enterprise Computing Networks Based on SNA Methodology",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507g391/12OmNvBrgHx",
"parentPublication": {
"id": "proceedings/csie/2009/3507/7",
"title": "Computer Science and Information Engineering, World Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2012/4799/0/4799a948",
"title": "An SNA-based Evaluation Framework for Virtual Teams",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2012/4799a948/12OmNwBBqcd",
"parentPublication": {
"id": "proceedings/asonam/2012/4799/0",
"title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2011/4409/0/4409a358",
"title": "Random Walk Based Resource Allocation: Predicting and Recommending Links in Cross-Operator Mobile Communication Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2011/4409a358/12OmNzBOi0f",
"parentPublication": {
"id": "proceedings/icdmw/2011/4409/0",
"title": "2011 IEEE 11th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eitt/2019/4288/0/428800a067",
"title": "The influence of online Learners’ Power among SNA on Deep Knowledge Building",
"doi": null,
"abstractUrl": "/proceedings-article/eitt/2019/428800a067/1fHkS8IHBXW",
"parentPublication": {
"id": "proceedings/eitt/2019/4288/0",
"title": "2019 Eighth International Conference of Educational Innovation through Technology (EITT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2019/4941/0/08933639",
"title": "MissBiN: Visual Analysis of Missing Links in Bipartite Networks",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2019/08933639/1fTgIqqkKLC",
"parentPublication": {
"id": "proceedings/vis/2019/4941/0",
"title": "2019 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzTYC8R",
"title": "Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society",
"acronym": "infcom",
"groupId": "1000359",
"volume": "1",
"displayVolume": "1",
"year": "2001",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqBtiNr",
"doi": "10.1109/INFCOM.2001.916719",
"title": "Towards a deeper understanding of link restoration algorithms for mesh networks",
"normalizedTitle": "Towards a deeper understanding of link restoration algorithms for mesh networks",
"abstract": "We study the relationship between failure localization and the properties of link restoration algorithms, employing a quantitative measure of a network's ability to recover from two-link failures. This model allows us to consider issues of failure localization that cannot be addressed through models that assume only single failures. Based on the relationship between algorithmic properties and restoration failures, we construct a failure classification hierarchy that provides insight as to the relative value of advances in algorithm design. Finally, we apply this classification scheme to three networks from the literature and discuss the results in terms of their importance for link restoration algorithms. We find that the topological constraints on restoration paths required by algorithms that embed rings within mesh networks result in significant degradation of failure localization. The preselection of restoration paths (as opposed to selection at the time of failure) also has a negative impact, although it is not as significant as the topological effect. Algorithms that make use of the mesh topology and dynamically route around existing failures come close to an inherent limit imposed by the complexity of additional algorithmic advances.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We study the relationship between failure localization and the properties of link restoration algorithms, employing a quantitative measure of a network's ability to recover from two-link failures. This model allows us to consider issues of failure localization that cannot be addressed through models that assume only single failures. Based on the relationship between algorithmic properties and restoration failures, we construct a failure classification hierarchy that provides insight as to the relative value of advances in algorithm design. Finally, we apply this classification scheme to three networks from the literature and discuss the results in terms of their importance for link restoration algorithms. We find that the topological constraints on restoration paths required by algorithms that embed rings within mesh networks result in significant degradation of failure localization. The preselection of restoration paths (as opposed to selection at the time of failure) also has a negative impact, although it is not as significant as the topological effect. Algorithms that make use of the mesh topology and dynamically route around existing failures come close to an inherent limit imposed by the complexity of additional algorithmic advances.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We study the relationship between failure localization and the properties of link restoration algorithms, employing a quantitative measure of a network's ability to recover from two-link failures. This model allows us to consider issues of failure localization that cannot be addressed through models that assume only single failures. Based on the relationship between algorithmic properties and restoration failures, we construct a failure classification hierarchy that provides insight as to the relative value of advances in algorithm design. Finally, we apply this classification scheme to three networks from the literature and discuss the results in terms of their importance for link restoration algorithms. We find that the topological constraints on restoration paths required by algorithms that embed rings within mesh networks result in significant degradation of failure localization. The preselection of restoration paths (as opposed to selection at the time of failure) also has a negative impact, although it is not as significant as the topological effect. Algorithms that make use of the mesh topology and dynamically route around existing failures come close to an inherent limit imposed by the complexity of additional algorithmic advances.",
"fno": "00916719",
"keywords": [
"Network Topology",
"Telecommunication Network Reliability",
"Link Restoration Algorithms",
"Mesh Networks",
"Failure Localization",
"Two Link Failures",
"Failure Classification Hierarchy",
"Algorithm Design",
"Ring",
"Restoration Paths",
"Topological Effect",
"Mesh Networks",
"Network Topology",
"Algorithm Design And Analysis",
"Degradation",
"High Speed Networks",
"Coordinate Measuring Machines",
"Fluid Dynamics",
"Telecommunication Network Reliability",
"Protection"
],
"authors": [
{
"affiliation": "Coordinated Sci. Lab., Illinois Univ., Urbana, IL, USA",
"fullName": "S.S. Lumetta",
"givenName": "S.S.",
"surname": "Lumetta",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "M. Medard",
"givenName": "M.",
"surname": "Medard",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "infcom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2001-01-01T00:00:00",
"pubType": "proceedings",
"pages": "367,368,369,370,371,372,373,374,375",
"year": "2001",
"issn": "0743-166X",
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00916718",
"articleId": "12OmNqJ8tkP",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00916720",
"articleId": "12OmNyuPKUd",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/mascots/1995/6902/0/69020370",
"title": "Spare capacity assignment in telecom networks using path restoration",
"doi": null,
"abstractUrl": "/proceedings-article/mascots/1995/69020370/12OmNBUS72M",
"parentPublication": {
"id": "proceedings/mascots/1995/6902/0",
"title": "MASCOTS '95. Proceedings of the Third International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2003/7983/0/01227467",
"title": "Post-restoration strategies in ASTN-based optical mesh networks",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2003/01227467/12OmNCcbE4I",
"parentPublication": {
"id": "proceedings/aiccsa/2003/7983/0",
"title": "ACS/IEEE International Conference on Computer Systems and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/srds/2010/4250/0/4250a353",
"title": "Data-Mining-Based Link Failure Detection for Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/srds/2010/4250a353/12OmNs0C9Rq",
"parentPublication": {
"id": "proceedings/srds/2010/4250/0",
"title": "Reliable Distributed Systems, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccn/1999/5794/0/00805542",
"title": "Local restoration algorithm for link-state routing protocols",
"doi": null,
"abstractUrl": "/proceedings-article/icccn/1999/00805542/12OmNxFJXPH",
"parentPublication": {
"id": "proceedings/icccn/1999/5794/0",
"title": "Proceedings of IC3N'99: Eighth International Conference on Computer Communications and Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/infcom/1993/3580/0/00253261",
"title": "An analysis of the congestion effects of link failures in wide area networks",
"doi": null,
"abstractUrl": "/proceedings-article/infcom/1993/00253261/12OmNyv7mls",
"parentPublication": {
"id": "proceedings/infcom/1993/3580/0",
"title": "IEEE INFOCOM '93",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2013/5287/0/06504067",
"title": "Restorability on 3-connected WDM networks under single and dual physical link failures",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2013/06504067/12OmNzQzqfu",
"parentPublication": {
"id": "proceedings/icnc/2013/5287/0",
"title": "2013 International Conference on Computing, Networking and Communications (ICNC 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2008/01/04448981",
"title": "Improved quasi-path restoration in mesh networks",
"doi": null,
"abstractUrl": "/journal/nt/2008/01/04448981/13rRUwInvca",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2011/01/05508436",
"title": "Fast simulation of service availability in mesh networks with dynamic path restoration",
"doi": null,
"abstractUrl": "/journal/nt/2011/01/05508436/13rRUxBrGdp",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2004/06/01369298",
"title": "Loopback recovery from double-link failures in optical mesh networks",
"doi": null,
"abstractUrl": "/journal/nt/2004/06/01369298/13rRUxE04qE",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2014/04/06587838",
"title": "On Signaling-Free Failure Dependent Restoration in All-Optical Mesh Networks",
"doi": null,
"abstractUrl": "/journal/nt/2014/04/06587838/13rRUzpQPKZ",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBqMDAY",
"title": "Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)",
"acronym": "hicss",
"groupId": "1000730",
"volume": "8",
"displayVolume": "7",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwoPtvw",
"doi": "10.1109/HICSS.2006.526",
"title": "Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory",
"normalizedTitle": "Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory",
"abstract": "After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) and organizational transformation. This paper introduces the use of social network analysis (SNA) methods to analyze this link. SNA is a social structural approach that focuses on dynamic relationships among the technology, its adopters, and the social context they are in. It is used in this study to test Galbraith?s Organizational Information Processing Theory (OIPT) in describing three IT-enabled BPR efforts. The results of the research show that SNA coupled with the OIPT is capable of explaining how technological innovation and process innovation interact within the context of BPR. The results of the research also provide measures that can be used by practitioners and researchers as leading indicators of BPR success.",
"abstracts": [
{
"abstractType": "Regular",
"content": "After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) and organizational transformation. This paper introduces the use of social network analysis (SNA) methods to analyze this link. SNA is a social structural approach that focuses on dynamic relationships among the technology, its adopters, and the social context they are in. It is used in this study to test Galbraith?s Organizational Information Processing Theory (OIPT) in describing three IT-enabled BPR efforts. The results of the research show that SNA coupled with the OIPT is capable of explaining how technological innovation and process innovation interact within the context of BPR. The results of the research also provide measures that can be used by practitioners and researchers as leading indicators of BPR success.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "After more than a decade of research in information technology-enabled business process reengineering (BPR), no clear theory explains the link between information technology (IT) and organizational transformation. This paper introduces the use of social network analysis (SNA) methods to analyze this link. SNA is a social structural approach that focuses on dynamic relationships among the technology, its adopters, and the social context they are in. It is used in this study to test Galbraith?s Organizational Information Processing Theory (OIPT) in describing three IT-enabled BPR efforts. The results of the research show that SNA coupled with the OIPT is capable of explaining how technological innovation and process innovation interact within the context of BPR. The results of the research also provide measures that can be used by practitioners and researchers as leading indicators of BPR success.",
"fno": "250780202a",
"keywords": [
"Social Network Analysis",
"Theory Testing",
"I Tenabled BPR",
"Business Process Reengineering",
"Business Process Redesign",
"Process Innovation",
"Multiple Case Study Research"
],
"authors": [
{
"affiliation": "University of Minnesota Duluth",
"fullName": "Nik R. Hassan",
"givenName": "Nik R.",
"surname": "Hassan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of North Texas",
"fullName": "Tom C. Richards",
"givenName": "Tom C.",
"surname": "Richards",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of North Texas",
"fullName": "Jack D. Becker",
"givenName": "Jack D.",
"surname": "Becker",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hicss",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2006-01-01T00:00:00",
"pubType": "proceedings",
"pages": "202a",
"year": "2006",
"issn": "1530-1605",
"isbn": "0-7695-2507-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "250780201",
"articleId": "12OmNButq0B",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "250780202b",
"articleId": "12OmNwbukgC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icife/2009/3606/0/3606a079",
"title": "Business Process Reengineering: A Holistic Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icife/2009/3606a079/12OmNB1eJBg",
"parentPublication": {
"id": "proceedings/icife/2009/3606/0",
"title": "2009 International Conference on Information and Financial Engineering, ICIFE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmb/2009/3691/0/3691a353",
"title": "Exploring the Organizational Effects of Mobile Business Process Reengineering",
"doi": null,
"abstractUrl": "/proceedings-article/icmb/2009/3691a353/12OmNBTs7w2",
"parentPublication": {
"id": "proceedings/icmb/2009/3691/0",
"title": "2009 Eighth International Conference on Mobile Business, ICMB",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spire/1999/0268/0/02680262",
"title": "PAWS: Towards a Participatory Approach to Business Process Reengineering",
"doi": null,
"abstractUrl": "/proceedings-article/spire/1999/02680262/12OmNBzRNtv",
"parentPublication": {
"id": "proceedings/spire/1999/0268/0",
"title": "String Processing and Information Retrieval, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2001/0981/8/09818022",
"title": "Holistic Business Process Reengineering: An International Empirical Survey",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2001/09818022/12OmNC2OSLu",
"parentPublication": {
"id": "proceedings/hicss/2001/0981/8",
"title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/1995/6945/0/69450581",
"title": "Innovation in business processes-a discussion of research methods to study the process of innovation",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/1995/69450581/12OmNCmpcPC",
"parentPublication": {
"id": "proceedings/hicss/1995/6945/0",
"title": "28th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isbim/2008/3560/1/3560a173",
"title": "Implementation of the Computer Aided Business Process Reengineering System Based on UML and J2EE Technology",
"doi": null,
"abstractUrl": "/proceedings-article/isbim/2008/3560a173/12OmNvAAtjc",
"parentPublication": {
"id": "proceedings/isbim/2008/3560/1",
"title": "2008 International Seminar on Business and Information Management (ISBIM 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/1998/8242/4/82420345",
"title": "Accountability Centered Approach to Business Process Reengineering",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/1998/82420345/12OmNvqmUKP",
"parentPublication": {
"id": "proceedings/hicss/1998/8242/4",
"title": "Thirty-First Annual Hawaii International Conference on System Sciences-Volume 4",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spire/1999/0268/0/02680314",
"title": "A Groupware Tool to Support Participatory Business Process Reengineering",
"doi": null,
"abstractUrl": "/proceedings-article/spire/1999/02680314/12OmNwF0BLl",
"parentPublication": {
"id": "proceedings/spire/1999/0268/0",
"title": "String Processing and Information Retrieval, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sccc/2001/1396/0/13960013",
"title": "Participatory Business Process Reengineering Design: Generating Solutions",
"doi": null,
"abstractUrl": "/proceedings-article/sccc/2001/13960013/12OmNxE2mMm",
"parentPublication": {
"id": "proceedings/sccc/2001/1396/0",
"title": "SCCC 2001. 21st International Conference of the Chilean Computer Science Society",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pci/2008/3323/0/3323a181",
"title": "The Intervening Role of BPR in the ICT -- Business Performance Relationship",
"doi": null,
"abstractUrl": "/proceedings-article/pci/2008/3323a181/12OmNzvQHKl",
"parentPublication": {
"id": "proceedings/pci/2008/3323/0",
"title": "2008 Panhellenic Conference on Informatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNySXF2o",
"title": "2010 International Conference on Advances in Social Networks Analysis and Mining",
"acronym": "asonam",
"groupId": "1002866",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxFJXEb",
"doi": "10.1109/ASONAM.2010.86",
"title": "A Multidisciplinary Model of Dynamic and Semantic Social Networks Analysis for Institutions",
"normalizedTitle": "A Multidisciplinary Model of Dynamic and Semantic Social Networks Analysis for Institutions",
"abstract": "Social networks of the Web 2.0 have become global (e.g. FaceBook, MSN). In 1977, L. C. FREEMAN published the first generic metrics for Social Networks Analysis (SNA), mainly based on static graph-mining models. The objective of our work is to introduce new dynamic SNA models dedicated to SNA and to take the conceptual aspects of enterprises and institutions social graph into account. Our work is based on the definition of new multidimensional measures in SNA for new decision-making functions in Human Resource Management (HRM). The presented contributions makes it original. They are: (1) a measure of tension of a social network, (2) an electrodynamic and predictive system for semantic recommendations on social graphs evolutions and (3) a measure of reactance of a social network used to evaluate the individual stress of its members.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Social networks of the Web 2.0 have become global (e.g. FaceBook, MSN). In 1977, L. C. FREEMAN published the first generic metrics for Social Networks Analysis (SNA), mainly based on static graph-mining models. The objective of our work is to introduce new dynamic SNA models dedicated to SNA and to take the conceptual aspects of enterprises and institutions social graph into account. Our work is based on the definition of new multidimensional measures in SNA for new decision-making functions in Human Resource Management (HRM). The presented contributions makes it original. They are: (1) a measure of tension of a social network, (2) an electrodynamic and predictive system for semantic recommendations on social graphs evolutions and (3) a measure of reactance of a social network used to evaluate the individual stress of its members.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Social networks of the Web 2.0 have become global (e.g. FaceBook, MSN). In 1977, L. C. FREEMAN published the first generic metrics for Social Networks Analysis (SNA), mainly based on static graph-mining models. The objective of our work is to introduce new dynamic SNA models dedicated to SNA and to take the conceptual aspects of enterprises and institutions social graph into account. Our work is based on the definition of new multidimensional measures in SNA for new decision-making functions in Human Resource Management (HRM). The presented contributions makes it original. They are: (1) a measure of tension of a social network, (2) an electrodynamic and predictive system for semantic recommendations on social graphs evolutions and (3) a measure of reactance of a social network used to evaluate the individual stress of its members.",
"fno": "4138a397",
"keywords": [
"Social Networks Analysis SNA",
"Dynamic Analysis",
"Semantic Analysis",
"Ontologies",
"Electrodynamic"
],
"authors": [
{
"affiliation": null,
"fullName": "Christophe Thovex",
"givenName": "Christophe",
"surname": "Thovex",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Francky Trichet",
"givenName": "Francky",
"surname": "Trichet",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "asonam",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "397-399",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4138-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4138a395",
"articleId": "12OmNrJ11zb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4138a400",
"articleId": "12OmNxd4tzO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/asonam/2009/3689/0/3689a131",
"title": "Predicting Links in Social Networks Using Text Mining and SNA",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2009/3689a131/12OmNAo45I0",
"parentPublication": {
"id": "proceedings/asonam/2009/3689/0",
"title": "2009 International Conference on Advances in Social Network Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2011/4492/0/4492a283",
"title": "Predictive Semantic Social Media Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2011/4492a283/12OmNCf1Dtk",
"parentPublication": {
"id": "proceedings/icsc/2011/4492/0",
"title": "2011 IEEE Fifth International Conference on Semantic Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/socialinformatics/2012/5015/0/5015a304",
"title": "Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data",
"doi": null,
"abstractUrl": "/proceedings-article/socialinformatics/2012/5015a304/12OmNCgrD5S",
"parentPublication": {
"id": "proceedings/socialinformatics/2012/5015/0",
"title": "International Conference on Social Informatics (SocialInformatics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2011/4375/0/4375a045",
"title": "A Semantic and Multidisciplinary Model for Professional and Social Networks Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2011/4375a045/12OmNqFa5mJ",
"parentPublication": {
"id": "proceedings/asonam/2011/4375/0",
"title": "2011 International Conference on Advances in Social Networks Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2012/4799/0/4799b032",
"title": "Classification Analysis in Complex Online Social Networks Using Semantic Web Technologies",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2012/4799b032/12OmNvrvjaf",
"parentPublication": {
"id": "proceedings/asonam/2012/4799/0",
"title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscid/2010/4198/1/4198a128",
"title": "A New Method for Measuring Individual Importance in Social Network Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iscid/2010/4198a128/12OmNwdL7l1",
"parentPublication": {
"id": "proceedings/iscid/2010/4198/1",
"title": "Computational Intelligence and Design, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2009/3823/4/3823e332",
"title": "First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2009/3823e332/12OmNwoPtjX",
"parentPublication": {
"id": "proceedings/cse/2009/3823/2",
"title": "2009 International Conference on Computational Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2012/4702/0/4702a676",
"title": "Semantic Integration of Social Information in Learning Systems",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2012/4702a676/12OmNzt0IJU",
"parentPublication": {
"id": "proceedings/icalt/2012/4702/0",
"title": "Advanced Learning Technologies, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ubicomm/2007/2993/0/29930263",
"title": "Structural Determination of Ontology-Driven Trust Networks in Semantic Social Institutions and Ecosystems",
"doi": null,
"abstractUrl": "/proceedings-article/ubicomm/2007/29930263/12OmNzvz6OS",
"parentPublication": {
"id": "proceedings/ubicomm/2007/2993/0",
"title": "Mobile Ubiquitous Computing, Systems, Services and Technologies, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2018/9385/0/938500a561",
"title": "Towards Semantic-Based Social Network Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2018/938500a561/19RSuDPUnHG",
"parentPublication": {
"id": "proceedings/sitis/2018/9385/0",
"title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBkfRg1",
"title": "2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery",
"acronym": "cyberc",
"groupId": "1002974",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy9Prll",
"doi": "10.1109/CyberC.2012.14",
"title": "Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery",
"normalizedTitle": "Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery",
"abstract": "A criminal network is a kind of social networks with both secrecy and efficiency. The hidden knowledge in criminal networks can be regarded as an important indicators for criminal investigations which can help finding the criminal's relationship and identifying suspects. However such criminal network analysis has not been studied well in an applied way and remains primarily a manual process. To assist investigators to find criminals relationship, criminal leader, and identify suspicious guys of a conspiracy, we built a comprehensive indicator model using methods developed in the field of Social Network Analysis (SNA). A simulation is done on a large office from open source reports and the ranked list with respect to comprehensive indicator indicates that we provide a reasonable ranking based on the proposed model.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A criminal network is a kind of social networks with both secrecy and efficiency. The hidden knowledge in criminal networks can be regarded as an important indicators for criminal investigations which can help finding the criminal's relationship and identifying suspects. However such criminal network analysis has not been studied well in an applied way and remains primarily a manual process. To assist investigators to find criminals relationship, criminal leader, and identify suspicious guys of a conspiracy, we built a comprehensive indicator model using methods developed in the field of Social Network Analysis (SNA). A simulation is done on a large office from open source reports and the ranked list with respect to comprehensive indicator indicates that we provide a reasonable ranking based on the proposed model.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A criminal network is a kind of social networks with both secrecy and efficiency. The hidden knowledge in criminal networks can be regarded as an important indicators for criminal investigations which can help finding the criminal's relationship and identifying suspects. However such criminal network analysis has not been studied well in an applied way and remains primarily a manual process. To assist investigators to find criminals relationship, criminal leader, and identify suspicious guys of a conspiracy, we built a comprehensive indicator model using methods developed in the field of Social Network Analysis (SNA). A simulation is done on a large office from open source reports and the ranked list with respect to comprehensive indicator indicates that we provide a reasonable ranking based on the proposed model.",
"fno": "4810a027",
"keywords": [
"Social Network Services",
"Analytical Models",
"Knowledge Engineering",
"Data Mining",
"Organizations",
"Educational Institutions",
"Manuals",
"Comprehensive Indicator Model",
"Criminal Network",
"Social Network Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Xufeng Shang",
"givenName": "Xufeng",
"surname": "Shang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yubo Yuan",
"givenName": "Yubo",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cyberc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-10-01T00:00:00",
"pubType": "proceedings",
"pages": "27-30",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-2624-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4810a021",
"articleId": "12OmNxA3YZ9",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4810a031",
"articleId": "12OmNzWfoTL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2013/4892/0/4892e900",
"title": "Investigating the Increase in Mobile Phone Evidence in Criminal Activities",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892e900/12OmNAR1aTc",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2012/4794/0/4794a201",
"title": "Criminal Detection Based on Social Network Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2012/4794a201/12OmNB6UIaG",
"parentPublication": {
"id": "proceedings/skg/2012/4794/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciii/2011/4523/3/4523c541",
"title": "The Study on Synthetical Evaluation System of E-government System Performance",
"doi": null,
"abstractUrl": "/proceedings-article/iciii/2011/4523c541/12OmNBNM8Xo",
"parentPublication": {
"id": "proceedings/iciii/2011/4523/3",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2012/4799/0/4799a581",
"title": "Detecting Criminal Networks Using Social Similarity",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2012/4799a581/12OmNrAdsHo",
"parentPublication": {
"id": "proceedings/asonam/2012/4799/0",
"title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/internet/2009/3748/0/3748a153",
"title": "Network Neutrality Principle as a Regulatory Tool: Implications for Crime Prevention and Criminal Law Enforcement",
"doi": null,
"abstractUrl": "/proceedings-article/internet/2009/3748a153/12OmNrH1PBx",
"parentPublication": {
"id": "proceedings/internet/2009/3748/0",
"title": "Evolving Internet, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2014/5877/0/06921689",
"title": "PEVNET: A framework for visualization of criminal networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2014/06921689/12OmNrMZpG8",
"parentPublication": {
"id": "proceedings/asonam/2014/5877/0",
"title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2015/3854/0/07403670",
"title": "A system for analyzing criminal social networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2015/07403670/12OmNx0RIN3",
"parentPublication": {
"id": "proceedings/asonam/2015/3854/0",
"title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2009/3823/4/3823e582",
"title": "Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2009/3823e582/12OmNyRPgqm",
"parentPublication": {
"id": "proceedings/cse/2009/3823/2",
"title": "2009 International Conference on Computational Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eisic/2012/4782/0/4782a232",
"title": "Association and Centrality in Criminal Networks",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2012/4782a232/12OmNyUFfHU",
"parentPublication": {
"id": "proceedings/eisic/2012/4782/0",
"title": "European Intelligence and Security Informatics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eisic/2011/4406/0/4406a197",
"title": "CrimeFighter Investigator: A Novel Tool for Criminal Network Investigation",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2011/4406a197/12OmNyY4rqu",
"parentPublication": {
"id": "proceedings/eisic/2011/4406/0",
"title": "European Intelligence and Security Informatics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1AFswbWGnQs",
"title": "2021 2nd International Conference on Computer Engineering and Intelligent Control (ICCEIC)",
"acronym": "icceic",
"groupId": "1840484",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1AFsxfioGvm",
"doi": "10.1109/ICCEIC54227.2021.00019",
"title": "Toponym Based Community Search in Large Social Network",
"normalizedTitle": "Toponym Based Community Search in Large Social Network",
"abstract": "The geo-social community search problem, which aims to find a group of socially and geographically cohesive users in large social networks, has been well defined and investigated. However, instead of coordinates, there are more and more text locations be used to identify users, so the traditional coordinate based geo-social community search algorithm are no longer applicable, and it is necessary to design an algorithm based on the semantics of text locations to measure cohesive. In this paper, in order to overcome the shortcoming of traditional algorithm, we first propose an text location based geo-social community search algorithm by constructing a toponym graph, toponym graph is a kind of retrieval data structure which abstracts the real geographic topological relationship. In toponym graph, we quantify the semantic distance between two text locations and determine whether the two users are geographically close, and then find the socially and geographically cohesive community. After that, To solve the problem of high time complexity of the basic algorithm , we design an approximate algorithm to simplify the search process by setting the landmark nodes. And then we develop a series of pruning strategies to speed up the search. Finally, we verify the performance of our proposed algorithm and pruning strategies using some real world datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The geo-social community search problem, which aims to find a group of socially and geographically cohesive users in large social networks, has been well defined and investigated. However, instead of coordinates, there are more and more text locations be used to identify users, so the traditional coordinate based geo-social community search algorithm are no longer applicable, and it is necessary to design an algorithm based on the semantics of text locations to measure cohesive. In this paper, in order to overcome the shortcoming of traditional algorithm, we first propose an text location based geo-social community search algorithm by constructing a toponym graph, toponym graph is a kind of retrieval data structure which abstracts the real geographic topological relationship. In toponym graph, we quantify the semantic distance between two text locations and determine whether the two users are geographically close, and then find the socially and geographically cohesive community. After that, To solve the problem of high time complexity of the basic algorithm , we design an approximate algorithm to simplify the search process by setting the landmark nodes. And then we develop a series of pruning strategies to speed up the search. Finally, we verify the performance of our proposed algorithm and pruning strategies using some real world datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The geo-social community search problem, which aims to find a group of socially and geographically cohesive users in large social networks, has been well defined and investigated. However, instead of coordinates, there are more and more text locations be used to identify users, so the traditional coordinate based geo-social community search algorithm are no longer applicable, and it is necessary to design an algorithm based on the semantics of text locations to measure cohesive. In this paper, in order to overcome the shortcoming of traditional algorithm, we first propose an text location based geo-social community search algorithm by constructing a toponym graph, toponym graph is a kind of retrieval data structure which abstracts the real geographic topological relationship. In toponym graph, we quantify the semantic distance between two text locations and determine whether the two users are geographically close, and then find the socially and geographically cohesive community. After that, To solve the problem of high time complexity of the basic algorithm , we design an approximate algorithm to simplify the search process by setting the landmark nodes. And then we develop a series of pruning strategies to speed up the search. Finally, we verify the performance of our proposed algorithm and pruning strategies using some real world datasets.",
"fno": "021200a057",
"keywords": [
"Computational Complexity",
"Data Structures",
"Geography",
"Graph Theory",
"Query Processing",
"Search Problems",
"Social Networking Online",
"Text Analysis",
"Text Location",
"Geo Social Community Search Algorithm",
"Toponym Graph",
"Socially Community",
"Geographically Cohesive Community",
"Search Process",
"Social Network",
"Geo Social Community Search Problem",
"Socially Users",
"Geographically Cohesive Users",
"Coordinate Measuring Machines",
"Social Networking Online",
"Query Processing",
"Semantics",
"Approximation Algorithms",
"Search Problems",
"Data Structures",
"Component",
"Social Network",
"Community Search"
],
"authors": [
{
"affiliation": "HDU-Itmo Joint Institute",
"fullName": "Zhenghui Chen",
"givenName": "Zhenghui",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "HDU-Itmo Joint Institute",
"fullName": "Jian Xu",
"givenName": "Jian",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hangzhou Dianzi University,Hangzhou,China",
"fullName": "Qing Bao",
"givenName": "Qing",
"surname": "Bao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Zhejiang Police College,Hangzhou,China",
"fullName": "Xue Yang",
"givenName": "Xue",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hangzhou Dianzi University,Hangzhou,China",
"fullName": "Huaixiang Zhang",
"givenName": "Huaixiang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hangzhou Dianzi University,Hangzhou,China",
"fullName": "Ming Xu",
"givenName": "Ming",
"surname": "Xu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icceic",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-11-01T00:00:00",
"pubType": "proceedings",
"pages": "57-63",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-0212-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "021200a050",
"articleId": "1AFsx7MSxby",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "021200a064",
"articleId": "1AFsApuUlMc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icde/2017/6543/0/6543a871",
"title": "Most Influential Community Search over Large Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543a871/12OmNApcusb",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbd/2017/1072/0/1072a244",
"title": "K-Truss Based Top-Communities Search in Large Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/cbd/2017/1072a244/12OmNwtEEHQ",
"parentPublication": {
"id": "proceedings/cbd/2017/1072/0",
"title": "2017 Fifth International Conference on Advanced Cloud and Big Data (CBD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2017/6543/0/6543b451",
"title": "Community Search over Big Graphs: Models, Algorithms, and Opportunities",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543b451/12OmNyxXltV",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b396",
"title": "On Time-optimal (k, p)-core Community Search in Dynamic Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b396/1FwFKwC26zu",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400a088",
"title": "Contextual Community Search Over Large Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400a088/1aDSTcUQjPW",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400a434",
"title": "Cohesive Group Nearest Neighbor Queries Over Road-Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400a434/1aDT0fYz36U",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800c630",
"title": "Influential Attribute Community Search",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800c630/1dPogTfFiko",
"parentPublication": {
"id": "proceedings/hpcc-smartcity-dss/2019/2058/0",
"title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400a085",
"title": "Efficient and Effective Community Search on Large-scale Bipartite Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400a085/1uGXp3tCuPK",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400c093",
"title": "Top-k Community Similarity Search Over Large Road-Network Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400c093/1uGXrbKH6TK",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/04/09629291",
"title": "Efficient Influential Community Search in Large Uncertain Graphs",
"doi": null,
"abstractUrl": "/journal/tk/2023/04/09629291/1yXvGVkW7ra",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lgooNNL7Xy",
"title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)",
"acronym": "apsec",
"groupId": "1000681",
"volume": "2",
"displayVolume": "2",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBcAGPn",
"doi": "10.1109/APSEC.2013.126",
"title": "Large Scale Model-Driven Engineering for a Multi-site Team -- Experience Report",
"normalizedTitle": "Large Scale Model-Driven Engineering for a Multi-site Team -- Experience Report",
"abstract": "We share experience in supporting development and evolution of a large banking product using a homegrown model driven engineering (MDE) toolset. We discuss improvements that needed to be introduced in the MDE toolset to support collaborative development with teams distributed across different geographical locations. Though experience is shared in a specific context, we believe, MDE researchers, enthusiasts, practitioners and tool vendors will find the takeaways from this experience applicable even in a more general context of large scale software development.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We share experience in supporting development and evolution of a large banking product using a homegrown model driven engineering (MDE) toolset. We discuss improvements that needed to be introduced in the MDE toolset to support collaborative development with teams distributed across different geographical locations. Though experience is shared in a specific context, we believe, MDE researchers, enthusiasts, practitioners and tool vendors will find the takeaways from this experience applicable even in a more general context of large scale software development.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We share experience in supporting development and evolution of a large banking product using a homegrown model driven engineering (MDE) toolset. We discuss improvements that needed to be introduced in the MDE toolset to support collaborative development with teams distributed across different geographical locations. Though experience is shared in a specific context, we believe, MDE researchers, enthusiasts, practitioners and tool vendors will find the takeaways from this experience applicable even in a more general context of large scale software development.",
"fno": "2144b123",
"keywords": [
"Unified Modeling Language",
"Business",
"Generators",
"Databases",
"Synchronization",
"Local Area Networks",
"Banking",
"Distributed Development",
"Modeling",
"Meta Modeling",
"Model Transformation",
"Model Driven Engineering"
],
"authors": [
{
"affiliation": "Tata Consultancy Services, Pune, India",
"fullName": "Asha Rajbhoj",
"givenName": "Asha",
"surname": "Rajbhoj",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tata Consultancy Services, Pune, India",
"fullName": "Vinay Kulkarni",
"givenName": "Vinay",
"surname": "Kulkarni",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "apsec",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "123-128",
"year": "2013",
"issn": "1530-1362",
"isbn": "978-1-4799-2144-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2144b117",
"articleId": "12OmNyvGyi0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2144b129",
"articleId": "12OmNAZfxGl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/splc/2011/1029/0/06030075",
"title": "Bottom-up Modeling for a Software Product Line: An Experience Report on Agile Modeling of Governmental Mobile Networks",
"doi": null,
"abstractUrl": "/proceedings-article/splc/2011/06030075/12OmNBO3K0w",
"parentPublication": {
"id": "proceedings/splc/2011/1029/0",
"title": "2011 15th International Software Product Line Conference (SPLC 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/modelsward/2015/136/0/07323147",
"title": "Model-driven engineering of a railway interlocking system",
"doi": null,
"abstractUrl": "/proceedings-article/modelsward/2015/07323147/12OmNBscD18",
"parentPublication": {
"id": "proceedings/modelsward/2015/136/0",
"title": "2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/modelsward/2014/8066/0/07018508",
"title": "Staged model-driven generators: Shifting responsibility for code emission to embedded metaprograms",
"doi": null,
"abstractUrl": "/proceedings-article/modelsward/2014/07018508/12OmNrkBwHQ",
"parentPublication": {
"id": "proceedings/modelsward/2014/8066/0",
"title": "2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seaa/2011/1027/0/06068346",
"title": "Model-Driven Development of High-Integrity Distributed Real-Time Systems Using the End-to-End Flow Model",
"doi": null,
"abstractUrl": "/proceedings-article/seaa/2011/06068346/12OmNwwuE2K",
"parentPublication": {
"id": "proceedings/seaa/2011/1027/0",
"title": "2011 37th EUROMICRO Conference on Software Engineering and Advanced Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/models/2017/3492/0/3492a229",
"title": "User Experience for Model-Driven Engineering: Challenges and Future Directions",
"doi": null,
"abstractUrl": "/proceedings-article/models/2017/3492a229/12OmNxYtu2w",
"parentPublication": {
"id": "proceedings/models/2017/3492/0",
"title": "2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seams/2013/0344/0/06595496",
"title": "Engineering adaptation with Zanshin: An experience report",
"doi": null,
"abstractUrl": "/proceedings-article/seams/2013/06595496/12OmNxaNGjD",
"parentPublication": {
"id": "proceedings/seams/2013/0344/0",
"title": "2013 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-c/2016/4205/0/4205a260",
"title": "Model Driven Development of Business Applications - A Practitioner's Perspective",
"doi": null,
"abstractUrl": "/proceedings-article/icse-c/2016/4205a260/12OmNyugyQN",
"parentPublication": {
"id": "proceedings/icse-c/2016/4205/0",
"title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mise/2018/5735/0/573501a049",
"title": "Building Domain-Specific Modelling Environments with Papyrus: An Experience Report",
"doi": null,
"abstractUrl": "/proceedings-article/mise/2018/573501a049/13bd1AITnae",
"parentPublication": {
"id": "proceedings/mise/2018/5735/0",
"title": "2018 IEEE/ACM 10th International Workshop on Modelling in Software Engineering (MiSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/so/2013/03/mso2013030042",
"title": "Engineering Air Traffic Control Systems with a Model-Driven Approach",
"doi": null,
"abstractUrl": "/magazine/so/2013/03/mso2013030042/13rRUxOdDaN",
"parentPublication": {
"id": "mags/so",
"title": "IEEE Software",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsa-c/2023/6459/0/645900a195",
"title": "Designing an Architecture Team: An Experience Report",
"doi": null,
"abstractUrl": "/proceedings-article/icsa-c/2023/645900a195/1MBDf28Q5Bm",
"parentPublication": {
"id": "proceedings/icsa-c/2023/6459/0",
"title": "2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCfAPCo",
"title": "2009 IITA International Conference on Services Science, Management and Engineering (SSME)",
"acronym": "ssme",
"groupId": "1002870",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrIaemi",
"doi": "10.1109/SSME.2009.41",
"title": "Applying E-S-QUAL Scale to Analysis the Factors Affecting Consumers to Use Internet Banking Services",
"normalizedTitle": "Applying E-S-QUAL Scale to Analysis the Factors Affecting Consumers to Use Internet Banking Services",
"abstract": "In order to measuring internet banking customer perceived e-service quality and study on relationship with customer loyalty in China. This study use Parasuraman, Zeithaml and Malhotra’s E-S-QUAL scales to design the research model of this research. Structural equation modeling was used to analyze the data collected from banks’ customers in China. The main findings are as follows: 1) the research supported that the four e-SERVQUAL dimensions–efficiency, fulfillment, system availability and privacy are the determinants of Chinese internet banking e-service quality. 2) e-service quality has a positive effect on perceived value, e-customer satisfaction. 3) E-service quality has both direct effect on e-loyalty and indirect effect on e-loyalty through perceived value and e-customer satisfaction.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to measuring internet banking customer perceived e-service quality and study on relationship with customer loyalty in China. This study use Parasuraman, Zeithaml and Malhotra’s E-S-QUAL scales to design the research model of this research. Structural equation modeling was used to analyze the data collected from banks’ customers in China. The main findings are as follows: 1) the research supported that the four e-SERVQUAL dimensions–efficiency, fulfillment, system availability and privacy are the determinants of Chinese internet banking e-service quality. 2) e-service quality has a positive effect on perceived value, e-customer satisfaction. 3) E-service quality has both direct effect on e-loyalty and indirect effect on e-loyalty through perceived value and e-customer satisfaction.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to measuring internet banking customer perceived e-service quality and study on relationship with customer loyalty in China. This study use Parasuraman, Zeithaml and Malhotra’s E-S-QUAL scales to design the research model of this research. Structural equation modeling was used to analyze the data collected from banks’ customers in China. The main findings are as follows: 1) the research supported that the four e-SERVQUAL dimensions–efficiency, fulfillment, system availability and privacy are the determinants of Chinese internet banking e-service quality. 2) e-service quality has a positive effect on perceived value, e-customer satisfaction. 3) E-service quality has both direct effect on e-loyalty and indirect effect on e-loyalty through perceived value and e-customer satisfaction.",
"fno": "3729a242",
"keywords": [
"Internet Banking E S QUAL E Customer Satisfaction Perceived Value E Loyalty"
],
"authors": [
{
"affiliation": null,
"fullName": "Quan Sun",
"givenName": "Quan",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chunlei Wang",
"givenName": "Chunlei",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hao Cao",
"givenName": "Hao",
"surname": "Cao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ssme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-07-01T00:00:00",
"pubType": "proceedings",
"pages": "242-245",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3729-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3729a237",
"articleId": "12OmNxFaLq8",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3729a246",
"articleId": "12OmNzBOhud",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icebe/2012/4809/0/4809a039",
"title": "An Empirical Study of Customer Loyalty to Internet Banking in China",
"doi": null,
"abstractUrl": "/proceedings-article/icebe/2012/4809a039/12OmNB7LvJ5",
"parentPublication": {
"id": "proceedings/icebe/2012/4809/0",
"title": "2012 IEEE Ninth International Conference on e-Business Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nbis/2010/4167/0/4167a216",
"title": "Intelligent CRM on the Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/nbis/2010/4167a216/12OmNBkxswP",
"parentPublication": {
"id": "proceedings/nbis/2010/4167/0",
"title": "2010 13th International Conference on Network-Based Information Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsssm/2005/8971/2/01500195",
"title": "Constructing quality-satisfaction-loyalty chain system: an empirical study of insurance industry in China",
"doi": null,
"abstractUrl": "/proceedings-article/icsssm/2005/01500195/12OmNC0guAu",
"parentPublication": {
"id": "proceedings/icsssm/2005/8971/2",
"title": "International Conference on Services Systems and Services Management",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmb/2009/3691/0/3691a115",
"title": "Customer Satisfaction and Loyalty of Mobile Services",
"doi": null,
"abstractUrl": "/proceedings-article/icmb/2009/3691a115/12OmNqJHFrp",
"parentPublication": {
"id": "proceedings/icmb/2009/3691/0",
"title": "2009 Eighth International Conference on Mobile Business, ICMB",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997d156",
"title": "The Customer Loyalty Research Based on B2C E-Commerce Sites",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997d156/12OmNrFkeUB",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997c245",
"title": "Research on Customer Loyalty of B2C E-commerce Based on Structural Equation Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997c245/12OmNrJiCTW",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ijcss/2012/4731/0/4731a152",
"title": "The Impact of Online Shopping Service Quality on Customer Loyalty in Emerging Economies: The Case of Chinese Customers",
"doi": null,
"abstractUrl": "/proceedings-article/ijcss/2012/4731a152/12OmNxymo5q",
"parentPublication": {
"id": "proceedings/ijcss/2012/4731/0",
"title": "Service Sciences, International Joint Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997a093",
"title": "Assessing the Effects of e-Service Quality and e-Satisfaction on Internet Banking Loyalty in China",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997a093/12OmNywfKIA",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997c065",
"title": "Moderating Effect of Personal Innovativeness in the Model for E-store Loyalty",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997c065/12OmNz5s0LH",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isbim/2008/3560/1/3560a347",
"title": "The Influencing Mechanism of Online Perceived Value and Switching Costs on Online Customer Loyalty",
"doi": null,
"abstractUrl": "/proceedings-article/isbim/2008/3560a347/12OmNzlD9Cm",
"parentPublication": {
"id": "proceedings/isbim/2008/3560/1",
"title": "2008 International Seminar on Business and Information Management (ISBIM 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrJiCCT",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"acronym": "iciii",
"groupId": "1002565",
"volume": "2",
"displayVolume": "2",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwcUjT1",
"doi": "10.1109/ICIII.2011.195",
"title": "Technical, Pure Technical and Scale Efficiency of China's Banking Industry",
"normalizedTitle": "Technical, Pure Technical and Scale Efficiency of China's Banking Industry",
"abstract": "The paper empirically investigates the technical efficiency, pure technical efficiency and scale efficiency in China's banking over 1998-2003 period. A non-parametric method of Data Envelopment Analysis (DEA) has been used to estimate banking efficiency scores. The efficiency comparison between the state-owned banks and other newly joint stock banks is conducted. Ordinary Least Squares is used to identify the key factors related to banking efficiency. Newly joint stock banks are found to be more efficient than the four state-owned banks. The results indicate that several main factors affect banking efficiency, including structure of property rights, manpower capital and market competition. Our policy suggestions are that Chinese government should implement financial system reform to foster competition in the banking market, and that a better environment is created for sustainable development of commercial banks.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper empirically investigates the technical efficiency, pure technical efficiency and scale efficiency in China's banking over 1998-2003 period. A non-parametric method of Data Envelopment Analysis (DEA) has been used to estimate banking efficiency scores. The efficiency comparison between the state-owned banks and other newly joint stock banks is conducted. Ordinary Least Squares is used to identify the key factors related to banking efficiency. Newly joint stock banks are found to be more efficient than the four state-owned banks. The results indicate that several main factors affect banking efficiency, including structure of property rights, manpower capital and market competition. Our policy suggestions are that Chinese government should implement financial system reform to foster competition in the banking market, and that a better environment is created for sustainable development of commercial banks.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper empirically investigates the technical efficiency, pure technical efficiency and scale efficiency in China's banking over 1998-2003 period. A non-parametric method of Data Envelopment Analysis (DEA) has been used to estimate banking efficiency scores. The efficiency comparison between the state-owned banks and other newly joint stock banks is conducted. Ordinary Least Squares is used to identify the key factors related to banking efficiency. Newly joint stock banks are found to be more efficient than the four state-owned banks. The results indicate that several main factors affect banking efficiency, including structure of property rights, manpower capital and market competition. Our policy suggestions are that Chinese government should implement financial system reform to foster competition in the banking market, and that a better environment is created for sustainable development of commercial banks.",
"fno": "4523b198",
"keywords": [
"Data Envelopment Analysis",
"Technical Efficiency",
"IT Investment",
"Banking Reform"
],
"authors": [
{
"affiliation": null,
"fullName": "Zhao Xu",
"givenName": "Zhao",
"surname": "Xu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciii",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-11-01T00:00:00",
"pubType": "proceedings",
"pages": "198-201",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4523-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4523b194",
"articleId": "12OmNylsZXY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4523b202",
"articleId": "12OmNqJq4j8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2002/1435/7/14350185b",
"title": "An Evaluation of Internet Banking in New Zealand",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2002/14350185b/12OmNAQrYCJ",
"parentPublication": {
"id": "proceedings/hicss/2002/1435/7",
"title": "Proceedings of the 35th Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2013/4892/0/4892e436",
"title": "Information governance in the banking industry",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892e436/12OmNAXglNO",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2010/3869/0/07-09-05",
"title": "Understanding the Adoption of Electronic Banking in China",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2010/07-09-05/12OmNAoUTjG",
"parentPublication": {
"id": "proceedings/hicss/2010/3869/0",
"title": "2010 43rd Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmb/2011/4434/0/4434a016",
"title": "Nature and Interactivity of Mobile Banking Applications: A Typology Based on the Canadian-American Industry",
"doi": null,
"abstractUrl": "/proceedings-article/icmb/2011/4434a016/12OmNAolGOR",
"parentPublication": {
"id": "proceedings/icmb/2011/4434/0",
"title": "Mobile Business, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd/2009/3642/0/3642a263",
"title": "E-Banking: Issues and Challenges",
"doi": null,
"abstractUrl": "/proceedings-article/snpd/2009/3642a263/12OmNBCqbDH",
"parentPublication": {
"id": "proceedings/snpd/2009/3642/0",
"title": "2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icds/2009/3526/0/3526a235",
"title": "Drivers and Barriers of E-banking Adoption: Case of Karafarin Bank",
"doi": null,
"abstractUrl": "/proceedings-article/icds/2009/3526a235/12OmNwBBqhs",
"parentPublication": {
"id": "proceedings/icds/2009/3526/0",
"title": "International Conference on the Digital Society",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fit/2011/4625/0/4625a045",
"title": "Factors Influencing Adoption of Information Technology Based Banking Services: A Case Study of Pakistan",
"doi": null,
"abstractUrl": "/proceedings-article/fit/2011/4625a045/12OmNxvO03I",
"parentPublication": {
"id": "proceedings/fit/2011/4625/0",
"title": "Frontiers of Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitcs/2013/2845/0/06717857",
"title": "Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market",
"doi": null,
"abstractUrl": "/proceedings-article/icitcs/2013/06717857/12OmNy2Jt0P",
"parentPublication": {
"id": "proceedings/icitcs/2013/2845/0",
"title": "2013 International Conference on IT Convergence and Security (ICITCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbi/2020/9926/1/09140248",
"title": "The Banking Industry Underestimates Costs of Cloud Migrations",
"doi": null,
"abstractUrl": "/proceedings-article/cbi/2020/09140248/1lu6Qww5pEk",
"parentPublication": {
"id": "cbi/2020/9926/1",
"title": "2020 IEEE 22nd Conference on Business Informatics (CBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2020/7121/0/712100b310",
"title": "An Empirical Assessment of Security Risks of Global Android Banking Apps",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2020/712100b310/1pK5hEcPMGI",
"parentPublication": {
"id": "proceedings/icse/2020/7121/0",
"title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.