data
dict |
|---|
{
"proceeding": {
"id": "1tuAeQeDJja",
"title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1tuAwxIGXQI",
"doi": "10.1109/VR50410.2021.00030",
"title": "Detection Thresholds with Joint Horizontal and Vertical Gains in Redirected Jumping",
"normalizedTitle": "Detection Thresholds with Joint Horizontal and Vertical Gains in Redirected Jumping",
"abstract": "Redirected jumping (RDJ) is a locomotion technique that allows users to explore a virtual space that is larger than the available physical space by imperceptibly manipulating users' virtual viewpoints according to different gains. In previous redirected jumping work, different types of gains were imposed separately, without considering the possible interaction effects of horizontal and vertical gains on the jumping distance perception. To figure out how humans perceive distance manipulation when more than one gain is used, in this paper, we explored joint horizontal and vertical gains that manipulate horizontal and vertical distances at the same time during two-legged takeoff jumping in the virtual space. We estimated and analyzed horizontal and vertical detection thresholds by conducting a user study, fitting the data to two-dimensional psychometric functions, and visualizing the fitted 3D plots. We provided quantitative insights into the effects of joint gains on detection thresholds, where the imperceptible range for one gain can be affected by the variation of the other gain. Finally, we designed redirected jumping-based games as applications with joint horizontal and vertical gains and demonstrated the effectiveness of the redirected jumping technique.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Redirected jumping (RDJ) is a locomotion technique that allows users to explore a virtual space that is larger than the available physical space by imperceptibly manipulating users' virtual viewpoints according to different gains. In previous redirected jumping work, different types of gains were imposed separately, without considering the possible interaction effects of horizontal and vertical gains on the jumping distance perception. To figure out how humans perceive distance manipulation when more than one gain is used, in this paper, we explored joint horizontal and vertical gains that manipulate horizontal and vertical distances at the same time during two-legged takeoff jumping in the virtual space. We estimated and analyzed horizontal and vertical detection thresholds by conducting a user study, fitting the data to two-dimensional psychometric functions, and visualizing the fitted 3D plots. We provided quantitative insights into the effects of joint gains on detection thresholds, where the imperceptible range for one gain can be affected by the variation of the other gain. Finally, we designed redirected jumping-based games as applications with joint horizontal and vertical gains and demonstrated the effectiveness of the redirected jumping technique.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Redirected jumping (RDJ) is a locomotion technique that allows users to explore a virtual space that is larger than the available physical space by imperceptibly manipulating users' virtual viewpoints according to different gains. In previous redirected jumping work, different types of gains were imposed separately, without considering the possible interaction effects of horizontal and vertical gains on the jumping distance perception. To figure out how humans perceive distance manipulation when more than one gain is used, in this paper, we explored joint horizontal and vertical gains that manipulate horizontal and vertical distances at the same time during two-legged takeoff jumping in the virtual space. We estimated and analyzed horizontal and vertical detection thresholds by conducting a user study, fitting the data to two-dimensional psychometric functions, and visualizing the fitted 3D plots. We provided quantitative insights into the effects of joint gains on detection thresholds, where the imperceptible range for one gain can be affected by the variation of the other gain. Finally, we designed redirected jumping-based games as applications with joint horizontal and vertical gains and demonstrated the effectiveness of the redirected jumping technique.",
"fno": "255600a095",
"keywords": [
"Adaptive Estimation",
"Bayes Methods",
"Psychometric Testing",
"Virtual Reality",
"Visual Perception",
"Distance Manipulation",
"Vertical Gains",
"Two Legged Takeoff Jumping",
"Virtual Space",
"Horizontal Detection Thresholds",
"Vertical Detection Thresholds",
"Joint Gains",
"Redirected Jumping Technique",
"Available Physical Space",
"Jumping Distance Perception",
"Horizontal Gains",
"Redirected Jumping Work",
"Three Dimensional Displays",
"Fitting",
"Estimation",
"Data Visualization",
"Games",
"Virtual Reality",
"Space Exploration",
"Human Centered Computing Human Computer Interaction HCI Interaction Paradigms Virtual Reality"
],
"authors": [
{
"affiliation": "State Key Laboratory of Virtual Reality Technology and Systems, Beihang University,China",
"fullName": "Yi-Jun Li",
"givenName": "Yi-Jun",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "State Key Laboratory of Virtual Reality Technology and Systems, Beihang University,China",
"fullName": "De-Rong Jin",
"givenName": "De-Rong",
"surname": "Jin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peng Cheng Laboratory",
"fullName": "Miao Wang",
"givenName": "Miao",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "State Key Laboratory of Virtual Reality Technology and Systems, Beihang University,China",
"fullName": "Jun-Long Chen",
"givenName": "Jun-Long",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universität Hamburg",
"fullName": "Frank Steinicke",
"givenName": "Frank",
"surname": "Steinicke",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "BNRist, Tsinghua University,Beijing",
"fullName": "Shi-Min Hu",
"givenName": "Shi-Min",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peng Cheng Laboratory",
"fullName": "Qinping Zhao",
"givenName": "Qinping",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-03-01T00:00:00",
"pubType": "proceedings",
"pages": "95-102",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1838-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1tuAwdyjVSw",
"name": "pvr202118380-09417804s1-mm_255600a095.zip",
"size": "54.7 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pvr202118380-09417804s1-mm_255600a095.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "255600a085",
"articleId": "1tuB3I1bc9G",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "255600a103",
"articleId": "1tuAYUEEQNi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2013/4795/0/06549412",
"title": "Estimation of detection thresholds for acoustic based redirected walking techniques",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2013/06549412/12OmNz2C1yn",
"parentPublication": {
"id": "proceedings/vr/2013/4795/0",
"title": "2013 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446620",
"title": "Spatial Updating and Simulator Sickness During Steering and Jumping in Immersive Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446620/13bd1fKQxs4",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/01/ttg2010010017",
"title": "Estimation of Detection Thresholds for Redirected Walking Techniques",
"doi": null,
"abstractUrl": "/journal/tg/2010/01/ttg2010010017/13rRUxZ0o1t",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2018/02/mcg2018020044",
"title": "15 Years of Research on Redirected Walking in Immersive Virtual Environments",
"doi": null,
"abstractUrl": "/magazine/cg/2018/02/mcg2018020044/13rRUxcsYOr",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2018/7459/0/745900a115",
"title": "Rethinking Redirected Walking: On the Use of Curvature Gains Beyond Perceptual Limitations and Revisiting Bending Gains",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2018/745900a115/17D45WK5AlG",
"parentPublication": {
"id": "proceedings/ismar/2018/7459/0",
"title": "2018 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a830",
"title": "Redirected Walking in 360° Video: Effect of Environment Size on Detection Thresholds for Translation and Rotation Gains",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a830/1CJd1TReEYo",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797989",
"title": "Redirected Jumping: Imperceptibly Manipulating Jump Motions in Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797989/1cJ15zHucrC",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798117",
"title": "Estimation of Rotation Gain Thresholds for Redirected Walking Considering FOV and Gender",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798117/1cJ1fo5PwqY",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089444",
"title": "Detection Thresholds for Vertical Gains in VR and Drone-based Telepresence Systems",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089444/1jIxcBQWkyA",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2021/4057/0/405700a464",
"title": "Effects of Virtual Environments and Self-representations on Redirected Jumping",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2021/405700a464/1tnXUfROzte",
"parentPublication": {
"id": "proceedings/vrw/2021/4057/0",
"title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1BmEezmpGrm",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"acronym": "iccv",
"groupId": "1000149",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1BmH817i3jq",
"doi": "10.1109/ICCV48922.2021.00312",
"title": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration",
"normalizedTitle": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration",
"abstract": "Point cloud registration is a key task in many computational fields. Previous correspondence matching based methods require the inputs to have distinctive geometric structures to fit a 3D rigid transformation according to point-wise sparse feature matches. However, the accuracy of transformation heavily relies on the quality of extracted features, which are prone to errors with respect to partiality and noise. In addition, they can not utilize the geometric knowledge of all the overlapping regions. On the other hand, previous global feature based approaches can utilize the entire point cloud for the registration, however they ignore the negative effect of non-overlapping points when aggregating global features. In this paper, we present OM-Net, a global feature based iterative network for partial-to-partial point cloud registration. We learn overlapping masks to reject non-overlapping regions, which converts the partial-to-partial registration to the registration of the same shape. Moreover, the previously used data is sampled only once from the CAD models for each object, resulting in the same point clouds for the source and reference. We propose a more practical manner of data generation where a CAD model is sampled twice for the source and reference, avoiding the previously prevalent over-fitting issue. Experimental results show that our method achieves state-of-the-art performance compared to traditional and deep learning based methods. Code is available at https://github.com/megvii-research/OMNet.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Point cloud registration is a key task in many computational fields. Previous correspondence matching based methods require the inputs to have distinctive geometric structures to fit a 3D rigid transformation according to point-wise sparse feature matches. However, the accuracy of transformation heavily relies on the quality of extracted features, which are prone to errors with respect to partiality and noise. In addition, they can not utilize the geometric knowledge of all the overlapping regions. On the other hand, previous global feature based approaches can utilize the entire point cloud for the registration, however they ignore the negative effect of non-overlapping points when aggregating global features. In this paper, we present OM-Net, a global feature based iterative network for partial-to-partial point cloud registration. We learn overlapping masks to reject non-overlapping regions, which converts the partial-to-partial registration to the registration of the same shape. Moreover, the previously used data is sampled only once from the CAD models for each object, resulting in the same point clouds for the source and reference. We propose a more practical manner of data generation where a CAD model is sampled twice for the source and reference, avoiding the previously prevalent over-fitting issue. Experimental results show that our method achieves state-of-the-art performance compared to traditional and deep learning based methods. Code is available at https://github.com/megvii-research/OMNet.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Point cloud registration is a key task in many computational fields. Previous correspondence matching based methods require the inputs to have distinctive geometric structures to fit a 3D rigid transformation according to point-wise sparse feature matches. However, the accuracy of transformation heavily relies on the quality of extracted features, which are prone to errors with respect to partiality and noise. In addition, they can not utilize the geometric knowledge of all the overlapping regions. On the other hand, previous global feature based approaches can utilize the entire point cloud for the registration, however they ignore the negative effect of non-overlapping points when aggregating global features. In this paper, we present OM-Net, a global feature based iterative network for partial-to-partial point cloud registration. We learn overlapping masks to reject non-overlapping regions, which converts the partial-to-partial registration to the registration of the same shape. Moreover, the previously used data is sampled only once from the CAD models for each object, resulting in the same point clouds for the source and reference. We propose a more practical manner of data generation where a CAD model is sampled twice for the source and reference, avoiding the previously prevalent over-fitting issue. Experimental results show that our method achieves state-of-the-art performance compared to traditional and deep learning based methods. Code is available at https://github.com/megvii-research/OMNet.",
"fno": "281200d112",
"keywords": [
"Point Cloud Compression",
"Deep Learning",
"Solid Modeling",
"Computer Vision",
"Three Dimensional Displays",
"Shape",
"Computational Modeling",
"Detection And Localization In 2 D And 3 D",
"3 D From A Single Image And Shape From X",
"Stereo",
"3 D From Multiview And Other Sensors"
],
"authors": [
{
"affiliation": "University of Electronic Science and Technology of China",
"fullName": "Hao Xu",
"givenName": "Hao",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Electronic Science and Technology of China",
"fullName": "Shuaicheng Liu",
"givenName": "Shuaicheng",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Megvii Technology",
"fullName": "Guangfu Wang",
"givenName": "Guangfu",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Electronic Science and Technology of China",
"fullName": "Guanghui Liu",
"givenName": "Guanghui",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Electronic Science and Technology of China",
"fullName": "Bing Zeng",
"givenName": "Bing",
"surname": "Zeng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "3112-3121",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2812-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "281200d102",
"articleId": "1BmEur129YQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "281200d122",
"articleId": "1BmHCIAcJwI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/3dv/2015/8332/0/8332a598",
"title": "Super Generalized 4PCS for 3D Registration",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2015/8332a598/12OmNyeWdHH",
"parentPublication": {
"id": "proceedings/3dv/2015/8332/0",
"title": "2015 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/01/09705149",
"title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration",
"doi": null,
"abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f663",
"title": "DeepPRO: Deep Partial Point Cloud Registration of Objects",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f663/1BmGoTRdyCY",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g108",
"title": "Sampling Network Guided Cross-Entropy Method for Unsupervised Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g108/1BmGp36SSvm",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729524",
"title": "Unsupervised Category-Specific Partial Point Set Registration via Joint Shape Completion and Registration",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729524/1Bya8dlokw0",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09866792",
"title": "Partial Point Cloud Registration with Deep Local Feature",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09866792/1G7UlGeNaiA",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09860002",
"title": "Partial-to-Partial Point Cloud Registration Based on Multi-Level Semantic-Structural Cognition",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09860002/1G9EKd6az6g",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600e500",
"title": "Overlap-guided Gaussian Mixture Models for Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600e500/1L8qlfO8Lcs",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/12/09445585",
"title": "Consistent Two-Flow Network for Tele-Registration of Point Clouds",
"doi": null,
"abstractUrl": "/journal/tg/2022/12/09445585/1u8lzpSvnxu",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800a342",
"title": "DeepBBS: Deep Best Buddies for Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800a342/1zWE3qPVGLe",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G9DtzCwrjW",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G9DLvbZp60",
"doi": "10.1109/ICME52920.2022.9859918",
"title": "PDP-NET: Patch-Based Dual-Path Network for Point Cloud Completion",
"normalizedTitle": "PDP-NET: Patch-Based Dual-Path Network for Point Cloud Completion",
"abstract": "Point cloud completion has become a popular research area in 3D computer vision. It aims to recover the complete point cloud from its partial observation. However, previous methods either directly predict the whole shape, change the original distribution of points, or have limited performance in reconstructing tiny and detailed object components. In this paper, we propose a novel Patch-based Dual-Path Network (PDP-Net) for point cloud completion, which leverages the advantages of different encoder architectures, with one path providing estimation for the global structure of the missing part, and the other path filling in the details by generating several point cloud patches. We also propose an identifier to retain the original points in the partial point cloud possibly. Comprehensive experiments and robustness tests demonstrate the effectiveness of our method even against different missing scales of the point cloud. Code available at: https://github.com/QifHE/PDP-Net-Public.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Point cloud completion has become a popular research area in 3D computer vision. It aims to recover the complete point cloud from its partial observation. However, previous methods either directly predict the whole shape, change the original distribution of points, or have limited performance in reconstructing tiny and detailed object components. In this paper, we propose a novel Patch-based Dual-Path Network (PDP-Net) for point cloud completion, which leverages the advantages of different encoder architectures, with one path providing estimation for the global structure of the missing part, and the other path filling in the details by generating several point cloud patches. We also propose an identifier to retain the original points in the partial point cloud possibly. Comprehensive experiments and robustness tests demonstrate the effectiveness of our method even against different missing scales of the point cloud. Code available at: https://github.com/QifHE/PDP-Net-Public.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Point cloud completion has become a popular research area in 3D computer vision. It aims to recover the complete point cloud from its partial observation. However, previous methods either directly predict the whole shape, change the original distribution of points, or have limited performance in reconstructing tiny and detailed object components. In this paper, we propose a novel Patch-based Dual-Path Network (PDP-Net) for point cloud completion, which leverages the advantages of different encoder architectures, with one path providing estimation for the global structure of the missing part, and the other path filling in the details by generating several point cloud patches. We also propose an identifier to retain the original points in the partial point cloud possibly. Comprehensive experiments and robustness tests demonstrate the effectiveness of our method even against different missing scales of the point cloud. Code available at: https://github.com/QifHE/PDP-Net-Public.",
"fno": "09859918",
"keywords": [
"Computer Vision",
"Data Handling",
"Image Matching",
"Image Reconstruction",
"Point Cloud Completion",
"Point Cloud Patches",
"Original Points",
"Partial Point Cloud",
"PDP NET",
"Complete Point Cloud",
"Novel Patch Based Dual Path Network",
"PDP Net",
"Point Cloud Compression",
"Computer Vision",
"Three Dimensional Displays",
"Codes",
"Shape",
"Estimation",
"Computer Architecture",
"Point Cloud Completion",
"3 D Computer Vision",
"3 D Deep Learning",
"Dual Path Network"
],
"authors": [
{
"affiliation": "Center for Future Media, School of Computer Science and Engineering, University of Electronic Science and Technology of China,China,611731",
"fullName": "Qifeng He",
"givenName": "Qifeng",
"surname": "He",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Future Media, School of Computer Science and Engineering, University of Electronic Science and Technology of China,China,611731",
"fullName": "Ning Xie",
"givenName": "Ning",
"surname": "Xie",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Future Media, School of Computer Science and Engineering, University of Electronic Science and Technology of China,China,611731",
"fullName": "Zhenjiang Du",
"givenName": "Zhenjiang",
"surname": "Du",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Future Media, School of Computer Science and Engineering, University of Electronic Science and Technology of China,China,611731",
"fullName": "Ke Ren",
"givenName": "Ke",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Future Media, School of Computer Science and Engineering, University of Electronic Science and Technology of China,China,611731",
"fullName": "Jiale Dou",
"givenName": "Jiale",
"surname": "Dou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8563-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09859730",
"articleId": "1G9DIlYdTEY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09859675",
"articleId": "1G9ELz0CH4I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tp/2023/01/09735342",
"title": "PMP-Net++: Point Cloud Completion by Transformer-Enhanced Multi-Step Point Moving Paths",
"doi": null,
"abstractUrl": "/journal/tp/2023/01/09735342/1BLmVZBJX6o",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200n3169",
"title": "Voxel-based Network for Shape Completion by Leveraging Edge Generation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200n3169/1BmENZhQjHW",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600f533",
"title": "Learning a Structured Latent Space for Unsupervised Point Cloud Completion",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600f533/1H0KOsU2FZC",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600b716",
"title": "LAKe-Net: Topology-Aware Point Cloud Completion by Localizing Aligned Keypoints",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600b716/1H0Kwo5tABi",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/10015045",
"title": "CSDN: Cross-Modal Shape-Transfer Dual-Refinement Network for Point Cloud Completion",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/10015045/1JR6dVW7wJi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscsic/2022/5488/0/548800a159",
"title": "MLFT-Net: Point Cloud Completion Using Multi-Level Feature Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/iscsic/2022/548800a159/1LvAmC051qo",
"parentPublication": {
"id": "proceedings/iscsic/2022/5488/0",
"title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/10106495",
"title": "Variational Relational Point Completion Network for Robust 3D Classification",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/10106495/1MwAn9y4Ozu",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/12/09528986",
"title": "Relationship-Based Point Cloud Completion",
"doi": null,
"abstractUrl": "/journal/tg/2022/12/09528986/1wB2y6gUCqs",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900h439",
"title": "PMP-Net: Point Cloud Completion by Learning Multi-step Point Moving Paths",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900h439/1yeKAuO3P7W",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800b269",
"title": "GASCN: Graph Attention Shape Completion Network",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800b269/1zWEc53kN9u",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1G9DtzCwrjW",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G9EKd6az6g",
"doi": "10.1109/ICME52920.2022.9860002",
"title": "Partial-to-Partial Point Cloud Registration Based on Multi-Level Semantic-Structural Cognition",
"normalizedTitle": "Partial-to-Partial Point Cloud Registration Based on Multi-Level Semantic-Structural Cognition",
"abstract": "3D point cloud registration attempt to establish spatial correspondences between the source point cloud and the target point cloud. It is a fundamental task in computer vision and multimedia applications. Recently, many learning-based methods have been proposed and achieved promising performance. However, in the Partial-to-Partial (PtP) registration problem, the existence of a large number of external points may greatly handicap the effectiveness of these methods. In this paper, we propose to address the PtP issue under a novel multi-task cognition framework. At the global semantic level, we introduce a multi-scale feature exchanging network to actively evaluate the matching credibility. For the local structural learning, an inner-inter attention fusion branch is applied to generate discriminative features. Moreover, we integrate a novel alternating correspondences searching mechanism with a flexible bi-directional dislocation loss to perform robust learning, and a simple yet effective SVD weighting scheme is introduced at the inference stage. Experiment results on two challenging PtP 3D point cloud registration data sets show that our proposed method outperforms all the SOTA methods with higher precision and robustness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "3D point cloud registration attempt to establish spatial correspondences between the source point cloud and the target point cloud. It is a fundamental task in computer vision and multimedia applications. Recently, many learning-based methods have been proposed and achieved promising performance. However, in the Partial-to-Partial (PtP) registration problem, the existence of a large number of external points may greatly handicap the effectiveness of these methods. In this paper, we propose to address the PtP issue under a novel multi-task cognition framework. At the global semantic level, we introduce a multi-scale feature exchanging network to actively evaluate the matching credibility. For the local structural learning, an inner-inter attention fusion branch is applied to generate discriminative features. Moreover, we integrate a novel alternating correspondences searching mechanism with a flexible bi-directional dislocation loss to perform robust learning, and a simple yet effective SVD weighting scheme is introduced at the inference stage. Experiment results on two challenging PtP 3D point cloud registration data sets show that our proposed method outperforms all the SOTA methods with higher precision and robustness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "3D point cloud registration attempt to establish spatial correspondences between the source point cloud and the target point cloud. It is a fundamental task in computer vision and multimedia applications. Recently, many learning-based methods have been proposed and achieved promising performance. However, in the Partial-to-Partial (PtP) registration problem, the existence of a large number of external points may greatly handicap the effectiveness of these methods. In this paper, we propose to address the PtP issue under a novel multi-task cognition framework. At the global semantic level, we introduce a multi-scale feature exchanging network to actively evaluate the matching credibility. For the local structural learning, an inner-inter attention fusion branch is applied to generate discriminative features. Moreover, we integrate a novel alternating correspondences searching mechanism with a flexible bi-directional dislocation loss to perform robust learning, and a simple yet effective SVD weighting scheme is introduced at the inference stage. Experiment results on two challenging PtP 3D point cloud registration data sets show that our proposed method outperforms all the SOTA methods with higher precision and robustness.",
"fno": "09860002",
"keywords": [
"Computer Vision",
"Feature Extraction",
"Image Registration",
"Learning Artificial Intelligence",
"Search Problems",
"Singular Value Decomposition",
"Stereo Image Processing",
"Partial To Partial Point Cloud Registration",
"Multilevel Semantic Structural Cognition",
"Spatial Correspondences",
"Source Point Cloud",
"Target Point Cloud",
"Computer Vision",
"Local Structural Learning",
"Inner Inter Attention Fusion Branch",
"Multitask Cognition Framework",
"Multiscale Feature Exchanging Network",
"Pt P 3 D Point Cloud Registration",
"Matching Credibility",
"Alternating Correspondences Searching Mechanism",
"SVD Weighting Scheme",
"Flexible Bi Directional Dislocation Loss",
"Point Cloud Compression",
"Representation Learning",
"Learning Systems",
"Computer Vision",
"Three Dimensional Displays",
"Semantics",
"Bidirectional Control",
"Point Cloud Registration",
"Partial To Partial",
"Credible Candidate",
"Correspondences"
],
"authors": [
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Yucheng Shu",
"givenName": "Yucheng",
"surname": "Shu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Zongzhuang Hou",
"givenName": "Zongzhuang",
"surname": "Hou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Bin Xiao",
"givenName": "Bin",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Xiuli Bi",
"givenName": "Xiuli",
"surname": "Bi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Xiao Luan",
"givenName": "Xiao",
"surname": "Luan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chongqing University of Posts and Telecommunications,Chongqing,China,400065",
"fullName": "Weisheng Li",
"givenName": "Weisheng",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8563-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09859798",
"articleId": "1G9EnMu9Ww0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09859824",
"articleId": "1G9EpLjE5eU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tp/2023/01/09705149",
"title": "STORM: Structure-Based Overlap Matching for Partial Point Cloud Registration",
"doi": null,
"abstractUrl": "/journal/tp/2023/01/09705149/1AII6wed0Bi",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f510",
"title": "Feature Interactive Representation for Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f510/1BmFkzf6HuM",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f663",
"title": "DeepPRO: Deep Partial Point Cloud Registration of Objects",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f663/1BmGoTRdyCY",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200d112",
"title": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200d112/1BmH817i3jq",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/insai/2021/0859/0/085900a136",
"title": "Registration of Point Clouds: A Survey",
"doi": null,
"abstractUrl": "/proceedings-article/insai/2021/085900a136/1CHwMbhCNQA",
"parentPublication": {
"id": "proceedings/insai/2021/0859/0",
"title": "2021 International Conference on Networking Systems of AI (INSAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09866792",
"title": "Partial Point Cloud Registration with Deep Local Feature",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09866792/1G7UlGeNaiA",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09878213",
"title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09878213/1GrP5OekHDy",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600l1133",
"title": "Geometric Transformer for Fast and Robust Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600a572",
"title": "SGPCR: Spherical Gaussian Point Cloud Representation and its Application to Object Registration and Retrieval",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600a572/1L8qEq48PHa",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/10097640",
"title": "Sparse-to-Dense Matching Network for Large-scale LiDAR Point Cloud Registration",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/10097640/1M9lILSRgL6",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1zWE36wtuCY",
"title": "2021 International Conference on 3D Vision (3DV)",
"acronym": "3dv",
"groupId": "1800494",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zWE3qPVGLe",
"doi": "10.1109/3DV53792.2021.00044",
"title": "DeepBBS: Deep Best Buddies for Point Cloud Registration",
"normalizedTitle": "DeepBBS: Deep Best Buddies for Point Cloud Registration",
"abstract": "Recently, several deep learning approaches have been proposed for point cloud registration. These methods train a network to generate a representation that helps finding matching points in two 3D point clouds. Finding good matches allows them to calculate the transformation between the point clouds accurately. Two challenges of these techniques are dealing with occlusions and generalizing to objects of classes unseen during training. This work proposes DeepBBS, a novel method for learning a representation that takes into account the best buddy distance between points during training. Best Buddies (i.e., mutual nearest neighbors) are pairs of points nearest to each other. The Best Buddies criterion is a strong indication for correct matches that, in turn, leads to accurate registration. Our experiments show improved performance compared to previous methods. In particular, our learned representation leads to an accurate registration for partial shapes and in unseen categories. Our code is publicly available <sup>1</sup>",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recently, several deep learning approaches have been proposed for point cloud registration. These methods train a network to generate a representation that helps finding matching points in two 3D point clouds. Finding good matches allows them to calculate the transformation between the point clouds accurately. Two challenges of these techniques are dealing with occlusions and generalizing to objects of classes unseen during training. This work proposes DeepBBS, a novel method for learning a representation that takes into account the best buddy distance between points during training. Best Buddies (i.e., mutual nearest neighbors) are pairs of points nearest to each other. The Best Buddies criterion is a strong indication for correct matches that, in turn, leads to accurate registration. Our experiments show improved performance compared to previous methods. In particular, our learned representation leads to an accurate registration for partial shapes and in unseen categories. Our code is publicly available <sup>1</sup>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recently, several deep learning approaches have been proposed for point cloud registration. These methods train a network to generate a representation that helps finding matching points in two 3D point clouds. Finding good matches allows them to calculate the transformation between the point clouds accurately. Two challenges of these techniques are dealing with occlusions and generalizing to objects of classes unseen during training. This work proposes DeepBBS, a novel method for learning a representation that takes into account the best buddy distance between points during training. Best Buddies (i.e., mutual nearest neighbors) are pairs of points nearest to each other. The Best Buddies criterion is a strong indication for correct matches that, in turn, leads to accurate registration. Our experiments show improved performance compared to previous methods. In particular, our learned representation leads to an accurate registration for partial shapes and in unseen categories. Our code is publicly available 1",
"fno": "268800a342",
"keywords": [
"Deep Learning Artificial Intelligence",
"Image Matching",
"Image Registration",
"Solid Modelling",
"Deep BBS",
"Point Cloud Registration",
"Deep Learning Approaches",
"Matching Points",
"3 D Point Clouds",
"Points Nearest",
"Correct Matches",
"Learned Representation",
"Best Buddy Distance",
"Mutual Nearest Neighbors",
"Best Buddies Criterion",
"Partial Shapes",
"Point Cloud Compression",
"Training",
"Deep Learning",
"Three Dimensional Displays",
"Codes",
"Shape",
"Neural Networks",
"Point Cloud Registration",
"3 D Registration",
"Best Buddies",
"Deep Learning",
"Best Buddies Similarity",
"Deepbbs"
],
"authors": [
{
"affiliation": "Tel Aviv University,Israel",
"fullName": "Itan Hezroni",
"givenName": "Itan",
"surname": "Hezroni",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tel Aviv University,Israel",
"fullName": "Amnon Drory",
"givenName": "Amnon",
"surname": "Drory",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tel Aviv University,Israel",
"fullName": "Raja Giryes",
"givenName": "Raja",
"surname": "Giryes",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tel Aviv University,Israel",
"fullName": "Shai Avidan",
"givenName": "Shai",
"surname": "Avidan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "342-351",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2688-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "268800a331",
"articleId": "1zWEa3UdCBW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "268800a352",
"articleId": "1zWEk4sbWWA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200f663",
"title": "DeepPRO: Deep Partial Point Cloud Registration of Objects",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f663/1BmGoTRdyCY",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200d112",
"title": "OMNet: Learning Overlapping Mask for Partial-to-Partial Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200d112/1BmH817i3jq",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g118",
"title": "A Robust Loss for Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g118/1BmJLvoLMk0",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729524",
"title": "Unsupervised Category-Specific Partial Point Set Registration via Joint Shape Completion and Registration",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729524/1Bya8dlokw0",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ishc/2021/6743/0/674300a163",
"title": "DXICP: A Fast Registration Algorithm for Point Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/ishc/2021/674300a163/1EBmWMTUq5O",
"parentPublication": {
"id": "proceedings/ishc/2021/6743/0",
"title": "2021 3rd International Symposium on Smart and Healthy Cities (ISHC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ai/5555/01/09866792",
"title": "Partial Point Cloud Registration with Deep Local Feature",
"doi": null,
"abstractUrl": "/journal/ai/5555/01/09866792/1G7UlGeNaiA",
"parentPublication": {
"id": "trans/ai",
"title": "IEEE Transactions on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859814",
"title": "Overlap-Guided Coarse-to-Fine Correspondence Prediction for Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859814/1G9EOBjuiYg",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09878213",
"title": "Robust Point Cloud Registration Framework Based on Deep Graph Matching",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09878213/1GrP5OekHDy",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600l1133",
"title": "Geometric Transformer for Fast and Robust Point Cloud Registration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600l1133/1H0NxQCVYxW",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800b351",
"title": "3D Point Cloud Registration with Multi-Scale Architecture and Unsupervised Transfer Learning",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800b351/1zWEfYNkrg4",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwEJ0Os",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"acronym": "isspit",
"groupId": "1001026",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNApu5BB",
"doi": "10.1109/ISSPIT.2010.5711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"normalizedTitle": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"abstract": "Visual stress which can induce headache, migraines and eyestrain affects our body often detrimentally. Heart rate variability (HRV) analysis is commonly used as a quantitative marker depicting the activity of autonomic nervous system (ANS) that may be related to visual stress. In this paper, we proposed an improved HRV methodology for HRV features extraction and analysis. Firstly, a multi-channel portable ECG device has been developed for signal collection, and then we designed full-featured ECG monitoring system which suitable for real-time ECG display, signal processing, high accuracy R wave detection and HRV analysis in time and frequency domain. Taking consideration of the simplicity and real-time, the design of processing flow includes three stages. The first stage is signal preprocessing, we introduced a simple and reliable method termed the Mathematical Morphology (MM) and Difference Operation Method (DOM) for de-noising and R wave amplification. The second stage is to look for the point R and extract R-R interval series based on the above processing. The last stage focuses on HRV analysis from the aspects of time domain and frequency domain. Moreover, this research investigates the relationship between visual stress and HRV, 15 healthy, right-handed volunteers (all males aged from 19 to 25 years) participated in the experiment; there is significant changes of HRV features of visual stress condition compared to reference state. These results show that the HRV is affected by the presence of visual stress and long-term visual stress may weak the function of ANS, which may enable us for visual stress monitoring and management in daily life.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Visual stress which can induce headache, migraines and eyestrain affects our body often detrimentally. Heart rate variability (HRV) analysis is commonly used as a quantitative marker depicting the activity of autonomic nervous system (ANS) that may be related to visual stress. In this paper, we proposed an improved HRV methodology for HRV features extraction and analysis. Firstly, a multi-channel portable ECG device has been developed for signal collection, and then we designed full-featured ECG monitoring system which suitable for real-time ECG display, signal processing, high accuracy R wave detection and HRV analysis in time and frequency domain. Taking consideration of the simplicity and real-time, the design of processing flow includes three stages. The first stage is signal preprocessing, we introduced a simple and reliable method termed the Mathematical Morphology (MM) and Difference Operation Method (DOM) for de-noising and R wave amplification. The second stage is to look for the point R and extract R-R interval series based on the above processing. The last stage focuses on HRV analysis from the aspects of time domain and frequency domain. Moreover, this research investigates the relationship between visual stress and HRV, 15 healthy, right-handed volunteers (all males aged from 19 to 25 years) participated in the experiment; there is significant changes of HRV features of visual stress condition compared to reference state. These results show that the HRV is affected by the presence of visual stress and long-term visual stress may weak the function of ANS, which may enable us for visual stress monitoring and management in daily life.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Visual stress which can induce headache, migraines and eyestrain affects our body often detrimentally. Heart rate variability (HRV) analysis is commonly used as a quantitative marker depicting the activity of autonomic nervous system (ANS) that may be related to visual stress. In this paper, we proposed an improved HRV methodology for HRV features extraction and analysis. Firstly, a multi-channel portable ECG device has been developed for signal collection, and then we designed full-featured ECG monitoring system which suitable for real-time ECG display, signal processing, high accuracy R wave detection and HRV analysis in time and frequency domain. Taking consideration of the simplicity and real-time, the design of processing flow includes three stages. The first stage is signal preprocessing, we introduced a simple and reliable method termed the Mathematical Morphology (MM) and Difference Operation Method (DOM) for de-noising and R wave amplification. The second stage is to look for the point R and extract R-R interval series based on the above processing. The last stage focuses on HRV analysis from the aspects of time domain and frequency domain. Moreover, this research investigates the relationship between visual stress and HRV, 15 healthy, right-handed volunteers (all males aged from 19 to 25 years) participated in the experiment; there is significant changes of HRV features of visual stress condition compared to reference state. These results show that the HRV is affected by the presence of visual stress and long-term visual stress may weak the function of ANS, which may enable us for visual stress monitoring and management in daily life.",
"fno": "05711762",
"keywords": [
"Biomedical Electronics",
"Electrocardiography",
"Feature Extraction",
"Medical Signal Processing",
"Time Domain Analysis",
"Visual Stress",
"Heart Rate Variability Assessment",
"Headache",
"Migraines",
"Eyestrain Affects",
"Autonomic Nervous System",
"Feature Extraction",
"Multichannel Portable ECG Device",
"Full Featured ECG Monitoring System",
"Real Time ECG Display",
"Signal Processing",
"R Wave Detection",
"Mathematical Morphology",
"Difference Operation Method",
"De Noising",
"R Wave Amplification",
"R R Interval Series",
"Time Domain",
"Frequency Domain",
"Right Handed Volunteers",
"Time Domain Analysis",
"Portable ECG",
"Age 19 Yr To 25 Yr",
"Monitoring",
"Biomedical Monitoring",
"Heart Rate Variability",
"Electrocardiography",
"Weaving",
"Hardware",
"Resonant Frequency"
],
"authors": [
{
"affiliation": "Department of Computer Science and Engineering, Pusan National University, Busan, South Korea",
"fullName": "Wanqing Wu",
"givenName": null,
"surname": "Wanqing Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Engineering, Pusan National University, Busan, South Korea",
"fullName": "Jungtae Lee",
"givenName": null,
"surname": "Jungtae Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isspit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-12-01T00:00:00",
"pubType": "proceedings",
"pages": "144-149",
"year": "2010",
"issn": "2162-7843",
"isbn": "978-1-4244-9992-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05711760",
"articleId": "12OmNBNM8Vi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05711763",
"articleId": "12OmNvjgWFM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ijcbs/2009/3739/0/3739a344",
"title": "Estimation of Heart Rate Variability Changes during Different Visual Stimulations Using Non-invasive Continuous ECG Monitoring System",
"doi": null,
"abstractUrl": "/proceedings-article/ijcbs/2009/3739a344/12OmNASraXY",
"parentPublication": {
"id": "proceedings/ijcbs/2009/3739/0",
"title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitcs/2015/6537/0/07292977",
"title": "ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT Features",
"doi": null,
"abstractUrl": "/proceedings-article/icitcs/2015/07292977/12OmNBU1jHm",
"parentPublication": {
"id": "proceedings/icitcs/2015/6537/0",
"title": "2015 5th International Conference on IT Convergence and Security (ICITCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/collaboratecom/2009/9999/0/05363002",
"title": "Improvement of HRV methodology for positive/negative emotion assessment",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2009/05363002/12OmNqJHFBY",
"parentPublication": {
"id": "proceedings/collaboratecom/2009/9999/0",
"title": "2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacc/2013/5033/0/06686371",
"title": "Cardiac Ischemia Diagnosis Using Stress ECG Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icacc/2013/06686371/12OmNrNh0te",
"parentPublication": {
"id": "proceedings/icacc/2013/5033/0",
"title": "2013 Third International Conference on Advances in Computing and Communications (ICACC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/is3c/2016/3071/0/3071b055",
"title": "Study of Using Fourier Transform to Capture the ECG Signals between Awakeness and Dozing",
"doi": null,
"abstractUrl": "/proceedings-article/is3c/2016/3071b055/12OmNwe2IrJ",
"parentPublication": {
"id": "proceedings/is3c/2016/3071/0",
"title": "2016 International Symposium on Computer, Consumer and Control (IS3C)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciibms/2015/8562/0/07439531",
"title": "Multiscale entropy and poincare plot-based analysis of pulse rate variability and heart rate variability of ICU patients",
"doi": null,
"abstractUrl": "/proceedings-article/iciibms/2015/07439531/12OmNylbozW",
"parentPublication": {
"id": "proceedings/iciibms/2015/8562/0",
"title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisa/2010/5942/0/05480419",
"title": "Development of a Wearable ECG Recorder for Measuring Daily Stress",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2010/05480419/12OmNzJbQTZ",
"parentPublication": {
"id": "proceedings/icisa/2010/5942/0",
"title": "2010 International Conference on Information Science and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichit/2006/2674/2/267420453",
"title": "Detection of Acute Stress by Heart Rate Variability Using a Prototype Mobile ECG Sensor",
"doi": null,
"abstractUrl": "/proceedings-article/ichit/2006/267420453/12OmNzR8Cx9",
"parentPublication": {
"id": "proceedings/ichit/2006/2674/2",
"title": "2006 International Conference on Hybrid Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aciiw/2019/3891/0/08925142",
"title": "A stress recognition system using HRV parameters and machine learning techniques",
"doi": null,
"abstractUrl": "/proceedings-article/aciiw/2019/08925142/1fHFcGek5qw",
"parentPublication": {
"id": "proceedings/aciiw/2019/3891/0",
"title": "2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313361",
"title": "HRV-Spark: Computing Heart Rate Variability Measures Using Apache Spark",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313361/1qmfQ98KmWI",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhX1",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"acronym": "acii",
"groupId": "1002992",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAtK4n3",
"doi": "10.1109/ACII.2013.54",
"title": "Heart Rate Variability and Skin Conductance Biofeedback: A Triple-Blind Randomized Controlled Study",
"normalizedTitle": "Heart Rate Variability and Skin Conductance Biofeedback: A Triple-Blind Randomized Controlled Study",
"abstract": "High heart rate variability (HRV) and low skin conductance level (SCL) have been associated with low levels of stress. Biofeedback - providing an individual with online information about his or her own physiological state - may help to change these signals in the desired direction and therewith improve an individual's physical or mental condition. While there is an abundance of biofeedback tools and therapies commercially available, there is a lack of well-controlled validation studies. We here compare changes in several physiological, affective and cognitive variables after administering either a fake or a genuine biofeedback protocol that was aimed at affecting HRV and SCL. Which participants belonged to the genuine biofeedback group and which participants belonged to the control group remained unknown to everyone involved in the study until the very last stage of analysis. We did not find any differences in treatment effect between the two groups of participants. We also did not find correlations between HRV and the physiological, affective and cognitive variables that we measured, but there was some indication of SCL being related to error percentage in a cognitive task. While our study can only show that the studied protocol is not effective on the selected effect measures for the studied group of participants, it adds to the doubt that biofeedback is effective above and beyond non-specific treatment effects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "High heart rate variability (HRV) and low skin conductance level (SCL) have been associated with low levels of stress. Biofeedback - providing an individual with online information about his or her own physiological state - may help to change these signals in the desired direction and therewith improve an individual's physical or mental condition. While there is an abundance of biofeedback tools and therapies commercially available, there is a lack of well-controlled validation studies. We here compare changes in several physiological, affective and cognitive variables after administering either a fake or a genuine biofeedback protocol that was aimed at affecting HRV and SCL. Which participants belonged to the genuine biofeedback group and which participants belonged to the control group remained unknown to everyone involved in the study until the very last stage of analysis. We did not find any differences in treatment effect between the two groups of participants. We also did not find correlations between HRV and the physiological, affective and cognitive variables that we measured, but there was some indication of SCL being related to error percentage in a cognitive task. While our study can only show that the studied protocol is not effective on the selected effect measures for the studied group of participants, it adds to the doubt that biofeedback is effective above and beyond non-specific treatment effects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "High heart rate variability (HRV) and low skin conductance level (SCL) have been associated with low levels of stress. Biofeedback - providing an individual with online information about his or her own physiological state - may help to change these signals in the desired direction and therewith improve an individual's physical or mental condition. While there is an abundance of biofeedback tools and therapies commercially available, there is a lack of well-controlled validation studies. We here compare changes in several physiological, affective and cognitive variables after administering either a fake or a genuine biofeedback protocol that was aimed at affecting HRV and SCL. Which participants belonged to the genuine biofeedback group and which participants belonged to the control group remained unknown to everyone involved in the study until the very last stage of analysis. We did not find any differences in treatment effect between the two groups of participants. We also did not find correlations between HRV and the physiological, affective and cognitive variables that we measured, but there was some indication of SCL being related to error percentage in a cognitive task. While our study can only show that the studied protocol is not effective on the selected effect measures for the studied group of participants, it adds to the doubt that biofeedback is effective above and beyond non-specific treatment effects.",
"fno": "5048a289",
"keywords": [
"Heart Rate Variability",
"Biological Control Systems",
"Stress",
"Physiology",
"Atmospheric Measurements",
"Particle Measurements",
"Games",
"Alpha Asymmetry",
"Biofeedback",
"Heart Rate Variability",
"Skin Conductance",
"Well Being",
"Cognitive Performance"
],
"authors": [
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "S. F. Raaijmakers",
"givenName": "S. F.",
"surname": "Raaijmakers",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "F. W. Steel",
"givenName": "F. W.",
"surname": "Steel",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "M. de Goede",
"givenName": "M.",
"surname": "de Goede",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "N. C. van Wouwe",
"givenName": "N. C.",
"surname": "van Wouwe",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "J. B. F. van Erp",
"givenName": "J. B. F.",
"surname": "van Erp",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "TNO, Soesterberg, Netherlands",
"fullName": "A.-M Brouwer",
"givenName": "A.-M",
"surname": "Brouwer",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "acii",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-09-01T00:00:00",
"pubType": "proceedings",
"pages": "289-293",
"year": "2013",
"issn": "2156-8103",
"isbn": "978-0-7695-5048-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5048a283",
"articleId": "12OmNzuIjfb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5048a294",
"articleId": "12OmNwE9Ove",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2016/5670/0/5670a396",
"title": "Selecting Physiological Features for Predicting Bidding Behavior in Electronic Auctions",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2016/5670a396/12OmNAkEU6t",
"parentPublication": {
"id": "proceedings/hicss/2016/5670/0",
"title": "2016 49th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hisb/2011/4407/0/4407a017",
"title": "A Prototype of Wireless Electrocardiogram Biofeedback Platform and Its Preliminary Evaluation on HRV Alteration in Unconscious Status",
"doi": null,
"abstractUrl": "/proceedings-article/hisb/2011/4407a017/12OmNqFrGGK",
"parentPublication": {
"id": "proceedings/hisb/2011/4407/0",
"title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a473",
"title": "Physiological Correlates of Stress in Individuals about to Undergo Eye Laser Surgery",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a473/12OmNwBBqbT",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a362",
"title": "Measuring Emotional Arousal for Online Applications: Evaluation of Ultra-short Term Heart Rate Variability Measures",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a362/12OmNwCaCyL",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2016/6117/0/6117a032",
"title": "Timing of Coping Instruction Presentation for Real-Time Acute Stress Management: Long-Term Implications for Improved Surgical Performance",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2016/6117a032/12OmNz4SOCI",
"parentPublication": {
"id": "proceedings/ichi/2016/6117/0",
"title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc2/2017/5862/0/5862a183",
"title": "A Mobile Cloud-Based Biofeedback Platform for Evaluating Medication Response",
"doi": null,
"abstractUrl": "/proceedings-article/sc2/2017/5862a183/12OmNzwHvpB",
"parentPublication": {
"id": "proceedings/sc2/2017/5862/0",
"title": "2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2019/02/07930503",
"title": "Visual Biofeedback and Game Adaptation in Relaxation Skill Transfer",
"doi": null,
"abstractUrl": "/journal/ta/2019/02/07930503/13rRUwInvdq",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729540",
"title": "Using Heart Rate Variability for Comparing the Effectiveness of Virtual vs Real Training Environments for Firefighters",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729540/1Bya8YD1tUk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-nier/2019/1758/0/175800a037",
"title": "Biofeedback Augmented Software Engineering: Monitoring of Programmers' Mental Effort",
"doi": null,
"abstractUrl": "/proceedings-article/icse-nier/2019/175800a037/1cI68JO1XYk",
"parentPublication": {
"id": "proceedings/icse-nier/2019/1758/0",
"title": "2019 IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2022/02/08930025",
"title": "Evoking Physiological Synchrony and Empathy Using Social VR With Biofeedback",
"doi": null,
"abstractUrl": "/journal/ta/2022/02/08930025/1fCCMiUcICY",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwl8GIE",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC4wtEZ",
"doi": "10.1109/BIBE.2015.7367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"normalizedTitle": "Continuous monitoring of stress on smartphone using heart rate variability",
"abstract": "Continuous monitoring of an individual's stress levels is essential to manage stress and mental state in an effective way. With increasing ubiquity of wearable heart rate monitors and their unobtrusiveness, HRV (Heart rate variability) derived from heart rate signals has emerged as one of the most relevant parameters for continuous monitoring of stress. In the present work, we have made an attempt to address the challenges about distinguishing between stressed and non-stressed state of a person based on just one minute of IBI (Inter Beat Interval) records with good accuracy. Such ultra-short term analysis of HRV is particularly advantageous towards capturing very short term fluctuations in mental stress levels and enhanced scope for frequent monitoring. We have analyzed various time domain, frequency domain and nonlinear HRV features to narrow down to a most influential set of features for accurate classification between stressed and non-stressed state. We have identified RMSSD (root mean square of successive differences) of IBI series to be the most direct indicator of stressed state. We also provide a continuous stress score which, when used in continuous monitoring scenario, provides the user with adequate details about his/her stress levels. This helps the user to understand stress patterns across a day in a better way and to take appropriate measures to manage stressful situations. We have developed and deployed a system, based on above concept, on smartphone as an android application for real-time stress monitoring.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Continuous monitoring of an individual's stress levels is essential to manage stress and mental state in an effective way. With increasing ubiquity of wearable heart rate monitors and their unobtrusiveness, HRV (Heart rate variability) derived from heart rate signals has emerged as one of the most relevant parameters for continuous monitoring of stress. In the present work, we have made an attempt to address the challenges about distinguishing between stressed and non-stressed state of a person based on just one minute of IBI (Inter Beat Interval) records with good accuracy. Such ultra-short term analysis of HRV is particularly advantageous towards capturing very short term fluctuations in mental stress levels and enhanced scope for frequent monitoring. We have analyzed various time domain, frequency domain and nonlinear HRV features to narrow down to a most influential set of features for accurate classification between stressed and non-stressed state. We have identified RMSSD (root mean square of successive differences) of IBI series to be the most direct indicator of stressed state. We also provide a continuous stress score which, when used in continuous monitoring scenario, provides the user with adequate details about his/her stress levels. This helps the user to understand stress patterns across a day in a better way and to take appropriate measures to manage stressful situations. We have developed and deployed a system, based on above concept, on smartphone as an android application for real-time stress monitoring.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Continuous monitoring of an individual's stress levels is essential to manage stress and mental state in an effective way. With increasing ubiquity of wearable heart rate monitors and their unobtrusiveness, HRV (Heart rate variability) derived from heart rate signals has emerged as one of the most relevant parameters for continuous monitoring of stress. In the present work, we have made an attempt to address the challenges about distinguishing between stressed and non-stressed state of a person based on just one minute of IBI (Inter Beat Interval) records with good accuracy. Such ultra-short term analysis of HRV is particularly advantageous towards capturing very short term fluctuations in mental stress levels and enhanced scope for frequent monitoring. We have analyzed various time domain, frequency domain and nonlinear HRV features to narrow down to a most influential set of features for accurate classification between stressed and non-stressed state. We have identified RMSSD (root mean square of successive differences) of IBI series to be the most direct indicator of stressed state. We also provide a continuous stress score which, when used in continuous monitoring scenario, provides the user with adequate details about his/her stress levels. This helps the user to understand stress patterns across a day in a better way and to take appropriate measures to manage stressful situations. We have developed and deployed a system, based on above concept, on smartphone as an android application for real-time stress monitoring.",
"fno": "07367627",
"keywords": [
"Stress",
"Heart Rate Variability",
"Monitoring",
"Feature Extraction",
"Biomedical Monitoring",
"Logistics",
"Heart Rate Variability",
"Stress"
],
"authors": [
{
"affiliation": "Samsung R & D Institute, Bangalore., Address: 2870, Phoenix Building, Bagmane Constellation Business Park, Doddanekundi Circle, Marathahalli Post, Bangalore - 560037",
"fullName": "Subramanya Mayya",
"givenName": "Subramanya",
"surname": "Mayya",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Samsung R & D Institute, Bangalore., Address: 2870, Phoenix Building, Bagmane Constellation Business Park, Doddanekundi Circle, Marathahalli Post, Bangalore - 560037",
"fullName": "Vivek Jilla",
"givenName": "Vivek",
"surname": "Jilla",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Samsung R & D Institute, Bangalore., Address: 2870, Phoenix Building, Bagmane Constellation Business Park, Doddanekundi Circle, Marathahalli Post, Bangalore - 560037",
"fullName": "Vijay Narayan Tiwari",
"givenName": "Vijay Narayan",
"surname": "Tiwari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Samsung R & D Institute, Bangalore., Address: 2870, Phoenix Building, Bagmane Constellation Business Park, Doddanekundi Circle, Marathahalli Post, Bangalore - 560037",
"fullName": "Mithun Manjnath Nayak",
"givenName": "Mithun Manjnath",
"surname": "Nayak",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Samsung R & D Institute, Bangalore., Address: 2870, Phoenix Building, Bagmane Constellation Business Park, Doddanekundi Circle, Marathahalli Post, Bangalore - 560037",
"fullName": "Rangavittal Narayanan",
"givenName": "Rangavittal",
"surname": "Narayanan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibe",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1-5",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-7983-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07367626",
"articleId": "12OmNxwncny",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07367628",
"articleId": "12OmNBTJIxw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ijcbs/2009/3739/0/3739a344",
"title": "Estimation of Heart Rate Variability Changes during Different Visual Stimulations Using Non-invasive Continuous ECG Monitoring System",
"doi": null,
"abstractUrl": "/proceedings-article/ijcbs/2009/3739a344/12OmNASraXY",
"parentPublication": {
"id": "proceedings/ijcbs/2009/3739/0",
"title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2010/9992/0/05711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2010/05711762/12OmNApu5BB",
"parentPublication": {
"id": "proceedings/isspit/2010/9992/0",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cic/1989/2114/0/00130482",
"title": "Spectrum of heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/cic/1989/00130482/12OmNvIfDOI",
"parentPublication": {
"id": "proceedings/cic/1989/2114/0",
"title": "Proceedings Computers in Cardiology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccae/2009/3569/0/3569a243",
"title": "A Review of Measurement and Analysis of Heart Rate Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccae/2009/3569a243/12OmNwJgAG6",
"parentPublication": {
"id": "proceedings/iccae/2009/3569/0",
"title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2016/1790/0/07757587",
"title": "Physiological sensing based stress analysis during assessment",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2016/07757587/12OmNx6PiDh",
"parentPublication": {
"id": "proceedings/fie/2016/1790/0",
"title": "2016 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217798",
"title": "Ultra-short-term analysis of heart rate variability for real-time acute pain monitoring with wearable electronics",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217798/12OmNz61cUn",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chase/2022/9476/0/947600a168",
"title": "Camera-based heart rate variability and stress measurement from facial videos",
"doi": null,
"abstractUrl": "/proceedings-article/chase/2022/947600a168/1JjymzwGjIY",
"parentPublication": {
"id": "proceedings/chase/2022/9476/0",
"title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acit-csii-bcd/2017/3302/0/3302a047",
"title": "Heart Rate and Heart Rate Variability Measuring System by Using Smartphone",
"doi": null,
"abstractUrl": "/proceedings-article/acit-csii-bcd/2017/3302a047/1cdOBdiztwA",
"parentPublication": {
"id": "proceedings/acit-csii-bcd/2017/3302/0",
"title": "2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300b385",
"title": "Remote Heart Rate and Heart Rate Variability Detection and Monitoring from Face Video with Minimum Resources",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300b385/1nkDq4aFW9i",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2020/9574/0/957400a813",
"title": "Impact of Different Stimuli on User Stress During a Virtual Firefighting Training Exercise",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2020/957400a813/1pBMqLNShEc",
"parentPublication": {
"id": "proceedings/bibe/2020/9574/0",
"title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyoSbiA",
"title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCyBXi0",
"doi": "10.1109/BIBE.2016.27",
"title": "Workload Induces Changes in Hemodynamics, Respiratory Rate and Heart Rate Variability",
"normalizedTitle": "Workload Induces Changes in Hemodynamics, Respiratory Rate and Heart Rate Variability",
"abstract": "Advances in image processing mean it is now possible to measure heart rate variability (HRV) and respiratory rate without contact. The influence of mental workload and dual tasking on HRV and respiratory rate has not been well studied. The objective of the present study was to quantify the relations between workload and dual tasking and HRV and respiratory rate. We measured the weighted workload score of the NASA Task Load Index, the mean oxygenated hemoglobin (oxyHb) concentration, the standard deviation of oxyHb concentration, respiratory data and electrocardiogram data. Subjects performed n-back tasks, Stroop tasks and visual search tasks in low-and high-workload conditions and single-and dual-task conditions. Each task required different attention functions. Respiratory rate was significantly greater in the dual-task conditions than in the single-task conditions, indicating that divided attention increased respiratory rate. The NASA Task Load Index weighted workload score in the Stroop task was higher in the high-workload, dual-task condition than in the low-workload or single-task condition, and oxyHb concentration in the frontal area was lower. This indicates an overload state. In this condition, electrocardiogram data showed distinctive trends. For example, the high-frequency component of electrocardiogram data and mean RR interval were high in the high-workload, dual-task condition. These results suggest that attentional functions and overload in a dual task affected respiratory rate and HRV.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Advances in image processing mean it is now possible to measure heart rate variability (HRV) and respiratory rate without contact. The influence of mental workload and dual tasking on HRV and respiratory rate has not been well studied. The objective of the present study was to quantify the relations between workload and dual tasking and HRV and respiratory rate. We measured the weighted workload score of the NASA Task Load Index, the mean oxygenated hemoglobin (oxyHb) concentration, the standard deviation of oxyHb concentration, respiratory data and electrocardiogram data. Subjects performed n-back tasks, Stroop tasks and visual search tasks in low-and high-workload conditions and single-and dual-task conditions. Each task required different attention functions. Respiratory rate was significantly greater in the dual-task conditions than in the single-task conditions, indicating that divided attention increased respiratory rate. The NASA Task Load Index weighted workload score in the Stroop task was higher in the high-workload, dual-task condition than in the low-workload or single-task condition, and oxyHb concentration in the frontal area was lower. This indicates an overload state. In this condition, electrocardiogram data showed distinctive trends. For example, the high-frequency component of electrocardiogram data and mean RR interval were high in the high-workload, dual-task condition. These results suggest that attentional functions and overload in a dual task affected respiratory rate and HRV.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Advances in image processing mean it is now possible to measure heart rate variability (HRV) and respiratory rate without contact. The influence of mental workload and dual tasking on HRV and respiratory rate has not been well studied. The objective of the present study was to quantify the relations between workload and dual tasking and HRV and respiratory rate. We measured the weighted workload score of the NASA Task Load Index, the mean oxygenated hemoglobin (oxyHb) concentration, the standard deviation of oxyHb concentration, respiratory data and electrocardiogram data. Subjects performed n-back tasks, Stroop tasks and visual search tasks in low-and high-workload conditions and single-and dual-task conditions. Each task required different attention functions. Respiratory rate was significantly greater in the dual-task conditions than in the single-task conditions, indicating that divided attention increased respiratory rate. The NASA Task Load Index weighted workload score in the Stroop task was higher in the high-workload, dual-task condition than in the low-workload or single-task condition, and oxyHb concentration in the frontal area was lower. This indicates an overload state. In this condition, electrocardiogram data showed distinctive trends. For example, the high-frequency component of electrocardiogram data and mean RR interval were high in the high-workload, dual-task condition. These results suggest that attentional functions and overload in a dual task affected respiratory rate and HRV.",
"fno": "3834a176",
"keywords": [
"Visualization",
"Heart Rate Variability",
"Indexes",
"Standards",
"NASA",
"Atmospheric Measurements",
"Particle Measurements",
"Dual Task",
"Respiratory Rate",
"HRV",
"F NIRS"
],
"authors": [
{
"affiliation": null,
"fullName": "Taishi Nagasawa",
"givenName": "Taishi",
"surname": "Nagasawa",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hiroshi Hagiwara",
"givenName": "Hiroshi",
"surname": "Hagiwara",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibe",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-10-01T00:00:00",
"pubType": "proceedings",
"pages": "176-181",
"year": "2016",
"issn": "2471-7819",
"isbn": "978-1-5090-3834-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3834a172",
"articleId": "12OmNyuya5H",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3834a182",
"articleId": "12OmNrAv3TB",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iih-msp/2010/4222/0/4222a389",
"title": "Driving Conditions Recognition Using Heart Rate Variability Indexes",
"doi": null,
"abstractUrl": "/proceedings-article/iih-msp/2010/4222a389/12OmNAOKnVh",
"parentPublication": {
"id": "proceedings/iih-msp/2010/4222/0",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a289",
"title": "Heart Rate Variability and Skin Conductance Biofeedback: A Triple-Blind Randomized Controlled Study",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a289/12OmNAtK4n3",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cic/1989/2114/0/00130482",
"title": "Spectrum of heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/cic/1989/00130482/12OmNvIfDOI",
"parentPublication": {
"id": "proceedings/cic/1989/2114/0",
"title": "Proceedings Computers in Cardiology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccae/2009/3569/0/3569a243",
"title": "A Review of Measurement and Analysis of Heart Rate Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccae/2009/3569a243/12OmNwJgAG6",
"parentPublication": {
"id": "proceedings/iccae/2009/3569/0",
"title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsa/2013/5045/0/5045a174",
"title": "Time Frequency Analysis of Heart Rate Variability with Chaos Theory",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2013/5045a174/12OmNwpGgO6",
"parentPublication": {
"id": "proceedings/iccsa/2013/5045/0",
"title": "2013 13th International Conference on Computational Science and Its Applications (ICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a191",
"title": "Contactless Measurement of Heart Rate Variability from Pupillary Fluctuations",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a191/12OmNyLA5xC",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2012/4357/0/06399712",
"title": "Time-frequency analysis of heart rate variability for sleep and wake classification",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2012/06399712/12OmNyrqzzk",
"parentPublication": {
"id": "proceedings/bibe/2012/4357/0",
"title": "2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729540",
"title": "Using Heart Rate Variability for Comparing the Effectiveness of Virtual vs Real Training Environments for Firefighters",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729540/1Bya8YD1tUk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chase/2022/9476/0/947600a168",
"title": "Camera-based heart rate variability and stress measurement from facial videos",
"doi": null,
"abstractUrl": "/proceedings-article/chase/2022/947600a168/1JjymzwGjIY",
"parentPublication": {
"id": "proceedings/chase/2022/9476/0",
"title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300b385",
"title": "Remote Heart Rate and Heart Rate Variability Detection and Monitoring from Face Video with Minimum Resources",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300b385/1nkDq4aFW9i",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBzRNrw",
"title": "2013 46th Hawaii International Conference on System Sciences",
"acronym": "hicss",
"groupId": "1000730",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqGiu0R",
"doi": "10.1109/HICSS.2013.365",
"title": "Investigating Technostress in situ: Understanding the Day and the Life of a Knowledge Worker Using Heart Rate Variability",
"normalizedTitle": "Investigating Technostress in situ: Understanding the Day and the Life of a Knowledge Worker Using Heart Rate Variability",
"abstract": "The proliferation of information and communication technology (ICT) throughout workplace and home life is thought to increase feelings of being overloaded, drained, and/or burned out. This phenomenon is termed \"technostress.\" In this relatively new line of research, scholars have employed predominantly questionnaire surveys and experiments to investigate the phenomenon. This paper argues for an interpretive, theory building approach for studying techno stress, motivated by two shortcomings of these data collection techniques: questionnaire surveys rely on potentially imperfect participant recall, while experiments cannot find root causes of techno stress during the course of a normal work day. Linking periods of bodily-experienced stress measured by heart rate variability with qualitative data enables an interpretive, theory building approach that allows for a richer understanding of whether and how ICT contributes to stress.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The proliferation of information and communication technology (ICT) throughout workplace and home life is thought to increase feelings of being overloaded, drained, and/or burned out. This phenomenon is termed \"technostress.\" In this relatively new line of research, scholars have employed predominantly questionnaire surveys and experiments to investigate the phenomenon. This paper argues for an interpretive, theory building approach for studying techno stress, motivated by two shortcomings of these data collection techniques: questionnaire surveys rely on potentially imperfect participant recall, while experiments cannot find root causes of techno stress during the course of a normal work day. Linking periods of bodily-experienced stress measured by heart rate variability with qualitative data enables an interpretive, theory building approach that allows for a richer understanding of whether and how ICT contributes to stress.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The proliferation of information and communication technology (ICT) throughout workplace and home life is thought to increase feelings of being overloaded, drained, and/or burned out. This phenomenon is termed \"technostress.\" In this relatively new line of research, scholars have employed predominantly questionnaire surveys and experiments to investigate the phenomenon. This paper argues for an interpretive, theory building approach for studying techno stress, motivated by two shortcomings of these data collection techniques: questionnaire surveys rely on potentially imperfect participant recall, while experiments cannot find root causes of techno stress during the course of a normal work day. Linking periods of bodily-experienced stress measured by heart rate variability with qualitative data enables an interpretive, theory building approach that allows for a richer understanding of whether and how ICT contributes to stress.",
"fno": "4892a430",
"keywords": [
"Stress",
"Atmospheric Measurements",
"Particle Measurements",
"Belts",
"Stress Measurement",
"Heart Rate Variability",
"Qualitative Methods",
"Stress",
"Heart Rate Variability",
"Theory Building"
],
"authors": [
{
"affiliation": null,
"fullName": "Stefan Schellhammer",
"givenName": "Stefan",
"surname": "Schellhammer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Russell Haines",
"givenName": "Russell",
"surname": "Haines",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stefan Klein",
"givenName": "Stefan",
"surname": "Klein",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hicss",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2013-01-01T00:00:00",
"pubType": "proceedings",
"pages": "430-439",
"year": "2013",
"issn": "1530-1605",
"isbn": "978-1-4673-5933-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4892a425",
"articleId": "12OmNAJm0oH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4892a440",
"articleId": "12OmNy6ZrYV",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2010/9992/0/05711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2010/05711762/12OmNApu5BB",
"parentPublication": {
"id": "proceedings/isspit/2010/9992/0",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a289",
"title": "Heart Rate Variability and Skin Conductance Biofeedback: A Triple-Blind Randomized Controlled Study",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a289/12OmNAtK4n3",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2015/7983/0/07367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367627/12OmNC4wtEZ",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a429",
"title": "Neuroticism, Extraversion and Stress: Physiological Correlates",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a429/12OmNC4wtJx",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2017/0563/0/08273661",
"title": "Wear your heart on your sleeve: Visible psychophysiology for contextualized relaxation",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2017/08273661/12OmNwKoZdU",
"parentPublication": {
"id": "proceedings/acii/2017/0563/0",
"title": "2017 Seventh International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciibms/2017/6664/0/08279715",
"title": "A stress analysis method for heart rate data of mHealth devices using poincare plot and complex correlation measures",
"doi": null,
"abstractUrl": "/proceedings-article/iciibms/2017/08279715/12OmNzcxZcf",
"parentPublication": {
"id": "proceedings/iciibms/2017/6664/0",
"title": "2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000b405",
"title": "Video Based Measurement of Heart Rate and Heart Rate Variability Spectrogram from Estimated Hemoglobin Information",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000b405/17D45WHONop",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729540",
"title": "Using Heart Rate Variability for Comparing the Effectiveness of Virtual vs Real Training Environments for Firefighters",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729540/1Bya8YD1tUk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chase/2022/9476/0/947600a168",
"title": "Camera-based heart rate variability and stress measurement from facial videos",
"doi": null,
"abstractUrl": "/proceedings-article/chase/2022/947600a168/1JjymzwGjIY",
"parentPublication": {
"id": "proceedings/chase/2022/9476/0",
"title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acit-csii-bcd/2017/3302/0/3302a047",
"title": "Heart Rate and Heart Rate Variability Measuring System by Using Smartphone",
"doi": null,
"abstractUrl": "/proceedings-article/acit-csii-bcd/2017/3302a047/1cdOBdiztwA",
"parentPublication": {
"id": "proceedings/acit-csii-bcd/2017/3302/0",
"title": "2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhX1",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"acronym": "acii",
"groupId": "1002992",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwCaCyL",
"doi": "10.1109/ACII.2013.66",
"title": "Measuring Emotional Arousal for Online Applications: Evaluation of Ultra-short Term Heart Rate Variability Measures",
"normalizedTitle": "Measuring Emotional Arousal for Online Applications: Evaluation of Ultra-short Term Heart Rate Variability Measures",
"abstract": "The objective of this paper is to examine the possibilities and limitations of heart rate variability (HRV) as an indicator of emotional arousal for mobile applications which require online biofeedback. In contrast to offline classification, feature extraction for online applications sets other requirements to the window size in which data is analyzed as the delay between a change of a person's arousal level and the reaction of an application should be as short as possible. For this purpose we compare various HRV features in order to evaluate how far window size can be decreased to enable online arousal recognition. Using data from a study where high and low arousal were induced in a game scenario, HRV features are analyzed for their discriminatory power depending on the window size using Fisher's discriminant analysis. Moreover, we use these features to train an SVM based classifier. Results indicate that for some features it is possible to use ultra-short term window sizes, i.e. window sizes shorter than the 5 minute window which has traditionally been used for short term HRV analysis.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The objective of this paper is to examine the possibilities and limitations of heart rate variability (HRV) as an indicator of emotional arousal for mobile applications which require online biofeedback. In contrast to offline classification, feature extraction for online applications sets other requirements to the window size in which data is analyzed as the delay between a change of a person's arousal level and the reaction of an application should be as short as possible. For this purpose we compare various HRV features in order to evaluate how far window size can be decreased to enable online arousal recognition. Using data from a study where high and low arousal were induced in a game scenario, HRV features are analyzed for their discriminatory power depending on the window size using Fisher's discriminant analysis. Moreover, we use these features to train an SVM based classifier. Results indicate that for some features it is possible to use ultra-short term window sizes, i.e. window sizes shorter than the 5 minute window which has traditionally been used for short term HRV analysis.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The objective of this paper is to examine the possibilities and limitations of heart rate variability (HRV) as an indicator of emotional arousal for mobile applications which require online biofeedback. In contrast to offline classification, feature extraction for online applications sets other requirements to the window size in which data is analyzed as the delay between a change of a person's arousal level and the reaction of an application should be as short as possible. For this purpose we compare various HRV features in order to evaluate how far window size can be decreased to enable online arousal recognition. Using data from a study where high and low arousal were induced in a game scenario, HRV features are analyzed for their discriminatory power depending on the window size using Fisher's discriminant analysis. Moreover, we use these features to train an SVM based classifier. Results indicate that for some features it is possible to use ultra-short term window sizes, i.e. window sizes shorter than the 5 minute window which has traditionally been used for short term HRV analysis.",
"fno": "5048a362",
"keywords": [
"Heart Rate Variability",
"Games",
"Feature Extraction",
"Electrocardiography",
"Hafnium",
"Physiology",
"Learning",
"Arousal Recognition",
"Signal Processing",
"Human Computer Interaction",
"HRV"
],
"authors": [
{
"affiliation": "FZI Res. Center for Inf. Technol., Karlsruhe, Germany",
"fullName": "Kristina Schaaff",
"givenName": "Kristina",
"surname": "Schaaff",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Karlsruhe Inst. of Technol., Karlsruhe, Germany",
"fullName": "Marc T. P. Adam",
"givenName": "Marc T. P.",
"surname": "Adam",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "acii",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-09-01T00:00:00",
"pubType": "proceedings",
"pages": "362-368",
"year": "2013",
"issn": "2156-8103",
"isbn": "978-0-7695-5048-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5048a356",
"articleId": "12OmNBSjJ3E",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5048a369",
"articleId": "12OmNzuIjn7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2010/9992/0/05711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2010/05711762/12OmNApu5BB",
"parentPublication": {
"id": "proceedings/isspit/2010/9992/0",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2015/7983/0/07367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367627/12OmNC4wtEZ",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cic/1989/2114/0/00130482",
"title": "Spectrum of heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/cic/1989/00130482/12OmNvIfDOI",
"parentPublication": {
"id": "proceedings/cic/1989/2114/0",
"title": "Proceedings Computers in Cardiology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsa/2013/5045/0/5045a174",
"title": "Time Frequency Analysis of Heart Rate Variability with Chaos Theory",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2013/5045a174/12OmNwpGgO6",
"parentPublication": {
"id": "proceedings/iccsa/2013/5045/0",
"title": "2013 13th International Conference on Computational Science and Its Applications (ICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2016/3834/0/3834a274",
"title": "Heart Rate Variability Signal Features for Emotion Recognition by Using Principal Component Analysis and Support Vectors Machine",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2016/3834a274/12OmNxwncAG",
"parentPublication": {
"id": "proceedings/bibe/2016/3834/0",
"title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciibms/2015/8562/0/07439531",
"title": "Multiscale entropy and poincare plot-based analysis of pulse rate variability and heart rate variability of ICU patients",
"doi": null,
"abstractUrl": "/proceedings-article/iciibms/2015/07439531/12OmNylbozW",
"parentPublication": {
"id": "proceedings/iciibms/2015/8562/0",
"title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217798",
"title": "Ultra-short-term analysis of heart rate variability for real-time acute pain monitoring with wearable electronics",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217798/12OmNz61cUn",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2008/2570/0/04607452",
"title": "A biomedical entertainment platform design based on musical rhythm characteristics and heart rate variability (HRV)",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2008/04607452/12OmNzSyCdw",
"parentPublication": {
"id": "proceedings/icme/2008/2570/0",
"title": "2008 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2015/04/07106477",
"title": "Recognizing Emotions Induced by Affective Sounds through Heart Rate Variability",
"doi": null,
"abstractUrl": "/journal/ta/2015/04/07106477/13rRUxjyX2u",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313361",
"title": "HRV-Spark: Computing Heart Rate Variability Measures Using Apache Spark",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313361/1qmfQ98KmWI",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxRnvS0",
"title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)",
"acronym": "ichi",
"groupId": "1803080",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz4SOCI",
"doi": "10.1109/ICHI.2016.101",
"title": "Timing of Coping Instruction Presentation for Real-Time Acute Stress Management: Long-Term Implications for Improved Surgical Performance",
"normalizedTitle": "Timing of Coping Instruction Presentation for Real-Time Acute Stress Management: Long-Term Implications for Improved Surgical Performance",
"abstract": "The purpose of this project was to inform the presentation timing of coping strategies during an acutely stressful task, to be integrated into a visual real-time biofeedback display for stress management. We gathered skin temperature, electrocardiography, and electroencephalography data, and presented a coping instruction on various time schedules while participants played a first-person shooter computer game. Heart rate variability (HRV) preceding and following significantly elevated peaks of stress at times when a message was presented was compared to times of comparable stress when a message was not presented. In general, around times of significantly elevated heart rate (HR), presenting a coping instruction resulted in an increase in HRV. At analogous times of elevated HR when a message was not presented, the downstream results indicated a decrease in HRV in most cases. These results support that HRV over relatively short time windows before and after a peak of elevated stress can be a sensitive indicator of acute stress. We can confirm that the presence of a message at a physiologically-relevant time reduced physiological stress within the subset of peaks analyzed. The findings imply that presenting coping instructions at the time of an acute stress response restores downstream physiological indicators representative of stress, and that not doing so can be detrimental.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The purpose of this project was to inform the presentation timing of coping strategies during an acutely stressful task, to be integrated into a visual real-time biofeedback display for stress management. We gathered skin temperature, electrocardiography, and electroencephalography data, and presented a coping instruction on various time schedules while participants played a first-person shooter computer game. Heart rate variability (HRV) preceding and following significantly elevated peaks of stress at times when a message was presented was compared to times of comparable stress when a message was not presented. In general, around times of significantly elevated heart rate (HR), presenting a coping instruction resulted in an increase in HRV. At analogous times of elevated HR when a message was not presented, the downstream results indicated a decrease in HRV in most cases. These results support that HRV over relatively short time windows before and after a peak of elevated stress can be a sensitive indicator of acute stress. We can confirm that the presence of a message at a physiologically-relevant time reduced physiological stress within the subset of peaks analyzed. The findings imply that presenting coping instructions at the time of an acute stress response restores downstream physiological indicators representative of stress, and that not doing so can be detrimental.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The purpose of this project was to inform the presentation timing of coping strategies during an acutely stressful task, to be integrated into a visual real-time biofeedback display for stress management. We gathered skin temperature, electrocardiography, and electroencephalography data, and presented a coping instruction on various time schedules while participants played a first-person shooter computer game. Heart rate variability (HRV) preceding and following significantly elevated peaks of stress at times when a message was presented was compared to times of comparable stress when a message was not presented. In general, around times of significantly elevated heart rate (HR), presenting a coping instruction resulted in an increase in HRV. At analogous times of elevated HR when a message was not presented, the downstream results indicated a decrease in HRV in most cases. These results support that HRV over relatively short time windows before and after a peak of elevated stress can be a sensitive indicator of acute stress. We can confirm that the presence of a message at a physiologically-relevant time reduced physiological stress within the subset of peaks analyzed. The findings imply that presenting coping instructions at the time of an acute stress response restores downstream physiological indicators representative of stress, and that not doing so can be detrimental.",
"fno": "6117a032",
"keywords": [
"Stress",
"Surgery",
"Physiology",
"Heart Rate Variability",
"Biological Control Systems",
"Electrocardiography",
"Timing Of Presentation",
"Heart Rate Variability",
"Acute Stress",
"Coping Instructions",
"Real Time"
],
"authors": [
{
"affiliation": null,
"fullName": "Lauren Kennedy",
"givenName": "Lauren",
"surname": "Kennedy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sarah Henrickson Parker",
"givenName": "Sarah Henrickson",
"surname": "Parker",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ichi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-10-01T00:00:00",
"pubType": "proceedings",
"pages": "32-34",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-6117-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "6117a024",
"articleId": "12OmNwbLVqS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "6117a035",
"articleId": "12OmNBp52yN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2010/9992/0/05711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2010/05711762/12OmNApu5BB",
"parentPublication": {
"id": "proceedings/isspit/2010/9992/0",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2015/7983/0/07367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367627/12OmNC4wtEZ",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a473",
"title": "Physiological Correlates of Stress in Individuals about to Undergo Eye Laser Surgery",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a473/12OmNwBBqbT",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a362",
"title": "Measuring Emotional Arousal for Online Applications: Evaluation of Ultra-short Term Heart Rate Variability Measures",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a362/12OmNwCaCyL",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rvsp/2013/3184/0/3184a182",
"title": "A Stress Evaluation and Personal Relaxation System Based on Measurement of Photoplethysmography",
"doi": null,
"abstractUrl": "/proceedings-article/rvsp/2013/3184a182/12OmNxd4tnP",
"parentPublication": {
"id": "proceedings/rvsp/2013/3184/0",
"title": "2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217798",
"title": "Ultra-short-term analysis of heart rate variability for real-time acute pain monitoring with wearable electronics",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217798/12OmNz61cUn",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2018/04/07752842",
"title": "Multimodal Stress Detection from Multiple Assessments",
"doi": null,
"abstractUrl": "/journal/ta/2018/04/07752842/17D45WZZ7DZ",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percomw/2018/3227/0/08480170",
"title": "Physiological Impact of Vibro-Acoustic Therapy on Stress and Emotions through Wearable Sensors",
"doi": null,
"abstractUrl": "/proceedings-article/percomw/2018/08480170/17D45Xtvp8r",
"parentPublication": {
"id": "proceedings/percomw/2018/3227/0",
"title": "2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chase/2022/9476/0/947600a168",
"title": "Camera-based heart rate variability and stress measurement from facial videos",
"doi": null,
"abstractUrl": "/proceedings-article/chase/2022/947600a168/1JjymzwGjIY",
"parentPublication": {
"id": "proceedings/chase/2022/9476/0",
"title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aciiw/2019/3891/0/08925142",
"title": "A stress recognition system using HRV parameters and machine learning techniques",
"doi": null,
"abstractUrl": "/proceedings-article/aciiw/2019/08925142/1fHFcGek5qw",
"parentPublication": {
"id": "proceedings/aciiw/2019/3891/0",
"title": "2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKiru",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WHONop",
"doi": "10.1109/CVPRW.2018.00180",
"title": "Video Based Measurement of Heart Rate and Heart Rate Variability Spectrogram from Estimated Hemoglobin Information",
"normalizedTitle": "Video Based Measurement of Heart Rate and Heart Rate Variability Spectrogram from Estimated Hemoglobin Information",
"abstract": "In this paper, we propose an accurate remote observation of the heart rate (HR) and heart rate variability (HRV) based on extracted hemoglobin information which is based on detail skin optics model. We perform experiments to measure subjects at rest and under cognitive stress with the proposed method putting a polarized filter in front of camera to evaluate the principal of the framework. From the results of the experiments, the proposed method shows a high correlation with the electrocardiograph (ECG) which is assumed as the ground truth. We also evaluated the robustness against illumination change in simulation. We confirmed that the proposed method could obtain accurate BVP detection compared with other conventional methods since the proposed method eliminates the shading component through the process of the extraction of hemoglobin component.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we propose an accurate remote observation of the heart rate (HR) and heart rate variability (HRV) based on extracted hemoglobin information which is based on detail skin optics model. We perform experiments to measure subjects at rest and under cognitive stress with the proposed method putting a polarized filter in front of camera to evaluate the principal of the framework. From the results of the experiments, the proposed method shows a high correlation with the electrocardiograph (ECG) which is assumed as the ground truth. We also evaluated the robustness against illumination change in simulation. We confirmed that the proposed method could obtain accurate BVP detection compared with other conventional methods since the proposed method eliminates the shading component through the process of the extraction of hemoglobin component.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we propose an accurate remote observation of the heart rate (HR) and heart rate variability (HRV) based on extracted hemoglobin information which is based on detail skin optics model. We perform experiments to measure subjects at rest and under cognitive stress with the proposed method putting a polarized filter in front of camera to evaluate the principal of the framework. From the results of the experiments, the proposed method shows a high correlation with the electrocardiograph (ECG) which is assumed as the ground truth. We also evaluated the robustness against illumination change in simulation. We confirmed that the proposed method could obtain accurate BVP detection compared with other conventional methods since the proposed method eliminates the shading component through the process of the extraction of hemoglobin component.",
"fno": "610000b405",
"keywords": [
"Biomedical Optical Imaging",
"Biomedical Telemetry",
"Cameras",
"Electrocardiography",
"Feature Extraction",
"Image Sensors",
"Medical Image Processing",
"Photoplethysmography",
"Proteins",
"Skin",
"Heart Rate Variability Spectrogram",
"Hemoglobin Component",
"Video Based Measurement",
"Remote Observation",
"Hemoglobin Information",
"Skin Optics Model",
"Cognitive Stress",
"Polarized Filter",
"Camera",
"Electrocardiograph",
"Ground Truth",
"BVP Detection",
"Shading Component",
"Heart Rate Variability",
"Skin",
"Cameras",
"Stress",
"Image Color Analysis",
"Spectrogram"
],
"authors": [
{
"affiliation": null,
"fullName": "Munenori Fukunishi",
"givenName": "Munenori",
"surname": "Fukunishi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kouki Kurita",
"givenName": "Kouki",
"surname": "Kurita",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shoji Yamamoto",
"givenName": "Shoji",
"surname": "Yamamoto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Norimichi Tsumura",
"givenName": "Norimichi",
"surname": "Tsumura",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1405-14057",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-6100-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "610000b397",
"articleId": "17D45Wda7fq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "610000b413",
"articleId": "17D45WwsQ4z",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibe/2015/7983/0/07367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367627/12OmNC4wtEZ",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2016/3834/0/3834a176",
"title": "Workload Induces Changes in Hemodynamics, Respiratory Rate and Heart Rate Variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2016/3834a176/12OmNCyBXi0",
"parentPublication": {
"id": "proceedings/bibe/2016/3834/0",
"title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cic/1989/2114/0/00130482",
"title": "Spectrum of heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/cic/1989/00130482/12OmNvIfDOI",
"parentPublication": {
"id": "proceedings/cic/1989/2114/0",
"title": "Proceedings Computers in Cardiology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccae/2009/3569/0/3569a243",
"title": "A Review of Measurement and Analysis of Heart Rate Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccae/2009/3569a243/12OmNwJgAG6",
"parentPublication": {
"id": "proceedings/iccae/2009/3569/0",
"title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2013/0400/0/06572679",
"title": "Heart rate variability analysis using approximate entropy and detrended fluctuation for monitoring heart condition",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2013/06572679/12OmNyNQSBm",
"parentPublication": {
"id": "proceedings/iciev/2013/0400/0",
"title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lssa/2006/0277/0/04015809",
"title": "Multiscale analysis of heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/lssa/2006/04015809/12OmNzy7uUi",
"parentPublication": {
"id": "proceedings/lssa/2006/0277/0",
"title": "2006 IEEE/NLM Life Science Systems and Applications Workshop",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acit-csii-bcd/2017/3302/0/3302a047",
"title": "Heart Rate and Heart Rate Variability Measuring System by Using Smartphone",
"doi": null,
"abstractUrl": "/proceedings-article/acit-csii-bcd/2017/3302a047/1cdOBdiztwA",
"parentPublication": {
"id": "proceedings/acit-csii-bcd/2017/3302/0",
"title": "2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300b570",
"title": "Efficient Real-Time Camera Based Estimation of Heart Rate and Its Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300b570/1i5ml1vHCzS",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313361",
"title": "HRV-Spark: Computing Heart Rate Variability Measures Using Apache Spark",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313361/1qmfQ98KmWI",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1JjykdQLNW8",
"title": "2022 IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)",
"acronym": "chase",
"groupId": "9983536",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1JjymzwGjIY",
"doi": null,
"title": "Camera-based heart rate variability and stress measurement from facial videos",
"normalizedTitle": "Camera-based heart rate variability and stress measurement from facial videos",
"abstract": "Remote measurement of physiological signals through facial videos is an emerging and significant field of research. Through remote photoplethysmography (rPPG), RGB cameras can measure a person’s heart rate variability (HRV) by analyzing subtle light variations on the skin. Fluctuations in HRV readings are caused by imbalances in the autonomic nervous system, such as experiencing a stressful event. This paper presents a novel method for HRV measurement from rPPG signals. We tested the model on 14 subjects participating in stress-inducing tasks. We compared our results against a contact-based ground truth device and demonstrated the potential for an off-the-shelf webcam to provide robust HRV measurement and subsequent stress estimation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Remote measurement of physiological signals through facial videos is an emerging and significant field of research. Through remote photoplethysmography (rPPG), RGB cameras can measure a person’s heart rate variability (HRV) by analyzing subtle light variations on the skin. Fluctuations in HRV readings are caused by imbalances in the autonomic nervous system, such as experiencing a stressful event. This paper presents a novel method for HRV measurement from rPPG signals. We tested the model on 14 subjects participating in stress-inducing tasks. We compared our results against a contact-based ground truth device and demonstrated the potential for an off-the-shelf webcam to provide robust HRV measurement and subsequent stress estimation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Remote measurement of physiological signals through facial videos is an emerging and significant field of research. Through remote photoplethysmography (rPPG), RGB cameras can measure a person’s heart rate variability (HRV) by analyzing subtle light variations on the skin. Fluctuations in HRV readings are caused by imbalances in the autonomic nervous system, such as experiencing a stressful event. This paper presents a novel method for HRV measurement from rPPG signals. We tested the model on 14 subjects participating in stress-inducing tasks. We compared our results against a contact-based ground truth device and demonstrated the potential for an off-the-shelf webcam to provide robust HRV measurement and subsequent stress estimation.",
"fno": "947600a168",
"keywords": [
"Cameras",
"Cardiology",
"Electrocardiography",
"Image Colour Analysis",
"Image Sensors",
"Infrared Imaging",
"Medical Signal Processing",
"Neurophysiology",
"Patient Monitoring",
"Photoplethysmography",
"Skin",
"Video Signal Processing",
"Autonomic Nervous System",
"Contact Based Ground Truth Device",
"Facial Videos",
"HRV Readings",
"Person",
"Physiological Signals",
"Remote Measurement",
"Remote Photoplethysmography",
"RGB Cameras",
"Robust HRV Measurement",
"R PPG Signals",
"Stress Measurement",
"Stress Inducing Tasks",
"Stressful Event",
"Subsequent Stress Estimation",
"Subtle Light Variations",
"Atmospheric Measurements",
"Webcams",
"Particle Measurements",
"Skin",
"Heart Rate Variability",
"Task Analysis",
"Signal Analysis",
"Remote Photoplethysmography",
"SDNN",
"RMSSD",
"Baevsky Stress Index"
],
"authors": [
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Ismoil Odinaev",
"givenName": "Ismoil",
"surname": "Odinaev",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Kunnipa Prae-Arporn",
"givenName": "Kunnipa",
"surname": "Prae-Arporn",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Kwan Long Wong",
"givenName": "Kwan Long",
"surname": "Wong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Jing Wei Chin",
"givenName": "Jing",
"surname": "Wei Chin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Tsz Tai Chan",
"givenName": "Tsz Tai",
"surname": "Chan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Raghav Goyal",
"givenName": "Raghav",
"surname": "Goyal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "PanopticAI, HKUST",
"fullName": "Richard H.Y. So",
"givenName": "Richard H.Y.",
"surname": "So",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "chase",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-11-01T00:00:00",
"pubType": "proceedings",
"pages": "168-169",
"year": "2022",
"issn": null,
"isbn": "978-1-4503-9476-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "947600a166",
"articleId": "1JjyomNIU92",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "947600a170",
"articleId": "1JjylXZnag0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2010/9992/0/05711762",
"title": "Development of full-featured ECG system for visual stress induced heart rate variability (HRV) assessment",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2010/05711762/12OmNApu5BB",
"parentPublication": {
"id": "proceedings/isspit/2010/9992/0",
"title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2015/7983/0/07367627",
"title": "Continuous monitoring of stress on smartphone using heart rate variability",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367627/12OmNC4wtEZ",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccae/2009/3569/0/3569a243",
"title": "A Review of Measurement and Analysis of Heart Rate Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccae/2009/3569a243/12OmNwJgAG6",
"parentPublication": {
"id": "proceedings/iccae/2009/3569/0",
"title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsd/2018/7377/0/737700a433",
"title": "Exploring the Usage of Time-of-Flight Cameras for Contact and Remote Photoplethysmography",
"doi": null,
"abstractUrl": "/proceedings-article/dsd/2018/737700a433/14qdcRR2DlM",
"parentPublication": {
"id": "proceedings/dsd/2018/7377/0",
"title": "2018 21st Euromicro Conference on Digital System Design (DSD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000b405",
"title": "Video Based Measurement of Heart Rate and Heart Rate Variability Spectrogram from Estimated Hemoglobin Information",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000b405/17D45WHONop",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729540",
"title": "Using Heart Rate Variability for Comparing the Effectiveness of Virtual vs Real Training Environments for Firefighters",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729540/1Bya8YD1tUk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/5555/01/10023947",
"title": "Depression Recognition using Remote Photoplethysmography from Facial Videos",
"doi": null,
"abstractUrl": "/journal/ta/5555/01/10023947/1K9snGD89K8",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300b570",
"title": "Efficient Real-Time Camera Based Estimation of Heart Rate and Its Variability",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300b570/1i5ml1vHCzS",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300b385",
"title": "Remote Heart Rate and Heart Rate Variability Detection and Monitoring from Face Video with Minimum Resources",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300b385/1nkDq4aFW9i",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2021/1685/0/168500a133",
"title": "Remote Photoplethysmography Heart Rate Variability Detection Using Signal to Noise Ratio Bandpass Filtering",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2021/168500a133/1ymJiFrUTdK",
"parentPublication": {
"id": "proceedings/icdh/2021/1685/0",
"title": "2021 IEEE International Conference on Digital Health (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cI6akLvAuQ",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cJ17GWH4f6",
"doi": "10.1109/VR.2019.8797748",
"title": "Developing an Accessible Evaluation Method of VR Cybersickness",
"normalizedTitle": "Developing an Accessible Evaluation Method of VR Cybersickness",
"abstract": "Despite its growing popularity, Virtual Reality (VR) has yet to make a significant impact in conventional education due to its high cost, unconvincing learning data, complexity of the technologies and, persistently, cybersickness. To alleviate this dilemma, it is necessary to develop a straightforward and reliable measurement of cybersickness for VR application developers and mainstream educators. The Empatica E4 wearable device and its eco-system were utilized to record Heart Rate Variability (HRV) and Electrodermal Activity (EDA) during customized computer-based and VR tasks with 16 participants. The metrics of S, NNMean, SDNN, RMSSD, and Poincaré Plot in HRV data and SCR width in EDA data were found to be potential indicators of cybersickness. Further research aims to determine a specific cybersickness index.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Despite its growing popularity, Virtual Reality (VR) has yet to make a significant impact in conventional education due to its high cost, unconvincing learning data, complexity of the technologies and, persistently, cybersickness. To alleviate this dilemma, it is necessary to develop a straightforward and reliable measurement of cybersickness for VR application developers and mainstream educators. The Empatica E4 wearable device and its eco-system were utilized to record Heart Rate Variability (HRV) and Electrodermal Activity (EDA) during customized computer-based and VR tasks with 16 participants. The metrics of S, NNMean, SDNN, RMSSD, and Poincaré Plot in HRV data and SCR width in EDA data were found to be potential indicators of cybersickness. Further research aims to determine a specific cybersickness index.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Despite its growing popularity, Virtual Reality (VR) has yet to make a significant impact in conventional education due to its high cost, unconvincing learning data, complexity of the technologies and, persistently, cybersickness. To alleviate this dilemma, it is necessary to develop a straightforward and reliable measurement of cybersickness for VR application developers and mainstream educators. The Empatica E4 wearable device and its eco-system were utilized to record Heart Rate Variability (HRV) and Electrodermal Activity (EDA) during customized computer-based and VR tasks with 16 participants. The metrics of S, NNMean, SDNN, RMSSD, and Poincaré Plot in HRV data and SCR width in EDA data were found to be potential indicators of cybersickness. Further research aims to determine a specific cybersickness index.",
"fno": "08797748",
"keywords": [
"Bioelectric Potentials",
"Electrocardiography",
"Medical Signal Processing",
"Virtual Reality",
"Electrodermal Activity Recording",
"Virtual Reality Cybersickness",
"Heart Rate Variability Recording",
"Customized Computer Based Tasks",
"Eco System",
"Empatica E 4 Wearable Device",
"Learning Data",
"Accessible Evaluation Method",
"Task Analysis",
"Heart Rate Variability",
"Physiology",
"Temperature Measurement",
"Education",
"Indexes",
"Cybersickness",
"Education",
"Physiological Data",
"H 5 2 Information Interfaces And Presentation User Interfaces",
"K 3 1 Computers And Education Computer Uses In Education"
],
"authors": [
{
"affiliation": "Future University Hakodate, Japan",
"fullName": "Takurou Magaki",
"givenName": "Takurou",
"surname": "Magaki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Future University Hakodate, Japan",
"fullName": "Michael Vallance",
"givenName": "Michael",
"surname": "Vallance",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1072-1073",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-1377-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08797811",
"articleId": "1cJ0INo0Vjy",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08798122",
"articleId": "1cJ0MR4xjWg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/acii/2013/5048/0/5048a362",
"title": "Measuring Emotional Arousal for Online Applications: Evaluation of Ultra-short Term Heart Rate Variability Measures",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a362/12OmNwCaCyL",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sip/2015/9855/0/9855a021",
"title": "Actual Emotion and False Emotion Classification by Physiological Signal",
"doi": null,
"abstractUrl": "/proceedings-article/sip/2015/9855a021/12OmNwF0BUf",
"parentPublication": {
"id": "proceedings/sip/2015/9855/0",
"title": "2015 8th International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729540",
"title": "Using Heart Rate Variability for Comparing the Effectiveness of Virtual vs Real Training Environments for Firefighters",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729540/1Bya8YD1tUk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2022/5325/0/532500a777",
"title": "TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2022/532500a777/1JrR1CsIUjC",
"parentPublication": {
"id": "proceedings/ismar/2022/5325/0",
"title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/5555/01/10097567",
"title": "Group Synchrony for Emotion Recognition using Physiological Signals",
"doi": null,
"abstractUrl": "/journal/ta/5555/01/10097567/1M9ly0SDbzO",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090607",
"title": "Exploring Blink-Rate Behaviors for Cybersickness Detection in VR",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090607/1jIxAfKUpbO",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090495",
"title": "Automatic Detection of Cybersickness from Physiological Signal in a Virtual Roller Coaster Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090495/1jIximIpClq",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090494",
"title": "A Deep Learning based Framework for Detecting and Reducing onset of Cybersickness",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090494/1jIxuKp865y",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2020/8508/0/850800a400",
"title": "Automatic Detection and Prediction of Cybersickness Severity using Deep Neural Networks from user’s Physiological Signals",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2020/850800a400/1pyswQ0oYOQ",
"parentPublication": {
"id": "proceedings/ismar/2020/8508/0",
"title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icphds/2020/8571/0/857100a445",
"title": "Research on the Influence of TCM Qigong Static Exercise on HRV of College Students",
"doi": null,
"abstractUrl": "/proceedings-article/icphds/2020/857100a445/1rxhqg8XpVC",
"parentPublication": {
"id": "proceedings/icphds/2020/8571/0",
"title": "2020 International Conference on Public Health and Data Science (ICPHDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNviHKdN",
"title": "2016 IEEE Symposium on Computers and Communication (ISCC)",
"acronym": "iscc",
"groupId": "1000156",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxveNJf",
"doi": "10.1109/ISCC.2016.7543793",
"title": "Improving productivity and reducing cost through the use of visualizations for SDN management",
"normalizedTitle": "Improving productivity and reducing cost through the use of visualizations for SDN management",
"abstract": "Visualization means the use of Information Visualization (InfoVis) techniques to augment human cognitive capacity to support users tasks more efficiently. According to the current literature, visualization is a relevant requirement to support the management of Software-Defined Networking (SDN). For example, visualization can help network administrators in everyday tasks such as in the identification of traffic patterns, or in the implementation and test of new networking services. However, in most cases, network administrators are unskilled on InfoVis, which makes them naturally reluctant in the use of visualizations. Also, building up visualizations from scratch can spend a significant amount of effort, which directly impacts on the increase of cost and the decrease of administrators' productivity. Thus, in this paper, we introduce a reuse-based approach to facilitating the employment of visualizations in the SDN context with the focus on improving productivity and reduce costs. We developed a prototype to evaluate and demonstrate the feasibility of our approach. The obtained results to one of the usage scenarios show, for example, that our solution can decrease in 264 hours the administrators' workload (i.e., around U$ 9,976.56) when employing visualizations in daily tasks.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Visualization means the use of Information Visualization (InfoVis) techniques to augment human cognitive capacity to support users tasks more efficiently. According to the current literature, visualization is a relevant requirement to support the management of Software-Defined Networking (SDN). For example, visualization can help network administrators in everyday tasks such as in the identification of traffic patterns, or in the implementation and test of new networking services. However, in most cases, network administrators are unskilled on InfoVis, which makes them naturally reluctant in the use of visualizations. Also, building up visualizations from scratch can spend a significant amount of effort, which directly impacts on the increase of cost and the decrease of administrators' productivity. Thus, in this paper, we introduce a reuse-based approach to facilitating the employment of visualizations in the SDN context with the focus on improving productivity and reduce costs. We developed a prototype to evaluate and demonstrate the feasibility of our approach. The obtained results to one of the usage scenarios show, for example, that our solution can decrease in 264 hours the administrators' workload (i.e., around U$ 9,976.56) when employing visualizations in daily tasks.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Visualization means the use of Information Visualization (InfoVis) techniques to augment human cognitive capacity to support users tasks more efficiently. According to the current literature, visualization is a relevant requirement to support the management of Software-Defined Networking (SDN). For example, visualization can help network administrators in everyday tasks such as in the identification of traffic patterns, or in the implementation and test of new networking services. However, in most cases, network administrators are unskilled on InfoVis, which makes them naturally reluctant in the use of visualizations. Also, building up visualizations from scratch can spend a significant amount of effort, which directly impacts on the increase of cost and the decrease of administrators' productivity. Thus, in this paper, we introduce a reuse-based approach to facilitating the employment of visualizations in the SDN context with the focus on improving productivity and reduce costs. We developed a prototype to evaluate and demonstrate the feasibility of our approach. The obtained results to one of the usage scenarios show, for example, that our solution can decrease in 264 hours the administrators' workload (i.e., around U$ 9,976.56) when employing visualizations in daily tasks.",
"fno": "07543793",
"keywords": [
"Data Visualization",
"Visualization",
"Productivity",
"Employment",
"Network Topology",
"Context",
"Buildings"
],
"authors": [
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Vinícius Tavares Guimarães",
"givenName": "Vinícius Tavares",
"surname": "Guimarães",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad del Cauca, Popayán, Colombia",
"fullName": "Oscar Caicedo Rendon",
"givenName": "Oscar Caicedo",
"surname": "Rendon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Gléderson Lessa dos Santos",
"givenName": "Gléderson Lessa",
"surname": "dos Santos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Guilherme Rodrigues",
"givenName": "Guilherme",
"surname": "Rodrigues",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Carla Maria Dal Sasso Freitas",
"givenName": "Carla Maria Dal Sasso",
"surname": "Freitas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Liane Margarida Rockenbach Tarouco",
"givenName": "Liane Margarida Rockenbach",
"surname": "Tarouco",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre/RS, Brazil",
"fullName": "Lisandro Zambenedetti Granville",
"givenName": "Lisandro Zambenedetti",
"surname": "Granville",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iscc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-06-01T00:00:00",
"pubType": "proceedings",
"pages": "531-538",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-0679-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07543792",
"articleId": "12OmNAFFdGl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07543794",
"articleId": "12OmNznCl20",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wetice/2000/0798/0/07980043",
"title": "Should Users Inhabit Visualizations?",
"doi": null,
"abstractUrl": "/proceedings-article/wetice/2000/07980043/12OmNvSbBA2",
"parentPublication": {
"id": "proceedings/wetice/2000/0798/0",
"title": "Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2004/8779/0/87790167",
"title": "The InfoVis Toolkit",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2004/87790167/12OmNwCsdCO",
"parentPublication": {
"id": "proceedings/ieee-infovis/2004/8779/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2017/2089/0/2089a142",
"title": "Building Immersive Data Visualizations for the Web",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2017/2089a142/12OmNx6PiB6",
"parentPublication": {
"id": "proceedings/cw/2017/2089/0",
"title": "2017 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aina/2017/6029/0/07920978",
"title": "A Reuse-Based Approach to Promote the Adoption of Visualizations for Network Management Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2017/07920978/12OmNzwZ6q3",
"parentPublication": {
"id": "proceedings/aina/2017/6029/0",
"title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08019855",
"title": "Conceptual and Methodological Issues in Evaluating Multidimensional Visualizations for Decision Support",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08019855/13rRUB6Sq0E",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/06/ttg2010060943",
"title": "How Information Visualization Novices Construct Visualizations",
"doi": null,
"abstractUrl": "/journal/tg/2010/06/ttg2010060943/13rRUwInvAZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/12/06875946",
"title": "Constructing Visual Representations: Investigating the Use of Tangible Tokens",
"doi": null,
"abstractUrl": "/journal/tg/2014/12/06875946/13rRUwgQpDv",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2019/06/07976378",
"title": "Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments",
"doi": null,
"abstractUrl": "/journal/tq/2019/06/07976378/13rRUwwslu5",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/01/ttg2008010120",
"title": "Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository",
"doi": null,
"abstractUrl": "/journal/tg/2008/01/ttg2008010120/13rRUxjQyho",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08017606",
"title": "Active Reading of Visualizations",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08017606/13rRUyYSWl5",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCbU3aF",
"title": "2000 IEEE Conference on Information Visualization. An International Conference on Computer Visualization and Graphics",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNym2c3m",
"doi": "10.1109/IV.2000.859731",
"title": "BibRelEx: Exploring Bibliographic Databases by Visualization of Annotated Contents-Based Relations",
"normalizedTitle": "BibRelEx: Exploring Bibliographic Databases by Visualization of Annotated Contents-Based Relations",
"abstract": "Traditional searching and browsing functions for bibliographic databases no longer enable researchers to deal efficiently with the rapidly growing number of scientific publications. Our project BibRelEx aggregates expert knowledge on a body of scientific literature and makes it available to researchers who wish to explore the literature. We take a two-pronged approach: First, we collect expert annotations on publications and their semantic relationships to other publications. Second, we let researchers explore this semantically enriched body of literature and knowledge through visualizations. Hence, we enable researchers to track relevant documents based on their colleagues' expertise. We are testing our approach with a bibliographic database in a computational geometry.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Traditional searching and browsing functions for bibliographic databases no longer enable researchers to deal efficiently with the rapidly growing number of scientific publications. Our project BibRelEx aggregates expert knowledge on a body of scientific literature and makes it available to researchers who wish to explore the literature. We take a two-pronged approach: First, we collect expert annotations on publications and their semantic relationships to other publications. Second, we let researchers explore this semantically enriched body of literature and knowledge through visualizations. Hence, we enable researchers to track relevant documents based on their colleagues' expertise. We are testing our approach with a bibliographic database in a computational geometry.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Traditional searching and browsing functions for bibliographic databases no longer enable researchers to deal efficiently with the rapidly growing number of scientific publications. Our project BibRelEx aggregates expert knowledge on a body of scientific literature and makes it available to researchers who wish to explore the literature. We take a two-pronged approach: First, we collect expert annotations on publications and their semantic relationships to other publications. Second, we let researchers explore this semantically enriched body of literature and knowledge through visualizations. Hence, we enable researchers to track relevant documents based on their colleagues' expertise. We are testing our approach with a bibliographic database in a computational geometry.",
"fno": "07430019",
"keywords": [
"Bibliographic Database",
"Citation",
"Annotation",
"Information System",
"Information Retrieval",
"Expert Knowledge",
"Navigation",
"Visualization"
],
"authors": [
{
"affiliation": "Technische Universit?t M?nchen",
"fullName": "Anne Brüggemann-Klein",
"givenName": "Anne",
"surname": "Brüggemann-Klein",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fernuniversit?t Hagen",
"fullName": "Rolf Klein",
"givenName": "Rolf",
"surname": "Klein",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fernuniversit?t Hagen",
"fullName": "Britta Landgraf",
"givenName": "Britta",
"surname": "Landgraf",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-07-01T00:00:00",
"pubType": "proceedings",
"pages": "19",
"year": "2000",
"issn": "1093-9547",
"isbn": "0-7695-0743-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07430013",
"articleId": "12OmNxjjElw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07430025",
"articleId": "12OmNy3RRF7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKiry",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"acronym": "acpr",
"groupId": "1800942",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WgziOP",
"doi": "10.1109/ACPR.2017.120",
"title": "Image Inpainting: A Contextual Consistent and Deep Generative Adversarial Training Approach",
"normalizedTitle": "Image Inpainting: A Contextual Consistent and Deep Generative Adversarial Training Approach",
"abstract": "Context encoder with loss function based on generative adversarial networks (GAN) have been shown superior in image inpainting. However, when using the adversarial loss alone, the texture of the original image and the recovered regions is occasionally inconsistent. In order to solve this problem, this paper introduces a new constraint called contextual consistent loss and proposes a novel algorithm which uses the contextual information combining with adversarial nets to generate texture seamless inpainting. In the proposed algorithm, contextual consistency is enhanced by enforcing the texture of a recovered part similar to those of some part of the existing image when generating the missing parts. Experimental results on Paris Street View Dataset show that the combination of context encoder and contextual information could recover more texture-consistent and more high-quality regions, which demonstrates the advantage of the proposed algorithm.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Context encoder with loss function based on generative adversarial networks (GAN) have been shown superior in image inpainting. However, when using the adversarial loss alone, the texture of the original image and the recovered regions is occasionally inconsistent. In order to solve this problem, this paper introduces a new constraint called contextual consistent loss and proposes a novel algorithm which uses the contextual information combining with adversarial nets to generate texture seamless inpainting. In the proposed algorithm, contextual consistency is enhanced by enforcing the texture of a recovered part similar to those of some part of the existing image when generating the missing parts. Experimental results on Paris Street View Dataset show that the combination of context encoder and contextual information could recover more texture-consistent and more high-quality regions, which demonstrates the advantage of the proposed algorithm.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Context encoder with loss function based on generative adversarial networks (GAN) have been shown superior in image inpainting. However, when using the adversarial loss alone, the texture of the original image and the recovered regions is occasionally inconsistent. In order to solve this problem, this paper introduces a new constraint called contextual consistent loss and proposes a novel algorithm which uses the contextual information combining with adversarial nets to generate texture seamless inpainting. In the proposed algorithm, contextual consistency is enhanced by enforcing the texture of a recovered part similar to those of some part of the existing image when generating the missing parts. Experimental results on Paris Street View Dataset show that the combination of context encoder and contextual information could recover more texture-consistent and more high-quality regions, which demonstrates the advantage of the proposed algorithm.",
"fno": "3354a588",
"keywords": [
"Feature Extraction",
"Image Coding",
"Image Restoration",
"Image Texture",
"Learning Artificial Intelligence",
"Context Encoder",
"Contextual Information",
"Image Inpainting",
"Deep Generative Adversarial Training Approach",
"Loss Function",
"Generative Adversarial Networks",
"Adversarial Loss",
"Recovered Regions",
"Contextual Consistent Loss",
"Adversarial Nets",
"Texture Seamless Inpainting",
"Contextual Consistency",
"Generators",
"Context Modeling",
"Training",
"Gallium Nitride",
"Convolution",
"Mathematical Model",
"Generative Adversarial Networks",
"Image Inpainting",
"Context Encoder",
"Generative Adversarial Networks",
"Contextual Consistency"
],
"authors": [
{
"affiliation": null,
"fullName": "Xiaoyi Qin",
"givenName": "Xiaoyi",
"surname": "Qin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Weifu Chen",
"givenName": "Weifu",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qi Shen",
"givenName": "Qi",
"surname": "Shen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianmin Jiang",
"givenName": "Jianmin",
"surname": "Jiang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Guocan Feng",
"givenName": "Guocan",
"surname": "Feng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "acpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-11-01T00:00:00",
"pubType": "proceedings",
"pages": "588-593",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-3354-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3354a583",
"articleId": "17D45WXIkBZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3354a594",
"articleId": "17D45WaTkeq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tg/5555/01/09729564",
"title": "Aggregated Contextual Transformations for High-Resolution Image Inpainting",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729564/1Bya8xf11Oo",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a683",
"title": "MSMC-Net: Image Inpainting using Deep Multi-scale and Multi-connection Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a683/1cJ0EtUu14k",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2019/4765/0/476500a203",
"title": "Joint Inpainting of RGB and Depth Images by Generative Adversarial Network with a Late Fusion Approach",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a203/1gysn7LMTfO",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2019/4765/0",
"title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300g707",
"title": "CIIDefence: Defeating Adversarial Attacks by Fusing Class-Specific Image Inpainting and Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300g707/1hQqowRvhXq",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300k0520",
"title": "Boundless: Generative Adversarial Networks for Image Extension",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102761",
"title": "Attentive Generative Adversarial Network To Bridge Multi-Domain Gap For Image Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102761/1kwqZNZxOuc",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102794",
"title": "Eigan: Enhanced Inpainting Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2020/8138/0/813800a137",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI",
"parentPublication": {
"id": "proceedings/iccst/2020/8138/0",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a276",
"title": "Semantic image inpainting based on Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1AH82uivdwA",
"title": "2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)",
"acronym": "icbase",
"groupId": "1841125",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1AH8lBRSKFq",
"doi": "10.1109/ICBASE53849.2021.00108",
"title": "BIIR: Blind Inpainting based Image Reconstructon for Texture Defect Detection",
"normalizedTitle": "BIIR: Blind Inpainting based Image Reconstructon for Texture Defect Detection",
"abstract": "Image reconstruction is an important method for texture defect detection, and the existing image reconstruction algorithms based on Autoencoder and GAN cannot suppress the reconstruction of defect information, which affects the detection accuracy. To solve this problem, this paper proposes a novel image reconstruction algorithm based on image inpainting, which includes two modules of defect estimation network and defect inpainting network. Firstly, the defect estimation network used the pre-training model to extract the deep features of the defect image and applied the Gaussian distance to estimate the background area. and then the image inpainting network applied the contextual attention mechanism to repair the non-background area of the defect image. Through the experimental analysis which compared with other state-of-the-art image reconstruction algorithms on the public Mvtec texture dataset, the superiority of the proposed algorithm is effectively verified.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Image reconstruction is an important method for texture defect detection, and the existing image reconstruction algorithms based on Autoencoder and GAN cannot suppress the reconstruction of defect information, which affects the detection accuracy. To solve this problem, this paper proposes a novel image reconstruction algorithm based on image inpainting, which includes two modules of defect estimation network and defect inpainting network. Firstly, the defect estimation network used the pre-training model to extract the deep features of the defect image and applied the Gaussian distance to estimate the background area. and then the image inpainting network applied the contextual attention mechanism to repair the non-background area of the defect image. Through the experimental analysis which compared with other state-of-the-art image reconstruction algorithms on the public Mvtec texture dataset, the superiority of the proposed algorithm is effectively verified.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Image reconstruction is an important method for texture defect detection, and the existing image reconstruction algorithms based on Autoencoder and GAN cannot suppress the reconstruction of defect information, which affects the detection accuracy. To solve this problem, this paper proposes a novel image reconstruction algorithm based on image inpainting, which includes two modules of defect estimation network and defect inpainting network. Firstly, the defect estimation network used the pre-training model to extract the deep features of the defect image and applied the Gaussian distance to estimate the background area. and then the image inpainting network applied the contextual attention mechanism to repair the non-background area of the defect image. Through the experimental analysis which compared with other state-of-the-art image reconstruction algorithms on the public Mvtec texture dataset, the superiority of the proposed algorithm is effectively verified.",
"fno": "270900a552",
"keywords": [
"Estimation Theory",
"Feature Extraction",
"Image Coding",
"Image Reconstruction",
"Image Restoration",
"Image Texture",
"Neural Nets",
"Texture Defect Detection",
"Defect Estimation Network",
"Defect Inpainting Network",
"Image Inpainting Network",
"Public Mvtec Texture Dataset",
"BIIR",
"Blind Inpainting Based Image Reconstructon Algorithms",
"Autoencoder",
"GAN",
"Gaussian Distance",
"Contextual Attention Mechanism",
"Software Algorithms",
"Estimation",
"Maintenance Engineering",
"Feature Extraction",
"Generative Adversarial Networks",
"Image Reconstruction",
"Software Engineering",
"Defect Detection",
"Image Inpainting",
"Contextual Attention Mechanism"
],
"authors": [
{
"affiliation": "Huazhong University of Science and Technology,School of Mechanical Science and Engineering,Wuhan,China",
"fullName": "Yuanhong Qiu",
"givenName": "Yuanhong",
"surname": "Qiu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huazhong University of Science and Technology,School of Mechanical Science and Engineering,Wuhan,China",
"fullName": "Cong Zhou",
"givenName": "Cong",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huazhong University of Science and Technology,School of Mechanical Science and Engineering,Wuhan,China",
"fullName": "Zefeng Zhang",
"givenName": "Zefeng",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huazhong University of Science and Technology,School of Mechanical Science and Engineering,Wuhan,China",
"fullName": "Bin Li",
"givenName": "Bin",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icbase",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-09-01T00:00:00",
"pubType": "proceedings",
"pages": "552-555",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2709-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "270900a547",
"articleId": "1AH88PvLy5G",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "270900a556",
"articleId": "1AH8nwbup8I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ism/2005/2489/0/24890403",
"title": "Photo Defect Detection for Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2005/24890403/12OmNBhpS1O",
"parentPublication": {
"id": "proceedings/ism/2005/2489/0",
"title": "Seventh IEEE International Symposium on Multimedia (ISM'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mmit/2008/3556/0/3556a272",
"title": "TV-Based Texture Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/mmit/2008/3556a272/12OmNy3RRMP",
"parentPublication": {
"id": "proceedings/mmit/2008/3556/0",
"title": "MultiMedia and Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200o4114",
"title": "Image Inpainting via Conditional Texture and Structure Dual Generation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4114/1BmI66FDsHe",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200o4094",
"title": "WaveFill: A Wavelet-based Generation Network for Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4094/1BmKV8lWWT6",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600l1411",
"title": "Dual-path Image Inpainting with Auxiliary GAN Inversion",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600l1411/1H0LiHfmVOw",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd-summer/2022/9637/0/963700a113",
"title": "Edge-enhanced GAN with Vanishing Points for Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/snpd-summer/2022/963700a113/1La4V6ZpLjy",
"parentPublication": {
"id": "proceedings/snpd-summer/2022/9637/0",
"title": "2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300g707",
"title": "CIIDefence: Defeating Adversarial Attacks by Fusing Class-Specific Image Inpainting and Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300g707/1hQqowRvhXq",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800n3693",
"title": "Prior Guided GAN Based Semantic Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800n3693/1m3nFJ7dqa4",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a276",
"title": "Semantic image inpainting based on Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1GNtgmAqRB6",
"title": "2022 4th International Conference on Natural Language Processing (ICNLP)",
"acronym": "icnlp",
"groupId": "1843064",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1GNtpLkDiV2",
"doi": "10.1109/ICNLP55136.2022.00022",
"title": "Face Inpainting Algorithm Combining Face Sketch and Gate Convolution",
"normalizedTitle": "Face Inpainting Algorithm Combining Face Sketch and Gate Convolution",
"abstract": "Video surveillance contains a lot of facial occlusion, which brings great difficulties to the detection of criminal investigation cases. Current face inpainting algorithms are difficult to meet the uniqueness requirements of face comparison, due to the lack of a priori information within the occluded area. Face sketch drawn by experienced simulated portrait artist according to low-quality video or description of the victim contains lots of useful information. There, this paper proposes a face inpainting algorithm combining face sketch and gate convolution. First, the face sketch, used as guided information, integrates into the occluded face image to complete the missing area. Then, a generative adversarial networks (GAN) with gate convolution is designed for model training, which effectively suppresses the interference of the occlusion area to the inpainting process. The experimental results show that the proposed algorithm obtain the better inpainting results and larger SSIM compared with the other algorithm. The proposed obtain better comprehensive performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Video surveillance contains a lot of facial occlusion, which brings great difficulties to the detection of criminal investigation cases. Current face inpainting algorithms are difficult to meet the uniqueness requirements of face comparison, due to the lack of a priori information within the occluded area. Face sketch drawn by experienced simulated portrait artist according to low-quality video or description of the victim contains lots of useful information. There, this paper proposes a face inpainting algorithm combining face sketch and gate convolution. First, the face sketch, used as guided information, integrates into the occluded face image to complete the missing area. Then, a generative adversarial networks (GAN) with gate convolution is designed for model training, which effectively suppresses the interference of the occlusion area to the inpainting process. The experimental results show that the proposed algorithm obtain the better inpainting results and larger SSIM compared with the other algorithm. The proposed obtain better comprehensive performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Video surveillance contains a lot of facial occlusion, which brings great difficulties to the detection of criminal investigation cases. Current face inpainting algorithms are difficult to meet the uniqueness requirements of face comparison, due to the lack of a priori information within the occluded area. Face sketch drawn by experienced simulated portrait artist according to low-quality video or description of the victim contains lots of useful information. There, this paper proposes a face inpainting algorithm combining face sketch and gate convolution. First, the face sketch, used as guided information, integrates into the occluded face image to complete the missing area. Then, a generative adversarial networks (GAN) with gate convolution is designed for model training, which effectively suppresses the interference of the occlusion area to the inpainting process. The experimental results show that the proposed algorithm obtain the better inpainting results and larger SSIM compared with the other algorithm. The proposed obtain better comprehensive performance.",
"fno": "954400a081",
"keywords": [
"Face Recognition",
"Feature Extraction",
"Image Restoration",
"Video Surveillance",
"Face Inpainting Algorithm Combining Face Sketch",
"Gate Convolution",
"Current Face Inpainting Algorithms",
"Face Comparison",
"Occluded Face Image",
"Training",
"Convolution",
"Shape",
"Heuristic Algorithms",
"Logic Gates",
"Generative Adversarial Networks",
"Video Surveillance",
"Face Inpainting",
"Face Sketch",
"Generative Adversarial Network",
"Deep Learning",
"Gate Convolution"
],
"authors": [
{
"affiliation": "Xi’an University of Posts and Telecommunications,Center for Image and Information Processing,Xi’an,Shaanxi,China,710121",
"fullName": "Fuping Wang",
"givenName": "Fuping",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Xi’an University of Posts and Telecommunications,Center for Image and Information Processing,Xi’an,Shaanxi,China,710121",
"fullName": "Yang Hu",
"givenName": "Yang",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Xi’an University of Posts and Telecommunications,Center for Image and Information Processing,Xi’an,Shaanxi,China,710121",
"fullName": "Weihua Liu",
"givenName": "Weihua",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Xi’an University of Posts and Telecommunications,Center for Image and Information Processing,Xi’an,Shaanxi,China,710121",
"fullName": "Ying Liu",
"givenName": "Ying",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icnlp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-03-01T00:00:00",
"pubType": "proceedings",
"pages": "81-86",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9544-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "954400a074",
"articleId": "1GNtwFhLStG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "954400a087",
"articleId": "1GNtrCXCq2s",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wacv/2022/0915/0/091500d162",
"title": "S2FGAN: Semantically Aware Interactive Sketch-to-Face Translation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2022/091500d162/1B13Dk5W8aQ",
"parentPublication": {
"id": "proceedings/wacv/2022/0915/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729564",
"title": "Aggregated Contextual Transformations for High-Resolution Image Inpainting",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729564/1Bya8xf11Oo",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956126",
"title": "Deep face generation from a rough sketch using multi-level generative adversarial networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956126/1IHoDYoZqnK",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2022/9744/0/974400a923",
"title": "Image Inpainting with Context Flow Network",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2022/974400a923/1MrFXR3HdXa",
"parentPublication": {
"id": "proceedings/ictai/2022/9744/0",
"title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102794",
"title": "Eigan: Enhanced Inpainting Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412917",
"title": "Siamese Graph Convolution Network for Face Sketch Recognition: An application using Graph structure for face photo-sketch recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412917/1tmjHxsSvKM",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428348",
"title": "High-Quality Face Sketch Synthesis via Geometric Normalization and Regularization",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428348/1uim6wBM1Mc",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnlp/2021/1411/0/141100a213",
"title": "Face Inpainting Combining Structured Forest Edge Information and Gated Convolution",
"doi": null,
"abstractUrl": "/proceedings-article/icnlp/2021/141100a213/1wYlkVBWSu4",
"parentPublication": {
"id": "proceedings/icnlp/2021/1411/0",
"title": "2021 3rd International Conference on Natural Language Processing (ICNLP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nicoint/2021/3954/0/395400a007",
"title": "Sketch-based Anime Hairstyle Editing with Generative Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/nicoint/2021/395400a007/1wnPu0lkCvS",
"parentPublication": {
"id": "proceedings/nicoint/2021/3954/0",
"title": "2021 Nicograph International (NicoInt)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H0L6YfOPhS",
"doi": "10.1109/CVPR52688.2022.01117",
"title": "RePaint: Inpainting using Denoising Diffusion Probabilistic Models",
"normalizedTitle": "RePaint: Inpainting using Denoising Diffusion Probabilistic Models",
"abstract": "Free-form inpainting is the task of adding new content to an image in the regions specified by an arbitrary binary mask. Most existing approaches train for a certain distribution of masks, which limits their generalization capabilities to unseen mask types. Furthermore, training with pixel-wise and perceptual losses often leads to simple textural extensions towards the missing areas instead of semantically meaningful generation. In this work, we propose RePaint: A Denoising Diffusion Probabilistic Model (DDPM) based inpainting approach that is applicable to even extreme masks. We employ a pretrained unconditional DDPM as the generative prior. To condition the generation process, we only alter the reverse diffusion iterations by sampling the unmasked regions using the given image infor-mation. Since this technique does not modify or condition the original DDPM network itself, the model produces high-quality and diverse output images for any inpainting form. We validate our method for both faces and general-purpose image inpainting using standard and extreme masks. Re-Paint outperforms state-of-the-art Autoregressive, and GAN approaches for at least five out of six mask distributions. Github Repository: git.io/RePaint",
"abstracts": [
{
"abstractType": "Regular",
"content": "Free-form inpainting is the task of adding new content to an image in the regions specified by an arbitrary binary mask. Most existing approaches train for a certain distribution of masks, which limits their generalization capabilities to unseen mask types. Furthermore, training with pixel-wise and perceptual losses often leads to simple textural extensions towards the missing areas instead of semantically meaningful generation. In this work, we propose RePaint: A Denoising Diffusion Probabilistic Model (DDPM) based inpainting approach that is applicable to even extreme masks. We employ a pretrained unconditional DDPM as the generative prior. To condition the generation process, we only alter the reverse diffusion iterations by sampling the unmasked regions using the given image infor-mation. Since this technique does not modify or condition the original DDPM network itself, the model produces high-quality and diverse output images for any inpainting form. We validate our method for both faces and general-purpose image inpainting using standard and extreme masks. Re-Paint outperforms state-of-the-art Autoregressive, and GAN approaches for at least five out of six mask distributions. Github Repository: git.io/RePaint",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Free-form inpainting is the task of adding new content to an image in the regions specified by an arbitrary binary mask. Most existing approaches train for a certain distribution of masks, which limits their generalization capabilities to unseen mask types. Furthermore, training with pixel-wise and perceptual losses often leads to simple textural extensions towards the missing areas instead of semantically meaningful generation. In this work, we propose RePaint: A Denoising Diffusion Probabilistic Model (DDPM) based inpainting approach that is applicable to even extreme masks. We employ a pretrained unconditional DDPM as the generative prior. To condition the generation process, we only alter the reverse diffusion iterations by sampling the unmasked regions using the given image infor-mation. Since this technique does not modify or condition the original DDPM network itself, the model produces high-quality and diverse output images for any inpainting form. We validate our method for both faces and general-purpose image inpainting using standard and extreme masks. Re-Paint outperforms state-of-the-art Autoregressive, and GAN approaches for at least five out of six mask distributions. Github Repository: git.io/RePaint",
"fno": "694600l1451",
"keywords": [
"Image Colour Analysis",
"Image Denoising",
"Image Processing",
"Image Representation",
"Image Restoration",
"Image Texture",
"Learning Artificial Intelligence",
"Probability",
"Inpainting Approach",
"Extreme Masks",
"Pretrained Unconditional DDPM",
"Generation Process",
"Reverse Diffusion Iterations",
"Unmasked Regions",
"Given Image Infor Mation",
"Original DDPM Network",
"Diverse Output Images",
"Inpainting Form",
"General Purpose Image",
"Re Paint",
"GAN Approaches",
"Mask Distributions",
"Diffusion Probabilistic Models",
"Free Form Inpainting",
"Arbitrary Binary Mask",
"Existing Approaches Train",
"Generalization Capabilities",
"Unseen Mask Types",
"Pixel Wise",
"Perceptual Losses",
"Simple Textural Extensions",
"Missing Areas",
"Semantically Meaningful Generation",
"Denoising Diffusion Probabilistic Model",
"Training",
"Computer Vision",
"Noise Reduction",
"Probabilistic Logic",
"Generative Adversarial Networks",
"Pattern Recognition",
"Task Analysis"
],
"authors": [
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Andreas Lugmayr",
"givenName": "Andreas",
"surname": "Lugmayr",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Martin Danelljan",
"givenName": "Martin",
"surname": "Danelljan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Andres Romero",
"givenName": "Andres",
"surname": "Romero",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Fisher Yu",
"givenName": "Fisher",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Radu Timofte",
"givenName": "Radu",
"surname": "Timofte",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ETH Zürich,Computer Vision Lab,Switzerland",
"fullName": "Luc Van Gool",
"givenName": "Luc",
"surname": "Van Gool",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "11451-11461",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1H0L6U4nsoU",
"name": "pcvpr202269460-09880056s1-mm_694600l1451.zip",
"size": "19 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09880056s1-mm_694600l1451.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "694600l1441",
"articleId": "1H0NFzPNVgQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600l1462",
"articleId": "1H0NngAxbTa",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200o4347",
"title": "ILVR: Conditioning Method for Denoising Diffusion Probabilistic Models",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4347/1BmG102zNRu",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwecai/2022/7997/0/799700a281",
"title": "Mask Removal Algorithm Using GAN Based Models",
"doi": null,
"abstractUrl": "/proceedings-article/iwecai/2022/799700a281/1CugwO4Xbfa",
"parentPublication": {
"id": "proceedings/iwecai/2022/7997/0",
"title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900b149",
"title": "NTIRE 2022 Image Inpainting Challenge: Report",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900b149/1G56NyHIuWI",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900a977",
"title": "Image Multi-Inpainting via Progressive Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900a977/1G56VVqeIco",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900b300",
"title": "GLaMa: Joint Spatial and Frequency Loss for General Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900b300/1G56q5kBPtS",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2023/4544/0/10042661",
"title": "T2V-DDPM: Thermal to Visible Face Translation using Denoising Diffusion Probabilistic Models",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2023/10042661/1KOuWmvl1F6",
"parentPublication": {
"id": "proceedings/fg/2023/4544/0",
"title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600d423",
"title": "AT-DDPM: Restoring Faces Degraded by Atmospheric Turbulence Using Denoising Diffusion Probabilistic Models",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600d423/1L8quOJluFO",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cyberc/2022/3154/0/315400a198",
"title": "Ultra-low Dose CT Image Denoising based on Conditional Denoising Diffusion Probabilistic model",
"doi": null,
"abstractUrl": "/proceedings-article/cyberc/2022/315400a198/1M66iBtNtqo",
"parentPublication": {
"id": "proceedings/cyberc/2022/3154/0",
"title": "2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300g707",
"title": "CIIDefence: Defeating Adversarial Attacks by Fusing Class-Specific Image Inpainting and Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300g707/1hQqowRvhXq",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2020/8138/0/813800a137",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI",
"parentPublication": {
"id": "proceedings/iccst/2020/8138/0",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H0LiHfmVOw",
"doi": "10.1109/CVPR52688.2022.01113",
"title": "Dual-path Image Inpainting with Auxiliary GAN Inversion",
"normalizedTitle": "Dual-path Image Inpainting with Auxiliary GAN Inversion",
"abstract": "Deep image inpainting can inpaint a corrupted image using a feed-forward inference, but still fails to handle large missing area or complex semantics. Recently, GAN inversion based inpainting methods propose to leverage semantic information in pretrained generator (e.g., StyleGAN) to solve the above issues. Different from feed-forward methods, they seek for a closest latent code to the corrupted image and feed it to a pretrained generator. However, inferring the latent code is either time-consuming or inaccurate. In this paper, we develop a dual-path inpainting network with inversion path and feed-forward path, in which inversion path provides auxiliary information to help feed-forward path. We also design a novel deformable fusion module to align the feature maps in two paths. Experiments on FFHQ and LSUN demonstrate that our method is effective in solving the aforementioned problems while producing more realistic results than state-of-the-art methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Deep image inpainting can inpaint a corrupted image using a feed-forward inference, but still fails to handle large missing area or complex semantics. Recently, GAN inversion based inpainting methods propose to leverage semantic information in pretrained generator (e.g., StyleGAN) to solve the above issues. Different from feed-forward methods, they seek for a closest latent code to the corrupted image and feed it to a pretrained generator. However, inferring the latent code is either time-consuming or inaccurate. In this paper, we develop a dual-path inpainting network with inversion path and feed-forward path, in which inversion path provides auxiliary information to help feed-forward path. We also design a novel deformable fusion module to align the feature maps in two paths. Experiments on FFHQ and LSUN demonstrate that our method is effective in solving the aforementioned problems while producing more realistic results than state-of-the-art methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Deep image inpainting can inpaint a corrupted image using a feed-forward inference, but still fails to handle large missing area or complex semantics. Recently, GAN inversion based inpainting methods propose to leverage semantic information in pretrained generator (e.g., StyleGAN) to solve the above issues. Different from feed-forward methods, they seek for a closest latent code to the corrupted image and feed it to a pretrained generator. However, inferring the latent code is either time-consuming or inaccurate. In this paper, we develop a dual-path inpainting network with inversion path and feed-forward path, in which inversion path provides auxiliary information to help feed-forward path. We also design a novel deformable fusion module to align the feature maps in two paths. Experiments on FFHQ and LSUN demonstrate that our method is effective in solving the aforementioned problems while producing more realistic results than state-of-the-art methods.",
"fno": "694600l1411",
"keywords": [
"Computer Vision",
"Feedforward",
"Image Restoration",
"Image Texture",
"Neural Nets",
"Dual Path Image Inpainting",
"Auxiliary GAN Inversion",
"Deep Image Inpainting",
"Corrupted Image",
"Feed Forward Inference",
"Complex Semantics",
"Semantic Information",
"Pretrained Generator",
"Closest Latent Code",
"Dual Path Inpainting Network",
"Inversion Path",
"Auxiliary Information",
"Style GAN",
"Feed Forward Path",
"Deformable Fusion Module",
"Feature Maps",
"FFHQ",
"LSUN",
"Computer Vision",
"Codes",
"Semantics",
"Generative Adversarial Networks",
"Generators",
"Pattern Recognition",
"Feeds"
],
"authors": [
{
"affiliation": "MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University,Department of Computer Science and Engineering",
"fullName": "Wentao Wang",
"givenName": "Wentao",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University,Department of Computer Science and Engineering",
"fullName": "Li Niu",
"givenName": "Li",
"surname": "Niu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tensor Learning Team, RIKEN AIP",
"fullName": "Jianfu Zhang",
"givenName": "Jianfu",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University,Department of Computer Science and Engineering",
"fullName": "Xue Yang",
"givenName": "Xue",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "MoE Key Lab of Artificial Intelligence, Shanghai Jiao Tong University,Department of Computer Science and Engineering",
"fullName": "Liqing Zhang",
"givenName": "Liqing",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "11411-11420",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1H0LiBgWp4k",
"name": "pcvpr202269460-09878940s1-mm_694600l1411.zip",
"size": "12 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09878940s1-mm_694600l1411.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "694600l1400",
"articleId": "1H0OC3tUKcM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600l1421",
"articleId": "1H0NG0rgY7K",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200o4144",
"title": "CR-Fill: Generative Image Inpainting with Auxiliary Contextual Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4144/1BmKzxGOJeU",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/03/09792208",
"title": "GAN Inversion: A Survey",
"doi": null,
"abstractUrl": "/journal/tp/2023/03/09792208/1E5LCU0gJAk",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600l1421",
"title": "InOut: Diverse Image Outpainting via GAN Inversion",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600l1421/1H0NG0rgY7K",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a683",
"title": "MSMC-Net: Image Inpainting using Deep Multi-scale and Multi-connection Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a683/1cJ0EtUu14k",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102794",
"title": "Eigan: Enhanced Inpainting Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800n3693",
"title": "Prior Guided GAN Based Semantic Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800n3693/1m3nFJ7dqa4",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2020/8138/0/813800a137",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI",
"parentPublication": {
"id": "proceedings/iccst/2020/8138/0",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a276",
"title": "Semantic image inpainting based on Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2021/0191/0/019100d508",
"title": "Multiple GAN Inversion for Exemplar-based Image-to-Image Translation",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2021/019100d508/1yNiEgxUAcU",
"parentPublication": {
"id": "proceedings/iccvw/2021/0191/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1MrFLC1Kdb2",
"title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)",
"acronym": "ictai",
"groupId": "10097829",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1MrFXR3HdXa",
"doi": "10.1109/ICTAI56018.2022.00141",
"title": "Image Inpainting with Context Flow Network",
"normalizedTitle": "Image Inpainting with Context Flow Network",
"abstract": "Image inpainting using deep and complicated convolutional neural networks(CNN) has recently produced outstanding results. Several researchers have considered employing large receptive fields and deep networks for long-distance information transfer to obtain semantically coherent inpainting results. As a side effect, these strategies would lead to the loss of detail and other artifacts. Motivated by the attention mechanism and sequence-to-sequence model, a novel convolution structure called context flow module is introduced into a coarse-to-fine two stages network, extracting information from distant regions without extra network layers or details loss. The context flow module in the refinement network can effectively gather both spatial and contextual data in the distance, and flow information to the next layer patch by patch. The coarse and refinement networks' backbones are encoder-decoder architecture stacked with gated and dilated convolutions. The refinement network encloses two extra elements: the context flow module and a feature-sharing space. The coarse network generates semantically consistent images with no gaps. The refinement network enhances the sharpness and enriches the details of the initial results. Moreover, a patch-based GAN is applied to stabilize training and generate semantically reasonable results. Experimental results show that our method excels at the performance of the state-of-the-art methods on faces(CelebA), buildings(Paris Street View), and natural images(Places2) datasets. The proposed context flow module can be easily integrated with any existing networks to improve their inpainting performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Image inpainting using deep and complicated convolutional neural networks(CNN) has recently produced outstanding results. Several researchers have considered employing large receptive fields and deep networks for long-distance information transfer to obtain semantically coherent inpainting results. As a side effect, these strategies would lead to the loss of detail and other artifacts. Motivated by the attention mechanism and sequence-to-sequence model, a novel convolution structure called context flow module is introduced into a coarse-to-fine two stages network, extracting information from distant regions without extra network layers or details loss. The context flow module in the refinement network can effectively gather both spatial and contextual data in the distance, and flow information to the next layer patch by patch. The coarse and refinement networks' backbones are encoder-decoder architecture stacked with gated and dilated convolutions. The refinement network encloses two extra elements: the context flow module and a feature-sharing space. The coarse network generates semantically consistent images with no gaps. The refinement network enhances the sharpness and enriches the details of the initial results. Moreover, a patch-based GAN is applied to stabilize training and generate semantically reasonable results. Experimental results show that our method excels at the performance of the state-of-the-art methods on faces(CelebA), buildings(Paris Street View), and natural images(Places2) datasets. The proposed context flow module can be easily integrated with any existing networks to improve their inpainting performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Image inpainting using deep and complicated convolutional neural networks(CNN) has recently produced outstanding results. Several researchers have considered employing large receptive fields and deep networks for long-distance information transfer to obtain semantically coherent inpainting results. As a side effect, these strategies would lead to the loss of detail and other artifacts. Motivated by the attention mechanism and sequence-to-sequence model, a novel convolution structure called context flow module is introduced into a coarse-to-fine two stages network, extracting information from distant regions without extra network layers or details loss. The context flow module in the refinement network can effectively gather both spatial and contextual data in the distance, and flow information to the next layer patch by patch. The coarse and refinement networks' backbones are encoder-decoder architecture stacked with gated and dilated convolutions. The refinement network encloses two extra elements: the context flow module and a feature-sharing space. The coarse network generates semantically consistent images with no gaps. The refinement network enhances the sharpness and enriches the details of the initial results. Moreover, a patch-based GAN is applied to stabilize training and generate semantically reasonable results. Experimental results show that our method excels at the performance of the state-of-the-art methods on faces(CelebA), buildings(Paris Street View), and natural images(Places2) datasets. The proposed context flow module can be easily integrated with any existing networks to improve their inpainting performance.",
"fno": "974400a923",
"keywords": [
"Convolutional Neural Nets",
"Feature Extraction",
"Image Restoration",
"Learning Artificial Intelligence",
"Coarse Network",
"Coarse To Fine Two Stages Network",
"Context Flow Module",
"Context Flow Network",
"Extra Network Layers",
"Flow Information",
"Image Inpainting",
"Long Distance Information Transfer",
"Outstanding Results",
"Refinement Network",
"Semantically Coherent Inpainting Results",
"Semantically Reasonable Results",
"Sequence To Sequence Model",
"Training",
"Convolution",
"Shape",
"Semantics",
"Memory Management",
"Generative Adversarial Networks",
"Feature Extraction",
"Image Inpainting",
"Attention Mechanism",
"Generative Adversarial Network GAN",
"Deep Learning"
],
"authors": [
{
"affiliation": "School of Journalism and Communication, Shaanxi Normal University,Xi'an,China",
"fullName": "Jianwen Liu",
"givenName": "Jianwen",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science, Shaanxi Normal University,Xi'an,China",
"fullName": "Jiarui Xue",
"givenName": "Jiarui",
"surname": "Xue",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Journalism and Communication, Shaanxi Normal University,Xi'an,China",
"fullName": "Juan Zhang",
"givenName": "Juan",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science, Shaanxi Normal University,Xi'an,China",
"fullName": "Ying Yang",
"givenName": "Ying",
"surname": "Yang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ictai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-10-01T00:00:00",
"pubType": "proceedings",
"pages": "923-930",
"year": "2022",
"issn": null,
"isbn": "979-8-3503-9744-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "974400a915",
"articleId": "1MrG7PSnb7q",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "974400a931",
"articleId": "1MrG3vnPjZS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200o4094",
"title": "WaveFill: A Wavelet-based Generation Network for Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4094/1BmKV8lWWT6",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729564",
"title": "Aggregated Contextual Transformations for High-Resolution Image Inpainting",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729564/1Bya8xf11Oo",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnlp/2022/9544/0/954400a081",
"title": "Face Inpainting Algorithm Combining Face Sketch and Gate Convolution",
"doi": null,
"abstractUrl": "/proceedings-article/icnlp/2022/954400a081/1GNtpLkDiV2",
"parentPublication": {
"id": "proceedings/icnlp/2022/9544/0",
"title": "2022 4th International Conference on Natural Language Processing (ICNLP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a683",
"title": "MSMC-Net: Image Inpainting using Deep Multi-scale and Multi-connection Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a683/1cJ0EtUu14k",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200b168",
"title": "Facial Image Inpainting Using Multi-level Generative Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200b168/1cdONULOGju",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300d718",
"title": "Deep Flow-Guided Video Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300d718/1gyrEiPH57y",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/09009473",
"title": "Coherent Semantic Attention for Image Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/09009473/1hVlKTptwYM",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102794",
"title": "Eigan: Enhanced Inpainting Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2020/8138/0/813800a137",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI",
"parentPublication": {
"id": "proceedings/iccst/2020/8138/0",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1m3n9N02qgE",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1m3ndO14G3K",
"doi": "10.1109/CVPR42600.2020.00753",
"title": "Contextual Residual Aggregation for Ultra High-Resolution Image Inpainting",
"normalizedTitle": "Contextual Residual Aggregation for Ultra High-Resolution Image Inpainting",
"abstract": "Recently data-driven image inpainting methods have made inspiring progress, impacting fundamental image editing tasks such as object removal and damaged image repairing. These methods are more effective than classic approaches, however, due to memory limitations they can only handle low-resolution inputs, typically smaller than 1K. Meanwhile, the resolution of photos captured with mobile devices increases up to 8K. Naive up-sampling of the low-resolution inpainted result can merely yield a large yet blurry result. Whereas, adding a high-frequency residual image onto the large blurry image can generate a sharp result, rich in details and textures. Motivated by this, we propose a Contextual Residual Aggregation (CRA) mechanism that can produce high-frequency residuals for missing contents by weighted aggregating residuals from contextual patches, thus only requiring a low-resolution prediction from the network. Since convolutional layers of the neural network only need to operate on low-resolution inputs and outputs, the cost of memory and computing power is thus well suppressed. Moreover, the need for high-resolution training datasets is alleviated. In our experiments, we train the proposed model on small images with resolutions 512 × 512 and perform inference on high-resolution images, achieving compelling inpainting quality. Our model can inpaint images as large as 8K with considerable hole sizes, which is intractable with previous learning-based approaches. We further elaborate on the light-weight design of the network architecture, achieving real-time performance on 2K images on a GTX 1080 Ti GPU. Codes are available at: https://github. com/Ascend-Huawei/Ascend-Canada/tree/ master/Models/Research_HiFIll_Model.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recently data-driven image inpainting methods have made inspiring progress, impacting fundamental image editing tasks such as object removal and damaged image repairing. These methods are more effective than classic approaches, however, due to memory limitations they can only handle low-resolution inputs, typically smaller than 1K. Meanwhile, the resolution of photos captured with mobile devices increases up to 8K. Naive up-sampling of the low-resolution inpainted result can merely yield a large yet blurry result. Whereas, adding a high-frequency residual image onto the large blurry image can generate a sharp result, rich in details and textures. Motivated by this, we propose a Contextual Residual Aggregation (CRA) mechanism that can produce high-frequency residuals for missing contents by weighted aggregating residuals from contextual patches, thus only requiring a low-resolution prediction from the network. Since convolutional layers of the neural network only need to operate on low-resolution inputs and outputs, the cost of memory and computing power is thus well suppressed. Moreover, the need for high-resolution training datasets is alleviated. In our experiments, we train the proposed model on small images with resolutions 512 × 512 and perform inference on high-resolution images, achieving compelling inpainting quality. Our model can inpaint images as large as 8K with considerable hole sizes, which is intractable with previous learning-based approaches. We further elaborate on the light-weight design of the network architecture, achieving real-time performance on 2K images on a GTX 1080 Ti GPU. Codes are available at: https://github. com/Ascend-Huawei/Ascend-Canada/tree/ master/Models/Research_HiFIll_Model.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recently data-driven image inpainting methods have made inspiring progress, impacting fundamental image editing tasks such as object removal and damaged image repairing. These methods are more effective than classic approaches, however, due to memory limitations they can only handle low-resolution inputs, typically smaller than 1K. Meanwhile, the resolution of photos captured with mobile devices increases up to 8K. Naive up-sampling of the low-resolution inpainted result can merely yield a large yet blurry result. Whereas, adding a high-frequency residual image onto the large blurry image can generate a sharp result, rich in details and textures. Motivated by this, we propose a Contextual Residual Aggregation (CRA) mechanism that can produce high-frequency residuals for missing contents by weighted aggregating residuals from contextual patches, thus only requiring a low-resolution prediction from the network. Since convolutional layers of the neural network only need to operate on low-resolution inputs and outputs, the cost of memory and computing power is thus well suppressed. Moreover, the need for high-resolution training datasets is alleviated. In our experiments, we train the proposed model on small images with resolutions 512 × 512 and perform inference on high-resolution images, achieving compelling inpainting quality. Our model can inpaint images as large as 8K with considerable hole sizes, which is intractable with previous learning-based approaches. We further elaborate on the light-weight design of the network architecture, achieving real-time performance on 2K images on a GTX 1080 Ti GPU. Codes are available at: https://github. com/Ascend-Huawei/Ascend-Canada/tree/ master/Models/Research_HiFIll_Model.",
"fno": "716800h505",
"keywords": [
"Edge Detection",
"Image Representation",
"Image Resolution",
"Image Restoration",
"Image Sensors",
"Image Texture",
"Learning Artificial Intelligence",
"Neural Nets",
"Recently Data Driven Image Inpainting Methods",
"Inspiring Progress",
"Fundamental Image Editing Tasks",
"Object Removal",
"Damaged Image Repairing",
"Classic Approaches",
"Memory Limitations",
"Low Resolution Inputs",
"Low Resolution Inpainted Result",
"Blurry Result",
"High Frequency Residual Image",
"Blurry Image",
"Sharp Result",
"Contextual Residual Aggregation Mechanism",
"High Frequency Residuals",
"Weighted Aggregating Residuals",
"Contextual Patches",
"Low Resolution Prediction",
"Computing Power",
"High Resolution Training Datasets",
"High Resolution Images",
"Compelling Inpainting Quality",
"Ultra High Resolution Image Inpainting",
"Generators",
"Image Resolution",
"Training",
"Computational Modeling",
"Logic Gates",
"Visualization",
"Feature Extraction"
],
"authors": [
{
"affiliation": "Huawei Technologies Canada Co. Ltd.",
"fullName": "Zili Yi",
"givenName": "Zili",
"surname": "Yi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huawei Technologies Canada Co. Ltd.",
"fullName": "Qiang Tang",
"givenName": "Qiang",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huawei Technologies Canada Co. Ltd.",
"fullName": "Shekoofeh Azizi",
"givenName": "Shekoofeh",
"surname": "Azizi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huawei Technologies Canada Co. Ltd.",
"fullName": "Daesik Jang",
"givenName": "Daesik",
"surname": "Jang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Huawei Technologies Canada Co. Ltd.",
"fullName": "Zhan Xu",
"givenName": "Zhan",
"surname": "Xu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "7505-7514",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7168-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "716800h495",
"articleId": "1m3oaI2b0di",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "716800h515",
"articleId": "1m3nRIETrTW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/08099917",
"title": "High-Resolution Image Inpainting Using Multi-scale Neural Patch Synthesis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/08099917/12OmNBqv2py",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2017/0733/0/0733b157",
"title": "Balanced Two-Stage Residual Networks for Image Super-Resolution",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2017/0733b157/12OmNvSKNAS",
"parentPublication": {
"id": "proceedings/cvprw/2017/0733/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2017/4662/0/08388642",
"title": "Coding efficiency improvement by wavelet super-resolution restoration for 8K UHDTV broadcasting",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2017/08388642/12OmNylbouw",
"parentPublication": {
"id": "proceedings/isspit/2017/4662/0",
"title": "2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545634",
"title": "Residual HSRCNN: Residual Hyper-Spectral Reconstruction CNN from an RGB Image",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545634/17D45WrVg97",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729564",
"title": "Aggregated Contextual Transformations for High-Resolution Image Inpainting",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729564/1Bya8xf11Oo",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2017/2636/0/263600a400",
"title": "The SJTU UHD 360-Degree Immersive Video Sequence Dataset",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2017/263600a400/1ap5CKgxrm8",
"parentPublication": {
"id": "proceedings/icvrv/2017/2636/0",
"title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300j065",
"title": "Free-Form Video Inpainting With 3D Gated Convolution and Temporal PatchGAN",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300j065/1hVlGyKqw2Q",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093637",
"title": "DCIL: Deep Contextual Internal Learning for Image Restoration and Image Retargeting",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093637/1jPbmBnuyYg",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800b361",
"title": "Learning to Have an Ear for Face Super-Resolution",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800b361/1m3ns5Mm4nK",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2021/0477/0/047700d911",
"title": "Hyperrealistic Image Inpainting with Hypergraphs",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2021/047700d911/1uqGkLna9DG",
"parentPublication": {
"id": "proceedings/wacv/2021/0477/0",
"title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1oCmZ49QXCM",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"acronym": "iccnea",
"groupId": "1823164",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1oCn35eA06I",
"doi": "10.1109/ICCNEA50255.2020.00060",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"normalizedTitle": "Research on Image Inpainting Based on Generative Adversarial Network",
"abstract": "In recent years, the rapid development of deep learning has achieved remarkable results in many scientific research fields. Especially in the field of computer vision, deep learning has almost reached the highest level of image processing. Related deep learning methods have also been applied to the field of image inpainting, making researchers begin to use deep learning models to solve the problem of digital image inpainting. The generation of the adversarial network model has greatly improved the inpainting technology of digital images. This paper builds an image inpainting framework based on the generative adversarial network. The inpainting process is divided into two parallel stages, namely reconstruction inpainting and generation inpainting. The network structure of this paper is composed of two parts: a generating network and a discriminating network. The generated network generates an image, and the discriminating network judges whether the image generated by the generating network is consistent with the real image. The loss function of the network uses the loss function of WGAN-GP to calculate the loss of parameters, in order to update the network alternately, making the generated image more natural and realistic. This paper uses the Places2 data set to verify the algorithm, and combines the subjective evaluation method with the objective evaluation method to evaluate the quality of the inpainting image. Experiments show that the algorithm inpainting effect is better.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In recent years, the rapid development of deep learning has achieved remarkable results in many scientific research fields. Especially in the field of computer vision, deep learning has almost reached the highest level of image processing. Related deep learning methods have also been applied to the field of image inpainting, making researchers begin to use deep learning models to solve the problem of digital image inpainting. The generation of the adversarial network model has greatly improved the inpainting technology of digital images. This paper builds an image inpainting framework based on the generative adversarial network. The inpainting process is divided into two parallel stages, namely reconstruction inpainting and generation inpainting. The network structure of this paper is composed of two parts: a generating network and a discriminating network. The generated network generates an image, and the discriminating network judges whether the image generated by the generating network is consistent with the real image. The loss function of the network uses the loss function of WGAN-GP to calculate the loss of parameters, in order to update the network alternately, making the generated image more natural and realistic. This paper uses the Places2 data set to verify the algorithm, and combines the subjective evaluation method with the objective evaluation method to evaluate the quality of the inpainting image. Experiments show that the algorithm inpainting effect is better.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In recent years, the rapid development of deep learning has achieved remarkable results in many scientific research fields. Especially in the field of computer vision, deep learning has almost reached the highest level of image processing. Related deep learning methods have also been applied to the field of image inpainting, making researchers begin to use deep learning models to solve the problem of digital image inpainting. The generation of the adversarial network model has greatly improved the inpainting technology of digital images. This paper builds an image inpainting framework based on the generative adversarial network. The inpainting process is divided into two parallel stages, namely reconstruction inpainting and generation inpainting. The network structure of this paper is composed of two parts: a generating network and a discriminating network. The generated network generates an image, and the discriminating network judges whether the image generated by the generating network is consistent with the real image. The loss function of the network uses the loss function of WGAN-GP to calculate the loss of parameters, in order to update the network alternately, making the generated image more natural and realistic. This paper uses the Places2 data set to verify the algorithm, and combines the subjective evaluation method with the objective evaluation method to evaluate the quality of the inpainting image. Experiments show that the algorithm inpainting effect is better.",
"fno": "708300a259",
"keywords": [
"Computer Vision",
"Image Reconstruction",
"Learning Artificial Intelligence",
"Neural Nets",
"WGAN GP",
"Generation Inpainting",
"Computer Vision",
"Deep Learning",
"Reconstruction Inpainting",
"Generative Adversarial Network",
"Digital Image Inpainting",
"Image Processing",
"Generative Adversarial Networks",
"Feature Extraction",
"Convolution",
"Decoding",
"Generators",
"Kernel",
"Image Reconstruction",
"Image Inpainting",
"Generation Adversarial Networks",
"Residual Network",
"WAGN GP"
],
"authors": [
{
"affiliation": "School of Computer Science and Engineering, Xi'an Technological University,Xi'an,China",
"fullName": "Li Zhao",
"givenName": "Li",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science and Engineering, Xi'an Technological University,Xi'an,China",
"fullName": "Ruixia Zhao",
"givenName": "Ruixia",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccnea",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-09-01T00:00:00",
"pubType": "proceedings",
"pages": "259-263",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7083-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "708300a254",
"articleId": "1oCmZM4hK9y",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "708300a264",
"articleId": "1oCn4it8gAU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/acpr/2017/3354/0/3354a588",
"title": "Image Inpainting: A Contextual Consistent and Deep Generative Adversarial Training Approach",
"doi": null,
"abstractUrl": "/proceedings-article/acpr/2017/3354a588/17D45WgziOP",
"parentPublication": {
"id": "proceedings/acpr/2017/3354/0",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acpr/2017/3354/0/3354a115",
"title": "Deep Feature Similarity for Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/acpr/2017/3354a115/17D45Wuc39X",
"parentPublication": {
"id": "proceedings/acpr/2017/3354/0",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900a977",
"title": "Image Multi-Inpainting via Progressive Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900a977/1G56VVqeIco",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a683",
"title": "MSMC-Net: Image Inpainting using Deep Multi-scale and Multi-connection Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a683/1cJ0EtUu14k",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200b168",
"title": "Facial Image Inpainting Using Multi-level Generative Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200b168/1cdONULOGju",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2019/4765/0/476500a203",
"title": "Joint Inpainting of RGB and Depth Images by Generative Adversarial Network with a Late Fusion Approach",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a203/1gysn7LMTfO",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2019/4765/0",
"title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300k0520",
"title": "Boundless: Generative Adversarial Networks for Image Extension",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102794",
"title": "Eigan: Enhanced Inpainting Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102794/1kwrlxsf48o",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2020/8138/0/813800a137",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2020/813800a137/1p1gu7CZsqI",
"parentPublication": {
"id": "proceedings/iccst/2020/8138/0",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a276",
"title": "Semantic image inpainting based on Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1p1gnrYka5y",
"title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)",
"acronym": "iccst",
"groupId": "1838984",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1p1gu7CZsqI",
"doi": "10.1109/ICCST50977.2020.00032",
"title": "Research on Character Image Inpainting based on Generative Adversarial Network",
"normalizedTitle": "Research on Character Image Inpainting based on Generative Adversarial Network",
"abstract": "Image inpainting technology plays an important role in the process of digitalizing ancient literature. It helps to recover the partially missing or stained characters. Recently the Generative Adversarial Network (GAN) has shown remarkable success in the field of image inpainting. In this paper, we propose a new GAN model using the idea of edge recovery and optimize this model with spatial attenuation mask and conditional labelling to improve performance. Experiments show better results than the previous works in character image inpainting.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Image inpainting technology plays an important role in the process of digitalizing ancient literature. It helps to recover the partially missing or stained characters. Recently the Generative Adversarial Network (GAN) has shown remarkable success in the field of image inpainting. In this paper, we propose a new GAN model using the idea of edge recovery and optimize this model with spatial attenuation mask and conditional labelling to improve performance. Experiments show better results than the previous works in character image inpainting.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Image inpainting technology plays an important role in the process of digitalizing ancient literature. It helps to recover the partially missing or stained characters. Recently the Generative Adversarial Network (GAN) has shown remarkable success in the field of image inpainting. In this paper, we propose a new GAN model using the idea of edge recovery and optimize this model with spatial attenuation mask and conditional labelling to improve performance. Experiments show better results than the previous works in character image inpainting.",
"fno": "813800a137",
"keywords": [
"Edge Detection",
"Image Restoration",
"Neural Nets",
"Character Image Inpainting",
"Generative Adversarial Network",
"Image Inpainting Technology",
"GAN Model",
"Edge Recovery",
"Generative Adversarial Networks",
"Gallium Nitride",
"Image Edge Detection",
"Training",
"Generators",
"Attenuation",
"Task Analysis",
"Image Inpainting",
"Generative Adversarial Network",
"Conditional GAN"
],
"authors": [
{
"affiliation": "Communication University of China,School of Information and Communication Engineering,Beijing,China",
"fullName": "Fang Miao",
"givenName": "Fang",
"surname": "Miao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National Radio and Television Administration,573 Station, Supervision Center,Beijing,China",
"fullName": "Li Feng",
"givenName": "Li",
"surname": "Feng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccst",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-10-01T00:00:00",
"pubType": "proceedings",
"pages": "137-140",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8138-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "813800a133",
"articleId": "1p1goCfdXq0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "813800a141",
"articleId": "1p1gpFV5Mju",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2018/6420/0/642000h902",
"title": "Eye In-painting with Exemplar Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000h902/17D45VObpNC",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2018/3788/0/08545881",
"title": "MMGAN: Manifold-Matching Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN",
"parentPublication": {
"id": "proceedings/icpr/2018/3788/0",
"title": "2018 24th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000i513",
"title": "Multi-agent Diverse Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acpr/2017/3354/0/3354a588",
"title": "Image Inpainting: A Contextual Consistent and Deep Generative Adversarial Training Approach",
"doi": null,
"abstractUrl": "/proceedings-article/acpr/2017/3354a588/17D45WgziOP",
"parentPublication": {
"id": "proceedings/acpr/2017/3354/0",
"title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aipr/2018/9306/0/08707431",
"title": "On Evaluating Video-based Generative Adversarial Networks (GANs)",
"doi": null,
"abstractUrl": "/proceedings-article/aipr/2018/08707431/19ZKYvI47BK",
"parentPublication": {
"id": "proceedings/aipr/2018/9306/0",
"title": "2018 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2019/3014/0/301400a178",
"title": "TH-GAN: Generative Adversarial Network Based Transfer Learning for Historical Chinese Character Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2019/301400a178/1h81u6jDzSE",
"parentPublication": {
"id": "proceedings/icdar/2019/3014/0",
"title": "2019 International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300k0520",
"title": "Boundless: Generative Adversarial Networks for Image Extension",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800n3693",
"title": "Prior Guided GAN Based Semantic Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800n3693/1m3nFJ7dqa4",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccnea/2020/7083/0/708300a259",
"title": "Research on Image Inpainting Based on Generative Adversarial Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccnea/2020/708300a259/1oCn35eA06I",
"parentPublication": {
"id": "proceedings/iccnea/2020/7083/0",
"title": "2020 International Conference on Computer Network, Electronic and Automation (ICCNEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2020/9146/0/914600a276",
"title": "Semantic image inpainting based on Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2020/914600a276/1rCg9gkLLlC",
"parentPublication": {
"id": "proceedings/icaice/2020/9146/0",
"title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz5JC1e",
"title": "2013 1st International Workshop on Live Programming (LIVE)",
"acronym": "live",
"groupId": "1802846",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzX6csN",
"doi": "10.1109/LIVE.2013.6617339",
"title": "Introducing Circa: A dataflow-based language for live coding",
"normalizedTitle": "Introducing Circa: A dataflow-based language for live coding",
"abstract": "In a live programming environment, the state of the running program is available during the editing process. An ideal live programming system should be able to harness the live program to offer improved abilities for code creation and manipulation. We introduce Circa, a language and platform designed to address this need. We argue in favor of a dataflow-based model of computation, and we show how this format enables useful methods of code inspection and manipulation. We present a framework based on the backpropogation algorithm that allows the user to manipulate their program by expressing a desire against the program's result. We discuss how these code editing abilities can combine to produce a highly effective environment.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In a live programming environment, the state of the running program is available during the editing process. An ideal live programming system should be able to harness the live program to offer improved abilities for code creation and manipulation. We introduce Circa, a language and platform designed to address this need. We argue in favor of a dataflow-based model of computation, and we show how this format enables useful methods of code inspection and manipulation. We present a framework based on the backpropogation algorithm that allows the user to manipulate their program by expressing a desire against the program's result. We discuss how these code editing abilities can combine to produce a highly effective environment.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In a live programming environment, the state of the running program is available during the editing process. An ideal live programming system should be able to harness the live program to offer improved abilities for code creation and manipulation. We introduce Circa, a language and platform designed to address this need. We argue in favor of a dataflow-based model of computation, and we show how this format enables useful methods of code inspection and manipulation. We present a framework based on the backpropogation algorithm that allows the user to manipulate their program by expressing a desire against the program's result. We discuss how these code editing abilities can combine to produce a highly effective environment.",
"fno": "06617339",
"keywords": [
"Runtime",
"Programming",
"Computational Modeling",
"Visualization",
"Sprites Computer",
"Encoding",
"Mice",
"Dataflow Programming",
"Live Coding"
],
"authors": [
{
"affiliation": "Shutterfly, USA",
"fullName": "Andrew Fischer",
"givenName": "Andrew",
"surname": "Fischer",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "live",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-05-01T00:00:00",
"pubType": "proceedings",
"pages": "5-8",
"year": "2013",
"issn": null,
"isbn": "978-1-4673-6265-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06617338",
"articleId": "12OmNBO3Kk5",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06617340",
"articleId": "12OmNvDI420",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icse/2013/3073/0/06606771",
"title": "1st International workshop on live programming (LIVE 2013)",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2013/06606771/12OmNBigFvu",
"parentPublication": {
"id": "proceedings/icse/2013/3073/0",
"title": "2013 35th International Conference on Software Engineering (ICSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/latice/2016/2504/0/2504a047",
"title": "Frame-Based Editing: Combining the Best of Blocks and Text Programming",
"doi": null,
"abstractUrl": "/proceedings-article/latice/2016/2504a047/12OmNBsLPbT",
"parentPublication": {
"id": "proceedings/latice/2016/2504/0",
"title": "2016 International Conference on Learning and Teaching in Computing and Engineering (LaTICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2014/4035/0/06883013",
"title": "How live coding affects developers' coding behavior",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2014/06883013/12OmNvSKNZ9",
"parentPublication": {
"id": "proceedings/vlhcc/2014/4035/0",
"title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wvl/1989/2002/0/00077049",
"title": "Visualized and modeless programming environment for form manipulation language",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1989/00077049/12OmNwkR5Dd",
"parentPublication": {
"id": "proceedings/wvl/1989/2002/0",
"title": "1989 IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-c/2017/1589/0/1589a085",
"title": "Live Programming the Behavioral Layer of Robots",
"doi": null,
"abstractUrl": "/proceedings-article/icse-c/2017/1589a085/12OmNyugyC7",
"parentPublication": {
"id": "proceedings/icse-c/2017/1589/0",
"title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/2017/05/mco2017050027",
"title": "Integrating Collaborative and Live Coding for Distance Education",
"doi": null,
"abstractUrl": "/magazine/co/2017/05/mco2017050027/13rRUILLkqR",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/saner/2022/3786/0/378600a073",
"title": "Efficient Search of Live-Coding Screencasts from Online Videos",
"doi": null,
"abstractUrl": "/proceedings-article/saner/2022/378600a073/1FbSRzYs09i",
"parentPublication": {
"id": "proceedings/saner/2022/3786/0",
"title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2022/6244/0/09962513",
"title": "Scaffolded Live Coding: A Hybrid Pedagogical Approach for Enhanced Teaching of Coding Skills",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2022/09962513/1IHorv3qJRS",
"parentPublication": {
"id": "proceedings/fie/2022/6244/0",
"title": "2022 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797760",
"title": "Live Coding of a VR Render Engine in VR",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797760/1cJ0OtcoEDe",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl-hcc/2020/6901/0/09127204",
"title": "Disruption and creativity in live coding",
"doi": null,
"abstractUrl": "/proceedings-article/vl-hcc/2020/09127204/1lvQ1akNTTq",
"parentPublication": {
"id": "proceedings/vl-hcc/2020/6901/0",
"title": "2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1qpzz6dhLLq",
"title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"acronym": "aivr",
"groupId": "1830004",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1qpzCOjJ5e0",
"doi": "10.1109/AIVR50618.2020.00060",
"title": "Problems with Physical Simulation in a Virtual Lego-based Assembly Task using Unity3D Engine",
"normalizedTitle": "Problems with Physical Simulation in a Virtual Lego-based Assembly Task using Unity3D Engine",
"abstract": "Augmented Reality (AR) has potential in the manufacturing and manual assembly industry. However, the effectiveness of AR as an assistive system depends on several factors, one of which is information presentation. A set of guidelines for the effective interface design of Augmented Reality systems for manual assembly have been proposed. To validate the design guidelines, it was decided to use a simulated AR approach using Virtual Reality (VR). To evaluate the simulated AR system, it is necessary to also simulate the manual assembly task. This paper describes the challenges faced when developing the manual assembly task simulation, particularly when simulating physical interactions in VR using the Unity3D engine.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Augmented Reality (AR) has potential in the manufacturing and manual assembly industry. However, the effectiveness of AR as an assistive system depends on several factors, one of which is information presentation. A set of guidelines for the effective interface design of Augmented Reality systems for manual assembly have been proposed. To validate the design guidelines, it was decided to use a simulated AR approach using Virtual Reality (VR). To evaluate the simulated AR system, it is necessary to also simulate the manual assembly task. This paper describes the challenges faced when developing the manual assembly task simulation, particularly when simulating physical interactions in VR using the Unity3D engine.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Augmented Reality (AR) has potential in the manufacturing and manual assembly industry. However, the effectiveness of AR as an assistive system depends on several factors, one of which is information presentation. A set of guidelines for the effective interface design of Augmented Reality systems for manual assembly have been proposed. To validate the design guidelines, it was decided to use a simulated AR approach using Virtual Reality (VR). To evaluate the simulated AR system, it is necessary to also simulate the manual assembly task. This paper describes the challenges faced when developing the manual assembly task simulation, particularly when simulating physical interactions in VR using the Unity3D engine.",
"fno": "746300a298",
"keywords": [
"Assembling",
"Augmented Reality",
"Design Engineering",
"Production Engineering Computing",
"Manual Assembly Task",
"Physical Simulation",
"Augmented Reality Systems",
"Design Guidelines",
"Unity 3 D Engine",
"Virtual LEGO",
"Manufacturing Industry",
"Task Analysis",
"Manuals",
"Visualization",
"Physics",
"Solid Modeling",
"Gravity",
"Engines",
"Task Simulation",
"Virtual Reality",
"Manual Assembly",
"Unity 3 D"
],
"authors": [
{
"affiliation": "Universiti Teknologi PETRONAS,Computer & Information Sciences Department,Bandar Seri Iskandar,Perak,Malaysia",
"fullName": "Nor Farzana Syaza Jeffri",
"givenName": "Nor Farzana Syaza",
"surname": "Jeffri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universiti Teknologi PETRONAS,Computer & Information Sciences Department,Bandar Seri Iskandar,Perak,Malaysia",
"fullName": "Dayang Rohaya Awang Rambli",
"givenName": "Dayang Rohaya Awang",
"surname": "Rambli",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "aivr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "298-300",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7463-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "746300a294",
"articleId": "1qpzzgbNIc0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "746300a301",
"articleId": "1qpzB3jtxjW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/1999/0210/0/02100032",
"title": "Virtual Reality and Augmented Reality as a Training Tool for Assembly Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/iv/1999/02100032/12OmNAObbyR",
"parentPublication": {
"id": "proceedings/iv/1999/0210/0",
"title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2018/6049/0/604901a395",
"title": "Manual Assembly Training in Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2018/604901a395/12OmNBKEyqp",
"parentPublication": {
"id": "proceedings/icalt/2018/6049/0",
"title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2014/6854/0/6854a065",
"title": "VR&AR Combined Manual Operation Instruction System on Industry Products: A Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2014/6854a065/12OmNBUS73y",
"parentPublication": {
"id": "proceedings/icvrv/2014/6854/0",
"title": "2014 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2008/3407/1/3407a693",
"title": "A Study on Providing Prompt Assembly Information Using AR Manual",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2008/3407a693/12OmNyQYtsL",
"parentPublication": {
"id": "iccit/2008/3407/1",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a872",
"title": "Towards Retargetable Animations for Industrial Augmented Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a872/1CJddfDEu1W",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798228",
"title": "On Sharing Physical Geometric Space between Augmented and Virtual Reality Environments",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798228/1cJ0LLaIrPq",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2019/3485/0/348500a150",
"title": "A Visualization Tool for Analyzing an Assembly Training in VR",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2019/348500a150/1cYi21LcNX2",
"parentPublication": {
"id": "proceedings/icalt/2019/3485/2161-377X",
"title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090576",
"title": "Augmented Reality for the Manufacturing Industry: The Case of an Assembly Assistant",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090576/1jIxw4eZW8M",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2020/9231/0/923100a179",
"title": "Augmented Reality for Manual Assembly in Industry 4.0: Gathering Guidelines",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2020/923100a179/1oZBDyQMM6c",
"parentPublication": {
"id": "proceedings/svr/2020/9231/0",
"title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2020/9231/0/923100a189",
"title": "Manual PCB assembly using Augmented Reality towards Total Quality",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2020/923100a189/1oZBzP5SgGk",
"parentPublication": {
"id": "proceedings/svr/2020/9231/0",
"title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1BmEezmpGrm",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"acronym": "iccv",
"groupId": "1000149",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1BmHreVQrSg",
"doi": "10.1109/ICCV48922.2021.00647",
"title": "Spatio-temporal Self-Supervised Representation Learning for 3D Point Clouds",
"normalizedTitle": "Spatio-temporal Self-Supervised Representation Learning for 3D Point Clouds",
"abstract": "To date, various 3D scene understanding tasks still lack practical and generalizable pre-trained models, primarily due to the intricate nature of 3D scene understanding tasks and their immense variations introduced by camera views, lighting, occlusions, etc. In this paper, we tackle this challenge by introducing a spatio-temporal representation learning (STRL) framework, capable of learning from unlabeled 3D point clouds in a self-supervised fashion. Inspired by how infants learn from visual data in the wild, we explore the rich spatio-temporal cues derived from the 3D data. Specifically, STRL takes two temporally-correlated frames from a 3D point cloud sequence as the input, transforms it with the spatial data augmentation, and learns the invariant representation self-supervisedly. To corroborate the efficacy of STRL, we conduct extensive experiments on three types (synthetic, indoor, and outdoor) of datasets. Experimental results demonstrate that, compared with supervised learning methods, the learned self-supervised representation facilitates various models to attain comparable or even better performances while capable of generalizing pre-trained models to downstream tasks, including 3D shape classification, 3D object detection, and 3D semantic segmentation. Moreover, the spatio-temporal contextual cues embedded in 3D point clouds significantly improve the learned representations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "To date, various 3D scene understanding tasks still lack practical and generalizable pre-trained models, primarily due to the intricate nature of 3D scene understanding tasks and their immense variations introduced by camera views, lighting, occlusions, etc. In this paper, we tackle this challenge by introducing a spatio-temporal representation learning (STRL) framework, capable of learning from unlabeled 3D point clouds in a self-supervised fashion. Inspired by how infants learn from visual data in the wild, we explore the rich spatio-temporal cues derived from the 3D data. Specifically, STRL takes two temporally-correlated frames from a 3D point cloud sequence as the input, transforms it with the spatial data augmentation, and learns the invariant representation self-supervisedly. To corroborate the efficacy of STRL, we conduct extensive experiments on three types (synthetic, indoor, and outdoor) of datasets. Experimental results demonstrate that, compared with supervised learning methods, the learned self-supervised representation facilitates various models to attain comparable or even better performances while capable of generalizing pre-trained models to downstream tasks, including 3D shape classification, 3D object detection, and 3D semantic segmentation. Moreover, the spatio-temporal contextual cues embedded in 3D point clouds significantly improve the learned representations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "To date, various 3D scene understanding tasks still lack practical and generalizable pre-trained models, primarily due to the intricate nature of 3D scene understanding tasks and their immense variations introduced by camera views, lighting, occlusions, etc. In this paper, we tackle this challenge by introducing a spatio-temporal representation learning (STRL) framework, capable of learning from unlabeled 3D point clouds in a self-supervised fashion. Inspired by how infants learn from visual data in the wild, we explore the rich spatio-temporal cues derived from the 3D data. Specifically, STRL takes two temporally-correlated frames from a 3D point cloud sequence as the input, transforms it with the spatial data augmentation, and learns the invariant representation self-supervisedly. To corroborate the efficacy of STRL, we conduct extensive experiments on three types (synthetic, indoor, and outdoor) of datasets. Experimental results demonstrate that, compared with supervised learning methods, the learned self-supervised representation facilitates various models to attain comparable or even better performances while capable of generalizing pre-trained models to downstream tasks, including 3D shape classification, 3D object detection, and 3D semantic segmentation. Moreover, the spatio-temporal contextual cues embedded in 3D point clouds significantly improve the learned representations.",
"fno": "281200g515",
"keywords": [
"Point Cloud Compression",
"Representation Learning",
"Training",
"Solid Modeling",
"Visualization",
"Three Dimensional Displays",
"Supervised Learning",
"Stereo",
"3 D From Multiview And Other Sensors",
"Representation Learning",
"Transfer Low Shot Semi Unsupervised Learning"
],
"authors": [
{
"affiliation": "University of California,Los Angeles",
"fullName": "Siyuan Huang",
"givenName": "Siyuan",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University",
"fullName": "Yichen Xie",
"givenName": "Yichen",
"surname": "Xie",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Institute for General Artificial Intelligence",
"fullName": "Song-Chun Zhu",
"givenName": "Song-Chun",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Institute for General Artificial Intelligence",
"fullName": "Yixin Zhu",
"givenName": "Yixin",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "6515-6525",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2812-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "281200g505",
"articleId": "1BmFLjuiAKs",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "281200g526",
"articleId": "1BmJdSyKb8Q",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2021/2398/0/239800b565",
"title": "SMATE: Semi-Supervised Spatio-Temporal Representation Learning on Multivariate Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2021/239800b565/1Aqx8Cgv6Wk",
"parentPublication": {
"id": "proceedings/icdm/2021/2398/0",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/02/09740525",
"title": "Point Spatio-Temporal Transformer Networks for Point Cloud Video Modeling",
"doi": null,
"abstractUrl": "/journal/tp/2023/02/09740525/1BYEd6sg5tC",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g403",
"title": "Guided Point Contrastive Learning for Semi-supervised Point Cloud Semantic Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g403/1BmEACglKnu",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200n3403",
"title": "Skeleton Cloud Colorization for Unsupervised 3D Action Representation Learning",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200n3403/1BmLmLAuTrG",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600j892",
"title": "CrossPoint: Self-Supervised Cross-Modal Contrastive Learning for 3D Point Cloud Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600j892/1H0L5HmKF0c",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600q6938",
"title": "RigidFlow: Self-Supervised Scene Flow Learning on Point Clouds by Local Rigidity Prior",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600q6938/1H0MPwg7PUs",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600t9248",
"title": "Cross-Architecture Self-supervised Video Representation Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600t9248/1H0NZfNcAog",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600b989",
"title": "Self-Supervised Arbitrary-Scale Point Clouds Upsampling via Implicit Neural Representation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600b989/1H1ih6WT91S",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2021/0477/0/047700d761",
"title": "Self-supervised 4D Spatio-temporal Feature Learning via Order Prediction of Sequential Point Cloud Clips",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2021/047700d761/1uqGtqFyAJa",
"parentPublication": {
"id": "proceedings/wacv/2021/0477/0",
"title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800a782",
"title": "Occlusion Guided Self-supervised Scene Flow Estimation on 3D Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800a782/1zWEcBHLWPC",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1H1gVMlkl32",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1H0N8QxLrgs",
"doi": "10.1109/CVPR52688.2022.00823",
"title": "Voxel Set Transformer: A Set-to-Set Approach to 3D Object Detection from Point Clouds",
"normalizedTitle": "Voxel Set Transformer: A Set-to-Set Approach to 3D Object Detection from Point Clouds",
"abstract": "Transformer has demonstrated promising performance in many 2D vision tasks. However, it is cumbersome to compute the self-attention on large-scale point cloud data because point cloud is a long sequence and unevenly distributed in 3D space. To solve this issue, existing methods usually compute self-attention locally by grouping the points into clusters of the same size, or perform convolutional self-attention on a discretized representation. However, the former results in stochastic point dropout, while the latter typically has narrow attention fields. In this paper, we propose a novel voxel-based architecture, namely Voxel Set Transformer (VoxSeT), to detect 3D objects from point clouds by means of set-to-set translation. VoxSeT is built upon a voxel-based set attention (VSA) module, which reduces the self-attention in each voxel by two cross-attentions and models features in a hidden space induced by a group of latent codes. With the VSA module, VoxSeT can manage voxelized point clusters with arbitrary size in a wide range, and process them in parallel with linear complexity. The proposed VoxSeT integrates the high performance of transformer with the efficiency of voxel-based model, which can be used as a good alternative to the convolutional and point-based backbones. VoxSeT reports competitive results on the KITTI and Waymo detection benchmarks. The source codes can be found at https://github.com/skyhehe123/VoxSeT.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Transformer has demonstrated promising performance in many 2D vision tasks. However, it is cumbersome to compute the self-attention on large-scale point cloud data because point cloud is a long sequence and unevenly distributed in 3D space. To solve this issue, existing methods usually compute self-attention locally by grouping the points into clusters of the same size, or perform convolutional self-attention on a discretized representation. However, the former results in stochastic point dropout, while the latter typically has narrow attention fields. In this paper, we propose a novel voxel-based architecture, namely Voxel Set Transformer (VoxSeT), to detect 3D objects from point clouds by means of set-to-set translation. VoxSeT is built upon a voxel-based set attention (VSA) module, which reduces the self-attention in each voxel by two cross-attentions and models features in a hidden space induced by a group of latent codes. With the VSA module, VoxSeT can manage voxelized point clusters with arbitrary size in a wide range, and process them in parallel with linear complexity. The proposed VoxSeT integrates the high performance of transformer with the efficiency of voxel-based model, which can be used as a good alternative to the convolutional and point-based backbones. VoxSeT reports competitive results on the KITTI and Waymo detection benchmarks. The source codes can be found at https://github.com/skyhehe123/VoxSeT.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Transformer has demonstrated promising performance in many 2D vision tasks. However, it is cumbersome to compute the self-attention on large-scale point cloud data because point cloud is a long sequence and unevenly distributed in 3D space. To solve this issue, existing methods usually compute self-attention locally by grouping the points into clusters of the same size, or perform convolutional self-attention on a discretized representation. However, the former results in stochastic point dropout, while the latter typically has narrow attention fields. In this paper, we propose a novel voxel-based architecture, namely Voxel Set Transformer (VoxSeT), to detect 3D objects from point clouds by means of set-to-set translation. VoxSeT is built upon a voxel-based set attention (VSA) module, which reduces the self-attention in each voxel by two cross-attentions and models features in a hidden space induced by a group of latent codes. With the VSA module, VoxSeT can manage voxelized point clusters with arbitrary size in a wide range, and process them in parallel with linear complexity. The proposed VoxSeT integrates the high performance of transformer with the efficiency of voxel-based model, which can be used as a good alternative to the convolutional and point-based backbones. VoxSeT reports competitive results on the KITTI and Waymo detection benchmarks. The source codes can be found at https://github.com/skyhehe123/VoxSeT.",
"fno": "694600i407",
"keywords": [
"Computer Graphics",
"Computer Vision",
"Feature Extraction",
"Image Classification",
"Image Reconstruction",
"Image Representation",
"Medical Image Processing",
"Object Detection",
"Object Recognition",
"Stochastic Point Dropout",
"Narrow Attention Fields",
"Novel Voxel Based Architecture",
"Voxel Set Transformer",
"Vox Se T",
"Set To Set Translation",
"Attention Module",
"Cross Attentions",
"Voxelized Point Clusters",
"Voxel Based Model",
"Convolutional Point Based Backbones",
"3 D Object Detection",
"2 D Vision Tasks",
"Large Scale Point Cloud Data",
"Convolutional Self Attention",
"Point Cloud Compression",
"Convolutional Codes",
"Computer Vision",
"Three Dimensional Displays",
"Stochastic Processes",
"Distributed Databases",
"Object Detection",
"3 D From Multi View And Sensors Recognition Detection",
"Categorization",
"Retrieval"
],
"authors": [
{
"affiliation": "The Hong Kong Polytechnic University",
"fullName": "Chenhang He",
"givenName": "Chenhang",
"surname": "He",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The Hong Kong Polytechnic University",
"fullName": "Ruihuang Li",
"givenName": "Ruihuang",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The Hong Kong Polytechnic University",
"fullName": "Shuai Li",
"givenName": "Shuai",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The Hong Kong Polytechnic University",
"fullName": "Lei Zhang",
"givenName": "Lei",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "8407-8417",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6946-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "694600i397",
"articleId": "1H1lp1515Ju",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "694600i418",
"articleId": "1H1nb7vYZYk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200c908",
"title": "3DVG-Transformer: Relation Modeling for Visual Grounding on Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200c908/1BmEIWQAT16",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200n3169",
"title": "Voxel-based Network for Shape Completion by Leveraging Edge Generation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200n3169/1BmENZhQjHW",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g078",
"title": "Pyramid Point Cloud Transformer for Large-Scale Place Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g078/1BmFDZdzHwY",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200d144",
"title": "Voxel Transformer for 3D Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200d144/1BmHhfdx7dm",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200q6239",
"title": "Point Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200q6239/1BmLbgpCbtK",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600q6928",
"title": "Fast Point Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600q6928/1H0MTxeBHwY",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600b425",
"title": "CodedVTR: Codebook-based Sparse Voxel Transformer with Geometric Guidance",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600b425/1H1jruDVcvC",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600i521",
"title": "PTTR: Relational 3D Point Cloud Object Tracking with Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600i521/1H1mwenTVBK",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacvw/2023/2056/0/205600a350",
"title": "Masked Autoencoder for Self-Supervised Pre-training on Lidar Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/wacvw/2023/205600a350/1Kzz7RCHLeU",
"parentPublication": {
"id": "proceedings/wacvw/2023/2056/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccst/2021/4254/0/425400a343",
"title": "3D-VRVT: 3D Voxel Reconstruction from A Single Image with Vision Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/iccst/2021/425400a343/1ziP8z7O3oA",
"parentPublication": {
"id": "proceedings/iccst/2021/4254/0",
"title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KYslFwrlyE",
"title": "2022 International Conference on 3D Vision (3DV)",
"acronym": "3dv",
"groupId": "10044366",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KYsxw3MorC",
"doi": "10.1109/3DV57658.2022.00017",
"title": "Point Discriminative Learning for Data-efficient 3D Point Cloud Analysis",
"normalizedTitle": "Point Discriminative Learning for Data-efficient 3D Point Cloud Analysis",
"abstract": "3D point cloud analysis has drawn a lot of research attention due to its wide applications. However, collecting massive labelled 3D point cloud data is both time-consuming and labor-intensive. This calls for data-efficient learning methods. In this work we propose PointDisc, a point discriminative learning method to leverage self-supervisions for data-efficient 3D point cloud classification and segmentation. PointDisc imposes a novel point discrimination loss on the middle and global level features produced by the backbone network. This point discrimination loss enforces learned features to be consistent with points belonging to the corresponding local shape region and inconsistent with randomly sampled noisy points. We conduct extensive experiments on 3D object classification, 3D semantic and part segmentation, showing the benefits of PointDisc for data-efficient learning. Detailed analysis demonstrate that PointDisc learns unsupervised features that well capture local and global geometry.",
"abstracts": [
{
"abstractType": "Regular",
"content": "3D point cloud analysis has drawn a lot of research attention due to its wide applications. However, collecting massive labelled 3D point cloud data is both time-consuming and labor-intensive. This calls for data-efficient learning methods. In this work we propose PointDisc, a point discriminative learning method to leverage self-supervisions for data-efficient 3D point cloud classification and segmentation. PointDisc imposes a novel point discrimination loss on the middle and global level features produced by the backbone network. This point discrimination loss enforces learned features to be consistent with points belonging to the corresponding local shape region and inconsistent with randomly sampled noisy points. We conduct extensive experiments on 3D object classification, 3D semantic and part segmentation, showing the benefits of PointDisc for data-efficient learning. Detailed analysis demonstrate that PointDisc learns unsupervised features that well capture local and global geometry.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "3D point cloud analysis has drawn a lot of research attention due to its wide applications. However, collecting massive labelled 3D point cloud data is both time-consuming and labor-intensive. This calls for data-efficient learning methods. In this work we propose PointDisc, a point discriminative learning method to leverage self-supervisions for data-efficient 3D point cloud classification and segmentation. PointDisc imposes a novel point discrimination loss on the middle and global level features produced by the backbone network. This point discrimination loss enforces learned features to be consistent with points belonging to the corresponding local shape region and inconsistent with randomly sampled noisy points. We conduct extensive experiments on 3D object classification, 3D semantic and part segmentation, showing the benefits of PointDisc for data-efficient learning. Detailed analysis demonstrate that PointDisc learns unsupervised features that well capture local and global geometry.",
"fno": "567000a042",
"keywords": [
"Feature Extraction",
"Image Classification",
"Image Segmentation",
"Learning Artificial Intelligence",
"Supervised Learning",
"Unsupervised Learning",
"3 D Object Classification",
"3 D Point Cloud Data",
"Data Efficient 3 D Point Cloud Analysis",
"Data Efficient Learning Methods",
"Global Level Features",
"Novel Point Discrimination Loss",
"Part Segmentation",
"Point Discrimination Loss Enforces",
"Point Discriminative Learning",
"Point Disc",
"Randomly Sampled Noisy Points",
"Point Cloud Compression",
"Learning Systems",
"Geometry",
"Visualization",
"Three Dimensional Displays",
"Shape",
"Semantics",
"Point Cloud Analysis",
"Unsupervised Learning",
"Data Efficient Learning"
],
"authors": [
{
"affiliation": "Institute for Infocomm Research, A*STAR,Singapore",
"fullName": "Fayao Liu",
"givenName": "Fayao",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanyang Technological University,Singapore",
"fullName": "Guosheng Lin",
"givenName": "Guosheng",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute for Infocomm Research, A*STAR,Singapore",
"fullName": "Chuan-Sheng Foo",
"givenName": "Chuan-Sheng",
"surname": "Foo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Cambridge,Singapore",
"fullName": "Chaitanya K. Joshi",
"givenName": "Chaitanya K.",
"surname": "Joshi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute for Infocomm Research, A*STAR,Singapore",
"fullName": "Jie Lin",
"givenName": "Jie",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-09-01T00:00:00",
"pubType": "proceedings",
"pages": "42-51",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-5670-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "567000a032",
"articleId": "1KYsxkE8paM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "567000a052",
"articleId": "1KYsxC2M7rW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200a895",
"title": "Walk in the Cloud: Learning Curves for Point Clouds Shape Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200a895/1BmEBcBzATC",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600v1251",
"title": "Point Cloud Pre-training with Natural 3D Structures",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600v1251/1H0N88YCzuw",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600g328",
"title": "IDEA-Net: Dynamic 3D Point Cloud Interpolation via Deep Embedding Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600g328/1H1hTQlrJkY",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600i521",
"title": "PTTR: Relational 3D Point Cloud Object Tracking with Transformer",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600i521/1H1mwenTVBK",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956045",
"title": "3D Point Cloud Completion with Geometric-Aware Adversarial Augmentation",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956045/1IHpGE1y3oA",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956459",
"title": "Multi-view Based 3D Point Cloud Completion Algorithm for Vehicles",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956459/1IHpSLoC9yM",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2022/6382/0/09959483",
"title": "Inception-based Deep Learning Architecture for 3D Point Cloud Completion",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2022/09959483/1Iz598kAiwo",
"parentPublication": {
"id": "proceedings/avss/2022/6382/0",
"title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600b298",
"title": ": Joint Point Interaction-Dimension Search for 3D Point Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600b298/1KxVBd77E8o",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800b196",
"title": "Geometric Adversarial Attacks and Defenses on 3D Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800b196/1zWElzlz47C",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2021/0898/0/089800b480",
"title": "Geometric Invariant Representation Learning for 3D Point Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2021/089800b480/1zw6hJOIDcs",
"parentPublication": {
"id": "proceedings/ictai/2021/0898/0",
"title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1zWE36wtuCY",
"title": "2021 International Conference on 3D Vision (3DV)",
"acronym": "3dv",
"groupId": "1800494",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zWEezCujxC",
"doi": "10.1109/3DV53792.2021.00102",
"title": "NeeDrop: Self-supervised Shape Representation from Sparse Point Clouds using Needle Dropping",
"normalizedTitle": "NeeDrop: Self-supervised Shape Representation from Sparse Point Clouds using Needle Dropping",
"abstract": "There has been recently a growing interest for implicit shape representations. Contrary to explicit representations, they have no resolution limitations and they easily deal with a wide variety of surface topologies. To learn these implicit representations, current approaches rely on a certain level of shape supervision (e.g., inside/outside information or distance-to-shape knowledge), or at least require a dense point cloud (to approximate well enough the distance-to-shape). In contrast, we introduce NeeDrop, an self-supervised method for learning shape representations from possibly extremely sparse point clouds. Like in Buffon’s needle problem, we “drop” (sample) needles on the point cloud and consider that, statistically, close to the surface, the needle end points lie on opposite sides of the surface. No shape knowledge is required and the point cloud can be highly sparse, e.g., as lidar point clouds acquired by vehicles. Previous self-supervised shape representation approaches fail to produce good-quality results on this kind of data. We obtain quantitative results on par with existing supervised approaches on shape reconstruction datasets and show promising qualitative results on hard autonomous driving datasets such as KITTI.",
"abstracts": [
{
"abstractType": "Regular",
"content": "There has been recently a growing interest for implicit shape representations. Contrary to explicit representations, they have no resolution limitations and they easily deal with a wide variety of surface topologies. To learn these implicit representations, current approaches rely on a certain level of shape supervision (e.g., inside/outside information or distance-to-shape knowledge), or at least require a dense point cloud (to approximate well enough the distance-to-shape). In contrast, we introduce NeeDrop, an self-supervised method for learning shape representations from possibly extremely sparse point clouds. Like in Buffon’s needle problem, we “drop” (sample) needles on the point cloud and consider that, statistically, close to the surface, the needle end points lie on opposite sides of the surface. No shape knowledge is required and the point cloud can be highly sparse, e.g., as lidar point clouds acquired by vehicles. Previous self-supervised shape representation approaches fail to produce good-quality results on this kind of data. We obtain quantitative results on par with existing supervised approaches on shape reconstruction datasets and show promising qualitative results on hard autonomous driving datasets such as KITTI.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "There has been recently a growing interest for implicit shape representations. Contrary to explicit representations, they have no resolution limitations and they easily deal with a wide variety of surface topologies. To learn these implicit representations, current approaches rely on a certain level of shape supervision (e.g., inside/outside information or distance-to-shape knowledge), or at least require a dense point cloud (to approximate well enough the distance-to-shape). In contrast, we introduce NeeDrop, an self-supervised method for learning shape representations from possibly extremely sparse point clouds. Like in Buffon’s needle problem, we “drop” (sample) needles on the point cloud and consider that, statistically, close to the surface, the needle end points lie on opposite sides of the surface. No shape knowledge is required and the point cloud can be highly sparse, e.g., as lidar point clouds acquired by vehicles. Previous self-supervised shape representation approaches fail to produce good-quality results on this kind of data. We obtain quantitative results on par with existing supervised approaches on shape reconstruction datasets and show promising qualitative results on hard autonomous driving datasets such as KITTI.",
"fno": "268800a940",
"keywords": [
"Image Reconstruction",
"Image Representation",
"Image Segmentation",
"Learning Artificial Intelligence",
"Object Detection",
"Optical Radar",
"Topology",
"Needle Dropping",
"Implicit Shape Representations",
"Explicit Representations",
"Resolution Limitations",
"Surface Topologies",
"Shape Supervision",
"Distance To Shape Knowledge",
"Dense Point Cloud",
"Nee Drop",
"Sparse Point Clouds",
"Buffons Needle Problem",
"Needle End Points",
"Lidar Point Clouds",
"Self Supervised Shape Representation Approaches",
"Shape Reconstruction Datasets",
"Point Cloud Compression",
"Training",
"Surface Reconstruction",
"Three Dimensional Displays",
"Laser Radar",
"Shape",
"Neural Networks",
"Point Clouds",
"Self Supervised",
"Surface",
"Reconstruction"
],
"authors": [
{
"affiliation": "Valeo.ai,Paris,France",
"fullName": "Alexandre Boulch",
"givenName": "Alexandre",
"surname": "Boulch",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Univ Gustave Eiffel, CNRS,LIGM, Ecole des Ponts,Marne-la-Vallée,France",
"fullName": "Pierre-Alain Langlois",
"givenName": "Pierre-Alain",
"surname": "Langlois",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Valeo.ai,Paris,France",
"fullName": "Gilles Puy",
"givenName": "Gilles",
"surname": "Puy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Valeo.ai,Paris,France",
"fullName": "Renaud Marlet",
"givenName": "Renaud",
"surname": "Marlet",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "940-950",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2688-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "268800a930",
"articleId": "1zWEi72pRpC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "268800a951",
"articleId": "1zWE67DfNzG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccis/2010/4270/0/4270a293",
"title": "An Improved Algorithm of Flat Knitting Machine's Needle Position Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2010/4270a293/12OmNvSKNW0",
"parentPublication": {
"id": "proceedings/iccis/2010/4270/0",
"title": "2010 International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/02/09736689",
"title": "PointGLR: Unsupervised Structural Representation Learning of 3D Point Clouds",
"doi": null,
"abstractUrl": "/journal/tp/2023/02/09736689/1BN1Ot4gcjm",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200g515",
"title": "Spatio-temporal Self-Supervised Representation Learning for 3D Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200g515/1BmHreVQrSg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200n3106",
"title": "SLIM: Self-Supervised LiDAR Scene Flow and Motion Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200n3106/1BmIjnW2Eow",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600t9301",
"title": "DiGS : Divergence guided shape implicit neural representation for unoriented point clouds",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600t9301/1H0KAEvXEdy",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600m2714",
"title": "Neural Shape Mating: Self-Supervised Object Assembly with Adversarial Shape Priors",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600m2714/1H0KKRpu8mc",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600j881",
"title": "Image-to-Lidar Self-Supervised Distillation for Autonomous Driving Data",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600j881/1H0KyVm6rJu",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600c687",
"title": "Scribble-Supervised LiDAR Semantic Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600c687/1H1hDMLXody",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600b277",
"title": "RSF: Optimizing Rigid Scene Flow From 3D Point Clouds Without Labels",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600b277/1KxV4bgUx4A",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacvw/2023/2056/0/205600a350",
"title": "Masked Autoencoder for Self-Supervised Pre-training on Lidar Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/wacvw/2023/205600a350/1Kzz7RCHLeU",
"parentPublication": {
"id": "proceedings/wacvw/2023/2056/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KBqPQkw71C",
"title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "10029378",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KBr2hkaYGk",
"doi": "10.1109/ICDMW58026.2022.00158",
"title": "Influence Maximization on Hypergraphs via Similarity-based Diffusion",
"normalizedTitle": "Influence Maximization on Hypergraphs via Similarity-based Diffusion",
"abstract": "Influence maximization is an important problem in network science that aims to detect critical structures, such as nodes and interactions, with a higher influence on diffusion. It has applications in information spreading, rumor controlling, marketing, disease spreading, advertising, and more. Although the influence maximization problem in graphs has been studied ex-tensively, there are a few studies that explore critical structures in hypergraphs and these studies mostly focus on detecting influential nodes rather than higher-order interactions, i.e., hyperedges. In this paper, we study the influential hyperedge detection problem. We first design diffusion models on hypergraphs based on the similarity between hyperedges. Our claim here is that similarity between hyperedges is positively correlated with the diffusion process. To study this claim, we first calculate similarity scores between hyperedges and construct similarity-based hypergraph Laplacians. Next, we extend standard graph centrality measures for hyperedges using these Laplacians. We compare the similarity- based hypergraph Laplacians with the state-of-the-art influential hyperedge detection method using two evaluation metrics: the size of the giant component and the Susceptible-Infected-Recovered (SIR) simulation model. Our experimental results suggest that overall, similarity-based Laplacians are more effective than the state-of-the-art method in finding influential higher-order hyperedges.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Influence maximization is an important problem in network science that aims to detect critical structures, such as nodes and interactions, with a higher influence on diffusion. It has applications in information spreading, rumor controlling, marketing, disease spreading, advertising, and more. Although the influence maximization problem in graphs has been studied ex-tensively, there are a few studies that explore critical structures in hypergraphs and these studies mostly focus on detecting influential nodes rather than higher-order interactions, i.e., hyperedges. In this paper, we study the influential hyperedge detection problem. We first design diffusion models on hypergraphs based on the similarity between hyperedges. Our claim here is that similarity between hyperedges is positively correlated with the diffusion process. To study this claim, we first calculate similarity scores between hyperedges and construct similarity-based hypergraph Laplacians. Next, we extend standard graph centrality measures for hyperedges using these Laplacians. We compare the similarity- based hypergraph Laplacians with the state-of-the-art influential hyperedge detection method using two evaluation metrics: the size of the giant component and the Susceptible-Infected-Recovered (SIR) simulation model. Our experimental results suggest that overall, similarity-based Laplacians are more effective than the state-of-the-art method in finding influential higher-order hyperedges.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Influence maximization is an important problem in network science that aims to detect critical structures, such as nodes and interactions, with a higher influence on diffusion. It has applications in information spreading, rumor controlling, marketing, disease spreading, advertising, and more. Although the influence maximization problem in graphs has been studied ex-tensively, there are a few studies that explore critical structures in hypergraphs and these studies mostly focus on detecting influential nodes rather than higher-order interactions, i.e., hyperedges. In this paper, we study the influential hyperedge detection problem. We first design diffusion models on hypergraphs based on the similarity between hyperedges. Our claim here is that similarity between hyperedges is positively correlated with the diffusion process. To study this claim, we first calculate similarity scores between hyperedges and construct similarity-based hypergraph Laplacians. Next, we extend standard graph centrality measures for hyperedges using these Laplacians. We compare the similarity- based hypergraph Laplacians with the state-of-the-art influential hyperedge detection method using two evaluation metrics: the size of the giant component and the Susceptible-Infected-Recovered (SIR) simulation model. Our experimental results suggest that overall, similarity-based Laplacians are more effective than the state-of-the-art method in finding influential higher-order hyperedges.",
"fno": "460900b197",
"keywords": [
"Diffusion",
"Diseases",
"Graph Theory",
"Network Theory Graphs",
"Calculate Similarity Scores",
"Design Diffusion Models",
"Diffusion Process",
"Disease Spreading",
"Explore Critical Structures",
"Higher Order Hyperedges",
"Higher Order Interactions",
"Influence Maximization Problem",
"Influential Hyperedge Detection Problem",
"Influential Nodes",
"Information Spreading",
"Network Science",
"Similarity Based Hypergraph Laplacians",
"Similarity Based Diffusion",
"Similarity Based Hypergraph Laplacians",
"Similarity Based Laplacians",
"Standard Graph Centrality Measures",
"State Of The Art Influential Hyperedge Detection Method",
"Laplace Equations",
"Conferences",
"Diffusion Processes",
"Complex Networks",
"Size Measurement",
"Data Mining",
"Task Analysis",
"Complex Networks",
"Hypergraphs",
"Influential Higher Order Interactions",
"Information Diffusion",
"Node Similarity"
],
"authors": [
{
"affiliation": "Institute for Insight, Georgia State University,Atlanta,GA,USA",
"fullName": "Mehmet Emin Aktas",
"givenName": "Mehmet Emin",
"surname": "Aktas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Central Oklahoma,Department of Mathematics and Statistics,Edmond,OK,USA",
"fullName": "Sidra Jawaid",
"givenName": "Sidra",
"surname": "Jawaid",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "North American University,Department of Computer Science,Houston,TX,USA",
"fullName": "Ihsan Gokalp",
"givenName": "Ihsan",
"surname": "Gokalp",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Georgia State University,Department of Computer Science,Atlanta,GA,USA",
"fullName": "Esra Akbas",
"givenName": "Esra",
"surname": "Akbas",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1197-1206",
"year": "2022",
"issn": null,
"isbn": "979-8-3503-4609-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "460900b189",
"articleId": "1KBqWHalR0k",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "460900b207",
"articleId": "1KBqZLzdKtq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/1992/2855/0/00223119",
"title": "Segmentation by nonlinear diffusion. II",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1992/00223119/12OmNy4r3Qf",
"parentPublication": {
"id": "proceedings/cvpr/1992/2855/0",
"title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithingscpscom/2011/4580/0/4580a317",
"title": "Influence Strength Aware Diffusion Models for Dynamic Influence Maximization in Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ithingscpscom/2011/4580a317/12OmNyoSbgj",
"parentPublication": {
"id": "proceedings/ithingscpscom/2011/4580/0",
"title": "International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2017/04/07779106",
"title": "Trajectory Community Discovery and Recommendation by Multi-Source Diffusion Modeling",
"doi": null,
"abstractUrl": "/journal/tk/2017/04/07779106/13rRUxASuGM",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2013/01/ttp2013010092",
"title": "Laplacian Sparse Coding, Hypergraph Laplacian Sparse Coding, and Applications",
"doi": null,
"abstractUrl": "/journal/tp/2013/01/ttp2013010092/13rRUxBrGi6",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/09/07064739",
"title": "Visual Classification by Z_$\\ell _1$_Z -Hypergraph Modeling",
"doi": null,
"abstractUrl": "/journal/tk/2015/09/07064739/13rRUxZzAhZ",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/12/07775068",
"title": "Prescribed Velocity Gradients for Highly Viscous SPH Fluids with Vorticity Diffusion",
"doi": null,
"abstractUrl": "/journal/tg/2017/12/07775068/13rRUxjQyvt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2022/2055/0/205500b159",
"title": "Spectral Hypergraph Sparsifiers of Nearly Linear Size",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2022/205500b159/1BtfB7K0XdK",
"parentPublication": {
"id": "proceedings/focs/2022/2055/0",
"title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2019/4952/0/495200a910",
"title": "New Notions and Constructions of Sparsification for Graphs and Hypergraphs",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2019/495200a910/1grNCDjCwXm",
"parentPublication": {
"id": "proceedings/focs/2019/4952/0",
"title": "2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2021/08/09001176",
"title": "Learning on Hypergraphs With Sparsity",
"doi": null,
"abstractUrl": "/journal/tp/2021/08/09001176/1hwt4aJICQw",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mdm/2021/2845/0/284500a151",
"title": "BaCIM: Balanced Competitive Influence Maximization based on Blocked Reverse Influence Sampling",
"doi": null,
"abstractUrl": "/proceedings-article/mdm/2021/284500a151/1v2QyEXROrC",
"parentPublication": {
"id": "proceedings/mdm/2021/2845/0",
"title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1jjA4XSBkVa",
"title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"acronym": "asonam",
"groupId": "1002866",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1jjAhNUEqWI",
"doi": "10.1145/3341161.3342867",
"title": "Random Preferential Attachment Hypergraph",
"normalizedTitle": "Random Preferential Attachment Hypergraph",
"abstract": "In the future, analysis of social networks will conceivably move from graphs to hypergraphs. However, theory has not yet caught up with this type of data organizational structure. By introducing and analyzing a general model of preferential attachment hypergraphs, this paper makes a step towards narrowing this gap. We consider a random preferential attachment model H(p,Y) for network evolution that allows arrivals of both nodes and hyperedges of random size. At each time step t, two possible events may occur: (1) [vertex arrival event:] with probability p > 0 a new vertex arrives and a new hyperedge of size y<sub>t</sub>, containing the new vertex and Y<sub>t</sub>-1 existing vertices, is added to the hypergraph; or (2) [hyperedge arrival event:] with probability 1-p, a new hyperedge of size Y<sub>t</sub>, containing Y<sub>t</sub> existing vertices, is added to the hypergraph. In both cases, the involved existing vertices are chosen independently at random according to the preferential attachment rule, i.e., with probability proportional to their degree, where the degree of a vertex is the number of edges containing it. Assuming general restrictions on the distribution of Y<sub>t</sub>, we prove that the H(p,Y) model generates power law networks, i.e., the expected fraction of nodes with degree k is proportional to k<sup>-1-Γ</sup>, where Γ = lim<sub>t→∞</sub> [(Σ<sup>t-1</sup>i=0 E[Yi])/(t(E[Yt]-ρ))] ∈ (0, ∞). This extends the special case of preferential attachment graphs, where Y<sub>t</sub> = 2 for every t, yielding Γ = 2/ (2- p). Therefore, our results show that the exponent of the degree distribution is sensitive to whether one considers the structure of a social network to be a hypergraph or a graph. We discuss, and provide examples for, the implications of these considerations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the future, analysis of social networks will conceivably move from graphs to hypergraphs. However, theory has not yet caught up with this type of data organizational structure. By introducing and analyzing a general model of preferential attachment hypergraphs, this paper makes a step towards narrowing this gap. We consider a random preferential attachment model H(p,Y) for network evolution that allows arrivals of both nodes and hyperedges of random size. At each time step t, two possible events may occur: (1) [vertex arrival event:] with probability p > 0 a new vertex arrives and a new hyperedge of size y<sub>t</sub>, containing the new vertex and Y<sub>t</sub>-1 existing vertices, is added to the hypergraph; or (2) [hyperedge arrival event:] with probability 1-p, a new hyperedge of size Y<sub>t</sub>, containing Y<sub>t</sub> existing vertices, is added to the hypergraph. In both cases, the involved existing vertices are chosen independently at random according to the preferential attachment rule, i.e., with probability proportional to their degree, where the degree of a vertex is the number of edges containing it. Assuming general restrictions on the distribution of Y<sub>t</sub>, we prove that the H(p,Y) model generates power law networks, i.e., the expected fraction of nodes with degree k is proportional to k<sup>-1-Γ</sup>, where Γ = lim<sub>t→∞</sub> [(Σ<sup>t-1</sup>i=0 E[Yi])/(t(E[Yt]-ρ))] ∈ (0, ∞). This extends the special case of preferential attachment graphs, where Y<sub>t</sub> = 2 for every t, yielding Γ = 2/ (2- p). Therefore, our results show that the exponent of the degree distribution is sensitive to whether one considers the structure of a social network to be a hypergraph or a graph. We discuss, and provide examples for, the implications of these considerations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the future, analysis of social networks will conceivably move from graphs to hypergraphs. However, theory has not yet caught up with this type of data organizational structure. By introducing and analyzing a general model of preferential attachment hypergraphs, this paper makes a step towards narrowing this gap. We consider a random preferential attachment model H(p,Y) for network evolution that allows arrivals of both nodes and hyperedges of random size. At each time step t, two possible events may occur: (1) [vertex arrival event:] with probability p > 0 a new vertex arrives and a new hyperedge of size yt, containing the new vertex and Yt-1 existing vertices, is added to the hypergraph; or (2) [hyperedge arrival event:] with probability 1-p, a new hyperedge of size Yt, containing Yt existing vertices, is added to the hypergraph. In both cases, the involved existing vertices are chosen independently at random according to the preferential attachment rule, i.e., with probability proportional to their degree, where the degree of a vertex is the number of edges containing it. Assuming general restrictions on the distribution of Yt, we prove that the H(p,Y) model generates power law networks, i.e., the expected fraction of nodes with degree k is proportional to k-1-Γ, where Γ = limt→∞ [(Σt-1i=0 E[Yi])/(t(E[Yt]-ρ))] ∈ (0, ∞). This extends the special case of preferential attachment graphs, where Yt = 2 for every t, yielding Γ = 2/ (2- p). Therefore, our results show that the exponent of the degree distribution is sensitive to whether one considers the structure of a social network to be a hypergraph or a graph. We discuss, and provide examples for, the implications of these considerations.",
"fno": "09073582",
"keywords": [
"Network Theory Graphs",
"Probability",
"Random Processes",
"Hyperedge Arrival Event",
"Random According",
"Preferential Attachment Rule",
"Probability Proportional",
"Power Law Networks",
"Preferential Attachment Graphs",
"Degree Distribution",
"Social Network",
"Random Preferential Attachment Hypergraph",
"Data Organizational Structure",
"Preferential Attachment Hypergraphs",
"Network Evolution",
"Hyperedges",
"Random Size",
"Vertex Arrival Event",
"Random Preferential Attachment Model",
"Social Network Services",
"Computational Modeling",
"Analytical Models",
"Complex Systems",
"Biological System Modeling",
"Bipartite Graph",
"Random Hypergraphs",
"Preferential Attachment",
"Social Networks",
"Degree Distribution"
],
"authors": [
{
"affiliation": "School of Electrical and Computer Engineering, Ben-Gurion University of the Negev,Be'er-Sheva,Israel",
"fullName": "Chen Avin",
"givenName": "Chen",
"surname": "Avin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical and Computer Engineering, Ben-Gurion University of the Negev,Be'er-Sheva,Israel",
"fullName": "Zvi Lotker",
"givenName": "Zvi",
"surname": "Lotker",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Weizmann Institute of Science,Department of Computer Science and Applied Mathematics,Rehovot,Israel",
"fullName": "Yinon Nahum",
"givenName": "Yinon",
"surname": "Nahum",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Weizmann Institute of Science,Department of Computer Science and Applied Mathematics,Rehovot,Israel",
"fullName": "David Peleg",
"givenName": "David",
"surname": "Peleg",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "asonam",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-08-01T00:00:00",
"pubType": "proceedings",
"pages": "398-405",
"year": "2019",
"issn": null,
"isbn": "978-1-4503-6868-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09072991",
"articleId": "1jjAaifZ9eM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09073229",
"articleId": "1jjAg9HDC4o",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2013/4892/0/4892a739",
"title": "Investigating Preferential Attachment Behavior over the Evolution of Disaster Response Networks",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892a739/12OmNAhxjEH",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/passat-socialcom/2011/1931/0/06113133",
"title": "Anti-preferential Attachment: If I Follow You, Will You Follow Me?",
"doi": null,
"abstractUrl": "/proceedings-article/passat-socialcom/2011/06113133/12OmNBSjITb",
"parentPublication": {
"id": "proceedings/passat-socialcom/2011/1931/0",
"title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isdea/2010/8333/2/05743515",
"title": "The Stability of p Preferential Attachment Networks",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2010/05743515/12OmNBUS7bw",
"parentPublication": {
"id": "proceedings/isdea/2010/8333/2",
"title": "2010 International Conference on Intelligent System Design and Engineering Application",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2011/0680/0/05983909",
"title": "Enhancing trust establishment in wireless multi-hop networks via preferential attachment",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2011/05983909/12OmNC17hVQ",
"parentPublication": {
"id": "proceedings/iscc/2011/0680/0",
"title": "2011 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2009/3920/0/3920a708",
"title": "Preferential Attachment in Constraint Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2009/3920a708/12OmNqJq4pR",
"parentPublication": {
"id": "proceedings/ictai/2009/3920/0",
"title": "2009 21st IEEE International Conference on Tools with Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2003/1939/0/19390369",
"title": "Link Attachment (Preferential and Otherwise) in Contributor-Run Digital Libraries",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2003/19390369/12OmNrJRP0C",
"parentPublication": {
"id": "proceedings/jcdl/2003/1939/0",
"title": "Digital Libraries, Joint Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2016/1192/0/1192a155",
"title": "Exploring New Cryptographical Construction of Complex Network Data",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2016/1192a155/12OmNwDSdtR",
"parentPublication": {
"id": "proceedings/dsc/2016/1192/0",
"title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/passat-socialcom/2012/5638/0/06406288",
"title": "Parallelizing Preferential Attachment Models for Generating Large-Scale Social Networks that Cannot Fit into Memory",
"doi": null,
"abstractUrl": "/proceedings-article/passat-socialcom/2012/06406288/12OmNx57HQo",
"parentPublication": {
"id": "proceedings/passat-socialcom/2012/5638/0",
"title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tn/2015/01/07024931",
"title": "On the Influence of the Seed Graph in the Preferential Attachment Model",
"doi": null,
"abstractUrl": "/journal/tn/2015/01/07024931/13rRUx0xQ0l",
"parentPublication": {
"id": "trans/tn",
"title": "IEEE Transactions on Network Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tn/2017/01/07725526",
"title": "Analysis of Centrality in Sublinear Preferential Attachment Trees via the Crump-Mode-Jagers Branching Process",
"doi": null,
"abstractUrl": "/journal/tn/2017/01/07725526/13rRUyfbwrt",
"parentPublication": {
"id": "trans/tn",
"title": "IEEE Transactions on Network Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1r5431kxiAE",
"title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"acronym": "trustcom",
"groupId": "1800729",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1r54ktrpwly",
"doi": "10.1109/TrustCom50675.2020.00215",
"title": "Hypergraph Attention Networks",
"normalizedTitle": "Hypergraph Attention Networks",
"abstract": "Recently, graph neural networks have achieved great success on the representation learning of the graph-structured data. However, these networks just consider the pairwise connection between nodes which cannot model the complicated connections of data in the real world. Thus, researchers began to pay attention to the hypergraph modeling. In recent years, some hypergraph neural networks have been proposed to aggregate the information of the hypergraph for representation learning. In this paper, we present hypergraph attention networks (HGATs) to encode the high-order data relation in the hypergraph. Specifically, our proposed HGATs consist of two modules: attentive vertex aggregation module and attentive hyperedge aggregation module. These two modules can implicitly assign different aggregation weights to different connected hyperedge/vertex to characterize the complex relations among data. We stack these modules to pass the messages between the hyperedges and vertices to refine the vertex/hyperedge features. Experimental results on the ModelNet40 and NTU2012 datasets show that our proposed HGATs can achieve superior performance for the visual object recognition tasks. Furthermore, we employ our HGAT for multi-view representation learning and better object classification results are achieved.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recently, graph neural networks have achieved great success on the representation learning of the graph-structured data. However, these networks just consider the pairwise connection between nodes which cannot model the complicated connections of data in the real world. Thus, researchers began to pay attention to the hypergraph modeling. In recent years, some hypergraph neural networks have been proposed to aggregate the information of the hypergraph for representation learning. In this paper, we present hypergraph attention networks (HGATs) to encode the high-order data relation in the hypergraph. Specifically, our proposed HGATs consist of two modules: attentive vertex aggregation module and attentive hyperedge aggregation module. These two modules can implicitly assign different aggregation weights to different connected hyperedge/vertex to characterize the complex relations among data. We stack these modules to pass the messages between the hyperedges and vertices to refine the vertex/hyperedge features. Experimental results on the ModelNet40 and NTU2012 datasets show that our proposed HGATs can achieve superior performance for the visual object recognition tasks. Furthermore, we employ our HGAT for multi-view representation learning and better object classification results are achieved.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recently, graph neural networks have achieved great success on the representation learning of the graph-structured data. However, these networks just consider the pairwise connection between nodes which cannot model the complicated connections of data in the real world. Thus, researchers began to pay attention to the hypergraph modeling. In recent years, some hypergraph neural networks have been proposed to aggregate the information of the hypergraph for representation learning. In this paper, we present hypergraph attention networks (HGATs) to encode the high-order data relation in the hypergraph. Specifically, our proposed HGATs consist of two modules: attentive vertex aggregation module and attentive hyperedge aggregation module. These two modules can implicitly assign different aggregation weights to different connected hyperedge/vertex to characterize the complex relations among data. We stack these modules to pass the messages between the hyperedges and vertices to refine the vertex/hyperedge features. Experimental results on the ModelNet40 and NTU2012 datasets show that our proposed HGATs can achieve superior performance for the visual object recognition tasks. Furthermore, we employ our HGAT for multi-view representation learning and better object classification results are achieved.",
"fno": "438000b560",
"keywords": [
"Graph Theory",
"Neural Nets",
"Object Recognition",
"Hypergraph Neural Networks",
"Hypergraph Attention Networks",
"HGAT",
"High Order Data Relation",
"Attentive Vertex Aggregation Module",
"Attentive Hyperedge Aggregation Module",
"Different Aggregation Weights",
"Different Connected Hyperedge",
"Multiview Representation Learning",
"Graph Structured Data",
"Pairwise Connection",
"Complicated Connections",
"Hypergraph Modeling",
"Visualization",
"Stacking",
"Refining",
"Transforms",
"Data Models",
"Security",
"Task Analysis",
"Hypergraph",
"Graph Neural Networks",
"Attention Module",
"Object Recognition"
],
"authors": [
{
"affiliation": "School of Information Science and Technology, University of Science and Technology of China,Hefei,China",
"fullName": "Chaofan Chen",
"givenName": "Chaofan",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Purdue University,Department of Computer and Information Technology,West Lafayette,USA",
"fullName": "Zelei Cheng",
"givenName": "Zelei",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Integrated Innovation Institute, Carnegie Mellon University,Mountain View,USA",
"fullName": "Zuotian Li",
"givenName": "Zuotian",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "International School, Beijing University of Posts and Telecommunications,Beijing,China",
"fullName": "Manyi Wang",
"givenName": "Manyi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "trustcom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1560-1565",
"year": "2020",
"issn": null,
"isbn": "978-1-6654-0392-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "438000b556",
"articleId": "1r5465qFFtu",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "438000b566",
"articleId": "1r547GVVytG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2015/9504/0/9504a775",
"title": "Scalable Hypergraph Learning and Processing",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2015/9504a775/12OmNB8TUhV",
"parentPublication": {
"id": "proceedings/icdm/2015/9504/0",
"title": "2015 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wism/2009/3817/0/3817a064",
"title": "Hypergraph Partitioning for Community Discovery in Complex Network",
"doi": null,
"abstractUrl": "/proceedings-article/wism/2009/3817a064/12OmNCd2rs4",
"parentPublication": {
"id": "proceedings/wism/2009/3817/0",
"title": "Web Information Systems and Mining, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2010/6984/0/05540012",
"title": "Image retrieval via probabilistic hypergraph ranking",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2010/05540012/12OmNxEjXUo",
"parentPublication": {
"id": "proceedings/cvpr/2010/6984/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2015/7082/0/07177477",
"title": "Multimodal hypergraph learning for microblog sentiment prediction",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2015/07177477/12OmNyugyOJ",
"parentPublication": {
"id": "proceedings/icme/2015/7082/0",
"title": "2015 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/09/07064739",
"title": "Visual Classification by Z_$\\ell _1$_Z -Hypergraph Modeling",
"doi": null,
"abstractUrl": "/journal/tk/2015/09/07064739/13rRUxZzAhZ",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/06/ttp2011061266",
"title": "Unsupervised Image Categorization by Hypergraph Partition",
"doi": null,
"abstractUrl": "/journal/tp/2011/06/ttp2011061266/13rRUygT7ak",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2021/0126/0/09669280",
"title": "A Simplex Hypergraph Clustering Method for Detecting Higher-order Modules in Microbial Network",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2021/09669280/1A9WfD2dvkk",
"parentPublication": {
"id": "proceedings/bibm/2021/0126/0",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/03/09782536",
"title": "Hypergraph Collaborative Network on Vertices and Hyperedges",
"doi": null,
"abstractUrl": "/journal/tp/2023/03/09782536/1DGRXX38Y9i",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/03/09795251",
"title": "HGNN<sup>+</sup>: General Hypergraph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tp/2023/03/09795251/1Eb15xX3fHy",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2019/6868/0/09073582",
"title": "Random Preferential Attachment Hypergraph",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2019/09073582/1jjAhNUEqWI",
"parentPublication": {
"id": "proceedings/asonam/2019/6868/0",
"title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBkfRg3",
"title": "25th Annual Symposium onFoundations of Computer Science, 1984.",
"acronym": "focs",
"groupId": "1000292",
"volume": "0",
"displayVolume": "0",
"year": "1984",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNArthdg",
"doi": "10.1109/SFCS.1984.715903",
"title": "Embedding Planar Graphs In Seven Pages",
"normalizedTitle": "Embedding Planar Graphs In Seven Pages",
"abstract": "This paper investigates the problem of embedding planar graphs in books of few pages. An efficient algorithm for embedding a planar graph in a book establishes an upper bound of seven pages for any planar graph. This disproves a conjecture of Bernhart and Kainen that the pagenumber of a planar graph can be arbitrarily large. It is also shown that the stellations of K/sub 3/ have pagenumber three, the best possible.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper investigates the problem of embedding planar graphs in books of few pages. An efficient algorithm for embedding a planar graph in a book establishes an upper bound of seven pages for any planar graph. This disproves a conjecture of Bernhart and Kainen that the pagenumber of a planar graph can be arbitrarily large. It is also shown that the stellations of K/sub 3/ have pagenumber three, the best possible.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper investigates the problem of embedding planar graphs in books of few pages. An efficient algorithm for embedding a planar graph in a book establishes an upper bound of seven pages for any planar graph. This disproves a conjecture of Bernhart and Kainen that the pagenumber of a planar graph can be arbitrarily large. It is also shown that the stellations of K/sub 3/ have pagenumber three, the best possible.",
"fno": "0715903",
"keywords": [],
"authors": [
{
"affiliation": "University of North Carolina",
"fullName": "L. Heath",
"givenName": "L.",
"surname": "Heath",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "focs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1984-10-01T00:00:00",
"pubType": "proceedings",
"pages": "74-83",
"year": "1984",
"issn": null,
"isbn": "0-8186-0591-X",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "0715902",
"articleId": "12OmNx5GU5p",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "0715904",
"articleId": "12OmNvAAtlD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cit/2017/0958/0/0958a261",
"title": "The Enumeration of Flippable Edges in Maximal Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2017/0958a261/12OmNvnwVoF",
"parentPublication": {
"id": "proceedings/cit/2017/0958/0",
"title": "2017 IEEE International Conference on Computer and Information Technology (CIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/1983/5428/0/542800242",
"title": "Shortest path problems in planar graphs",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1983/542800242/12OmNwM6A6i",
"parentPublication": {
"id": "proceedings/focs/1983/5428/0",
"title": "24th Annual Symposium on Foundations of Computer Science (sfcs 1983)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwads/2002/7624/0/01194688",
"title": "A new better algorithm for rectilinear embedding of four-regular graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iwads/2002/01194688/12OmNxwncjI",
"parentPublication": {
"id": "proceedings/iwads/2002/7624/0",
"title": "Proceedings 2nd International Workshop on Autonomous Decentralized System",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssst/1994/5320/0/00287921",
"title": "Force embedding of a planar graph",
"doi": null,
"abstractUrl": "/proceedings-article/ssst/1994/00287921/12OmNxxNbUJ",
"parentPublication": {
"id": "proceedings/ssst/1994/5320/0",
"title": "Proceedings of 26th Southeastern Symposium on System Theory",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2013/5135/0/5135a177",
"title": "Non-positive Curvature and the Planar Embedding Conjecture",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2013/5135a177/12OmNzlUKLb",
"parentPublication": {
"id": "proceedings/focs/2013/5135/0",
"title": "2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/1999/0409/0/04090319",
"title": "Finding Double Euler Trails of Planar Graphs in Linear Time",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1999/04090319/12OmNzvz6NW",
"parentPublication": {
"id": "proceedings/focs/1999/0409/0",
"title": "40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09721643",
"title": "Geometry-Aware Planar Embedding of Treelike Structures",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09721643/1BhzmWFFD9K",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2019/4952/0/495200a862",
"title": "Planar Graphs have Bounded Queue-Number",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2019/495200a862/1grNCdfmyk0",
"parentPublication": {
"id": "proceedings/focs/2019/4952/0",
"title": "2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2020/2903/0/09101687",
"title": "GraphAE: Adaptive Embedding across Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2020/09101687/1kaMJYf8j16",
"parentPublication": {
"id": "proceedings/icde/2020/2903/0",
"title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2020/9621/0/962100a577",
"title": "Adjacency Labelling for Planar Graphs (and Beyond)",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2020/962100a577/1qyxyY8SyWs",
"parentPublication": {
"id": "proceedings/focs/2020/9621/0",
"title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBBhN9F",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"acronym": "cit",
"groupId": "1001306",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCwCLsz",
"doi": "10.1109/CIT.2008.4594691",
"title": "Analysis of planar mirror catadioptric stereo systems based on epipolar geometry",
"normalizedTitle": "Analysis of planar mirror catadioptric stereo systems based on epipolar geometry",
"abstract": "Planar mirrors have been used successfully in catadioptric stereo systems to capture stereo images with a single camera. These planar catadioptric stereo (PCS) systems not only provide radiometric advantages over traditional two-camera stereo, but also reduce the complexity and cost of acquiring stereoscopic video. Although much research has been done on the design of the PCS system, little attention has been paid to the analysis of its epipolar geometry, that is, the fundamental matrix. In this paper, we investigated features of the PCS system and proved that certain structure can be approximated by affine epipolar geometry. Experimental results verify that by using the affine model with fewer parameters, estimation of the fundamental matrix for a PCS system can be more robust, precise, and much easier to implement.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Planar mirrors have been used successfully in catadioptric stereo systems to capture stereo images with a single camera. These planar catadioptric stereo (PCS) systems not only provide radiometric advantages over traditional two-camera stereo, but also reduce the complexity and cost of acquiring stereoscopic video. Although much research has been done on the design of the PCS system, little attention has been paid to the analysis of its epipolar geometry, that is, the fundamental matrix. In this paper, we investigated features of the PCS system and proved that certain structure can be approximated by affine epipolar geometry. Experimental results verify that by using the affine model with fewer parameters, estimation of the fundamental matrix for a PCS system can be more robust, precise, and much easier to implement.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Planar mirrors have been used successfully in catadioptric stereo systems to capture stereo images with a single camera. These planar catadioptric stereo (PCS) systems not only provide radiometric advantages over traditional two-camera stereo, but also reduce the complexity and cost of acquiring stereoscopic video. Although much research has been done on the design of the PCS system, little attention has been paid to the analysis of its epipolar geometry, that is, the fundamental matrix. In this paper, we investigated features of the PCS system and proved that certain structure can be approximated by affine epipolar geometry. Experimental results verify that by using the affine model with fewer parameters, estimation of the fundamental matrix for a PCS system can be more robust, precise, and much easier to implement.",
"fno": "04594691",
"keywords": [
"Affine Transforms",
"Computational Geometry",
"Matrix Algebra",
"Stereo Image Processing",
"Planar Mirror Catadioptric Stereo Systems",
"Epipolar Geometry",
"Stereo Images",
"Planar Catadioptric Stereo Systems",
"Stereoscopic Video",
"Fundamental Matrix",
"Affine Model",
"Mirrors",
"Cameras",
"Transmission Line Matrix Methods",
"Stereo Vision",
"Geometry",
"Reflection",
"Equations"
],
"authors": [
{
"affiliation": "National Yunlin Univ. of Sci. and Tech., Dept. of Electrical Engineering, #123 University Road, Section 3, Douliou, Taiwan",
"fullName": "Hsien-Huang P. Wu",
"givenName": "Hsien-Huang P.",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chung-Shan Institute of Sci. and Tech., Solid-State Devices Materials Section, P.O. Box 90008-8-7, Long-Tan, Taiwan",
"fullName": "Soon-Lin Chen",
"givenName": null,
"surname": "Soon-Lin Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chung-Shan Institute of Sci. and Tech., Solid-State Devices Materials Section, P.O. Box 90008-8-7, Long-Tan, Taiwan",
"fullName": "Ping-Kuo Weng",
"givenName": null,
"surname": "Ping-Kuo Weng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Chung-Shan Institute of Sci. and Tech., Solid-State Devices Materials Section, P.O. Box 90008-8-7, Long-Tan, Taiwan",
"fullName": "Ying-Yih Wu",
"givenName": null,
"surname": "Ying-Yih Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": null,
"isbn": "978-1-4244-2357-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04594690",
"articleId": "12OmNzdoMLc",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04594692",
"articleId": "12OmNwBjP7x",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2009/4420/0/05459147",
"title": "Globally optimal affine epipolar geometry from apparent contours",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2009/05459147/12OmNvT2pfY",
"parentPublication": {
"id": "proceedings/iccv/2009/4420/0",
"title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109b755",
"title": "Epipolar-Based Stereo Tracking Without Explicit 3D Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109b755/12OmNxwnccN",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2001/1143/1/00937564",
"title": "Cheirality in epipolar geometry",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2001/00937564/12OmNz6iOGN",
"parentPublication": {
"id": "proceedings/iccv/2001/1143/1",
"title": "Computer Vision, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1999/0149/1/01491022",
"title": "Planar Catadioptric Stereo: Geometry and Calibration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1999/01491022/12OmNzUxO9t",
"parentPublication": {
"id": "proceedings/cvpr/1999/0149/2",
"title": "Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crv/2011/4362/0/4362a146",
"title": "Refractive Epipolar Geometry for Underwater Stereo Matching",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2011/4362a146/12OmNzlly4y",
"parentPublication": {
"id": "proceedings/crv/2011/4362/0",
"title": "2011 Canadian Conference on Computer and Robot Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2013/05/ttp2013051206",
"title": "Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes",
"doi": null,
"abstractUrl": "/journal/tp/2013/05/ttp2013051206/13rRUEgs2Na",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2002/02/i0224",
"title": "Rectified Catadioptric Stereo Sensors",
"doi": null,
"abstractUrl": "/journal/tp/2002/02/i0224/13rRUyeTVj3",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300a652",
"title": "Topological Labelling of Scene using Background/Foreground Separation and Epipolar Geometry",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300a652/1i5mmanKa6A",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/4/01699819",
"title": "Epipolar Geometry from Two Correspondences",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/01699819/1i5nhzSKtKo",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/4",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/07/09204467",
"title": "Ray-Space Epipolar Geometry for Light Field Cameras",
"doi": null,
"abstractUrl": "/journal/tp/2022/07/09204467/1nkyUb2Y54k",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy4r3R2",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwDSdie",
"doi": "10.1109/CVPR.2009.5206618",
"title": "Planar orientation from blur gradients in a single image",
"normalizedTitle": "Planar orientation from blur gradients in a single image",
"abstract": "We present a focus-based method to recover the orientation of a textured planar surface patch from a single image. The method exploits the relationship between the orientation of equifocal (i.e. uniformly-blurred) contours in the image and the plane's tilt and slant angles. Compared to previous methods that determine planar orientation, we make fewer assumptions about the texture and remove the restriction that images must be acquired through a pinhole aperture. Our method estimates slant and tilt of an image patch in a single image, as compared to depth from defocus methods that require two or more input images. Experiments are performed using a large set of test images.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a focus-based method to recover the orientation of a textured planar surface patch from a single image. The method exploits the relationship between the orientation of equifocal (i.e. uniformly-blurred) contours in the image and the plane's tilt and slant angles. Compared to previous methods that determine planar orientation, we make fewer assumptions about the texture and remove the restriction that images must be acquired through a pinhole aperture. Our method estimates slant and tilt of an image patch in a single image, as compared to depth from defocus methods that require two or more input images. Experiments are performed using a large set of test images.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a focus-based method to recover the orientation of a textured planar surface patch from a single image. The method exploits the relationship between the orientation of equifocal (i.e. uniformly-blurred) contours in the image and the plane's tilt and slant angles. Compared to previous methods that determine planar orientation, we make fewer assumptions about the texture and remove the restriction that images must be acquired through a pinhole aperture. Our method estimates slant and tilt of an image patch in a single image, as compared to depth from defocus methods that require two or more input images. Experiments are performed using a large set of test images.",
"fno": "05206618",
"keywords": [
"Edge Detection",
"Image Texture",
"Planar Orientation",
"Blur Gradients",
"Focus Based Method",
"Textured Planar Surface Patch",
"Image Contours",
"Image Patch",
"Apertures",
"Testing",
"Focusing",
"Pixel",
"Optical Sensors",
"Cameras",
"Shape",
"Computer Vision",
"Lenses",
"Layout"
],
"authors": [
{
"affiliation": "Honeywell Labs, Golden Valley, MN, USA",
"fullName": "Scott McCloskey",
"givenName": "Scott",
"surname": "McCloskey",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "McGill University, Montreal, QC, Canada",
"fullName": "Michael Langer",
"givenName": "Michael",
"surname": "Langer",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-06-01T00:00:00",
"pubType": "proceedings",
"pages": "2318-2325",
"year": "2009",
"issn": "1063-6919",
"isbn": "978-1-4244-3992-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05206617",
"articleId": "12OmNzmtWHb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05206619",
"articleId": "12OmNz61deU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2000/0750/1/07501896",
"title": "Estimating Sensor Orientation in Cameras",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2000/07501896/12OmNBLdKIc",
"parentPublication": {
"id": "proceedings/icpr/2000/0750/1",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761514",
"title": "Depth recovery using defocus blur at infinity",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761514/12OmNBkxstu",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460594",
"title": "Deblurring depth blur and motion blur simultaneously by using space-time coding",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460594/12OmNBp52IS",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crv/2016/2491/0/2491a281",
"title": "Blur Calibration for Depth from Defocus",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2016/2491a281/12OmNs59JP3",
"parentPublication": {
"id": "proceedings/crv/2016/2491/0",
"title": "2016 13th Conference on Computer and Robot Vision (CRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2014/4308/0/4308a171",
"title": "GPS Refinement and Camera Orientation Estimation from a Single Image and a 2D Map",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2014/4308a171/12OmNxd4tjU",
"parentPublication": {
"id": "proceedings/cvprw/2014/4308/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spwhos/1999/0140/0/01400178",
"title": "Estimating the Orientation of Planar Surfaces using the Phase Differencing Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/spwhos/1999/01400178/12OmNxveNKa",
"parentPublication": {
"id": "proceedings/spwhos/1999/0140/0",
"title": "Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics. SPW-HOS '99",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1998/8821/2/882120181",
"title": "A parametric approach for estimating the orientation of planar surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1998/882120181/12OmNxw5Bbd",
"parentPublication": {
"id": "proceedings/icip/1998/8821/3",
"title": "Image Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2009/4442/0/05457520",
"title": "Single image focus editing",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2009/05457520/12OmNxwWozJ",
"parentPublication": {
"id": "proceedings/iccvw/2009/4442/0",
"title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cso/2009/3605/1/3605a420",
"title": "Three-Dimensional Shape Recovery Based on Single Historical Image",
"doi": null,
"abstractUrl": "/proceedings-article/cso/2009/3605a420/12OmNxzMnYF",
"parentPublication": {
"id": "cso/2009/3605/1",
"title": "2009 International Joint Conference on Computational Sciences and Optimization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1991/2148/0/00139763",
"title": "A stereoscopic camera employing a single main lens",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1991/00139763/12OmNz5JCfI",
"parentPublication": {
"id": "proceedings/cvpr/1991/2148/0",
"title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyQYtf0",
"title": "Proceedings of 26th Southeastern Symposium on System Theory",
"acronym": "ssst",
"groupId": "1000732",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxxNbUJ",
"doi": "10.1109/SSST.1994.287921",
"title": "Force embedding of a planar graph",
"normalizedTitle": "Force embedding of a planar graph",
"abstract": "The planar embedding of a planar graph with the simultaneous minimization of an objective function of graph edge lengths is considered. It is shown that the so-called force embedding of a planar graph dictates a distinctive placement of the graph vertices and edges. This placement is a rectilinear edge embedding in which there are no edge intersections and the quadratic objective function of the edge lengths equals its global minimum. The, effectively O(mn), algorithm for finding the force embedding of a planar graph, where m and n are the number of the graph edges and the number of the graph vertices respectively, is presented.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "The planar embedding of a planar graph with the simultaneous minimization of an objective function of graph edge lengths is considered. It is shown that the so-called force embedding of a planar graph dictates a distinctive placement of the graph vertices and edges. This placement is a rectilinear edge embedding in which there are no edge intersections and the quadratic objective function of the edge lengths equals its global minimum. The, effectively O(mn), algorithm for finding the force embedding of a planar graph, where m and n are the number of the graph edges and the number of the graph vertices respectively, is presented.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The planar embedding of a planar graph with the simultaneous minimization of an objective function of graph edge lengths is considered. It is shown that the so-called force embedding of a planar graph dictates a distinctive placement of the graph vertices and edges. This placement is a rectilinear edge embedding in which there are no edge intersections and the quadratic objective function of the edge lengths equals its global minimum. The, effectively O(mn), algorithm for finding the force embedding of a planar graph, where m and n are the number of the graph edges and the number of the graph vertices respectively, is presented.",
"fno": "00287921",
"keywords": [
"Minimisation",
"Graph Theory",
"Circuit CAD",
"VLSI",
"Network Analysis",
"Network Topology",
"Planar Embedding",
"Planar Graph",
"Force Embedding",
"Simultaneous Minimization",
"Objective Function",
"Edge Lengths",
"Vertices",
"Rectilinear Edge Embedding",
"Edge Intersections",
"Quadratic Objective Function",
"Minimization",
"Very Large Scale Integration",
"Graph Theory",
"Electronic Circuits",
"Circuit Synthesis",
"Energy States"
],
"authors": [
{
"affiliation": "Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA",
"fullName": "A.Y. Tetelbaum",
"givenName": "A.Y.",
"surname": "Tetelbaum",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ssst",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "2,3,4,5,6",
"year": "1994",
"issn": "0094-2898",
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00287920",
"articleId": "12OmNzX6cuy",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00287922",
"articleId": "12OmNqzu6Ia",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/focs/1984/0591/0/0715903",
"title": "Embedding Planar Graphs In Seven Pages",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1984/0715903/12OmNArthdg",
"parentPublication": {
"id": "proceedings/focs/1984/0591/0",
"title": "25th Annual Symposium onFoundations of Computer Science, 1984.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfcc/2009/3591/0/3591a518",
"title": "An Algorithm for Visibility Graph Recognition on Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icfcc/2009/3591a518/12OmNBO3JXP",
"parentPublication": {
"id": "proceedings/icfcc/2009/3591/0",
"title": "2009 International Conference on Future Computer and Communication (ICFCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccc/2009/3717/0/3717a203",
"title": "Planar Graph Isomorphism is in Log-Space",
"doi": null,
"abstractUrl": "/proceedings-article/ccc/2009/3717a203/12OmNBfZSkX",
"parentPublication": {
"id": "proceedings/ccc/2009/3717/0",
"title": "2009 24th Annual IEEE Conference on Computational Complexity",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uksim/2012/4682/0/4682a039",
"title": "On Untangled Meshes via Fruchterman Reingold Force Directed Graph Embedding",
"doi": null,
"abstractUrl": "/proceedings-article/uksim/2012/4682a039/12OmNvDZF63",
"parentPublication": {
"id": "proceedings/uksim/2012/4682/0",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2005/2468/0/24680647",
"title": "A linear-time approximation scheme for planar weighted TSP",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2005/24680647/12OmNvTTcke",
"parentPublication": {
"id": "proceedings/focs/2005/2468/0",
"title": "46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdcat/2009/3914/0/3914a067",
"title": "Conditional Fault-Tolerant Cycle Embedding of Star Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pdcat/2009/3914a067/12OmNxveNDP",
"parentPublication": {
"id": "proceedings/pdcat/2009/3914/0",
"title": "2009 International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a585",
"title": "Embedding Wellformed Euler Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1990/05/t0694",
"title": "Unifying Maximum Cut and Minimum Cut of a Planar Graph",
"doi": null,
"abstractUrl": "/journal/tc/1990/05/t0694/13rRUxCitIo",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2020/8316/0/831600a442",
"title": "Force2Vec: Parallel Force-Directed Graph Embedding",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2020/831600a442/1r54GQx8BUc",
"parentPublication": {
"id": "proceedings/icdm/2020/8316/0",
"title": "2020 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2021/3577/0/357700a539",
"title": "Leveraging High Dimensional Spatial Graph Embedding as a Heuristic for Graph Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2021/357700a539/1uHgOOTDKjS",
"parentPublication": {
"id": "proceedings/ipdpsw/2021/3577/0",
"title": "2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwnH4Ql",
"title": "Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "1",
"displayVolume": "0",
"year": "1999",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzUxO9t",
"doi": "10.1109/CVPR.1999.786912",
"title": "Planar Catadioptric Stereo: Geometry and Calibration",
"normalizedTitle": "Planar Catadioptric Stereo: Geometry and Calibration",
"abstract": "By using mirror reflections of a scene, stereo images can be captured with a single camera (catadioptric stereo). Single camera stereo provides both geometric and radiometric advantages over traditional two camera stereo. In this paper, we discuss the geometry and calibration of catadioptric stereo with two planar mirrors and show how the relative orientation, the epipolar geometry and the estimation of the focal length are constrained by planar motion. In addition, we have implemented a real-time system which demonstrates the viability of stereo with mirrors as an alternative to traditional two camera stereo.",
"abstracts": [
{
"abstractType": "Regular",
"content": "By using mirror reflections of a scene, stereo images can be captured with a single camera (catadioptric stereo). Single camera stereo provides both geometric and radiometric advantages over traditional two camera stereo. In this paper, we discuss the geometry and calibration of catadioptric stereo with two planar mirrors and show how the relative orientation, the epipolar geometry and the estimation of the focal length are constrained by planar motion. In addition, we have implemented a real-time system which demonstrates the viability of stereo with mirrors as an alternative to traditional two camera stereo.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "By using mirror reflections of a scene, stereo images can be captured with a single camera (catadioptric stereo). Single camera stereo provides both geometric and radiometric advantages over traditional two camera stereo. In this paper, we discuss the geometry and calibration of catadioptric stereo with two planar mirrors and show how the relative orientation, the epipolar geometry and the estimation of the focal length are constrained by planar motion. In addition, we have implemented a real-time system which demonstrates the viability of stereo with mirrors as an alternative to traditional two camera stereo.",
"fno": "01491022",
"keywords": [
"Calibration",
"Stereo",
"Sensors"
],
"authors": [
{
"affiliation": "Columbia University",
"fullName": "Joshua Gluckman",
"givenName": "Joshua",
"surname": "Gluckman",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Columbia University",
"fullName": "Shree K. Nayar",
"givenName": "Shree K.",
"surname": "Nayar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1999-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1022",
"year": "1999",
"issn": "1063-6919",
"isbn": "0-7695-0149-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01491015",
"articleId": "12OmNviZluq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01491029",
"articleId": "12OmNzcxZcy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAS9zxd",
"title": "2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS)",
"acronym": "focs",
"groupId": "1000292",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzlUKLb",
"doi": "10.1109/FOCS.2013.27",
"title": "Non-positive Curvature and the Planar Embedding Conjecture",
"normalizedTitle": "Non-positive Curvature and the Planar Embedding Conjecture",
"abstract": "The planar embedding conjecture asserts that any planar metric admits an embedding into L1 with constant distortion. This is a well-known open problem with important algorithmic implications, and has received a lot of attention over the past two decades. Despite significant efforts, it has been verified only for some very restricted cases, while the general problem remains elusive. In this paper we make progress towards resolving this conjecture. We show that every planar metric of non-positive curvature admits a constant-distortion embedding into L1. This confirms the planar embedding conjecture for the case of non-positively curved metrics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The planar embedding conjecture asserts that any planar metric admits an embedding into L1 with constant distortion. This is a well-known open problem with important algorithmic implications, and has received a lot of attention over the past two decades. Despite significant efforts, it has been verified only for some very restricted cases, while the general problem remains elusive. In this paper we make progress towards resolving this conjecture. We show that every planar metric of non-positive curvature admits a constant-distortion embedding into L1. This confirms the planar embedding conjecture for the case of non-positively curved metrics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The planar embedding conjecture asserts that any planar metric admits an embedding into L1 with constant distortion. This is a well-known open problem with important algorithmic implications, and has received a lot of attention over the past two decades. Despite significant efforts, it has been verified only for some very restricted cases, while the general problem remains elusive. In this paper we make progress towards resolving this conjecture. We show that every planar metric of non-positive curvature admits a constant-distortion embedding into L1. This confirms the planar embedding conjecture for the case of non-positively curved metrics.",
"fno": "5135a177",
"keywords": [
"Nickel",
"Extraterrestrial Measurements",
"Geometry",
"Upper Bound",
"Skeleton",
"Computer Science",
"L 1",
"Planar Embedding Conjecture",
"Planar Graphs",
"Metric Embeddings",
"Non Positive Curvature",
"Multi Commodity Flows",
"Sparsest Cut"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci. & Eng., Ohio State Univ., Columbus, OH, USA",
"fullName": "Anastasios Sidiropoulos",
"givenName": "Anastasios",
"surname": "Sidiropoulos",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "focs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-10-01T00:00:00",
"pubType": "proceedings",
"pages": "177-186",
"year": "2013",
"issn": "0272-5428",
"isbn": "978-0-7695-5135-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5135a167",
"articleId": "12OmNxdDFHb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5135a187",
"articleId": "12OmNzcPAAw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/focs/1984/0591/0/0715903",
"title": "Embedding Planar Graphs In Seven Pages",
"doi": null,
"abstractUrl": "/proceedings-article/focs/1984/0715903/12OmNArthdg",
"parentPublication": {
"id": "proceedings/focs/1984/0591/0",
"title": "25th Annual Symposium onFoundations of Computer Science, 1984.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2013/5135/0/5135a658",
"title": "Fourier Sparsity, Spectral Norm, and the Log-Rank Conjecture",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2013/5135a658/12OmNBtl1Bo",
"parentPublication": {
"id": "proceedings/focs/2013/5135/0",
"title": "2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sct/1995/7052/0/70520111",
"title": "The instance complexity conjecture",
"doi": null,
"abstractUrl": "/proceedings-article/sct/1995/70520111/12OmNCcKQQx",
"parentPublication": {
"id": "proceedings/sct/1995/7052/0",
"title": "Structure in Complexity Theory Conference, Annual",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2017/0958/0/0958a261",
"title": "The Enumeration of Flippable Edges in Maximal Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2017/0958a261/12OmNvnwVoF",
"parentPublication": {
"id": "proceedings/cit/2017/0958/0",
"title": "2017 IEEE International Conference on Computer and Information Technology (CIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2008/3436/0/3436a337",
"title": "Some Results on Greedy Embeddings in Metric Spaces",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2008/3436a337/12OmNx57HJl",
"parentPublication": {
"id": "proceedings/focs/2008/3436/0",
"title": "2008 49th Annual IEEE Symposium on Foundations of Computer Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lics/2017/3018/0/08005107",
"title": "The Weisfeiler-Leman dimension of planar graphs is at most 3",
"doi": null,
"abstractUrl": "/proceedings-article/lics/2017/08005107/12OmNxAlA0k",
"parentPublication": {
"id": "proceedings/lics/2017/3018/0",
"title": "2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssst/1994/5320/0/00287921",
"title": "Force embedding of a planar graph",
"doi": null,
"abstractUrl": "/proceedings-article/ssst/1994/00287921/12OmNxxNbUJ",
"parentPublication": {
"id": "proceedings/ssst/1994/5320/0",
"title": "Proceedings of 26th Southeastern Symposium on System Theory",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09721643",
"title": "Geometry-Aware Planar Embedding of Treelike Structures",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09721643/1BhzmWFFD9K",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2019/4952/0/495200a876",
"title": "Parametric Shortest Paths in Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2019/495200a876/1grNBhOIiGI",
"parentPublication": {
"id": "proceedings/focs/2019/4952/0",
"title": "2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300b029",
"title": "Single-Image Piece-Wise Planar 3D Reconstruction via Associative Embedding",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300b029/1gyrGv78I00",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwHz03N",
"title": "2017 IEEE International Conference on Data Mining (ICDM)",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy50g9y",
"doi": "10.1109/ICDM.2017.14",
"title": "Revisiting Spectral Graph Clustering with Generative Community Models",
"normalizedTitle": "Revisiting Spectral Graph Clustering with Generative Community Models",
"abstract": "The methodology of community detection can be divided into two principles: imposing a network model on a given graph, or optimizing a designed objective function. The former provides guarantees on theoretical detectability but falls short when the graph is inconsistent with the underlying model. The latter is model-free but fails to provide quality assurance for the detected communities. In this paper, we propose a novel unified framework to combine the advantages of these two principles. The presented method, SGC-GEN, not only considers the detection error caused by the corresponding model mismatch to a given graph, but also yields a theoretical guarantee on community detectability by analyzing Spectral Graph Clustering (SGC) under GENerative community models (GCMs). SGC-GEN incorporates the predictability on correct community detection with a measure of community fitness to GCMs. It resembles the formulation of supervised learning problems by enabling various community detection loss functions and model mismatch metrics. We further establish a theoretical condition for correct community detection using the normalized graph Laplacian matrix under a GCM, which provides a novel data-driven loss function for SGC-GEN. In addition, we present an effective algorithm to implement SGC-GEN, and show that the computational complexity of SGC-GEN is comparable to the baseline methods. Our experiments on 18 real-world datasets demonstrate that SGC-GEN possesses superior and robust performance compared to 6 baseline methods under 7 representative clustering metrics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The methodology of community detection can be divided into two principles: imposing a network model on a given graph, or optimizing a designed objective function. The former provides guarantees on theoretical detectability but falls short when the graph is inconsistent with the underlying model. The latter is model-free but fails to provide quality assurance for the detected communities. In this paper, we propose a novel unified framework to combine the advantages of these two principles. The presented method, SGC-GEN, not only considers the detection error caused by the corresponding model mismatch to a given graph, but also yields a theoretical guarantee on community detectability by analyzing Spectral Graph Clustering (SGC) under GENerative community models (GCMs). SGC-GEN incorporates the predictability on correct community detection with a measure of community fitness to GCMs. It resembles the formulation of supervised learning problems by enabling various community detection loss functions and model mismatch metrics. We further establish a theoretical condition for correct community detection using the normalized graph Laplacian matrix under a GCM, which provides a novel data-driven loss function for SGC-GEN. In addition, we present an effective algorithm to implement SGC-GEN, and show that the computational complexity of SGC-GEN is comparable to the baseline methods. Our experiments on 18 real-world datasets demonstrate that SGC-GEN possesses superior and robust performance compared to 6 baseline methods under 7 representative clustering metrics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The methodology of community detection can be divided into two principles: imposing a network model on a given graph, or optimizing a designed objective function. The former provides guarantees on theoretical detectability but falls short when the graph is inconsistent with the underlying model. The latter is model-free but fails to provide quality assurance for the detected communities. In this paper, we propose a novel unified framework to combine the advantages of these two principles. The presented method, SGC-GEN, not only considers the detection error caused by the corresponding model mismatch to a given graph, but also yields a theoretical guarantee on community detectability by analyzing Spectral Graph Clustering (SGC) under GENerative community models (GCMs). SGC-GEN incorporates the predictability on correct community detection with a measure of community fitness to GCMs. It resembles the formulation of supervised learning problems by enabling various community detection loss functions and model mismatch metrics. We further establish a theoretical condition for correct community detection using the normalized graph Laplacian matrix under a GCM, which provides a novel data-driven loss function for SGC-GEN. In addition, we present an effective algorithm to implement SGC-GEN, and show that the computational complexity of SGC-GEN is comparable to the baseline methods. Our experiments on 18 real-world datasets demonstrate that SGC-GEN possesses superior and robust performance compared to 6 baseline methods under 7 representative clustering metrics.",
"fno": "3835a051",
"keywords": [
"Computational Complexity",
"Graph Theory",
"Learning Artificial Intelligence",
"Matrix Algebra",
"Network Theory Graphs",
"Pattern Clustering",
"Spectral Graph Clustering",
"Generative Community Models",
"Network Model",
"Designed Objective Function",
"Theoretical Detectability",
"SGC GEN",
"Community Detectability",
"Community Fitness",
"Community Detection Loss Functions",
"Model Mismatch Metrics",
"Normalized Graph Laplacian Matrix",
"Error Detection",
"Model Mismatch",
"Community Detection",
"Data Driven Loss Function",
"Supervised Learning",
"Laplace Equations",
"Measurement",
"Standards",
"Stochastic Processes",
"Linear Programming",
"Computational Modeling",
"Supervised Learning",
"Community Detection",
"Generative Models",
"Spectral Algorithms"
],
"authors": [
{
"affiliation": null,
"fullName": "Pin-Yu Chen",
"givenName": "Pin-Yu",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lingfei Wu",
"givenName": "Lingfei",
"surname": "Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-11-01T00:00:00",
"pubType": "proceedings",
"pages": "51-60",
"year": "2017",
"issn": "2374-8486",
"isbn": "978-1-5386-3835-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3835a041",
"articleId": "12OmNzDvSn0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3835a061",
"articleId": "12OmNyqRnjb",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2017/3835/0/3835a949",
"title": "Fast Compressive Spectral Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2017/3835a949/12OmNC3Xhju",
"parentPublication": {
"id": "proceedings/icdm/2017/3835/0",
"title": "2017 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2017/3835/0/3835a847",
"title": "Local Community Detection in Dynamic Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2017/3835a847/12OmNwdbV89",
"parentPublication": {
"id": "proceedings/icdm/2017/3835/0",
"title": "2017 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2014/4302/0/4302a887",
"title": "Spectral Clustering for Medical Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2014/4302a887/12OmNx5Yvip",
"parentPublication": {
"id": "proceedings/icdm/2014/4302/0",
"title": "2014 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2013/2240/0/06785726",
"title": "Spectral embedding for dynamic social networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2013/06785726/12OmNyjccxs",
"parentPublication": {
"id": "proceedings/asonam/2013/2240/0",
"title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2018/9159/0/08594997",
"title": "Adaptive Affinity Learning for Accurate Community Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2018/08594997/17D45WZZ7H3",
"parentPublication": {
"id": "proceedings/icdm/2018/9159/0",
"title": "2018 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2018/9497/0/949700a318",
"title": "Herb Community Detection from TCM Prescription Based on Graph Embedding",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2018/949700a318/17D45XzbnL1",
"parentPublication": {
"id": "proceedings/icdh/2018/9497/0",
"title": "2018 7th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b874",
"title": "Robust Attributed Network Embedding Preserving Community Information",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b874/1FwFa26ftwA",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859684",
"title": "Local Spectral for Multiresolution Community Search in Attributed Graph",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859684/1G9EEXznXwY",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2020/8316/0/831600b094",
"title": "Ensemble Learning for Spectral Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2020/831600b094/1r54GbKzRdu",
"parentPublication": {
"id": "proceedings/icdm/2020/8316/0",
"title": "2020 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdia/2020/2232/0/223200a257",
"title": "DBSCAN Is Semi-Spectral Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/bigdia/2020/223200a257/1stvyZFcIYU",
"parentPublication": {
"id": "proceedings/bigdia/2020/2232/0",
"title": "2020 6th International Conference on Big Data and Information Analytics (BigDIA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KpChQa9kQ0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KpCt19wCju",
"doi": "10.1109/ICDM54844.2022.00030",
"title": "GraphGDP: Generative Diffusion Processes for Permutation Invariant Graph Generation",
"normalizedTitle": "GraphGDP: Generative Diffusion Processes for Permutation Invariant Graph Generation",
"abstract": "Graph generative models have broad applications in biology, chemistry and social science. However, modelling and understanding the generative process of graphs is challenging due to the discrete and high-dimensional nature of graphs, as well as permutation invariance to node orderings in underlying graph distributions. Current leading autoregressive models fail to capture the permutation invariance nature of graphs for the reliance on generation ordering and have high time complexity. Here, we propose a continuous-time generative diffusion process for permutation invariant graph generation to mitigate these issues. Specifically, we first construct a forward diffusion process defined by a stochastic differential equation (SDE), which smoothly converts graphs within the complex distribution to random graphs that follow a known edge probability. Solving the corresponding reverse-time SDE, graphs can be generated from newly sampled random graphs. To facilitate the reverse-time SDE, we newly design a position-enhanced graph score network, capturing the evolving structure and position information from perturbed graphs for permutation equivariant score estimation. Under the evaluation of comprehensive metrics, our proposed generative diffusion process achieves competitive performance in graph distribution learning. Experimental results also show that GraphGDP can generate high-quality graphs in only 24 function evaluations, much faster than previous autoregressive models.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph generative models have broad applications in biology, chemistry and social science. However, modelling and understanding the generative process of graphs is challenging due to the discrete and high-dimensional nature of graphs, as well as permutation invariance to node orderings in underlying graph distributions. Current leading autoregressive models fail to capture the permutation invariance nature of graphs for the reliance on generation ordering and have high time complexity. Here, we propose a continuous-time generative diffusion process for permutation invariant graph generation to mitigate these issues. Specifically, we first construct a forward diffusion process defined by a stochastic differential equation (SDE), which smoothly converts graphs within the complex distribution to random graphs that follow a known edge probability. Solving the corresponding reverse-time SDE, graphs can be generated from newly sampled random graphs. To facilitate the reverse-time SDE, we newly design a position-enhanced graph score network, capturing the evolving structure and position information from perturbed graphs for permutation equivariant score estimation. Under the evaluation of comprehensive metrics, our proposed generative diffusion process achieves competitive performance in graph distribution learning. Experimental results also show that GraphGDP can generate high-quality graphs in only 24 function evaluations, much faster than previous autoregressive models.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph generative models have broad applications in biology, chemistry and social science. However, modelling and understanding the generative process of graphs is challenging due to the discrete and high-dimensional nature of graphs, as well as permutation invariance to node orderings in underlying graph distributions. Current leading autoregressive models fail to capture the permutation invariance nature of graphs for the reliance on generation ordering and have high time complexity. Here, we propose a continuous-time generative diffusion process for permutation invariant graph generation to mitigate these issues. Specifically, we first construct a forward diffusion process defined by a stochastic differential equation (SDE), which smoothly converts graphs within the complex distribution to random graphs that follow a known edge probability. Solving the corresponding reverse-time SDE, graphs can be generated from newly sampled random graphs. To facilitate the reverse-time SDE, we newly design a position-enhanced graph score network, capturing the evolving structure and position information from perturbed graphs for permutation equivariant score estimation. Under the evaluation of comprehensive metrics, our proposed generative diffusion process achieves competitive performance in graph distribution learning. Experimental results also show that GraphGDP can generate high-quality graphs in only 24 function evaluations, much faster than previous autoregressive models.",
"fno": "509900a201",
"keywords": [
"Differential Equations",
"Diffusion",
"Graph Theory",
"Probability",
"Stochastic Processes",
"Continuous Time Generative Diffusion Process",
"Corresponding Reverse Time SDE",
"Current Leading Autoregressive Models",
"Forward Diffusion Process",
"Generation Ordering",
"Generative Process",
"Graph Distribution Learning",
"Graph Distributions",
"Graph Generative Models",
"High Time Complexity",
"High Quality Graphs",
"Newly Sampled Random Graphs",
"Permutation Equivariant Score Estimation",
"Permutation Invariance Nature",
"Permutation Invariant Graph Generation",
"Perturbed Graphs",
"Position Enhanced Graph Score Network",
"Measurement",
"Biological System Modeling",
"Social Sciences",
"Neural Networks",
"Diffusion Processes",
"Stochastic Processes",
"Feature Extraction",
"Graph Generation",
"Generative Diffusion Process",
"Graph Neural Network"
],
"authors": [
{
"affiliation": "Beihang University,SKLSDE,Beijing,China",
"fullName": "Han Huang",
"givenName": "Han",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beihang University,SKLSDE,Beijing,China",
"fullName": "Leilei Sun",
"givenName": "Leilei",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beihang University,SKLSDE,Beijing,China",
"fullName": "Bowen Du",
"givenName": "Bowen",
"surname": "Du",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Central Florida,Florida,USA",
"fullName": "Yanjie Fu",
"givenName": "Yanjie",
"surname": "Fu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beihang University,SKLSDE,Beijing,China",
"fullName": "Weifeng Lv",
"givenName": "Weifeng",
"surname": "Lv",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-11-01T00:00:00",
"pubType": "proceedings",
"pages": "201-210",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-5099-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "509900a191",
"articleId": "1KpCxqlS79m",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "509900a211",
"articleId": "1KpCzZL3E1G",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2013/1309/0/06732524",
"title": "ENISI SDE: A novel web-based stochastic modeling tool for computational biology",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2013/06732524/12OmNB7tUs1",
"parentPublication": {
"id": "proceedings/bibm/2013/1309/0",
"title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2015/9926/0/07363817",
"title": "Modeling graphs using a mixture of Kronecker models",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2015/07363817/12OmNwoPtwu",
"parentPublication": {
"id": "proceedings/big-data/2015/9926/0",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2013/2240/0/06785709",
"title": "A matter of time - intrinsic or extrinsic - for diffusion in evolving complex networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2013/06785709/12OmNxdm4yc",
"parentPublication": {
"id": "proceedings/asonam/2013/2240/0",
"title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mcsi/2017/2820/0/2820a154",
"title": "Hamming Graphs and Permutation Codes",
"doi": null,
"abstractUrl": "/proceedings-article/mcsi/2017/2820a154/12OmNzmLxQP",
"parentPublication": {
"id": "proceedings/mcsi/2017/2820/0",
"title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipps/1993/3442/0/0262881",
"title": "On the shortest path problem for permutation graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipps/1993/0262881/12OmNzw8jir",
"parentPublication": {
"id": "proceedings/ipps/1993/3442/0",
"title": "Parallel Processing Symposium, International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2015/02/06892967",
"title": "ENISI SDE: A New Web-Based Tool for Modeling Stochastic Processes",
"doi": null,
"abstractUrl": "/journal/tb/2015/02/06892967/13rRUwI5TW9",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/06/09721559",
"title": "Permutation-Equivariant and Proximity-Aware Graph Neural Networks With Stochastic Message Passing",
"doi": null,
"abstractUrl": "/journal/tk/2023/06/09721559/1BhySEAr648",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/04/09816105",
"title": "Permute Me Softly: Learning Soft Permutations for Graph Representations",
"doi": null,
"abstractUrl": "/journal/tp/2023/04/09816105/1EMV4GDDOw0",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09920219",
"title": "A Systematic Survey on Deep Generative Models for Graph Generation",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09920219/1HxShbgOkKY",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcs/2021/4513/0/451300b126",
"title": "Poster: A Tunable Model for Graph Generation Using LSTM and Conditional VAE",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/2021/451300b126/1xqz1S5VDAA",
"parentPublication": {
"id": "proceedings/icdcs/2021/4513/0",
"title": "2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1feblxPnruU",
"title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)",
"acronym": "wi",
"groupId": "1001411",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1febmlTSj6w",
"doi": null,
"title": "Deep Dynamic Mixed Membership Stochastic Blockmodel",
"normalizedTitle": "Deep Dynamic Mixed Membership Stochastic Blockmodel",
"abstract": "Latent community models are successful at statistically modeling network data by assigning network entities to communities and modelling entity relations as the relations of their communities. In this paper, we describe the limitation of these models in inferring relations between two communities when the entity relations between these communities are unobserved. We propose a solution to this problem by factorizing the community relations matrix into two community feature matrices, thereby adding a dependency between community relations. We introduce the deep dynamic mixed membership stochastic blockmodel based network (DDBN) to demonstrate the feasibility of such an approach. Our model marries the mixed membership stochastic blockmodel (MMSB) with deep neural networks for rich feature extraction and introduces a temporal dependency in latent features using a long short-term memory unit for dynamic network modeling. We evaluate our model on the link prediction task in static and dynamic networks and find that our model achieves comparable results with state-of-the-art methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Latent community models are successful at statistically modeling network data by assigning network entities to communities and modelling entity relations as the relations of their communities. In this paper, we describe the limitation of these models in inferring relations between two communities when the entity relations between these communities are unobserved. We propose a solution to this problem by factorizing the community relations matrix into two community feature matrices, thereby adding a dependency between community relations. We introduce the deep dynamic mixed membership stochastic blockmodel based network (DDBN) to demonstrate the feasibility of such an approach. Our model marries the mixed membership stochastic blockmodel (MMSB) with deep neural networks for rich feature extraction and introduces a temporal dependency in latent features using a long short-term memory unit for dynamic network modeling. We evaluate our model on the link prediction task in static and dynamic networks and find that our model achieves comparable results with state-of-the-art methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Latent community models are successful at statistically modeling network data by assigning network entities to communities and modelling entity relations as the relations of their communities. In this paper, we describe the limitation of these models in inferring relations between two communities when the entity relations between these communities are unobserved. We propose a solution to this problem by factorizing the community relations matrix into two community feature matrices, thereby adding a dependency between community relations. We introduce the deep dynamic mixed membership stochastic blockmodel based network (DDBN) to demonstrate the feasibility of such an approach. Our model marries the mixed membership stochastic blockmodel (MMSB) with deep neural networks for rich feature extraction and introduces a temporal dependency in latent features using a long short-term memory unit for dynamic network modeling. We evaluate our model on the link prediction task in static and dynamic networks and find that our model achieves comparable results with state-of-the-art methods.",
"fno": "08909505",
"keywords": [
"Feature Extraction",
"Matrix Decomposition",
"Network Theory Graphs",
"Recurrent Neural Nets",
"Stochastic Processes",
"Latent Community Models",
"Statistically Modeling Network Data",
"Network Entities",
"Entity Relations",
"Community Relations Matrix",
"Community Feature Matrices",
"Deep Dynamic Mixed Membership Stochastic Blockmodel",
"Deep Neural Networks",
"Dynamic Network Modeling",
"Static Networks",
"Dynamic Networks",
"Feature Extraction",
"Temporal Dependency",
"Long Short Term Memory Unit",
"Hidden Markov Models",
"Stochastic Processes",
"Feature Extraction",
"Deep Learning",
"Predictive Models",
"Receivers",
"Data Models",
"Matrix Factorization",
"Deep Learning",
"Dynamic"
],
"authors": [
{
"affiliation": "University of Alberta,Edmonton,Alberta,Canada",
"fullName": "Zheng Yu",
"givenName": "Zheng",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Alberta,Edmonton,Alberta,Canada",
"fullName": "Marcin Pietrasik",
"givenName": "Marcin",
"surname": "Pietrasik",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Alberta,Edmonton,Alberta,Canada",
"fullName": "Marek Reformat",
"givenName": "Marek",
"surname": "Reformat",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-10-01T00:00:00",
"pubType": "proceedings",
"pages": "141-148",
"year": "2019",
"issn": null,
"isbn": "978-1-4503-6934-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08909512",
"articleId": "1febnaoLRO8",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08909444",
"articleId": "1feboT8encc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2013/5108/0/5108a221",
"title": "Mixed Membership Subspace Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2013/5108a221/12OmNASraRD",
"parentPublication": {
"id": "proceedings/icdm/2013/5108/0",
"title": "2013 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256b019",
"title": "Mixed-Membership Stochastic Block-Models for Transactional Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256b019/12OmNAZfxEK",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2014/4274/0/4274a892",
"title": "Exploring Mixed Membership Stochastic Block Models via Non-negative Matrix Factorization",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2014/4274a892/12OmNrJiCYd",
"parentPublication": {
"id": "proceedings/icdmw/2014/4274/0",
"title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2016/2846/0/07752257",
"title": "A local measure of community change in dynamic graphs",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2016/07752257/12OmNzXnNoH",
"parentPublication": {
"id": "proceedings/asonam/2016/2846/0",
"title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2012/4794/0/4794a088",
"title": "Particle Mixed Membership Stochastic Block Model",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2012/4794a088/12OmNzaQowy",
"parentPublication": {
"id": "proceedings/skg/2012/4794/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1990/07/i0691",
"title": "Some Relations Among Stochastic Finite State Networks Used in Automatic Speech Recognition",
"doi": null,
"abstractUrl": "/journal/tp/1990/07/i0691/13rRUwInv5h",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2017/09/07917265",
"title": "Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis",
"doi": null,
"abstractUrl": "/journal/tk/2017/09/07917265/13rRUxAAT1o",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2023/02/09852476",
"title": "PPISB: A Novel Network-Based Algorithm of Predicting Protein-Protein Interactions With Mixed Membership Stochastic Blockmodel",
"doi": null,
"abstractUrl": "/journal/tb/2023/02/09852476/1FFGPYxv9v2",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900b143",
"title": "Serialized Interacting Mixed Membership Stochastic Block Model",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900b143/1KpCpYroHQc",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spw/2019/3508/0/350800a050",
"title": "Membership Inference Attacks Against Adversarially Robust Deep Learning Models",
"doi": null,
"abstractUrl": "/proceedings-article/spw/2019/350800a050/1dx8yXTXOak",
"parentPublication": {
"id": "proceedings/spw/2019/3508/0",
"title": "2019 IEEE Security and Privacy Workshops (SPW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1pBMmiabSDK",
"title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1pBMt2iKtk4",
"doi": "10.1109/BIBE50027.2020.00091",
"title": "A Study on the Effect of Distinct Adjacency Matrices for Graph Signal Denoising",
"normalizedTitle": "A Study on the Effect of Distinct Adjacency Matrices for Graph Signal Denoising",
"abstract": "As the field of brain monitoring is evolving rapidly, there is an increasing demand of finding innovative ways to handle relevant signals. Especially electroencephalogram (EEG) signals provide a non-invasive way of diagnostic inference of brain's functionality. Nevertheless, EEG signals are often corrupted by impulsive noise, thus prior denoising is required for accurate analysis and decision making. On the other hand, EEG signals admit naturally a representation in the form of graphs, with the electrodes corresponding to the nodes of the graph and the edges expressing the connectivity strength. To this end, graph signal processing (GSP) is a versatile tool, which enables the representation and analysis of graph-structured signals, whose interdependencies are encoded in the form of an appropriate adjacency matrix. To address the denoising of graph-structured signals, under impulsive noise conditions, this work introduces a regularized graph filtering scheme based on fractional lower order moments, coupled with distinct adjacency matrices inspired both by statistical approaches and visibility graphs that are better capable of capturing the topological and functional connectivity between the distinct nodes. The experimental evaluation on real EEG signals recorded in epileptic and non-epileptic seizures, reveals the effects of the adjacency matrix choice on the denoising performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "As the field of brain monitoring is evolving rapidly, there is an increasing demand of finding innovative ways to handle relevant signals. Especially electroencephalogram (EEG) signals provide a non-invasive way of diagnostic inference of brain's functionality. Nevertheless, EEG signals are often corrupted by impulsive noise, thus prior denoising is required for accurate analysis and decision making. On the other hand, EEG signals admit naturally a representation in the form of graphs, with the electrodes corresponding to the nodes of the graph and the edges expressing the connectivity strength. To this end, graph signal processing (GSP) is a versatile tool, which enables the representation and analysis of graph-structured signals, whose interdependencies are encoded in the form of an appropriate adjacency matrix. To address the denoising of graph-structured signals, under impulsive noise conditions, this work introduces a regularized graph filtering scheme based on fractional lower order moments, coupled with distinct adjacency matrices inspired both by statistical approaches and visibility graphs that are better capable of capturing the topological and functional connectivity between the distinct nodes. The experimental evaluation on real EEG signals recorded in epileptic and non-epileptic seizures, reveals the effects of the adjacency matrix choice on the denoising performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "As the field of brain monitoring is evolving rapidly, there is an increasing demand of finding innovative ways to handle relevant signals. Especially electroencephalogram (EEG) signals provide a non-invasive way of diagnostic inference of brain's functionality. Nevertheless, EEG signals are often corrupted by impulsive noise, thus prior denoising is required for accurate analysis and decision making. On the other hand, EEG signals admit naturally a representation in the form of graphs, with the electrodes corresponding to the nodes of the graph and the edges expressing the connectivity strength. To this end, graph signal processing (GSP) is a versatile tool, which enables the representation and analysis of graph-structured signals, whose interdependencies are encoded in the form of an appropriate adjacency matrix. To address the denoising of graph-structured signals, under impulsive noise conditions, this work introduces a regularized graph filtering scheme based on fractional lower order moments, coupled with distinct adjacency matrices inspired both by statistical approaches and visibility graphs that are better capable of capturing the topological and functional connectivity between the distinct nodes. The experimental evaluation on real EEG signals recorded in epileptic and non-epileptic seizures, reveals the effects of the adjacency matrix choice on the denoising performance.",
"fno": "957400a523",
"keywords": [
"Biomedical Electrodes",
"Electroencephalography",
"Graph Theory",
"Impulse Noise",
"Medical Disorders",
"Medical Signal Processing",
"Signal Denoising",
"Electroencephalogram Signals",
"EEG Signals",
"Decision Making",
"Graph Signal Processing",
"Graph Structured Signals",
"Impulsive Noise",
"Adjacency Matrices",
"Graph Signal Denoising",
"Brain Monitoring",
"Regularized Graph Filtering",
"Fractional Lower Order Moments",
"Topological Connectivity",
"Functional Connectivity",
"Epileptic Seizures",
"Nonepileptic Seizures",
"Filtering",
"Noise Reduction",
"Tools",
"Signal Processing",
"Electroencephalography",
"Signal Denoising",
"Monitoring",
"EEG",
"Graph Signal Filtering",
"Fractional Lower Order Moments",
"Visibility Graph",
"Topological Connectivity",
"Functional Connectivity"
],
"authors": [
{
"affiliation": "University of Crete,Department of Computer Science,Heraklion,Greece",
"fullName": "Anastasia Pentari",
"givenName": "Anastasia",
"surname": "Pentari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Computer Science, Foundation for Research and Technology-Hellas,Heraklion,Greece",
"fullName": "George Tzagkarakis",
"givenName": "George",
"surname": "Tzagkarakis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Computer Science, Foundation for Research and Technology-Hellas,Heraklion,Greece",
"fullName": "Kostas Marias",
"givenName": "Kostas",
"surname": "Marias",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Crete,Department of Computer Science,Heraklion,Greece",
"fullName": "Panagiotis Tsakalides",
"givenName": "Panagiotis",
"surname": "Tsakalides",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibe",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-10-01T00:00:00",
"pubType": "proceedings",
"pages": "523-529",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9574-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "957400a519",
"articleId": "1pBMrjmNCda",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "957400a530",
"articleId": "1pBMxryv9II",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bife/2013/4777/0/4777a006",
"title": "Sonar Image Denoising via Adaptive Overcomplete Dictionary Based on K-SVD Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2013/4777a006/12OmNBfqG3k",
"parentPublication": {
"id": "proceedings/bife/2013/4777/0",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icat/2015/8146/0/07340540",
"title": "The effect of denoising on classification of ECG signals",
"doi": null,
"abstractUrl": "/proceedings-article/icat/2015/07340540/12OmNxecS3j",
"parentPublication": {
"id": "proceedings/icat/2015/8146/0",
"title": "2015 XXV International Conference on Information, Communication and Automation Technologies (ICAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pcspa/2010/4180/0/4180a739",
"title": "Blind Source Separation Algorithm Based on Wavelet Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/pcspa/2010/4180a739/12OmNySG3PG",
"parentPublication": {
"id": "proceedings/pcspa/2010/4180/0",
"title": "Pervasive Computing, Signal Porcessing and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvris/2018/8031/0/803100a429",
"title": "A Principal Component Analysis Approach to Noise Removal for Speech Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/icvris/2018/803100a429/17D45XERmmS",
"parentPublication": {
"id": "proceedings/icvris/2018/8031/0",
"title": "2018 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnlp/2022/9544/0/954400a304",
"title": "Speech Signal Denoising Algorithm and Simulation Based on Wavelet Threshold",
"doi": null,
"abstractUrl": "/proceedings-article/icnlp/2022/954400a304/1GNtq0G6IVi",
"parentPublication": {
"id": "proceedings/icnlp/2022/9544/0",
"title": "2022 4th International Conference on Natural Language Processing (ICNLP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icispc/2022/5480/0/548000a065",
"title": "Reconstruction and Denoising of EEG Signal Using Alternating Direction Method of Multipliers",
"doi": null,
"abstractUrl": "/proceedings-article/icispc/2022/548000a065/1KExEJcOjni",
"parentPublication": {
"id": "proceedings/icispc/2022/5480/0",
"title": "2022 6th International Conference on Imaging, Signal Processing and Communications (ICISPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cecit/2022/3197/0/319700a323",
"title": "A Multi-target Underwater Acoustic Signals Denoising Method Based on Wavelet",
"doi": null,
"abstractUrl": "/proceedings-article/cecit/2022/319700a323/1M66N9nK6UU",
"parentPublication": {
"id": "proceedings/cecit/2022/3197/0",
"title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iceee/2019/3910/0/391000a126",
"title": "Comparative Study of ECG Signal Denoising by Empirical Mode Decomposition and Thresholding Functions",
"doi": null,
"abstractUrl": "/proceedings-article/iceee/2019/391000a126/1cpqDCNXcQ0",
"parentPublication": {
"id": "proceedings/iceee/2019/3910/0",
"title": "2019 6th International Conference on Electrical and Electronics Engineering (ICEEE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicas/2020/9085/0/908500a337",
"title": "On the use of higher-density wavelet packet neighboring coefficient to improve SNR for signal denoising",
"doi": null,
"abstractUrl": "/proceedings-article/icicas/2020/908500a337/1sZ2Y8LbwVq",
"parentPublication": {
"id": "proceedings/icicas/2020/9085/0",
"title": "2020 International Conference on Intelligent Computing, Automation and Systems (ICICAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icris/2020/1969/0/196900a112",
"title": "Research on Feature Extraction and Classification of EEG Signals Based on Multitask Motor Imagination",
"doi": null,
"abstractUrl": "/proceedings-article/icris/2020/196900a112/1wG5ZSFfarS",
"parentPublication": {
"id": "proceedings/icris/2020/1969/0",
"title": "2020 International Conference on Robots & Intelligent System (ICRIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwGIcBY",
"title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCxL9QI",
"doi": "10.1109/ICDMW.2017.133",
"title": "Online Detection of Anomalous Heterogeneous Graphs with Streaming Edges",
"normalizedTitle": "Online Detection of Anomalous Heterogeneous Graphs with Streaming Edges",
"abstract": "Given a stream of heterogeneous edges, comprising different types of nodes and edges, which arrive in an interleaved fashion to multiple different graphs evolving simultaneously, how can we spot the anomalous graphs in real-time using only constant memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. In this talk, I will introduce STREAMSPOT, a clustering based anomaly detection approach for streaming heterogeneous graphs that addresses challenges in two key fronts: (1) heterogeneity, and (2) streaming nature. Specifically, we introduce a new similarity function for heterogeneous graphs that compares two graphs based on their relative frequency of local substructures, represented as short strings. This function lends itself to a vector representation of each graph, which is (a) fast to compute, and (b) amenable to a sketched version with bounded size that preserves the aforementioned similarity. STREAMSPOT exhibits desirable properties that a streaming application requires-it is (i) fully-streaming; processing the stream one edge at a time as it arrives, (ii) memory-efficient; requiring constant space for the sketches and the clustering, (iii) fast; taking constant time to update the graph sketches and the cluster summaries that can process over 100K edges per second, and (iv) online; scoring and flagging anomalies in real time. Experiments on datasets containing simulated system-call flow graphs from normal browser activity and various attack scenarios (ground truth) show that STREAMSPOT is high-performance; achieving above 95% detection accuracy with small delay, and competitive response time and memory usage.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Given a stream of heterogeneous edges, comprising different types of nodes and edges, which arrive in an interleaved fashion to multiple different graphs evolving simultaneously, how can we spot the anomalous graphs in real-time using only constant memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. In this talk, I will introduce STREAMSPOT, a clustering based anomaly detection approach for streaming heterogeneous graphs that addresses challenges in two key fronts: (1) heterogeneity, and (2) streaming nature. Specifically, we introduce a new similarity function for heterogeneous graphs that compares two graphs based on their relative frequency of local substructures, represented as short strings. This function lends itself to a vector representation of each graph, which is (a) fast to compute, and (b) amenable to a sketched version with bounded size that preserves the aforementioned similarity. STREAMSPOT exhibits desirable properties that a streaming application requires-it is (i) fully-streaming; processing the stream one edge at a time as it arrives, (ii) memory-efficient; requiring constant space for the sketches and the clustering, (iii) fast; taking constant time to update the graph sketches and the cluster summaries that can process over 100K edges per second, and (iv) online; scoring and flagging anomalies in real time. Experiments on datasets containing simulated system-call flow graphs from normal browser activity and various attack scenarios (ground truth) show that STREAMSPOT is high-performance; achieving above 95% detection accuracy with small delay, and competitive response time and memory usage.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Given a stream of heterogeneous edges, comprising different types of nodes and edges, which arrive in an interleaved fashion to multiple different graphs evolving simultaneously, how can we spot the anomalous graphs in real-time using only constant memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. In this talk, I will introduce STREAMSPOT, a clustering based anomaly detection approach for streaming heterogeneous graphs that addresses challenges in two key fronts: (1) heterogeneity, and (2) streaming nature. Specifically, we introduce a new similarity function for heterogeneous graphs that compares two graphs based on their relative frequency of local substructures, represented as short strings. This function lends itself to a vector representation of each graph, which is (a) fast to compute, and (b) amenable to a sketched version with bounded size that preserves the aforementioned similarity. STREAMSPOT exhibits desirable properties that a streaming application requires-it is (i) fully-streaming; processing the stream one edge at a time as it arrives, (ii) memory-efficient; requiring constant space for the sketches and the clustering, (iii) fast; taking constant time to update the graph sketches and the cluster summaries that can process over 100K edges per second, and (iv) online; scoring and flagging anomalies in real time. Experiments on datasets containing simulated system-call flow graphs from normal browser activity and various attack scenarios (ground truth) show that STREAMSPOT is high-performance; achieving above 95% detection accuracy with small delay, and competitive response time and memory usage.",
"fno": "3800a968",
"keywords": [
"Graph Theory",
"Pattern Clustering",
"Security Of Data",
"Online Detection",
"Anomalous Heterogeneous Graphs",
"Heterogeneous Edges",
"Anomalous Graphs",
"Streaming Heterogeneous Graphs",
"Similarity Function",
"Streaming Application",
"Graph Sketches",
"Cluster Summaries",
"STREAMSPOT",
"System Call Flow Graphs",
"Streaming Edges",
"Advanced Persistent Threat Detection",
"Clustering Based Anomaly Detection",
"Image Edge Detection",
"Computer Science",
"Conferences",
"Real Time Systems",
"Anomaly Detection",
"US Government",
"Science General",
"Online Anomaly Detection",
"Streaming Edges",
"Heterogeneous Graphs",
"Graph Sketches",
"Constant Memory"
],
"authors": [
{
"affiliation": null,
"fullName": "Leman Akoglu",
"givenName": "Leman",
"surname": "Akoglu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-11-01T00:00:00",
"pubType": "proceedings",
"pages": "968-968",
"year": "2017",
"issn": "2375-9259",
"isbn": "978-1-5386-3800-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3800a964",
"articleId": "12OmNxvwoRv",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3800a977",
"articleId": "12OmNAo45TA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2013/4797/0/06596126",
"title": "Smooth bundling of large streaming and sequence graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2013/06596126/12OmNscfI0r",
"parentPublication": {
"id": "proceedings/pacificvis/2013/4797/0",
"title": "2013 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2017/3464/0/3464a848",
"title": "Testing Hereditary Properties of Ordered Graphs and Matrices",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2017/3464a848/12OmNvjyxBA",
"parentPublication": {
"id": "proceedings/focs/2017/3464/0",
"title": "2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2017/0958/0/0958a261",
"title": "The Enumeration of Flippable Edges in Maximal Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2017/0958a261/12OmNvnwVoF",
"parentPublication": {
"id": "proceedings/cit/2017/0958/0",
"title": "2017 IEEE International Conference on Computer and Information Technology (CIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcs/2012/4685/0/4685a466",
"title": "Clustering Streaming Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdcs/2012/4685a466/12OmNvpw7eM",
"parentPublication": {
"id": "proceedings/icdcs/2012/4685/0",
"title": "2012 IEEE 32nd International Conference on Distributed Computing Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2003/1988/0/19880258",
"title": "Visualizing Weighted Edges in Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2003/19880258/12OmNwNwzIW",
"parentPublication": {
"id": "proceedings/iv/2003/1988/0",
"title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdata-congress/2016/2622/0/07584914",
"title": "Boosting Vertex-Cut Partitioning for Streaming Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/bigdata-congress/2016/07584914/12OmNwtWfJ0",
"parentPublication": {
"id": "proceedings/bigdata-congress/2016/2622/0",
"title": "2016 IEEE International Congress on Big Data (BigData Congress)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dicta/2011/4588/0/4588a400",
"title": "Fingerprints as Spatial Graphs: Nodes and Edges",
"doi": null,
"abstractUrl": "/proceedings-article/dicta/2011/4588a400/12OmNz5JC4l",
"parentPublication": {
"id": "proceedings/dicta/2011/4588/0",
"title": "2011 International Conference on Digital Image Computing: Techniques and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276899",
"title": "Anomaly Detection in Evolving Heterogeneous Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276899/17D45VUZMU8",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0",
"title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a272",
"title": "Evaluating Complex Queries on Streaming Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a272/1FwFcN6Iy0o",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400b082",
"title": "Time Constrained Continuous Subgraph Search Over Streaming Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400b082/1aDSRF46kDe",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrIJqwt",
"title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxE2mRX",
"doi": "10.1109/ICDMW.2013.93",
"title": "Incremental Anomaly Detection in Graphs",
"normalizedTitle": "Incremental Anomaly Detection in Graphs",
"abstract": "The advantage of graph-based anomaly detection is that the relationships between elements can be analyzed for structural oddities that could represent activities such as fraud, network intrusions, or suspicious associations in a social network. However, current approaches to detecting anomalies in graphs are computationally expensive and do not scale to large graphs. For instance, in the case of computer network traffic, a graph representation of the traffic might consist of nodes representing computers and edges representing communications between the corresponding computers. However, computer network traffic is typically voluminous, or acquired in real-time as a stream of information. In this work, we describe methods for graph-based anomaly detection via graph partitioning and windowing, and demonstrate their ability to efficiently detect anomalies in data represented as a graph.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The advantage of graph-based anomaly detection is that the relationships between elements can be analyzed for structural oddities that could represent activities such as fraud, network intrusions, or suspicious associations in a social network. However, current approaches to detecting anomalies in graphs are computationally expensive and do not scale to large graphs. For instance, in the case of computer network traffic, a graph representation of the traffic might consist of nodes representing computers and edges representing communications between the corresponding computers. However, computer network traffic is typically voluminous, or acquired in real-time as a stream of information. In this work, we describe methods for graph-based anomaly detection via graph partitioning and windowing, and demonstrate their ability to efficiently detect anomalies in data represented as a graph.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The advantage of graph-based anomaly detection is that the relationships between elements can be analyzed for structural oddities that could represent activities such as fraud, network intrusions, or suspicious associations in a social network. However, current approaches to detecting anomalies in graphs are computationally expensive and do not scale to large graphs. For instance, in the case of computer network traffic, a graph representation of the traffic might consist of nodes representing computers and edges representing communications between the corresponding computers. However, computer network traffic is typically voluminous, or acquired in real-time as a stream of information. In this work, we describe methods for graph-based anomaly detection via graph partitioning and windowing, and demonstrate their ability to efficiently detect anomalies in data represented as a graph.",
"fno": "3143a521",
"keywords": [
"Image Edge Detection",
"Telecommunication Traffic",
"Internet",
"Computers",
"Scalability",
"Buildings",
"Dynamic Graphs",
"Anomaly Detection",
"Graph Mining"
],
"authors": [
{
"affiliation": null,
"fullName": "William Eberle",
"givenName": "William",
"surname": "Eberle",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lawrence Holder",
"givenName": "Lawrence",
"surname": "Holder",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "521-528",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-3142-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3143a513",
"articleId": "12OmNrkBwsW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3143a529",
"articleId": "12OmNBCZnRY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/big-data/2014/5666/0/07004367",
"title": "A partitioning approach to scaling anomaly detection in graph streams",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2014/07004367/12OmNCfSqQQ",
"parentPublication": {
"id": "proceedings/big-data/2014/5666/0",
"title": "2014 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csit/2017/2830/0/08312166",
"title": "Anomaly detection using Markov chain model",
"doi": null,
"abstractUrl": "/proceedings-article/csit/2017/08312166/12OmNyL0TlU",
"parentPublication": {
"id": "proceedings/csit/2017/2830/0",
"title": "2017 Computer Science and Information Technologies (CSIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2017/1629/0/08024622",
"title": "CEFF: An efficient approach for traffic anomaly detection and classification",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2017/08024622/12OmNyYDDAS",
"parentPublication": {
"id": "proceedings/iscc/2017/1629/0",
"title": "2017 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcsw/2012/4686/0/4686a640",
"title": "A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems",
"doi": null,
"abstractUrl": "/proceedings-article/icdcsw/2012/4686a640/12OmNywxlMv",
"parentPublication": {
"id": "proceedings/icdcsw/2012/4686/0",
"title": "2012 32nd International Conference on Distributed Computing Systems Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sccc/2013/0426/0/0426a090",
"title": "Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/sccc/2013/0426a090/12OmNzIl3zk",
"parentPublication": {
"id": "proceedings/sccc/2013/0426/0",
"title": "2013 32nd International Conference of the Chilean Computer Science Society (SCCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/nt/2009/03/04623136",
"title": "Spatio-temporal network anomaly detection by assessing deviations of empirical measures",
"doi": null,
"abstractUrl": "/journal/nt/2009/03/04623136/13rRUwInvpd",
"parentPublication": {
"id": "trans/nt",
"title": "IEEE/ACM Transactions on Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2015/06/mcg2015060042",
"title": "ENTVis: A Visual Analytic Tool for Entropy-Based Network Traffic Anomaly Detection",
"doi": null,
"abstractUrl": "/magazine/cg/2015/06/mcg2015060042/13rRUyg2jQ7",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2023/02/09976292",
"title": "Neighbor Graph Based Tensor Recovery For Accurate Internet Anomaly Detection",
"doi": null,
"abstractUrl": "/journal/td/2023/02/09976292/1IWfOVkYBBS",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ickg/2022/5101/0/510100a313",
"title": "Multiple Anomaly Alignments on Network Traffics",
"doi": null,
"abstractUrl": "/proceedings-article/ickg/2022/510100a313/1KxTZYMDFOU",
"parentPublication": {
"id": "proceedings/ickg/2022/5101/0",
"title": "2022 IEEE International Conference on Knowledge Graph (ICKG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/09599560",
"title": "Anomaly Detection in Dynamic Graphs via Transformer",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/09599560/1yeC6nu6NsA",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzn38Ko",
"title": "2014 43nd International Conference on Parallel Processing Workshops (ICCPW)",
"acronym": "icppw",
"groupId": "1000539",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyQGRYJ",
"doi": "10.1109/ICPPW.2014.31",
"title": "Flow Graph Designer: A Tool for Designing and Analyzing Intel® Threading Building Blocks Flow Graphs",
"normalizedTitle": "Flow Graph Designer: A Tool for Designing and Analyzing Intel® Threading Building Blocks Flow Graphs",
"abstract": "Flow Graph Designer is a visualization tool that supports the analysis and design of parallel applications that use the Intel® Threading Building Blocks (Intel® TBB) flow graph interface. The flow graph interface allows developers to express the dependency, streaming and data flow graphs present in many domains such as media, gaming, finance, high performance computing and healthcare. Because the flow graph interface introduced a style of programming that is different than loop- and task-parallel approaches, there is a need for new tool support. This paper presents Flow Graph Designer, an experimental graphical tool developed to make the flow graph interface easier to adopt, use, debug and tune. This paper provides a brief introduction to the Intel TBB flow graph interface and an overview of the key features provided by the Flow Graph Designer. Three examples are then presented that demonstrate the utility of this tool for important usage scenarios encountered while designing and analyzing flow graph applications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Flow Graph Designer is a visualization tool that supports the analysis and design of parallel applications that use the Intel® Threading Building Blocks (Intel® TBB) flow graph interface. The flow graph interface allows developers to express the dependency, streaming and data flow graphs present in many domains such as media, gaming, finance, high performance computing and healthcare. Because the flow graph interface introduced a style of programming that is different than loop- and task-parallel approaches, there is a need for new tool support. This paper presents Flow Graph Designer, an experimental graphical tool developed to make the flow graph interface easier to adopt, use, debug and tune. This paper provides a brief introduction to the Intel TBB flow graph interface and an overview of the key features provided by the Flow Graph Designer. Three examples are then presented that demonstrate the utility of this tool for important usage scenarios encountered while designing and analyzing flow graph applications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Flow Graph Designer is a visualization tool that supports the analysis and design of parallel applications that use the Intel® Threading Building Blocks (Intel® TBB) flow graph interface. The flow graph interface allows developers to express the dependency, streaming and data flow graphs present in many domains such as media, gaming, finance, high performance computing and healthcare. Because the flow graph interface introduced a style of programming that is different than loop- and task-parallel approaches, there is a need for new tool support. This paper presents Flow Graph Designer, an experimental graphical tool developed to make the flow graph interface easier to adopt, use, debug and tune. This paper provides a brief introduction to the Intel TBB flow graph interface and an overview of the key features provided by the Flow Graph Designer. Three examples are then presented that demonstrate the utility of this tool for important usage scenarios encountered while designing and analyzing flow graph applications.",
"fno": "5615a149",
"keywords": [
"Flow Graphs",
"Concurrent Computing",
"Parallel Processing",
"Hardware",
"Image Color Analysis",
"Instruction Sets",
"Engines",
"Code Construction",
"Data Flow Graphs",
"Dependency Graphs",
"Performance Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Vasanth Tovinkere",
"givenName": "Vasanth",
"surname": "Tovinkere",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Michael Voss",
"givenName": "Michael",
"surname": "Voss",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icppw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-09-01T00:00:00",
"pubType": "proceedings",
"pages": "149-158",
"year": "2014",
"issn": "1530-2016",
"isbn": "978-1-4799-5615-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5615a139",
"articleId": "12OmNwe2InN",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5615a159",
"articleId": "12OmNvTTcjH",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/edac/1992/2645/0/00205921",
"title": "A data flow graph exchange standard",
"doi": null,
"abstractUrl": "/proceedings-article/edac/1992/00205921/12OmNA14AdD",
"parentPublication": {
"id": "proceedings/edac/1992/2645/0",
"title": "Proceedings The European Conference on Design Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/infvis/2005/9464/0/01532150",
"title": "Flow map layout",
"doi": null,
"abstractUrl": "/proceedings-article/infvis/2005/01532150/12OmNs59JIW",
"parentPublication": {
"id": "proceedings/infvis/2005/9464/0",
"title": "IEEE Symposium on Information Visualization (InfoVis 05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hcs/2008/8871/0/07476561",
"title": "Tukwila - a quad-core Intel® Itanium® processor",
"doi": null,
"abstractUrl": "/proceedings-article/hcs/2008/07476561/12OmNvjyxz3",
"parentPublication": {
"id": "proceedings/hcs/2008/8871/0",
"title": "2008 IEEE Hot Chips 20 Symposium (HCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2017/3408/0/3408a766",
"title": "Comparison of Threading Programming Models",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2017/3408a766/12OmNxI0KA9",
"parentPublication": {
"id": "proceedings/ipdpsw/2017/3408/0",
"title": "2017 IEEE International Parallel and Distributed Processing Symposium: Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isca/1989/8948/0/00714524",
"title": "Exploiting Data Parallelism In Signal Processing On A Data Flow Machine",
"doi": null,
"abstractUrl": "/proceedings-article/isca/1989/00714524/12OmNxxNbWp",
"parentPublication": {
"id": "proceedings/isca/1989/8948/0",
"title": "The 16th Annual International Symposium on Computer Architecture",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisa/2011/9222/0/05772423",
"title": "Accelerating Multimedia Applications Using Intel Threading Building Blocks on Multi-Core Processors",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2011/05772423/12OmNyQGRZU",
"parentPublication": {
"id": "proceedings/icisa/2011/9222/0",
"title": "2011 International Conference on Information Science and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/1993/3700/0/00346036",
"title": "Modeling software for accurate data flow representation",
"doi": null,
"abstractUrl": "/proceedings-article/icse/1993/00346036/12OmNzUgdgQ",
"parentPublication": {
"id": "proceedings/icse/1993/3700/0",
"title": "Proceedings of 1993 15th International Conference on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2005/2790/0/01532150",
"title": "Flow map layout",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2005/01532150/12OmNzV70DQ",
"parentPublication": {
"id": "proceedings/ieee-infovis/2005/2790/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1986/11/01676696",
"title": "A Formal Definition of Data Flow Graph Models",
"doi": null,
"abstractUrl": "/journal/tc/1986/11/01676696/13rRUygBwdx",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2021/2463/0/246300a952",
"title": "Graph Representation for Data Flow Coverage",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2021/246300a952/1wLcnuxwTp6",
"parentPublication": {
"id": "proceedings/compsac/2021/2463/0",
"title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAJVcFF",
"title": "2016 15th International Symposium on Parallel and Distributed Computing (ISPDC)",
"acronym": "ispdc",
"groupId": "1000528",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzdoMP9",
"doi": "10.1109/ISPDC.2016.15",
"title": "Finding SCCs in Real-World Graphs on External Memory: A Task-Based Approach",
"normalizedTitle": "Finding SCCs in Real-World Graphs on External Memory: A Task-Based Approach",
"abstract": "Finding Strongly Connected Components (SCCs) in graphs is one of the important research topics of graph data mining. Traditional methods of finding SCCs need to fully load the whole graph into the main memory of a computer before actual processing. However, with the rapid growth of real-world graphs, the sizes of graphs easily exceed the main memory space of an ordinary computer. The distributed graph processing system running on a cluster and the out-of-core system utilizing the external memory all can handle that huge graph, but recent evidences (e.g., GridGraph) show that the external memory systems are more cost-effective and efficient than the distributed systems on conducting most graph mining tasks. Existing external memory solutions are inefficient on finding SCCs in large-scale graphs for two reasons: (1) The data-parallel processing model adopted is not efficient to find SCCs in a largescale graph. (2) Their poor support for graph mutation incurs excessively high overhead. In this paper, we study the problem of finding SCCs in big real-world graphs by using the external memory. We propose a task-based approach and an efficient graph mutation method to address the limitations in existing external solutions for finding SCCs. Experiment results show that our approach is orders of magnitude faster than existing external memory solutions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Finding Strongly Connected Components (SCCs) in graphs is one of the important research topics of graph data mining. Traditional methods of finding SCCs need to fully load the whole graph into the main memory of a computer before actual processing. However, with the rapid growth of real-world graphs, the sizes of graphs easily exceed the main memory space of an ordinary computer. The distributed graph processing system running on a cluster and the out-of-core system utilizing the external memory all can handle that huge graph, but recent evidences (e.g., GridGraph) show that the external memory systems are more cost-effective and efficient than the distributed systems on conducting most graph mining tasks. Existing external memory solutions are inefficient on finding SCCs in large-scale graphs for two reasons: (1) The data-parallel processing model adopted is not efficient to find SCCs in a largescale graph. (2) Their poor support for graph mutation incurs excessively high overhead. In this paper, we study the problem of finding SCCs in big real-world graphs by using the external memory. We propose a task-based approach and an efficient graph mutation method to address the limitations in existing external solutions for finding SCCs. Experiment results show that our approach is orders of magnitude faster than existing external memory solutions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Finding Strongly Connected Components (SCCs) in graphs is one of the important research topics of graph data mining. Traditional methods of finding SCCs need to fully load the whole graph into the main memory of a computer before actual processing. However, with the rapid growth of real-world graphs, the sizes of graphs easily exceed the main memory space of an ordinary computer. The distributed graph processing system running on a cluster and the out-of-core system utilizing the external memory all can handle that huge graph, but recent evidences (e.g., GridGraph) show that the external memory systems are more cost-effective and efficient than the distributed systems on conducting most graph mining tasks. Existing external memory solutions are inefficient on finding SCCs in large-scale graphs for two reasons: (1) The data-parallel processing model adopted is not efficient to find SCCs in a largescale graph. (2) Their poor support for graph mutation incurs excessively high overhead. In this paper, we study the problem of finding SCCs in big real-world graphs by using the external memory. We propose a task-based approach and an efficient graph mutation method to address the limitations in existing external solutions for finding SCCs. Experiment results show that our approach is orders of magnitude faster than existing external memory solutions.",
"fno": "07904268",
"keywords": [
"Data Structures",
"Directed Graphs",
"Parallel Processing",
"SCC",
"Real World Graphs",
"Strongly Connected Components",
"Graph Data Mining",
"Graph Sizes",
"Distributed Graph Processing",
"Grid Graph",
"External Memory Systems",
"Data Parallel Processing Model",
"Large Scale Graph",
"Task Based Approach",
"Graph Mutation Method",
"Image Color Analysis",
"Partitioning Algorithms",
"Algorithm Design And Analysis",
"Image Edge Detection",
"Color",
"Data Mining",
"Computers",
"Graph Processing",
"Big Data",
"Strongly Connected Components"
],
"authors": [
{
"affiliation": null,
"fullName": "Huiming Lv",
"givenName": "Huiming",
"surname": "Lv",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhiyuan Shao",
"givenName": "Zhiyuan",
"surname": "Shao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xuanhua Shi",
"givenName": "Xuanhua",
"surname": "Shi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hai Jin",
"givenName": "Hai",
"surname": "Jin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ispdc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-01-01T00:00:00",
"pubType": "proceedings",
"pages": "48-55",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-4152-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07904267",
"articleId": "12OmNyGbI6k",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07904269",
"articleId": "12OmNzE54IE",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2013/9999/0/06877525",
"title": "On fast parallel detection of strongly connected components (SCC) in small-world graphs",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2013/06877525/12OmNBDQbm0",
"parentPublication": {
"id": "proceedings/sc/2013/9999/0",
"title": "2013 SC - International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2015/7303/0/07072830",
"title": "Discovering large subsets with high quality partitions in real world graphs",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2015/07072830/12OmNqyUUsG",
"parentPublication": {
"id": "proceedings/bigcomp/2015/7303/0",
"title": "2015 International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2013/4797/0/06596126",
"title": "Smooth bundling of large streaming and sequence graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2013/06596126/12OmNscfI0r",
"parentPublication": {
"id": "proceedings/pacificvis/2013/4797/0",
"title": "2013 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2015/9711/0/5720b071",
"title": "Video Summarization via Segments Summary Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2015/5720b071/12OmNvxbhKS",
"parentPublication": {
"id": "proceedings/iccvw/2015/9711/0",
"title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2014/2555/0/06816652",
"title": "Contract & Expand: I/O Efficient SCCs Computing",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2014/06816652/12OmNzkMlRo",
"parentPublication": {
"id": "proceedings/icde/2014/2555/0",
"title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2018/8384/0/838400a731",
"title": "iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2018/838400a731/17D45XacGhS",
"parentPublication": {
"id": "proceedings/sc/2018/8384/0",
"title": "2018 SC18: The International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09720180",
"title": "VividGraph: Learning to Extract and Redesign Network Graphs from Visualization Images",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09720180/1Befc7QugjS",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2022/04/09120364",
"title": "Improving I/O Complexity of Triangle Enumeration",
"doi": null,
"abstractUrl": "/journal/tk/2022/04/09120364/1kLe6QmQecw",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icci*cc/2019/1419/0/09146098",
"title": "Visualizing the Temporal Similarity Between Clusters of Dynamic Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icci*cc/2019/09146098/1lFJdiVGPio",
"parentPublication": {
"id": "proceedings/icci*cc/2019/1419/0",
"title": "2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/04/09664361",
"title": "Efficient Semi-External SCC Computation",
"doi": null,
"abstractUrl": "/journal/tk/2023/04/09664361/1zHDyTA0MEM",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "18jXxWg9hao",
"title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "18jXy2pmyR2",
"doi": "10.1109/ICDMW.2018.00040",
"title": "MinerLSD: Efficient Local Pattern Mining on Attributed Graphs",
"normalizedTitle": "MinerLSD: Efficient Local Pattern Mining on Attributed Graphs",
"abstract": "Local pattern mining on attributed graphs is an important and interesting research area combining ideas from network analysis and graph mining. In this paper, we present MinerLSD, a method for efficient local pattern mining on attributed graphs. In order to prevent the typical pattern explosion in pattern mining, we employ closed patterns for focusing pattern exploration. In addition, we exploit efficient techniques for pruning the pattern space: We adapt a local variant of the Modularity metric with optimistic estimates, and include graph abstractions. Our experiments on several standard datasets demonstrate the efficacy of our proposed novel method MinerLSD as an efficient method for local pattern mining on attributed graphs.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Local pattern mining on attributed graphs is an important and interesting research area combining ideas from network analysis and graph mining. In this paper, we present MinerLSD, a method for efficient local pattern mining on attributed graphs. In order to prevent the typical pattern explosion in pattern mining, we employ closed patterns for focusing pattern exploration. In addition, we exploit efficient techniques for pruning the pattern space: We adapt a local variant of the Modularity metric with optimistic estimates, and include graph abstractions. Our experiments on several standard datasets demonstrate the efficacy of our proposed novel method MinerLSD as an efficient method for local pattern mining on attributed graphs.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Local pattern mining on attributed graphs is an important and interesting research area combining ideas from network analysis and graph mining. In this paper, we present MinerLSD, a method for efficient local pattern mining on attributed graphs. In order to prevent the typical pattern explosion in pattern mining, we employ closed patterns for focusing pattern exploration. In addition, we exploit efficient techniques for pruning the pattern space: We adapt a local variant of the Modularity metric with optimistic estimates, and include graph abstractions. Our experiments on several standard datasets demonstrate the efficacy of our proposed novel method MinerLSD as an efficient method for local pattern mining on attributed graphs.",
"fno": "928800a219",
"keywords": [
"Data Analysis",
"Data Mining",
"Graph Theory",
"Network Theory Graphs",
"Attributed Graphs",
"Network Analysis",
"Graph Mining",
"Pattern Exploration",
"Graph Abstractions",
"Local Pattern Mining",
"Pattern Space Pruning",
"Modularity Metric",
"Data Mining",
"Focusing",
"Standards",
"Image Edge Detection",
"Correlation",
"Itemsets",
"Conferences",
"Complex Networks Mining Attributed Graphs Closed Pattern Mining Community Detection"
],
"authors": [
{
"affiliation": null,
"fullName": "Martin Atzmueller",
"givenName": "Martin",
"surname": "Atzmueller",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Henry Soldano",
"givenName": "Henry",
"surname": "Soldano",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Guillaume Santini",
"givenName": "Guillaume",
"surname": "Santini",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dominique Bouthinon",
"givenName": "Dominique",
"surname": "Bouthinon",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-11-01T00:00:00",
"pubType": "proceedings",
"pages": "219-228",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-9288-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "928800a210",
"articleId": "18jXGT3Icww",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "928800a229",
"articleId": "18jXGjQSSgo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/grc/2010/7964/0/05576058",
"title": "Local Pattern Mining from Sequences Using Rough Set Theory",
"doi": null,
"abstractUrl": "/proceedings-article/grc/2010/05576058/12OmNAXxWWp",
"parentPublication": {
"id": "proceedings/grc/2010/7964/0",
"title": "2010 IEEE International Conference on Granular Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2014/4302/0/4302a827",
"title": "Heavyweight Pattern Mining in Attributed Flow Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2014/4302a827/12OmNAhxjE5",
"parentPublication": {
"id": "proceedings/icdm/2014/4302/0",
"title": "2014 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2014/5118/0/5118b394",
"title": "Attributed Graph Mining and Matching: An Attempt to Define and Extract Soft Attributed Patterns",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2014/5118b394/12OmNvDI3HF",
"parentPublication": {
"id": "proceedings/cvpr/2014/5118/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/8391a055",
"title": "Mining And-Or Graphs for Graph Matching and Object Discovery",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391a055/12OmNvm6VF2",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2016/5473/0/07837938",
"title": "Mining Statistically Significant Attribute Associations in Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2016/07837938/12OmNvoFjS8",
"parentPublication": {
"id": "proceedings/icdm/2016/5473/0",
"title": "2016 IEEE 16th International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2015/3854/0/07403718",
"title": "Local rules associated to k-communities in an attributed graph",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2015/07403718/12OmNwErpzA",
"parentPublication": {
"id": "proceedings/asonam/2015/3854/0",
"title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2013/5108/0/5108a647",
"title": "Statistical Selection of Congruent Subspaces for Mining Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2013/5108a647/12OmNx7G5U6",
"parentPublication": {
"id": "proceedings/icdm/2013/5108/0",
"title": "2013 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2015/0163/0/0163a250",
"title": "Local Knowledge Discovery in Attributed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2015/0163a250/12OmNy6ZrYd",
"parentPublication": {
"id": "proceedings/ictai/2015/0163/0",
"title": "2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2016/03/07159067",
"title": "Object Discovery: Soft Attributed Graph Mining",
"doi": null,
"abstractUrl": "/journal/tp/2016/03/07159067/13rRUwI5TYI",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/10103170",
"title": "Efficient Community Search in Edge-Attributed Graphs",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/10103170/1MpWK7curFS",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyqRne0",
"title": "2012 IEEE International Symposium on Multimedia",
"acronym": "ism",
"groupId": "1001094",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyr8YlK",
"doi": "10.1109/ISM.2012.26",
"title": "Automatic Classification of Teeth in Bitewing Dental Images Using OLPP",
"normalizedTitle": "Automatic Classification of Teeth in Bitewing Dental Images Using OLPP",
"abstract": "Teeth classification is an important component in building an Automated Dental Identification System (ADIS) as part of creating a data structure that guides tooth-to-tooth matching. This aids in avoiding illogical comparisons that both inefficiently consume the limited computational resources and mislead decision-making. We tackle this problem by using low computational-cost, appearance-based Orthogonal Locality Preserving Projection (OLPP) algorithm to assign an initial class, i.e. molar or premolar to the teeth in bitewing dental images. After this initial classification, we use a string matching technique, based on teeth neighborhood rules, to validate initial teeth-classes and thus assign each tooth a number corresponding to its location in the dental chart. On a large dataset of bitewing films that contain 622 teeth, the proposed approach achieves classification accuracy of 89% and teeth class validation enhances the overall teeth classification accuracy to 92%.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Teeth classification is an important component in building an Automated Dental Identification System (ADIS) as part of creating a data structure that guides tooth-to-tooth matching. This aids in avoiding illogical comparisons that both inefficiently consume the limited computational resources and mislead decision-making. We tackle this problem by using low computational-cost, appearance-based Orthogonal Locality Preserving Projection (OLPP) algorithm to assign an initial class, i.e. molar or premolar to the teeth in bitewing dental images. After this initial classification, we use a string matching technique, based on teeth neighborhood rules, to validate initial teeth-classes and thus assign each tooth a number corresponding to its location in the dental chart. On a large dataset of bitewing films that contain 622 teeth, the proposed approach achieves classification accuracy of 89% and teeth class validation enhances the overall teeth classification accuracy to 92%.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Teeth classification is an important component in building an Automated Dental Identification System (ADIS) as part of creating a data structure that guides tooth-to-tooth matching. This aids in avoiding illogical comparisons that both inefficiently consume the limited computational resources and mislead decision-making. We tackle this problem by using low computational-cost, appearance-based Orthogonal Locality Preserving Projection (OLPP) algorithm to assign an initial class, i.e. molar or premolar to the teeth in bitewing dental images. After this initial classification, we use a string matching technique, based on teeth neighborhood rules, to validate initial teeth-classes and thus assign each tooth a number corresponding to its location in the dental chart. On a large dataset of bitewing films that contain 622 teeth, the proposed approach achieves classification accuracy of 89% and teeth class validation enhances the overall teeth classification accuracy to 92%.",
"fno": "4875a092",
"keywords": [
"Laplacianteeth Spaces",
"Teeth Classification",
"Orthogonal Locality Preserving Projection OLPP"
],
"authors": [
{
"affiliation": null,
"fullName": "Nourdin Al-sherif",
"givenName": "Nourdin",
"surname": "Al-sherif",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Guodong Guo",
"givenName": "Guodong",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hany H. Ammar",
"givenName": "Hany H.",
"surname": "Ammar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ism",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-12-01T00:00:00",
"pubType": "proceedings",
"pages": "92-95",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-4370-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4875a088",
"articleId": "12OmNqBKU6e",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4875a096",
"articleId": "12OmNro0IeX",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/gcis/2009/3571/4/3571d369",
"title": "An Effective Classification System for Dental Bitewing Radiographs Using Entire Tooth",
"doi": null,
"abstractUrl": "/proceedings-article/gcis/2009/3571d369/12OmNvTBB5p",
"parentPublication": {
"id": "proceedings/gcis/2009/3571/4",
"title": "2009 WRI Global Congress on Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2008/3407/1/3407a897",
"title": "Automatic Tooth Region Separation for Dental CT Images",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2008/3407a897/12OmNvmG7WR",
"parentPublication": {
"id": "iccit/2008/3407/1",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2013/3926/0/06726480",
"title": "An effective numbering and classification system for dental panoramic radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2013/06726480/12OmNzaQoCq",
"parentPublication": {
"id": "proceedings/icccnt/2013/3926/0",
"title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a145",
"title": "A New Approach to Teeth Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a145/12OmNzlUKwe",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09720214",
"title": "TeethGNN: Semantic 3D Teeth Segmentation with Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09720214/1BefbMXPO3C",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600u0720",
"title": "DArch: Dental Arch Prior-assisted 3D Tooth Instance Segmentation with Weak Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600u0720/1H1kFKjFl16",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956708",
"title": "Automatic teeth segmentation on panoramic X-rays using deep neural networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956708/1IHqmXCw89O",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismvl/2020/5406/0/540600a016",
"title": "Automatic Teeth Recognition in Dental X-Ray Images Using Transfer Learning Based Faster R-CNN",
"doi": null,
"abstractUrl": "/proceedings-article/ismvl/2020/540600a016/1qciaA2XbHy",
"parentPublication": {
"id": "proceedings/ismvl/2020/5406/0",
"title": "2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icphds/2020/8571/0/857100a347",
"title": "Research Progress of Dental Tissue Engineering Technology",
"doi": null,
"abstractUrl": "/proceedings-article/icphds/2020/857100a347/1rxhpAtku0o",
"parentPublication": {
"id": "proceedings/icphds/2020/8571/0",
"title": "2020 International Conference on Public Health and Data Science (ICPHDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1JC1F8KcINO",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "9994793",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1JC3u99qicM",
"doi": "10.1109/BIBM55620.2022.9995297",
"title": "LeFUNet: UNet with Learnable Feature Connections for Teeth Identification and Segmentation in Dental Panoramic X-ray Images",
"normalizedTitle": "LeFUNet: UNet with Learnable Feature Connections for Teeth Identification and Segmentation in Dental Panoramic X-ray Images",
"abstract": "Deep learning methods have widely been applied to accurately identify and segment individual teeth in panoramic X-ray radiographs. However, the task becomes challenging as deep learning models grow deeper and wider. Contextual information have to pass through many layers leading to features vanishing before reaching the end of the model. This study proposes a deep learning-based three-step model to identify and segment individual teeth from panoramic X-ray radiographs to address the issues above. Firstly, an automatic binarized transformation of panoramic images to deal with computational complexity of high-dimensionality with respect to less training data is conducted. The transformed images are then trained on with a vanilla top-down learnable feature connection based UNet. Specifically, a learnable feature connection module that incorporates an improved squeeze and excitation module with dense connections to ensure feature propagation and facilitating information flow throughout the network is designed and conveniently plunged into a UNet. Finally, accurate individual tooth identification and segmentation is achieved using proposed regions via bounding detection techniques. Extensive evaluation on a publicly available dental panoramic X-ray benchmark demonstrated the effectiveness the proposed scheme by obtaining a Dice score of 96.94%, 97.93% for accuracy, 97.03% for recall, 96.81% for precision, 97.61% for specificity and 93.52% for Jaccard Coefficient Score, which are significantly superior to the recent state-of-the-art methods for individual tooth identification and segmentation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Deep learning methods have widely been applied to accurately identify and segment individual teeth in panoramic X-ray radiographs. However, the task becomes challenging as deep learning models grow deeper and wider. Contextual information have to pass through many layers leading to features vanishing before reaching the end of the model. This study proposes a deep learning-based three-step model to identify and segment individual teeth from panoramic X-ray radiographs to address the issues above. Firstly, an automatic binarized transformation of panoramic images to deal with computational complexity of high-dimensionality with respect to less training data is conducted. The transformed images are then trained on with a vanilla top-down learnable feature connection based UNet. Specifically, a learnable feature connection module that incorporates an improved squeeze and excitation module with dense connections to ensure feature propagation and facilitating information flow throughout the network is designed and conveniently plunged into a UNet. Finally, accurate individual tooth identification and segmentation is achieved using proposed regions via bounding detection techniques. Extensive evaluation on a publicly available dental panoramic X-ray benchmark demonstrated the effectiveness the proposed scheme by obtaining a Dice score of 96.94%, 97.93% for accuracy, 97.03% for recall, 96.81% for precision, 97.61% for specificity and 93.52% for Jaccard Coefficient Score, which are significantly superior to the recent state-of-the-art methods for individual tooth identification and segmentation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Deep learning methods have widely been applied to accurately identify and segment individual teeth in panoramic X-ray radiographs. However, the task becomes challenging as deep learning models grow deeper and wider. Contextual information have to pass through many layers leading to features vanishing before reaching the end of the model. This study proposes a deep learning-based three-step model to identify and segment individual teeth from panoramic X-ray radiographs to address the issues above. Firstly, an automatic binarized transformation of panoramic images to deal with computational complexity of high-dimensionality with respect to less training data is conducted. The transformed images are then trained on with a vanilla top-down learnable feature connection based UNet. Specifically, a learnable feature connection module that incorporates an improved squeeze and excitation module with dense connections to ensure feature propagation and facilitating information flow throughout the network is designed and conveniently plunged into a UNet. Finally, accurate individual tooth identification and segmentation is achieved using proposed regions via bounding detection techniques. Extensive evaluation on a publicly available dental panoramic X-ray benchmark demonstrated the effectiveness the proposed scheme by obtaining a Dice score of 96.94%, 97.93% for accuracy, 97.03% for recall, 96.81% for precision, 97.61% for specificity and 93.52% for Jaccard Coefficient Score, which are significantly superior to the recent state-of-the-art methods for individual tooth identification and segmentation.",
"fno": "09995297",
"keywords": [
"Computational Complexity",
"Deep Learning Artificial Intelligence",
"Dentistry",
"Diagnostic Radiography",
"Feature Extraction",
"Image Classification",
"Image Segmentation",
"Medical Image Processing",
"Automatic Binarized Transformation",
"Bounding Detection",
"Computational Complexity",
"Deep Learning",
"Dental Panoramic X Ray Images",
"Feature Connection",
"Feature Propagation",
"Information Flow",
"Le FU Net",
"Panoramic X Ray Radiographs",
"Teeth Identification",
"Teeth Segmentation",
"Tooth Identification",
"Deep Learning",
"Radiography",
"Image Segmentation",
"Face Recognition",
"Computational Modeling",
"Training Data",
"Teeth",
"Tooth Identification",
"Dental Panoramic Radio Graph",
"Deep Learning",
"Feature Connections",
"Convolutional Neural Network"
],
"authors": [
{
"affiliation": "Uni. of Electronic Sci. and Tech. of China,Sch. of Inf. and Software Eng,Chengdu,China",
"fullName": "Yunbo Rao",
"givenName": "Yunbo",
"surname": "Rao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Uni. of Elect. Sci. and Tech. of China,Sch. of Inf. and Software Eng,Chengdu,China",
"fullName": "Obed Tettey Nartey",
"givenName": "Obed Tettey",
"surname": "Nartey",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yangtze Delta Region Institute (Huzhou) Uni. of Elect. Sci. and Tech. of China,Huzhou,China",
"fullName": "Shaoning Zeng",
"givenName": "Shaoning",
"surname": "Zeng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Uni. of Electronic Sci. and Tech. of China,Sch. of Inf. and Software Eng,Chengdu,China",
"fullName": "Kingsley Nketiah Acheampong",
"givenName": "Kingsley Nketiah",
"surname": "Acheampong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Cape Coast, Cape Coast,Computer Science and Information Tech,Cape Coast,Ghana",
"fullName": "Charles Roland Haruna",
"givenName": "Charles Roland",
"surname": "Haruna",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sichuan University,West China School of Stomatology,Chengdu,China",
"fullName": "Jianxun Sun",
"givenName": "Jianxun",
"surname": "Sun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "2110-2118",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6819-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09995438",
"articleId": "1JC1Gas11Ly",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09995353",
"articleId": "1JC2WgyWzzG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2006/2521/3/01699692",
"title": "Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/01699692/12OmNBK5m8j",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/3",
"title": "2006 18th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a092",
"title": "Automatic Classification of Teeth in Bitewing Dental Images Using OLPP",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a092/12OmNyr8YlK",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2013/3926/0/06726480",
"title": "An effective numbering and classification system for dental panoramic radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2013/06726480/12OmNzaQoCq",
"parentPublication": {
"id": "proceedings/icccnt/2013/3926/0",
"title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a145",
"title": "A New Approach to Teeth Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a145/12OmNzlUKwe",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2018/9264/0/926400a400",
"title": "Deep Instance Segmentation of Teeth in Panoramic X-Ray Images",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2018/926400a400/17D45W1Oa4w",
"parentPublication": {
"id": "proceedings/sibgrapi/2018/9264/0",
"title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956708",
"title": "Automatic teeth segmentation on panoramic X-rays using deep neural networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956708/1IHqmXCw89O",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlise/2022/9246/0/924600a024",
"title": "Pneumothorax segmentation of chest X-rays using improved UNet++",
"doi": null,
"abstractUrl": "/proceedings-article/mlise/2022/924600a024/1Ik8XHE3iko",
"parentPublication": {
"id": "proceedings/mlise/2022/9246/0",
"title": "2022 International Conference on Machine Learning and Intelligent Systems Engineering (MLISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995187",
"title": "Utilizing Deep Learning to Opportunistically Screen for Osteoporosis from Dental Panoramic Radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995187/1JC2DguvZuw",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600f583",
"title": "Self-Supervised Learning with Masked Image Modeling for Teeth Numbering, Detection of Dental Restorations, and Instance Segmentation in Dental Panoramic Radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600f583/1L8qxxnly2k",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2020/9274/0/927400a164",
"title": "A study on tooth segmentation and numbering using end-to-end deep neural networks",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2020/927400a164/1p2VzkB4pji",
"parentPublication": {
"id": "proceedings/sibgrapi/2020/9274/0",
"title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KxUhhFgzlK",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"acronym": "wacv",
"groupId": "1000040",
"volume": "0",
"displayVolume": "0",
"year": "2023",
"__typename": "ProceedingType"
},
"article": {
"id": "1L8qxxnly2k",
"doi": "10.1109/WACV56688.2023.00555",
"title": "Self-Supervised Learning with Masked Image Modeling for Teeth Numbering, Detection of Dental Restorations, and Instance Segmentation in Dental Panoramic Radiographs",
"normalizedTitle": "Self-Supervised Learning with Masked Image Modeling for Teeth Numbering, Detection of Dental Restorations, and Instance Segmentation in Dental Panoramic Radiographs",
"abstract": "The computer-assisted radiologic informative report is currently emerging in dental practice to facilitate dental care and reduce time consumption in manual panoramic radiographic interpretation. However, the amount of dental radiographs for training is very limited, particularly from the point of view of deep learning. This study aims to utilize recent self-supervised learning methods like SimMIM and UM-MAE to increase the model efficiency and understanding of the limited number of dental radiographs. We use the Swin Transformer for teeth numbering, detection of dental restorations, and instance segmentation tasks. To the best of our knowledge, this is the first study that applied self-supervised learning methods to Swin Transformer on dental panoramic radiographs. Our results show that the SimMIM method obtained the highest performance of 90.4% and 88.9% on detecting teeth and dental restorations and instance segmentation, respectively, increasing the average precision by 13.4 and 12.8 over the random initialization baseline. Moreover, we augment and correct the existing dataset of panoramic radiographs. The code and the dataset are available at https://github.com/AmaniHAlmalki/DentalMIM.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The computer-assisted radiologic informative report is currently emerging in dental practice to facilitate dental care and reduce time consumption in manual panoramic radiographic interpretation. However, the amount of dental radiographs for training is very limited, particularly from the point of view of deep learning. This study aims to utilize recent self-supervised learning methods like SimMIM and UM-MAE to increase the model efficiency and understanding of the limited number of dental radiographs. We use the Swin Transformer for teeth numbering, detection of dental restorations, and instance segmentation tasks. To the best of our knowledge, this is the first study that applied self-supervised learning methods to Swin Transformer on dental panoramic radiographs. Our results show that the SimMIM method obtained the highest performance of 90.4% and 88.9% on detecting teeth and dental restorations and instance segmentation, respectively, increasing the average precision by 13.4 and 12.8 over the random initialization baseline. Moreover, we augment and correct the existing dataset of panoramic radiographs. The code and the dataset are available at https://github.com/AmaniHAlmalki/DentalMIM.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The computer-assisted radiologic informative report is currently emerging in dental practice to facilitate dental care and reduce time consumption in manual panoramic radiographic interpretation. However, the amount of dental radiographs for training is very limited, particularly from the point of view of deep learning. This study aims to utilize recent self-supervised learning methods like SimMIM and UM-MAE to increase the model efficiency and understanding of the limited number of dental radiographs. We use the Swin Transformer for teeth numbering, detection of dental restorations, and instance segmentation tasks. To the best of our knowledge, this is the first study that applied self-supervised learning methods to Swin Transformer on dental panoramic radiographs. Our results show that the SimMIM method obtained the highest performance of 90.4% and 88.9% on detecting teeth and dental restorations and instance segmentation, respectively, increasing the average precision by 13.4 and 12.8 over the random initialization baseline. Moreover, we augment and correct the existing dataset of panoramic radiographs. The code and the dataset are available at https://github.com/AmaniHAlmalki/DentalMIM.",
"fno": "934600f583",
"keywords": [
"Deep Learning Artificial Intelligence",
"Dentistry",
"Diagnostic Radiography",
"Feature Extraction",
"Image Classification",
"Image Segmentation",
"Learning Artificial Intelligence",
"Medical Image Processing",
"Radiology",
"Supervised Learning",
"Unsupervised Learning",
"Computer Assisted Radiologic Informative Report",
"Deep Learning",
"Dental Care",
"Dental Panoramic Radiographs",
"Dental Practice",
"Dental Radiographs",
"Dental Restorations",
"Detecting Teeth",
"Instance Segmentation Tasks",
"Manual Panoramic Radiographic Interpretation",
"Masked Image Modeling",
"Model Efficiency",
"Swin Transformer",
"Teeth Numbering",
"Radiography",
"Training",
"Image Segmentation",
"Teeth",
"Self Supervised Learning",
"Transformers",
"Dentistry"
],
"authors": [
{
"affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA",
"fullName": "Amani Almalki",
"givenName": "Amani",
"surname": "Almalki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA",
"fullName": "Longin Jan Latecki",
"givenName": "Longin Jan",
"surname": "Latecki",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wacv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2023-01-01T00:00:00",
"pubType": "proceedings",
"pages": "5583-5592",
"year": "2023",
"issn": null,
"isbn": "978-1-6654-9346-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "934600f573",
"articleId": "1L8qCg1dsic",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "934600f593",
"articleId": "1KxUSIYhUNa",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2004/2128/3/212830522",
"title": "Tooth Contour Extraction for Matching Dental Radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2004/212830522/12OmNAq3hJA",
"parentPublication": {
"id": "proceedings/icpr/2004/2128/3",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/3/01699692",
"title": "Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/01699692/12OmNBK5m8j",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/3",
"title": "2006 18th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761734",
"title": "Medical image registration using Phase-Only Correlation for distorted dental radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761734/12OmNvSbBHh",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gcis/2009/3571/4/3571d369",
"title": "An Effective Classification System for Dental Bitewing Radiographs Using Entire Tooth",
"doi": null,
"abstractUrl": "/proceedings-article/gcis/2009/3571d369/12OmNvTBB5p",
"parentPublication": {
"id": "proceedings/gcis/2009/3571/4",
"title": "2009 WRI Global Congress on Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2017/1324/0/132401a327",
"title": "Near-Infrared Transillumination Guides Administration of Dental 2D Radiography and CBCT Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2017/132401a327/12OmNvyjGh4",
"parentPublication": {
"id": "proceedings/bibe/2017/1324/0",
"title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2013/3926/0/06726480",
"title": "An effective numbering and classification system for dental panoramic radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2013/06726480/12OmNzaQoCq",
"parentPublication": {
"id": "proceedings/icccnt/2013/3926/0",
"title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956708",
"title": "Automatic teeth segmentation on panoramic X-rays using deep neural networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956708/1IHqmXCw89O",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995187",
"title": "Utilizing Deep Learning to Opportunistically Screen for Osteoporosis from Dental Panoramic Radiographs",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995187/1JC2DguvZuw",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995297",
"title": "LeFUNet: UNet with Learnable Feature Connections for Teeth Identification and Segmentation in Dental Panoramic X-ray Images",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995297/1JC3u99qicM",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxRnvRV",
"title": "2006 IEEE/ACM 6th Joint Conference on Digital Libraries",
"acronym": "jcdl",
"groupId": "1804605",
"volume": "0",
"displayVolume": "0",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNviZljW",
"doi": "10.1145/1141753.1141766",
"title": "A comparative study of citations and links in document classification",
"normalizedTitle": "A comparative study of citations and links in document classification",
"abstract": "It is well known that links are an important source of information when dealing with Web collections. However, the question remains on whether the same techniques that are used on the Web can be applied to collections of documents containing citations between scientific papers. In this work we present a comparative study of digital library citations and Web links, in the context of automatic text classification. We show that there are in fact differences between citations and links in this context. For the comparison, we run a series of experiments using a digital library of computer science papers and a Web directory. In our reference collections, measures based on co-citation tend to perform better for pages in the Web directory, with gains up to 37% over text based classifiers, while measures based on bibliographic coupling perform better in a digital library. We also propose a simple and effective way of combining a traditional text based classifier with a citation-link based classifier. This combination is based on the notion of classifier reliability and presented gains of up to 14% in micro-averaged F1 in the Web collection. However, no significant gain was obtained in the digital library. Finally, a user study was performed to further investigate the causes for these results. We discovered that misclassifications by the citation-link based classifiers are in fact difficult cases, hard to classify even for humans",
"abstracts": [
{
"abstractType": "Regular",
"content": "It is well known that links are an important source of information when dealing with Web collections. However, the question remains on whether the same techniques that are used on the Web can be applied to collections of documents containing citations between scientific papers. In this work we present a comparative study of digital library citations and Web links, in the context of automatic text classification. We show that there are in fact differences between citations and links in this context. For the comparison, we run a series of experiments using a digital library of computer science papers and a Web directory. In our reference collections, measures based on co-citation tend to perform better for pages in the Web directory, with gains up to 37% over text based classifiers, while measures based on bibliographic coupling perform better in a digital library. We also propose a simple and effective way of combining a traditional text based classifier with a citation-link based classifier. This combination is based on the notion of classifier reliability and presented gains of up to 14% in micro-averaged F1 in the Web collection. However, no significant gain was obtained in the digital library. Finally, a user study was performed to further investigate the causes for these results. We discovered that misclassifications by the citation-link based classifiers are in fact difficult cases, hard to classify even for humans",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "It is well known that links are an important source of information when dealing with Web collections. However, the question remains on whether the same techniques that are used on the Web can be applied to collections of documents containing citations between scientific papers. In this work we present a comparative study of digital library citations and Web links, in the context of automatic text classification. We show that there are in fact differences between citations and links in this context. For the comparison, we run a series of experiments using a digital library of computer science papers and a Web directory. In our reference collections, measures based on co-citation tend to perform better for pages in the Web directory, with gains up to 37% over text based classifiers, while measures based on bibliographic coupling perform better in a digital library. We also propose a simple and effective way of combining a traditional text based classifier with a citation-link based classifier. This combination is based on the notion of classifier reliability and presented gains of up to 14% in micro-averaged F1 in the Web collection. However, no significant gain was obtained in the digital library. Finally, a user study was performed to further investigate the causes for these results. We discovered that misclassifications by the citation-link based classifiers are in fact difficult cases, hard to classify even for humans",
"fno": "04119100",
"keywords": [
"Citation Analysis",
"Classification",
"Digital Libraries",
"Internet",
"Text Analysis",
"Citation Analysis",
"Document Classification",
"Web Collection",
"Digital Library",
"Text Classification",
"Software Libraries",
"Computer Science",
"Text Categorization",
"Humans",
"Web Pages",
"Gain Measurement",
"Performance Evaluation",
"Performance Gain",
"Information Retrieval",
"Permission",
"Digital Libraries",
"Links",
"Text Classification",
"Web Directories"
],
"authors": [
{
"affiliation": "Federal University of Amazonas, Manaus, Brazil",
"fullName": "Edleno Moura",
"givenName": "Edleno",
"surname": "Moura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IST/INESC-ID, Lisboa, Portugal",
"fullName": "Pavel Calado",
"givenName": "Pavel",
"surname": "Calado",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minas Gerais, Belo Horizonte, Brazil",
"fullName": "Nivio Ziviani",
"givenName": "Nivio",
"surname": "Ziviani",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Federal University Minas Gerais, Belo Horizonte, Brazil and Google Engineering, Belo Horizonte, Brazil",
"fullName": "Berthier Ribeiro-Neto",
"givenName": "Berthier",
"surname": "Ribeiro-Neto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minas Gerais, Belo Horizonte, Brazil",
"fullName": "Marco Cristo",
"givenName": "Marco",
"surname": "Cristo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minas Gerais, Belo Horizonte, Brazil",
"fullName": "Marcos Andre Goncalves",
"givenName": "Marcos Andre",
"surname": "Goncalves",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minas Gerais, Belo Horizonte, Brazil",
"fullName": "Thierson Couto",
"givenName": "Thierson",
"surname": "Couto",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "jcdl",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-06-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2006",
"issn": null,
"isbn": "1-59593-354-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04119099",
"articleId": "12OmNvTBB77",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04119101",
"articleId": "12OmNz5JC8v",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isdea/2013/4893/0/06456317",
"title": "Automatic Classification of Uighur Web Pages",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2013/06456317/12OmNB9t6sh",
"parentPublication": {
"id": "proceedings/isdea/2013/4893/0",
"title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2004/832/0/01336139",
"title": "Two supervised learning approaches for name disambiguation in author citations",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2004/01336139/12OmNwdtwdd",
"parentPublication": {
"id": "proceedings/jcdl/2004/832/0",
"title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2004/832/0/01336152",
"title": "Enabling interoperability for autonomous digital libraries: an API to CiteSeer services",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2004/01336152/12OmNxwENBc",
"parentPublication": {
"id": "proceedings/jcdl/2004/832/0",
"title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2005/876/0/04118563",
"title": "Name disambiguation in author citations using a K-way spectral clustering method",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16",
"parentPublication": {
"id": "proceedings/jcdl/2005/876/0",
"title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2005/876/0/04118542",
"title": "From playful exhibits to LOM: lessons from building an exploratorium digital library",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2005/04118542/12OmNy3iFtQ",
"parentPublication": {
"id": "proceedings/jcdl/2005/876/0",
"title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2004/832/0/01336104",
"title": "A document corpus browser for in-depth reading",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2004/01336104/12OmNy5R3Ee",
"parentPublication": {
"id": "proceedings/jcdl/2004/832/0",
"title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2014/2504/0/2504b813",
"title": "Large-Scale Web Page Classification",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2014/2504b813/12OmNynJMRZ",
"parentPublication": {
"id": "proceedings/hicss/2014/2504/0",
"title": "2014 47th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2007/1509/0/04375740",
"title": "Supervised HITS Algorithm for MEDLINE Citation Ranking",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2007/04375740/12OmNzCWG5t",
"parentPublication": {
"id": "proceedings/bibe/2007/1509/0",
"title": "7th IEEE International Conference on Bioinformatics and Bioengineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09716779",
"title": "LegalVis: Exploring and Inferring Precedent Citations in Legal Documents",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09716779/1B5WCvEX76E",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0/08726851",
"title": "Webchain: Verifiable Citations and References for the World Wide Web",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2018/08726851/1axfuVXUQdW",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0",
"title": "2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAH5djV",
"title": "2016 12th International Conference on Semantics, Knowledge and Grids (SKG)",
"acronym": "skg",
"groupId": "1001333",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvjgWuo",
"doi": "10.1109/SKG.2016.016",
"title": "Summarization of Related Work through Citations",
"normalizedTitle": "Summarization of Related Work through Citations",
"abstract": "Automatically generating the related work section for a writing paper is useful for researchers as it can save a lot of time and avoid missing related works. The related work section of scientific paper usually introduces other researchers' work published before and makes comparisons with the current author's work. This paper proposes an approach to automatically generating related work by comparing the main text of the writing paper with the citations to the references from other papers. Our approach firstly collects the papers that cite the reference papers of the writing paper and extracts the corresponding citation sentences to form a citation document. It then makes a summarization that makes a comparison between the citation document and the writing paper's abstract, introduction and conclusion. It extracts the representative keywords from the citation document and the writing paper, and constructs a graph of the keywords. The discriminated nodes in the graph are figured out, and then the minimum Steiner tree that covers the nodes is extracted. A summary is generated by extracting the sentences covering the Steiner tree. The experiments show that our approach outperforms three baselines MEAD, ReWoS and ARWG according to ROUGE evaluation results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Automatically generating the related work section for a writing paper is useful for researchers as it can save a lot of time and avoid missing related works. The related work section of scientific paper usually introduces other researchers' work published before and makes comparisons with the current author's work. This paper proposes an approach to automatically generating related work by comparing the main text of the writing paper with the citations to the references from other papers. Our approach firstly collects the papers that cite the reference papers of the writing paper and extracts the corresponding citation sentences to form a citation document. It then makes a summarization that makes a comparison between the citation document and the writing paper's abstract, introduction and conclusion. It extracts the representative keywords from the citation document and the writing paper, and constructs a graph of the keywords. The discriminated nodes in the graph are figured out, and then the minimum Steiner tree that covers the nodes is extracted. A summary is generated by extracting the sentences covering the Steiner tree. The experiments show that our approach outperforms three baselines MEAD, ReWoS and ARWG according to ROUGE evaluation results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Automatically generating the related work section for a writing paper is useful for researchers as it can save a lot of time and avoid missing related works. The related work section of scientific paper usually introduces other researchers' work published before and makes comparisons with the current author's work. This paper proposes an approach to automatically generating related work by comparing the main text of the writing paper with the citations to the references from other papers. Our approach firstly collects the papers that cite the reference papers of the writing paper and extracts the corresponding citation sentences to form a citation document. It then makes a summarization that makes a comparison between the citation document and the writing paper's abstract, introduction and conclusion. It extracts the representative keywords from the citation document and the writing paper, and constructs a graph of the keywords. The discriminated nodes in the graph are figured out, and then the minimum Steiner tree that covers the nodes is extracted. A summary is generated by extracting the sentences covering the Steiner tree. The experiments show that our approach outperforms three baselines MEAD, ReWoS and ARWG according to ROUGE evaluation results.",
"fno": "4795a054",
"keywords": [
"Writing",
"Steiner Trees",
"Feature Extraction",
"Semantics",
"Data Preprocessing",
"Optimization",
"Patents",
"Related Work",
"Summarization",
"Citation"
],
"authors": [
{
"affiliation": null,
"fullName": "Jingqiang Chen",
"givenName": "Jingqiang",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hai Zhuge",
"givenName": "Hai",
"surname": "Zhuge",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "skg",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-08-01T00:00:00",
"pubType": "proceedings",
"pages": "54-61",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-4795-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4795a047",
"articleId": "12OmNyO8tWB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4795a062",
"articleId": "12OmNxYL5fc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/jcdl/2017/3861/0/07991598",
"title": "Exploring Features for Predicting Policy Citations",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2017/07991598/12OmNBU1jIv",
"parentPublication": {
"id": "proceedings/jcdl/2017/3861/0",
"title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2017/1629/0/08024549",
"title": "A Steiner tree based approach for the efficient support of multipoint communications in a multi-domain context",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2017/08024549/12OmNCwlaiE",
"parentPublication": {
"id": "proceedings/iscc/2017/1629/0",
"title": "2017 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi/2004/2100/0/21000117",
"title": "TSSP: A Reinforcement Algorithm to Find Related Papers",
"doi": null,
"abstractUrl": "/proceedings-article/wi/2004/21000117/12OmNvlPkxx",
"parentPublication": {
"id": "proceedings/wi/2004/2100/0",
"title": "Web Intelligence, IEEE / WIC / ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a520",
"title": "More on the Inverse Problem of Steiner Wiener Index",
"doi": null,
"abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a520/12OmNy2Jt7E",
"parentPublication": {
"id": "proceedings/ispan-fcst-iscc/2017/0840/0",
"title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccad/1997/8200/0/82000713",
"title": "Interconnect layout optimization under higher-order RLC model",
"doi": null,
"abstractUrl": "/proceedings-article/iccad/1997/82000713/12OmNzBwGwP",
"parentPublication": {
"id": "proceedings/iccad/1997/8200/0",
"title": "Computer-Aided Design, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a100",
"title": "Steiner Distance in Join, Corona and Threshold Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a100/12OmNzQR1mT",
"parentPublication": {
"id": "proceedings/ispan-fcst-iscc/2017/0840/0",
"title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aike/2018/9555/0/955500a234",
"title": "Multi-Term Semantic Context Elicitation from Collaborative Networks",
"doi": null,
"abstractUrl": "/proceedings-article/aike/2018/955500a234/17D45Wda7gu",
"parentPublication": {
"id": "proceedings/aike/2018/9555/0",
"title": "2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/candarw/2022/7532/0/753200a416",
"title": "Fully Dynamic Algorithm for the Steiner Tree Problem in Planar Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/candarw/2022/753200a416/1LAz0pH1dnO",
"parentPublication": {
"id": "proceedings/candarw/2022/7532/0",
"title": "2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/focs/2020/9621/0/962100b368",
"title": "Beyond Tree Embeddings – a Deterministic Framework for Network Design with Deadlines or Delay",
"doi": null,
"abstractUrl": "/proceedings-article/focs/2020/962100b368/1qyxuKr0eAw",
"parentPublication": {
"id": "proceedings/focs/2020/9621/0",
"title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2021/1893/0/09516853",
"title": "Algorithms for a Variant of the Full Steiner Tree Problem",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2021/09516853/1wiRA4DKBTq",
"parentPublication": {
"id": "proceedings/icis/2021/1893/0",
"title": "2021 IEEE/ACIS 19th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyS6RMG",
"title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)",
"acronym": "jcdl",
"groupId": "1804605",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx19jWP",
"doi": "",
"title": "Predicting medical subject headings based on abstract similarity and citations to MEDLINE records",
"normalizedTitle": "Predicting medical subject headings based on abstract similarity and citations to MEDLINE records",
"abstract": "We describe a classifier-enhanced nearest neighbor approach to assigning Medical Subject Headings (MeSH®) to unlabeled documents using a combination of abstract similarities and direct citations to labeled MEDLINE records. The approach frames the classification problem by decomposing it into sets of siblings in the MeSH hierarchy (e.g., training a classifier for predicting “Heterocyclic Compounds, 2-Ring” vs. other “Heterocyclic Compounds”). Preliminary experiments using a small but diverse set of MeSH terms shows the highest performance when using both abstracts and citations compared to each alone, and coupled with a non-naive classifier: 90+% precision and recall with 10fold cross-validation. NLM's Medical Text Indexer (MTI) tool achieves similar overall performance but varies more across the terms tested. For example, MTI performs better on “Heterocyclic Compounds, 2-Ring”, while our approach performs better on Alzheimer Disease and Neuroimaging. Our approach can be applied broadly to documents with abstracts that are similar to (or cite) MEDLINE abstracts, which would help linking and searching across bibliographic databases beyond MEDLINE.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We describe a classifier-enhanced nearest neighbor approach to assigning Medical Subject Headings (MeSH®) to unlabeled documents using a combination of abstract similarities and direct citations to labeled MEDLINE records. The approach frames the classification problem by decomposing it into sets of siblings in the MeSH hierarchy (e.g., training a classifier for predicting “Heterocyclic Compounds, 2-Ring” vs. other “Heterocyclic Compounds”). Preliminary experiments using a small but diverse set of MeSH terms shows the highest performance when using both abstracts and citations compared to each alone, and coupled with a non-naive classifier: 90+% precision and recall with 10fold cross-validation. NLM's Medical Text Indexer (MTI) tool achieves similar overall performance but varies more across the terms tested. For example, MTI performs better on “Heterocyclic Compounds, 2-Ring”, while our approach performs better on Alzheimer Disease and Neuroimaging. Our approach can be applied broadly to documents with abstracts that are similar to (or cite) MEDLINE abstracts, which would help linking and searching across bibliographic databases beyond MEDLINE.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We describe a classifier-enhanced nearest neighbor approach to assigning Medical Subject Headings (MeSH®) to unlabeled documents using a combination of abstract similarities and direct citations to labeled MEDLINE records. The approach frames the classification problem by decomposing it into sets of siblings in the MeSH hierarchy (e.g., training a classifier for predicting “Heterocyclic Compounds, 2-Ring” vs. other “Heterocyclic Compounds”). Preliminary experiments using a small but diverse set of MeSH terms shows the highest performance when using both abstracts and citations compared to each alone, and coupled with a non-naive classifier: 90+% precision and recall with 10fold cross-validation. NLM's Medical Text Indexer (MTI) tool achieves similar overall performance but varies more across the terms tested. For example, MTI performs better on “Heterocyclic Compounds, 2-Ring”, while our approach performs better on Alzheimer Disease and Neuroimaging. Our approach can be applied broadly to documents with abstracts that are similar to (or cite) MEDLINE abstracts, which would help linking and searching across bibliographic databases beyond MEDLINE.",
"fno": "07559580",
"keywords": [
"Compounds",
"Neuroimaging",
"Dementia",
"Biomedical Imaging",
"Libraries",
"Curation Of Bibliographic Databases",
"Controlled Vocabularies",
"Medical Subject Headings",
"Machine Learning"
],
"authors": [
{
"affiliation": "Graduate School of Library and Information Science, University of Illinois at Urbana-Champaign, Champaign, IL, USA",
"fullName": "Adam K. Kehoe",
"givenName": "Adam K.",
"surname": "Kehoe",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graduate School of Library and Information Science, University of Illinois at Urbana-Champaign, Champaign, IL, USA",
"fullName": "Vetle I. Torvik",
"givenName": "Vetle I.",
"surname": "Torvik",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "jcdl",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-06-01T00:00:00",
"pubType": "proceedings",
"pages": "167-170",
"year": "2016",
"issn": null,
"isbn": "978-1-4503-4229-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07559579",
"articleId": "12OmNrAdsBu",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07559581",
"articleId": "12OmNzXnNDu",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/jcdl/2006/354/0/04119128",
"title": "A comprehensive comparison study of document clustering for a biomedical digital library MEDLINE",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2006/04119128/12OmNxWLTow",
"parentPublication": {
"id": "proceedings/jcdl/2006/354/0",
"title": "2006 IEEE/ACM 6th Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccabs/2011/4851/0/249",
"title": "Poster: Analysis of gene ranking algorithms with extraction of relevant biomedical concepts from PubMed publications",
"doi": null,
"abstractUrl": "/proceedings-article/iccabs/2011/249/12OmNyQpgMy",
"parentPublication": {
"id": "proceedings/iccabs/2011/4851/0",
"title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2016/2846/0/07752305",
"title": "Evolution of MEDLINE bibliographic database: Preliminary results",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2016/07752305/12OmNzcxZjk",
"parentPublication": {
"id": "proceedings/asonam/2016/2846/0",
"title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hisb/2012/4921/0/4921a072",
"title": "Automatically Extracting Sentences from Medline Citations to Support Clinicians' Information Needs",
"doi": null,
"abstractUrl": "/proceedings-article/hisb/2012/4921a072/12OmNzkuKGk",
"parentPublication": {
"id": "proceedings/hisb/2012/4921/0",
"title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800b580",
"title": "Parallel Computing for Large-Scale Author Name Disambiguation in MEDLINE",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800b580/1dPoxsenTKo",
"parentPublication": {
"id": "proceedings/hpcc-smartcity-dss/2019/2058/0",
"title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCvLY1P",
"title": "2017 Tenth International Conference on Contemporary Computing (IC3)",
"acronym": "ic3",
"groupId": "1803947",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzBwGop",
"doi": "10.1109/IC3.2017.8284324",
"title": "Approaches for information retrieval in legal documents",
"normalizedTitle": "Approaches for information retrieval in legal documents",
"abstract": "With crimes increasing at an alarming rate, it becomes essential to impart justice to the victims readily. To come to a final decision, lawyers need to study several previous judgments for research purposes. Reducing the time spent on research can speed up the judicial process drastically. The time consumption mostly happens in two areas - searching for the right document and understanding that document. To start with, being able to get hold of the appropriate judgments or other legal documents is the most essential task for any legal professional, especially lawyers. Once a document is obtained, the next most integral and inevitable task is to read and re-read it, and come to necessary as well as needful conclusions after a comprehensive analysis. To resolve the first issue, there is a need for an efficient search system which can provide searching options based upon multiple views. This system is an effort at improving the search for users by providing them with search options based upon either the semantics of the word or based upon the IPC sections. It is important that laymen can access all the related judgments by entering just one keyword or phrase without bothering about the legal jargon. Post retrieval of documents, the lengthy texts have to be scrutinized for meaningful inferences. To reduce the time spent in reading texts, we intend to present the information in the judgments visually through semantic networks. Lawyers will be benefitted by this system because it will enable them to skip the complexity of the often verbose language of the legal documents. This IR System provides the features of semantic and IPC section based search to users, deriving information from semantic networks that are representative of the documents, so that a more efficient search system on legal documents can be put in place.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With crimes increasing at an alarming rate, it becomes essential to impart justice to the victims readily. To come to a final decision, lawyers need to study several previous judgments for research purposes. Reducing the time spent on research can speed up the judicial process drastically. The time consumption mostly happens in two areas - searching for the right document and understanding that document. To start with, being able to get hold of the appropriate judgments or other legal documents is the most essential task for any legal professional, especially lawyers. Once a document is obtained, the next most integral and inevitable task is to read and re-read it, and come to necessary as well as needful conclusions after a comprehensive analysis. To resolve the first issue, there is a need for an efficient search system which can provide searching options based upon multiple views. This system is an effort at improving the search for users by providing them with search options based upon either the semantics of the word or based upon the IPC sections. It is important that laymen can access all the related judgments by entering just one keyword or phrase without bothering about the legal jargon. Post retrieval of documents, the lengthy texts have to be scrutinized for meaningful inferences. To reduce the time spent in reading texts, we intend to present the information in the judgments visually through semantic networks. Lawyers will be benefitted by this system because it will enable them to skip the complexity of the often verbose language of the legal documents. This IR System provides the features of semantic and IPC section based search to users, deriving information from semantic networks that are representative of the documents, so that a more efficient search system on legal documents can be put in place.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With crimes increasing at an alarming rate, it becomes essential to impart justice to the victims readily. To come to a final decision, lawyers need to study several previous judgments for research purposes. Reducing the time spent on research can speed up the judicial process drastically. The time consumption mostly happens in two areas - searching for the right document and understanding that document. To start with, being able to get hold of the appropriate judgments or other legal documents is the most essential task for any legal professional, especially lawyers. Once a document is obtained, the next most integral and inevitable task is to read and re-read it, and come to necessary as well as needful conclusions after a comprehensive analysis. To resolve the first issue, there is a need for an efficient search system which can provide searching options based upon multiple views. This system is an effort at improving the search for users by providing them with search options based upon either the semantics of the word or based upon the IPC sections. It is important that laymen can access all the related judgments by entering just one keyword or phrase without bothering about the legal jargon. Post retrieval of documents, the lengthy texts have to be scrutinized for meaningful inferences. To reduce the time spent in reading texts, we intend to present the information in the judgments visually through semantic networks. Lawyers will be benefitted by this system because it will enable them to skip the complexity of the often verbose language of the legal documents. This IR System provides the features of semantic and IPC section based search to users, deriving information from semantic networks that are representative of the documents, so that a more efficient search system on legal documents can be put in place.",
"fno": "08284324",
"keywords": [
"Information Retrieval",
"Internet",
"Legal Documents",
"Legal Professional",
"Efficient Search System",
"Search Options",
"Legal Jargon",
"Information Retrieval",
"Semantics",
"Law",
"Task Analysis",
"Tools",
"Information Retrieval",
"Data Mining"
],
"authors": [
{
"affiliation": "Department of Information Technology, Indira Gandhi Delhi Technical University for Women, India",
"fullName": "Rachayita Giri",
"givenName": "Rachayita",
"surname": "Giri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science Engineering, Indira Gandhi Delhi Technical University for Women, India",
"fullName": "Yosha Porwal",
"givenName": "Yosha",
"surname": "Porwal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science Engineering, Indira Gandhi Delhi Technical University for Women, India",
"fullName": "Vaibhavi Shukla",
"givenName": "Vaibhavi",
"surname": "Shukla",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science Engineering, Indira Gandhi Delhi Technical University for Women, India",
"fullName": "Palak Chadha",
"givenName": "Palak",
"surname": "Chadha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Information Technology, Indira Gandhi Delhi Technical University for Women, India",
"fullName": "Rishabh Kaushal",
"givenName": "Rishabh",
"surname": "Kaushal",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ic3",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2017",
"issn": "2572-6129",
"isbn": "978-1-5386-3077-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08284323",
"articleId": "12OmNvAAtEF",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08284325",
"articleId": "12OmNrJiCHC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/edocw/2015/9331/0/9331a041",
"title": "A Methodology for Extracting Legal Norms from Regulatory Documents",
"doi": null,
"abstractUrl": "/proceedings-article/edocw/2015/9331a041/12OmNqJ8tkL",
"parentPublication": {
"id": "proceedings/edocw/2015/9331/0",
"title": "2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sera/2016/0809/0/07516131",
"title": "Detecting hidden structures from Arabic electronic documents: Application to the legal field",
"doi": null,
"abstractUrl": "/proceedings-article/sera/2016/07516131/12OmNrkBwy2",
"parentPublication": {
"id": "proceedings/sera/2016/0809/0",
"title": "2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/relaw/2013/0950/0/06671349",
"title": "Applying gaiust for extracting requirements from legal documents",
"doi": null,
"abstractUrl": "/proceedings-article/relaw/2013/06671349/12OmNx8fiel",
"parentPublication": {
"id": "proceedings/relaw/2013/0950/0",
"title": "2013 Sixth International Workshop on Requirements Engineering and Law (RELAW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aiccsa/2015/0478/0/07507219",
"title": "Towards an Arabic legal ontology based on documents properties extraction",
"doi": null,
"abstractUrl": "/proceedings-article/aiccsa/2015/07507219/12OmNy3RRz0",
"parentPublication": {
"id": "proceedings/aiccsa/2015/0478/0",
"title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/1997/8147/0/81470465",
"title": "En Route to Data Mining in Legal Text Corpora: Clustering, Neural Computation, and International Treaties",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/1997/81470465/12OmNyyeWzc",
"parentPublication": {
"id": "proceedings/dexa/1997/8147/0",
"title": "Database and Expert Systems Applications. 8th International Conference, DEXA '97. Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aike/2021/3736/0/373600a029",
"title": "Towards Intelligent Legal Advisors for Document Retrieval and Question-Answering in German Legal Documents",
"doi": null,
"abstractUrl": "/proceedings-article/aike/2021/373600a029/1BrADc8Hd5K",
"parentPublication": {
"id": "proceedings/aike/2021/3736/0",
"title": "2021 IEEE Fourth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/re/2019/3912/0/391200a319",
"title": "A Query System for Extracting Requirements-Related Information from Legal Texts",
"doi": null,
"abstractUrl": "/proceedings-article/re/2019/391200a319/1fHlvmoQzcI",
"parentPublication": {
"id": "proceedings/re/2019/3912/0",
"title": "2019 IEEE 27th International Requirements Engineering Conference (RE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ddp/2019/5363/0/536300a070",
"title": "Automatic Detection and Analysis of DPP Entities in Legal Contract Documents",
"doi": null,
"abstractUrl": "/proceedings-article/ddp/2019/536300a070/1grNRooYHoA",
"parentPublication": {
"id": "proceedings/ddp/2019/5363/0",
"title": "2019 First International Conference on Digital Data Processing (DDP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005659",
"title": "A Framework for Explainable Text Classification in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005659/1hJsCablZfy",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2020/6332/0/633200a464",
"title": "Understanding Legal Documents: Classification of Rhetorical Role of Sentences Using Deep Learning and Natural Language Processing",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2020/633200a464/1iffyXtj70c",
"parentPublication": {
"id": "proceedings/icsc/2020/6332/0",
"title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKir9",
"title": "2018 22nd International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WrVg8T",
"doi": "10.1109/iV.2018.00049",
"title": "Cartographies of the Legal World. Rise and Challenges of Visual Legal Analytics",
"normalizedTitle": "Cartographies of the Legal World. Rise and Challenges of Visual Legal Analytics",
"abstract": "In recent years, together with the adoption of data driven approaches and the development of computational heuristics, visualization has become part of a process that is gradually changing methods of social sciences. In this paper we present some applications of visual computing in the legal science and practice. After a brief introduction to the rise and challenges of what we define as Visual Legal Analytics, we briefly sketch the results of three research projects dealing with visualization at the boundaries between law and computer science discussing their objectives, advantages and perspectives.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In recent years, together with the adoption of data driven approaches and the development of computational heuristics, visualization has become part of a process that is gradually changing methods of social sciences. In this paper we present some applications of visual computing in the legal science and practice. After a brief introduction to the rise and challenges of what we define as Visual Legal Analytics, we briefly sketch the results of three research projects dealing with visualization at the boundaries between law and computer science discussing their objectives, advantages and perspectives.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In recent years, together with the adoption of data driven approaches and the development of computational heuristics, visualization has become part of a process that is gradually changing methods of social sciences. In this paper we present some applications of visual computing in the legal science and practice. After a brief introduction to the rise and challenges of what we define as Visual Legal Analytics, we briefly sketch the results of three research projects dealing with visualization at the boundaries between law and computer science discussing their objectives, advantages and perspectives.",
"fno": "720200a241",
"keywords": [
"Data Visualisation",
"Law",
"Law Administration",
"Social Sciences",
"Visual Legal Analytics",
"Social Sciences",
"Visual Computing",
"Legal Science",
"Law",
"Computer Science",
"Visualization",
"Law",
"Data Visualization",
"Tools",
"Visual Analytics",
"Data Mining",
"Computational Legal Science",
"Visual Analytics",
"Legal Informatics"
],
"authors": [
{
"affiliation": null,
"fullName": "Nicola Lettieri",
"givenName": "Nicola",
"surname": "Lettieri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Delfina Malandrino",
"givenName": "Delfina",
"surname": "Malandrino",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-07-01T00:00:00",
"pubType": "proceedings",
"pages": "241-246",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-7202-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "720200a235",
"articleId": "17D45WWzW4D",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "720200a247",
"articleId": "17D45VW8bqc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2017/0831/0/0831a422",
"title": "Visual Analytics for Electronic Intelligence: Challenges and Opportunities",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2017/0831a422/12OmNB7LvBm",
"parentPublication": {
"id": "proceedings/iv/2017/0831/0",
"title": "2017 21st International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2014/6227/0/07042522",
"title": "A sketch+fisheye interface for visual analytics of large time-series",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2014/07042522/12OmNvAiSiA",
"parentPublication": {
"id": "proceedings/vast/2014/6227/0",
"title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc/2016/4297/0/07828556",
"title": "Agile Visual Analytics in Data Science Systems",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc/2016/07828556/12OmNyPQ4Qw",
"parentPublication": {
"id": "proceedings/hpcc/2016/4297/0",
"title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2016/5670/0/5670b426",
"title": "Introduction to the Minitrack on Interactive Visual Decision Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2016/5670b426/12OmNzWfoUn",
"parentPublication": {
"id": "proceedings/hicss/2016/5670/0",
"title": "2016 49th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2011/05/mcg2011050018",
"title": "Graph Analytics—Lessons Learned and Challenges Ahead",
"doi": null,
"abstractUrl": "/magazine/cg/2011/05/mcg2011050018/13rRUxASu6j",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2018/9194/0/08534019",
"title": "Multiple Workspaces in Visual Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2018/08534019/17D45W9KVIu",
"parentPublication": {
"id": "proceedings/bdva/2018/9194/0",
"title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020637",
"title": "Ishikawa, JESS, and Visual Analytics for Engineering",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020637/1KfRI7ZM8Ja",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2019/9226/0/922600a237",
"title": "Designing Narrative Slideshows for Learning Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2019/922600a237/1cMF6FsJ8zK",
"parentPublication": {
"id": "proceedings/pacificvis/2019/9226/0",
"title": "2019 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2019/2838/0/283800a133",
"title": "Visual Analytics to Make Sense of Large-Scale Administrative and Normative Data",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2019/283800a133/1cMFavfKXqE",
"parentPublication": {
"id": "proceedings/iv/2019/2838/0",
"title": "2019 23rd International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/04/08984335",
"title": "PeckVis: A Visual Analytics Tool to Analyze Dominance Hierarchies in Small Groups",
"doi": null,
"abstractUrl": "/journal/tg/2020/04/08984335/1haTxOaV8eA",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1HJzEHOAkLK",
"title": "2022 International Symposium on the Tsetlin Machine (ISTM)",
"acronym": "istm",
"groupId": "1848044",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1HJzGIZp65G",
"doi": "10.1109/ISTM54910.2022.00011",
"title": "Interpretable Text Classification in Legal Contract Documents using Tsetlin Machines",
"normalizedTitle": "Interpretable Text Classification in Legal Contract Documents using Tsetlin Machines",
"abstract": "Legal text contains various challenges in automated processing, compounded by the lack of detailed resources available for them. However, the ability of process such texts automatically is highly sought after. In this paper we try to parse a set of contract documents and identify key legal terminologies present in them, with the help of four text processing methods from different backgrounds: Tsetlin Machines, BERT, CNNBiLSTM and FastText. We show that the TM based approach works at par with other popular methods, with the added benefit of making available important clause literals that can act as specific linguistic cues to legal terminology.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Legal text contains various challenges in automated processing, compounded by the lack of detailed resources available for them. However, the ability of process such texts automatically is highly sought after. In this paper we try to parse a set of contract documents and identify key legal terminologies present in them, with the help of four text processing methods from different backgrounds: Tsetlin Machines, BERT, CNNBiLSTM and FastText. We show that the TM based approach works at par with other popular methods, with the added benefit of making available important clause literals that can act as specific linguistic cues to legal terminology.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Legal text contains various challenges in automated processing, compounded by the lack of detailed resources available for them. However, the ability of process such texts automatically is highly sought after. In this paper we try to parse a set of contract documents and identify key legal terminologies present in them, with the help of four text processing methods from different backgrounds: Tsetlin Machines, BERT, CNNBiLSTM and FastText. We show that the TM based approach works at par with other popular methods, with the added benefit of making available important clause literals that can act as specific linguistic cues to legal terminology.",
"fno": "711600a007",
"keywords": [
"Law",
"Terminology",
"Text Recognition",
"Text Categorization",
"Bit Error Rate",
"Linguistics",
"Contracts",
"Tsetlin Machine",
"Pattern Recognition",
"Interpretable AI",
"Legal Document Analysis"
],
"authors": [
{
"affiliation": "University of Agder,Department of IKT,Grimstad,Norway",
"fullName": "Rupsa Saha",
"givenName": "Rupsa",
"surname": "Saha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Agder,Department of IKT,Grimstad,Norway",
"fullName": "Sander Jyhne",
"givenName": "Sander",
"surname": "Jyhne",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "istm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "7-12",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-7116-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "711600a001",
"articleId": "1HJzHDCnxXG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "711600a013",
"articleId": "1HJzG4ZFlM4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dexa/2000/0680/0/06801087",
"title": "Some Remarks on Vector Representations of Legal Documents",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2000/06801087/12OmNyuy9U7",
"parentPublication": {
"id": "proceedings/dexa/2000/0680/0",
"title": "Proceedings 11th International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258076",
"title": "Empirical evaluations of active learning strategies in legal document review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258076/17D45XERmli",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671486",
"title": "Comparison of Deep Learning Technologies in Legal Document Classification",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671486/1A8hnx4ZRUA",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/istm/2022/7116/0/711600a073",
"title": "Focused Negative Sampling for Increased Discriminative Power in Tsetlin Machines",
"doi": null,
"abstractUrl": "/proceedings-article/istm/2022/711600a073/1HJzGtJBEGI",
"parentPublication": {
"id": "proceedings/istm/2022/7116/0",
"title": "2022 International Symposium on the Tsetlin Machine (ISTM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020626",
"title": "Explainable Text Classification Techniques in Legal Document Review: Locating Rationales without Using Human Annotated Training Text Snippets",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020626/1KfRuNBMwjS",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ddp/2019/5363/0/536300a070",
"title": "Automatic Detection and Analysis of DPP Entities in Legal Contract Documents",
"doi": null,
"abstractUrl": "/proceedings-article/ddp/2019/536300a070/1grNRooYHoA",
"parentPublication": {
"id": "proceedings/ddp/2019/5363/0",
"title": "2019 First International Conference on Digital Data Processing (DDP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006182",
"title": "Experimental Evaluation of CNN Parameters for Text Categorization in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006182/1hJrOVhe4qA",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005659",
"title": "A Framework for Explainable Text Classification in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005659/1hJsCablZfy",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/blockchain/2020/0495/0/049500a273",
"title": "Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract",
"doi": null,
"abstractUrl": "/proceedings-article/blockchain/2020/049500a273/1pttTSlan0A",
"parentPublication": {
"id": "proceedings/blockchain/2020/0495/0",
"title": "2020 IEEE International Conference on Blockchain (Blockchain)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09378182",
"title": "CNN Application in Detection of Privileged Documents in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09378182/1s64SyTIVAk",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1ckrD0rVw1q",
"title": "2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)",
"acronym": "jcdl",
"groupId": "1804605",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1ckrHKT4bgA",
"doi": "10.1109/JCDL.2019.00026",
"title": "Improving Academic Plagiarism Detection for STEM Documents by Analyzing Mathematical Content and Citations",
"normalizedTitle": "Improving Academic Plagiarism Detection for STEM Documents by Analyzing Mathematical Content and Citations",
"abstract": "Identifying academic plagiarism is a pressing task for educational and research institutions, publishers, and funding agencies. Current plagiarism detection systems reliably find instances of copied and moderately reworded text. However, reliably detecting concealed plagiarism, such as strong paraphrases, translations, and the reuse of nontextual content and ideas is an open research problem. In this paper, we extend our prior research on analyzing mathematical content and academic citations. Both are promising approaches for improving the detection of concealed academic plagiarism primarily in Science, Technology, Engineering and Mathematics (STEM). We make the following contributions: i) We present a two-stage detection process that combines similarity assessments of mathematical content, academic citations, and text. ii) We introduce new similarity measures that consider the order of mathematical features and outperform the measures in our prior research. iii) We compare the effectiveness of the math-based, citation-based, and text-based detection approaches using confirmed cases of academic plagiarism. iv) We demonstrate that the combined analysis of math-based and citation-based content features allows identifying potentially suspicious cases in a collection of 102K STEM documents. Overall, we show that analyzing the similarity of mathematical content and academic citations is a striking supplement for conventional text-based detection approaches for academic literature in the STEM disciplines. The data and code of our study are openly available at https://purl.org/hybridPD.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Identifying academic plagiarism is a pressing task for educational and research institutions, publishers, and funding agencies. Current plagiarism detection systems reliably find instances of copied and moderately reworded text. However, reliably detecting concealed plagiarism, such as strong paraphrases, translations, and the reuse of nontextual content and ideas is an open research problem. In this paper, we extend our prior research on analyzing mathematical content and academic citations. Both are promising approaches for improving the detection of concealed academic plagiarism primarily in Science, Technology, Engineering and Mathematics (STEM). We make the following contributions: i) We present a two-stage detection process that combines similarity assessments of mathematical content, academic citations, and text. ii) We introduce new similarity measures that consider the order of mathematical features and outperform the measures in our prior research. iii) We compare the effectiveness of the math-based, citation-based, and text-based detection approaches using confirmed cases of academic plagiarism. iv) We demonstrate that the combined analysis of math-based and citation-based content features allows identifying potentially suspicious cases in a collection of 102K STEM documents. Overall, we show that analyzing the similarity of mathematical content and academic citations is a striking supplement for conventional text-based detection approaches for academic literature in the STEM disciplines. The data and code of our study are openly available at https://purl.org/hybridPD.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Identifying academic plagiarism is a pressing task for educational and research institutions, publishers, and funding agencies. Current plagiarism detection systems reliably find instances of copied and moderately reworded text. However, reliably detecting concealed plagiarism, such as strong paraphrases, translations, and the reuse of nontextual content and ideas is an open research problem. In this paper, we extend our prior research on analyzing mathematical content and academic citations. Both are promising approaches for improving the detection of concealed academic plagiarism primarily in Science, Technology, Engineering and Mathematics (STEM). We make the following contributions: i) We present a two-stage detection process that combines similarity assessments of mathematical content, academic citations, and text. ii) We introduce new similarity measures that consider the order of mathematical features and outperform the measures in our prior research. iii) We compare the effectiveness of the math-based, citation-based, and text-based detection approaches using confirmed cases of academic plagiarism. iv) We demonstrate that the combined analysis of math-based and citation-based content features allows identifying potentially suspicious cases in a collection of 102K STEM documents. Overall, we show that analyzing the similarity of mathematical content and academic citations is a striking supplement for conventional text-based detection approaches for academic literature in the STEM disciplines. The data and code of our study are openly available at https://purl.org/hybridPD.",
"fno": "154700a120",
"keywords": [
"Citation Analysis",
"Educational Administrative Data Processing",
"STEM",
"Text Analysis",
"Citation Based Content Features",
"STEM Documents",
"Mathematical Content",
"Academic Citations",
"Educational Research Institutions",
"Nontextual Content",
"Concealed Academic Plagiarism",
"Two Stage Detection Process",
"Text Based Detection Approaches",
"Academic Plagiarism Detection",
"Math Based Content Features",
"Semantics",
"Plagiarism",
"STEM",
"Feature Extraction",
"Task Analysis",
"Text Analysis",
"Syntactics",
"Plagiarism Detection Document Retrieval Mathematical Information Retrieval Citation Analysis"
],
"authors": [
{
"affiliation": "University of Wuppertal, Germany & University of Konstanz, Germany",
"fullName": "Norman Meuschke",
"givenName": "Norman",
"surname": "Meuschke",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Konstanz, Germany",
"fullName": "Vincent Stange",
"givenName": "Vincent",
"surname": "Stange",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Wuppertal, Germany",
"fullName": "Moritz Schubotz",
"givenName": "Moritz",
"surname": "Schubotz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Konstanz, Germany",
"fullName": "Michael Kramer",
"givenName": "Michael",
"surname": "Kramer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Wuppertal, Germany & University of Konstanz, Germany",
"fullName": "Bela Gipp",
"givenName": "Bela",
"surname": "Gipp",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "jcdl",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-06-01T00:00:00",
"pubType": "proceedings",
"pages": "120-129",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-1547-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "154700a111",
"articleId": "1ckrEfSrDOw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "154700a434",
"articleId": "1ckrE95M72U",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ic3/2017/3077/0/08284313",
"title": "CPLAG: Efficient plagiarism detection using bitwise operations",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2017/08284313/12OmNBKW9JF",
"parentPublication": {
"id": "proceedings/ic3/2017/3077/0",
"title": "2017 Tenth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bwcca/2015/8315/0/8315a178",
"title": "An AST-based Code Plagiarism Detection Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/bwcca/2015/8315a178/12OmNCfjeuo",
"parentPublication": {
"id": "proceedings/bwcca/2015/8315/0",
"title": "2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2014/5569/0/06970168",
"title": "Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2014/06970168/12OmNwtEEx7",
"parentPublication": {
"id": "proceedings/jcdl/2014/5569/0",
"title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eidwt/2013/2141/0/5044a714",
"title": "Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree",
"doi": null,
"abstractUrl": "/proceedings-article/eidwt/2013/5044a714/12OmNxQOjxK",
"parentPublication": {
"id": "proceedings/eidwt/2013/2141/0",
"title": "2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc/2011/4612/0/4612b096",
"title": "Web Based Cross Language Semantic Plagiarism Detection",
"doi": null,
"abstractUrl": "/proceedings-article/dasc/2011/4612b096/12OmNy2agXS",
"parentPublication": {
"id": "proceedings/dasc/2011/4612/0",
"title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2007/05/msp2007050062",
"title": "Plagiarism, Graduate Education, and Information Security",
"doi": null,
"abstractUrl": "/magazine/sp/2007/05/msp2007050062/13rRUyeTVgd",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2022/6244/0/09962396",
"title": "Enhancement of Plagiarism Detection Techniques via Watermarking",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2022/09962396/1IHnZ89s2PK",
"parentPublication": {
"id": "proceedings/fie/2022/6244/0",
"title": "2022 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/2020/12/09269877",
"title": "Plagiarism Detection: A Data Search Challenge",
"doi": null,
"abstractUrl": "/magazine/co/2020/12/09269877/1p1cmlyg61G",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2020/7624/0/762400b383",
"title": "Design and application of the prevention model based on the examination of academic plagiarism",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2020/762400b383/1uGYYzKWc8M",
"parentPublication": {
"id": "proceedings/csci/2020/7624/0",
"title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2021/3851/0/09637364",
"title": "Kitsune: Structurally Aware and Adaptable Plagiarism Detection",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2021/09637364/1zuwv3weEPm",
"parentPublication": {
"id": "proceedings/fie/2021/3851/0",
"title": "2021 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1s645BaTzVu",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1s64SyTIVAk",
"doi": "10.1109/BigData50022.2020.9378182",
"title": "CNN Application in Detection of Privileged Documents in Legal Document Review",
"normalizedTitle": "CNN Application in Detection of Privileged Documents in Legal Document Review",
"abstract": "Protecting privileged communications and data from disclosure is paramount for legal teams. Legal advice, such as attorney-client communications or litigation strategy are typically exempt from disclosure in litigations or regulatory events and are vital to the attorney-client relationship. To protect this information from disclosure, companies and outside counsel often review vast amounts of documents to determine those that contain privileged material. This process is extremely costly and time consuming. As data volumes increase, legal counsel normally employs methods to reduce the number of documents requiring review while balancing the need to ensure the protection of privileged information. Keyword searching is relied upon as a method to target privileged information and reduce document review populations. Keyword searches are effective at casting a wide net but often return overly inclusive results – most of which do not contain privileged information. To overcome the weaknesses of keyword searching, legal teams increasingly are using machine learning techniques to target privileged information. In these studies, classic text classification techniques are applied to build classification models to identify privileged documents. In this paper, the authors propose a different method by applying machine learning / convolutional neural network techniques (CNN) to identify privileged documents. Our proposed method combines keyword searching with CNN. For each keyword term, a CNN model is created using the context of the occurrences of the keyword. In addition, a method was proposed to select reliable privileged (positive) training keyword occurrences from labeled positive training documents. Extensive experiments were conducted, and the results show that the proposed methods can significantly reduce false positives while still capturing most of the true positives.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Protecting privileged communications and data from disclosure is paramount for legal teams. Legal advice, such as attorney-client communications or litigation strategy are typically exempt from disclosure in litigations or regulatory events and are vital to the attorney-client relationship. To protect this information from disclosure, companies and outside counsel often review vast amounts of documents to determine those that contain privileged material. This process is extremely costly and time consuming. As data volumes increase, legal counsel normally employs methods to reduce the number of documents requiring review while balancing the need to ensure the protection of privileged information. Keyword searching is relied upon as a method to target privileged information and reduce document review populations. Keyword searches are effective at casting a wide net but often return overly inclusive results – most of which do not contain privileged information. To overcome the weaknesses of keyword searching, legal teams increasingly are using machine learning techniques to target privileged information. In these studies, classic text classification techniques are applied to build classification models to identify privileged documents. In this paper, the authors propose a different method by applying machine learning / convolutional neural network techniques (CNN) to identify privileged documents. Our proposed method combines keyword searching with CNN. For each keyword term, a CNN model is created using the context of the occurrences of the keyword. In addition, a method was proposed to select reliable privileged (positive) training keyword occurrences from labeled positive training documents. Extensive experiments were conducted, and the results show that the proposed methods can significantly reduce false positives while still capturing most of the true positives.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Protecting privileged communications and data from disclosure is paramount for legal teams. Legal advice, such as attorney-client communications or litigation strategy are typically exempt from disclosure in litigations or regulatory events and are vital to the attorney-client relationship. To protect this information from disclosure, companies and outside counsel often review vast amounts of documents to determine those that contain privileged material. This process is extremely costly and time consuming. As data volumes increase, legal counsel normally employs methods to reduce the number of documents requiring review while balancing the need to ensure the protection of privileged information. Keyword searching is relied upon as a method to target privileged information and reduce document review populations. Keyword searches are effective at casting a wide net but often return overly inclusive results – most of which do not contain privileged information. To overcome the weaknesses of keyword searching, legal teams increasingly are using machine learning techniques to target privileged information. In these studies, classic text classification techniques are applied to build classification models to identify privileged documents. In this paper, the authors propose a different method by applying machine learning / convolutional neural network techniques (CNN) to identify privileged documents. Our proposed method combines keyword searching with CNN. For each keyword term, a CNN model is created using the context of the occurrences of the keyword. In addition, a method was proposed to select reliable privileged (positive) training keyword occurrences from labeled positive training documents. Extensive experiments were conducted, and the results show that the proposed methods can significantly reduce false positives while still capturing most of the true positives.",
"fno": "09378182",
"keywords": [
"Authorisation",
"Convolutional Neural Nets",
"Data Protection",
"Information Retrieval",
"Law Administration",
"Learning Artificial Intelligence",
"Pattern Classification",
"Text Analysis",
"Legal Counsel",
"Document Review Populations",
"Legal Teams",
"CNN",
"Keyword Searching",
"Legal Document Review",
"Legal Advice",
"Attorney Client Relationship",
"Privileged Document Detection",
"Privileged Data Protection",
"Privileged Communication Protection",
"Privileged Training Keyword Selection",
"Machine Learning",
"Convolutional Neural Network",
"Text Classification",
"Training",
"Law",
"Keyword Search",
"Text Categorization",
"Machine Learning",
"Big Data",
"Statistics",
"Text Classification",
"Convolutional Neural Networks",
"Keyword Search",
"E Discovery",
"Legal Document Review"
],
"authors": [
{
"affiliation": "AT&T Services, Inc.,Legal,Washington,DC,USA",
"fullName": "Rishi Chhatwal",
"givenName": "Rishi",
"surname": "Chhatwal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ankura Consulting Group, LLC,Data & Technology,Washington,DC,USA",
"fullName": "Robert Keeling",
"givenName": "Robert",
"surname": "Keeling",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ankura Consulting Group, LLC,Data & Technology,Washington,DC,USA",
"fullName": "Peter Gronvall",
"givenName": "Peter",
"surname": "Gronvall",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ankura Consulting Group, LLC,Data & Technology,Washington,DC,USA",
"fullName": "Nathaniel Huber-Fliflet",
"givenName": "Nathaniel",
"surname": "Huber-Fliflet",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ankura,Data & Technology,Washington,DC,USA",
"fullName": "Jianping Zhang",
"givenName": "Jianping",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ankura,Data & Technology,Washington,DC,USA",
"fullName": "Haozhen Zhao",
"givenName": "Haozhen",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1485-1492",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-6251-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09378495",
"articleId": "1s64SMsdbJm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09377876",
"articleId": "1s651awKFu8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ic3/2017/3077/0/08284324",
"title": "Approaches for information retrieval in legal documents",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2017/08284324/12OmNzBwGop",
"parentPublication": {
"id": "proceedings/ic3/2017/3077/0",
"title": "2017 Tenth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2018/5035/0/08621945",
"title": "An Empirical Study of the Application of Machine Learning and Keyword Terms Methodologies to Privilege-Document Review Projects in Legal Matters",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2018/08621945/17D45WHONsa",
"parentPublication": {
"id": "proceedings/big-data/2018/5035/0",
"title": "2018 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258076",
"title": "Empirical evaluations of active learning strategies in legal document review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258076/17D45XERmli",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671486",
"title": "Comparison of Deep Learning Technologies in Legal Document Classification",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671486/1A8hnx4ZRUA",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/istm/2022/7116/0/711600a007",
"title": "Interpretable Text Classification in Legal Contract Documents using Tsetlin Machines",
"doi": null,
"abstractUrl": "/proceedings-article/istm/2022/711600a007/1HJzGIZp65G",
"parentPublication": {
"id": "proceedings/istm/2022/7116/0",
"title": "2022 International Symposium on the Tsetlin Machine (ISTM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020626",
"title": "Explainable Text Classification Techniques in Legal Document Review: Locating Rationales without Using Human Annotated Training Text Snippets",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020626/1KfRuNBMwjS",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020392",
"title": "Integration of Rule-Based Reasoning and Transfer Learning in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020392/1KfSVfbBDLq",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006182",
"title": "Experimental Evaluation of CNN Parameters for Text Categorization in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006182/1hJrOVhe4qA",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005659",
"title": "A Framework for Explainable Text Classification in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005659/1hJsCablZfy",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006248",
"title": "Empirical Comparisons of CNN with Other Learning Algorithms for Text Classification in Legal Document Review",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006248/1hJsth21myQ",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx3q6UR",
"title": "2005 European Quantum Electronics Conference",
"acronym": "eqec",
"groupId": "1000604",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyGtjoY",
"doi": "10.1109/EQEC.2005.1567441",
"title": "Quantum optics in multiple scattering random media",
"normalizedTitle": "Quantum optics in multiple scattering random media",
"abstract": "The paper presents the first experimental study of the propagation of quantum noise through an elastic, multiple scattering medium. Two different types of quantum noise measurements have been carried out: total transmission and short-range frequency correlations. When comparing shot noise (quantum) to technical noise (classical) a markedly different behavior is observed. The experimental results are found to be in agreement with a quantum model for multiple scattering of light, which allows extracting both static and dynamic scattering properties of the medium. A new quantum correlation in multiple scattering is proposed.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper presents the first experimental study of the propagation of quantum noise through an elastic, multiple scattering medium. Two different types of quantum noise measurements have been carried out: total transmission and short-range frequency correlations. When comparing shot noise (quantum) to technical noise (classical) a markedly different behavior is observed. The experimental results are found to be in agreement with a quantum model for multiple scattering of light, which allows extracting both static and dynamic scattering properties of the medium. A new quantum correlation in multiple scattering is proposed.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper presents the first experimental study of the propagation of quantum noise through an elastic, multiple scattering medium. Two different types of quantum noise measurements have been carried out: total transmission and short-range frequency correlations. When comparing shot noise (quantum) to technical noise (classical) a markedly different behavior is observed. The experimental results are found to be in agreement with a quantum model for multiple scattering of light, which allows extracting both static and dynamic scattering properties of the medium. A new quantum correlation in multiple scattering is proposed.",
"fno": "01567441",
"keywords": [
"Quantum Optics",
"Light Scattering",
"Random Media",
"Quantum Noise",
"Optical Noise",
"Quantum Optics",
"Multiple Scattering Random Media",
"Shot Noise",
"Quantum Noise",
"Quantum Correlation",
"Optical Scattering",
"Particle Scattering",
"Random Media",
"Acoustic Scattering",
"Light Scattering",
"Biomedical Optical Imaging",
"Quantum Mechanics",
"Optical Noise",
"Photonics",
"Backscatter"
],
"authors": [
{
"affiliation": "Dept. of Sci. & Technol., Twente Univ., Enschede, Netherlands",
"fullName": "P. Lodahl",
"givenName": "P.",
"surname": "Lodahl",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Sci. & Technol., Twente Univ., Enschede, Netherlands",
"fullName": "A. Lagendik",
"givenName": "A.",
"surname": "Lagendik",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "eqec",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-01-01T00:00:00",
"pubType": "proceedings",
"pages": "275",
"year": "2005",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01567440",
"articleId": "12OmNxVlTJn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01567442",
"articleId": "12OmNx5Yv42",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/eqec/2005/8973/0/01567430",
"title": "Macroscopic quantum states by the interaction of light with spin oriented atomic ensembles",
"doi": null,
"abstractUrl": "/proceedings-article/eqec/2005/01567430/12OmNBUAvVI",
"parentPublication": {
"id": "proceedings/eqec/2005/8973/0",
"title": "2005 European Quantum Electronics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/8391d415",
"title": "Photometric Stereo in a Scattering Medium",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391d415/12OmNBV9Igo",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209d999",
"title": "Generalized Optical Flow Model for Scattering Media",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209d999/12OmNvStcM7",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032c420",
"title": "Depth and Image Restoration from Light Field in a Scattering Medium",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c420/12OmNxjjEm8",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2017/09/07577857",
"title": "Photometric Stereo in a Scattering Medium",
"doi": null,
"abstractUrl": "/journal/tp/2017/09/07577857/13rRUxYIMWv",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/07/08600345",
"title": "Precomputed Multiple Scattering for Rapid Light Simulation in Participating Media",
"doi": null,
"abstractUrl": "/journal/tg/2020/07/08600345/17D45Xh13tH",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacvw/2022/5824/0/582400a760",
"title": "Generalizing Imaging Through Scattering Media With Uncertainty Estimates",
"doi": null,
"abstractUrl": "/proceedings-article/wacvw/2022/582400a760/1B12yUV6Nuo",
"parentPublication": {
"id": "proceedings/wacvw/2022/5824/0",
"title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09715049",
"title": "Collimated Whole Volume Light Scattering in Homogeneous Finite Media",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09715049/1B2DbhImWwE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/qe/2023/01/09964108",
"title": "Fundamentals of Quantum Fourier Optics",
"doi": null,
"abstractUrl": "/journal/qe/2023/01/09964108/1IAFM4ExGVi",
"parentPublication": {
"id": "trans/qe",
"title": "IEEE Transactions on Quantum Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/07/08945399",
"title": "Interactive Simulation of Scattering Effects in Participating Media Using a Neural Network Model",
"doi": null,
"abstractUrl": "/journal/tg/2021/07/08945399/1gbtOfrk8Mg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNviZlH1",
"title": "2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)",
"acronym": "sitis",
"groupId": "1002425",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzRZpYR",
"doi": "10.1109/SITIS.2013.26",
"title": "Multiple-Scattering Optical Tomography with Layered Material",
"normalizedTitle": "Multiple-Scattering Optical Tomography with Layered Material",
"abstract": "In this paper, we propose an optical tomography for optically dense media in which multiple scattering is dominant. We model a material by many layers of voxels, and light scattering as a distribution from a voxel in one layer to other voxels in the next layer. Then we write attenuation of light along a light path by an inner product of vectors, and formulate the scattering tomography as an inequality constraint minimization problem solved by interior point methods. We show experimental results with numerical simulation for evaluating the proposed method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we propose an optical tomography for optically dense media in which multiple scattering is dominant. We model a material by many layers of voxels, and light scattering as a distribution from a voxel in one layer to other voxels in the next layer. Then we write attenuation of light along a light path by an inner product of vectors, and formulate the scattering tomography as an inequality constraint minimization problem solved by interior point methods. We show experimental results with numerical simulation for evaluating the proposed method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we propose an optical tomography for optically dense media in which multiple scattering is dominant. We model a material by many layers of voxels, and light scattering as a distribution from a voxel in one layer to other voxels in the next layer. Then we write attenuation of light along a light path by an inner product of vectors, and formulate the scattering tomography as an inequality constraint minimization problem solved by interior point methods. We show experimental results with numerical simulation for evaluating the proposed method.",
"fno": "3211a093",
"keywords": [
"Scattering",
"Media",
"Tomography",
"Light Sources",
"Attenuation",
"Mathematical Model",
"Inequality Constraint Optimization",
"Scattering Of Light",
"Optical Tomography",
"Scattering Tomography",
"Inverse Scattering"
],
"authors": [
{
"affiliation": null,
"fullName": "Toru Tamaki",
"givenName": "Toru",
"surname": "Tamaki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bingzhi Yuan",
"givenName": "Bingzhi",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bisser Raytchev",
"givenName": "Bisser",
"surname": "Raytchev",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kazufumi Kaneda",
"givenName": "Kazufumi",
"surname": "Kaneda",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yasuhiro Mukaigawa",
"givenName": "Yasuhiro",
"surname": "Mukaigawa",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sitis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "93-99",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-3211-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3211a085",
"articleId": "12OmNrAv3Ij",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3211a100",
"articleId": "12OmNzG4gxA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2015/8391/0/8391d415",
"title": "Photometric Stereo in a Scattering Medium",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391d415/12OmNBV9Igo",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209e382",
"title": "Light Transport Refocusing for Unknown Scattering Medium",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209e382/12OmNqzu6Nb",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2010/6685/0/05429594",
"title": "Interactive volumetric lighting simulating scattering and shadowing",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2010/05429594/12OmNxecRYK",
"parentPublication": {
"id": "proceedings/pacificvis/2010/6685/0",
"title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/8391d379",
"title": "Airborne Three-Dimensional Cloud Tomography",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391d379/12OmNxj23b6",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457f797",
"title": "Multiple-Scattering Microphysics Tomography",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457f797/12OmNyPQ4Ik",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/02/v0342",
"title": "Light Scattering from Filaments",
"doi": null,
"abstractUrl": "/journal/tg/2007/02/v0342/13rRUwI5TXt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2017/09/07577857",
"title": "Photometric Stereo in a Scattering Medium",
"doi": null,
"abstractUrl": "/journal/tp/2017/09/07577857/13rRUxYIMWv",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/07/08600345",
"title": "Precomputed Multiple Scattering for Rapid Light Simulation in Participating Media",
"doi": null,
"abstractUrl": "/journal/tg/2020/07/08600345/17D45Xh13tH",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f500",
"title": "4D Cloud Scattering Tomography",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f500/1BmEHK3Rjhe",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/09847357",
"title": "Variable Imaging Projection Cloud Scattering Tomography",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/09847357/1FvJpNIySZi",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1hHLm2dSyn6",
"title": "2019 2nd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)",
"acronym": "wcmeim",
"groupId": "1835484",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1hHLsCdHDWw",
"doi": "10.1109/WCMEIM48965.2019.00095",
"title": "Markov Chain and Monte Carlo Predictions for Light Multiple Scattering Applications",
"normalizedTitle": "Markov Chain and Monte Carlo Predictions for Light Multiple Scattering Applications",
"abstract": "Multiple scattering is considered both an interference source and tentatively the information to measure the optical properties of mediums in many engineering applications, such as fuel spray atomization in IC engines, medical diagnostics for bio-tissues, and atmosphere detection, etc. However, the understanding of multiple scattering is hindered by the stochastic nature of random scattering, especially in the intermediate regime. This work reports a Markov Chain solution to analyze the angular distribution of transmitted photons and compared against a typical method, Monte Carlo algorithm. The Markov Chain method is then utilized to perform an inversion process to derive the optical properties inside the medium and various reconstruction algorithms were tested. Results have shown that Markov Chain method is a viable technique in reducing the computational cost yet preserving the computation fidelity.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Multiple scattering is considered both an interference source and tentatively the information to measure the optical properties of mediums in many engineering applications, such as fuel spray atomization in IC engines, medical diagnostics for bio-tissues, and atmosphere detection, etc. However, the understanding of multiple scattering is hindered by the stochastic nature of random scattering, especially in the intermediate regime. This work reports a Markov Chain solution to analyze the angular distribution of transmitted photons and compared against a typical method, Monte Carlo algorithm. The Markov Chain method is then utilized to perform an inversion process to derive the optical properties inside the medium and various reconstruction algorithms were tested. Results have shown that Markov Chain method is a viable technique in reducing the computational cost yet preserving the computation fidelity.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Multiple scattering is considered both an interference source and tentatively the information to measure the optical properties of mediums in many engineering applications, such as fuel spray atomization in IC engines, medical diagnostics for bio-tissues, and atmosphere detection, etc. However, the understanding of multiple scattering is hindered by the stochastic nature of random scattering, especially in the intermediate regime. This work reports a Markov Chain solution to analyze the angular distribution of transmitted photons and compared against a typical method, Monte Carlo algorithm. The Markov Chain method is then utilized to perform an inversion process to derive the optical properties inside the medium and various reconstruction algorithms were tested. Results have shown that Markov Chain method is a viable technique in reducing the computational cost yet preserving the computation fidelity.",
"fno": "504500a451",
"keywords": [
"Markov Processes",
"Monte Carlo Methods",
"Random Processes",
"Sprays",
"Stochastic Processes",
"Atmosphere Detection",
"Stochastic Nature",
"Random Scattering",
"Markov Chain Solution",
"Monte Carlo Algorithm",
"Markov Chain Method",
"Bio Tissues",
"Medical Diagnostics",
"IC Engines",
"Fuel Spray Atomization",
"Engineering Applications",
"Optical Properties",
"Interference Source",
"Light Multiple Scattering Applications",
"Monte Carlo Predictions",
"Mechanical Engineering",
"Manufacturing",
"Scattering",
"Markov Processes",
"Monte Carlo Methods",
"Numerical Simulation",
"Multiple Scattering Spray Diagnostics Markov Chain Monte Carlo Numerical Simulation"
],
"authors": [
{
"affiliation": "Shanghai Jiao Tong University, China",
"fullName": "Shangning Wang",
"givenName": "Shangning",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University, China",
"fullName": "Shuyi Qiu",
"givenName": "Shuyi",
"surname": "Qiu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University, China",
"fullName": "Shangze Yang",
"givenName": "Shangze",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Jiao Tong University, China",
"fullName": "Xuesong Li",
"givenName": "Xuesong",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wcmeim",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-11-01T00:00:00",
"pubType": "proceedings",
"pages": "451-455",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-5045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "504500a447",
"articleId": "1hHLpMtJkY0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "504500a456",
"articleId": "1hHLnBSK5Xi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/etcs/2009/3557/2/3557c279",
"title": "Gray-Level Image Segmentation Based on Markov Chain Monte Carlo",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2009/3557c279/12OmNANkomc",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2008/3502/0/3502a393",
"title": "Border Sampling through Coupling Markov Chain Monte Carlo",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2008/3502a393/12OmNBh8gYR",
"parentPublication": {
"id": "proceedings/icdm/2008/3502/0",
"title": "2008 Eighth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/1/3336a439",
"title": "An Adaptive Markov Chain Monte Carlo Algorithm for TSP",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336a439/12OmNC943Pg",
"parentPublication": {
"id": "proceedings/csse/2008/3336/1",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209e382",
"title": "Light Transport Refocusing for Unknown Scattering Medium",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209e382/12OmNqzu6Nb",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109b364",
"title": "Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109b364/12OmNzBwGBR",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1990/2056/0/00130087",
"title": "Massively parallel computational methods in light scattering by small particles",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1990/00130087/12OmNzmclKg",
"parentPublication": {
"id": "proceedings/sc/1990/2056/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/02/v0342",
"title": "Light Scattering from Filaments",
"doi": null,
"abstractUrl": "/journal/tg/2007/02/v0342/13rRUwI5TXt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2002/05/i0657",
"title": "Image Segmentation by Data-Driven Markov Chain Monte Carlo",
"doi": null,
"abstractUrl": "/journal/tp/2002/05/i0657/13rRUyuNsy9",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/04/08528490",
"title": "Survey of Markov Chain Monte Carlo Methods in Light Transport Simulation",
"doi": null,
"abstractUrl": "/journal/tg/2020/04/08528490/17D45XDIXWc",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09715049",
"title": "Collimated Whole Volume Light Scattering in Homogeneous Finite Media",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09715049/1B2DbhImWwE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzVGcIA",
"title": "Proceedings Frontiers in Education 1995 25th Annual Conference. Engineering Education for the 21st Century",
"acronym": "fie",
"groupId": "1000297",
"volume": "1",
"displayVolume": "1",
"year": "1995",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxuo0kE",
"doi": "10.1109/FIE.1995.483106",
"title": "Technological allusivity: appreciating and teaching the role of aesthetics in engineering design",
"normalizedTitle": "Technological allusivity: appreciating and teaching the role of aesthetics in engineering design",
"abstract": "Is there an aesthetic dimension to engineering design? Is aesthetic sensitivity a characteristic that ought to be cultivated by prospective engineers? Does aesthetic sensitivity enhance or impede the engineering design effort? The answer to these questions will largely determine the answer to the broader question, \"what is the role of the humanities in undergraduate engineering education?\" Toward that end, the paper offers some answers to those more specific questions regarding aesthetics. After surveying a portion of the relevant literature, the issue of how we recognize and distinguish the aesthetic dimension is investigated. This is followed by a discussion of the nature of engineering design and how it differs from what is often called \"applied science\". With that distinction clarified, the question of terminology is addressed. A definitional context for questions such as \"what is aesthetics?\" and \"what is good engineering design aesthetics?\" is developed by rehearsing the meaning of well-defined terms and by suggesting meanings for those terms that often litter the linguistic landscape with their ambiguity. Equipped with these definitions, the role of aesthetics in engineering design is fleshed out, aesthetic allusion is distinguished from symbolic signifying, and examples of aesthetics in technical products as well as in the process of design are discussed. The paper concludes with some thoughts and recommendations about teaching aesthetics to undergraduate engineering students.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Is there an aesthetic dimension to engineering design? Is aesthetic sensitivity a characteristic that ought to be cultivated by prospective engineers? Does aesthetic sensitivity enhance or impede the engineering design effort? The answer to these questions will largely determine the answer to the broader question, \"what is the role of the humanities in undergraduate engineering education?\" Toward that end, the paper offers some answers to those more specific questions regarding aesthetics. After surveying a portion of the relevant literature, the issue of how we recognize and distinguish the aesthetic dimension is investigated. This is followed by a discussion of the nature of engineering design and how it differs from what is often called \"applied science\". With that distinction clarified, the question of terminology is addressed. A definitional context for questions such as \"what is aesthetics?\" and \"what is good engineering design aesthetics?\" is developed by rehearsing the meaning of well-defined terms and by suggesting meanings for those terms that often litter the linguistic landscape with their ambiguity. Equipped with these definitions, the role of aesthetics in engineering design is fleshed out, aesthetic allusion is distinguished from symbolic signifying, and examples of aesthetics in technical products as well as in the process of design are discussed. The paper concludes with some thoughts and recommendations about teaching aesthetics to undergraduate engineering students.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Is there an aesthetic dimension to engineering design? Is aesthetic sensitivity a characteristic that ought to be cultivated by prospective engineers? Does aesthetic sensitivity enhance or impede the engineering design effort? The answer to these questions will largely determine the answer to the broader question, \"what is the role of the humanities in undergraduate engineering education?\" Toward that end, the paper offers some answers to those more specific questions regarding aesthetics. After surveying a portion of the relevant literature, the issue of how we recognize and distinguish the aesthetic dimension is investigated. This is followed by a discussion of the nature of engineering design and how it differs from what is often called \"applied science\". With that distinction clarified, the question of terminology is addressed. A definitional context for questions such as \"what is aesthetics?\" and \"what is good engineering design aesthetics?\" is developed by rehearsing the meaning of well-defined terms and by suggesting meanings for those terms that often litter the linguistic landscape with their ambiguity. Equipped with these definitions, the role of aesthetics in engineering design is fleshed out, aesthetic allusion is distinguished from symbolic signifying, and examples of aesthetics in technical products as well as in the process of design are discussed. The paper concludes with some thoughts and recommendations about teaching aesthetics to undergraduate engineering students.",
"fno": "00483106",
"keywords": [],
"authors": [
{
"affiliation": "Dordt Coll., USA",
"fullName": "C.C. Adams",
"givenName": "C.C.",
"surname": "Adams",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fie",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1995-11-01T00:00:00",
"pubType": "proceedings",
"pages": "3a5.1-3a5.8vol.1",
"year": "1995",
"issn": null,
"isbn": "0-7803-3022-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00483103",
"articleId": "12OmNxecS0N",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00483108",
"articleId": "12OmNCctfnx",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwt5sgJ",
"title": "CVPR 2011",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxwncnj",
"doi": "10.1109/CVPR.2011.5995467",
"title": "High level describable attributes for predicting aesthetics and interestingness",
"normalizedTitle": "High level describable attributes for predicting aesthetics and interestingness",
"abstract": "With the rise in popularity of digital cameras, the amount of visual data available on the web is growing exponentially. Some of these pictures are extremely beautiful and aesthetically pleasing, but the vast majority are uninteresting or of low quality. This paper demonstrates a simple, yet powerful method to automatically select high aesthetic quality images from large image collections. Our aesthetic quality estimation method explicitly predicts some of the possible image cues that a human might use to evaluate an image and then uses them in a discriminative approach. These cues or high level describable image attributes fall into three broad types: 1) compositional attributes related to image layout or configuration, 2) content attributes related to the objects or scene types depicted, and 3) sky-illumination attributes related to the natural lighting conditions. We demonstrate that an aesthetics classifier trained on these describable attributes can provide a significant improvement over baseline methods for predicting human quality judgments. We also demonstrate our method for predicting the \"interestingness\" of Flickr photos, and introduce a novel problem of estimating query specific \"interestingness\".",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the rise in popularity of digital cameras, the amount of visual data available on the web is growing exponentially. Some of these pictures are extremely beautiful and aesthetically pleasing, but the vast majority are uninteresting or of low quality. This paper demonstrates a simple, yet powerful method to automatically select high aesthetic quality images from large image collections. Our aesthetic quality estimation method explicitly predicts some of the possible image cues that a human might use to evaluate an image and then uses them in a discriminative approach. These cues or high level describable image attributes fall into three broad types: 1) compositional attributes related to image layout or configuration, 2) content attributes related to the objects or scene types depicted, and 3) sky-illumination attributes related to the natural lighting conditions. We demonstrate that an aesthetics classifier trained on these describable attributes can provide a significant improvement over baseline methods for predicting human quality judgments. We also demonstrate our method for predicting the \"interestingness\" of Flickr photos, and introduce a novel problem of estimating query specific \"interestingness\".",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the rise in popularity of digital cameras, the amount of visual data available on the web is growing exponentially. Some of these pictures are extremely beautiful and aesthetically pleasing, but the vast majority are uninteresting or of low quality. This paper demonstrates a simple, yet powerful method to automatically select high aesthetic quality images from large image collections. Our aesthetic quality estimation method explicitly predicts some of the possible image cues that a human might use to evaluate an image and then uses them in a discriminative approach. These cues or high level describable image attributes fall into three broad types: 1) compositional attributes related to image layout or configuration, 2) content attributes related to the objects or scene types depicted, and 3) sky-illumination attributes related to the natural lighting conditions. We demonstrate that an aesthetics classifier trained on these describable attributes can provide a significant improvement over baseline methods for predicting human quality judgments. We also demonstrate our method for predicting the \"interestingness\" of Flickr photos, and introduce a novel problem of estimating query specific \"interestingness\".",
"fno": "05995467",
"keywords": [
"Query Estimation",
"High Level Describable Attribute",
"Aesthetics Prediction",
"Digital Camera",
"Visual Data",
"Image Collection",
"Aesthetic Quality Estimation",
"Sky Illumination Attribute",
"Natural Lighting Condition",
"Baseline Method",
"Human Quality Judgment",
"Flickr Photo"
],
"authors": [
{
"affiliation": "Stony Brook Univ., Stony Brook, NY, USA",
"fullName": "S. Dhar",
"givenName": "S.",
"surname": "Dhar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stony Brook Univ., Stony Brook, NY, USA",
"fullName": "V. Ordonez",
"givenName": "V.",
"surname": "Ordonez",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Stony Brook Univ., Stony Brook, NY, USA",
"fullName": "T. L. Berg",
"givenName": "T. L.",
"surname": "Berg",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1657-1664",
"year": "2011",
"issn": null,
"isbn": "978-1-4577-0394-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05995466",
"articleId": "12OmNzGlRAI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05995468",
"articleId": "12OmNC4wtEW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2008/2570/0/04607714",
"title": "Pre-attentive discrimination of interestingness in images",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2008/04607714/12OmNALUoAs",
"parentPublication": {
"id": "proceedings/icme/2008/2570/0",
"title": "2008 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a863",
"title": "Content-Based Methods for Predicting Web-Site Demographic Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a863/12OmNB9KHvK",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460596",
"title": "Assessment of photo aesthetics with efficiency",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460596/12OmNC4eSAr",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2012/4829/0/4829a276",
"title": "Searching for People through Textual and Visual Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2012/4829a276/12OmNwtWfTV",
"parentPublication": {
"id": "proceedings/sibgrapi/2012/4829/0",
"title": "2012 25th SIBGRAPI Conference on Graphics, Patterns and Images",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032a638",
"title": "Personalized Image Aesthetics",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032a638/12OmNxZkhuy",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2011/0394/0/05995543",
"title": "Sharing features between objects and their attributes",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2011/05995543/12OmNxisQUq",
"parentPublication": {
"id": "proceedings/cvpr/2011/0394/0",
"title": "CVPR 2011",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/373P3B06",
"title": "Weak attributes for large-scale image retrieval",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/373P3B06/12OmNybx21o",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmcs/1999/0253/1/02539890",
"title": "Relevance Feedback Techniques for Image Retrieval Using Multiple Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/icmcs/1999/02539890/12OmNyvoXkg",
"parentPublication": {
"id": "proceedings/icmcs/1999/0253/1",
"title": "Multimedia Computing and Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/10/ttp2011101962",
"title": "Describable Visual Attributes for Face Verification and Image Search",
"doi": null,
"abstractUrl": "/journal/tp/2011/10/ttp2011101962/13rRUEgartU",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600t9829",
"title": "Personalized Image Aesthetics Assessment with Rich Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600t9829/1H0NA8q8E24",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNB836KO",
"title": "2005 IEEE International Conference on Multimedia and Expo",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy7yEio",
"doi": "10.1109/ICME.2005.1521353",
"title": "Injection, detection and repair of aesthetics in home movies",
"normalizedTitle": "Injection, detection and repair of aesthetics in home movies",
"abstract": "This paper details the design of an algorithm for automatically manipulating the important aesthetic element of video, visual tempo. Automatic injection, detection and repair of such aesthetic elements, it is argued, is vital to the next generation of amateur multimedia authoring tools. We evaluate the performance of the algorithm on a battery of synthetic data and demonstrate its ability to return the visual tempo of the final media a considerable degree closer to the target signal. The novelty of this work lies chiefly in the systematic manipulation of this high level aesthetic element of video.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper details the design of an algorithm for automatically manipulating the important aesthetic element of video, visual tempo. Automatic injection, detection and repair of such aesthetic elements, it is argued, is vital to the next generation of amateur multimedia authoring tools. We evaluate the performance of the algorithm on a battery of synthetic data and demonstrate its ability to return the visual tempo of the final media a considerable degree closer to the target signal. The novelty of this work lies chiefly in the systematic manipulation of this high level aesthetic element of video.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper details the design of an algorithm for automatically manipulating the important aesthetic element of video, visual tempo. Automatic injection, detection and repair of such aesthetic elements, it is argued, is vital to the next generation of amateur multimedia authoring tools. We evaluate the performance of the algorithm on a battery of synthetic data and demonstrate its ability to return the visual tempo of the final media a considerable degree closer to the target signal. The novelty of this work lies chiefly in the systematic manipulation of this high level aesthetic element of video.",
"fno": "01521353",
"keywords": [
"Home Movies",
"Aesthetic Video Element",
"Visual Tempo",
"Automatic Injection",
"Automatic Detection",
"Amateur Multimedia Authoring Tool",
"Synthetic Data",
"Systematic Manipulation"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci., Curtin Univ. of Technol., Perth, WA, Australia",
"fullName": "B. Adams",
"givenName": "B.",
"surname": "Adams",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Comput. Sci., Curtin Univ. of Technol., Perth, WA, Australia",
"fullName": "Svetha Venkatesh",
"givenName": null,
"surname": "Svetha Venkatesh",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-07-01T00:00:00",
"pubType": "proceedings",
"pages": "4 pp.",
"year": "2005",
"issn": null,
"isbn": "0-7803-9331-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01521352",
"articleId": "12OmNCcbE5g",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01521354",
"articleId": "12OmNAXglTi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cisp/2008/3119/2/3119b192",
"title": "Visual Tempo Analysis for MTV-Style Home Video Authoring",
"doi": null,
"abstractUrl": "/proceedings-article/cisp/2008/3119b192/12OmNwqfsZE",
"parentPublication": {
"id": "proceedings/cisp/2008/3119/3",
"title": "Image and Signal Processing, Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2008/3304/6/3304f096",
"title": "Using Aesthetic Measurement Application (AMA) to Measure Aesthetics of Web Page Interfaces",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2008/3304f096/12OmNzC5SZ3",
"parentPublication": {
"id": "proceedings/icnc/2008/3304/6",
"title": "2008 Fourth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1IHotVZum6Q",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"acronym": "icpr",
"groupId": "9956007",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1IHoPw01W9O",
"doi": "10.1109/ICPR56361.2022.9956162",
"title": "Image Aesthetics Assessment Using Graph Attention Network",
"normalizedTitle": "Image Aesthetics Assessment Using Graph Attention Network",
"abstract": "Aspect ratio and spatial layout are two of the principal factors influencing the aesthetic value of a photograph. However, incorporating these into the traditional convolution-based frameworks for the task of image aesthetics assessment is problematic. The aspect ratio of the photographs gets distorted while they are resized/cropped to a fixed dimension to facilitate training batch sampling. On the other hand, the convolutional filters process information locally and are limited in their ability to model the global spatial layout of a photograph. In this work, we present a two-stage framework based on graph neural networks and address both these problems jointly. First, we propose a feature-graph representation in which the input image is modelled as a graph, maintaining its original aspect ratio and resolution. Second, we propose a graph neural network architecture that takes this feature-graph and captures the semantic relationship between different regions of the input image using visual attention. Our experiments show that the proposed framework advances the state-of-the-art results in aesthetic score regression on the Aesthetic Visual Analysis (AVA) benchmark. Our code is publicly available for comparisons and further explorations.<sup>1</sup>",
"abstracts": [
{
"abstractType": "Regular",
"content": "Aspect ratio and spatial layout are two of the principal factors influencing the aesthetic value of a photograph. However, incorporating these into the traditional convolution-based frameworks for the task of image aesthetics assessment is problematic. The aspect ratio of the photographs gets distorted while they are resized/cropped to a fixed dimension to facilitate training batch sampling. On the other hand, the convolutional filters process information locally and are limited in their ability to model the global spatial layout of a photograph. In this work, we present a two-stage framework based on graph neural networks and address both these problems jointly. First, we propose a feature-graph representation in which the input image is modelled as a graph, maintaining its original aspect ratio and resolution. Second, we propose a graph neural network architecture that takes this feature-graph and captures the semantic relationship between different regions of the input image using visual attention. Our experiments show that the proposed framework advances the state-of-the-art results in aesthetic score regression on the Aesthetic Visual Analysis (AVA) benchmark. Our code is publicly available for comparisons and further explorations.<sup>1</sup>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Aspect ratio and spatial layout are two of the principal factors influencing the aesthetic value of a photograph. However, incorporating these into the traditional convolution-based frameworks for the task of image aesthetics assessment is problematic. The aspect ratio of the photographs gets distorted while they are resized/cropped to a fixed dimension to facilitate training batch sampling. On the other hand, the convolutional filters process information locally and are limited in their ability to model the global spatial layout of a photograph. In this work, we present a two-stage framework based on graph neural networks and address both these problems jointly. First, we propose a feature-graph representation in which the input image is modelled as a graph, maintaining its original aspect ratio and resolution. Second, we propose a graph neural network architecture that takes this feature-graph and captures the semantic relationship between different regions of the input image using visual attention. Our experiments show that the proposed framework advances the state-of-the-art results in aesthetic score regression on the Aesthetic Visual Analysis (AVA) benchmark. Our code is publicly available for comparisons and further explorations.1",
"fno": "09956162",
"keywords": [
"Convolutional Neural Nets",
"Feature Extraction",
"Graph Theory",
"Image Capture",
"Image Filtering",
"Image Representation",
"Image Resolution",
"Image Sampling",
"Regression Analysis",
"Aesthetic Score Regression",
"Aesthetic Value",
"Aesthetic Visual Analysis Benchmark",
"AVA Benchmark",
"Convolution Based Frameworks",
"Convolutional Filters Process Information",
"Feature Graph Representation",
"Global Spatial Layout",
"Graph Attention Network",
"Graph Neural Network Architecture",
"Graph Neural Networks",
"Image Aesthetics Assessment",
"Photograph",
"Principal Factors",
"Training Batch Sampling",
"Two Stage Framework",
"Visual Attention",
"Convolutional Codes",
"Training",
"Visualization",
"Layout",
"Semantics",
"Feature Extraction",
"Graph Neural Networks"
],
"authors": [
{
"affiliation": "Trinity College,School of Computer Science and Statistics,Dublin",
"fullName": "Koustav Ghosal",
"givenName": "Koustav",
"surname": "Ghosal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Trinity College,School of Computer Science and Statistics,Dublin",
"fullName": "Aljosa Smolic",
"givenName": "Aljosa",
"surname": "Smolic",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-08-01T00:00:00",
"pubType": "proceedings",
"pages": "3160-3167",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9062-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09956140",
"articleId": "1IHovYtcNva",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09956054",
"articleId": "1IHqmwf4Sk0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2012/2216/0/06460596",
"title": "Assessment of photo aesthetics with efficiency",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460596/12OmNC4eSAr",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032c205",
"title": "Deep Cropping via Attention Box Prediction and Aesthetics Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c205/12OmNyqiaOb",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2020/03/08302852",
"title": "Objectivity and Subjectivity in Aesthetic Quality Assessment of Digital Photographs",
"doi": null,
"abstractUrl": "/journal/ta/2020/03/08302852/13rRUy3xY6r",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600t9829",
"title": "Personalized Image Aesthetics Assessment with Rich Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600t9829/1H0NA8q8E24",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600c751",
"title": "Interacting Attention Graph for Single Image Two-Hand Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600c751/1H1jycJB636",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600a320",
"title": "Modeling Image Composition for Visual Aesthetic Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600a320/1iTvj4nhepi",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600b833",
"title": "Aspect-Ratio-Preserving Multi-Patch Image Aesthetics Score Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600b833/1iTvoL6ZW00",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102804",
"title": "Spatial Attentive Image Aesthetic Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102804/1kwqV7eUeWY",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900j538",
"title": "Graph Attention Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900j538/1yeIodcMAfK",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900i471",
"title": "Hierarchical Layout-Aware Graph Convolutional Network for Unified Aesthetics Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900i471/1yeLJCZKzBu",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1i5mkDyiIUg",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"acronym": "iccvw",
"groupId": "1800041",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1i5muBeiyGs",
"doi": "10.1109/ICCVW.2019.00415",
"title": "PFAGAN: An Aesthetics-Conditional GAN for Generating Photographic Fine Art",
"normalizedTitle": "PFAGAN: An Aesthetics-Conditional GAN for Generating Photographic Fine Art",
"abstract": "In this work we consider the problem of generating aesthetically pleasing photography, sometimes termed photographic fine art (PFA). We cast this problem as a generative modeling task and use a conditional GAN framework. Recent works have shown that conditioning based on semantic information is beneficial for improving photo-realism. In this work we propose a novel GAN architecture which is able to generate photo-realistic images with a specified aesthetic quality by conditioning on both semantic and aesthetic information. To condition the generator, we propose a modified conditional batch normalization layer. To condition the discriminator, we use a joint probabilistic model of semantics and aesthetics to estimate the compatibility between an image (either real or generated) and the conditioning variable. We show quantitatively and qualitatively that our model, called PFAGAN, is able to generate images conditioned on semantic categories and aesthetic scores.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this work we consider the problem of generating aesthetically pleasing photography, sometimes termed photographic fine art (PFA). We cast this problem as a generative modeling task and use a conditional GAN framework. Recent works have shown that conditioning based on semantic information is beneficial for improving photo-realism. In this work we propose a novel GAN architecture which is able to generate photo-realistic images with a specified aesthetic quality by conditioning on both semantic and aesthetic information. To condition the generator, we propose a modified conditional batch normalization layer. To condition the discriminator, we use a joint probabilistic model of semantics and aesthetics to estimate the compatibility between an image (either real or generated) and the conditioning variable. We show quantitatively and qualitatively that our model, called PFAGAN, is able to generate images conditioned on semantic categories and aesthetic scores.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this work we consider the problem of generating aesthetically pleasing photography, sometimes termed photographic fine art (PFA). We cast this problem as a generative modeling task and use a conditional GAN framework. Recent works have shown that conditioning based on semantic information is beneficial for improving photo-realism. In this work we propose a novel GAN architecture which is able to generate photo-realistic images with a specified aesthetic quality by conditioning on both semantic and aesthetic information. To condition the generator, we propose a modified conditional batch normalization layer. To condition the discriminator, we use a joint probabilistic model of semantics and aesthetics to estimate the compatibility between an image (either real or generated) and the conditioning variable. We show quantitatively and qualitatively that our model, called PFAGAN, is able to generate images conditioned on semantic categories and aesthetic scores.",
"fno": "502300d333",
"keywords": [
"Computer Vision",
"Neural Nets",
"Photography",
"Probability",
"Realistic Images",
"Aesthetics Conditional GAN Framework",
"Photographic Fine Art Generation",
"PFAGAN",
"Conditioning Variable",
"Joint Probabilistic Model",
"Conditional Batch Normalization Layer",
"Aesthetic Information",
"Aesthetic Quality",
"Photo Realistic Images",
"GAN Architecture",
"Photo Realism",
"Semantic Information",
"Generative Modeling Task",
"Semantics",
"Generators",
"Gallium Nitride",
"Training",
"Histograms",
"Generative Adversarial Networks",
"Computational Modeling",
"Aesthetics",
"GA Ns"
],
"authors": [
{
"affiliation": "NAVER LABS Europe",
"fullName": "Naila Murray",
"givenName": "Naila",
"surname": "Murray",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccvw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-10-01T00:00:00",
"pubType": "proceedings",
"pages": "3333-3341",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-5023-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "502300d324",
"articleId": "1i5mR0Gd4ek",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "502300d342",
"articleId": "1i5mLqvx9a8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2018/6420/0/642000f657",
"title": "DA-GAN: Instance-Level Image Translation by Deep Attention Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f657/17D45VObpNB",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000b287",
"title": "HashGAN: Deep Learning to Hash with Pair Conditional Wasserstein GAN",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000b287/17D45WZZ7Du",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b797",
"title": "Sem-GAN: Semantically-Consistent Image-to-Image Translation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b797/18j8I5ilLTq",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200a085",
"title": "SR-GAN: Semantic Rectifying Generative Adversarial Network for Zero-shot Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200a085/1cdOFENHcMU",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200a910",
"title": "Semantic GAN: Application for Cross-Domain Image Style Transfer",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200a910/1cdOFuQjESA",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2019/3131/0/313100a729",
"title": "Synthesizing Diverse Lung Nodules Wherever Massively: 3D Multi-Conditional GAN-Based CT Image Augmentation for Object Detection",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2019/313100a729/1ezRzUCreBa",
"parentPublication": {
"id": "proceedings/3dv/2019/3131/0",
"title": "2019 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300e501",
"title": "Seeing What a GAN Cannot Generate",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300e501/1hVlGKg2532",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2020/6553/0/09093525",
"title": "FX-GAN: Self-Supervised GAN Learning via Feature Exchange",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2020/09093525/1jPbxvOsk6s",
"parentPublication": {
"id": "proceedings/wacv/2020/6553/0",
"title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2020/3079/0/307900a024",
"title": "Dual-Attention GAN for Large-Pose Face Frontalization",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2020/307900a024/1kecHPwIBLa",
"parentPublication": {
"id": "proceedings/fg/2020/3079/0/",
"title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800f283",
"title": "GAN Compression: Efficient Architectures for Interactive Conditional GANs",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800f283/1m3og8x4vra",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1rSR7vfukX6",
"title": "2020 24th International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1rSR8vAIb9C",
"doi": "10.1109/IV51561.2020.00043",
"title": "Investigating aesthetics to afford more ‘felt’ knowledge and ‘meaningful’ navigation interface designs",
"normalizedTitle": "Investigating aesthetics to afford more ‘felt’ knowledge and ‘meaningful’ navigation interface designs",
"abstract": "Aesthetically manipulating the visual variables of a navigation interface design has the potential for substantial improvements in the interpretation of, and subsequent navigational choices made resulting from that design. This paper reports on a study that explores how an `optimal' path is understood across fifteen different types of route map designs for ten cities (approximately 150 route map designs in total). We are interested in how participants make sense of the route map, and subsequently choose an optimal pathway. The findings show that participants who experience certain aesthetically designed route maps are more inclined to meaningfully link information and create connections. By more deeply understanding people's perceptions of the aesthetics of a navigation problem space - particularly the ways in which people value and connect with aesthetic elements and how these impact the decisions made - a novel insight into individuals' understanding of data visualisation and how aesthetics affect is achieved.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Aesthetically manipulating the visual variables of a navigation interface design has the potential for substantial improvements in the interpretation of, and subsequent navigational choices made resulting from that design. This paper reports on a study that explores how an `optimal' path is understood across fifteen different types of route map designs for ten cities (approximately 150 route map designs in total). We are interested in how participants make sense of the route map, and subsequently choose an optimal pathway. The findings show that participants who experience certain aesthetically designed route maps are more inclined to meaningfully link information and create connections. By more deeply understanding people's perceptions of the aesthetics of a navigation problem space - particularly the ways in which people value and connect with aesthetic elements and how these impact the decisions made - a novel insight into individuals' understanding of data visualisation and how aesthetics affect is achieved.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Aesthetically manipulating the visual variables of a navigation interface design has the potential for substantial improvements in the interpretation of, and subsequent navigational choices made resulting from that design. This paper reports on a study that explores how an `optimal' path is understood across fifteen different types of route map designs for ten cities (approximately 150 route map designs in total). We are interested in how participants make sense of the route map, and subsequently choose an optimal pathway. The findings show that participants who experience certain aesthetically designed route maps are more inclined to meaningfully link information and create connections. By more deeply understanding people's perceptions of the aesthetics of a navigation problem space - particularly the ways in which people value and connect with aesthetic elements and how these impact the decisions made - a novel insight into individuals' understanding of data visualisation and how aesthetics affect is achieved.",
"fno": "913400a214",
"keywords": [
"Data Visualisation",
"Terrain Mapping",
"User Interfaces",
"Navigation Problem Space",
"Aesthetic Elements",
"Felt Knowledge",
"Visual Variables",
"Navigation Interface Design",
"Subsequent Navigational Choices",
"Optimal Pathway",
"Aesthetically Designed Route Maps",
"Route Map Designs",
"Visualization",
"Uncertainty",
"Navigation",
"Shape",
"Urban Areas",
"Sensors",
"Task Analysis",
"Aesthetics",
"HCI",
"Visual Variables",
"Decision Making",
"Felt Knowledge",
"Affect"
],
"authors": [
{
"affiliation": "Cardiffmet University,School of Technologies,Cardiff,Wales",
"fullName": "Fiona Carroll",
"givenName": "Fiona",
"surname": "Carroll",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Melbourne,School of Psychological Sciences,Melbourne,Australia",
"fullName": "Maggie Webb",
"givenName": "Maggie",
"surname": "Webb",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Melbourne,School of Psychological Sciences,Melbourne,Australia",
"fullName": "Simon Cropper",
"givenName": "Simon",
"surname": "Cropper",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-09-01T00:00:00",
"pubType": "proceedings",
"pages": "214-219",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9134-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "913400a208",
"articleId": "1rSR9oIiBeo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "913400a220",
"articleId": "1rSR9yZPFni",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/1992/2910/0/00201565",
"title": "Finding landmarks autonomously along a route",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/1992/00201565/12OmNBpEeY1",
"parentPublication": {
"id": "proceedings/icpr/1992/2910/0",
"title": "1992 11th IAPR International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nicoint/2017/5332/0/5332a095",
"title": "Evaluation of Ikebana Based on Geometric Shape Arrangement",
"doi": null,
"abstractUrl": "/proceedings-article/nicoint/2017/5332a095/12OmNsbY6TS",
"parentPublication": {
"id": "proceedings/nicoint/2017/5332/0",
"title": "2017 Nicograph International (NicoInt)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/passat-socialcom/2011/1931/0/06113324",
"title": "Discovering and Classifying Errors in Way Finding",
"doi": null,
"abstractUrl": "/proceedings-article/passat-socialcom/2011/06113324/12OmNz5s0NX",
"parentPublication": {
"id": "proceedings/passat-socialcom/2011/1931/0",
"title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2012/03/06185648",
"title": "Adapting models of visual aesthetics for personalized content creation",
"doi": null,
"abstractUrl": "/journal/ci/2012/03/06185648/13rRUwh80Jd",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/1997/03/x3006",
"title": "The role of aesthetics in intelligent systems",
"doi": null,
"abstractUrl": "/magazine/ex/1997/03/x3006/13rRUxC0SAf",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/pc/2016/03/mpc2016030024",
"title": "Toward Meaningful Engagement with Pervasive Displays",
"doi": null,
"abstractUrl": "/magazine/pc/2016/03/mpc2016030024/13rRUy2YLQi",
"parentPublication": {
"id": "mags/pc",
"title": "IEEE Pervasive Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2019/07/08365844",
"title": "A Deep Network Solution for Attention and Aesthetics Aware Photo Cropping",
"doi": null,
"abstractUrl": "/journal/tp/2019/07/08365844/13rRUypp58W",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbase/2021/2709/0/270900a591",
"title": "An Empirical Study of UAV’s Delivery Path Planning",
"doi": null,
"abstractUrl": "/proceedings-article/icbase/2021/270900a591/1AH8a7yVPpK",
"parentPublication": {
"id": "proceedings/icbase/2021/2709/0",
"title": "2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600b094",
"title": "A Priority Map for Vision-and-Language Navigation with Trajectory Plans and Feature-Location Cues",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600b094/1KxV4p0t9i8",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2020/9134/0/913400a626",
"title": "‘Visualized tradition and living heritage’: Hanoi’s architectural characteristics in paintings",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2020/913400a626/1rSR8bfgN6U",
"parentPublication": {
"id": "proceedings/iv/2020/9134/0",
"title": "2020 24th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyjLoRw",
"title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"acronym": "ismar",
"groupId": "1000465",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAoUTpO",
"doi": "10.1109/ISMAR.2014.6948413",
"title": "A study of depth perception in hand-held augmented reality using autostereoscopic displays",
"normalizedTitle": "A study of depth perception in hand-held augmented reality using autostereoscopic displays",
"abstract": "Displaying three-dimensional content on a flat display is bound to reduce the impression of depth, particularly for mobile video see-trough augmented reality. Several applications in this domain can benefit from accurate depth perception, especially if there are contradictory depth cues, like occlusion in a x-ray visualization. The use of stereoscopy for this effect is already prevalent in head-mounted displays, but there is little research on the applicability for hand-held augmented reality. We have implemented such a prototype using an off-the-shelf smartphone equipped with a stereo camera and an autostereoscopic display. We designed and conducted an extensive user study to explore the effects of stereoscopic hand-held augmented reality on depth perception. The results show that in this scenario depth judgment is mostly influenced by monoscopic depth cues, but our system can improve positioning accuracy in challenging scenes.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Displaying three-dimensional content on a flat display is bound to reduce the impression of depth, particularly for mobile video see-trough augmented reality. Several applications in this domain can benefit from accurate depth perception, especially if there are contradictory depth cues, like occlusion in a x-ray visualization. The use of stereoscopy for this effect is already prevalent in head-mounted displays, but there is little research on the applicability for hand-held augmented reality. We have implemented such a prototype using an off-the-shelf smartphone equipped with a stereo camera and an autostereoscopic display. We designed and conducted an extensive user study to explore the effects of stereoscopic hand-held augmented reality on depth perception. The results show that in this scenario depth judgment is mostly influenced by monoscopic depth cues, but our system can improve positioning accuracy in challenging scenes.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Displaying three-dimensional content on a flat display is bound to reduce the impression of depth, particularly for mobile video see-trough augmented reality. Several applications in this domain can benefit from accurate depth perception, especially if there are contradictory depth cues, like occlusion in a x-ray visualization. The use of stereoscopy for this effect is already prevalent in head-mounted displays, but there is little research on the applicability for hand-held augmented reality. We have implemented such a prototype using an off-the-shelf smartphone equipped with a stereo camera and an autostereoscopic display. We designed and conducted an extensive user study to explore the effects of stereoscopic hand-held augmented reality on depth perception. The results show that in this scenario depth judgment is mostly influenced by monoscopic depth cues, but our system can improve positioning accuracy in challenging scenes.",
"fno": "06948413",
"keywords": [
"Stereo Image Processing",
"Cameras",
"Augmented Reality",
"Accuracy",
"Visualization",
"Hardware",
"Three Dimensional Displays",
"User Study",
"Autostereoscopy",
"Mobile Devices",
"Depth Perception",
"Augmented Reality"
],
"authors": [
{
"affiliation": "Karlsruhe Institute of Technology (KIT), TECO, Karlsruhe, Germany",
"fullName": "Matthias Berning",
"givenName": "Matthias",
"surname": "Berning",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Karlsruhe Institute of Technology (KIT), TECO, Karlsruhe, Germany",
"fullName": "Daniel Kleinert",
"givenName": "Daniel",
"surname": "Kleinert",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Karlsruhe Institute of Technology (KIT), TECO, Karlsruhe, Germany",
"fullName": "Till Riedel",
"givenName": "Till",
"surname": "Riedel",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Karlsruhe Institute of Technology (KIT), TECO, Karlsruhe, Germany",
"fullName": "Michael Beigl",
"givenName": "Michael",
"surname": "Beigl",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ismar",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-09-01T00:00:00",
"pubType": "proceedings",
"pages": "93-98",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-6184-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06948412",
"articleId": "12OmNwudQT3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06948414",
"articleId": "12OmNwcCISR",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ismarw/2016/3740/0/07836523",
"title": "Human Attention and fatigue for AR Head-Up Displays",
"doi": null,
"abstractUrl": "/proceedings-article/ismarw/2016/07836523/12OmNwFidbp",
"parentPublication": {
"id": "proceedings/ismarw/2016/3740/0",
"title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2012/4660/0/06402558",
"title": "3D referencing techniques for physical objects in shared augmented reality",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2012/06402558/12OmNxj239f",
"parentPublication": {
"id": "proceedings/ismar/2012/4660/0",
"title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismarw/2016/3740/0/07836470",
"title": "A Hand-Held, Self-Contained Simulated Transparent Display",
"doi": null,
"abstractUrl": "/proceedings-article/ismarw/2016/07836470/12OmNxy4N38",
"parentPublication": {
"id": "proceedings/ismarw/2016/3740/0",
"title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2010/9343/0/05643603",
"title": "SnapAR: Storing snapshots for quick viewpoint switching in hand-held augmented reality",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2010/05643603/12OmNzZEApL",
"parentPublication": {
"id": "proceedings/ismar/2010/9343/0",
"title": "2010 IEEE International Symposium on Mixed and Augmented Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2016/0842/0/07460065",
"title": "Smartwatch-assisted robust 6-DOF hand tracker for object manipulation in HMD-based augmented reality",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2016/07460065/12OmNzlUKES",
"parentPublication": {
"id": "proceedings/3dui/2016/0842/0",
"title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2009/3943/0/04810999",
"title": "Indoor vs. Outdoor Depth Perception for Mobile Augmented Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04810999/12OmNzvhvIR",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2020/7675/0/767500a277",
"title": "Usability Considerations of Hand Held Augmented Reality Wiring Tutors",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a277/1pBMfQFtTC8",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2020/7675/0",
"title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2009/3943/0/04811002",
"title": "Improving Spatial Perception for Augmented Reality X-Ray Vision",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2009/04811002/1t0I1sqXnl6",
"parentPublication": {
"id": "proceedings/vr/2009/3943/0",
"title": "2009 IEEE Virtual Reality Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2021/1298/0/129800a483",
"title": "Depth Perception using X-Ray Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a483/1yeQMsaSzkI",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2021/1298/0",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmu/2021/48/0/09638926",
"title": "Expanding the Interaction Space using Hand-Held-AR with Hearing Support",
"doi": null,
"abstractUrl": "/proceedings-article/icmu/2021/09638926/1zktgq0cow0",
"parentPublication": {
"id": "proceedings/icmu/2021/48/0",
"title": "2021 Thirteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvAiSpb",
"title": "Computer Vision, IEEE International Conference on",
"acronym": "iccv",
"groupId": "1000149",
"volume": "1",
"displayVolume": "2",
"year": "2001",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqzcvNb",
"doi": "10.1109/ICCV.2001.937507",
"title": "Efficient dense depth estimation from dense multiperspective panoramas",
"normalizedTitle": "Efficient dense depth estimation from dense multiperspective panoramas",
"abstract": "In this paper we study how to compute a dense depth map with panoramic field of view (e.g., 360 degrees) from multi-perspective panoramas. A dense sequence of multiperspective panoramas is used for better accuracy and reduced ambiguity by taking advantage of significant data redundancy. To speed up the reconstruction, we derive an approximate epipolar plane image that is associated with the planar sweeping camera setup, and use one-dimensional window for efficient matching. To address the aperture problem introduced by one-dimensional window matching, we keep a set of possible depth candidates from matching scores. These candidates are then passed to a novel two-pass tensor voting scheme to select the optimal depth. By propagating the continuity and uniqueness constraints non-iteratively in the voting process, our method produces high-quality reconstruction results even when significant occlusion is present. Experiments on challenging synthetic and real scenes demonstrate the effectiveness and efficacy of our method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper we study how to compute a dense depth map with panoramic field of view (e.g., 360 degrees) from multi-perspective panoramas. A dense sequence of multiperspective panoramas is used for better accuracy and reduced ambiguity by taking advantage of significant data redundancy. To speed up the reconstruction, we derive an approximate epipolar plane image that is associated with the planar sweeping camera setup, and use one-dimensional window for efficient matching. To address the aperture problem introduced by one-dimensional window matching, we keep a set of possible depth candidates from matching scores. These candidates are then passed to a novel two-pass tensor voting scheme to select the optimal depth. By propagating the continuity and uniqueness constraints non-iteratively in the voting process, our method produces high-quality reconstruction results even when significant occlusion is present. Experiments on challenging synthetic and real scenes demonstrate the effectiveness and efficacy of our method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper we study how to compute a dense depth map with panoramic field of view (e.g., 360 degrees) from multi-perspective panoramas. A dense sequence of multiperspective panoramas is used for better accuracy and reduced ambiguity by taking advantage of significant data redundancy. To speed up the reconstruction, we derive an approximate epipolar plane image that is associated with the planar sweeping camera setup, and use one-dimensional window for efficient matching. To address the aperture problem introduced by one-dimensional window matching, we keep a set of possible depth candidates from matching scores. These candidates are then passed to a novel two-pass tensor voting scheme to select the optimal depth. By propagating the continuity and uniqueness constraints non-iteratively in the voting process, our method produces high-quality reconstruction results even when significant occlusion is present. Experiments on challenging synthetic and real scenes demonstrate the effectiveness and efficacy of our method.",
"fno": "00937507",
"keywords": [
"Image Matching",
"Motion Estimation",
"Computer Graphics",
"Dense Depth Estimation",
"Dense Multiperspective Panoramas",
"Dense Depth Map",
"Panoramic Field Of View",
"Dense Sequence",
"Data Redundancy",
"Approximate Epipolar Plane Image",
"Planar Sweeping Camera Setup",
"One Dimensional Window",
"Aperture Problem",
"One Dimensional Window Matching",
"Depth Candidates",
"Two Pass Tensor Voting Scheme",
"Uniqueness Constraints",
"Real Scenes",
"Image Reconstruction",
"Iterative Algorithms",
"Voting",
"Layout",
"Stereo Image Processing",
"Councils",
"Geometry",
"Computer Science",
"Tensile Stress",
"Navigation"
],
"authors": [
{
"affiliation": "Comput. Sci. Dept., HKUST, Hong Kong, China",
"fullName": "Yin Li",
"givenName": null,
"surname": "Yin Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chi-Keung Tang",
"givenName": null,
"surname": "Chi-Keung Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Heung-Yeung Shum",
"givenName": null,
"surname": "Heung-Yeung Shum",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2001-01-01T00:00:00",
"pubType": "proceedings",
"pages": "119,120,121,122,123,124,125,126",
"year": "2001",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00937506",
"articleId": "12OmNCdTeNy",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "114310002",
"articleId": "12OmNz4SOqw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/1999/0164/1/01640014",
"title": "Stereo Reconstruction from Multiperspective Panoramas",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/1999/01640014/12OmNBTawrB",
"parentPublication": {
"id": "proceedings/iccv/1999/0164/1",
"title": "Proceedings of the Seventh IEEE International Conference on Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2012/4711/0/4711a091",
"title": "Multi-perspective Panoramas of Long Scenes",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2012/4711a091/12OmNqOwQEU",
"parentPublication": {
"id": "proceedings/icme/2012/4711/0",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2001/1143/1/114310119",
"title": "Efficient Dense Depth Estimation from Dense Multiperspective Panoramas",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2001/114310119/12OmNwDSdsv",
"parentPublication": {
"id": "proceedings/iccv/2001/1143/1",
"title": "Computer Vision, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2007/1179/0/04270320",
"title": "Layered Depth Panoramas",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2007/04270320/12OmNwdbV6j",
"parentPublication": {
"id": "proceedings/cvpr/2007/1179/0",
"title": "2007 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2009/4420/0/05459406",
"title": "Multiperspective stereo matching and volumetric reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2009/05459406/12OmNy2JsZs",
"parentPublication": {
"id": "proceedings/iccv/2009/4420/0",
"title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2006/06/i0968",
"title": "Stereo Using Monocular Cues within the Tensor Voting Framework",
"doi": null,
"abstractUrl": "/journal/tp/2006/06/i0968/13rRUxBa5sW",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2004/01/i0045",
"title": "Stereo Reconstruction from Multiperspective Panoramas",
"doi": null,
"abstractUrl": "/journal/tp/2004/01/i0045/13rRUxcbnIe",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2022/5670/0/567000a134",
"title": "Distortion-aware Depth Estimation with Gradient Priors from Panoramas of Indoor Scenes",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2022/567000a134/1KYsvDb1bGw",
"parentPublication": {
"id": "proceedings/3dv/2022/5670/0",
"title": "2022 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2023/9346/0/934600d115",
"title": "High-Resolution Depth Estimation for 360° Panoramas through Perspective and Panoramic Depth Images Registration",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2023/934600d115/1KxUHNxJcqY",
"parentPublication": {
"id": "proceedings/wacv/2023/9346/0",
"title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090561",
"title": "Real-time Depth Estimation for Aerial Panoramas in Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090561/1jIxzrl7CPm",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNANkoa6",
"title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrJAdMH",
"doi": "10.1109/CVPRW.2012.6238907",
"title": "3D display size matters: Compensating for the perceptual effects of S3D display scaling",
"normalizedTitle": "3D display size matters: Compensating for the perceptual effects of S3D display scaling",
"abstract": "Over the last decade, advances in technology have made stereoscopic 3D (S3D) displays widely available with an ever-expanding variety of technologies, dimensions, resolution, optimal viewing angle and image quality. Of these, one of the most variable and unpredictable factors influencing the observer's S3D experience is the display size, which ranges from S3D mobile devices to large-format 3D movie theatres. This variety poses a challenge to 3D content makers who wish to preserve the three dimensional artistic context and avoid distortions and artefacts related to scaling. This paper will review the primary human factors issues related to S3D image scaling and the techniques and algorithms used to scale content.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Over the last decade, advances in technology have made stereoscopic 3D (S3D) displays widely available with an ever-expanding variety of technologies, dimensions, resolution, optimal viewing angle and image quality. Of these, one of the most variable and unpredictable factors influencing the observer's S3D experience is the display size, which ranges from S3D mobile devices to large-format 3D movie theatres. This variety poses a challenge to 3D content makers who wish to preserve the three dimensional artistic context and avoid distortions and artefacts related to scaling. This paper will review the primary human factors issues related to S3D image scaling and the techniques and algorithms used to scale content.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Over the last decade, advances in technology have made stereoscopic 3D (S3D) displays widely available with an ever-expanding variety of technologies, dimensions, resolution, optimal viewing angle and image quality. Of these, one of the most variable and unpredictable factors influencing the observer's S3D experience is the display size, which ranges from S3D mobile devices to large-format 3D movie theatres. This variety poses a challenge to 3D content makers who wish to preserve the three dimensional artistic context and avoid distortions and artefacts related to scaling. This paper will review the primary human factors issues related to S3D image scaling and the techniques and algorithms used to scale content.",
"fno": "06238907",
"keywords": [
"Distortion",
"Human Factors",
"Image Enhancement",
"Image Resolution",
"Three Dimensional Displays",
"3 D Display Size",
"Perceptual Effects Compensation",
"S 3 D Display Scaling",
"Stereoscopic 3 D Displays",
"Optimal Viewing Angle",
"Image Quality",
"Display Resolution",
"Display Dimensions",
"S 3 D Mobile Devices",
"Large Format 3 D Movie Theatres",
"3 D Content Makers",
"Three Dimensional Artistic Context",
"Distortion Avoidance",
"Scaling Artefacts",
"Primary Human Factor Issues",
"S 3 D Image Scaling",
"Cameras",
"Films",
"Stereo Image Processing",
"Observers",
"Retina",
"Visualization",
"Three Dimensional Displays"
],
"authors": [
{
"affiliation": "Centre for Vision Research, York University, 4700 Keele St, Toronto, ON Canada",
"fullName": "Karim Benzeroual",
"givenName": "Karim",
"surname": "Benzeroual",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centre for Vision Research, York University, 4700 Keele St, Toronto, ON Canada",
"fullName": "Robert S. Allison",
"givenName": "Robert S.",
"surname": "Allison",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centre for Vision Research, York University, 4700 Keele St, Toronto, ON Canada",
"fullName": "Laurie M. Wilcox",
"givenName": "Laurie M.",
"surname": "Wilcox",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-06-01T00:00:00",
"pubType": "proceedings",
"pages": "45-52",
"year": "2012",
"issn": "2160-7508",
"isbn": "978-1-4673-1611-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06238906",
"articleId": "12OmNyQYtuh",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06238908",
"articleId": "12OmNxGAL6o",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsap/2009/3594/0/05163842",
"title": "3D Reconstruction Using Level-Based Approach in Stereopsis",
"doi": null,
"abstractUrl": "/proceedings-article/icsap/2009/05163842/12OmNAo45Me",
"parentPublication": {
"id": "proceedings/icsap/2009/3594/0",
"title": "Signal Acquisition and Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisa/2012/1402/0/06220958",
"title": "FPGA Based Stereo Vision System to Display Disparity Map in Realtime",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2012/06220958/12OmNCzb9vm",
"parentPublication": {
"id": "proceedings/icisa/2012/1402/0",
"title": "2012 International Conference on Information Science and Applications (ICISA 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dvis/2014/6826/0/07160106",
"title": "SPAROGRAM: The spatial augmented reality holographic display for 3D visualization and exhibition",
"doi": null,
"abstractUrl": "/proceedings-article/3dvis/2014/07160106/12OmNywxlNC",
"parentPublication": {
"id": "proceedings/3dvis/2014/6826/0",
"title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2014/4308/0/4308a637",
"title": "A High-Performance Hardware Architecture for a Frameless Stereo Vision Algorithm Implemented on a FPGA Platform",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2014/4308a637/12OmNz6iOqV",
"parentPublication": {
"id": "proceedings/cvprw/2014/4308/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/05/06977984",
"title": "Temporal Video Filtering and Exposure Control for Perceptual Motion Blur",
"doi": null,
"abstractUrl": "/journal/tg/2015/05/06977984/13rRUxASuvf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aicis/2018/9188/0/918800a259",
"title": "Overview: 3D Video from Capture to Display",
"doi": null,
"abstractUrl": "/proceedings-article/aicis/2018/918800a259/17PYEm2zquf",
"parentPublication": {
"id": "proceedings/aicis/2018/9188/0",
"title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09706291",
"title": "Perceptual Assessment of Image and Depth Quality of Dynamically Depth-Compressed Scene for Automultiscopic 3D Display",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09706291/1AO2jecLFgQ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797876",
"title": "Live Stereoscopic 3D Image with Constant Capture Direction of 360° Cameras for High-Quality Visual Telepresence",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797876/1cJ0HMTqjOU",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2019/0801/0/08940209",
"title": "Effect of Colored Content on Depth Perception of S3D Images",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2019/08940209/1gjRPfdgDIc",
"parentPublication": {
"id": "proceedings/icis/2019/0801/0",
"title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090432",
"title": "Perceptual Distortions Between Windows and Screens: Stereopsis Predicts Motion Parallax",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090432/1jIxqgOQSDS",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyqRndY",
"title": "Pattern Recognition, International Conference on",
"acronym": "icpr",
"groupId": "1000545",
"volume": "1",
"displayVolume": "1",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx76TQ1",
"doi": "10.1109/ICPR.2000.905325",
"title": "Integration of Perceptual Grouping and Depth",
"normalizedTitle": "Integration of Perceptual Grouping and Depth",
"abstract": "Different data acquisition methods are tailored at extracting particular characteristics from a scene and by combining their results, a more robust scene description can be created. A method to fuse perceptual groupings extracted from color-based segmentation and depth information from stereo using supervised classification is presented. The merging of data from these two acquisition modules allows for a spatially coherent blend of smooth regions and detail in an image. Depth cues are used to limit the area of interest in the scene and to improve perceptual grouping solving sub-segmentation and over-segmentation of the original images. The complexity of the algorithm does not exceed that of the individual acquisition modules. The resulting scene description can then be fed to an object recognition module for scene interpretation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Different data acquisition methods are tailored at extracting particular characteristics from a scene and by combining their results, a more robust scene description can be created. A method to fuse perceptual groupings extracted from color-based segmentation and depth information from stereo using supervised classification is presented. The merging of data from these two acquisition modules allows for a spatially coherent blend of smooth regions and detail in an image. Depth cues are used to limit the area of interest in the scene and to improve perceptual grouping solving sub-segmentation and over-segmentation of the original images. The complexity of the algorithm does not exceed that of the individual acquisition modules. The resulting scene description can then be fed to an object recognition module for scene interpretation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Different data acquisition methods are tailored at extracting particular characteristics from a scene and by combining their results, a more robust scene description can be created. A method to fuse perceptual groupings extracted from color-based segmentation and depth information from stereo using supervised classification is presented. The merging of data from these two acquisition modules allows for a spatially coherent blend of smooth regions and detail in an image. Depth cues are used to limit the area of interest in the scene and to improve perceptual grouping solving sub-segmentation and over-segmentation of the original images. The complexity of the algorithm does not exceed that of the individual acquisition modules. The resulting scene description can then be fed to an object recognition module for scene interpretation.",
"fno": "07501295",
"keywords": [
"Data Fusion",
"Color Based Segmentation",
"Depth From Stereo"
],
"authors": [
{
"affiliation": "Universitat Polit?cnica de Catalunya",
"fullName": "Juan Andrade-Cetto",
"givenName": "Juan",
"surname": "Andrade-Cetto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universitat Polit?cnica de Catalunya",
"fullName": "Alberto Sanfeliu",
"givenName": "Alberto",
"surname": "Sanfeliu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-09-01T00:00:00",
"pubType": "proceedings",
"pages": "1295",
"year": "2000",
"issn": null,
"isbn": "0-7695-0750-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07501291",
"articleId": "12OmNASraTH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07501299",
"articleId": "12OmNxd4tzT",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwwMf3H",
"title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)",
"acronym": "ismarw",
"groupId": "1810084",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxy4N38",
"doi": "10.1109/ISMAR-Adjunct.2016.0049",
"title": "A Hand-Held, Self-Contained Simulated Transparent Display",
"normalizedTitle": "A Hand-Held, Self-Contained Simulated Transparent Display",
"abstract": "Hand-held transparent displays are important infrastructure for augmented reality applications. Truly transparent displays are not yet feasible in hand-held form, and a promising alternative is to simulate transparency by displaying the image the user would see if the display were not there. Previous simulated transparent displays have important limitations, such as being tethered to auxiliary workstations, requiring the user to wear obtrusive head-tracking devices, or lacking the depth acquisition support that is needed for an accurate transparency effect for close-range scenes.We describe a general simulated transparent display and three prototype implementations (P1, P2, and P3), which take advantage of emerging mobile devices and accessories. P1 uses an off-theshelf smartphone with built-in head-tracking support; P1 is compact and suitable for outdoor scenes, providing an accurate transparency effect for scene distances greater than 6m. P2 uses a tablet with a built-in depth camera; P2 is compact and suitable for short-distance indoor scenes, but the user has to hold the display in a fixed position. P3 uses a conventional tablet enhanced with on-board depth acquisition and head tracking accessories; P3 compensates for user head motion and provides accurate transparency even for closerange scenes. The prototypes are hand-held and self-contained, without the need of auxiliary workstations for computation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Hand-held transparent displays are important infrastructure for augmented reality applications. Truly transparent displays are not yet feasible in hand-held form, and a promising alternative is to simulate transparency by displaying the image the user would see if the display were not there. Previous simulated transparent displays have important limitations, such as being tethered to auxiliary workstations, requiring the user to wear obtrusive head-tracking devices, or lacking the depth acquisition support that is needed for an accurate transparency effect for close-range scenes.We describe a general simulated transparent display and three prototype implementations (P1, P2, and P3), which take advantage of emerging mobile devices and accessories. P1 uses an off-theshelf smartphone with built-in head-tracking support; P1 is compact and suitable for outdoor scenes, providing an accurate transparency effect for scene distances greater than 6m. P2 uses a tablet with a built-in depth camera; P2 is compact and suitable for short-distance indoor scenes, but the user has to hold the display in a fixed position. P3 uses a conventional tablet enhanced with on-board depth acquisition and head tracking accessories; P3 compensates for user head motion and provides accurate transparency even for closerange scenes. The prototypes are hand-held and self-contained, without the need of auxiliary workstations for computation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Hand-held transparent displays are important infrastructure for augmented reality applications. Truly transparent displays are not yet feasible in hand-held form, and a promising alternative is to simulate transparency by displaying the image the user would see if the display were not there. Previous simulated transparent displays have important limitations, such as being tethered to auxiliary workstations, requiring the user to wear obtrusive head-tracking devices, or lacking the depth acquisition support that is needed for an accurate transparency effect for close-range scenes.We describe a general simulated transparent display and three prototype implementations (P1, P2, and P3), which take advantage of emerging mobile devices and accessories. P1 uses an off-theshelf smartphone with built-in head-tracking support; P1 is compact and suitable for outdoor scenes, providing an accurate transparency effect for scene distances greater than 6m. P2 uses a tablet with a built-in depth camera; P2 is compact and suitable for short-distance indoor scenes, but the user has to hold the display in a fixed position. P3 uses a conventional tablet enhanced with on-board depth acquisition and head tracking accessories; P3 compensates for user head motion and provides accurate transparency even for closerange scenes. The prototypes are hand-held and self-contained, without the need of auxiliary workstations for computation.",
"fno": "07836470",
"keywords": [
"Augmented Reality",
"Computer Displays",
"Smart Phones",
"Hand Held Self Contained Simulated Transparent Display",
"Augmented Reality Applications",
"Head Tracking Devices",
"Depth Acquisition Support",
"Smart Phone",
"Head Tracking Support",
"Cameras",
"Head",
"Prototypes",
"Geometry",
"Image Color Analysis",
"Workstations",
"Visualization",
"Simulated Transparent Smartphone",
"Simulated Transparent Tablet",
"Infrastructure For Augmented Reality Applications"
],
"authors": [
{
"affiliation": null,
"fullName": "Daniel Andersen",
"givenName": "Daniel",
"surname": "Andersen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Voicu Popescu",
"givenName": "Voicu",
"surname": "Popescu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chengyuan Lin",
"givenName": "Chengyuan",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Maria Eugenia Cabrera",
"givenName": "Maria Eugenia",
"surname": "Cabrera",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Aditya Shanghavi",
"givenName": "Aditya",
"surname": "Shanghavi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Juan Wachs",
"givenName": "Juan",
"surname": "Wachs",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ismarw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-09-01T00:00:00",
"pubType": "proceedings",
"pages": "96-101",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-3740-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07836469",
"articleId": "12OmNzlUKcn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07836471",
"articleId": "12OmNwFidfy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2015/1727/0/07223420",
"title": "Transparent cockpit using telexistence",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2015/07223420/12OmNqEAT6S",
"parentPublication": {
"id": "proceedings/vr/2015/1727/0",
"title": "2015 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cluster/2009/5011/0/05289183",
"title": "VCCP: A transparent, coordinated checkpointing system for virtualization-based cluster computing",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2009/05289183/12OmNx9FhSf",
"parentPublication": {
"id": "proceedings/cluster/2009/5011/0",
"title": "2009 IEEE International Conference on Cluster Computing and Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/3/01326522",
"title": "Recovery of two transparent primitive images from two frames",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01326522/12OmNxwENLZ",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/3",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2016/5670/0/5670b256",
"title": "From Fuzzy Exploration to Transparent Advice: Insights into Mobile Advisory Services",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2016/5670b256/12OmNy2Jt5i",
"parentPublication": {
"id": "proceedings/hicss/2016/5670/0",
"title": "2016 49th Hawaii International Conference on System Sciences (HICSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2015/4034/0/07856632",
"title": "vCache: Architectural support for transparent and isolated virtual LLCs in virtualized environments",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2015/07856632/12OmNzcxZnX",
"parentPublication": {
"id": "proceedings/micro/2015/4034/0",
"title": "2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2018/02/07439809",
"title": "Towards Transparent Debugging",
"doi": null,
"abstractUrl": "/journal/tq/2018/02/07439809/13rRUwd9CHr",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/blockchain/2022/6104/0/610400a149",
"title": "DeSAT: Towards Transparent and Decentralized University Counselling Process",
"doi": null,
"abstractUrl": "/proceedings-article/blockchain/2022/610400a149/1GNt96MsScw",
"parentPublication": {
"id": "proceedings/blockchain/2022/6104/0",
"title": "2022 IEEE International Conference on Blockchain (Blockchain)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/10045018",
"title": "Monocular Depth Decomposition of Semi-Transparent Volume Renderings",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/10045018/1KMLV0zTt1m",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797957",
"title": "A Simulation for Examining the Effects of Inaccurate Head Tracking on Drivers of Vehicles with Transparent Cockpit Projections",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797957/1cJ15UmejkI",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2020/7675/0/767500a255",
"title": "Stencil Marker: Designing Partially Transparent Markers for Stacking Augmented Reality Objects",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a255/1pBMkhmVP7a",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2020/7675/0",
"title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNykCcdo",
"title": "2018 IEEE Pacific Visualization Symposium (PacificVis)",
"acronym": "pacificvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNANBZoz",
"doi": "10.1109/PacificVis.2018.00019",
"title": "Dynamic Data Repartitioning for Load-Balanced Parallel Particle Tracing",
"normalizedTitle": "Dynamic Data Repartitioning for Load-Balanced Parallel Particle Tracing",
"abstract": "We present a novel dynamic load-balancing algorithm based on data repartitioning for parallel particle tracing in flow visualization. Instead of static data assignment, we dynamically repartition the data into blocks and reassign the blocks to processes to balance the workload distribution among the processes. Block repartitioning is performed based on a dynamic workload estimation method that predicts the workload in the flow field on the fly as the input. In our approach, we allow data duplication in the repartitioning, enabling the same data blocks to be assigned to multiple processes. Load balance is achieved by regularly exchanging the blocks (together with the particles in the blocks) among processes according to the output of the data repartitioning. Compared with other load-balancing algorithms, our approach does not need any preprocessing on the raw data and does not require any dedicated process for work scheduling, while it has the capability to balance uneven workload efficiently. Results show improved load balance and high efficiency of our method on tracing particles in both steady and unsteady flow.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a novel dynamic load-balancing algorithm based on data repartitioning for parallel particle tracing in flow visualization. Instead of static data assignment, we dynamically repartition the data into blocks and reassign the blocks to processes to balance the workload distribution among the processes. Block repartitioning is performed based on a dynamic workload estimation method that predicts the workload in the flow field on the fly as the input. In our approach, we allow data duplication in the repartitioning, enabling the same data blocks to be assigned to multiple processes. Load balance is achieved by regularly exchanging the blocks (together with the particles in the blocks) among processes according to the output of the data repartitioning. Compared with other load-balancing algorithms, our approach does not need any preprocessing on the raw data and does not require any dedicated process for work scheduling, while it has the capability to balance uneven workload efficiently. Results show improved load balance and high efficiency of our method on tracing particles in both steady and unsteady flow.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a novel dynamic load-balancing algorithm based on data repartitioning for parallel particle tracing in flow visualization. Instead of static data assignment, we dynamically repartition the data into blocks and reassign the blocks to processes to balance the workload distribution among the processes. Block repartitioning is performed based on a dynamic workload estimation method that predicts the workload in the flow field on the fly as the input. In our approach, we allow data duplication in the repartitioning, enabling the same data blocks to be assigned to multiple processes. Load balance is achieved by regularly exchanging the blocks (together with the particles in the blocks) among processes according to the output of the data repartitioning. Compared with other load-balancing algorithms, our approach does not need any preprocessing on the raw data and does not require any dedicated process for work scheduling, while it has the capability to balance uneven workload efficiently. Results show improved load balance and high efficiency of our method on tracing particles in both steady and unsteady flow.",
"fno": "142401a086",
"keywords": [
"Computational Fluid Dynamics",
"Data Handling",
"Flow Visualisation",
"Resource Allocation",
"Scheduling",
"Multiple Processes",
"Load Balancing Algorithms",
"Raw Data",
"Dedicated Process",
"Uneven Workload",
"Improved Load Balance",
"Dynamic Data Repartitioning",
"Dynamic Load Balancing Algorithm",
"Flow Visualization",
"Static Data Assignment",
"Workload Distribution",
"Block Repartitioning",
"Dynamic Workload Estimation Method",
"Flow Field",
"Data Duplication",
"Data Blocks",
"Load Balanced Parallel Particle Tracing",
"Data Visualization",
"Aerodynamics",
"Load Management",
"Estimation",
"Parallel Processing",
"Task Analysis",
"Heuristic Algorithms",
"Parallel Particle Tracing",
"Dynamic Load Balancing",
"Data Repartitioning"
],
"authors": [
{
"affiliation": null,
"fullName": "Jiang Zhang",
"givenName": "Jiang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hanqi Guo",
"givenName": "Hanqi",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoru Yuan",
"givenName": "Xiaoru",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tom Peterka",
"givenName": "Tom",
"surname": "Peterka",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pacificvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-04-01T00:00:00",
"pubType": "proceedings",
"pages": "86-95",
"year": "2018",
"issn": "2165-8773",
"isbn": "978-1-5386-1424-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "142401a076",
"articleId": "12OmNzwHvbM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "142401a096",
"articleId": "12OmNCm7BG7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bdc/2014/1897/0/1897a008",
"title": "Progressive Data Stream Mining and Transaction Classification for Workload-Aware Incremental Database Repartitioning",
"doi": null,
"abstractUrl": "/proceedings-article/bdc/2014/1897a008/12OmNC2fGxA",
"parentPublication": {
"id": "proceedings/bdc/2014/1897/0",
"title": "2014 IEEE/ACM International Symposium on Big Data Computing (BDC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpads/2009/3900/0/3900a150",
"title": "Dynamic Load Balancing for Parallel Numerical Simulations Based on Repartitioning with Disturbed Diffusion",
"doi": null,
"abstractUrl": "/proceedings-article/icpads/2009/3900a150/12OmNrYlmJC",
"parentPublication": {
"id": "proceedings/icpads/2009/3900/0",
"title": "Parallel and Distributed Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ucc/2014/7881/0/7881a213",
"title": "Workload-Aware Incremental Repartitioning of Shared-Nothing Distributed Databases for Scalable Cloud Applications",
"doi": null,
"abstractUrl": "/proceedings-article/ucc/2014/7881a213/12OmNwwMf4q",
"parentPublication": {
"id": "proceedings/ucc/2014/7881/0",
"title": "2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsn/2010/3961/0/3961a449",
"title": "A New Load Balancing Algorithm in Parallel Computing",
"doi": null,
"abstractUrl": "/proceedings-article/iccsn/2010/3961a449/12OmNyY4ruN",
"parentPublication": {
"id": "proceedings/iccsn/2010/3961/0",
"title": "Communication Software and Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipccc/2017/6468/0/08280473",
"title": "Laro: Lazy repartitioning for graph workloads on heterogeneous clusters",
"doi": null,
"abstractUrl": "/proceedings-article/ipccc/2017/08280473/12OmNzUPpwp",
"parentPublication": {
"id": "proceedings/ipccc/2017/6468/0",
"title": "2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011121785",
"title": "Load-Balanced Parallel Streamline Generation on Large Scale Vector Fields",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011121785/13rRUNvyaeW",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08017633",
"title": "Dynamic Load Balancing Based on Constrained K-D Tree Decomposition for Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08017633/13rRUwgQpqN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09706326",
"title": "Reinforcement Learning for Load-Balanced Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09706326/1AO2j4ICNLa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2020/5697/0/09086288",
"title": "LBVis: Interactive Dynamic Load Balancing Visualization for Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2020/09086288/1kuHlZvEurK",
"parentPublication": {
"id": "proceedings/pacificvis/2020/5697/0",
"title": "2020 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/bd/2022/06/09392332",
"title": "A Two-Phase Method to Balance the Result of Distributed Graph Repartitioning",
"doi": null,
"abstractUrl": "/journal/bd/2022/06/09392332/1sq7oegaNby",
"parentPublication": {
"id": "trans/bd",
"title": "IEEE Transactions on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNrAdstx",
"title": "2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)",
"acronym": "pdp",
"groupId": "1000543",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrAdsuT",
"doi": "10.1109/PDP.2014.109",
"title": "Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning",
"normalizedTitle": "Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning",
"abstract": "Dynamic consolidation techniques optimize resource utilization and reduce energy consumption in Cloud data centers. They should consider the variability of the workload to decide when idle or underutilized hosts switch to sleep mode in order to minimize energy consumption. In this paper, we propose a Reinforcement Learning-based Dynamic Consolidation method (RL-DC) to minimize the number of active hosts according to the current resources requirement. The RL-DC utilizes an agent to learn the optimal policy for determining the host power mode by using a popular reinforcement learning method. The agent learns from past knowledge to decide when a host should be switched to the sleep or active mode and improves itself as the workload changes. Therefore, RL-DC does not require any prior information about workload and it dynamically adapts to the environment to achieve online energy and performance management. Experimental results on the real workload traces from more than a thousand PlanetLab virtual machines show that RL-DC minimizes energy consumption and maintains required performance levels.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Dynamic consolidation techniques optimize resource utilization and reduce energy consumption in Cloud data centers. They should consider the variability of the workload to decide when idle or underutilized hosts switch to sleep mode in order to minimize energy consumption. In this paper, we propose a Reinforcement Learning-based Dynamic Consolidation method (RL-DC) to minimize the number of active hosts according to the current resources requirement. The RL-DC utilizes an agent to learn the optimal policy for determining the host power mode by using a popular reinforcement learning method. The agent learns from past knowledge to decide when a host should be switched to the sleep or active mode and improves itself as the workload changes. Therefore, RL-DC does not require any prior information about workload and it dynamically adapts to the environment to achieve online energy and performance management. Experimental results on the real workload traces from more than a thousand PlanetLab virtual machines show that RL-DC minimizes energy consumption and maintains required performance levels.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Dynamic consolidation techniques optimize resource utilization and reduce energy consumption in Cloud data centers. They should consider the variability of the workload to decide when idle or underutilized hosts switch to sleep mode in order to minimize energy consumption. In this paper, we propose a Reinforcement Learning-based Dynamic Consolidation method (RL-DC) to minimize the number of active hosts according to the current resources requirement. The RL-DC utilizes an agent to learn the optimal policy for determining the host power mode by using a popular reinforcement learning method. The agent learns from past knowledge to decide when a host should be switched to the sleep or active mode and improves itself as the workload changes. Therefore, RL-DC does not require any prior information about workload and it dynamically adapts to the environment to achieve online energy and performance management. Experimental results on the real workload traces from more than a thousand PlanetLab virtual machines show that RL-DC minimizes energy consumption and maintains required performance levels.",
"fno": "2729a500",
"keywords": [
"Resource Management",
"Servers",
"Heuristic Algorithms",
"Switches",
"Power Demand",
"Energy Consumption",
"Prediction Algorithms",
"Cloud Data Centers",
"Energy Management",
"Dynamic Consolidation",
"Reinforcement Learning",
"Green IT"
],
"authors": [
{
"affiliation": "Dept. of Inf. Technol., Univ. of Turku, Turku, Finland",
"fullName": "Fahimeh Farahnakian",
"givenName": "Fahimeh",
"surname": "Farahnakian",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Inf. Technol., Univ. of Turku, Turku, Finland",
"fullName": "Pasi Liljeberg",
"givenName": "Pasi",
"surname": "Liljeberg",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Inf. Technol., Univ. of Turku, Turku, Finland",
"fullName": "Juha Plosila",
"givenName": "Juha",
"surname": "Plosila",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pdp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-02-01T00:00:00",
"pubType": "proceedings",
"pages": "500-507",
"year": "2014",
"issn": "1066-6192",
"isbn": "978-0-7695-4939-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2729a490",
"articleId": "12OmNx7G65b",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2729a508",
"articleId": "12OmNC3FGgt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ithings/2014/5967/0/5967a470",
"title": "Robust Virtual Machine Consolidation for Efficient Energy and Performance in Virtualized Data Centers",
"doi": null,
"abstractUrl": "/proceedings-article/ithings/2014/5967a470/12OmNqHqSyA",
"parentPublication": {
"id": "proceedings/ithings/2014/5967/0",
"title": "2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing(CPSCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloud/2015/7287/0/7287a750",
"title": "Virtual Machine Consolidation with Usage Prediction for Energy-Efficient Cloud Data Centers",
"doi": null,
"abstractUrl": "/proceedings-article/cloud/2015/7287a750/12OmNwdbVe0",
"parentPublication": {
"id": "proceedings/cloud/2015/7287/0",
"title": "2015 IEEE 8th International Conference on Cloud Computing (CLOUD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pact/2015/9524/0/9524a494",
"title": "DVFS-Aware Consolidation for Energy-Efficient Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/pact/2015/9524a494/12OmNxGAL4g",
"parentPublication": {
"id": "proceedings/pact/2015/9524/0",
"title": "2015 International Conference on Parallel Architecture and Compilation (PACT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloud/2015/7287/0/7287a381",
"title": "Utilization Prediction Aware VM Consolidation Approach for Green Cloud Computing",
"doi": null,
"abstractUrl": "/proceedings-article/cloud/2015/7287a381/12OmNz2kqlB",
"parentPublication": {
"id": "proceedings/cloud/2015/7287/0",
"title": "2015 IEEE 8th International Conference on Cloud Computing (CLOUD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/seaa/2014/5795/0/5795a111",
"title": "Multi-agent Based Architecture for Dynamic VM Consolidation in Cloud Data Centers",
"doi": null,
"abstractUrl": "/proceedings-article/seaa/2014/5795a111/12OmNz3bdGA",
"parentPublication": {
"id": "proceedings/seaa/2014/5795/0",
"title": "2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ucc/2013/5152/0/06809408",
"title": "Energy Aware Consolidation Algorithm Based on K-Nearest Neighbor Regression for Cloud Data Centers",
"doi": null,
"abstractUrl": "/proceedings-article/ucc/2013/06809408/12OmNzwHvwS",
"parentPublication": {
"id": "proceedings/ucc/2013/5152/0",
"title": "2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloud/2014/5063/0/5063a104",
"title": "Energy-Aware Dynamic VM Consolidation in Cloud Data Centers Using Ant Colony System",
"doi": null,
"abstractUrl": "/proceedings-article/cloud/2014/5063a104/12OmNzwZ6pD",
"parentPublication": {
"id": "proceedings/cloud/2014/5063/0",
"title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/sc/2020/01/07807360",
"title": "Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data Centers",
"doi": null,
"abstractUrl": "/journal/sc/2020/01/07807360/13rRUwI5U0d",
"parentPublication": {
"id": "trans/sc",
"title": "IEEE Transactions on Services Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/cc/2019/02/07593250",
"title": "Energy-Aware VM Consolidation in Cloud Data Centers Using Utilization Prediction Model",
"doi": null,
"abstractUrl": "/journal/cc/2019/02/07593250/13rRUxC0SJF",
"parentPublication": {
"id": "trans/cc",
"title": "IEEE Transactions on Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100a279",
"title": "A Transition State Cost Sensitive Virtual Machines Consolidation",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100a279/18AuMW3r07S",
"parentPublication": {
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0",
"title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKipN",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45W9KVIf",
"doi": "10.1109/BigData.2017.8257928",
"title": "Elastic management of cloud applications using adaptive reinforcement learning",
"normalizedTitle": "Elastic management of cloud applications using adaptive reinforcement learning",
"abstract": "Modern large-scale computing deployments consist of complex applications running over machine clusters. An important issue in these is the offering of elasticity, i.e., the dynamic allocation of resources to applications to meet fluctuating workload demands. Threshold based approaches are typically employed, yet they are difficult to calibrate and optimize. Approaches based on reinforcement learning (RL) have been proposed, but they require a large number of states in order to model complex application behavior. Methods that adaptively partition the state space have been proposed, but their partitioning criteria and strategies are sub-optimal. In this work we present MDP_DT, a novel full-model based reinforcement learning algorithm for elastic resource management that employs adaptive state space partitioning. We propose two novel statistical criteria and three strategies and we experimentally prove that they correctly decide both where and when to partition, outperforming existing approaches. We experimentally evaluate MDP_DT in a real large scale cluster over variable not-encountered workloads and we show that it takes more informed decisions compared to static, model-free and threshold approaches, while requiring a minimal amount of training data. We experimentally show that this adaptation enabled MDP_DT to optimize the achieved profit while being 40% cheaper than calibrated RL and threshold approaches.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Modern large-scale computing deployments consist of complex applications running over machine clusters. An important issue in these is the offering of elasticity, i.e., the dynamic allocation of resources to applications to meet fluctuating workload demands. Threshold based approaches are typically employed, yet they are difficult to calibrate and optimize. Approaches based on reinforcement learning (RL) have been proposed, but they require a large number of states in order to model complex application behavior. Methods that adaptively partition the state space have been proposed, but their partitioning criteria and strategies are sub-optimal. In this work we present MDP_DT, a novel full-model based reinforcement learning algorithm for elastic resource management that employs adaptive state space partitioning. We propose two novel statistical criteria and three strategies and we experimentally prove that they correctly decide both where and when to partition, outperforming existing approaches. We experimentally evaluate MDP_DT in a real large scale cluster over variable not-encountered workloads and we show that it takes more informed decisions compared to static, model-free and threshold approaches, while requiring a minimal amount of training data. We experimentally show that this adaptation enabled MDP_DT to optimize the achieved profit while being 40% cheaper than calibrated RL and threshold approaches.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Modern large-scale computing deployments consist of complex applications running over machine clusters. An important issue in these is the offering of elasticity, i.e., the dynamic allocation of resources to applications to meet fluctuating workload demands. Threshold based approaches are typically employed, yet they are difficult to calibrate and optimize. Approaches based on reinforcement learning (RL) have been proposed, but they require a large number of states in order to model complex application behavior. Methods that adaptively partition the state space have been proposed, but their partitioning criteria and strategies are sub-optimal. In this work we present MDP_DT, a novel full-model based reinforcement learning algorithm for elastic resource management that employs adaptive state space partitioning. We propose two novel statistical criteria and three strategies and we experimentally prove that they correctly decide both where and when to partition, outperforming existing approaches. We experimentally evaluate MDP_DT in a real large scale cluster over variable not-encountered workloads and we show that it takes more informed decisions compared to static, model-free and threshold approaches, while requiring a minimal amount of training data. We experimentally show that this adaptation enabled MDP_DT to optimize the achieved profit while being 40% cheaper than calibrated RL and threshold approaches.",
"fno": "08257928",
"keywords": [
"Partitioning Algorithms",
"Resource Management",
"Computational Modeling",
"Current Measurement",
"Velocity Measurement",
"Adaptation Models",
"Heuristic Algorithms"
],
"authors": [
{
"affiliation": "School of Electrical and Computer Engineering, National Technical University of Athens",
"fullName": "Konstantinos Lolos",
"givenName": "Konstantinos",
"surname": "Lolos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical and Computer Engineering, National Technical University of Athens",
"fullName": "Ioannis Konstantinou",
"givenName": "Ioannis",
"surname": "Konstantinou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical and Computer Engineering, National Technical University of Athens",
"fullName": "Verena Kantere",
"givenName": "Verena",
"surname": "Kantere",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Electrical and Computer Engineering, National Technical University of Athens",
"fullName": "Nectarios Koziris",
"givenName": "Nectarios",
"surname": "Koziris",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "203-212",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2715-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08257927",
"articleId": "17D45XwUAKk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08257929",
"articleId": "17D45VUZMYq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pdp/2014/2729/0/2729a500",
"title": "Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/pdp/2014/2729a500/12OmNrAdsuT",
"parentPublication": {
"id": "proceedings/pdp/2014/2729/0",
"title": "2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2017/6543/0/6543a191",
"title": "Adaptive State Space Partitioning of Markov Decision Processes for Elastic Resource Management",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543a191/12OmNwEJ0E3",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2016/3566/0/07839568",
"title": "Towards Knowledge Transfer in Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2016/07839568/12OmNzA6GKP",
"parentPublication": {
"id": "proceedings/bracis/2016/3566/0",
"title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/2/4880b274",
"title": "A Tensor Factorization Approach to Generalization in Multi-agent Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880b274/12OmNzsrwiI",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/2",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cloudcom/2018/7899/0/789900a021",
"title": "DERP: A Deep Reinforcement Learning Cloud System for Elastic Resource Provisioning",
"doi": null,
"abstractUrl": "/proceedings-article/cloudcom/2018/789900a021/17D45W2Wyzy",
"parentPublication": {
"id": "proceedings/cloudcom/2018/7899/0",
"title": "2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/cc/5555/01/09744560",
"title": "Dynamic Multi-metric Thresholds for Scaling Applications Using Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/cc/5555/01/09744560/1C8BwmMhvX2",
"parentPublication": {
"id": "trans/cc",
"title": "IEEE Transactions on Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsos/2022/7137/0/713700a051",
"title": "Explaining Online Reinforcement Learning Decisions of Self-Adaptive Systems",
"doi": null,
"abstractUrl": "/proceedings-article/acsos/2022/713700a051/1I1OX0Fj9cY",
"parentPublication": {
"id": "proceedings/acsos/2022/7137/0",
"title": "2022 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlccim/2022/9858/0/985800a290",
"title": "Improving Nuclei Segmentation in Pathological Image via Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/mlccim/2022/985800a290/1IAKhFGsNXi",
"parentPublication": {
"id": "proceedings/mlccim/2022/9858/0",
"title": "2022 International Conference on Machine Learning, Cloud Computing and Intelligent Mining (MLCCIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fas*w/2019/2406/0/240600a271",
"title": "Efficient Adaptive Resource Provisioning for Cloud Applications using Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/fas*w/2019/240600a271/1ckrwU3uJva",
"parentPublication": {
"id": "proceedings/fas*w/2019/2406/0",
"title": "2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccem/2020/9576/0/957600a042",
"title": "Landmark Detection in 3D Medical Images Using Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ccem/2020/957600a042/1vQDwgSBoEU",
"parentPublication": {
"id": "proceedings/ccem/2020/9576/0",
"title": "2020 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1AtQ1yO7FTy",
"title": "2022 International Conference on Information Networking (ICOIN)",
"acronym": "icoin",
"groupId": "1000363",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1AtQbPw61nW",
"doi": "10.1109/ICOIN53446.2022.9687277",
"title": "Reinforcement Learning based Load Balancing in a Distributed Heterogeneous Storage System",
"normalizedTitle": "Reinforcement Learning based Load Balancing in a Distributed Heterogeneous Storage System",
"abstract": "With the growing demand for big data storage and processing, distributed storage systems with heterogeneous devices have become the majority in cloud data centers. However, hardware heterogeneity and workload variety make it challenging to maintain optimal performance in those storage systems. In this work, we present a learning-based control method that optimizes the performance of a distributed storage system. Specifically, to provide automatic parameter tuning upon dynamic workload patterns on a tiered storage architecture, we employ deep reinforcement learning (RL) and implement a simulation environment for a Ceph storage system. Through simulation tests, we demonstrate our RL method shows better performance than other heuristic approaches for a task of load balancing based on the primary affinity settings in Ceph.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the growing demand for big data storage and processing, distributed storage systems with heterogeneous devices have become the majority in cloud data centers. However, hardware heterogeneity and workload variety make it challenging to maintain optimal performance in those storage systems. In this work, we present a learning-based control method that optimizes the performance of a distributed storage system. Specifically, to provide automatic parameter tuning upon dynamic workload patterns on a tiered storage architecture, we employ deep reinforcement learning (RL) and implement a simulation environment for a Ceph storage system. Through simulation tests, we demonstrate our RL method shows better performance than other heuristic approaches for a task of load balancing based on the primary affinity settings in Ceph.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the growing demand for big data storage and processing, distributed storage systems with heterogeneous devices have become the majority in cloud data centers. However, hardware heterogeneity and workload variety make it challenging to maintain optimal performance in those storage systems. In this work, we present a learning-based control method that optimizes the performance of a distributed storage system. Specifically, to provide automatic parameter tuning upon dynamic workload patterns on a tiered storage architecture, we employ deep reinforcement learning (RL) and implement a simulation environment for a Ceph storage system. Through simulation tests, we demonstrate our RL method shows better performance than other heuristic approaches for a task of load balancing based on the primary affinity settings in Ceph.",
"fno": "09687277",
"keywords": [
"Big Data",
"Cloud Computing",
"Computer Centres",
"Distributed Databases",
"Learning Artificial Intelligence",
"Resource Allocation",
"Storage Management",
"Deep Reinforcement Learning",
"Ceph Storage System",
"Load Balancing",
"Distributed Heterogeneous Storage System",
"Big Data Storage",
"Distributed Storage System",
"Heterogeneous Devices",
"Cloud Data Centers",
"Hardware Heterogeneity",
"Workload Variety",
"Optimal Performance",
"Storage Systems",
"Learning Based Control Method",
"Tiered Storage Architecture",
"Performance Evaluation",
"Data Centers",
"Storage Management",
"Reinforcement Learning",
"Load Management",
"Robustness",
"Hardware"
],
"authors": [
{
"affiliation": "Sungkyunkwan University,Department of Computer Science and Engineering,Suwon,South Korea",
"fullName": "Jooyoung Park",
"givenName": "Jooyoung",
"surname": "Park",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sungkyunkwan University,Department of Computer Science and Engineering,Suwon,South Korea",
"fullName": "Seunghwan Jeong",
"givenName": "Seunghwan",
"surname": "Jeong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sungkyunkwan University,Department of Computer Science and Engineering,Suwon,South Korea",
"fullName": "Honguk Woo",
"givenName": "Honguk",
"surname": "Woo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icoin",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-01-01T00:00:00",
"pubType": "proceedings",
"pages": "482-485",
"year": "2022",
"issn": "1976-7684",
"isbn": "978-1-6654-1332-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09687279",
"articleId": "1AtQaYNfpsY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09687204",
"articleId": "1AtQ9ORlVLi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/compsac/2016/8845/2/8845b594",
"title": "Benchmarking Large-Scale Object Storage Servers",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2016/8845b594/12OmNAYXWJz",
"parentPublication": {
"id": "proceedings/compsac/2016/8845/1",
"title": "2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esiat/2009/3682/3/3682c310",
"title": "An Optimization Load Balancing Algorithm Design in Massive Storage System",
"doi": null,
"abstractUrl": "/proceedings-article/esiat/2009/3682c310/12OmNAgoV6O",
"parentPublication": {
"id": "proceedings/esiat/2009/3682/3",
"title": "Environmental Science and Information Application Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fas*w/2017/6558/0/08064133",
"title": "Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage",
"doi": null,
"abstractUrl": "/proceedings-article/fas*w/2017/08064133/12OmNCd2rGp",
"parentPublication": {
"id": "proceedings/fas*w/2017/6558/0",
"title": "2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icss/2010/4017/0/4017a257",
"title": "LBVS: A Load Balancing Strategy for Virtual Storage",
"doi": null,
"abstractUrl": "/proceedings-article/icss/2010/4017a257/12OmNxETadM",
"parentPublication": {
"id": "proceedings/icss/2010/4017/0",
"title": "Service Sciences, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc/2016/4297/0/07828369",
"title": "A Load-Balancing Data Caching Scheme in Multi-tiered Storage Systems",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc/2016/07828369/12OmNyQYt5O",
"parentPublication": {
"id": "proceedings/hpcc/2016/4297/0",
"title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09706326",
"title": "Reinforcement Learning for Load-Balanced Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09706326/1AO2j4ICNLa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2022/8106/0/810600a595",
"title": "RLRP: High-Efficient Data Placement with Reinforcement Learning for Modern Distributed Storage Systems",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2022/810600a595/1F1W7jK4LWo",
"parentPublication": {
"id": "proceedings/ipdps/2022/8106/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2022/4627/0/462700a195",
"title": "Traffic load balancing optimization of Ceph edge node storage platform",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2022/462700a195/1M9q37ct452",
"parentPublication": {
"id": "proceedings/cis/2022/4627/0",
"title": "2022 18th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ic2e/2019/0218/0/021800a034",
"title": "Towards Self-Managing Cloud Storage with Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ic2e/2019/021800a034/1ckrSYvndp6",
"parentPublication": {
"id": "proceedings/ic2e/2019/0218/0",
"title": "2019 IEEE International Conference on Cloud Engineering (IC2E)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccgrid/2021/9586/0/958600a186",
"title": "Machine Learning for Load Balancing in Cloud Datacenters",
"doi": null,
"abstractUrl": "/proceedings-article/ccgrid/2021/958600a186/1vK0uRHds5O",
"parentPublication": {
"id": "proceedings/ccgrid/2021/9586/0",
"title": "2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1cTJ2NyGFYA",
"title": "2019 IEEE 12th International Conference on Cloud Computing (CLOUD)",
"acronym": "cloud",
"groupId": "1002911",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1cTJ4x4GABG",
"doi": "10.1109/CLOUD.2019.00061",
"title": "Horizontal and Vertical Scaling of Container-Based Applications Using Reinforcement Learning",
"normalizedTitle": "Horizontal and Vertical Scaling of Container-Based Applications Using Reinforcement Learning",
"abstract": "Software containers are changing the way distributed applications are executed and managed on cloud computing resources. Interestingly, containers offer the possibility of handling workload fluctuations by exploiting both horizontal and vertical elasticity \"on the fly\". However, most of the existing control policies consider horizontal and vertical scaling as two disjointed control knobs. In this paper, we propose Reinforcement Learning (RL) solutions for controlling the horizontal and vertical elasticity of container-based applications with the goal to increase the flexibility to cope with varying workloads. Although RL represents an interesting approach, it may suffer from a possible long learning phase, especially when nothing about the system is known a-priori. To speed up the learning process and identify better adaptation policies, we propose RL solutions that exploit different degrees of knowledge about the system dynamics (i.e., Q-learning, Dyna-Q, and Model-based). We integrate the proposed policies in Elastic Docker Swarm, our extension that introduces self-adaptation capabilities in the container orchestration tool Docker Swarm. We demonstrate the effectiveness and flexibility of model-based RL policies through simulations and prototype-based experiments.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Software containers are changing the way distributed applications are executed and managed on cloud computing resources. Interestingly, containers offer the possibility of handling workload fluctuations by exploiting both horizontal and vertical elasticity \"on the fly\". However, most of the existing control policies consider horizontal and vertical scaling as two disjointed control knobs. In this paper, we propose Reinforcement Learning (RL) solutions for controlling the horizontal and vertical elasticity of container-based applications with the goal to increase the flexibility to cope with varying workloads. Although RL represents an interesting approach, it may suffer from a possible long learning phase, especially when nothing about the system is known a-priori. To speed up the learning process and identify better adaptation policies, we propose RL solutions that exploit different degrees of knowledge about the system dynamics (i.e., Q-learning, Dyna-Q, and Model-based). We integrate the proposed policies in Elastic Docker Swarm, our extension that introduces self-adaptation capabilities in the container orchestration tool Docker Swarm. We demonstrate the effectiveness and flexibility of model-based RL policies through simulations and prototype-based experiments.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Software containers are changing the way distributed applications are executed and managed on cloud computing resources. Interestingly, containers offer the possibility of handling workload fluctuations by exploiting both horizontal and vertical elasticity \"on the fly\". However, most of the existing control policies consider horizontal and vertical scaling as two disjointed control knobs. In this paper, we propose Reinforcement Learning (RL) solutions for controlling the horizontal and vertical elasticity of container-based applications with the goal to increase the flexibility to cope with varying workloads. Although RL represents an interesting approach, it may suffer from a possible long learning phase, especially when nothing about the system is known a-priori. To speed up the learning process and identify better adaptation policies, we propose RL solutions that exploit different degrees of knowledge about the system dynamics (i.e., Q-learning, Dyna-Q, and Model-based). We integrate the proposed policies in Elastic Docker Swarm, our extension that introduces self-adaptation capabilities in the container orchestration tool Docker Swarm. We demonstrate the effectiveness and flexibility of model-based RL policies through simulations and prototype-based experiments.",
"fno": "270500a329",
"keywords": [
"Cloud Computing",
"Learning Artificial Intelligence",
"Vertical Scaling",
"Control Knobs",
"Vertical Elasticity",
"Container Based Applications",
"Varying Workloads",
"Learning Process",
"Adaptation Policies",
"RL Solutions",
"Q Learning",
"Elastic Docker Swarm",
"Model Based RL Policies",
"Prototype Based Experiments",
"Reinforcement Learning",
"Software Containers",
"Way Distributed Applications",
"Cloud Computing Resources",
"Workload Fluctuations",
"Long Learning Phase",
"Control Policies",
"Container Orchestration Tool",
"Horizontal Scaling",
"Horizontal Elasticity",
"Elasticity",
"Containers",
"Adaptation Models",
"Cloud Computing",
"Computational Modeling",
"System Dynamics",
"Tools",
"Reinforcement Learning Elasticity Self Adaptation Container Docker"
],
"authors": [
{
"affiliation": "University of Rome Tor Vergata",
"fullName": "Fabiana Rossi",
"givenName": "Fabiana",
"surname": "Rossi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Rome Tor Vergata",
"fullName": "Matteo Nardelli",
"givenName": "Matteo",
"surname": "Nardelli",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Rome Tor Vergata",
"fullName": "Valeria Cardellini",
"givenName": "Valeria",
"surname": "Cardellini",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cloud",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-07-01T00:00:00",
"pubType": "proceedings",
"pages": "329-338",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-2705-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "270500a470",
"articleId": "1cTJ4GDEDks",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "270500a478",
"articleId": "1cTJ3pgMAo0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cloud/2017/1993/0/1993a472",
"title": "Autonomic Vertical Elasticity of Docker Containers with ELASTICDOCKER",
"doi": null,
"abstractUrl": "/proceedings-article/cloud/2017/1993a472/12OmNBgQFT5",
"parentPublication": {
"id": "proceedings/cloud/2017/1993/0",
"title": "2017 IEEE 10th International Conference on Cloud Computing (CLOUD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisa/2014/4443/0/06847479",
"title": "Vertical/Horizontal Resource Scaling Mechanism for Federated Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/icisa/2014/06847479/12OmNCctfka",
"parentPublication": {
"id": "proceedings/icisa/2014/4443/0",
"title": "2014 International Conference on Information Science and Applications (ICISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ozchi/1998/9206/0/92060328",
"title": "HCI Performance Evaluation of Horizontal and Vertical List Controls",
"doi": null,
"abstractUrl": "/proceedings-article/ozchi/1998/92060328/12OmNzC5SMp",
"parentPublication": {
"id": "proceedings/ozchi/1998/9206/0",
"title": "Computer-Human Interaction, Australasian Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccac/2017/1939/0/1939a184",
"title": "Horizontal and Vertical Self-Adaptive Cloud Controller with Reward Optimization for Resource Allocation",
"doi": null,
"abstractUrl": "/proceedings-article/iccac/2017/1939a184/12OmNzUPpk1",
"parentPublication": {
"id": "proceedings/iccac/2017/1939/0",
"title": "2017 International Conference on Cloud and Autonomic Computing (ICCAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nas/2011/4509/0/4509a102",
"title": "A Comprehensive Study on RAID-6 Codes: Horizontal vs. Vertical",
"doi": null,
"abstractUrl": "/proceedings-article/nas/2011/4509a102/12OmNzn3905",
"parentPublication": {
"id": "proceedings/nas/2011/4509/0",
"title": "2011 IEEE Sixth International Conference on Networking, Architecture, and Storage",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/cc/5555/01/09744560",
"title": "Dynamic Multi-metric Thresholds for Scaling Applications Using Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/cc/5555/01/09744560/1C8BwmMhvX2",
"parentPublication": {
"id": "trans/cc",
"title": "IEEE Transactions on Cloud Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2019/2999/0/08969607",
"title": "Elastic Deployment of Software Containers in Geo-Distributed Computing Environments",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2019/08969607/1h0JNI2BdPW",
"parentPublication": {
"id": "proceedings/iscc/2019/2999/0",
"title": "2019 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccea/2020/5904/0/09103775",
"title": "The Change Law of Horizontal and Vertical Loss",
"doi": null,
"abstractUrl": "/proceedings-article/iccea/2020/09103775/1kesF1gxCyk",
"parentPublication": {
"id": "proceedings/iccea/2020/5904/0",
"title": "2020 International Conference on Computer Engineering and Application (ICCEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsos/2020/7277/0/09196461",
"title": "Hierarchical Scaling of Microservices in Kubernetes",
"doi": null,
"abstractUrl": "/proceedings-article/acsos/2020/09196461/1n914zuEtQQ",
"parentPublication": {
"id": "proceedings/acsos/2020/7277/0",
"title": "2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ucc/2020/2394/0/239400a196",
"title": "HoloScale: horizontal and vertical scaling of cloud resources",
"doi": null,
"abstractUrl": "/proceedings-article/ucc/2020/239400a196/1pZ12hYp9Fm",
"parentPublication": {
"id": "proceedings/ucc/2020/2394/0",
"title": "2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1kmoNreKiTm",
"title": "2020 IEEE Pacific Visualization Symposium (PacificVis)",
"acronym": "pacificvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1kuHlZvEurK",
"doi": "10.1109/PacificVis48177.2020.1029",
"title": "LBVis: Interactive Dynamic Load Balancing Visualization for Parallel Particle Tracing",
"normalizedTitle": "LBVis: Interactive Dynamic Load Balancing Visualization for Parallel Particle Tracing",
"abstract": "We propose an interactive visual analytical approach to exploring and diagnosing the dynamic load balance (data and task partition) process of parallel particle tracing in flow visualization. To understand the complex nature of the parallel processes, it is necessary to integrate the information of the behaviors and patterns of the computing processes, data changes and movements, task status and exchanges, and gain the insight of the relationships among them. In our proposed approach, the data and task behaviors are visualized through a graph with a fine-designed layout, in which node glyphs are dedicated to showing the status of processes and the links represent the data or task transfer between different computation rounds and processes. User interactions are supported to facilitate the exploration of performance analysis. We provide a case study to demonstrate that the proposed approach enables users to identify the bottlenecks during this process, and thus help optimize the related algorithms.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We propose an interactive visual analytical approach to exploring and diagnosing the dynamic load balance (data and task partition) process of parallel particle tracing in flow visualization. To understand the complex nature of the parallel processes, it is necessary to integrate the information of the behaviors and patterns of the computing processes, data changes and movements, task status and exchanges, and gain the insight of the relationships among them. In our proposed approach, the data and task behaviors are visualized through a graph with a fine-designed layout, in which node glyphs are dedicated to showing the status of processes and the links represent the data or task transfer between different computation rounds and processes. User interactions are supported to facilitate the exploration of performance analysis. We provide a case study to demonstrate that the proposed approach enables users to identify the bottlenecks during this process, and thus help optimize the related algorithms.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We propose an interactive visual analytical approach to exploring and diagnosing the dynamic load balance (data and task partition) process of parallel particle tracing in flow visualization. To understand the complex nature of the parallel processes, it is necessary to integrate the information of the behaviors and patterns of the computing processes, data changes and movements, task status and exchanges, and gain the insight of the relationships among them. In our proposed approach, the data and task behaviors are visualized through a graph with a fine-designed layout, in which node glyphs are dedicated to showing the status of processes and the links represent the data or task transfer between different computation rounds and processes. User interactions are supported to facilitate the exploration of performance analysis. We provide a case study to demonstrate that the proposed approach enables users to identify the bottlenecks during this process, and thus help optimize the related algorithms.",
"fno": "09086288",
"keywords": [
"Computational Fluid Dynamics",
"Data Analysis",
"Data Visualisation",
"Flow Visualisation",
"Interactive Systems",
"Parallel Processing",
"Resource Allocation",
"Interactive Dynamic Load Balancing Visualization",
"Parallel Particle Tracing",
"Interactive Visual Analytical Approach",
"Task Partition",
"Flow Visualization",
"Complex Nature",
"Parallel Processes",
"Computing Processes",
"Data Changes",
"Task Status",
"Task Behaviors",
"User Interactions",
"Computation Rounds",
"Visualization",
"Scalability",
"Heuristic Algorithms",
"Layout",
"Data Visualization",
"Load Management",
"Performance Analysis",
"Parallel Particle Tracing",
"Load Balancing",
"Performance Analysis",
"Visual Analytics"
],
"authors": [
{
"affiliation": "Peking University,Key Laboratory of Machine Perception (Ministry of Education), and School of EECS,Beijing,China",
"fullName": "Jiang Zhang",
"givenName": "Jiang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peking University,Key Laboratory of Machine Perception (Ministry of Education), and School of EECS,Beijing,China",
"fullName": "Changhe Yang",
"givenName": "Changhe",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peking University,Key Laboratory of Machine Perception (Ministry of Education), and School of EECS,Beijing,China",
"fullName": "Yanda Li",
"givenName": "Yanda",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peking University,Key Laboratory of Machine Perception (Ministry of Education), and School of EECS,Beijing,China",
"fullName": "Li Chen",
"givenName": "Li",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Peking University,Key Laboratory of Machine Perception (Ministry of Education), and School of EECS,Beijing,China",
"fullName": "Xiaoru Yuan",
"givenName": "Xiaoru",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pacificvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "91-95",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-5697-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09086223",
"articleId": "1kuHmCb4z2E",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09086231",
"articleId": "1kuHnrbtBbq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2018/1424/0/142401a086",
"title": "Dynamic Data Repartitioning for Load-Balanced Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2018/142401a086/12OmNANBZoz",
"parentPublication": {
"id": "proceedings/pacificvis/2018/1424/0",
"title": "2018 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2016/3682/0/3682b073",
"title": "Mitigating Processor Variation through Dynamic Load Balancing",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2016/3682b073/12OmNvT2oNe",
"parentPublication": {
"id": "proceedings/ipdpsw/2016/3682/0",
"title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itcc/2003/1916/0/19160598",
"title": "A Dynamic Load-Balancing Approach for Efficient Remote Interactive Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/itcc/2003/19160598/12OmNvkYx9Y",
"parentPublication": {
"id": "proceedings/itcc/2003/1916/0",
"title": "Information Technology: Coding and Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2016/3682/0/3682a702",
"title": "Heterogeneous CAF-Based Load Balancing on Intel Xeon Phi",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2016/3682a702/12OmNwvDQsX",
"parentPublication": {
"id": "proceedings/ipdpsw/2016/3682/0",
"title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grid/2010/9347/0/05697946",
"title": "Conflict-minimizing dynamic load balancing for P2P desktop Grid",
"doi": null,
"abstractUrl": "/proceedings-article/grid/2010/05697946/12OmNxvO07o",
"parentPublication": {
"id": "proceedings/grid/2010/9347/0",
"title": "2010 11th IEEE/ACM International Conference on Grid Computing (GRID 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2012/4676/0/4676b661",
"title": "Dynamic Load Balancing for Unstructured Meshes on Space-Filling Curves",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2012/4676b661/12OmNzC5SED",
"parentPublication": {
"id": "proceedings/ipdpsw/2012/4676/0",
"title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08017633",
"title": "Dynamic Load Balancing Based on Constrained K-D Tree Decomposition for Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08017633/13rRUwgQpqN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2006/11/t1410",
"title": "Design and Performance Evaluation of Queue-and-Rate-Adjustment Dynamic Load Balancing Policies for Distributed Networks",
"doi": null,
"abstractUrl": "/journal/tc/2006/11/t1410/13rRUxlgxSz",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09706326",
"title": "Reinforcement Learning for Load-Balanced Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09706326/1AO2j4ICNLa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ainit/2021/1296/0/129600a122",
"title": "Nginx-Based Combined Dynamic and Static Load Balancing Algorithm Research",
"doi": null,
"abstractUrl": "/proceedings-article/ainit/2021/129600a122/1BzWnwkwgUM",
"parentPublication": {
"id": "proceedings/ainit/2021/1296/0",
"title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lRm11FR9As",
"title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)",
"acronym": "dsn-w",
"groupId": "1800101",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1lRm2fSRYMo",
"doi": "10.1109/DSN-W50199.2020.00013",
"title": "Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information",
"normalizedTitle": "Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information",
"abstract": "Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to maliciously-crafted adversarial samples. In this work, we show how such samples can be generalised from White-box and Grey-box attacks to a strong Black-box case, where the attacker has no knowledge of the agents, their training parameters or their training methods. We use sequence-to-sequence models to predict a single action or a sequence of future actions that a trained agent will make. First, we show that our approximation model, based on time-series information from the agent, consistently predicts RL agents' future actions with high accuracy in a Black-box setup on a wide range of games and RL algorithms. Second, we find that although adversarial samples are transferable from the sequence-to-sequence model to our RL agents, they often outperform Random Gaussian Noise only marginally. Third, we propose a novel use for adversarial samples in Black-box attacks of RL agents: they can be used to trigger a trained agent to misbehave after a specific time delay. This potentially enables an attacker to use devices controlled by RL agents as time bombs.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to maliciously-crafted adversarial samples. In this work, we show how such samples can be generalised from White-box and Grey-box attacks to a strong Black-box case, where the attacker has no knowledge of the agents, their training parameters or their training methods. We use sequence-to-sequence models to predict a single action or a sequence of future actions that a trained agent will make. First, we show that our approximation model, based on time-series information from the agent, consistently predicts RL agents' future actions with high accuracy in a Black-box setup on a wide range of games and RL algorithms. Second, we find that although adversarial samples are transferable from the sequence-to-sequence model to our RL agents, they often outperform Random Gaussian Noise only marginally. Third, we propose a novel use for adversarial samples in Black-box attacks of RL agents: they can be used to trigger a trained agent to misbehave after a specific time delay. This potentially enables an attacker to use devices controlled by RL agents as time bombs.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Recent research on reinforcement learning (RL) has suggested that trained agents are vulnerable to maliciously-crafted adversarial samples. In this work, we show how such samples can be generalised from White-box and Grey-box attacks to a strong Black-box case, where the attacker has no knowledge of the agents, their training parameters or their training methods. We use sequence-to-sequence models to predict a single action or a sequence of future actions that a trained agent will make. First, we show that our approximation model, based on time-series information from the agent, consistently predicts RL agents' future actions with high accuracy in a Black-box setup on a wide range of games and RL algorithms. Second, we find that although adversarial samples are transferable from the sequence-to-sequence model to our RL agents, they often outperform Random Gaussian Noise only marginally. Third, we propose a novel use for adversarial samples in Black-box attacks of RL agents: they can be used to trigger a trained agent to misbehave after a specific time delay. This potentially enables an attacker to use devices controlled by RL agents as time bombs.",
"fno": "09151835",
"keywords": [
"Gaussian Noise",
"Learning Artificial Intelligence",
"Time Series",
"RL Agents",
"Blackbox Attacks",
"Reinforcement Learning Agents",
"Approximated Temporal Information",
"Maliciously Crafted Adversarial Samples",
"Sequence To Sequence Model",
"Time Series Information",
"Black Box Attacks",
"RL Algorithms",
"Grey Box Attacks",
"White Box Attacks",
"Random Gaussian Noise",
"Training",
"Games",
"Perturbation Methods",
"Predictive Models",
"Task Analysis",
"Learning Artificial Intelligence",
"Approximation Algorithms",
"Reinforcement Learning",
"Adversarial Machine Learning"
],
"authors": [
{
"affiliation": "University of Cambridge",
"fullName": "Yiren Zhao",
"givenName": "Yiren",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Cambridge",
"fullName": "Ilia Shumailov",
"givenName": "Ilia",
"surname": "Shumailov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Bristol",
"fullName": "Han Cui",
"givenName": "Han",
"surname": "Cui",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shenzhen Institutes of Advanced Technology",
"fullName": "Xitong Gao",
"givenName": "Xitong",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Cambridge",
"fullName": "Robert Mullins",
"givenName": "Robert",
"surname": "Mullins",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Cambridge",
"fullName": "Ross Anderson",
"givenName": "Ross",
"surname": "Anderson",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dsn-w",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "16-24",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7263-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09151460",
"articleId": "1lRm1DTaWiY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09151812",
"articleId": "1lRm1sfUcN2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ictai/2012/0227/1/06495112",
"title": "Efficient Reinforcement Learning in Adversarial Games",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495112/12OmNCulYka",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032c970",
"title": "Learning Cooperative Visual Dialog Agents with Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c970/12OmNx19k18",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2014/8065/0/8065a115",
"title": "Evolving the Behavior of Autonomous Agents in Strategic Combat Scenarios via SARSA Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2014/8065a115/12OmNxisQXg",
"parentPublication": {
"id": "proceedings/sbgames/2014/8065/0",
"title": "2014 Brazilian Symposium on Computer Games and Digital Entertainment (SBGAMES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlds/2017/3446/0/3446a098",
"title": "Modeling Decisions in Games Using Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/mlds/2017/3446a098/12OmNyxXlvK",
"parentPublication": {
"id": "proceedings/mlds/2017/3446/0",
"title": "2017 International Conference on Machine learning and Data Science (MLDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2016/3566/0/07839568",
"title": "Towards Knowledge Transfer in Deep Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2016/07839568/12OmNzA6GKP",
"parentPublication": {
"id": "proceedings/bracis/2016/3566/0",
"title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2012/04/06263288",
"title": "Bayesian-game-based Fuzzy Reinforcement Learning Control for Decentralized POMDPs",
"doi": null,
"abstractUrl": "/journal/ci/2012/04/06263288/13rRUwcS1v4",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2022/2335/0/233500a111",
"title": "Why? Why not? When? Visual Explanations of Agent Behaviour in Reinforcement Learning",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2022/233500a111/1E2wfmNqkPm",
"parentPublication": {
"id": "proceedings/pacificvis/2022/2335/0",
"title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ica/2019/4026/0/08929151",
"title": "Cooperative Behavior by Multi-agent Reinforcement Learning with Abstractive Communication",
"doi": null,
"abstractUrl": "/proceedings-article/ica/2019/08929151/1fJRS1vUkDK",
"parentPublication": {
"id": "proceedings/ica/2019/4026/0",
"title": "2019 IEEE International Conference on Agents (ICA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icssa/2018/9210/0/921000a081",
"title": "Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk)",
"doi": null,
"abstractUrl": "/proceedings-article/icssa/2018/921000a081/1jPbGpbHiak",
"parentPublication": {
"id": "proceedings/icssa/2018/9210/0",
"title": "2018 International Conference on Software Security and Assurance (ICSSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/12/09645253",
"title": "Temporal-Spatial Causal Interpretations for Vision-Based Reinforcement Learning",
"doi": null,
"abstractUrl": "/journal/tp/2022/12/09645253/1zc6yjofBSM",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyugyPC",
"title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on",
"acronym": "haptics",
"groupId": "1000312",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvjyxRX",
"doi": "10.1109/HAPTIC.2004.1287205",
"title": "Haptic Simulation of Linear Elastic Media with Fluid Pockets",
"normalizedTitle": "Haptic Simulation of Linear Elastic Media with Fluid Pockets",
"abstract": "A fast technique for simulating fluid pockets enclosed in an elastic body has been developed using the Finite Element Method. By treating fluid pressure as a force boundary condition, the relationship between the volume and pressure of a fluid cavity can be enforced with an iterative solver. This computational approach has been shown to agree with experimental data taken from a gelatin phantom that contains a small fluid pocket. Combining linear methods and condensation techniques with this iterative solver, fast simulation of elastic bodies that include fluid pockets can be achieved. For example, an extension of a two dimensional needle insertion simulation can be carried out at 512Hz for a 24 node incompressible fluid pocket.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A fast technique for simulating fluid pockets enclosed in an elastic body has been developed using the Finite Element Method. By treating fluid pressure as a force boundary condition, the relationship between the volume and pressure of a fluid cavity can be enforced with an iterative solver. This computational approach has been shown to agree with experimental data taken from a gelatin phantom that contains a small fluid pocket. Combining linear methods and condensation techniques with this iterative solver, fast simulation of elastic bodies that include fluid pockets can be achieved. For example, an extension of a two dimensional needle insertion simulation can be carried out at 512Hz for a 24 node incompressible fluid pocket.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A fast technique for simulating fluid pockets enclosed in an elastic body has been developed using the Finite Element Method. By treating fluid pressure as a force boundary condition, the relationship between the volume and pressure of a fluid cavity can be enforced with an iterative solver. This computational approach has been shown to agree with experimental data taken from a gelatin phantom that contains a small fluid pocket. Combining linear methods and condensation techniques with this iterative solver, fast simulation of elastic bodies that include fluid pockets can be achieved. For example, an extension of a two dimensional needle insertion simulation can be carried out at 512Hz for a 24 node incompressible fluid pocket.",
"fno": "21120266",
"keywords": [],
"authors": [
{
"affiliation": "University of British Columbia",
"fullName": "Andrew H. Gosline",
"givenName": "Andrew H.",
"surname": "Gosline",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of British Columbia",
"fullName": "Septimiu E. Salcudean",
"givenName": "Septimiu E.",
"surname": "Salcudean",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of British Columbia",
"fullName": "Joseph Yan",
"givenName": "Joseph",
"surname": "Yan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "haptics",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-03-01T00:00:00",
"pubType": "proceedings",
"pages": "266-271",
"year": "2004",
"issn": "Pending",
"isbn": "0-7695-2112-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21120258",
"articleId": "12OmNwHhoWI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21120272",
"articleId": "12OmNrIJqsc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sbgames/2009/3963/0/3963a032",
"title": "GPU Based Fluid Animation over Elastic Surface Models",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2009/3963a032/12OmNvlPkwB",
"parentPublication": {
"id": "proceedings/sbgames/2009/3963/0",
"title": "2009 VIII Brazilian Symposium on Games and Digital Entertainment",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicic/2007/2882/0/28820540",
"title": "Deformation of an Elastic Thin Plate in Lateral Flow of Fluid by Using of ULE Method",
"doi": null,
"abstractUrl": "/proceedings-article/icicic/2007/28820540/12OmNwNOaPx",
"parentPublication": {
"id": "proceedings/icicic/2007/2882/0",
"title": "2007 Second International Conference on Innovative Computing, Information and Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccie/2010/4026/2/4026b107",
"title": "Finite Element Analysis on Frequency Characteristic of Elastic Tube Containing Fluid Flow",
"doi": null,
"abstractUrl": "/proceedings-article/ccie/2010/4026b107/12OmNwcl7Ks",
"parentPublication": {
"id": "proceedings/ccie/2010/4026/2",
"title": "Computing, Control and Industrial Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmens/2005/2398/0/01540786",
"title": "Non-linear elastic deformations of multi-phase fluid systems",
"doi": null,
"abstractUrl": "/proceedings-article/icmens/2005/01540786/12OmNzBOikb",
"parentPublication": {
"id": "proceedings/icmens/2005/2398/0",
"title": "Proceedings. 2005 International Conference on MEMS, NANO and Smart Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccd/2016/5142/0/07753285",
"title": "Fluid Pipelines: Elastic circuitry meets Out-of-Order execution",
"doi": null,
"abstractUrl": "/proceedings-article/iccd/2016/07753285/12OmNzkuKz6",
"parentPublication": {
"id": "proceedings/iccd/2016/5142/0",
"title": "2016 IEEE 34th International Conference on Computer Design (ICCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccms/2010/3941/1/3941a290",
"title": "A Particle-Based Unified Model for Non-Newtonian Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccms/2010/3941a290/12OmNzzfToR",
"parentPublication": {
"id": "proceedings/iccms/2010/3941/3",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2004/03/c3038",
"title": "Simulation of Swimming Organisms: Coupling Internal Mechanics with External Fluid Dynamics",
"doi": null,
"abstractUrl": "/magazine/cs/2004/03/c3038/13rRUy3gmVR",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09707648",
"title": "Impulse Fluid Simulation",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09707648/1APlBguxdSw",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300c182",
"title": "Fluid: Dataset Abstraction and Elastic Acceleration for Cloud-native Deep Learning Training Jobs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300c182/1FwFoGfzlU4",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/10/09366379",
"title": "Incompressibility Enforcement for Multiple-Fluid SPH Using Deformation Gradient",
"doi": null,
"abstractUrl": "/journal/tg/2022/10/09366379/1rCc9A58Mec",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1A3j2X2ovPG",
"title": "2021 IEEE International Symposium on Multimedia (ISM)",
"acronym": "ism",
"groupId": "1001094",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1A3j8OOLHa0",
"doi": "10.1109/ISM52913.2021.00049",
"title": "Edge-Level Explanations for Graph Neural Networks by Extending Explainability Methods for Convolutional Neural Networks",
"normalizedTitle": "Edge-Level Explanations for Graph Neural Networks by Extending Explainability Methods for Convolutional Neural Networks",
"abstract": "Graph Neural Networks (GNNs) are deep learning models that take graph data as inputs, and they are applied to various tasks such as traffic prediction and molecular property prediction. However, owing to the complexity of the GNNs, it has been difficult to analyze which parts of inputs affect the GNN model’s outputs. In this study, we extend explainability methods for Convolutional Neural Networks (CNNs), such as Local Interpretable Model-Agnostic Explanations (LIME), Gradient-Based Saliency Maps, and Gradient-Weighted Class Activation Mapping (Grad-CAM) to GNNs, and predict which edges in the input graphs are important for GNN decisions. The experimental results indicate that the LIME-based approach is the most efficient explainability method for multiple tasks in the real-world situation, outperforming even the state-of-the-art method in GNN explainability.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph Neural Networks (GNNs) are deep learning models that take graph data as inputs, and they are applied to various tasks such as traffic prediction and molecular property prediction. However, owing to the complexity of the GNNs, it has been difficult to analyze which parts of inputs affect the GNN model’s outputs. In this study, we extend explainability methods for Convolutional Neural Networks (CNNs), such as Local Interpretable Model-Agnostic Explanations (LIME), Gradient-Based Saliency Maps, and Gradient-Weighted Class Activation Mapping (Grad-CAM) to GNNs, and predict which edges in the input graphs are important for GNN decisions. The experimental results indicate that the LIME-based approach is the most efficient explainability method for multiple tasks in the real-world situation, outperforming even the state-of-the-art method in GNN explainability.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph Neural Networks (GNNs) are deep learning models that take graph data as inputs, and they are applied to various tasks such as traffic prediction and molecular property prediction. However, owing to the complexity of the GNNs, it has been difficult to analyze which parts of inputs affect the GNN model’s outputs. In this study, we extend explainability methods for Convolutional Neural Networks (CNNs), such as Local Interpretable Model-Agnostic Explanations (LIME), Gradient-Based Saliency Maps, and Gradient-Weighted Class Activation Mapping (Grad-CAM) to GNNs, and predict which edges in the input graphs are important for GNN decisions. The experimental results indicate that the LIME-based approach is the most efficient explainability method for multiple tasks in the real-world situation, outperforming even the state-of-the-art method in GNN explainability.",
"fno": "373400a249",
"keywords": [
"Convolutional Neural Nets",
"Deep Learning Artificial Intelligence",
"Distributed Processing",
"Explanation",
"Graph Theory",
"GNN",
"Explainability Methods",
"Convolutional Neural Networks",
"Edge Level Explanations",
"Graph Neural Networks",
"Deep Learning",
"Graph Data",
"CNN",
"LIME",
"Deep Learning",
"Analytical Models",
"Predictive Models",
"Graph Neural Networks",
"Data Models",
"Computational Efficiency",
"Complexity Theory",
"Graph Neural Networks",
"Explainability",
"LIME",
"Saliency Maps",
"Grad CAM"
],
"authors": [
{
"affiliation": "The University of Tokyo,Department of Information and Communication Engineering,Tokyo,Japan",
"fullName": "Tetsu Kasanishi",
"givenName": "Tetsu",
"surname": "Kasanishi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Tokyo,Department of Information and Communication Engineering,Tokyo,Japan",
"fullName": "Xueting Wang",
"givenName": "Xueting",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The University of Tokyo,Department of Information and Communication Engineering,Tokyo,Japan",
"fullName": "Toshihiko Yamasaki",
"givenName": "Toshihiko",
"surname": "Yamasaki",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ism",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-11-01T00:00:00",
"pubType": "proceedings",
"pages": "249-252",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-3734-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "373400a245",
"articleId": "1A3j767inGo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "373400a253",
"articleId": "1A3j5SOLJni",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tg/2023/06/09705076",
"title": "<italic>GNNLens</italic>: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09705076/1AIIbJW1goU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2021/2398/0/239800a131",
"title": "GNES: Learning to Explain Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2021/239800a131/1Aqxl7xyVdm",
"parentPublication": {
"id": "proceedings/icdm/2021/2398/0",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/02/09763330",
"title": "Reinforced Causal Explainer for Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tp/2023/02/09763330/1CT4UHcpbWM",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tps-isa/2021/1623/0/162300a011",
"title": "Membership Inference Attack on Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/tps-isa/2021/162300a011/1CzeyRu16tG",
"parentPublication": {
"id": "proceedings/tps-isa/2021/1623/0",
"title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09875989",
"title": "Explainability in Graph Neural Networks: A Taxonomic Survey",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09875989/1GqajxgkWcM",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/06/09980390",
"title": "Differentially Private Graph Neural Networks for Whole-Graph Classification",
"doi": null,
"abstractUrl": "/journal/tp/2023/06/09980390/1J2T4VwG0c8",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995652",
"title": "Reinforced Sample Selection for Graph Neural Networks Transfer Learning",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995652/1JC25iqy1ig",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020943",
"title": "A Survey of Explainable Graph Neural Networks for Cyber Malware Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020943/1KfQWB5YvC0",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/01/09415142",
"title": "Higher-Order Attribute-Enhancing Heterogeneous Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tk/2023/01/09415142/1t2icqiqsak",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/11/09547794",
"title": "Higher-Order Explanations of Graph Neural Networks via Relevant Walks",
"doi": null,
"abstractUrl": "/journal/tp/2022/11/09547794/1x9Tw52fo0o",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1AjTlyIlM6Q",
"title": "2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)",
"acronym": "ipccc",
"groupId": "1000548",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1AjTn7cgpgs",
"doi": "10.1109/IPCCC51483.2021.9679362",
"title": "Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs",
"normalizedTitle": "Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs",
"abstract": "With the increasing adoption of graph neural networks (GNNs) in the graph-based deep learning community, various graph programming frameworks and models have been developed to improve the productivity of GNNs. The current GNN frameworks choose GPU as an essential tool to accelerate GNN training. However, it is still challenging to train GNNs on large graphs with limited GPU memory. Unlike traditional neural networks, generating mini-batch data by sampling in GNNs requires some complicated tasks such as traversing the graph to select neighboring nodes and gathering their features. This process takes up most of the training and we find the main bottleneck comes from transferring nodes features from CPU to GPU through limited bandwidth. In this paper, We propose a method Reusing Batch Data for the problem of data transmission. This method utilizes the similarity between adjacent mini-batches to reduce repeated data transmission from CPU to GPU. Furthermore, to reduce the overhead introduced by this method, we design a fast algorithm based on GPU to detect repeated nodes’ data and achieve shorter additional computation time. Evaluations on three representative GNN models show that our method can reduce transmission time by up to 60% and speed the end-to-end GNN training by up to 1.79× over the state-ofthe-art baselines. Besides, Reusing Batch Data can effectively save GPU memory footprint by about 19% to 40% while still reducing the training time compared to the static cache strategy.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the increasing adoption of graph neural networks (GNNs) in the graph-based deep learning community, various graph programming frameworks and models have been developed to improve the productivity of GNNs. The current GNN frameworks choose GPU as an essential tool to accelerate GNN training. However, it is still challenging to train GNNs on large graphs with limited GPU memory. Unlike traditional neural networks, generating mini-batch data by sampling in GNNs requires some complicated tasks such as traversing the graph to select neighboring nodes and gathering their features. This process takes up most of the training and we find the main bottleneck comes from transferring nodes features from CPU to GPU through limited bandwidth. In this paper, We propose a method Reusing Batch Data for the problem of data transmission. This method utilizes the similarity between adjacent mini-batches to reduce repeated data transmission from CPU to GPU. Furthermore, to reduce the overhead introduced by this method, we design a fast algorithm based on GPU to detect repeated nodes’ data and achieve shorter additional computation time. Evaluations on three representative GNN models show that our method can reduce transmission time by up to 60% and speed the end-to-end GNN training by up to 1.79× over the state-ofthe-art baselines. Besides, Reusing Batch Data can effectively save GPU memory footprint by about 19% to 40% while still reducing the training time compared to the static cache strategy.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the increasing adoption of graph neural networks (GNNs) in the graph-based deep learning community, various graph programming frameworks and models have been developed to improve the productivity of GNNs. The current GNN frameworks choose GPU as an essential tool to accelerate GNN training. However, it is still challenging to train GNNs on large graphs with limited GPU memory. Unlike traditional neural networks, generating mini-batch data by sampling in GNNs requires some complicated tasks such as traversing the graph to select neighboring nodes and gathering their features. This process takes up most of the training and we find the main bottleneck comes from transferring nodes features from CPU to GPU through limited bandwidth. In this paper, We propose a method Reusing Batch Data for the problem of data transmission. This method utilizes the similarity between adjacent mini-batches to reduce repeated data transmission from CPU to GPU. Furthermore, to reduce the overhead introduced by this method, we design a fast algorithm based on GPU to detect repeated nodes’ data and achieve shorter additional computation time. Evaluations on three representative GNN models show that our method can reduce transmission time by up to 60% and speed the end-to-end GNN training by up to 1.79× over the state-ofthe-art baselines. Besides, Reusing Batch Data can effectively save GPU memory footprint by about 19% to 40% while still reducing the training time compared to the static cache strategy.",
"fno": "09679362",
"keywords": [
"Circuit Analysis Computing",
"Graph Theory",
"Graphics Processing Units",
"Learning Artificial Intelligence",
"Neural Nets",
"Accelerate Graph Neural Network Training",
"Graph Based Deep Learning Community",
"Graph Programming Frameworks",
"Current GNN Frameworks",
"Traditional Neural Networks",
"Neighboring Nodes",
"Node Features",
"Adjacent Minibatches",
"Repeated Data Transmission",
"Representative GNN Models",
"End To End GNN Training",
"GPU Memory Footprint",
"Training Time",
"Minibatch Data Generation",
"Reusing Batch Data Method",
"Repeated Node Data Detection",
"Static Cache Strategy",
"Training",
"Productivity",
"Deep Learning",
"Design Methodology",
"Conferences",
"Graphics Processing Units",
"Programming",
"Graph Neural Network",
"Data Transmission",
"Reusing Batch Data",
"GPU Resources"
],
"authors": [
{
"affiliation": "National University of Defense Technology,National Key Laboratory of Parallel and Distributed Processing School of Computer,Changsha,China",
"fullName": "Zhejiang Ran",
"givenName": "Zhejiang",
"surname": "Ran",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,National Key Laboratory of Parallel and Distributed Processing School of Computer,Changsha,China",
"fullName": "Zhiquan Lai",
"givenName": "Zhiquan",
"surname": "Lai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,National Key Laboratory of Parallel and Distributed Processing School of Computer,Changsha,China",
"fullName": "Lizhi Zhang",
"givenName": "Lizhi",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National University of Defense Technology,National Key Laboratory of Parallel and Distributed Processing School of Computer,Changsha,China",
"fullName": "Dongsheng Li",
"givenName": "Dongsheng",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipccc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4331-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09679397",
"articleId": "1AjTnGfrn6o",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09679395",
"articleId": "1AjTtFYAceI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2022/5444/0/544400a538",
"title": "CoGNN: Efficient Scheduling for Concurrent GNN Training on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2022/544400a538/1I0bSY3k27S",
"parentPublication": {
"id": "proceedings/sc/2022/5444/0/",
"title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiswc/2022/8798/0/879800a146",
"title": "gSuite: A Flexible and Framework Independent Benchmark Suite for Graph Neural Network Inference on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/iiswc/2022/879800a146/1J4ChyLdhOo",
"parentPublication": {
"id": "proceedings/iiswc/2022/8798/0",
"title": "2022 IEEE International Symposium on Workload Characterization (IISWC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2022/5444/0/544400a767",
"title": "WholeGraph: A Fast Graph Neural Network Training Framework with Multi-GPU Distributed Shared Memory Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2022/544400a767/1L07lzwyWbu",
"parentPublication": {
"id": "proceedings/sc/2022/5444/0/",
"title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2022/5444/0/544400a538",
"title": "CoGNN: Efficient Scheduling for Concurrent GNN Training on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2022/544400a538/1L07tazBH7q",
"parentPublication": {
"id": "proceedings/sc/2022/5444/0/",
"title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0/649700a106",
"title": "SCGraph: Accelerating Sample-based GNN Training by Staged Caching of Features on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2022/649700a106/1LKwpuCHO2Q",
"parentPublication": {
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2022/6497/0",
"title": "2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpca/2023/7652/0/10071015",
"title": "FlowGNN: A Dataflow Architecture for Real-Time Workload-Agnostic Graph Neural Network Inference",
"doi": null,
"abstractUrl": "/proceedings-article/hpca/2023/10071015/1LMbwrGPJ4I",
"parentPublication": {
"id": "proceedings/hpca/2023/7652/0",
"title": "2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2021/10/09376972",
"title": "Efficient Data Loader for Fast Sampling-Based GNN Training on Large Graphs",
"doi": null,
"abstractUrl": "/journal/td/2021/10/09376972/1rUNnBQRXsk",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispass/2021/8643/0/864300a118",
"title": "Performance Analysis of Graph Neural Network Frameworks",
"doi": null,
"abstractUrl": "/proceedings-article/ispass/2021/864300a118/1taFhPahQrK",
"parentPublication": {
"id": "proceedings/ispass/2021/8643/0",
"title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispass/2021/8643/0/864300a013",
"title": "GNNMark: A Benchmark Suite to Characterize Graph Neural Network Training on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ispass/2021/864300a013/1taFkJphQhG",
"parentPublication": {
"id": "proceedings/ispass/2021/8643/0",
"title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cluster/2021/9666/0/966600a103",
"title": "2PGraph: Accelerating GNN Training over Large Graphs on GPU Clusters",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2021/966600a103/1xFuUiktlU4",
"parentPublication": {
"id": "proceedings/cluster/2021/9666/0",
"title": "2021 IEEE International Conference on Cluster Computing (CLUSTER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1CzenkgxiuY",
"title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)",
"acronym": "tps-isa",
"groupId": "1835544",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1CzeyRu16tG",
"doi": "10.1109/TPSISA52974.2021.00002",
"title": "Membership Inference Attack on Graph Neural Networks",
"normalizedTitle": "Membership Inference Attack on Graph Neural Networks",
"abstract": "Graph Neural Networks (GNNs), which generalize traditional deep neural networks on graph data, have achieved state-of-the-art performance on several graph analytical tasks. We focus on how trained GNN models could leak information about the member nodes that they were trained on. We introduce two realistic settings for performing a membership inference (MI) attack on GNNs. While choosing the simplest possible attack model that utilizes the posteriors of the trained model (black-box access), we thoroughly analyze the properties of GNNs and the datasets which dictate the differences in their robustness towards MI attack. While in traditional machine learning models, overfitting is considered the main cause of such leakage, we show that in GNNs the additional structural information is the major contributing factor. We support our findings by extensive experiments on four representative GNN models. To prevent MI attacks on GNN, we propose two effective defenses that significantly decreases the attacker's inference by up to 60% without degradation to the target model's performance. Our code is available at https://github.com/iyempissy/rebMIGraph.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph Neural Networks (GNNs), which generalize traditional deep neural networks on graph data, have achieved state-of-the-art performance on several graph analytical tasks. We focus on how trained GNN models could leak information about the member nodes that they were trained on. We introduce two realistic settings for performing a membership inference (MI) attack on GNNs. While choosing the simplest possible attack model that utilizes the posteriors of the trained model (black-box access), we thoroughly analyze the properties of GNNs and the datasets which dictate the differences in their robustness towards MI attack. While in traditional machine learning models, overfitting is considered the main cause of such leakage, we show that in GNNs the additional structural information is the major contributing factor. We support our findings by extensive experiments on four representative GNN models. To prevent MI attacks on GNN, we propose two effective defenses that significantly decreases the attacker's inference by up to 60% without degradation to the target model's performance. Our code is available at https://github.com/iyempissy/rebMIGraph.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph Neural Networks (GNNs), which generalize traditional deep neural networks on graph data, have achieved state-of-the-art performance on several graph analytical tasks. We focus on how trained GNN models could leak information about the member nodes that they were trained on. We introduce two realistic settings for performing a membership inference (MI) attack on GNNs. While choosing the simplest possible attack model that utilizes the posteriors of the trained model (black-box access), we thoroughly analyze the properties of GNNs and the datasets which dictate the differences in their robustness towards MI attack. While in traditional machine learning models, overfitting is considered the main cause of such leakage, we show that in GNNs the additional structural information is the major contributing factor. We support our findings by extensive experiments on four representative GNN models. To prevent MI attacks on GNN, we propose two effective defenses that significantly decreases the attacker's inference by up to 60% without degradation to the target model's performance. Our code is available at https://github.com/iyempissy/rebMIGraph.",
"fno": "162300a011",
"keywords": [
"Computer Crime",
"Deep Learning Artificial Intelligence",
"Graph Theory",
"Inference Mechanisms",
"Target Model",
"Membership Inference Attack",
"Graph Neural Networks",
"GN Ns",
"Deep Neural Networks",
"Graph Data",
"Graph Analytical Tasks",
"Trained GNN Models",
"Simplest Possible Attack Model",
"MI Attack",
"Machine Learning Models",
"Representative GNN Models",
"Measurement",
"Analytical Models",
"Privacy",
"Perturbation Methods",
"Market Research",
"Graph Neural Networks",
"Robustness",
"Membership Inference",
"Privacy Leakage",
"Graph Neural Networks"
],
"authors": [
{
"affiliation": "L3S Research Center,Hannover,Germany",
"fullName": "Iyiola E. Olatunji",
"givenName": "Iyiola E.",
"surname": "Olatunji",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "L3S Research Center,Hannover,Germany",
"fullName": "Wolfgang Nejdl",
"givenName": "Wolfgang",
"surname": "Nejdl",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "L3S Research Center,Hannover,Germany",
"fullName": "Megha Khosla",
"givenName": "Megha",
"surname": "Khosla",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "tps-isa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "11-20",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1623-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "162300a001",
"articleId": "1Czeq18oZos",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "162300a021",
"articleId": "1Czeolr8xfa",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2021/2398/0/239800b421",
"title": "Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2021/239800b421/1Aqx6oOoaLm",
"parentPublication": {
"id": "proceedings/icdm/2021/2398/0",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b017",
"title": "Black-box Adversarial Attack and Defense on Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b017/1FwFqJPpwvS",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600n3369",
"title": "Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600n3369/1H1idpO3ASQ",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/5555/01/09910382",
"title": "Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network against Adversarial Attacks",
"doi": null,
"abstractUrl": "/journal/tq/5555/01/09910382/1Hcjw6oR19S",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900a975",
"title": "Adversarial Inter-Group Link Injection Degrades the Fairness of Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900a975/1KpCsLp4uRy",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2022/9425/0/942500a759",
"title": "A General Backdoor Attack to Graph Neural Networks Based on Explanation Method",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2022/942500a759/1LFLTfHc9K8",
"parentPublication": {
"id": "proceedings/trustcom/2022/9425/0",
"title": "2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/5555/01/10114622",
"title": "<monospace>PoisonedGNN</monospace>: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems",
"doi": null,
"abstractUrl": "/journal/tc/5555/01/10114622/1MQvszyCmLS",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2020/8316/0/831600a791",
"title": "Adversarial Label-Flipping Attack and Defense for Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2020/831600a791/1r54H7HiMy4",
"parentPublication": {
"id": "proceedings/icdm/2020/8316/0",
"title": "2020 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09413200",
"title": "Temporal Collaborative Filtering with Graph Convolutional Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09413200/1tmiDHwRHeU",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/01/09428573",
"title": "Adversarial Attack on Large Scale Graph",
"doi": null,
"abstractUrl": "/journal/tk/2023/01/09428573/1twaBGAEzyU",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": [
{
"id": "1EP2M3xNJcY",
"videoExt": "mp4",
"videoType": {
"featured": false,
"recommended": false,
"sponsored": false,
"__typename": "VideoTypesType"
},
"article": {
"id": "1CzeyRu16tG",
"fno": "162300a011",
"issueNum": null,
"pubType": "proceedings",
"volume": "0",
"year": "2021",
"idPrefix": "tps-isa",
"doi": "10.1109/TPSISA52974.2021.00002",
"title": "Membership Inference Attack on Graph Neural Networks",
"__typename": "ArticleType"
},
"channel": {
"id": "1EP2JmqBHi0",
"title": "TPS-ISA 2021",
"status": "1",
"featured": false,
"defaultVideoId": "1EP2J9RqNeU",
"category": {
"id": "1xvX5lT1WiQ",
"title": "Proceeding",
"type": "proceeding",
"__typename": "VideoCategoryType"
},
"__typename": "VideoChannelType"
},
"year": "2021",
"title": "Membership Inference Attack on Graph Neural Networks",
"description": "GraphNeuralNetworks(GNNs),whichgeneralize traditionaldeepneuralnetworksongraphdata,haveachieved state-of-the-artperformanceonseveralgraphanalyticaltasks. WefocusonhowtrainedGNNmodelscouldleakinformation about the member nodes that they were trained on. We introduce two realistic settings for performing a membership inference (MI) attackonGNNs.Whilechoosingthesimplestpossibleattack modelthatutilizestheposteriorsofthetrainedmodel(black-boxaccess),wethoroughlyanalyzethepropertiesofGNNsand thedatasetswhichdictatethedifferencesintheirrobustness towards MI attack. While in traditional machine learning models, overfittingisconsideredthemaincauseofsuchleakage,we showthatinGNNstheadditionalstructuralinformationisthe major contributing factor. We support our findings by extensive experimentsonfourrepresentativeGNNmodels.Toprevent MIattacksonGNN,weproposetwoeffectivedefensesthat significantlydecreasestheattacker'sinferencebyupto60% without degradation to the target model's performance. Our code is available at https://github.com/iyempissy/rebMIGraph",
"keywords": [
{
"id": "1EP2MlHyR4Q",
"title": "Membership Inference",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1EP2MoTGRRS",
"title": "Privacy leakage",
"status": "1",
"__typename": "VideoKeywordsType"
},
{
"id": "1xw6FM1pjSo",
"title": "Graph neural networks",
"status": "1",
"__typename": "VideoKeywordsType"
}
],
"speakers": [
{
"firstName": "Iyiola E.",
"lastName": "Olatunji",
"affiliation": "L3S Research Center,Hannover,Germany",
"__typename": "SpeakerType"
},
{
"firstName": "Wolfgang",
"lastName": "Nejdl",
"affiliation": "L3S Research Center,Hannover,Germany",
"__typename": "SpeakerType"
},
{
"firstName": "Megha",
"lastName": "Khosla",
"affiliation": "L3S Research Center,Hannover,Germany",
"__typename": "SpeakerType"
}
],
"created": "2022-07-08T00:00:00",
"updated": "2022-07-08T00:00:00",
"imageThumbnailUrl": "thumbnails/1EP2M3xNJcY.jpeg",
"runningTime": "00:18:11",
"aspectRatio": "16:9",
"metrics": {
"views": "0",
"likes": "0",
"__typename": "VideoMetricsType"
},
"notShowInVideoLib": false,
"__typename": "VideoType"
}
]
}
|
{
"proceeding": {
"id": "1Ds05wHXoY0",
"title": "2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)",
"acronym": "hpca",
"groupId": "1000335",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1Ds0aHT54Y0",
"doi": "10.1109/HPCA53966.2022.00039",
"title": "ReGNN: A Redundancy-Eliminated Graph Neural Networks Accelerator",
"normalizedTitle": "ReGNN: A Redundancy-Eliminated Graph Neural Networks Accelerator",
"abstract": "Graph neural networks (GNNs), which extend conventional deep learning technologies to process graph-structured data, have shown its powerful graph representation learning ability. Existing typical GNNs utilize neighborhood message passing mechanism based on neural networks that updates target vertex representations by aggregating feature messages from neighboring source vertices. To accelerate the computations of GNNs, some customized accelerators, which follow the neighborhood aggregation computation pattern for each vertex, have been proposed. Through analysis, we observe that a naive implementation of the neighborhood aggregation results in redundant computations and communications.In this paper, we propose a novel redundancy-eliminated GNN accelerator, shortly termed as ReGNN. ReGNN is supported by an algorithm and architecture co-design. We first propose a dynamic redundancy-eliminated neighborhood message passing algorithm for GNNs. Then a novel architecture is designed to support the proposed algorithm and transform the redundancy elimination into performance improvement. ReGNN is also a configurable pipelined architecture that can be configured to support different GNN variants. In terms of the same computations, ReGNN provides the same accuracy as traditional GNNs. To the best of our knowledge, ReGNN is the first accelerator that can eliminate computation redundancy in GNNs. Our proposed ReGNN system gains an average of 9.1× speedup and 8.9× energy efficiency over state-of-the-art GNN accelerators.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph neural networks (GNNs), which extend conventional deep learning technologies to process graph-structured data, have shown its powerful graph representation learning ability. Existing typical GNNs utilize neighborhood message passing mechanism based on neural networks that updates target vertex representations by aggregating feature messages from neighboring source vertices. To accelerate the computations of GNNs, some customized accelerators, which follow the neighborhood aggregation computation pattern for each vertex, have been proposed. Through analysis, we observe that a naive implementation of the neighborhood aggregation results in redundant computations and communications.In this paper, we propose a novel redundancy-eliminated GNN accelerator, shortly termed as ReGNN. ReGNN is supported by an algorithm and architecture co-design. We first propose a dynamic redundancy-eliminated neighborhood message passing algorithm for GNNs. Then a novel architecture is designed to support the proposed algorithm and transform the redundancy elimination into performance improvement. ReGNN is also a configurable pipelined architecture that can be configured to support different GNN variants. In terms of the same computations, ReGNN provides the same accuracy as traditional GNNs. To the best of our knowledge, ReGNN is the first accelerator that can eliminate computation redundancy in GNNs. Our proposed ReGNN system gains an average of 9.1× speedup and 8.9× energy efficiency over state-of-the-art GNN accelerators.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph neural networks (GNNs), which extend conventional deep learning technologies to process graph-structured data, have shown its powerful graph representation learning ability. Existing typical GNNs utilize neighborhood message passing mechanism based on neural networks that updates target vertex representations by aggregating feature messages from neighboring source vertices. To accelerate the computations of GNNs, some customized accelerators, which follow the neighborhood aggregation computation pattern for each vertex, have been proposed. Through analysis, we observe that a naive implementation of the neighborhood aggregation results in redundant computations and communications.In this paper, we propose a novel redundancy-eliminated GNN accelerator, shortly termed as ReGNN. ReGNN is supported by an algorithm and architecture co-design. We first propose a dynamic redundancy-eliminated neighborhood message passing algorithm for GNNs. Then a novel architecture is designed to support the proposed algorithm and transform the redundancy elimination into performance improvement. ReGNN is also a configurable pipelined architecture that can be configured to support different GNN variants. In terms of the same computations, ReGNN provides the same accuracy as traditional GNNs. To the best of our knowledge, ReGNN is the first accelerator that can eliminate computation redundancy in GNNs. Our proposed ReGNN system gains an average of 9.1× speedup and 8.9× energy efficiency over state-of-the-art GNN accelerators.",
"fno": "202700a429",
"keywords": [
"Data Structures",
"Graph Theory",
"Learning Artificial Intelligence",
"Message Passing",
"Neural Nets",
"Redundancy Eliminated Graph Neural Networks Accelerator",
"Conventional Deep Learning Technologies",
"Graph Representation Learning Ability",
"Typical GN Ns Utilize Neighborhood Message",
"Target Vertex Representations",
"Feature Messages",
"Customized Accelerators",
"Computation Pattern",
"Neighborhood Aggregation Results",
"Redundant Computations",
"Novel Redundancy Eliminated GNN Accelerator",
"Architecture Codesign",
"Dynamic Redundancy Eliminated Neighborhood Message Passing Algorithm",
"Redundancy Elimination",
"Configurable Pipelined Architecture",
"Traditional GN Ns",
"Computation Redundancy",
"Re GNN System Gains",
"Graph Structured Data",
"Neighboring Source Vertices",
"Representation Learning",
"Knowledge Engineering",
"Deep Learning",
"Message Passing",
"Heuristic Algorithms",
"Redundancy",
"Computer Architecture",
"Graph Neural Networks",
"Hardware Accelerator",
"Redundancy Aware Computation",
"Software Hardware Co Design"
],
"authors": [
{
"affiliation": "Hunan University,College of Information Science and Engineering,China",
"fullName": "Cen Chen",
"givenName": "Cen",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hunan University,College of Information Science and Engineering,China",
"fullName": "Kenli Li",
"givenName": "Kenli",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hunan University,College of Information Science and Engineering,China",
"fullName": "Yangfan Li",
"givenName": "Yangfan",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hunan University,College of Information Science and Engineering,China",
"fullName": "Xiaofeng Zou",
"givenName": "Xiaofeng",
"surname": "Zou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hpca",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-04-01T00:00:00",
"pubType": "proceedings",
"pages": "429-443",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-2027-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "202700a415",
"articleId": "1Ds06wQ7Hby",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "202700a444",
"articleId": "1Ds0gHUFPyw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2021/2398/0/239800b126",
"title": "Bi-Level Attention Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2021/239800b126/1Aqx8JOi3iE",
"parentPublication": {
"id": "proceedings/icdm/2021/2398/0",
"title": "2021 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200f281",
"title": "Meta-Aggregator: Learning to Aggregate for 1-bit Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200f281/1BmFZueIvNC",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a648",
"title": "EC-Graph: A Distributed Graph Neural Network System with Error-Compensated Compression",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a648/1FwFkLRgFkk",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mipr/2022/9548/0/954800a152",
"title": "Attentive Graph Neural Networks for Few-Shot Learning",
"doi": null,
"abstractUrl": "/proceedings-article/mipr/2022/954800a152/1Gvd7t6THNK",
"parentPublication": {
"id": "proceedings/mipr/2022/9548/0",
"title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipccc/2022/8018/0/09894311",
"title": "LSEGNN: Encode Local Topology Structure in Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ipccc/2022/09894311/1HpCr5remhG",
"parentPublication": {
"id": "proceedings/ipccc/2022/8018/0",
"title": "2022 IEEE International Performance, Computing, and Communications Conference (IPCCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956238",
"title": "HPGNN: Using Hierarchical Graph Neural Networks for Outdoor Point Cloud Processing",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956238/1IHpg8unl4c",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900a783",
"title": "Multi-Relational Graph Neural Architecture Search with Fine-grained Message Passing",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900a783/1KpCC81QEXC",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900a933",
"title": "Invariant Factor Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900a933/1KpCyuBdNiU",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpca/2023/7652/0/10071015",
"title": "FlowGNN: A Dataflow Architecture for Real-Time Workload-Agnostic Graph Neural Network Inference",
"doi": null,
"abstractUrl": "/proceedings-article/hpca/2023/10071015/1LMbwrGPJ4I",
"parentPublication": {
"id": "proceedings/hpca/2023/7652/0",
"title": "2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2020/8316/0/831600a472",
"title": "Beyond Localized Graph Neural Networks: An Attributed Motif Regularization Framework",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2020/831600a472/1r54AHkHIEo",
"parentPublication": {
"id": "proceedings/icdm/2020/8316/0",
"title": "2020 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1JC1F8KcINO",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "9994793",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1JC1N5gNMUo",
"doi": "10.1109/BIBM55620.2022.9995685",
"title": "Glycan Immunogenicity Prediction with Efficient Automatic Graph Neural Network",
"normalizedTitle": "Glycan Immunogenicity Prediction with Efficient Automatic Graph Neural Network",
"abstract": "Glycans play an indispensable role in various bio-logical processes, such as cancer and autoimmune diseases. The function of glycan is closely determined by its structure. Due to the branch and nonlinear properties of glycans, previous research treats the glycans graph structure as a topological graph to represent glycans data effectively. Graph neural networks (GNNs) are an efficient graph mining method and have many applications in bioinformatics. Therefore, researchers have successfully used handcrafted GNNs to predict glycan immunogenicity. However, a GNN architecture contains many different components, and designing GNN architectures for specific graphs in the bioinformatics field is time-consuming and expert-dependent. To address this challenge, we propose an efficient automatic graph neural network method called EAGNN that can efficiently and automatically construct GNN architecture for glycan immunogenicity prediction. We design an effective graph attention pooling (GAP) search space. We use differential architecture search to efficiently create the optimal GNN architecture in the search space to build the GNN model for glycan immunogenicity prediction. We test EAGNN on the data set SugarBase based on the glycan immunogenicity prediction task. The experiment results show that EAGNN can work more superiorly than the baseline model and achieve the best performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Glycans play an indispensable role in various bio-logical processes, such as cancer and autoimmune diseases. The function of glycan is closely determined by its structure. Due to the branch and nonlinear properties of glycans, previous research treats the glycans graph structure as a topological graph to represent glycans data effectively. Graph neural networks (GNNs) are an efficient graph mining method and have many applications in bioinformatics. Therefore, researchers have successfully used handcrafted GNNs to predict glycan immunogenicity. However, a GNN architecture contains many different components, and designing GNN architectures for specific graphs in the bioinformatics field is time-consuming and expert-dependent. To address this challenge, we propose an efficient automatic graph neural network method called EAGNN that can efficiently and automatically construct GNN architecture for glycan immunogenicity prediction. We design an effective graph attention pooling (GAP) search space. We use differential architecture search to efficiently create the optimal GNN architecture in the search space to build the GNN model for glycan immunogenicity prediction. We test EAGNN on the data set SugarBase based on the glycan immunogenicity prediction task. The experiment results show that EAGNN can work more superiorly than the baseline model and achieve the best performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Glycans play an indispensable role in various bio-logical processes, such as cancer and autoimmune diseases. The function of glycan is closely determined by its structure. Due to the branch and nonlinear properties of glycans, previous research treats the glycans graph structure as a topological graph to represent glycans data effectively. Graph neural networks (GNNs) are an efficient graph mining method and have many applications in bioinformatics. Therefore, researchers have successfully used handcrafted GNNs to predict glycan immunogenicity. However, a GNN architecture contains many different components, and designing GNN architectures for specific graphs in the bioinformatics field is time-consuming and expert-dependent. To address this challenge, we propose an efficient automatic graph neural network method called EAGNN that can efficiently and automatically construct GNN architecture for glycan immunogenicity prediction. We design an effective graph attention pooling (GAP) search space. We use differential architecture search to efficiently create the optimal GNN architecture in the search space to build the GNN model for glycan immunogenicity prediction. We test EAGNN on the data set SugarBase based on the glycan immunogenicity prediction task. The experiment results show that EAGNN can work more superiorly than the baseline model and achieve the best performance.",
"fno": "09995685",
"keywords": [
"Bioinformatics",
"Cancer",
"Data Mining",
"Diseases",
"Graph Theory",
"Neural Net Architecture",
"Automatic Graph Neural Network",
"Bioinformatics",
"Biological Process",
"EAGNN",
"Glycan Immunogenicity Prediction Task",
"Glycans Data",
"Glycans Graph Structure",
"Graph Attention Pooling Search Space",
"Graph Mining",
"Optimal GNN Architecture",
"Topological Graph",
"Biological System Modeling",
"Manuals",
"Predictive Models",
"Graph Neural Networks",
"Data Models",
"Data Mining",
"Task Analysis",
"Glycan Immunogenicity",
"Graph Neural Networks",
"Differential Architecture Search"
],
"authors": [
{
"affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China",
"fullName": "Jiamin Chen",
"givenName": "Jiamin",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China",
"fullName": "Zhenpeng Wu",
"givenName": "Zhenpeng",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China",
"fullName": "Jianliang Gao",
"givenName": "Jianliang",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Drexel University,College of Computing & Informatics,USA",
"fullName": "Xiaohua Hu",
"givenName": "Xiaohua",
"surname": "Hu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "309-314",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-6819-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09995663",
"articleId": "1JC2Zp0aFLG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09995054",
"articleId": "1JC2Bp02Qh2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/tb/2015/03/06951360",
"title": "An Accurate de novo Algorithm for Glycan Topology Determination from Mass Spectra",
"doi": null,
"abstractUrl": "/journal/tb/2015/03/06951360/13rRUxbTMxC",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2021/3734/0/373400a249",
"title": "Edge-Level Explanations for Graph Neural Networks by Extending Explainability Methods for Convolutional Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2021/373400a249/1A3j8OOLHa0",
"parentPublication": {
"id": "proceedings/ism/2021/3734/0",
"title": "2021 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2021/0126/0/09669605",
"title": "Glycan immunogenicity prediction based on Graph neural network",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2021/09669605/1A9W9Rx0nks",
"parentPublication": {
"id": "proceedings/bibm/2021/0126/0",
"title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09705076",
"title": "<italic>GNNLens</italic>: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09705076/1AIIbJW1goU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tps-isa/2021/1623/0/162300a011",
"title": "Membership Inference Attack on Graph Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/tps-isa/2021/162300a011/1CzeyRu16tG",
"parentPublication": {
"id": "proceedings/tps-isa/2021/1623/0",
"title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/05/09875989",
"title": "Explainability in Graph Neural Networks: A Taxonomic Survey",
"doi": null,
"abstractUrl": "/journal/tp/2023/05/09875989/1GqajxgkWcM",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900a231",
"title": "CC-GNN: A Community and Contraction-based Graph Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900a231/1KpCGX7nMmk",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2022/5099/0/509900b305",
"title": "Higher-Order Masked Graph Neural Networks for Traffic Flow Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2022/509900b305/1KpCmF0Vjtm",
"parentPublication": {
"id": "proceedings/icdm/2022/5099/0",
"title": "2022 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2023/7578/0/757800a085",
"title": "LFP: Layer Wise Feature Perturbation based Graph Neural Network for Link Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2023/757800a085/1LFLB9ARMNG",
"parentPublication": {
"id": "proceedings/bigcomp/2023/7578/0",
"title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispass/2021/8643/0/864300a118",
"title": "Performance Analysis of Graph Neural Network Frameworks",
"doi": null,
"abstractUrl": "/proceedings-article/ispass/2021/864300a118/1taFhPahQrK",
"parentPublication": {
"id": "proceedings/ispass/2021/8643/0",
"title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1taFgDY34Qg",
"title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"acronym": "ispass",
"groupId": "1000547",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1taFhPahQrK",
"doi": "10.1109/ISPASS51385.2021.00029",
"title": "Performance Analysis of Graph Neural Network Frameworks",
"normalizedTitle": "Performance Analysis of Graph Neural Network Frameworks",
"abstract": "Graph neural networks (GNNs) are effective models to address learning problems on graphs and have been successfully applied to numerous domains. To improve the productivity of implementing GNNs, various GNN programming frameworks have been developed. Both the effectiveness (accuracy, loss, etc) and the performance (latency, bandwidth, etc) are essential metrics to evaluate the implementation of GNNs. There are many comparative studies related to the effectiveness of different GNN models on domain tasks. However, the performance characteristics of different GNN frameworks are still lacking. In this study, we evaluate the effectiveness and performance of six popular GNN models, GCN, GIN, GAT, GraphSAGE, MoNet, and GatedGCN, across several common benchmarks under two popular GNN frameworks, PyTorch Geometric and Deep Graph Library. We analyze the training time, GPU utilization, and memory usage of different evaluation settings and the performance of models across different hardware configurations under the two frameworks. Our evaluation provides in-depth observations of performance bottlenecks of GNNs and the performance differences between the two popular GNN frameworks. Our work helps GNN researchers understand the performance differences of the popular GNN frameworks, and gives guidelines for developers to find potential performance bugs of frameworks and optimization possibilities of GNNs.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph neural networks (GNNs) are effective models to address learning problems on graphs and have been successfully applied to numerous domains. To improve the productivity of implementing GNNs, various GNN programming frameworks have been developed. Both the effectiveness (accuracy, loss, etc) and the performance (latency, bandwidth, etc) are essential metrics to evaluate the implementation of GNNs. There are many comparative studies related to the effectiveness of different GNN models on domain tasks. However, the performance characteristics of different GNN frameworks are still lacking. In this study, we evaluate the effectiveness and performance of six popular GNN models, GCN, GIN, GAT, GraphSAGE, MoNet, and GatedGCN, across several common benchmarks under two popular GNN frameworks, PyTorch Geometric and Deep Graph Library. We analyze the training time, GPU utilization, and memory usage of different evaluation settings and the performance of models across different hardware configurations under the two frameworks. Our evaluation provides in-depth observations of performance bottlenecks of GNNs and the performance differences between the two popular GNN frameworks. Our work helps GNN researchers understand the performance differences of the popular GNN frameworks, and gives guidelines for developers to find potential performance bugs of frameworks and optimization possibilities of GNNs.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph neural networks (GNNs) are effective models to address learning problems on graphs and have been successfully applied to numerous domains. To improve the productivity of implementing GNNs, various GNN programming frameworks have been developed. Both the effectiveness (accuracy, loss, etc) and the performance (latency, bandwidth, etc) are essential metrics to evaluate the implementation of GNNs. There are many comparative studies related to the effectiveness of different GNN models on domain tasks. However, the performance characteristics of different GNN frameworks are still lacking. In this study, we evaluate the effectiveness and performance of six popular GNN models, GCN, GIN, GAT, GraphSAGE, MoNet, and GatedGCN, across several common benchmarks under two popular GNN frameworks, PyTorch Geometric and Deep Graph Library. We analyze the training time, GPU utilization, and memory usage of different evaluation settings and the performance of models across different hardware configurations under the two frameworks. Our evaluation provides in-depth observations of performance bottlenecks of GNNs and the performance differences between the two popular GNN frameworks. Our work helps GNN researchers understand the performance differences of the popular GNN frameworks, and gives guidelines for developers to find potential performance bugs of frameworks and optimization possibilities of GNNs.",
"fno": "864300a118",
"keywords": [
"Graph Theory",
"Learning Artificial Intelligence",
"Neural Nets",
"Performance Evaluation",
"Performance Analysis",
"Graph Neural Networks",
"GNN Programming Frameworks",
"GNN Models",
"Deep Graph Library",
"Hardware Configurations",
"GNN Researchers",
"Performance Bugs",
"Training",
"Analytical Models",
"Graphics Processing Units",
"Logic Gates",
"Parallel Processing",
"Data Models",
"Hardware",
"Graph Neural Network",
"GNN Framework",
"Performance Evaluation"
],
"authors": [
{
"affiliation": "University of Science and Technology of China,China",
"fullName": "Junwei Wu",
"givenName": "Junwei",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Science and Technology of China,China",
"fullName": "Jingwei Sun",
"givenName": "Jingwei",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Science and Technology of China,China",
"fullName": "Hao Sun",
"givenName": "Hao",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Science and Technology of China,China",
"fullName": "Guangzhong Sun",
"givenName": "Guangzhong",
"surname": "Sun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ispass",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-03-01T00:00:00",
"pubType": "proceedings",
"pages": "118-127",
"year": "2021",
"issn": null,
"isbn": "978-1-7281-8643-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "864300a107",
"articleId": "1taFlbuIVhu",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "864300a128",
"articleId": "1taFi58mI8M",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipccc/2021/4331/0/09679362",
"title": "Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ipccc/2021/09679362/1AjTn7cgpgs",
"parentPublication": {
"id": "proceedings/ipccc/2021/4331/0",
"title": "2021 IEEE International Performance, Computing, and Communications Conference (IPCCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a648",
"title": "EC-Graph: A Distributed Graph Neural Network System with Error-Compensated Compression",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a648/1FwFkLRgFkk",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2022/5444/0/544400a767",
"title": "WholeGraph: A Fast Graph Neural Network Training Framework with Multi-GPU Distributed Shared Memory Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2022/544400a767/1I0bT3xntXa",
"parentPublication": {
"id": "proceedings/sc/2022/5444/0/",
"title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiswc/2022/8798/0/879800a160",
"title": "Characterizing the Efficiency of Graph Neural Network Frameworks with a Magnifying Glass",
"doi": null,
"abstractUrl": "/proceedings-article/iiswc/2022/879800a160/1J4CeKJ7mlW",
"parentPublication": {
"id": "proceedings/iiswc/2022/8798/0",
"title": "2022 IEEE International Symposium on Workload Characterization (IISWC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiswc/2022/8798/0/879800a146",
"title": "gSuite: A Flexible and Framework Independent Benchmark Suite for Graph Neural Network Inference on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/iiswc/2022/879800a146/1J4ChyLdhOo",
"parentPublication": {
"id": "proceedings/iiswc/2022/8798/0",
"title": "2022 IEEE International Symposium on Workload Characterization (IISWC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2022/4609/0/460900a748",
"title": "Improving Your Graph Neural Networks: A High-Frequency Booster",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2022/460900a748/1KBr078JDnq",
"parentPublication": {
"id": "proceedings/icdmw/2022/4609/0",
"title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2022/5444/0/544400a767",
"title": "WholeGraph: A Fast Graph Neural Network Training Framework with Multi-GPU Distributed Shared Memory Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2022/544400a767/1L07lzwyWbu",
"parentPublication": {
"id": "proceedings/sc/2022/5444/0/",
"title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpca/2023/7652/0/10071015",
"title": "FlowGNN: A Dataflow Architecture for Real-Time Workload-Agnostic Graph Neural Network Inference",
"doi": null,
"abstractUrl": "/proceedings-article/hpca/2023/10071015/1LMbwrGPJ4I",
"parentPublication": {
"id": "proceedings/hpca/2023/7652/0",
"title": "2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "letters/ca/2020/01/09075391",
"title": "Architectural Implications of Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/ca/2020/01/09075391/1keqGkt9ywM",
"parentPublication": {
"id": "letters/ca",
"title": "IEEE Computer Architecture Letters",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispass/2021/8643/0/864300a013",
"title": "GNNMark: A Benchmark Suite to Characterize Graph Neural Network Training on GPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ispass/2021/864300a013/1taFkJphQhG",
"parentPublication": {
"id": "proceedings/ispass/2021/8643/0",
"title": "2021 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1tmhi3ly74c",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"acronym": "icpr",
"groupId": "1000545",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1tmiDHwRHeU",
"doi": "10.1109/ICPR48806.2021.9413200",
"title": "Temporal Collaborative Filtering with Graph Convolutional Neural Networks",
"normalizedTitle": "Temporal Collaborative Filtering with Graph Convolutional Neural Networks",
"abstract": "Temporal collaborative filtering (TCF) methods aim at modelling non-static aspects behind recommender systems, such as the dynamics in users' preferences and social trends around items. State-of-the-art TCF methods employ recurrent neural networks (RNNs) to model such aspects. These methods deploy matrix-factorization-based (MF -based) approaches to learn the user and item representations. Recently, graph-neural-network-based (GNN-based) approaches have shown improved performance in providing accurate recommendations over traditional MF -based approaches in non-temporal CF settings. Motivated by this, we propose a novel TCF method that leverages GNNs to learn user and item representations, and RNNs to model their temporal dynamics. A challenge with this method lies in the increased data sparsity, which negatively impacts obtaining meaningful quality representations with GNNs. To overcome this challenge, we train a GNN model at each time step using a set of observed interactions accumulated time-wise. Comprehensive experiments on real-world data show the improved performance obtained by our method over several state-of-the-art temporal and non-temporal CF models.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Temporal collaborative filtering (TCF) methods aim at modelling non-static aspects behind recommender systems, such as the dynamics in users' preferences and social trends around items. State-of-the-art TCF methods employ recurrent neural networks (RNNs) to model such aspects. These methods deploy matrix-factorization-based (MF -based) approaches to learn the user and item representations. Recently, graph-neural-network-based (GNN-based) approaches have shown improved performance in providing accurate recommendations over traditional MF -based approaches in non-temporal CF settings. Motivated by this, we propose a novel TCF method that leverages GNNs to learn user and item representations, and RNNs to model their temporal dynamics. A challenge with this method lies in the increased data sparsity, which negatively impacts obtaining meaningful quality representations with GNNs. To overcome this challenge, we train a GNN model at each time step using a set of observed interactions accumulated time-wise. Comprehensive experiments on real-world data show the improved performance obtained by our method over several state-of-the-art temporal and non-temporal CF models.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Temporal collaborative filtering (TCF) methods aim at modelling non-static aspects behind recommender systems, such as the dynamics in users' preferences and social trends around items. State-of-the-art TCF methods employ recurrent neural networks (RNNs) to model such aspects. These methods deploy matrix-factorization-based (MF -based) approaches to learn the user and item representations. Recently, graph-neural-network-based (GNN-based) approaches have shown improved performance in providing accurate recommendations over traditional MF -based approaches in non-temporal CF settings. Motivated by this, we propose a novel TCF method that leverages GNNs to learn user and item representations, and RNNs to model their temporal dynamics. A challenge with this method lies in the increased data sparsity, which negatively impacts obtaining meaningful quality representations with GNNs. To overcome this challenge, we train a GNN model at each time step using a set of observed interactions accumulated time-wise. Comprehensive experiments on real-world data show the improved performance obtained by our method over several state-of-the-art temporal and non-temporal CF models.",
"fno": "09413200",
"keywords": [
"Collaborative Filtering",
"Graph Theory",
"Information Filtering",
"Learning Artificial Intelligence",
"Matrix Decomposition",
"Neural Nets",
"Recommender Systems",
"Recurrent Neural Nets",
"GNN Model",
"Nontemporal CF Models",
"Graph Convolutional Neural Networks",
"Temporal Collaborative Filtering Methods",
"Modelling Nonstatic Aspects",
"Recommender Systems",
"Users",
"Social Trends",
"State Of The Art TCF Methods",
"Recurrent Neural Networks",
"RN Ns",
"Matrix Factorization Based",
"Item Representations",
"Graph Neural Network Based Approaches",
"GNN Based",
"Accurate Recommendations",
"Traditional MF",
"Nontemporal CF Settings",
"Novel TCF Method",
"Temporal Dynamics",
"Meaningful Quality Representations",
"Training",
"Recurrent Neural Networks",
"Collaborative Filtering",
"Market Research",
"Data Models",
"Graph Neural Networks",
"Trajectory"
],
"authors": [
{
"affiliation": "Vrije Universiteit Brussel,ETRO Department,Brussels, Leuven,Belgium,B-3001",
"fullName": "Esther Rodrigo Bonet",
"givenName": "Esther Rodrigo",
"surname": "Bonet",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Vrije Universiteit Brussel,ETRO Department,Brussels, Leuven,Belgium,B-3001",
"fullName": "Duc Minh Nguyen",
"givenName": "Duc Minh",
"surname": "Nguyen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Vrije Universiteit Brussel,ETRO Department,Brussels, Leuven,Belgium,B-3001",
"fullName": "Nikos Deligiannis",
"givenName": "Nikos",
"surname": "Deligiannis",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-01-01T00:00:00",
"pubType": "proceedings",
"pages": "4736-4742",
"year": "2021",
"issn": "1051-4651",
"isbn": "978-1-7281-8808-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09411916",
"articleId": "1tmjXz03lZu",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09413071",
"articleId": "1tmjehVY4GQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2009/3895/0/3895b046",
"title": "Binomial Matrix Factorization for Discrete Collaborative Filtering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895b046/12OmNAndilb",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2015/8391/0/8391e507",
"title": "Describing Videos by Exploiting Temporal Structure",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391e507/12OmNx4Q6FB",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/04/07919264",
"title": "Video Super-Resolution via Bidirectional Recurrent Convolutional Networks",
"doi": null,
"abstractUrl": "/journal/tp/2018/04/07919264/13rRUxAAT8X",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2018/1737/0/08486496",
"title": "Seethevoice: Learning from Music to Visual Storytelling of Shots",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486496/14jQfONVPea",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000f735",
"title": "End-to-End Convolutional Semantic Embeddings",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000f735/17D45WXIkCM",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09705076",
"title": "<italic>GNNLens</italic>: A Visual Analytics Approach for Prediction Error Diagnosis of Graph Neural Networks",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09705076/1AIIbJW1goU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/05/09721542",
"title": "GDSRec: Graph-Based Decentralized Collaborative Filtering for Social Recommendation",
"doi": null,
"abstractUrl": "/journal/tk/2023/05/09721542/1BhySPAxbDa",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2022/9747/0/974700a045",
"title": "Implementing Spatio-Temporal Graph Convolutional Networks on Graphcore IPUs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2022/974700a045/1Fu9dlZiQ7u",
"parentPublication": {
"id": "proceedings/ipdpsw/2022/9747/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2020/7081/0/708100a474",
"title": "Addressing Crime Situation Forecasting Task with Temporal Graph Convolutional Neural Network Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2020/708100a474/1iERLkzdkOc",
"parentPublication": {
"id": "proceedings/icmtma/2020/7081/0",
"title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/saner/2021/9630/0/963000a036",
"title": "Graph Neural Network Based Collaborative Filtering for API Usage Recommendation",
"doi": null,
"abstractUrl": "/proceedings-article/saner/2021/963000a036/1twfvTcQERa",
"parentPublication": {
"id": "proceedings/saner/2021/9630/0",
"title": "2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KaFN97eXLi",
"title": "2022 26th International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KaH35KSrrW",
"doi": "10.1109/IV56949.2022.00031",
"title": "Natural Language Interface for Data Visualization with Deep Learning Based Language Models",
"normalizedTitle": "Natural Language Interface for Data Visualization with Deep Learning Based Language Models",
"abstract": "In this work we investigate the possibilities of integrating a Deep Learning language model for a Natural Language Interface (NLI) of an information visualisation software. For this purpose, we have developed a prototype web application that uses the deep learning model OpenAI Codex from the GPT3 family to create visualisations from text input. For comparison, we created a second prototype with a classical NLP approach based on NL4DV toolkit (with subtasks like part-of-speech (POS) tagging, entity recognition, and dependency parsing) and an almost identical interface. The two variants were subjected to a study with test persons, and the advantages and disadvantages of the two approaches and the suitability for the most common visualisation types were investigated. The Deep Learning approach offers greater expressiveness for describing the graphics, but also the danger of not always being entirely comprehensible. The participants were able to use it to create more complex visualisations, but also sometimes had problems finding the right text input to solve the tasks. In our preliminary usability study, the Deep Learning prototype performed slightly better than the comparison prototype and achieved a useful usability score.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this work we investigate the possibilities of integrating a Deep Learning language model for a Natural Language Interface (NLI) of an information visualisation software. For this purpose, we have developed a prototype web application that uses the deep learning model OpenAI Codex from the GPT3 family to create visualisations from text input. For comparison, we created a second prototype with a classical NLP approach based on NL4DV toolkit (with subtasks like part-of-speech (POS) tagging, entity recognition, and dependency parsing) and an almost identical interface. The two variants were subjected to a study with test persons, and the advantages and disadvantages of the two approaches and the suitability for the most common visualisation types were investigated. The Deep Learning approach offers greater expressiveness for describing the graphics, but also the danger of not always being entirely comprehensible. The participants were able to use it to create more complex visualisations, but also sometimes had problems finding the right text input to solve the tasks. In our preliminary usability study, the Deep Learning prototype performed slightly better than the comparison prototype and achieved a useful usability score.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this work we investigate the possibilities of integrating a Deep Learning language model for a Natural Language Interface (NLI) of an information visualisation software. For this purpose, we have developed a prototype web application that uses the deep learning model OpenAI Codex from the GPT3 family to create visualisations from text input. For comparison, we created a second prototype with a classical NLP approach based on NL4DV toolkit (with subtasks like part-of-speech (POS) tagging, entity recognition, and dependency parsing) and an almost identical interface. The two variants were subjected to a study with test persons, and the advantages and disadvantages of the two approaches and the suitability for the most common visualisation types were investigated. The Deep Learning approach offers greater expressiveness for describing the graphics, but also the danger of not always being entirely comprehensible. The participants were able to use it to create more complex visualisations, but also sometimes had problems finding the right text input to solve the tasks. In our preliminary usability study, the Deep Learning prototype performed slightly better than the comparison prototype and achieved a useful usability score.",
"fno": "900700a142",
"keywords": [
"Data Visualisation",
"Learning Artificial Intelligence",
"Natural Language Interfaces",
"Natural Language Processing",
"Public Domain Software",
"Classical NLP Approach",
"Common Visualisation Types",
"Comparison Prototype",
"Complex Visualisations",
"Data Visualization",
"Deep Learning Approach",
"Deep Learning Based Language Models",
"Deep Learning Language Model",
"Deep Learning Model Open AI Codex",
"Deep Learning Prototype",
"GPT 3 Family",
"Identical Interface",
"Information Visualisation Software",
"Natural Language Interface",
"NL 4 DV Toolkit",
"Prototype Web Application",
"Text Input",
"Deep Learning",
"Graphics",
"Natural Languages",
"Data Visualization",
"Prototypes",
"Tagging",
"Software",
"Visualization Systems And Tools",
"Empirical Studies In Interaction Design",
"Data Analytics",
"Natural Language Processing"
],
"authors": [
{
"affiliation": "University of Applied Sciences Upper Austria,Digital Media Department,Hagenberg,Austria",
"fullName": "Andreas Stöckl",
"givenName": "Andreas",
"surname": "Stöckl",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-07-01T00:00:00",
"pubType": "proceedings",
"pages": "142-148",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9007-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "900700a136",
"articleId": "1KaH6h452co",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "900700a149",
"articleId": "1KaH69goyys",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aiaws/1991/2240/0/00236578",
"title": "Natural language interface to a corporate cash management system",
"doi": null,
"abstractUrl": "/proceedings-article/aiaws/1991/00236578/12OmNBlofMw",
"parentPublication": {
"id": "proceedings/aiaws/1991/2240/0",
"title": "Proceedings First International Conference on Artificial Intelligence Applications on Wall Street",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tai/1993/4200/0/00634015",
"title": "Flexible script-handling techniques for natural language understanding systems",
"doi": null,
"abstractUrl": "/proceedings-article/tai/1993/00634015/12OmNqH9hn0",
"parentPublication": {
"id": "proceedings/tai/1993/4200/0",
"title": "Proceedings of 1993 IEEE Conference on Tools with Al (TAI-93)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsme/2016/3806/0/3806a378",
"title": "ICON: Inferring Temporal Constraints from Natural Language API Descriptions",
"doi": null,
"abstractUrl": "/proceedings-article/icsme/2016/3806a378/12OmNxYbT2V",
"parentPublication": {
"id": "proceedings/icsme/2016/3806/0",
"title": "2016 IEEE International Conference on Software Maintenance and Evolution (ICSME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/caia/1988/0837/0/00196127",
"title": "Hierarchical multilevel processing model for natural language database interface",
"doi": null,
"abstractUrl": "/proceedings-article/caia/1988/00196127/12OmNy1SFQR",
"parentPublication": {
"id": "proceedings/caia/1988/0837/0",
"title": "Proceedings. The Fourth Conference on Artificial Intelligence Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2019/6783/0/08665499",
"title": "Transferable Natural Language Interface to Structured Queries Aided by Adversarial Generation",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2019/08665499/18qcffgluyk",
"parentPublication": {
"id": "proceedings/icsc/2019/6783/0",
"title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/re/2022/7000/0/700000a262",
"title": "NL2RT: A Tool to Translate Natural Language Text into Requirements Templates (RTs)",
"doi": null,
"abstractUrl": "/proceedings-article/re/2022/700000a262/1HBKt11i1P2",
"parentPublication": {
"id": "proceedings/re/2022/7000/0",
"title": "2022 IEEE 30th International Requirements Engineering Conference (RE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/01/09912366",
"title": "Towards Natural Language-Based Visualization Authoring",
"doi": null,
"abstractUrl": "/journal/tg/2023/01/09912366/1HeiWkRN3tC",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ase/2019/2508/0/250800b234",
"title": "Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements",
"doi": null,
"abstractUrl": "/proceedings-article/ase/2019/250800b234/1gysTdAJuU0",
"parentPublication": {
"id": "proceedings/ase/2019/2508/0",
"title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09617561",
"title": "Natural Language to Visualization by Neural Machine Translation",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09617561/1yA76vDzhhC",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2021/2085/0/208500a047",
"title": "Developing Visualisations to Enhance an Insider Threat Product: A Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2021/208500a047/1z93MX3Q5Ow",
"parentPublication": {
"id": "proceedings/vizsec/2021/2085/0",
"title": "2021 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBqMDAS",
"title": "2011 IEEE International Conference on Advanced Information Networking and Applications",
"acronym": "aina",
"groupId": "1000008",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxwENJ7",
"doi": "10.1109/AINA.2011.32",
"title": "Determining Writing Genre: Towards a Rubric-based Approach to Automated Essay Grading",
"normalizedTitle": "Determining Writing Genre: Towards a Rubric-based Approach to Automated Essay Grading",
"abstract": "A writing genre can be thought of as the style in which the writer chooses to present textual content to the reader. We distinguish four main types of essay genres namely Narrative, Persuasive, Descriptive and Expository. An essay's writing genre can be identified by searching for salient features present within those genres using various Natural Language Processing tools such as Named Entity Recognition, Part of Speech tagging and Sentence Parsing. This paper explains the more common writing genres in student essays and describes the method in which essays in the narrative genre are identified.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A writing genre can be thought of as the style in which the writer chooses to present textual content to the reader. We distinguish four main types of essay genres namely Narrative, Persuasive, Descriptive and Expository. An essay's writing genre can be identified by searching for salient features present within those genres using various Natural Language Processing tools such as Named Entity Recognition, Part of Speech tagging and Sentence Parsing. This paper explains the more common writing genres in student essays and describes the method in which essays in the narrative genre are identified.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A writing genre can be thought of as the style in which the writer chooses to present textual content to the reader. We distinguish four main types of essay genres namely Narrative, Persuasive, Descriptive and Expository. An essay's writing genre can be identified by searching for salient features present within those genres using various Natural Language Processing tools such as Named Entity Recognition, Part of Speech tagging and Sentence Parsing. This paper explains the more common writing genres in student essays and describes the method in which essays in the narrative genre are identified.",
"fno": "4337a270",
"keywords": [
"Writing Genre",
"Automated Essay Grading",
"Natural Language Processing"
],
"authors": [
{
"affiliation": null,
"fullName": "Hon Wai Lam",
"givenName": "Hon Wai",
"surname": "Lam",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tharam Dillon",
"givenName": "Tharam",
"surname": "Dillon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Elizabeth Chang",
"givenName": "Elizabeth",
"surname": "Chang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "aina",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-03-01T00:00:00",
"pubType": "proceedings",
"pages": "270-274",
"year": "2011",
"issn": "1550-445X",
"isbn": "978-0-7695-4337-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4337a264",
"articleId": "12OmNz4SOrw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4337a275",
"articleId": "12OmNviZlnu",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/etcs/2010/3987/1/3987a690",
"title": "An Analysis of a Genre Set in RA Abstracts and Introductions in Different Disciplines",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987a690/12OmNAolH5w",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/1",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/1/3735a129",
"title": "Automatic Genre Classification by Using Co-training",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735a129/12OmNApu5fv",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/1",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2012/4637/0/4637a065",
"title": "An Effective Automated Essay Scoring System Using Support Vector Regression",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2012/4637a065/12OmNqH9hp1",
"parentPublication": {
"id": "proceedings/icicta/2012/4637/0",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2001/0981/4/09814013",
"title": "Genre based Navigation on the Web",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2001/09814013/12OmNsd6vmk",
"parentPublication": {
"id": "proceedings/hicss/2001/0981/4",
"title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2002/1435/4/14350101",
"title": "Towards Automatic Web Genre Identification",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2002/14350101/12OmNwMob89",
"parentPublication": {
"id": "proceedings/hicss/2002/1435/4",
"title": "Proceedings of the 35th Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pcspa/2010/4180/0/4180a883",
"title": "Visualized Feature Fusion and Style Evaluation for Musical Genre Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/pcspa/2010/4180a883/12OmNwwd2Is",
"parentPublication": {
"id": "proceedings/pcspa/2010/4180/0",
"title": "Pervasive Computing, Signal Porcessing and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2008/3299/0/3299a130",
"title": "Multimodal Genre Analysis Applied to Digital Television Archives",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2008/3299a130/12OmNyLiuvf",
"parentPublication": {
"id": "proceedings/dexa/2008/3299/0",
"title": "2008 19th International Workshop on Database and Expert Systems Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ialp/2009/3904/0/3904a265",
"title": "Automatic Chinese Essay Scoring Using Connections between Concepts in Paragraphs",
"doi": null,
"abstractUrl": "/proceedings-article/ialp/2009/3904a265/12OmNyS6RI4",
"parentPublication": {
"id": "proceedings/ialp/2009/3904/0",
"title": "Asian Language Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2010/3987/2/3987b094",
"title": "Automated Essay Scoring System for CET4",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987b094/12OmNylKAPC",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/2",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2003/01/x1032",
"title": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays",
"doi": null,
"abstractUrl": "/magazine/ex/2003/01/x1032/13rRUxCitDN",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1iHTad12NVe",
"title": "2019 IEEE 2nd Workshop on Animation in Virtual and Augmented Environments (ANIVAE)",
"acronym": "anivae",
"groupId": "1828984",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1iHTaxDewDK",
"doi": "10.1109/ANIVAE47543.2019.9050929",
"title": "Everything must change? Challenges for animated storytelling in VR",
"normalizedTitle": "Everything must change? Challenges for animated storytelling in VR",
"abstract": "VR enables the viewer to freely choose the point of view: Instead of being bound to a predefined screen format, he/she “becomes” the camera. This poses a huge challenge for communicating a narrative, because essential storytelling tools like framing and editing are not available to the filmmaker anymore, or must be radically rethought. On the basis of the author's current animation project ShakesVRare (a collaboration with the Shakespeare Institute in Stratford-upon-Avon), the essay at hand explains the reasons and challenges for creating a linear narrative in VR and demonstrates possible solutions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "VR enables the viewer to freely choose the point of view: Instead of being bound to a predefined screen format, he/she “becomes” the camera. This poses a huge challenge for communicating a narrative, because essential storytelling tools like framing and editing are not available to the filmmaker anymore, or must be radically rethought. On the basis of the author's current animation project ShakesVRare (a collaboration with the Shakespeare Institute in Stratford-upon-Avon), the essay at hand explains the reasons and challenges for creating a linear narrative in VR and demonstrates possible solutions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "VR enables the viewer to freely choose the point of view: Instead of being bound to a predefined screen format, he/she “becomes” the camera. This poses a huge challenge for communicating a narrative, because essential storytelling tools like framing and editing are not available to the filmmaker anymore, or must be radically rethought. On the basis of the author's current animation project ShakesVRare (a collaboration with the Shakespeare Institute in Stratford-upon-Avon), the essay at hand explains the reasons and challenges for creating a linear narrative in VR and demonstrates possible solutions.",
"fno": "09050929",
"keywords": [
"Computer Animation",
"Interactive Systems",
"Virtual Reality",
"Storytelling Tools",
"Linear Narrative",
"VR Animated Storytelling",
"Screen Format",
"Adaptation",
"VR",
"Visual Storytelling",
"Narrativity",
"Animated Adaptation",
"Shakespeare",
"VR",
"Visual Storytelling",
"Stereoscopic"
],
"authors": [
{
"affiliation": "Nanyang Technological University Singapore",
"fullName": "Hannes Rall",
"givenName": "Hannes",
"surname": "Rall",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "anivae",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-03-01T00:00:00",
"pubType": "proceedings",
"pages": "18-24",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-3229-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09050928",
"articleId": "1iHTatvtWrC",
"__typename": "AdjacentArticleType"
},
"next": null,
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ismar-adjunct/2017/6327/0/6327a253",
"title": "Workshop on VR and AR meet creative industries",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a253/12OmNylKASp",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2017/6327/0",
"title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2018/3365/0/08446522",
"title": "Touchless Haptic Feedback for Supernatural VR Experiences",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2018/08446522/13bd1fWcuDF",
"parentPublication": {
"id": "proceedings/vr/2018/3365/0",
"title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09695173",
"title": "Roslingifier: Semi-Automated Storytelling for Animated Scatterplots",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09695173/1AvqJqAJOKY",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a031",
"title": "Pericles VR: Insights into visual development and gamification of a lesser-known Shakespeare play",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a031/1CJeVETw35e",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imet/2022/7016/0/09929546",
"title": "The Use of Storytelling in Virtual Reality for Studying Empathy: A Review",
"doi": null,
"abstractUrl": "/proceedings-article/imet/2022/09929546/1HYuWrZKF7G",
"parentPublication": {
"id": "proceedings/imet/2022/7016/0",
"title": "2022 International Conference on Interactive Media, Smart Systems and Emerging Technologies (IMET)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2022/5365/0/536500a751",
"title": "Effects of Augmenting Real-Time Biofeedback in An Immersive VR Performance",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a751/1J7WwJHZI4M",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2022/5365/0",
"title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797899",
"title": "A VR Interactive Story Using POV and Flashback for Empathy",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797899/1cJ12bET8XK",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vs-games/2019/4540/0/08864520",
"title": "Actors in VR storytelling",
"doi": null,
"abstractUrl": "/proceedings-article/vs-games/2019/08864520/1e5ZrTyTjc4",
"parentPublication": {
"id": "proceedings/vs-games/2019/4540/0",
"title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/anivae/2019/3229/0/09050930",
"title": "The Library: A Non-Intrusive Gaze Directed Virtual Reality Animation",
"doi": null,
"abstractUrl": "/proceedings-article/anivae/2019/09050930/1iHTaFb1t04",
"parentPublication": {
"id": "proceedings/anivae/2019/3229/0",
"title": "2019 IEEE 2nd Workshop on Animation in Virtual and Augmented Environments (ANIVAE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090454",
"title": "The other way: immersive VR storytelling through biking",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090454/1jIxszQHffq",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1wutzGkF9Zu",
"title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)",
"acronym": "iciddt",
"groupId": "1841164",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1wutIsprwIw",
"doi": "10.1109/ICIDDT52279.2020.00029",
"title": "Rethinking of Artificial Intelligence Storytelling of Digital Media",
"normalizedTitle": "Rethinking of Artificial Intelligence Storytelling of Digital Media",
"abstract": "In the field of narratology and artificial intelligence (AI), AI Agent intervention has been paid attention to for many years. But typical AI researchers often lack the motivation to study the narrative model of humanities. On this basis, this paper combed basic understanding of studies on the AI intervention of narrative. It attempted to construct Generalized Story World Model from the perspective of media and literature genre and to expand AI Storytelling into the scope of electronic literature, hoping to attract the attention of researchers in related fields such as computer science, communication, art, design and psychology, so as to promote the research field into a stage of large number of trial and error as early as possible. Finally, the possibility of cross- media engineering practice of the Story Generator is predicted and inferred.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the field of narratology and artificial intelligence (AI), AI Agent intervention has been paid attention to for many years. But typical AI researchers often lack the motivation to study the narrative model of humanities. On this basis, this paper combed basic understanding of studies on the AI intervention of narrative. It attempted to construct Generalized Story World Model from the perspective of media and literature genre and to expand AI Storytelling into the scope of electronic literature, hoping to attract the attention of researchers in related fields such as computer science, communication, art, design and psychology, so as to promote the research field into a stage of large number of trial and error as early as possible. Finally, the possibility of cross- media engineering practice of the Story Generator is predicted and inferred.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the field of narratology and artificial intelligence (AI), AI Agent intervention has been paid attention to for many years. But typical AI researchers often lack the motivation to study the narrative model of humanities. On this basis, this paper combed basic understanding of studies on the AI intervention of narrative. It attempted to construct Generalized Story World Model from the perspective of media and literature genre and to expand AI Storytelling into the scope of electronic literature, hoping to attract the attention of researchers in related fields such as computer science, communication, art, design and psychology, so as to promote the research field into a stage of large number of trial and error as early as possible. Finally, the possibility of cross- media engineering practice of the Story Generator is predicted and inferred.",
"fno": "036700a112",
"keywords": [
"Artificial Intelligence",
"Humanities",
"Knowledge Based Systems",
"Psychology",
"Typical AI Researchers",
"Literature Genre",
"Electronic Literature",
"Cross Media Engineering Practice",
"Digital Media",
"Artificial Intelligence Storytelling",
"AI Agent Intervention",
"AI Storytelling",
"Generalized Story World Model",
"Computer Science",
"Technological Innovation",
"Art",
"Computational Modeling",
"Psychology",
"Media",
"Generators",
"AI Narrative",
"AI Storytelling",
"Media And Genres",
"Story Generator",
"Digital Media"
],
"authors": [
{
"affiliation": "Beijing Normal University,College of Arts and Media,Beijing,China",
"fullName": "Liu Baiheng",
"givenName": "Liu",
"surname": "Baiheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Beijing Normal University,College of Arts and Media,Beijing,China",
"fullName": "Zhou Wen",
"givenName": "Zhou",
"surname": "Wen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciddt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "112-115",
"year": "2020",
"issn": null,
"isbn": "978-1-6654-0367-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "036700a107",
"articleId": "1wutFza2u6A",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "036700a116",
"articleId": "1wutDQfvCE0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccicc/2015/7290/0/07259423",
"title": "Rethinking Artificial Intelligence",
"doi": null,
"abstractUrl": "/proceedings-article/iccicc/2015/07259423/12OmNvwTGBC",
"parentPublication": {
"id": "proceedings/iccicc/2015/7290/0",
"title": "2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ci/2015/01/06815689",
"title": "Suspenser: a story generation system for suspense",
"doi": null,
"abstractUrl": "/journal/ci/2015/01/06815689/13rRUxk89gI",
"parentPublication": {
"id": "trans/ci",
"title": "IEEE Transactions on Computational Intelligence and AI in Games",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2002/04/x4017",
"title": "Character-Based Interactive Storytelling",
"doi": null,
"abstractUrl": "/magazine/ex/2002/04/x4017/13rRUyY290y",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2018/9605/0/960500a187",
"title": "Personality and Preference Modeling for Adaptive Storytelling",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2018/960500a187/17D45VTRoxd",
"parentPublication": {
"id": "proceedings/sbgames/2018/9605/0",
"title": "2018 17th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compauto/2021/2371/0/237100a045",
"title": "Design and implementation of Virtual characters’ Expression of interactive storytelling",
"doi": null,
"abstractUrl": "/proceedings-article/compauto/2021/237100a045/1BzXpP9uwak",
"parentPublication": {
"id": "proceedings/compauto/2021/2371/0",
"title": "2021 International Conference on Computers and Automation (CompAuto)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/5555/01/09996128",
"title": "Knowledge-enriched Attention Network with Group-wise Semantic for Visual Storytelling",
"doi": null,
"abstractUrl": "/journal/tp/5555/01/09996128/1JilUxkgGC4",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eitt/2022/9248/0/924800a110",
"title": "Ethical Challenges and Strategies of Artificial Intelligence Applications",
"doi": null,
"abstractUrl": "/proceedings-article/eitt/2022/924800a110/1MrSPW3bb20",
"parentPublication": {
"id": "proceedings/eitt/2022/9248/0",
"title": "2022 Eleventh International Conference of Educational Innovation through Technology (EITT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ecit/2020/5902/0/590200a237",
"title": "Artificial Intelligence and Business Innovation",
"doi": null,
"abstractUrl": "/proceedings-article/ecit/2020/590200a237/1lgPIdHPXFK",
"parentPublication": {
"id": "proceedings/ecit/2020/5902/0",
"title": "2020 International Conference on E-Commerce and Internet Technology (ECIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rewbah/2020/8354/0/09216064",
"title": "A Multi-Aspectual Requirements Analysis for Artificial Intelligence for Well-being",
"doi": null,
"abstractUrl": "/proceedings-article/rewbah/2020/09216064/1nJwM5eOuo8",
"parentPublication": {
"id": "proceedings/rewbah/2020/8354/0",
"title": "2020 IEEE First International Workshop on Requirements Engineering for Well-Being, Aging, and Health (REWBAH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciddt/2020/0367/0/036700a064",
"title": "Research on the application of Narratology in the design of Interactive Exhibition space",
"doi": null,
"abstractUrl": "/proceedings-article/iciddt/2020/036700a064/1wutHUvNtEQ",
"parentPublication": {
"id": "proceedings/iciddt/2020/0367/0",
"title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBUAvV0",
"title": "2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)",
"acronym": "icdma",
"groupId": "1800272",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqFJhSW",
"doi": "10.1109/ICDMA.2013.251",
"title": "Research on Insurance Strategy Simulation Model of Engineering Project",
"normalizedTitle": "Research on Insurance Strategy Simulation Model of Engineering Project",
"abstract": "With the development of social economy and technology, the scale of engineering project enlarges continuously, and the risk is growing gradually. As a kind of effective way to share engineering risk, the engineering insurance is becoming the important tool of engineering project risk management, and choosing the efficient engineering insurance strategy is becoming the main emphasis of engineering project risk management. This paper presents that forecasting the risk loss of engineering project to estimate insurance claim amount is the key of engineering insurance strategy choice by insurance operation system analysis of engineering project. Based on this idea, this paper structures engineering project insurance strategy SD simulation model, and proves it with the simulation example of A bridge construction projects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the development of social economy and technology, the scale of engineering project enlarges continuously, and the risk is growing gradually. As a kind of effective way to share engineering risk, the engineering insurance is becoming the important tool of engineering project risk management, and choosing the efficient engineering insurance strategy is becoming the main emphasis of engineering project risk management. This paper presents that forecasting the risk loss of engineering project to estimate insurance claim amount is the key of engineering insurance strategy choice by insurance operation system analysis of engineering project. Based on this idea, this paper structures engineering project insurance strategy SD simulation model, and proves it with the simulation example of A bridge construction projects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the development of social economy and technology, the scale of engineering project enlarges continuously, and the risk is growing gradually. As a kind of effective way to share engineering risk, the engineering insurance is becoming the important tool of engineering project risk management, and choosing the efficient engineering insurance strategy is becoming the main emphasis of engineering project risk management. This paper presents that forecasting the risk loss of engineering project to estimate insurance claim amount is the key of engineering insurance strategy choice by insurance operation system analysis of engineering project. Based on this idea, this paper structures engineering project insurance strategy SD simulation model, and proves it with the simulation example of A bridge construction projects.",
"fno": "5016b069",
"keywords": [
"Insurance",
"Accidents",
"Analytical Models",
"Instruments",
"Investment",
"Mathematical Model",
"Real Time Systems",
"Simulation Model",
"Engineering Project",
"Insurance Strategy",
"System Dynamics"
],
"authors": [
{
"affiliation": null,
"fullName": "Shi Zhao",
"givenName": "Shi",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1069-1072",
"year": "2013",
"issn": null,
"isbn": "978-0-7695-5016-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5016b066",
"articleId": "12OmNzYwciM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5016b073",
"articleId": "12OmNCfSqJw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cso/2014/5372/0/5372a373",
"title": "Impact of the Concerns over Exogenous Factors towards the Insurance Purchase: A Study in Hong Kong Insurance Market",
"doi": null,
"abstractUrl": "/proceedings-article/cso/2014/5372a373/12OmNB7cjla",
"parentPublication": {
"id": "proceedings/cso/2014/5372/0",
"title": "2014 Seventh International Joint Conference on Computational Sciences and Optimization (CSO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciii/2011/4523/3/4523c082",
"title": "Applied Research on Capital Asset Pricing Model in Premium Rate Making of Engineering Earthquake Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/iciii/2011/4523c082/12OmNCcbEf1",
"parentPublication": {
"id": "proceedings/iciii/2011/4523/3",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2011/4527/0/4527a671",
"title": "Insurance Funds Involved in the Affordable Housing Construction Investment for Risk Management",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2011/4527a671/12OmNqJq4vb",
"parentPublication": {
"id": "proceedings/bife/2011/4527/0",
"title": "2011 Fourth International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mcsi/2017/2820/0/2820a196",
"title": "Designing Model for Calculating the Amount of Cyber Risk Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/mcsi/2017/2820a196/12OmNvAiSpr",
"parentPublication": {
"id": "proceedings/mcsi/2017/2820/0",
"title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2013/4777/0/4777a324",
"title": "Effect of Affordability on Insurance Purchase in Hong Kong",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2013/4777a324/12OmNvSbBI9",
"parentPublication": {
"id": "proceedings/bife/2013/4777/0",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icci/2006/0475/2/04216522",
"title": "Risk Management in International Mutual Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icci/2006/04216522/12OmNvjyxwt",
"parentPublication": {
"id": "proceedings/icci/2006/0475/2",
"title": "Cognitive Informatics, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsgea/2016/3578/0/07733816",
"title": "Optimization of BMS in Motor Vehicle Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icsgea/2016/07733816/12OmNwEJ0Yb",
"parentPublication": {
"id": "proceedings/icsgea/2016/3578/0",
"title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997b868",
"title": "Novel Method for Fishery Supply Chain Risk Diversity and Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997b868/12OmNxxdZDp",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isuma/1993/3850/0/00366756",
"title": "Total quality engineering, failure analysis and stochastic process evaluation of engineering project alternatives",
"doi": null,
"abstractUrl": "/proceedings-article/isuma/1993/00366756/12OmNy2Jt9P",
"parentPublication": {
"id": "proceedings/isuma/1993/3850/0",
"title": "1993 (2nd) International Symposium on Uncertainty Modeling and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsgea/2016/3578/0/07733821",
"title": "Research on Risk Classification Based on AHP in Automobile Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icsgea/2016/07733821/12OmNywfKDW",
"parentPublication": {
"id": "proceedings/icsgea/2016/3578/0",
"title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBzRNsj",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"acronym": "bife",
"groupId": "1002841",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyuPKZQ",
"doi": "10.1109/BIFE.2013.80",
"title": "Theoretical Mechanism and Empirical Analysis about the Impact on Insurance Intervene SME Financing",
"normalizedTitle": "Theoretical Mechanism and Empirical Analysis about the Impact on Insurance Intervene SME Financing",
"abstract": "In order to study the influence of insurance intervene SME financing, by selecting the industrial SME data and property insurance company credit guarantee insurance data of 31 provinces, autonomous regions and municipalities from 2005 to 2011, build individual fixed effect panel data model, use insurance this factor as the explanatory variable, to consider the impact on insurance intervene SME financing. The results show that the involvement of insurance has a positive role on SME financing, and it also has a significant impact when time variable exists. Finally optimize the model, build a bidirectional fixed effect panel data model. The innovation point of this paper is quantization of insurance factors. Finally, put forward several policy suggestions from three aspects: insurance company, enterprise itself and the government.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to study the influence of insurance intervene SME financing, by selecting the industrial SME data and property insurance company credit guarantee insurance data of 31 provinces, autonomous regions and municipalities from 2005 to 2011, build individual fixed effect panel data model, use insurance this factor as the explanatory variable, to consider the impact on insurance intervene SME financing. The results show that the involvement of insurance has a positive role on SME financing, and it also has a significant impact when time variable exists. Finally optimize the model, build a bidirectional fixed effect panel data model. The innovation point of this paper is quantization of insurance factors. Finally, put forward several policy suggestions from three aspects: insurance company, enterprise itself and the government.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to study the influence of insurance intervene SME financing, by selecting the industrial SME data and property insurance company credit guarantee insurance data of 31 provinces, autonomous regions and municipalities from 2005 to 2011, build individual fixed effect panel data model, use insurance this factor as the explanatory variable, to consider the impact on insurance intervene SME financing. The results show that the involvement of insurance has a positive role on SME financing, and it also has a significant impact when time variable exists. Finally optimize the model, build a bidirectional fixed effect panel data model. The innovation point of this paper is quantization of insurance factors. Finally, put forward several policy suggestions from three aspects: insurance company, enterprise itself and the government.",
"fno": "4777a382",
"keywords": [
"Insurance",
"Indexes",
"Standards",
"Companies",
"Robustness",
"Data Models",
"Hausman Test",
"Insurance Intervene",
"SME Financing",
"Cluster Robust Standard Error"
],
"authors": [
{
"affiliation": null,
"fullName": "Daijun Zhang",
"givenName": "Daijun",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mengna Hou",
"givenName": "Mengna",
"surname": "Hou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Huiling He",
"givenName": "Huiling",
"surname": "He",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bife",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-11-01T00:00:00",
"pubType": "proceedings",
"pages": "382-386",
"year": "2013",
"issn": null,
"isbn": "978-1-4799-4777-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4777a378",
"articleId": "12OmNwF0BZG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4777a387",
"articleId": "12OmNBDQbmG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/chinacom/2015/8795/0/07498004",
"title": "Usage-based insurance system based on carrier-cloud-client",
"doi": null,
"abstractUrl": "/proceedings-article/chinacom/2015/07498004/12OmNC1Guau",
"parentPublication": {
"id": "proceedings/chinacom/2015/8795/0",
"title": "2015 10th International Conference on Communications and Networking in China (ChinaCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2018/5114/0/511401a369",
"title": "Real Estate SMEs Debt Financing Efficiency Matter - Element Evaluation Method",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2018/511401a369/12OmNCdk2Hr",
"parentPublication": {
"id": "proceedings/icmtma/2018/5114/0",
"title": "2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciii/2011/4523/2/4523b387",
"title": "The Impact of Industry Website on the SME Financing",
"doi": null,
"abstractUrl": "/proceedings-article/iciii/2011/4523b387/12OmNqJ8tgC",
"parentPublication": {
"id": "proceedings/iciii/2011/4523/2",
"title": "International Conference on Information Management, Innovation Management and Industrial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mcsi/2017/2820/0/2820a196",
"title": "Designing Model for Calculating the Amount of Cyber Risk Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/mcsi/2017/2820a196/12OmNvAiSpr",
"parentPublication": {
"id": "proceedings/mcsi/2017/2820/0",
"title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2013/4777/0/4777a310",
"title": "The Operating Performance of Agricultural Insurance Companies: Empirical Analysis for China",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2013/4777a310/12OmNxYtubK",
"parentPublication": {
"id": "proceedings/bife/2013/4777/0",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2015/7644/0/7644a089",
"title": "A Research on the Financing Efficiency of Small and Medium-Sized Enterprises by Fuzzy Evaluation Method",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2015/7644a089/12OmNyYm2Ep",
"parentPublication": {
"id": "proceedings/icicta/2015/7644/0",
"title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258437",
"title": "Insurance premium optimization using motor insurance policies — A business growth classification approach",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258437/17D45VWpMzz",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbfd/2021/1227/0/122700a405",
"title": "Does Digital Financial Inclusion Promote SME Innovation? : -- Evidence from SMEs listed companies",
"doi": null,
"abstractUrl": "/proceedings-article/cbfd/2021/122700a405/1CJfBfhIRvq",
"parentPublication": {
"id": "proceedings/cbfd/2021/1227/0",
"title": "2021 International Conference on Computer, Blockchain and Financial Development (CBFD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdicn/2022/8476/0/847600a664",
"title": "Research on Renewal Prediction of Life Insurance Policy Based on Back Propagation (BP) Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/bdicn/2022/847600a664/1CJg0DOWYvu",
"parentPublication": {
"id": "proceedings/bdicn/2022/8476/0",
"title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icei/2019/1493/0/149300a466",
"title": "An Insurance-Based Pricing Method of Power Supply Reliability in Electricity Retail Market",
"doi": null,
"abstractUrl": "/proceedings-article/icei/2019/149300a466/1cksebM1cnC",
"parentPublication": {
"id": "proceedings/icei/2019/1493/0",
"title": "2019 IEEE International Conference on Energy Internet (ICEI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKipN",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WODasZ",
"doi": "10.1109/BigData.2017.8258557",
"title": "A study on interpretability of decision of machine learning",
"normalizedTitle": "A study on interpretability of decision of machine learning",
"abstract": "Machine learning is one of the most important fields in recent improvement in big data analysis. Many people apply machine learning for a variety of domains for various purposes, such as classification of opinions. However, the constructed models of machine learning are black boxes. They cannot understand the background reason for their decisions. In many cases, understanding the reasons important. In this paper, we focus on interpretation of models and understanding of decision reasons. First, we introduce the results of an opinions classification of the reviews with Support Vector Machine (SVM). Second, we interpret the model by analyzing weights of the model. Third, we introduce a method for helping to understand the reasons for a decision by SVM by providing a simplified information of the highly weighted words.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Machine learning is one of the most important fields in recent improvement in big data analysis. Many people apply machine learning for a variety of domains for various purposes, such as classification of opinions. However, the constructed models of machine learning are black boxes. They cannot understand the background reason for their decisions. In many cases, understanding the reasons important. In this paper, we focus on interpretation of models and understanding of decision reasons. First, we introduce the results of an opinions classification of the reviews with Support Vector Machine (SVM). Second, we interpret the model by analyzing weights of the model. Third, we introduce a method for helping to understand the reasons for a decision by SVM by providing a simplified information of the highly weighted words.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Machine learning is one of the most important fields in recent improvement in big data analysis. Many people apply machine learning for a variety of domains for various purposes, such as classification of opinions. However, the constructed models of machine learning are black boxes. They cannot understand the background reason for their decisions. In many cases, understanding the reasons important. In this paper, we focus on interpretation of models and understanding of decision reasons. First, we introduce the results of an opinions classification of the reviews with Support Vector Machine (SVM). Second, we interpret the model by analyzing weights of the model. Third, we introduce a method for helping to understand the reasons for a decision by SVM by providing a simplified information of the highly weighted words.",
"fno": "08258557",
"keywords": [
"Support Vector Machines",
"DVD",
"Analytical Models",
"Predictive Models",
"Training",
"Big Data",
"Tools",
"SVM",
"Machine Learning",
"Interpretability"
],
"authors": [
{
"affiliation": "Department of Information and Communications Engineering, Kogakuin University Graduate School, Tokyo, Japan",
"fullName": "Shohei Shirataki",
"givenName": "Shohei",
"surname": "Shirataki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Information and Communications Engineering, Kogakuin University Graduate School, Tokyo, Japan",
"fullName": "Saneyasu Yamaguchi",
"givenName": "Saneyasu",
"surname": "Yamaguchi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "4830-4831",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2715-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08258556",
"articleId": "17D45WHONke",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08258558",
"articleId": "17D45XoXP4Z",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bdva/2015/7343/0/07314299",
"title": "Machine Learning and Visual Analytics for Consulting Business Decision Support",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2015/07314299/12OmNAYoKiF",
"parentPublication": {
"id": "proceedings/bdva/2015/7343/0",
"title": "2015 Big Data Visual Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/bd/2020/02/07725951",
"title": "Comparison of Different Machine Learning Approaches to Predict Small for Gestational Age Infants",
"doi": null,
"abstractUrl": "/journal/bd/2020/02/07725951/13rRUwjXZLI",
"parentPublication": {
"id": "trans/bd",
"title": "IEEE Transactions on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671939",
"title": "A Big Data Experiment to Evaluate the Effectiveness of Traditional Machine Learning Techniques Against LSTM Neural Networks in the Hotels Clients Opinion Mining",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671939/1A8gLlBT5WE",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09671501",
"title": "Evaluating Attribution Methods in Machine Learning Interpretability",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09671501/1A8jnddrCEw",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/06/09695246",
"title": "StrategyAtlas: Strategy Analysis for Machine Learning Interpretability",
"doi": null,
"abstractUrl": "/journal/tg/2023/06/09695246/1AvqJVgygfe",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisce/2019/3681/0/368100a595",
"title": "Research on Machine Learning Methods for Intelligent Decision Problems",
"doi": null,
"abstractUrl": "/proceedings-article/cisce/2019/368100a595/1cI5UFgw7iE",
"parentPublication": {
"id": "proceedings/cisce/2019/3681/0",
"title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2019/2286/0/228600a275",
"title": "Interpretability in HealthCare A Comparative Study of Local Machine Learning Interpretability Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2019/228600a275/1cdNZ7L3f0c",
"parentPublication": {
"id": "proceedings/cbms/2019/2286/0",
"title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2019/2999/0/08969742",
"title": "Using Machine Learning to Study Flu Vaccines Opinions of Twitter Users",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2019/08969742/1h0JOWZSFeo",
"parentPublication": {
"id": "proceedings/iscc/2019/2999/0",
"title": "2019 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09377792",
"title": "Test Set Optimization by Machine Learning Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09377792/1s64txS51vy",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd-winter/2021/1843/0/184300a243",
"title": "A machine learning approach for opinion mining online customer reviews",
"doi": null,
"abstractUrl": "/proceedings-article/snpd-winter/2021/184300a243/1sQKa6iYhIk",
"parentPublication": {
"id": "proceedings/snpd-winter/2021/1843/0",
"title": "2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKirR",
"title": "2018 2nd International Conference on Data Science and Business Analytics (ICDSBA)",
"acronym": "icdsba",
"groupId": "1829705",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WYQJ6Q",
"doi": "10.1109/ICDSBA.2018.00084",
"title": "Analysis of the Solvency Adequacy Ratio for Small and Medium-Sized Non-Life Insurance Companies in China",
"normalizedTitle": "Analysis of the Solvency Adequacy Ratio for Small and Medium-Sized Non-Life Insurance Companies in China",
"abstract": "With the gradual expansion of our insurance company business, the risks are increasing, and the problem of insolvency of insurance companies is becoming apparent. Therefore, the research on the solvency adequacy ratio has become one of the hot topics in the academic field. Since the commissioning of the second generation solvency supervision system (C-ROSS) in 2015, a series of changes have taken place in the solvency of insurance companies. This paper firstly applied the data of 50 groups of small and medium-sized non life insurance companies from 2010 to 2014 based on the new changes after the C-ROSS trial operation to analyze the internal factors of solvency adequacy by using the data of 40 groups of them based on the multivariate statistical analysis. Then, the validity of the model was verified by 10 other groups of data. Through verification, the model can describe the solvency adequacy rate of small and medium-sized non-life insurance companies in China well. Finally, some meaningful policy suggestions were put forward.",
"abstracts": [
{
"abstractType": "Regular",
"content": "With the gradual expansion of our insurance company business, the risks are increasing, and the problem of insolvency of insurance companies is becoming apparent. Therefore, the research on the solvency adequacy ratio has become one of the hot topics in the academic field. Since the commissioning of the second generation solvency supervision system (C-ROSS) in 2015, a series of changes have taken place in the solvency of insurance companies. This paper firstly applied the data of 50 groups of small and medium-sized non life insurance companies from 2010 to 2014 based on the new changes after the C-ROSS trial operation to analyze the internal factors of solvency adequacy by using the data of 40 groups of them based on the multivariate statistical analysis. Then, the validity of the model was verified by 10 other groups of data. Through verification, the model can describe the solvency adequacy rate of small and medium-sized non-life insurance companies in China well. Finally, some meaningful policy suggestions were put forward.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "With the gradual expansion of our insurance company business, the risks are increasing, and the problem of insolvency of insurance companies is becoming apparent. Therefore, the research on the solvency adequacy ratio has become one of the hot topics in the academic field. Since the commissioning of the second generation solvency supervision system (C-ROSS) in 2015, a series of changes have taken place in the solvency of insurance companies. This paper firstly applied the data of 50 groups of small and medium-sized non life insurance companies from 2010 to 2014 based on the new changes after the C-ROSS trial operation to analyze the internal factors of solvency adequacy by using the data of 40 groups of them based on the multivariate statistical analysis. Then, the validity of the model was verified by 10 other groups of data. Through verification, the model can describe the solvency adequacy rate of small and medium-sized non-life insurance companies in China well. Finally, some meaningful policy suggestions were put forward.",
"fno": "843100a411",
"keywords": [
"Financial Management",
"Insurance",
"Small To Medium Enterprises",
"Statistical Analysis",
"Insurance Company Business",
"Solvency Adequacy Rate",
"Solvency Adequacy Ratio Analysis",
"Small And Medium Sized Nonlife Insurance Companies",
"China",
"Second Generation Solvency Supervision System",
"Multivariate Statistical Analysis",
"Insurance",
"Companies",
"Analytical Models",
"Data Models",
"Predictive Models",
"Correlation",
"C ROSS Trial Operation",
"Multivariate Statistics",
"Solvency Adequacy Ratio",
"Influencing Factors"
],
"authors": [
{
"affiliation": null,
"fullName": "Liang Zhang",
"givenName": "Liang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jinggui Gao",
"givenName": "Jinggui",
"surname": "Gao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdsba",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-09-01T00:00:00",
"pubType": "proceedings",
"pages": "411-416",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-8431-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "843100a406",
"articleId": "17D45WIXbPV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "843100a417",
"articleId": "17D45VsBU18",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsgea/2016/3578/0/07733799",
"title": "Analyzing the Operating Performance of Insurance Companies Based on DEA Model under the Perspective of New Insurance Law",
"doi": null,
"abstractUrl": "/proceedings-article/icsgea/2016/07733799/12OmNwDAC4f",
"parentPublication": {
"id": "proceedings/icsgea/2016/3578/0",
"title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdcsw/2016/3686/0/5878a043",
"title": "Machine Learning-Based Elastic Cloud Resource Provisioning in the Solvency II Framework",
"doi": null,
"abstractUrl": "/proceedings-article/icdcsw/2016/5878a043/12OmNwHhoX7",
"parentPublication": {
"id": "proceedings/icdcsw/2016/3686/0",
"title": "2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icscse/2017/1401/0/1401a089",
"title": "Retracted: Study on Insurance Company Operating Performance Analysis Method with the DEA Model",
"doi": null,
"abstractUrl": "/proceedings-article/icscse/2017/1401a089/12OmNx7ouJ3",
"parentPublication": {
"id": "proceedings/icscse/2017/1401/0",
"title": "2017 International Conference on Smart City and Systems Engineering (ICSCSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997d916",
"title": "Dynamic Comprehensive Evaluation of Property Insurance Companies' Business Performance",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997d916/12OmNxWcHhE",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2013/4777/0/4777a310",
"title": "The Operating Performance of Agricultural Insurance Companies: Empirical Analysis for China",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2013/4777a310/12OmNxYtubK",
"parentPublication": {
"id": "proceedings/bife/2013/4777/0",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258437",
"title": "Insurance premium optimization using motor insurance policies — A business growth classification approach",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258437/17D45VWpMzz",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aibt/2021/3267/0/326700a101",
"title": "Lightning Insurance: A Fast Claim, High Accuracy Insurance Platform Based on Blockchain Technology and NASNET Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/aibt/2021/326700a101/1AINvBkygc8",
"parentPublication": {
"id": "proceedings/aibt/2021/3267/0",
"title": "2021 International Conference on Artificial Intelligence and Blockchain Technology (AIBT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icemme/2019/5588/0/558800a501",
"title": "Application of GARCH-CoVaR in Systematic Risk Measurement of Listed Insurance Companies in China",
"doi": null,
"abstractUrl": "/proceedings-article/icemme/2019/558800a501/1hrLjxYeYeY",
"parentPublication": {
"id": "proceedings/icemme/2019/5588/0",
"title": "2019 International Conference on Economic Management and Model Engineering (ICEMME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscv/2020/8041/0/09204181",
"title": "Multi-agent simulation of the Moroccan conventional insurance sector",
"doi": null,
"abstractUrl": "/proceedings-article/iscv/2020/09204181/1nmibJ1B5IY",
"parentPublication": {
"id": "proceedings/iscv/2020/8041/0",
"title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2021/3960/0/396000a325",
"title": "Improve the interpretability by decision tree regression: exampled by an insurance dataset",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2021/396000a325/1xqyNoaarx6",
"parentPublication": {
"id": "proceedings/icceai/2021/3960/0",
"title": "2021 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1B2HjhKQREs",
"title": "2021 International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)",
"acronym": "iceitsa",
"groupId": "1845684",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1B2HqYhnS9y",
"doi": "10.1109/ICEITSA54226.2021.00097",
"title": "Machine Learning in Insurance Underwriting Context",
"normalizedTitle": "Machine Learning in Insurance Underwriting Context",
"abstract": "This paper discusses different machine learning models that can be used for insurance underwriting. The underwriting process for insurance is conventionally done by well-trained individuals, but the whole process is time-consuming and tedious, especially as the applications are getting increasingly more complex nowadays. The advancement in technology has enabled us to seek an alternative solution to this tedious and labor-intensive process of underwriting. Many believe that tools from Artificial Intelligence and more specifically, methods in Machine Learning, can provide time-efficient and accurate evaluations of risk. Using the publicly available dataset from Prudential Insurance, several feature engineering methods are implemented and tested for their usefulness. Specifically, kth nearest neighbor, multinomial logistic regression, random forest, and gradient boosting trees are fitted, and gradient boosting is shown to have the best performance and robustness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper discusses different machine learning models that can be used for insurance underwriting. The underwriting process for insurance is conventionally done by well-trained individuals, but the whole process is time-consuming and tedious, especially as the applications are getting increasingly more complex nowadays. The advancement in technology has enabled us to seek an alternative solution to this tedious and labor-intensive process of underwriting. Many believe that tools from Artificial Intelligence and more specifically, methods in Machine Learning, can provide time-efficient and accurate evaluations of risk. Using the publicly available dataset from Prudential Insurance, several feature engineering methods are implemented and tested for their usefulness. Specifically, kth nearest neighbor, multinomial logistic regression, random forest, and gradient boosting trees are fitted, and gradient boosting is shown to have the best performance and robustness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper discusses different machine learning models that can be used for insurance underwriting. The underwriting process for insurance is conventionally done by well-trained individuals, but the whole process is time-consuming and tedious, especially as the applications are getting increasingly more complex nowadays. The advancement in technology has enabled us to seek an alternative solution to this tedious and labor-intensive process of underwriting. Many believe that tools from Artificial Intelligence and more specifically, methods in Machine Learning, can provide time-efficient and accurate evaluations of risk. Using the publicly available dataset from Prudential Insurance, several feature engineering methods are implemented and tested for their usefulness. Specifically, kth nearest neighbor, multinomial logistic regression, random forest, and gradient boosting trees are fitted, and gradient boosting is shown to have the best performance and robustness.",
"fno": "130000a478",
"keywords": [
"Learning Artificial Intelligence",
"Regression Analysis",
"Trees Mathematics",
"Prudential Insurance",
"Feature Engineering Methods",
"Insurance Underwriting Context",
"Underwriting Process",
"Well Trained Individuals",
"Tedious Labor Intensive Process",
"Publicly Available Dataset",
"Training",
"Insurance",
"Predictive Models",
"Boosting",
"Robustness",
"Numerical Models",
"Random Forests",
"Machine Learning",
"Insurance Underwriting",
"Algorithms",
"Regression",
"Random Forest",
"Gradient Boosting"
],
"authors": [
{
"affiliation": "Nanjing Foreign Language School,Nanjing,China,21000",
"fullName": "Boyue Yang",
"givenName": "Boyue",
"surname": "Yang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iceitsa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "478-484",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1300-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "130000a474",
"articleId": "1B2HBDIrJao",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "130000a485",
"articleId": "1B2HwCCVXQA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icci/2006/0475/2/04216522",
"title": "Risk Management in International Mutual Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/icci/2006/04216522/12OmNvjyxwt",
"parentPublication": {
"id": "proceedings/icci/2006/0475/2",
"title": "Cognitive Informatics, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2007/2755/0/27550064c",
"title": "Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2007/27550064c/12OmNvwTGFw",
"parentPublication": {
"id": "proceedings/hicss/2007/2755/0",
"title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnds/2009/3635/2/3635b181",
"title": "Insurance Information Management in China",
"doi": null,
"abstractUrl": "/proceedings-article/icnds/2009/3635b181/12OmNzuZUDG",
"parentPublication": {
"id": "proceedings/icnds/2009/3635/1",
"title": "2009 International Conference on Networking and Digital Society (ICNDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aibt/2021/3267/0/326700a101",
"title": "Lightning Insurance: A Fast Claim, High Accuracy Insurance Platform Based on Blockchain Technology and NASNET Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/aibt/2021/326700a101/1AINvBkygc8",
"parentPublication": {
"id": "proceedings/aibt/2021/3267/0",
"title": "2021 International Conference on Artificial Intelligence and Blockchain Technology (AIBT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2022/9978/0/997800a725",
"title": "Agricultural insurance demand forecasting model based on support vector machine",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2022/997800a725/1Byem6zXua4",
"parentPublication": {
"id": "proceedings/icmtma/2022/9978/0",
"title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2021/5841/0/584100a290",
"title": "Insurance Reserve Prediction: Opportunities and Challenges",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2021/584100a290/1EpLzZw1SmY",
"parentPublication": {
"id": "proceedings/csci/2021/5841/0",
"title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icphds/2020/8571/0/857100a227",
"title": "SICR-Based Insurance Pricing of Hepatitis B Virus in China",
"doi": null,
"abstractUrl": "/proceedings-article/icphds/2020/857100a227/1rxhtEPRvSE",
"parentPublication": {
"id": "proceedings/icphds/2020/8571/0",
"title": "2020 International Conference on Public Health and Data Science (ICPHDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09378018",
"title": "Machine Learning Methods for Anomaly Detection in Industrial Control Systems",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09378018/1s64V1fuB1e",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icemme/2020/9144/0/914400a202",
"title": "Research on Motor Vehicle Insurance in China",
"doi": null,
"abstractUrl": "/proceedings-article/icemme/2020/914400a202/1tV9kQR1UMU",
"parentPublication": {
"id": "proceedings/icemme/2020/9144/0",
"title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/caibda/2021/2490/0/249000a009",
"title": "Research on Mobile Caravan Insurance Recommendation Method Based on Machine Learning",
"doi": null,
"abstractUrl": "/proceedings-article/caibda/2021/249000a009/1xgBlH67oti",
"parentPublication": {
"id": "proceedings/caibda/2021/2490/0",
"title": "2021 International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1Byek4Mxh9m",
"title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"acronym": "icmtma",
"groupId": "1002837",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1Byem6zXua4",
"doi": "10.1109/ICMTMA54903.2022.00149",
"title": "Agricultural insurance demand forecasting model based on support vector machine",
"normalizedTitle": "Agricultural insurance demand forecasting model based on support vector machine",
"abstract": "In order to improve the accuracy of agricultural insurance cost prediction and the satisfaction of insurance demand prediction, a new agricultural insurance demand prediction model based on support vector machine is proposed in this paper. Firstly, the large number rule is used to calculate the characteristics of the sample data, and the agricultural insurance demand data are fully mined according to the feature ranking results. Secondly, based on the mining results, the range transformation method is used to preprocess the historical agricultural insurance data. Finally, the weight of insurance data is calculated, and the global and local kernel functions are combined to complete the construction of support vector machine. Input insurance demand data samples into support vector machine, and the result is the prediction result of agricultural insurance demand. The comparative experimental results show that compared with other traditional prediction models, this model can accurately predict the cost of agricultural insurance, and has high user satisfaction. Therefore, it shows that the practical application performance of the model in this paper is strong.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to improve the accuracy of agricultural insurance cost prediction and the satisfaction of insurance demand prediction, a new agricultural insurance demand prediction model based on support vector machine is proposed in this paper. Firstly, the large number rule is used to calculate the characteristics of the sample data, and the agricultural insurance demand data are fully mined according to the feature ranking results. Secondly, based on the mining results, the range transformation method is used to preprocess the historical agricultural insurance data. Finally, the weight of insurance data is calculated, and the global and local kernel functions are combined to complete the construction of support vector machine. Input insurance demand data samples into support vector machine, and the result is the prediction result of agricultural insurance demand. The comparative experimental results show that compared with other traditional prediction models, this model can accurately predict the cost of agricultural insurance, and has high user satisfaction. Therefore, it shows that the practical application performance of the model in this paper is strong.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to improve the accuracy of agricultural insurance cost prediction and the satisfaction of insurance demand prediction, a new agricultural insurance demand prediction model based on support vector machine is proposed in this paper. Firstly, the large number rule is used to calculate the characteristics of the sample data, and the agricultural insurance demand data are fully mined according to the feature ranking results. Secondly, based on the mining results, the range transformation method is used to preprocess the historical agricultural insurance data. Finally, the weight of insurance data is calculated, and the global and local kernel functions are combined to complete the construction of support vector machine. Input insurance demand data samples into support vector machine, and the result is the prediction result of agricultural insurance demand. The comparative experimental results show that compared with other traditional prediction models, this model can accurately predict the cost of agricultural insurance, and has high user satisfaction. Therefore, it shows that the practical application performance of the model in this paper is strong.",
"fno": "997800a725",
"keywords": [
"Agriculture",
"Costing",
"Data Mining",
"Demand Forecasting",
"Insurance",
"Support Vector Machines",
"Support Vector Machine",
"Agricultural Insurance Demand Forecasting Model",
"Agricultural Insurance Cost Prediction",
"Agricultural Insurance Demand Prediction Model",
"Feature Ranking",
"Mining Results",
"Historical Agricultural Insurance Data",
"Insurance Demand Data",
"Range Transformation Method",
"Local Kernel Functions",
"Support Vector Machines",
"Costs",
"Mechatronics",
"Neural Networks",
"Insurance",
"Demand Forecasting",
"Predictive Models",
"Support Vector Machine",
"Agricultural Insurance",
"Demandforecast",
"Prediction Model"
],
"authors": [
{
"affiliation": "Harbin University of Commerce,School of Public Finance and Administration,Harbin,China,150028",
"fullName": "Lingling Qin",
"givenName": "Lingling",
"surname": "Qin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Harbin Finance University,School of Investment and Insurance,Harbin,China,150030",
"fullName": "Bo Liu",
"givenName": "Bo",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmtma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-01-01T00:00:00",
"pubType": "proceedings",
"pages": "725-728",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9978-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "997800a718",
"articleId": "1ByeQaliKnS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "997800a729",
"articleId": "1ByePyuYtcA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/act/2010/4269/0/4269a188",
"title": "Fuzzy Rule Base for Analytical Demand Forecasting Enhancement",
"doi": null,
"abstractUrl": "/proceedings-article/act/2010/4269a188/12OmNCmpcGL",
"parentPublication": {
"id": "proceedings/act/2010/4269/0",
"title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2009/3896/0/3896b358",
"title": "Research on Compulsory Inherent Defect Insurance of Building in China",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2009/3896b358/12OmNvjQ8Hz",
"parentPublication": {
"id": "proceedings/iccit/2009/3896/0",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2010/4116/0/4116a390",
"title": "Market Failure and Supply Model of Chinese Agricultural Insurance",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2010/4116a390/12OmNwHyZXl",
"parentPublication": {
"id": "proceedings/bife/2010/4116/0",
"title": "2010 Third International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2009/3705/0/3705a302",
"title": "Tools for a New Demand Forecasting Paradigm 'Individual Demand Forecasting'",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2009/3705a302/12OmNx1Iwau",
"parentPublication": {
"id": "proceedings/bife/2009/3705/0",
"title": "2009 International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2013/4777/0/4777a310",
"title": "The Operating Performance of Agricultural Insurance Companies: Empirical Analysis for China",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2013/4777a310/12OmNxYtubK",
"parentPublication": {
"id": "proceedings/bife/2013/4777/0",
"title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2010/4116/0/4116a099",
"title": "Mechanism for a New Demand Forecasting Paradigm 'Individual Demand Forecasting'",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2010/4116a099/12OmNym2c6R",
"parentPublication": {
"id": "proceedings/bife/2010/4116/0",
"title": "2010 Third International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/amige/2008/3694/0/04721515",
"title": "Forecasting Agricultural Production via Generalized Regression Neural Network",
"doi": null,
"abstractUrl": "/proceedings-article/amige/2008/04721515/12OmNyv7m2Y",
"parentPublication": {
"id": "proceedings/amige/2008/3694/0",
"title": "2008 IEEE Symposium on Advanced Management of Information for Globalized Enterprises, AMIGE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aie/2022/7400/0/740000a232",
"title": "Power Material Demand Forecasting Method Based on Support Vector Regression Machine",
"doi": null,
"abstractUrl": "/proceedings-article/aie/2022/740000a232/1GZjhLShxQI",
"parentPublication": {
"id": "proceedings/aie/2022/7400/0",
"title": "2022 International Conference on Artificial Intelligence in Everything (AIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitm/2021/3585/0/358500a106",
"title": "Prediction of Agricultural Products Cold Chain Logistics Demand in Sichuan Based on Metabolic GM (1, 1) Model",
"doi": null,
"abstractUrl": "/proceedings-article/icitm/2021/358500a106/1uOvOhn9M9a",
"parentPublication": {
"id": "proceedings/icitm/2021/3585/0",
"title": "2021 10th International Conference on Industrial Technology and Management (ICITM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/it/2021/06/09655392",
"title": "Blockchain-Based Smart Contracts to Provide Crop Insurance for Smallholder Farmers in Developing Countries",
"doi": null,
"abstractUrl": "/magazine/it/2021/06/09655392/1zpnO80OHZu",
"parentPublication": {
"id": "mags/it",
"title": "IT Professional",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.