data
dict
{ "proceeding": { "id": "12OmNzzxuy8", "title": "2013 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdtwco", "doi": "10.1109/CW.2013.75", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "normalizedTitle": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "abstract": "Shadow mapping is an efficient method to generate shadows in real time computer graphics and has broad variations from hard to soft shadow synthesis. Soft shadowing based on shadow mapping is a blurring technique on a shadow map or on screen space. Blurring on screen space can easily combine with a deferred shading pipeline. However, blurring on screen space has a drawback: the generated shadow is not correct when a view direction has a large angle to the normal of the shadowed plane. In this paper, we introduce a new screen space based method for soft shadowing that is faster and generates more accurate soft shadows than the previous screen space soft shadow mapping method. The resultant images show shadows by our method just stand in the same place, while shadows by the previous method change in terms of penumbra while the view moves. Surprisingly, although our method is more complex than the previous method, the measurement of the calculation time shows our method is also faster than the previous method. This is because our method controls the blurring area more accurately and thus successfully reduces multiplications for blurring.", "abstracts": [ { "abstractType": "Regular", "content": "Shadow mapping is an efficient method to generate shadows in real time computer graphics and has broad variations from hard to soft shadow synthesis. Soft shadowing based on shadow mapping is a blurring technique on a shadow map or on screen space. Blurring on screen space can easily combine with a deferred shading pipeline. However, blurring on screen space has a drawback: the generated shadow is not correct when a view direction has a large angle to the normal of the shadowed plane. In this paper, we introduce a new screen space based method for soft shadowing that is faster and generates more accurate soft shadows than the previous screen space soft shadow mapping method. The resultant images show shadows by our method just stand in the same place, while shadows by the previous method change in terms of penumbra while the view moves. Surprisingly, although our method is more complex than the previous method, the measurement of the calculation time shows our method is also faster than the previous method. This is because our method controls the blurring area more accurately and thus successfully reduces multiplications for blurring.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shadow mapping is an efficient method to generate shadows in real time computer graphics and has broad variations from hard to soft shadow synthesis. Soft shadowing based on shadow mapping is a blurring technique on a shadow map or on screen space. Blurring on screen space can easily combine with a deferred shading pipeline. However, blurring on screen space has a drawback: the generated shadow is not correct when a view direction has a large angle to the normal of the shadowed plane. In this paper, we introduce a new screen space based method for soft shadowing that is faster and generates more accurate soft shadows than the previous screen space soft shadow mapping method. The resultant images show shadows by our method just stand in the same place, while shadows by the previous method change in terms of penumbra while the view moves. Surprisingly, although our method is more complex than the previous method, the measurement of the calculation time shows our method is also faster than the previous method. This is because our method controls the blurring area more accurately and thus successfully reduces multiplications for blurring.", "fno": "2246a124", "keywords": [ "Rendering Computer Graphics", "Geometry", "Shadow Mapping", "Light Sources", "Receivers", "Approximation Methods", "Shape", "Real Time Rendering", "Computer Graphics", "Shadow Mapping", "Soft Shadow", "Screen Space" ], "authors": [ { "affiliation": "Tokyo Inst. of Technol., Tokyo, Japan", "fullName": "Zhongxiang Zheng", "givenName": null, "surname": "Zhongxiang Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Inst. of Technol., Ochanozimu Univ., Tokyo, Japan", "fullName": "Suguru Saito", "givenName": "Suguru", "surname": "Saito", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "124-131", "year": "2013", "issn": null, "isbn": "978-1-4799-2246-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2246a120", "articleId": "12OmNARiM37", "__typename": "AdjacentArticleType" }, "next": { "fno": "2246a132", "articleId": "12OmNy5R3C7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2010/4109/0/4109b775", "title": "Recovering 3D Shape and Light Source Positions from Non-planar Shadows", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109b775/12OmNC3FGo3", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2015/9403/0/9403a359", "title": "A Method of Touching and Moving Virtual Shadows with Real Shadows", "doi": null, "abstractUrl": "/proceedings-article/cw/2015/9403a359/12OmNwpGgGH", "parentPublication": { "id": "proceedings/cw/2015/9403/0", "title": "2015 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031605", "title": "Implicit Sphere Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031605/12OmNxcMShN", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2017/2219/0/2219a238", "title": "Euclidean Distance Transform Soft Shadow Mapping", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2017/2219a238/12OmNxw5BsX", "parentPublication": { "id": "proceedings/sibgrapi/2017/2219/0", "title": "2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109c407", "title": "Human Shadow Removal with Unknown Light Source", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c407/12OmNyQYt4D", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420203", "title": "Combining color and geometry for the active, visual recognition of shadows", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420203/12OmNyaXPVi", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2015/8020/0/07450403", "title": "Generate Accurate Soft Shadows Using Complete Occluder Buffer", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2015/07450403/12OmNyqiaRP", "parentPublication": { "id": "proceedings/cad-graphics/2015/8020/0", "title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07478644", "title": "Frustum-Traced Irregular Z-Buffers: Fast, Sub-Pixel Accurate Hard Shadows", "doi": null, "abstractUrl": "/journal/tg/2016/10/07478644/13rRUx0xPid", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875905", "title": "Low-Pass Filtered Volumetric Shadows", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875905/13rRUy2YLYx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2006/2686/0/04027063", "title": "Plausible Image Based Soft Shadows Using Occlusion Textures", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2006/04027063/146z4GOCJgZ", "parentPublication": { "id": "proceedings/sibgrapi/2006/2686/0", "title": "2006 19th Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxHrylY", "title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "acronym": "cad-graphics", "groupId": "1001488", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyqiaRP", "doi": "10.1109/CADGRAPHICS.2015.35", "title": "Generate Accurate Soft Shadows Using Complete Occluder Buffer", "normalizedTitle": "Generate Accurate Soft Shadows Using Complete Occluder Buffer", "abstract": "In this paper, we propose a novel approach to generate accurate soft shadows for complex virtual scenes in real time. A Multi-Layer Occluder buffer (MLO-buffer) is used in our algorithm, and it is determined by rendering the scene from the center of area light source. MLO-buffer records all the potential occluders in the scene. When calculating shadow factors, area light source is represented by a set of point samples, and MLO-buffer is traversed to figure out the visibility relations between an occludee and each light sample. Finally, the accurate soft shadows can be produced. The experimental results show that our algorithm can generate high-quality soft shadows in real time without making any assumption, like shape orientation or density distribution, on the area light source.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a novel approach to generate accurate soft shadows for complex virtual scenes in real time. A Multi-Layer Occluder buffer (MLO-buffer) is used in our algorithm, and it is determined by rendering the scene from the center of area light source. MLO-buffer records all the potential occluders in the scene. When calculating shadow factors, area light source is represented by a set of point samples, and MLO-buffer is traversed to figure out the visibility relations between an occludee and each light sample. Finally, the accurate soft shadows can be produced. The experimental results show that our algorithm can generate high-quality soft shadows in real time without making any assumption, like shape orientation or density distribution, on the area light source.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a novel approach to generate accurate soft shadows for complex virtual scenes in real time. A Multi-Layer Occluder buffer (MLO-buffer) is used in our algorithm, and it is determined by rendering the scene from the center of area light source. MLO-buffer records all the potential occluders in the scene. When calculating shadow factors, area light source is represented by a set of point samples, and MLO-buffer is traversed to figure out the visibility relations between an occludee and each light sample. Finally, the accurate soft shadows can be produced. The experimental results show that our algorithm can generate high-quality soft shadows in real time without making any assumption, like shape orientation or density distribution, on the area light source.", "fno": "07450403", "keywords": [ "Light Sources", "Real Time Systems", "Rendering Computer Graphics", "Heuristic Algorithms", "Shape", "Standards", "Visibility Test", "Soft Shadows", "Area Light Source", "Occluder Buffer", "Bit Field" ], "authors": [ { "affiliation": null, "fullName": "Zhe Xu", "givenName": "Zhe", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bixuan Li", "givenName": "Bixuan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xianjie Cai", "givenName": "Xianjie", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hanqiu Sun", "givenName": "Hanqiu", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanci Zhang", "givenName": "Yanci", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cad-graphics", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "97-104", "year": "2015", "issn": null, "isbn": "978-1-4673-8020-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07450402", "articleId": "12OmNwBjP5s", "__typename": "AdjacentArticleType" }, "next": { "fno": "07450404", "articleId": "12OmNC2fGtO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2013/2246/0/2246a124", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a124/12OmNwdtwco", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2015/9403/0/9403a359", "title": "A Method of Touching and Moving Virtual Shadows with Real Shadows", "doi": null, "abstractUrl": "/proceedings-article/cw/2015/9403a359/12OmNwpGgGH", "parentPublication": { "id": "proceedings/cw/2015/9403/0", "title": "2015 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459381", "title": "Attached shadow coding: Estimating surface normals from shadows under unknown reflectance and lighting conditions", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459381/12OmNylsZWO", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2004/2171/0/21710232", "title": "Boundary Correct Real-Time Soft Shadows", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710232/12OmNzT7Orl", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498zhang2", "title": "Volumetric Shadows Using Splatting", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498zhang2/12OmNzXFoJ5", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/03/v0265", "title": "A Method to Generate Soft Shadows Using a Layered Depth Image and Warping", "doi": null, "abstractUrl": "/journal/tg/2005/03/v0265/13rRUwjoNwO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/02/v0139", "title": "Shadows and Soft Shadows with Participating Media Using Splatting", "doi": null, "abstractUrl": "/journal/tg/2003/02/v0139/13rRUxASuMu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875905", "title": "Low-Pass Filtered Volumetric Shadows", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875905/13rRUy2YLYx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2006/2686/0/04027063", "title": "Plausible Image Based Soft Shadows Using Occlusion Textures", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2006/04027063/146z4GOCJgZ", "parentPublication": { "id": "proceedings/sibgrapi/2006/2686/0", "title": "2006 19th Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i136", "title": "ARShadowGAN: Shadow Generative Adversarial Network for Augmented Reality in Single Light Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i136/1m3ooi3wLOU", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs4S8wv", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "acronym": "3dui", "groupId": "1001623", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyr8Yx3", "doi": "10.1109/3DUI.2014.6798856", "title": "Poster: Integration of a haptic rendering algorithm based on voxelized and point-sampled structures into the physics engine Bullet", "normalizedTitle": "Poster: Integration of a haptic rendering algorithm based on voxelized and point-sampled structures into the physics engine Bullet", "abstract": "We present the evaluation of a haptic rendering algorithm based on the Voxmap-Pointshell algorithm which was integrated in the physics engine Bullet. Our algorithm uses voxelized distance fields and multi-resolution point-sampled representations and it is able to compute collision forces between arbitrary complex bodies at 1 kHz. Current experiments show that the integrated algorithm outperforms standard collision detection engines in Bullet in terms of speed if high resolutions and accuracies are required, enabling physically more realistic behaviors.", "abstracts": [ { "abstractType": "Regular", "content": "We present the evaluation of a haptic rendering algorithm based on the Voxmap-Pointshell algorithm which was integrated in the physics engine Bullet. Our algorithm uses voxelized distance fields and multi-resolution point-sampled representations and it is able to compute collision forces between arbitrary complex bodies at 1 kHz. Current experiments show that the integrated algorithm outperforms standard collision detection engines in Bullet in terms of speed if high resolutions and accuracies are required, enabling physically more realistic behaviors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present the evaluation of a haptic rendering algorithm based on the Voxmap-Pointshell algorithm which was integrated in the physics engine Bullet. Our algorithm uses voxelized distance fields and multi-resolution point-sampled representations and it is able to compute collision forces between arbitrary complex bodies at 1 kHz. Current experiments show that the integrated algorithm outperforms standard collision detection engines in Bullet in terms of speed if high resolutions and accuracies are required, enabling physically more realistic behaviors.", "fno": "06798856", "keywords": [ "Data Structures", "Haptic Interfaces", "Rendering Computer Graphics", "Haptic Rendering Algorithm", "Voxelized Structures", "Point Sampled Structures", "Physics Engine Bullet", "Voxmap Pointshell Algorithm", "Voxelized Distance Fields", "Multiresolution Point Sampled Representations", "Collision Detection Engines", "Haptic Interfaces", "Rendering Computer Graphics", "Engines", "Force", "Detection Algorithms", "Data Structures", "I 3 5 Computing Methodologies Computational Geometry And Object Modeling X 2014 Geometric Algorithms Object Hierarchies", "I 3 7 Computing Methodologies Three Dimensional Graphics And Realism X 2014 Animation Virtual Reality" ], "authors": [ { "affiliation": "German Aerospace Center (DLR), Germany", "fullName": "Mikel Sagardia", "givenName": "Mikel", "surname": "Sagardia", "__typename": "ArticleAuthorType" }, { "affiliation": "German Aerospace Center (DLR), Germany", "fullName": "Theodoros Stouraitis", "givenName": "Theodoros", "surname": "Stouraitis", "__typename": "ArticleAuthorType" }, { "affiliation": "German Aerospace Center (DLR), Germany", "fullName": "João Lopes e Silva", "givenName": "João", "surname": "Lopes e Silva", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dui", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-03-01T00:00:00", "pubType": "proceedings", "pages": "133-134", "year": "2014", "issn": null, "isbn": "978-1-4799-3624-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06798855", "articleId": "12OmNqG0SHz", "__typename": "AdjacentArticleType" }, "next": { "fno": "06798857", "articleId": "12OmNC3Xhrk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2011/4467/0/4467a113", "title": "Haptic Rendering of Virtual Hand Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/cw/2011/4467a113/12OmNAoUTe1", "parentPublication": { "id": "proceedings/cw/2011/4467/0", "title": "2011 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a091", "title": "Haptic Rendering of Volume Data with Collision Determination Guarantee Using Ray Casting and Implicit Surface Representation", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a091/12OmNB9t6w1", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a157", "title": "Stable Dynamic Algorithm Based on Virtual Coupling for 6-DOF Haptic Rendering", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a157/12OmNqJ8tk6", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2008/2005/0/04479948", "title": "Perceptual Rendering for Learning Haptic Skills", "doi": null, "abstractUrl": "/proceedings-article/haptics/2008/04479948/12OmNqJq4vK", "parentPublication": { "id": "proceedings/haptics/2008/2005/0", "title": "IEEE Haptics Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscmi/2016/3696/0/3696a184", "title": "Realtime Haptic Rendering in Hybrid Environment Using Unified SPH Method", "doi": null, "abstractUrl": "/proceedings-article/iscmi/2016/3696a184/12OmNxUdv6m", "parentPublication": { "id": "proceedings/iscmi/2016/3696/0", "title": "2016 3rd International Conference on Soft Computing & Machine Intelligence (ISCMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2007/0905/0/04161034", "title": "Real-time Volumetric Haptic and Visual Burrhole Simulation", "doi": null, "abstractUrl": "/proceedings-article/vr/2007/04161034/12OmNy7yEem", "parentPublication": { "id": "proceedings/vr/2007/0905/0", "title": "2007 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2008/01/tth2008010039", "title": "Six-DoF Haptic Rendering of Contact Between Geometrically Complex Reduced Deformable Models", "doi": null, "abstractUrl": "/journal/th/2008/01/tth2008010039/13rRUEgarBB", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2017/03/07581117", "title": "A Physics-Based Vibrotactile Feedback Library for Collision Events", "doi": null, "abstractUrl": "/journal/th/2017/03/07581117/13rRUwIF69q", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07429785", "title": "Fast, Memory-Efficient Construction of Voxelized Shadows", "doi": null, "abstractUrl": "/journal/tg/2016/10/07429785/13rRUyfbwqN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798268", "title": "A Continuous Material Cutting Model with Haptic Feedback for Medical Simulations", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798268/1cJ0Ir5EpRm", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCf1Dp1", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNzXFoJ5", "doi": "10.1109/VISUAL.2002.1183761", "title": "Volumetric Shadows Using Splatting", "normalizedTitle": "Volumetric Shadows Using Splatting", "abstract": "This paper describes an efficient algorithm to model the light attenuation due to a participating media with low albedo. The light attenuation is modeled using splatting volume renderer for both the viewer and the light source. During the rendering, a 2D shadow buffer attenuates the light for each pixel. When the contribution of a footprint is added to the image buffer, as seen from the eye, we add the contribution to the shadow buffer, as seen from the light source. We have generated shadows for point lights and parallel lights using this algorithm. The shadow algorithm has been extended to deal with multiple light sources and projective textured lights.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes an efficient algorithm to model the light attenuation due to a participating media with low albedo. The light attenuation is modeled using splatting volume renderer for both the viewer and the light source. During the rendering, a 2D shadow buffer attenuates the light for each pixel. When the contribution of a footprint is added to the image buffer, as seen from the eye, we add the contribution to the shadow buffer, as seen from the light source. We have generated shadows for point lights and parallel lights using this algorithm. The shadow algorithm has been extended to deal with multiple light sources and projective textured lights.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes an efficient algorithm to model the light attenuation due to a participating media with low albedo. The light attenuation is modeled using splatting volume renderer for both the viewer and the light source. During the rendering, a 2D shadow buffer attenuates the light for each pixel. When the contribution of a footprint is added to the image buffer, as seen from the eye, we add the contribution to the shadow buffer, as seen from the light source. We have generated shadows for point lights and parallel lights using this algorithm. The shadow algorithm has been extended to deal with multiple light sources and projective textured lights.", "fno": "7498zhang2", "keywords": [ "Keywords Visualization", "Volume Rendering", "Shadows", "Illumination" ], "authors": [ { "affiliation": "The Ohio State University", "fullName": "Caixia Zhang", "givenName": "Caixia", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Ohio State University", "fullName": "Roger Crawfis", "givenName": "Roger", "surname": "Crawfis", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-10-01T00:00:00", "pubType": "proceedings", "pages": "null", "year": "2002", "issn": "1070-2385", "isbn": "0-7803-7498-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7498elsana", "articleId": "12OmNzmclHv", "__typename": "AdjacentArticleType" }, "next": { "fno": "7498weiskopf", "articleId": "12OmNyrIaz1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498bergner", "title": "Interactive Spectral Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498bergner/12OmNqEjhXN", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vv/1998/9180/0/91800039", "title": "Adding Shadows to a Texture-Based Volume Renderer", "doi": null, "abstractUrl": "/proceedings-article/vv/1998/91800039/12OmNwJgAGE", "parentPublication": { "id": "proceedings/vv/1998/9180/0", "title": "Volume Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2008/2741/0/04634627", "title": "Interactive volumetric shadows in participating media with single-scattering", "doi": null, "abstractUrl": "/proceedings-article/rt/2008/04634627/12OmNyjtNIF", "parentPublication": { "id": "proceedings/rt/2008/2741/0", "title": "Symposium on Interactive Ray Tracing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2015/8020/0/07450403", "title": "Generate Accurate Soft Shadows Using Complete Occluder Buffer", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2015/07450403/12OmNyqiaRP", "parentPublication": { "id": "proceedings/cad-graphics/2015/8020/0", "title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2004/2171/0/21710232", "title": "Boundary Correct Real-Time Soft Shadows", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710232/12OmNzT7Orl", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/03/v0265", "title": "A Method to Generate Soft Shadows Using a Layered Depth Image and Warping", "doi": null, "abstractUrl": "/journal/tg/2005/03/v0265/13rRUwjoNwO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/03/ttg2012030447", "title": "Efficient Visibility Encoding for Dynamic Illumination in Direct Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2012/03/ttg2012030447/13rRUxAATgu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/02/v0139", "title": "Shadows and Soft Shadows with Participating Media Using Splatting", "doi": null, "abstractUrl": "/journal/tg/2003/02/v0139/13rRUxASuMu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/05/ttg2010050729", "title": "Interactive Indirect Illumination Using Adaptive Multiresolution Splatting", "doi": null, "abstractUrl": "/journal/tg/2010/05/ttg2010050729/13rRUxD9h53", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875905", "title": "Low-Pass Filtered Volumetric Shadows", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875905/13rRUy2YLYx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "183rAcuejpS", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-smartcity-dss", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "183rAd01nZ8", "doi": "10.1109/HPCC/SmartCity/DSS.2018.00186", "title": "Accurate Shadow Generation Analysis in Computer Graphics", "normalizedTitle": "Accurate Shadow Generation Analysis in Computer Graphics", "abstract": "Shadows play an important role in visual scenes as they unveil spatial relationship between objects. Pixel-accurate shadows generation in real-time is still a challenging problem due to the complexity of virtual scene. Sub-pixel shadow rendering algorithms have been undertaken for many years and achieved great effects on high quality shadow rendering. This work relies on analyzing pixel and sub-pixel accurate shadow rendering techniques, which is widely used at customer level graphics card. The goal is to summarizes and analysis the properties as well as computational efficiency of shadow generation techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Shadows play an important role in visual scenes as they unveil spatial relationship between objects. Pixel-accurate shadows generation in real-time is still a challenging problem due to the complexity of virtual scene. Sub-pixel shadow rendering algorithms have been undertaken for many years and achieved great effects on high quality shadow rendering. This work relies on analyzing pixel and sub-pixel accurate shadow rendering techniques, which is widely used at customer level graphics card. The goal is to summarizes and analysis the properties as well as computational efficiency of shadow generation techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shadows play an important role in visual scenes as they unveil spatial relationship between objects. Pixel-accurate shadows generation in real-time is still a challenging problem due to the complexity of virtual scene. Sub-pixel shadow rendering algorithms have been undertaken for many years and achieved great effects on high quality shadow rendering. This work relies on analyzing pixel and sub-pixel accurate shadow rendering techniques, which is widely used at customer level graphics card. The goal is to summarizes and analysis the properties as well as computational efficiency of shadow generation techniques.", "fno": "661400b116", "keywords": [ "Computer Graphic Equipment", "Rendering Computer Graphics", "High Quality Shadow Rendering", "Customer Level Graphics Card", "Computational Efficiency", "Shadow Generation Techniques", "Accurate Shadow Generation Analysis", "Computer Graphics", "Visual Scenes", "Spatial Relationship", "Pixel Accurate Shadows Generation", "Virtual Scene", "Sub Pixel Shadow Rendering Algorithms", "Shadow Mapping", "Geometry", "Rendering Computer Graphics", "Real Time Systems", "Cameras", "Octrees", "Three Dimensional Displays", "Shadow Map", "Shadow Volume", "Ray Tracing", "Sub Pixel", "Rendering" ], "authors": [ { "affiliation": null, "fullName": "Hua Li", "givenName": "Hua", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wen Liu", "givenName": "Wen", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-smartcity-dss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "1116-1120", "year": "2018", "issn": null, "isbn": "978-1-5386-6614-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "661400b110", "articleId": "183rAdzdE7c", "__typename": "AdjacentArticleType" }, "next": { "fno": "661400b121", "articleId": "183rAd6PL6I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2008/3341/0/3341a291", "title": "Shadow Removal in Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/avss/2008/3341a291/12OmNAXPyoV", "parentPublication": { "id": "proceedings/avss/2008/3341/0", "title": "2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwcse/2009/3881/1/3881a488", "title": "A Survey of Shadow Rendering Algorithms: Projection Shadows and Shadow Volumes", "doi": null, "abstractUrl": "/proceedings-article/iwcse/2009/3881a488/12OmNBUAvYS", "parentPublication": { "id": "proceedings/iwcse/2009/3881/1", "title": "Computer Science and Engineering, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2001/1007/0/10070209", "title": "Hardware-Accelerated Rendering of Antialiased Shadows with Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/cgi/2001/10070209/12OmNwM6zXZ", "parentPublication": { "id": "proceedings/cgi/2001/1007/0", "title": "Proceedings. Computer Graphics International 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a124", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a124/12OmNwdtwco", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06814990", "title": "Multi-resolution Shadow Mapping Using CUDA Rasterizer", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06814990/12OmNwlHSVn", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2010/4120/0/4120a079", "title": "Parallel ID Shadow-Map Decompression on GPU", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2010/4120a079/12OmNxZkhtp", "parentPublication": { "id": "proceedings/ispdc/2010/4120/0", "title": "Parallel and Distributed Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031605", "title": "Implicit Sphere Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031605/12OmNxcMShN", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2007/2929/0/29291010", "title": "Real-time Shadow Rendering in Scene System of Marine Simulator", "doi": null, "abstractUrl": "/proceedings-article/icig/2007/29291010/12OmNyTwRdR", "parentPublication": { "id": "proceedings/icig/2007/2929/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07478644", "title": "Frustum-Traced Irregular Z-Buffers: Fast, Sub-Pixel Accurate Hard Shadows", "doi": null, "abstractUrl": "/journal/tg/2016/10/07478644/13rRUx0xPid", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a170", "title": "Bidirectional Shadow Rendering for Interactive Mixed 360° Videos", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a170/1tuAEjkRUZy", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy2agRS", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "acronym": "cad-graphics", "groupId": "1001488", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwlHSVn", "doi": "10.1109/CADGraphics.2013.27", "title": "Multi-resolution Shadow Mapping Using CUDA Rasterizer", "normalizedTitle": "Multi-resolution Shadow Mapping Using CUDA Rasterizer", "abstract": "Shadow mapping is a fast and easy to use method to produce hard shadows. However, it introduces aliasing due to its uniform sampling strategy and limited shadow map resolution. In this paper, we propose a memory efficient algorithm to render high quality shadows. Our algorithm is based on a multi-resolution shadow map structure, which includes a conventional shadow map for scene regions where a low-resolution shadow map is sufficient, and a high-resolution patch buffer to capture scene regions that are susceptible to aliasing. With this data structure, we are able to capture shadow details with far less memory footprint than conventional shadow mapping. In order to maintain an appropriate performance compared to conventional shadow mapping, we designed a customized CUDA rasterizer to render the high-resolution patches.", "abstracts": [ { "abstractType": "Regular", "content": "Shadow mapping is a fast and easy to use method to produce hard shadows. However, it introduces aliasing due to its uniform sampling strategy and limited shadow map resolution. In this paper, we propose a memory efficient algorithm to render high quality shadows. Our algorithm is based on a multi-resolution shadow map structure, which includes a conventional shadow map for scene regions where a low-resolution shadow map is sufficient, and a high-resolution patch buffer to capture scene regions that are susceptible to aliasing. With this data structure, we are able to capture shadow details with far less memory footprint than conventional shadow mapping. In order to maintain an appropriate performance compared to conventional shadow mapping, we designed a customized CUDA rasterizer to render the high-resolution patches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shadow mapping is a fast and easy to use method to produce hard shadows. However, it introduces aliasing due to its uniform sampling strategy and limited shadow map resolution. In this paper, we propose a memory efficient algorithm to render high quality shadows. Our algorithm is based on a multi-resolution shadow map structure, which includes a conventional shadow map for scene regions where a low-resolution shadow map is sufficient, and a high-resolution patch buffer to capture scene regions that are susceptible to aliasing. With this data structure, we are able to capture shadow details with far less memory footprint than conventional shadow mapping. In order to maintain an appropriate performance compared to conventional shadow mapping, we designed a customized CUDA rasterizer to render the high-resolution patches.", "fno": "06814990", "keywords": [ "Rendering Computer Graphics", "Graphics Processing Units", "Shadow Mapping", "Geometry", "Instruction Sets", "Image Edge Detection", "Indexes", "Conservative Rasterization", "Shadow Mapping", "High Resolution Patch", "CUDA Rasterizer" ], "authors": [ { "affiliation": null, "fullName": "Peng Huang", "givenName": "Peng", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xuehui Liu", "givenName": "Xuehui", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Enhua Wu", "givenName": "Enhua", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cad-graphics", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-11-01T00:00:00", "pubType": "proceedings", "pages": "148-155", "year": "2013", "issn": null, "isbn": "978-1-4799-2576-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06814989", "articleId": "12OmNAs2tqk", "__typename": "AdjacentArticleType" }, "next": { "fno": "06814991", "articleId": "12OmNBBhN83", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwcse/2009/3881/1/3881a488", "title": "A Survey of Shadow Rendering Algorithms: Projection Shadows and Shadow Volumes", "doi": null, "abstractUrl": "/proceedings-article/iwcse/2009/3881a488/12OmNBUAvYS", "parentPublication": { "id": "proceedings/iwcse/2009/3881/1", "title": "Computer Science and Engineering, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2017/4846/0/484601a106", "title": "Hard Shadow Anti-Aliasing for Spot Lights in a Game Engine", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2017/484601a106/12OmNrHSD0K", "parentPublication": { "id": "proceedings/sbgames/2017/4846/0", "title": "2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/1/3563a159", "title": "The Research of Real-Time Shadow Rendering Algorithm of Virtual Scenes", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563a159/12OmNvzJFVE", "parentPublication": { "id": "proceedings/ettandgrs/2008/3563/1", "title": "Education Technology and Training & Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2001/1007/0/10070209", "title": "Hardware-Accelerated Rendering of Antialiased Shadows with Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/cgi/2001/10070209/12OmNwM6zXZ", "parentPublication": { "id": "proceedings/cgi/2001/1007/0", "title": "Proceedings. Computer Graphics International 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a124", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a124/12OmNwdtwco", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031605", "title": "Implicit Sphere Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031605/12OmNxcMShN", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2017/2219/0/2219a238", "title": "Euclidean Distance Transform Soft Shadow Mapping", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2017/2219a238/12OmNxw5BsX", "parentPublication": { "id": "proceedings/sibgrapi/2017/2219/0", "title": "2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/03/mcg2015030015", "title": "In-Class Exercise for Shadow Mapping Algorithms", "doi": null, "abstractUrl": "/magazine/cg/2015/03/mcg2015030015/13rRUx0xPLb", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07478644", "title": "Frustum-Traced Irregular Z-Buffers: Fast, Sub-Pixel Accurate Hard Shadows", "doi": null, "abstractUrl": "/journal/tg/2016/10/07478644/13rRUx0xPid", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400b116", "title": "Accurate Shadow Generation Analysis in Computer Graphics", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400b116/183rAd01nZ8", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF2p", "title": "Computer Graphics International Conference", "acronym": "cgi", "groupId": "1000132", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNwoPttC", "doi": "10.1109/CGI.1999.777935", "title": "Rendering Optimal Solar Shadows Using Plural Sunlight Depth Buffers", "normalizedTitle": "Rendering Optimal Solar Shadows Using Plural Sunlight Depth Buffers", "abstract": "We propose a novel method, based on the two-pass z-buffer algorithm, to calculate shadows with sufficient precision and efficiency for rendering a daytime landscape with solar penumbrae.The feature of the proposed method is that the precision of the shadows can be preserved to be superior than that of any visible surface by using the appropriate number of plural shadow buffers; it gives a fairly satisfactory trade-off between computation time and quality of shadows.By using the shadow buffers, before calculating solar illuminance we can divide visible surfaces into three types of fragments, that is, bright regions, umbra regions, and the remaining penumbra regions.Thus, we can efficiently render a daytime landscape with sufficient precision of penumbrae because the algorithm can set the calculation points of solar illuminance variably, with their number depending on the type of region they belong to.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel method, based on the two-pass z-buffer algorithm, to calculate shadows with sufficient precision and efficiency for rendering a daytime landscape with solar penumbrae.The feature of the proposed method is that the precision of the shadows can be preserved to be superior than that of any visible surface by using the appropriate number of plural shadow buffers; it gives a fairly satisfactory trade-off between computation time and quality of shadows.By using the shadow buffers, before calculating solar illuminance we can divide visible surfaces into three types of fragments, that is, bright regions, umbra regions, and the remaining penumbra regions.Thus, we can efficiently render a daytime landscape with sufficient precision of penumbrae because the algorithm can set the calculation points of solar illuminance variably, with their number depending on the type of region they belong to.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel method, based on the two-pass z-buffer algorithm, to calculate shadows with sufficient precision and efficiency for rendering a daytime landscape with solar penumbrae.The feature of the proposed method is that the precision of the shadows can be preserved to be superior than that of any visible surface by using the appropriate number of plural shadow buffers; it gives a fairly satisfactory trade-off between computation time and quality of shadows.By using the shadow buffers, before calculating solar illuminance we can divide visible surfaces into three types of fragments, that is, bright regions, umbra regions, and the remaining penumbra regions.Thus, we can efficiently render a daytime landscape with sufficient precision of penumbrae because the algorithm can set the calculation points of solar illuminance variably, with their number depending on the type of region they belong to.", "fno": "01850166", "keywords": [ "Local Illumination", "Shadow", "Two Pass Z Buffer Algorithm", "Landscape" ], "authors": [ { "affiliation": "Yamaguchi University", "fullName": "Katsumi Tadamura", "givenName": "Katsumi", "surname": "Tadamura", "__typename": "ArticleAuthorType" }, { "affiliation": "Sanei Co.", "fullName": "Xueying Qin", "givenName": "Xueying", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Sanei Co.", "fullName": "Guofang Jiao", "givenName": "Guofang", "surname": "Jiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Hiroshima Institute of Technology", "fullName": "Eihachiro Nakamae", "givenName": "Eihachiro", "surname": "Nakamae", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-06-01T00:00:00", "pubType": "proceedings", "pages": "166", "year": "1999", "issn": "1530-1052", "isbn": "0-7695-0185-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01850164", "articleId": "12OmNAJDBtB", "__typename": "AdjacentArticleType" }, "next": { "fno": "01850174", "articleId": "12OmNBWi6H5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx4gUtP", "title": "2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxw5BsX", "doi": "10.1109/SIBGRAPI.2017.38", "title": "Euclidean Distance Transform Soft Shadow Mapping", "normalizedTitle": "Euclidean Distance Transform Soft Shadow Mapping", "abstract": "The real-time computation of high-quality soft shadows is a challenging task in computer graphics. The existing approximate solutions for soft shadow computation are prone to aliasing artifacts for small penumbra sizes and banding or light leaking artifacts for large penumbra sizes. In this paper, we aim to minimize these problems with the use of a normalized Euclidean distance transform for soft shadow mapping. We compute anti-aliased hard shadows in the camera view, and, on the basis of the percentage-closer soft shadows framework, we estimate the penumbra size of the shadow silhouette and compute a filtered normalized Euclidean distance transform to generate the soft shadows at the penumbra location. Our approach yields real-time performance and generates soft shadows with less artifacts than related work.", "abstracts": [ { "abstractType": "Regular", "content": "The real-time computation of high-quality soft shadows is a challenging task in computer graphics. The existing approximate solutions for soft shadow computation are prone to aliasing artifacts for small penumbra sizes and banding or light leaking artifacts for large penumbra sizes. In this paper, we aim to minimize these problems with the use of a normalized Euclidean distance transform for soft shadow mapping. We compute anti-aliased hard shadows in the camera view, and, on the basis of the percentage-closer soft shadows framework, we estimate the penumbra size of the shadow silhouette and compute a filtered normalized Euclidean distance transform to generate the soft shadows at the penumbra location. Our approach yields real-time performance and generates soft shadows with less artifacts than related work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The real-time computation of high-quality soft shadows is a challenging task in computer graphics. The existing approximate solutions for soft shadow computation are prone to aliasing artifacts for small penumbra sizes and banding or light leaking artifacts for large penumbra sizes. In this paper, we aim to minimize these problems with the use of a normalized Euclidean distance transform for soft shadow mapping. We compute anti-aliased hard shadows in the camera view, and, on the basis of the percentage-closer soft shadows framework, we estimate the penumbra size of the shadow silhouette and compute a filtered normalized Euclidean distance transform to generate the soft shadows at the penumbra location. Our approach yields real-time performance and generates soft shadows with less artifacts than related work.", "fno": "2219a238", "keywords": [ "Antialiasing", "Computational Geometry", "Image Filtering", "Rendering Computer Graphics", "Transforms", "Soft Shadow Mapping", "High Quality Soft Shadows", "Computer Graphics", "Shadow Silhouette", "Penumbra Location", "Real Time Soft Shadow Computation", "Anti Aliased Hard Shadows", "Image Rendering", "Euclidean Distance Transform Filtering", "Shadow Mapping", "Light Sources", "Euclidean Distance", "Transforms", "Real Time Systems", "Cameras", "Approximation Algorithms" ], "authors": [ { "affiliation": null, "fullName": "Márcio Cerqueira De Farias Macedo", "givenName": "Márcio Cerqueira De Farias", "surname": "Macedo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antônio Lopes Apolinário", "givenName": "Antônio Lopes", "surname": "Apolinário", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "238-245", "year": "2017", "issn": "2377-5416", "isbn": "978-1-5386-2219-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2219a230", "articleId": "12OmNvDZF3E", "__typename": "AdjacentArticleType" }, "next": { "fno": "2219a246", "articleId": "12OmNAio74p", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sbgames/2017/4846/0/484601a106", "title": "Hard Shadow Anti-Aliasing for Spot Lights in a Game Engine", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2017/484601a106/12OmNrHSD0K", "parentPublication": { "id": "proceedings/sbgames/2017/4846/0", "title": "2017 16th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a124", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a124/12OmNwdtwco", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031605", "title": "Implicit Sphere Shadow Maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031605/12OmNxcMShN", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109c407", "title": "Human Shadow Removal with Unknown Light Source", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c407/12OmNyQYt4D", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2007/2929/0/29291010", "title": "Real-time Shadow Rendering in Scene System of Marine Simulator", "doi": null, "abstractUrl": "/proceedings-article/icig/2007/29291010/12OmNyTwRdR", "parentPublication": { "id": "proceedings/icig/2007/2929/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270106", "title": "Texture-Preserving Shadow Removal in Color Images Containing Curved Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270106/12OmNz61cVD", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223128", "title": "Shadow identification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223128/12OmNzmclXa", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/03/mcg2015030015", "title": "In-Class Exercise for Shadow Mapping Algorithms", "doi": null, "abstractUrl": "/magazine/cg/2015/03/mcg2015030015/13rRUx0xPLb", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200b035", "title": "First-Order Signed Distance Field based Soft Shadow", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200b035/1BmOxBFvdvi", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900e378", "title": "SSN: Soft Shadow Network for Image Compositing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900e378/1yeJCBkweSk", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy6qfOC", "title": "Image Analysis for Multimedia Interactive Services, International Workshop on", "acronym": "wiamis", "groupId": "1001817", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzayNG9", "doi": "10.1109/WIAMIS.2008.26", "title": "Autonomous and Adaptive Learning of Shadows for Surveillance", "normalizedTitle": "Autonomous and Adaptive Learning of Shadows for Surveillance", "abstract": "Object detection is a critical step in automating the monitoring and surveillance tasks. To maximize its reliability, robust algorithms are needed to separate real objects from moving shadows. In this paper we propose a framework for detecting moving shadows caused by moving objects in video, which first learns autonomously and on-line the characteristic features of typical shadow pixels at various parts of the observed scene. The collected knowledge is then used to calibrate itself for the given scene, and to identify shadow pixels in subsequent frames. Experiments show that our system has a good performance, while being more adaptable and using only brightness information.", "abstracts": [ { "abstractType": "Regular", "content": "Object detection is a critical step in automating the monitoring and surveillance tasks. To maximize its reliability, robust algorithms are needed to separate real objects from moving shadows. In this paper we propose a framework for detecting moving shadows caused by moving objects in video, which first learns autonomously and on-line the characteristic features of typical shadow pixels at various parts of the observed scene. The collected knowledge is then used to calibrate itself for the given scene, and to identify shadow pixels in subsequent frames. Experiments show that our system has a good performance, while being more adaptable and using only brightness information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Object detection is a critical step in automating the monitoring and surveillance tasks. To maximize its reliability, robust algorithms are needed to separate real objects from moving shadows. In this paper we propose a framework for detecting moving shadows caused by moving objects in video, which first learns autonomously and on-line the characteristic features of typical shadow pixels at various parts of the observed scene. The collected knowledge is then used to calibrate itself for the given scene, and to identify shadow pixels in subsequent frames. Experiments show that our system has a good performance, while being more adaptable and using only brightness information.", "fno": "3130a059", "keywords": [ "Surveillance", "Segmentation", "Moving Shadow Detection" ], "authors": [ { "affiliation": null, "fullName": "Hasan Celik", "givenName": "Hasan", "surname": "Celik", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andoni Martin Ortigosa", "givenName": "Andoni Martin", "surname": "Ortigosa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alan Hanjalic", "givenName": "Alan", "surname": "Hanjalic", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Emile A. Hendriks", "givenName": "Emile A.", "surname": "Hendriks", "__typename": "ArticleAuthorType" } ], "idPrefix": "wiamis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-05-01T00:00:00", "pubType": "proceedings", "pages": "59-62", "year": "2008", "issn": null, "isbn": "978-0-7695-3130-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3130a055", "articleId": "12OmNqJq4yH", "__typename": "AdjacentArticleType" }, "next": { "fno": "3130a063", "articleId": "12OmNxRnvRa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2005/9385/0/01577297", "title": "A texture-based approach for shadow detection", "doi": null, "abstractUrl": "/proceedings-article/avss/2005/01577297/12OmNAhxjD2", "parentPublication": { "id": "proceedings/avss/2005/9385/0", "title": "IEEE Conference on Advanced Video and Signal Based Surveillance, 2005.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2009/3642/0/3642a391", "title": "Foreground and Shadow Segmentation by Exploiting Multiple Cues", "doi": null, "abstractUrl": "/proceedings-article/snpd/2009/3642a391/12OmNBmf3c5", "parentPublication": { "id": "proceedings/snpd/2009/3642/0", "title": "2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/psivt/2010/4285/0/4285a145", "title": "An Online Learning Method for Shadow Detection", "doi": null, "abstractUrl": "/proceedings-article/psivt/2010/4285a145/12OmNqI04QM", "parentPublication": { "id": "proceedings/psivt/2010/4285/0", "title": "Image and Video Technology, Pacific-Rim Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/est/2012/4791/0/4791a043", "title": "Finding People by their Shadows: Aerial Surveillance Using Body Biometrics Extracted from Ground Video", "doi": null, "abstractUrl": "/proceedings-article/est/2012/4791a043/12OmNwt5sjk", "parentPublication": { "id": "proceedings/est/2012/4791/0", "title": "2012 Third International Conference on Emerging Security Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459280", "title": "Detection and removal of chromatic moving shadows in surveillance scenarios", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459280/12OmNx0RIJZ", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2008/3381/0/3381a127", "title": "Moving Shadow Removal Based on ILT", "doi": null, "abstractUrl": "/proceedings-article/cw/2008/3381a127/12OmNyL0TPl", "parentPublication": { "id": "proceedings/cw/2008/3381/0", "title": "2008 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcip/2009/3699/2/3699b422", "title": "A Robust Algorithm for Shadow Removal of Foreground Detection in Video Surveillance", "doi": null, "abstractUrl": "/proceedings-article/apcip/2009/3699b422/12OmNzmtWBC", "parentPublication": { "id": "proceedings/apcip/2009/3699/1", "title": "Information Processing, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2003/10/i1337", "title": "Detecting Moving Objects, Ghosts, and Shadows in Video Streams", "doi": null, "abstractUrl": "/journal/tp/2003/10/i1337/13rRUwInuXj", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2003/07/i0918", "title": "Detecting Moving Shadows: Algorithms and Evaluation", "doi": null, "abstractUrl": "/journal/tp/2003/07/i0918/13rRUwd9CGY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/07/i1133", "title": "Learning and Removing Cast Shadows through a Multidistribution Approach", "doi": null, "abstractUrl": "/journal/tp/2007/07/i1133/13rRUxAAT8O", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWvaO", "title": "Proceedings. Computer Graphics International 2001", "acronym": "cgi", "groupId": "1000132", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNzxPTHC", "doi": "10.1109/CGI.2001.934674", "title": "Using A-Buffer in Radiosity", "normalizedTitle": "Using A-Buffer in Radiosity", "abstract": "Abstract: Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issues for Radiosity method. A-Buffer is a technique introduced by Carpenter for anti-aliasing in hidden surface removal. In this paper, we propose a method based on the A-Buffer to replace the Z-buffer in the computation of form factors using the Hemicube for anti-aliasing. The method directly computes shadow boundaries in contrast to the adaptive re-meshing approach. Though the processing of shadow boundaries is not fast, only one discontinuity meshing (no iteration) is required. We implement the method in an infrastructure building design system.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issues for Radiosity method. A-Buffer is a technique introduced by Carpenter for anti-aliasing in hidden surface removal. In this paper, we propose a method based on the A-Buffer to replace the Z-buffer in the computation of form factors using the Hemicube for anti-aliasing. The method directly computes shadow boundaries in contrast to the adaptive re-meshing approach. Though the processing of shadow boundaries is not fast, only one discontinuity meshing (no iteration) is required. We implement the method in an infrastructure building design system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issues for Radiosity method. A-Buffer is a technique introduced by Carpenter for anti-aliasing in hidden surface removal. In this paper, we propose a method based on the A-Buffer to replace the Z-buffer in the computation of form factors using the Hemicube for anti-aliasing. The method directly computes shadow boundaries in contrast to the adaptive re-meshing approach. Though the processing of shadow boundaries is not fast, only one discontinuity meshing (no iteration) is required. We implement the method in an infrastructure building design system.", "fno": "10070193", "keywords": [ "Radiosity", "Shadow Boundary", "Anti Aliasing", "A Buffer" ], "authors": [ { "affiliation": "National University of Singapore", "fullName": "Q. Wang", "givenName": "Q.", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "J. H. Tang", "givenName": "J. H.", "surname": "Tang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "C. H. Lim", "givenName": "C. H.", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "H. C. Teh", "givenName": "H. C.", "surname": "Teh", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "Z. Huang", "givenName": "Z.", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-07-01T00:00:00", "pubType": "proceedings", "pages": "0193", "year": "2001", "issn": null, "isbn": "0-7695-1007-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10070183", "articleId": "12OmNApLGLt", "__typename": "AdjacentArticleType" }, "next": { "fno": "10070201", "articleId": "12OmNrYlmvM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeIUDrZL9K", "doi": "10.1109/CVPR46437.2021.01613", "title": "No Shadow Left Behind: Removing Objects and their Shadows using Approximate Lighting and Geometry", "normalizedTitle": "No Shadow Left Behind: Removing Objects and their Shadows using Approximate Lighting and Geometry", "abstract": "Removing objects from images is a challenging technical problem that is important for many applications, including mixed reality. For believable results, the shadows that the object casts should also be removed. Current inpainting-based methods only remove the object itself, leaving shadows behind, or at best require specifying shadow regions to inpaint. We introduce a deep learning pipeline for removing a shadow along with its caster. We leverage rough scene models in order to remove a wide variety of shadows (hard or soft, dark or subtle, large or thin) from surfaces with a wide variety of textures. We train our pipeline on synthetically rendered data, and show qualitative and quantitative results on both synthetic and real scenes.", "abstracts": [ { "abstractType": "Regular", "content": "Removing objects from images is a challenging technical problem that is important for many applications, including mixed reality. For believable results, the shadows that the object casts should also be removed. Current inpainting-based methods only remove the object itself, leaving shadows behind, or at best require specifying shadow regions to inpaint. We introduce a deep learning pipeline for removing a shadow along with its caster. We leverage rough scene models in order to remove a wide variety of shadows (hard or soft, dark or subtle, large or thin) from surfaces with a wide variety of textures. We train our pipeline on synthetically rendered data, and show qualitative and quantitative results on both synthetic and real scenes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Removing objects from images is a challenging technical problem that is important for many applications, including mixed reality. For believable results, the shadows that the object casts should also be removed. Current inpainting-based methods only remove the object itself, leaving shadows behind, or at best require specifying shadow regions to inpaint. We introduce a deep learning pipeline for removing a shadow along with its caster. We leverage rough scene models in order to remove a wide variety of shadows (hard or soft, dark or subtle, large or thin) from surfaces with a wide variety of textures. We train our pipeline on synthetically rendered data, and show qualitative and quantitative results on both synthetic and real scenes.", "fno": "450900q6392", "keywords": [ "Augmented Reality", "Casting", "Data Visualisation", "Image Motion Analysis", "Image Processing", "Image Restoration", "Image Texture", "Interactive Systems", "Learning Artificial Intelligence", "Realistic Images", "Rendering Computer Graphics", "Video Signal Processing", "Object Casts", "Current Inpainting Based Methods", "Shadow Regions", "Removing Objects", "Geometry", "Deep Learning", "Computer Vision", "Pipelines", "Mixed Reality", "Lighting", "Surface Roughness" ], "authors": [ { "affiliation": "University of Washington", "fullName": "Edward Zhang", "givenName": "Edward", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Google", "fullName": "Ricardo Martin-Brualla", "givenName": "Ricardo", "surname": "Martin-Brualla", "__typename": "ArticleAuthorType" }, { "affiliation": "Google", "fullName": "Janne Kontkanen", "givenName": "Janne", "surname": "Kontkanen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Washington", "fullName": "Brian Curless", "givenName": "Brian", "surname": "Curless", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "16392-16401", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeIUzK4FNu", "name": "pcvpr202145090-09578557s1-mm_450900q6392.zip", "size": "3.07 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578557s1-mm_450900q6392.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900q6382", "articleId": "1yeJLvyQcgg", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900q6402", "articleId": "1yeIKoA89Xi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2006/0366/0/04036585", "title": "Removing Shadows using Flash/Noflash Image Edges", "doi": null, "abstractUrl": "/proceedings-article/icme/2006/04036585/12OmNAPSMmR", "parentPublication": { "id": "proceedings/icme/2006/0366/0", "title": "2006 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a124", "title": "Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a124/12OmNwdtwco", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206665", "title": "Robust shadow and illumination estimation using a mixture model", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206665/12OmNx3q6Va", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420203", "title": "Combining color and geometry for the active, visual recognition of shadows", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420203/12OmNyaXPVi", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118d011", "title": "Shadow Removal from Single RGB-D Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118d011/12OmNyrqzjS", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/07/i1133", "title": "Learning and Removing Cast Shadows through a Multidistribution Approach", "doi": null, "abstractUrl": "/journal/tp/2007/07/i1133/13rRUxAAT8O", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b788", "title": "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detection and Shadow Removal", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b788/17D45VUZMVe", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/6.946E212", "title": "Face Relighting with Geometrically Consistent Shadows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/6.946E212/1H0MWKVYUb6", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049677", "title": "ShadowMover: Automatically Projecting Real Shadows onto Virtual Object", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049677/1KYooKy1LAQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4714", "title": "Towards High Fidelity Face Relighting with Realistic Shadows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4714/1yeMcN60KoU", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvA1hw7", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "acronym": "msn", "groupId": "1002549", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwM6A66", "doi": "10.1109/MSN.2013.21", "title": "A Beam Width and Direction Concerned Routing for Underwater Acoustic Sensor Networks", "normalizedTitle": "A Beam Width and Direction Concerned Routing for Underwater Acoustic Sensor Networks", "abstract": "Underwater acoustic sensor networks (UASNs) have been put significant attention recently from both academia and industry for undersea resources exploring and of scientific data gathering in underwater environments. The important characteristic of an underwater acoustic sensor network is that, most underwater acoustic sensor nodes have a certain beam width and a three-dimensional direction, is ignored by the existing underwater routing protocols. This characteristic will reduce the network connectivity and cause a large number of asymmetric links, so it will lead to the sharp decline of the existing protocol performance. We develop a Beam width and Direction Concerned Routing protocol (BDCR) to tackle this problem in UASNs. A key advantage of our protocol is that it can achieve relatively high packet delivery rate and ensure reasonable energy consumption when take into account the impact of the beam width and three-dimensional direction. The proposed protocol is compared with a representative routing protocol for UASNs. The simulation results verify the effectiveness and feasibility of the proposed work.", "abstracts": [ { "abstractType": "Regular", "content": "Underwater acoustic sensor networks (UASNs) have been put significant attention recently from both academia and industry for undersea resources exploring and of scientific data gathering in underwater environments. The important characteristic of an underwater acoustic sensor network is that, most underwater acoustic sensor nodes have a certain beam width and a three-dimensional direction, is ignored by the existing underwater routing protocols. This characteristic will reduce the network connectivity and cause a large number of asymmetric links, so it will lead to the sharp decline of the existing protocol performance. We develop a Beam width and Direction Concerned Routing protocol (BDCR) to tackle this problem in UASNs. A key advantage of our protocol is that it can achieve relatively high packet delivery rate and ensure reasonable energy consumption when take into account the impact of the beam width and three-dimensional direction. The proposed protocol is compared with a representative routing protocol for UASNs. The simulation results verify the effectiveness and feasibility of the proposed work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Underwater acoustic sensor networks (UASNs) have been put significant attention recently from both academia and industry for undersea resources exploring and of scientific data gathering in underwater environments. The important characteristic of an underwater acoustic sensor network is that, most underwater acoustic sensor nodes have a certain beam width and a three-dimensional direction, is ignored by the existing underwater routing protocols. This characteristic will reduce the network connectivity and cause a large number of asymmetric links, so it will lead to the sharp decline of the existing protocol performance. We develop a Beam width and Direction Concerned Routing protocol (BDCR) to tackle this problem in UASNs. A key advantage of our protocol is that it can achieve relatively high packet delivery rate and ensure reasonable energy consumption when take into account the impact of the beam width and three-dimensional direction. The proposed protocol is compared with a representative routing protocol for UASNs. The simulation results verify the effectiveness and feasibility of the proposed work.", "fno": "06726303", "keywords": [ "Routing Protocols", "Acoustic Beams", "Routing", "Underwater Acoustics", "Energy Consumption", "Vectors", "Deviation Factor", "Acoustic Sensor Networks", "Routing Protocols", "Beam Width", "Three Dimensional Direction", "Forwarding Factor", "Effective Angle Factor" ], "authors": [ { "affiliation": null, "fullName": "Song Zhang", "givenName": "Song", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Deshi Li", "givenName": "Deshi", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "msn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "17-24", "year": "2013", "issn": null, "isbn": "978-0-7695-5159-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06726302", "articleId": "12OmNCdBDLa", "__typename": "AdjacentArticleType" }, "next": { "fno": "06726304", "articleId": "12OmNBVrjk0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/euc/2010/4322/0/4322a307", "title": "The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/euc/2010/4322a307/12OmNCxL9TC", "parentPublication": { "id": "proceedings/euc/2010/4322/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/1/3865a096", "title": "AMS: A New MAC Protocol for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865a096/12OmNwG90ft", "parentPublication": { "id": "proceedings/iscid/2009/3865/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2013/5159/0/06726321", "title": "ELT: Energy-Level-Based Hybrid Transmission in Underwater Sensor Acoustic Networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726321/12OmNwNOaNU", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2009/5218/0/05342165", "title": "A wave-like amendment-based time-division medium access slot allocation mechanism for underwater acoustic sensor networks", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2009/05342165/12OmNwlHSRN", "parentPublication": { "id": "proceedings/cyberc/2009/5218/0", "title": "2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icess/2009/3678/0/3678a305", "title": "Performance Analysis of p-Persistent Aloha for Multi-hop Underwater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/icess/2009/3678a305/12OmNxGALcG", "parentPublication": { "id": "proceedings/icess/2009/3678/0", "title": "Embedded Software and Systems, Second International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a346", "title": "The Protocol of Physical Layer for Underwater Acoustic Network", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a346/12OmNz3bdBA", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2014/02/06763113", "title": "Challenges and Opportunities of Underwater Cognitive Acoustic Networks", "doi": null, "abstractUrl": "/journal/ec/2014/02/06763113/13rRUzpzeJ8", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/02/08502817", "title": "Probabilistic Spatially-Divided Multiple Access in Underwater Acoustic Sparse Networks", "doi": null, "abstractUrl": "/journal/tm/2020/02/08502817/14C6d7kmuU8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2008/3391/0/04683191", "title": "Architecture of Underwater Acoustic Sensor Networks: A Survey", "doi": null, "abstractUrl": "/proceedings-article/icinis/2008/04683191/17D45Xcttn9", "parentPublication": { "id": "proceedings/icinis/2008/3391/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2020/9916/0/991600a671", "title": "A Collision-free MAC protocol based on quorum system for underwater acoustic sensor networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2020/991600a671/1sBOczZeraE", "parentPublication": { "id": "proceedings/msn/2020/9916/0", "title": "2020 16th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nR", "title": "2015 International Conference on Computer Science and Applications (CSA)", "acronym": "csa", "groupId": "1803775", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx76TGg", "doi": "10.1109/CSA.2015.54", "title": "A Test Based on Beam Angle of Ultrasonic Transducer Array", "normalizedTitle": "A Test Based on Beam Angle of Ultrasonic Transducer Array", "abstract": "Ultrasonic transducer array is the crucial parts of the audio directional transmission weapon system. Beam angle is also an important performance index. In order to make a change on the disordered actuality of audio signal beam angle test methods, improve the testing efficiency and accuracy, and shorten the testing time, directivity model of ultrasonic transducer array is analyzed in this paper. By a digital simulation, the ranges of the angle and intensity are obtained, and angle step in test was put forward. Through parametric array theoretical calculation and experimental verification, the test distance is acquired. Finally, a new beam angle test method has been proposed. It can be the reference and basis for the beam angle testing of the audio directional transmission weapon system based on ultrasonic transducer array.", "abstracts": [ { "abstractType": "Regular", "content": "Ultrasonic transducer array is the crucial parts of the audio directional transmission weapon system. Beam angle is also an important performance index. In order to make a change on the disordered actuality of audio signal beam angle test methods, improve the testing efficiency and accuracy, and shorten the testing time, directivity model of ultrasonic transducer array is analyzed in this paper. By a digital simulation, the ranges of the angle and intensity are obtained, and angle step in test was put forward. Through parametric array theoretical calculation and experimental verification, the test distance is acquired. Finally, a new beam angle test method has been proposed. It can be the reference and basis for the beam angle testing of the audio directional transmission weapon system based on ultrasonic transducer array.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ultrasonic transducer array is the crucial parts of the audio directional transmission weapon system. Beam angle is also an important performance index. In order to make a change on the disordered actuality of audio signal beam angle test methods, improve the testing efficiency and accuracy, and shorten the testing time, directivity model of ultrasonic transducer array is analyzed in this paper. By a digital simulation, the ranges of the angle and intensity are obtained, and angle step in test was put forward. Through parametric array theoretical calculation and experimental verification, the test distance is acquired. Finally, a new beam angle test method has been proposed. It can be the reference and basis for the beam angle testing of the audio directional transmission weapon system based on ultrasonic transducer array.", "fno": "9961a255", "keywords": [ "Antenna Arrays", "Acoustic Beams", "Ultrasonic Transducer Arrays", "Acoustics", "Acoustic Arrays", "Ultrasonic Transducers", "Digital Sumulation", "Ultrasonic Transducer Array", "Audio Signal Beam Angle" ], "authors": [ { "affiliation": null, "fullName": "Jia-Xiao Wang", "givenName": "Jia-Xiao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Peng Rao", "givenName": "Peng", "surname": "Rao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guang-Qi Luan", "givenName": "Guang-Qi", "surname": "Luan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ming-Zhao Sun", "givenName": "Ming-Zhao", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "csa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "255-259", "year": "2015", "issn": null, "isbn": "978-1-4799-9961-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9961a250", "articleId": "12OmNvqW6Vh", "__typename": "AdjacentArticleType" }, "next": { "fno": "9961a260", "articleId": "12OmNzn38M6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2009/3583/3/3583c536", "title": "Positioning Mobile Vehicle by Using Super-Short Baseline with AM Ultrasonic Beacon", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583c536/12OmNA0dMHy", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacte/2008/3489/0/3489a336", "title": "Simulation of Acoustical Field for Linear Phased Array Transducer", "doi": null, "abstractUrl": "/proceedings-article/icacte/2008/3489a336/12OmNButpWO", "parentPublication": { "id": "proceedings/icacte/2008/3489/0", "title": "2008 International Conference on Advanced Computer Theory and Engineering (ICACTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2013/4932/0/4932a033", "title": "A Method to Simulate Acoustic Field of a Linear Phased Array Transducer", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a033/12OmNBzAci3", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icia/2006/0528/0/04097716", "title": "Energy Harvesting Transducer by Collecting Electromagnetic Energy Based on Ultrasonic Horn", "doi": null, "abstractUrl": "/proceedings-article/icia/2006/04097716/12OmNCm7BwR", "parentPublication": { "id": "proceedings/icia/2006/0528/0", "title": "2006 International Conference on Information Acquisition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/2/3118b662", "title": "Piezoelectric Single Crystals of Pb(Mg1/3Nb2/3)O3-PbTiO3 and their Applications in Medical Ultrasonic Transducers", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118b662/12OmNwDj0W8", "parentPublication": { "id": "proceedings/bmei/2008/3118/2", "title": "BioMedical Engineering and Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/2/4647b506", "title": "Performance Measurement of Ultrasonic Transducer for Surgery Application", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b506/12OmNx7XH79", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scalcom-embeddedcom/2009/3825/0/3825a347", "title": "System of Ultrasonic Transducer Performance Detection Based on Virtual Instrument and USB 2.0 Interface Technology", "doi": null, "abstractUrl": "/proceedings-article/scalcom-embeddedcom/2009/3825a347/12OmNzV70Dp", "parentPublication": { "id": "proceedings/scalcom-embeddedcom/2009/3825/0", "title": "Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/2/4647b501", "title": "Loading Mechanism of Ultrasonic Biomedical Transducer", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b501/12OmNzb7Zl6", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031a837", "title": "Development on Lithium Niobate High-Frequency (18.5MHz) Standard Ultrasonic Transducer", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031a837/12OmNzvQI6S", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcmeim/2020/4109/0/410900a802", "title": "Design and simulation analysis of ultrasonic extrusion transducer", "doi": null, "abstractUrl": "/proceedings-article/wcmeim/2020/410900a802/1t2mHuS7a6Y", "parentPublication": { "id": "proceedings/wcmeim/2020/4109/0", "title": "2020 3rd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": null, "article": { "id": "12OmNxI0KvW", "doi": "10.1109/ISDEA.2010.147", "title": "Microphone Arrays for Acoustic Detection during Laser Welding of Cold-Rolled Steel Strip", "normalizedTitle": "Microphone Arrays for Acoustic Detection during Laser Welding of Cold-Rolled Steel Strip", "abstract": "In order to achieve the quality control for the cold-rolled steel strip, it was required to monitor the laser welding processing. Acoustic signal detecting based on microphone is wildly applied in the welding processing. However, traditionally single microphone was limited by hostile background noise in the realistic industry environment. In this paper, a microphone array consisting of 7 microphones was employed to sample the acoustic signal generated by the laser welding. In order to reduce the background noise and extract the clean welding acoustic signal, the Constant Modulus Algorithm was used to the array beam former. Meanwhile, power spectrum density estimation and wavelet packet transform methods were applied to analyze the original acoustic signal and the beam former output signal. By comparing the two signals, it was obviously shown that the beam former output signal could effectively reduce the power spectrum density of the background noise at lower frequency bands. And the energy contribution was concentrated in the 15 kHz frequency range. Meanwhile, the frequency characteristic of the acoustic signal during the penetration welding processing by the modulated laser beam was explained.", "abstracts": [ { "abstractType": "Regular", "content": "In order to achieve the quality control for the cold-rolled steel strip, it was required to monitor the laser welding processing. Acoustic signal detecting based on microphone is wildly applied in the welding processing. However, traditionally single microphone was limited by hostile background noise in the realistic industry environment. In this paper, a microphone array consisting of 7 microphones was employed to sample the acoustic signal generated by the laser welding. In order to reduce the background noise and extract the clean welding acoustic signal, the Constant Modulus Algorithm was used to the array beam former. Meanwhile, power spectrum density estimation and wavelet packet transform methods were applied to analyze the original acoustic signal and the beam former output signal. By comparing the two signals, it was obviously shown that the beam former output signal could effectively reduce the power spectrum density of the background noise at lower frequency bands. And the energy contribution was concentrated in the 15 kHz frequency range. Meanwhile, the frequency characteristic of the acoustic signal during the penetration welding processing by the modulated laser beam was explained.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to achieve the quality control for the cold-rolled steel strip, it was required to monitor the laser welding processing. Acoustic signal detecting based on microphone is wildly applied in the welding processing. However, traditionally single microphone was limited by hostile background noise in the realistic industry environment. In this paper, a microphone array consisting of 7 microphones was employed to sample the acoustic signal generated by the laser welding. In order to reduce the background noise and extract the clean welding acoustic signal, the Constant Modulus Algorithm was used to the array beam former. Meanwhile, power spectrum density estimation and wavelet packet transform methods were applied to analyze the original acoustic signal and the beam former output signal. By comparing the two signals, it was obviously shown that the beam former output signal could effectively reduce the power spectrum density of the background noise at lower frequency bands. And the energy contribution was concentrated in the 15 kHz frequency range. Meanwhile, the frequency characteristic of the acoustic signal during the penetration welding processing by the modulated laser beam was explained.", "fno": "4212a935", "keywords": [ "Wavelet Transforms", "Acoustic Signal Detection", "Laser Beam Welding", "Microphone Arrays", "Modulated Laser Beam", "Microphone Arrays", "Acoustic Detection", "Cold Rolled Steel Strip", "Quality Control", "Laser Welding Processing", "Acoustic Signal Detection", "Background Noise", "Welding Acoustic Signal", "Constant Modulus Algorithm", "Array Beam Former", "Power Spectrum Density Estimation", "Wavelet Packet Transform", "Penetration Welding Processing", "Welding", "Acoustics", "Laser Beams", "Noise Measurement", "Microphone Arrays", "Laser Noise", "Power Spectrum Density", "Microphone Array", "Acoustic Signal", "Laser Welding", "Constant Modulus Algorithm" ], "authors": [], "idPrefix": "isdea", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "935-939", "year": "2010", "issn": null, "isbn": "978-0-7695-4212-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4212a931", "articleId": "12OmNscOUif", "__typename": "AdjacentArticleType" }, "next": { "fno": "4212a940", "articleId": "12OmNwnYFXF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icece/2010/4031/0/4031f167", "title": "Development on Methods of Laser Welding of Plastics", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031f167/12OmNAtst5H", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2010/4286/1/4286a336", "title": "Blind Source Separation Based on Principal Component Analysis-Independent Component Analysis for Acoustic Signal During Laser Welding Process", "doi": null, "abstractUrl": "/proceedings-article/icdma/2010/4286a336/12OmNC8MsGj", "parentPublication": { "id": "proceedings/icdma/2010/4286/1", "title": "2010 International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1990/2180/1/00523294", "title": "Constrained optimum filtering for multi-microphone digital hearing aids", "doi": null, "abstractUrl": "/proceedings-article/acssc/1990/00523294/12OmNqBKTSV", "parentPublication": { "id": "proceedings/acssc/1990/2180/2", "title": "1990 Conference Record Twenty-Fourth Asilomar Conference on Signals, Systems and Computers, 1990.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2010/3962/2/3962c079", "title": "Effects of Process Parameters on the Bead Formation During Laser Seal Welding of Ultra Thin Titanium Shell", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962c079/12OmNvpNIoa", "parentPublication": { "id": "proceedings/icmtma/2010/3962/2", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2005/9331/0/01521397", "title": "An adaptive microphone array with local acoustic sensitivity", "doi": null, "abstractUrl": "/proceedings-article/icme/2005/01521397/12OmNxw5BmD", "parentPublication": { "id": "proceedings/icme/2005/9331/0", "title": "2005 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2009/3899/0/3899a201", "title": "Analysis of Welding Defects in Spot Welding Process U-I Curves", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a201/12OmNy50gbX", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394367", "title": "Gain self-calibration procedure for microphone arrays", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394367/12OmNyS6RED", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031f643", "title": "Study on Principle and Technology of Automatic Welding of Bellows Based on Measurement", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031f643/12OmNzXnNsK", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1991/2470/0/00186470", "title": "Desired-speech signal cancellation by microphone arrays in reverberant rooms", "doi": null, "abstractUrl": "/proceedings-article/acssc/1991/00186470/12OmNzZWbRP", "parentPublication": { "id": "proceedings/acssc/1991/2470/0", "title": "Conference Record of the Twenty-Fifth Asilomar Conference on Signals, Systems & Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedme/2020/8145/0/09122217", "title": "Analysis of porosity in welding of titanium alloy", "doi": null, "abstractUrl": "/proceedings-article/icedme/2020/09122217/1kRSHaXG9B6", "parentPublication": { "id": "proceedings/icedme/2020/8145/0", "title": "2020 3rd International Conference on Electron Device and Mechanical Engineering (ICEDME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyuPL0j", "title": "2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "acronym": "mass", "groupId": "1001499", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxRWIai", "doi": "10.1109/MASS.2017.71", "title": "SSFB: Signal-Space-Frequency Beamforming for Underwater Acoustic Video Transmission", "normalizedTitle": "SSFB: Signal-Space-Frequency Beamforming for Underwater Acoustic Video Transmission", "abstract": "Transmitting large amounts of data such as videos underwater is an important yet challenging problem in the harsh underwater environment in which radio-frequency waves are absorbed for distances above a few tens of meters, optical waves require narrow laser beams and suffer from scattering and ocean wave motion, and acoustic waves-while being able to propagate up to several tens of kilometers-lead to a communication channel that is very dynamic, prone to fading, spectrum limited with passband bandwidths of only a few tens of kHz, and affected by non-Gaussian noise. Notwithstanding these challenges, a hybrid solution that is capable of transmitting at high data rates underwater via acoustic waves at short/medium distances is proposed. The solution introduces a novel signaling method, called Signal-Space-Frequency Beamforming (SSFB), for a multiple antenna where each antenna consists of Uniform Circular Array (UCA) hydrophones mounted on an underwater vehicle to steer the beam in both azimuth and elevation planes; then, an array of Acoustic Vector Sensors (AVS)-hydrophones that are able to capture the acoustic particle velocity/direction of arrival in addition to measuring regular scalar pressure-are mounted on the surface buoy. Detection is performed based on the beam spatial separation and direction of arrival angles' estimation. Simulation results confirm that this solution outperforms stateof-the-art underwater acoustic transmission techniques, whose data rates are limited only to few tens of kbps.", "abstracts": [ { "abstractType": "Regular", "content": "Transmitting large amounts of data such as videos underwater is an important yet challenging problem in the harsh underwater environment in which radio-frequency waves are absorbed for distances above a few tens of meters, optical waves require narrow laser beams and suffer from scattering and ocean wave motion, and acoustic waves-while being able to propagate up to several tens of kilometers-lead to a communication channel that is very dynamic, prone to fading, spectrum limited with passband bandwidths of only a few tens of kHz, and affected by non-Gaussian noise. Notwithstanding these challenges, a hybrid solution that is capable of transmitting at high data rates underwater via acoustic waves at short/medium distances is proposed. The solution introduces a novel signaling method, called Signal-Space-Frequency Beamforming (SSFB), for a multiple antenna where each antenna consists of Uniform Circular Array (UCA) hydrophones mounted on an underwater vehicle to steer the beam in both azimuth and elevation planes; then, an array of Acoustic Vector Sensors (AVS)-hydrophones that are able to capture the acoustic particle velocity/direction of arrival in addition to measuring regular scalar pressure-are mounted on the surface buoy. Detection is performed based on the beam spatial separation and direction of arrival angles' estimation. Simulation results confirm that this solution outperforms stateof-the-art underwater acoustic transmission techniques, whose data rates are limited only to few tens of kbps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Transmitting large amounts of data such as videos underwater is an important yet challenging problem in the harsh underwater environment in which radio-frequency waves are absorbed for distances above a few tens of meters, optical waves require narrow laser beams and suffer from scattering and ocean wave motion, and acoustic waves-while being able to propagate up to several tens of kilometers-lead to a communication channel that is very dynamic, prone to fading, spectrum limited with passband bandwidths of only a few tens of kHz, and affected by non-Gaussian noise. Notwithstanding these challenges, a hybrid solution that is capable of transmitting at high data rates underwater via acoustic waves at short/medium distances is proposed. The solution introduces a novel signaling method, called Signal-Space-Frequency Beamforming (SSFB), for a multiple antenna where each antenna consists of Uniform Circular Array (UCA) hydrophones mounted on an underwater vehicle to steer the beam in both azimuth and elevation planes; then, an array of Acoustic Vector Sensors (AVS)-hydrophones that are able to capture the acoustic particle velocity/direction of arrival in addition to measuring regular scalar pressure-are mounted on the surface buoy. Detection is performed based on the beam spatial separation and direction of arrival angles' estimation. Simulation results confirm that this solution outperforms stateof-the-art underwater acoustic transmission techniques, whose data rates are limited only to few tens of kbps.", "fno": "2324a180", "keywords": [ "Acoustic Signal Processing", "Array Signal Processing", "Direction Of Arrival Estimation", "Gaussian Noise", "Hydrophones", "Laser Beams", "Ocean Waves", "Oceanographic Techniques", "Underwater Acoustic Communication", "Underwater Sound", "Underwater Vehicles", "SSFB", "Underwater Acoustic Video Transmission", "Videos", "Harsh Underwater Environment", "Radio Frequency Waves", "Optical Waves", "Narrow Laser Beams", "Scattering", "Ocean Wave Motion", "Communication Channel", "Passband Bandwidths", "Non Gaussian Noise", "Hybrid Solution", "High Data Rates", "Multiple Antenna", "Underwater Vehicle", "Elevation Planes", "Beam Spatial Separation", "Acoustic Waves", "Acoustic Vector Sensors", "Signaling Method", "Signal Space Frequency Beamforming", "Uniform Circular Array Hydrophones", "State Of The Art Underwater Acoustic Transmission Techniques", "Acoustics", "Acoustic Beams", "Antenna Arrays", "Estimation", "Streaming Media", "OFDM", "Array Signal Processing", "Acoustic Vector Sensors", "Underwater Transmission", "Underwater Wireless Networks", "Multimedia Transmission" ], "authors": [ { "affiliation": null, "fullName": "Mehdi Rahmati", "givenName": "Mehdi", "surname": "Rahmati", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dario Pompili", "givenName": "Dario", "surname": "Pompili", "__typename": "ArticleAuthorType" } ], "idPrefix": "mass", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "180-188", "year": "2017", "issn": "2155-6814", "isbn": "978-1-5386-2324-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2324a171", "articleId": "12OmNyTfg6g", "__typename": "AdjacentArticleType" }, "next": { "fno": "2324a189", "articleId": "12OmNqBtiId", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/msn/2013/5159/0/06726303", "title": "A Beam Width and Direction Concerned Routing for Underwater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726303/12OmNwM6A66", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175784", "title": "Acoustic imaging: the reconstruction of underwater objects", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175784/12OmNyaGeL0", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a346", "title": "The Protocol of Physical Layer for Underwater Acoustic Network", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a346/12OmNz3bdBA", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa/2010/4190/0/4190a138", "title": "Direct Mapping OFDM-Based Transmission Scheme for Underwater Acoustic Multimedia", "doi": null, "abstractUrl": "/proceedings-article/ispa/2010/4190a138/12OmNzX6clh", "parentPublication": { "id": "proceedings/ispa/2010/4190/0", "title": "International Symposium on Parallel and Distributed Processing with Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sensorcomm/2009/3669/0/3669a300", "title": "Underwater Acoustic Networks - Survey on Communication Challenges with Transmission Simulations", "doi": null, "abstractUrl": "/proceedings-article/sensorcomm/2009/3669a300/12OmNzkMlTW", "parentPublication": { "id": "proceedings/sensorcomm/2009/3669/0", "title": "Sensor Technologies and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2018/3652/0/08390290", "title": "Adaptive Video Transmission Designs Over Underwater Acoustic Channels", "doi": null, "abstractUrl": "/proceedings-article/icnc/2018/08390290/12OmNzsJ7IE", "parentPublication": { "id": "proceedings/icnc/2018/3652/0", "title": "2018 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2014/02/06763113", "title": "Challenges and Opportunities of Underwater Cognitive Acoustic Networks", "doi": null, "abstractUrl": "/journal/ec/2014/02/06763113/13rRUzpzeJ8", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/02/08502817", "title": "Probabilistic Spatially-Divided Multiple Access in Underwater Acoustic Sparse Networks", "doi": null, "abstractUrl": "/journal/tm/2020/02/08502817/14C6d7kmuU8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2020/9866/0/986600a256", "title": "FD-UWA: Full-Duplex Underwater Acoustic Comms via Self-Interference Cancellation in Space", "doi": null, "abstractUrl": "/proceedings-article/mass/2020/986600a256/1rsj2Q8L0D6", "parentPublication": { "id": "proceedings/mass/2020/9866/0", "title": "2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itnac/2021/2784/0/09652144", "title": "Performance Optimisation for Underwater Acoustic Chirp Communication", "doi": null, "abstractUrl": "/proceedings-article/itnac/2021/09652144/1zG3aeMReWA", "parentPublication": { "id": "proceedings/itnac/2021/2784/0", "title": "2021 31st International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBezSEm", "title": "2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom)", "acronym": "bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxWLTGP", "doi": "10.1109/BDCloud-SocialCom-SustainCom.2016.70", "title": "Tidal Variability of Acoustic Detection", "normalizedTitle": "Tidal Variability of Acoustic Detection", "abstract": "Acoustic telemetry is an essential tool for ecological and behavioral analysis of fish and marine mammals in fresh and sea water. However, the accuracy of acoustic telemetry is a challenging problem in that acoustic detection is affected by various environmental factors that govern sound speed and propagation: density, density stratification, mixing, and the environmental processes that control them. In this paper, we focus on tidal variability in acoustic range and detection using data from a summer 2014 experiment at Gray's Reef National Marine Sanctuary in which an array of stationary receivers was deployed with co-located tags for 53 days. We assess the potential effect of signal collision, which occurs when multiple tag transmissions interfere and cannot be detected by the receiver, and find that signal collision may occur more frequently than predicted. Number of hourly detections at each receiver is found to vary significantly in space and in time, and tag/receiver pairs oriented alongshore have more detections than cross-shore pairs. The principal lunar component (M2), the tidal constituent that contributes the majority of current variance, is found to explain variability in detections. Maximum detections occur when currents are aligned with the semi-major axis (oriented cross-shore), while no strong directional correlation is found when detections are least likely. This result may give us clues about how important tidal variability can be in determining acoustic range relative to other processes that govern acoustic propagation. Better understanding of detection range and its variability in time can improve array design and data interpretation.", "abstracts": [ { "abstractType": "Regular", "content": "Acoustic telemetry is an essential tool for ecological and behavioral analysis of fish and marine mammals in fresh and sea water. However, the accuracy of acoustic telemetry is a challenging problem in that acoustic detection is affected by various environmental factors that govern sound speed and propagation: density, density stratification, mixing, and the environmental processes that control them. In this paper, we focus on tidal variability in acoustic range and detection using data from a summer 2014 experiment at Gray's Reef National Marine Sanctuary in which an array of stationary receivers was deployed with co-located tags for 53 days. We assess the potential effect of signal collision, which occurs when multiple tag transmissions interfere and cannot be detected by the receiver, and find that signal collision may occur more frequently than predicted. Number of hourly detections at each receiver is found to vary significantly in space and in time, and tag/receiver pairs oriented alongshore have more detections than cross-shore pairs. The principal lunar component (M2), the tidal constituent that contributes the majority of current variance, is found to explain variability in detections. Maximum detections occur when currents are aligned with the semi-major axis (oriented cross-shore), while no strong directional correlation is found when detections are least likely. This result may give us clues about how important tidal variability can be in determining acoustic range relative to other processes that govern acoustic propagation. Better understanding of detection range and its variability in time can improve array design and data interpretation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Acoustic telemetry is an essential tool for ecological and behavioral analysis of fish and marine mammals in fresh and sea water. However, the accuracy of acoustic telemetry is a challenging problem in that acoustic detection is affected by various environmental factors that govern sound speed and propagation: density, density stratification, mixing, and the environmental processes that control them. In this paper, we focus on tidal variability in acoustic range and detection using data from a summer 2014 experiment at Gray's Reef National Marine Sanctuary in which an array of stationary receivers was deployed with co-located tags for 53 days. We assess the potential effect of signal collision, which occurs when multiple tag transmissions interfere and cannot be detected by the receiver, and find that signal collision may occur more frequently than predicted. Number of hourly detections at each receiver is found to vary significantly in space and in time, and tag/receiver pairs oriented alongshore have more detections than cross-shore pairs. The principal lunar component (M2), the tidal constituent that contributes the majority of current variance, is found to explain variability in detections. Maximum detections occur when currents are aligned with the semi-major axis (oriented cross-shore), while no strong directional correlation is found when detections are least likely. This result may give us clues about how important tidal variability can be in determining acoustic range relative to other processes that govern acoustic propagation. Better understanding of detection range and its variability in time can improve array design and data interpretation.", "fno": "3936a431", "keywords": [ "Receivers", "Acoustics", "Telemetry", "Tides", "Arrays", "Acoustic Arrays", "Transmitters", "Sound Propagation", "Acoustic Telemetry", "Fish Tag", "Detection Range", "Tides", "Coastal Oceanography" ], "authors": [ { "affiliation": null, "fullName": "Sungjin Cho", "givenName": "Sungjin", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fumin Zhang", "givenName": "Fumin", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Catherine Edwards", "givenName": "Catherine", "surname": "Edwards", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "431-436", "year": "2016", "issn": null, "isbn": "978-1-5090-3936-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3936a424", "articleId": "12OmNqyUUHI", "__typename": "AdjacentArticleType" }, "next": { "fno": "3936a437", "articleId": "12OmNzZWbL1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2004/8484/4/01326975", "title": "Data communication along the drill string using acoustic waves", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326975/12OmNAObbD1", "parentPublication": { "id": "proceedings/icassp/2004/8484/4", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518218", "title": "An Acoustic Traffic Monitoring System: Design and Implementation", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518218/12OmNBKW9tT", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccc/2017/2008/0/2008a096", "title": "Cognitive Acoustic Analytics Service for Internet of Things", "doi": null, "abstractUrl": "/proceedings-article/iccc/2017/2008a096/12OmNBeRtMz", "parentPublication": { "id": "proceedings/iccc/2017/2008/0", "title": "2017 IEEE International Conference on Cognitive Computing (ICCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2014/4261/0/4261b110", "title": "Tidal Current Numerical Modeling of Zhanjiang Bay", "doi": null, "abstractUrl": "/proceedings-article/isdea/2014/4261b110/12OmNwE9Otb", "parentPublication": { "id": "proceedings/isdea/2014/4261/0", "title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/4353/2/05750991", "title": "Study on Optimization and Performance of Four-element Acoustic Sensors Array", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750991/12OmNwNOaK8", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2014/7502/0/7502a046", "title": "Analysis of Acoustic Cardiac Signals for Heart Rate Variability and Murmur Detection Using Nonnegative Matrix Factorization-Based Hierarchical Decomposition", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a046/12OmNxXCGGj", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2014/4261/0/4261a209", "title": "Analysis of Tidal Current Characteristic in Maoming Port Jida Port Area", "doi": null, "abstractUrl": "/proceedings-article/isdea/2014/4261a209/12OmNyYDDwU", "parentPublication": { "id": "proceedings/isdea/2014/4261/0", "title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a346", "title": "The Protocol of Physical Layer for Underwater Acoustic Network", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a346/12OmNz3bdBA", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispcem/2022/9271/0/927100a386", "title": "Analysis of Active Directional Acoustic Energy Propagation Characteristics", "doi": null, "abstractUrl": "/proceedings-article/ispcem/2022/927100a386/1LHd1Fxfi6c", "parentPublication": { "id": "proceedings/ispcem/2022/9271/0", "title": "2022 2nd International Signal Processing, Communications and Engineering Management Conference (ISPCEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2019/6303/0/09162403", "title": "Demonstration and Evaluation of Small Tidal Current Power Systems", "doi": null, "abstractUrl": "/proceedings-article/csde/2019/09162403/1m6hPtPSGKk", "parentPublication": { "id": "proceedings/csde/2019/6303/0", "title": "2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz4Bdh8", "title": "2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)", "acronym": "dcabes", "groupId": "1800130", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyL0Tp0", "doi": "10.1109/DCABES.2014.34", "title": "Beam-Tracing Domain Decomposition Method for Urban Acoustic Pollution", "normalizedTitle": "Beam-Tracing Domain Decomposition Method for Urban Acoustic Pollution", "abstract": "This paper covers the fast solution of large acoustic problems on low-resources parallel platforms. A domain decomposition method is coupled with a dynamic load balancing scheme to efficiently accelerate a geometrical acoustic method. The geometrical method studied implements a beam-tracing method where intersections are handled as in a ray-tracing method. Beyond the distribution of the global processing upon multiple sub-domains, a second parallelization level is operated by means of multi-threading and shared memory mechanisms. Numerical experiments show that this method allows to handle large scale open domains for parallel computing purposes on few machines. Urban acoustic pollution arrising from car traffic was simulated on a large model of the Shinjuku district of Tokyo, Japan. The good speed-up results illustrate the performance of this new domain decomposition method.", "abstracts": [ { "abstractType": "Regular", "content": "This paper covers the fast solution of large acoustic problems on low-resources parallel platforms. A domain decomposition method is coupled with a dynamic load balancing scheme to efficiently accelerate a geometrical acoustic method. The geometrical method studied implements a beam-tracing method where intersections are handled as in a ray-tracing method. Beyond the distribution of the global processing upon multiple sub-domains, a second parallelization level is operated by means of multi-threading and shared memory mechanisms. Numerical experiments show that this method allows to handle large scale open domains for parallel computing purposes on few machines. Urban acoustic pollution arrising from car traffic was simulated on a large model of the Shinjuku district of Tokyo, Japan. The good speed-up results illustrate the performance of this new domain decomposition method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper covers the fast solution of large acoustic problems on low-resources parallel platforms. A domain decomposition method is coupled with a dynamic load balancing scheme to efficiently accelerate a geometrical acoustic method. The geometrical method studied implements a beam-tracing method where intersections are handled as in a ray-tracing method. Beyond the distribution of the global processing upon multiple sub-domains, a second parallelization level is operated by means of multi-threading and shared memory mechanisms. Numerical experiments show that this method allows to handle large scale open domains for parallel computing purposes on few machines. Urban acoustic pollution arrising from car traffic was simulated on a large model of the Shinjuku district of Tokyo, Japan. The good speed-up results illustrate the performance of this new domain decomposition method.", "fno": "4169a162", "keywords": [ "Acoustics", "Acoustic Beams", "Ray Tracing", "Computational Modeling", "Mathematical Model", "Microphones", "Instruction Sets", "Beam Tracing Methods", "Domain Decomposition Methods", "Parallel And Distributed Computing", "Acoustics", "Ray Tracing Methods" ], "authors": [ { "affiliation": null, "fullName": "Guillaume Gbikpi-Benissan", "givenName": "Guillaume", "surname": "Gbikpi-Benissan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Frederic Magoules", "givenName": "Frederic", "surname": "Magoules", "__typename": "ArticleAuthorType" } ], "idPrefix": "dcabes", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "162-166", "year": "2014", "issn": null, "isbn": "978-1-4799-4169-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4169a157", "articleId": "12OmNyuPKZ4", "__typename": "AdjacentArticleType" }, "next": { "fno": "4169a167", "articleId": "12OmNxXl5Er", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2014/4871/0/06918663", "title": "Generalized cross-correlation based noise robust abnormal acoustic event localization utilizing non-negative matrix factorization", "doi": null, "abstractUrl": "/proceedings-article/avss/2014/06918663/12OmNrGsDnm", "parentPublication": { "id": "proceedings/avss/2014/4871/0", "title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2013/5159/0/06726303", "title": "A Beam Width and Direction Concerned Routing for Underwater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726303/12OmNwM6A66", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2011/4415/0/4415a001", "title": "Parallel Domain Decomposition Methods for Ray-Tracing on Multi-cores and Multi-processors", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2011/4415a001/12OmNxFaLpg", "parentPublication": { "id": "proceedings/dcabes/2011/4415/0", "title": "2011 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2017/2324/0/2324a180", "title": "SSFB: Signal-Space-Frequency Beamforming for Underwater Acoustic Video Transmission", "doi": null, "abstractUrl": "/proceedings-article/mass/2017/2324a180/12OmNxRWIai", "parentPublication": { "id": "proceedings/mass/2017/2324/0", "title": "2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2013/5060/0/5060a061", "title": "A Beam-Tracing Domain Decomposition Method for Sound Holography in Church Acoustics", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2013/5060a061/12OmNzlUKNO", "parentPublication": { "id": "proceedings/dcabes/2013/5060/0", "title": "2013 12th International Symposium on Distributed Computing and Applications to Business, Engineering & Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07374736", "title": "3D Beam Tracing Based on Visibility Lookup for Interactive Acoustic Modeling", "doi": null, "abstractUrl": "/journal/tg/2016/10/07374736/13rRUIJcWlr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/11/ttg2012111797", "title": "Guided Multiview Ray Tracing for Fast Auralization", "doi": null, "abstractUrl": "/journal/tg/2012/11/ttg2012111797/13rRUxAAST4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1672", "title": "Interactive sound rendering in complex and dynamic scenes using frustum tracing", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1672/13rRUxNEqPJ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/02/08502817", "title": "Probabilistic Spatially-Divided Multiple Access in Underwater Acoustic Sparse Networks", "doi": null, "abstractUrl": "/journal/tm/2020/02/08502817/14C6d7kmuU8", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2021/05/09439936", "title": "Localizing Acoustic Objects on a Single Phone", "doi": null, "abstractUrl": "/journal/nt/2021/05/09439936/1tRKfaIu5ri", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC3q", "title": "2013 12th International Symposium on Distributed Computing and Applications to Business, Engineering & Science (DCABES)", "acronym": "dcabes", "groupId": "1800130", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzlUKNO", "doi": "10.1109/DCABES.2013.18", "title": "A Beam-Tracing Domain Decomposition Method for Sound Holography in Church Acoustics", "normalizedTitle": "A Beam-Tracing Domain Decomposition Method for Sound Holography in Church Acoustics", "abstract": "In this paper, an original beam-tracing domain decomposition method is proposed for church acoustics. This new method allows to analyze large-scale acoustics problems in a reasonnable time on parallel architectures. Numerical experiments, for sound holography within the church of the Royaumont abbey, illustrate the performance of the proposed beam-tracing domain decomposition method on multi-cores and multi-processors architectures.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, an original beam-tracing domain decomposition method is proposed for church acoustics. This new method allows to analyze large-scale acoustics problems in a reasonnable time on parallel architectures. Numerical experiments, for sound holography within the church of the Royaumont abbey, illustrate the performance of the proposed beam-tracing domain decomposition method on multi-cores and multi-processors architectures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, an original beam-tracing domain decomposition method is proposed for church acoustics. This new method allows to analyze large-scale acoustics problems in a reasonnable time on parallel architectures. Numerical experiments, for sound holography within the church of the Royaumont abbey, illustrate the performance of the proposed beam-tracing domain decomposition method on multi-cores and multi-processors architectures.", "fno": "5060a061", "keywords": [ "Acoustics", "Solid Modeling", "Mathematical Model", "Acoustic Beams", "Computational Modeling", "Microphones", "Finite Element Analysis", "Church Acoustics", "Domain Decomposition Method", "Beam Tracing Method", "Parallel Computing", "Acoustics" ], "authors": [ { "affiliation": null, "fullName": "Frederic Magoules", "givenName": "Frederic", "surname": "Magoules", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Remi Cerise", "givenName": "Remi", "surname": "Cerise", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Patrick Callet", "givenName": "Patrick", "surname": "Callet", "__typename": "ArticleAuthorType" } ], "idPrefix": "dcabes", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "61-65", "year": "2013", "issn": null, "isbn": "978-0-7695-5060-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5060a055", "articleId": "12OmNvD8Rup", "__typename": "AdjacentArticleType" }, "next": { "fno": "5060a066", "articleId": "12OmNxw5B3h", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2005/2397/0/23970961", "title": "The Application of Adaptive Beam Tracing and Managed DirectX for the Visualisation and Auralisation of Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970961/12OmNASILJP", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2013/5159/0/06726303", "title": "A Beam Width and Direction Concerned Routing for Underwater Acoustic Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726303/12OmNwM6A66", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2015/9961/0/9961a255", "title": "A Test Based on Beam Angle of Ultrasonic Transducer Array", "doi": null, "abstractUrl": "/proceedings-article/csa/2015/9961a255/12OmNx76TGg", "parentPublication": { "id": "proceedings/csa/2015/9961/0", "title": "2015 International Conference on Computer Science and Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2014/4169/0/4169a162", "title": "Beam-Tracing Domain Decomposition Method for Urban Acoustic Pollution", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2014/4169a162/12OmNyL0Tp0", "parentPublication": { "id": "proceedings/dcabes/2014/4169/0", "title": "2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2010/4080/2/05571343", "title": "Broadband Beam Forming for Circular Sensor Array via Modal Decomposition", "doi": null, "abstractUrl": "/proceedings-article/icie/2010/05571343/12OmNzxyiMl", "parentPublication": { "id": "proceedings/icie/2010/4080/2", "title": "Information Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07374736", "title": "3D Beam Tracing Based on Visibility Lookup for Interactive Acoustic Modeling", "doi": null, "abstractUrl": "/journal/tg/2016/10/07374736/13rRUIJcWlr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v1173", "title": "Comparative Visualization for Wave-based and Geometric Acoustics", "doi": null, "abstractUrl": "/journal/tg/2006/05/v1173/13rRUxlgy3u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2020/01/08607106", "title": "Towards Scalable Indoor Map Construction and Refinement using Acoustics on Smartphones", "doi": null, "abstractUrl": "/journal/tm/2020/01/08607106/17D45XacGi6", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982263", "title": "Galerkin Least Square Method for Time-Harmonic Acoustics in Royaumont Abbey", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982263/17D45XeKgri", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982273", "title": "Galerkin Gradient Least Square Method for Sound Holography in Royaumont Abbey", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982273/17D45XzbnKQ", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuiqM", "title": "Information Engineering, International Conference on", "acronym": "icie", "groupId": "1002844", "volume": "2", "displayVolume": "2", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzxyiMl", "doi": "10.1109/ICIE.2010.144", "title": "Broadband Beam Forming for Circular Sensor Array via Modal Decomposition", "normalizedTitle": "Broadband Beam Forming for Circular Sensor Array via Modal Decomposition", "abstract": "A new method of broadband constant beamwidth beam-forming for circular arrays is proposed in this paper. The design requirements of this method were specified by the weights which formed the low-side-lobe beams of each sub-band over the broad frequency band. The low-side-lobe beams of each sub-band which expands the expected beam using orthogonal series, obtains the orthogonal series coefficients by optimization method, gets array element weights according to the physical mechanism, and then composes its direction. The beam forming on the circular sensor array is optimized on the computer. The side-lobe is lowed with the appropriate main lobe using the proposed method. The method can be used in multifold application occasions on the beam forming design and optimization effectively.", "abstracts": [ { "abstractType": "Regular", "content": "A new method of broadband constant beamwidth beam-forming for circular arrays is proposed in this paper. The design requirements of this method were specified by the weights which formed the low-side-lobe beams of each sub-band over the broad frequency band. The low-side-lobe beams of each sub-band which expands the expected beam using orthogonal series, obtains the orthogonal series coefficients by optimization method, gets array element weights according to the physical mechanism, and then composes its direction. The beam forming on the circular sensor array is optimized on the computer. The side-lobe is lowed with the appropriate main lobe using the proposed method. The method can be used in multifold application occasions on the beam forming design and optimization effectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new method of broadband constant beamwidth beam-forming for circular arrays is proposed in this paper. The design requirements of this method were specified by the weights which formed the low-side-lobe beams of each sub-band over the broad frequency band. The low-side-lobe beams of each sub-band which expands the expected beam using orthogonal series, obtains the orthogonal series coefficients by optimization method, gets array element weights according to the physical mechanism, and then composes its direction. The beam forming on the circular sensor array is optimized on the computer. The side-lobe is lowed with the appropriate main lobe using the proposed method. The method can be used in multifold application occasions on the beam forming design and optimization effectively.", "fno": "05571343", "keywords": [ "Acoustic Signal Processing", "Acoustic Transducers", "Array Signal Processing", "Modal Analysis", "Underwater Sound", "Broadband Beam Forming", "Circular Sensor Array", "Modal Decomposition", "Broadband Constant Beamwidth Beamforming", "Low Side Lobe Beams", "Optimization Method", "Array Element", "Arrays", "Acoustic Beams", "Broadband Communication", "Manifolds", "Acoustics", "Optimization Methods", "Narrowband", "Modal Decomposition", "Circular Sensor Array", "Broadband Beam Forming", "Fourier Transform" ], "authors": [ { "affiliation": null, "fullName": "Gan Tian", "givenName": "Gan", "surname": "Tian", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Ying-min", "givenName": "Wang", "surname": "Ying-min", "__typename": "ArticleAuthorType" } ], "idPrefix": "icie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "203-206", "year": "2010", "issn": null, "isbn": "978-1-4244-7506-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05571338", "articleId": "12OmNwD1q5g", "__typename": "AdjacentArticleType" }, "next": { "fno": "05571344", "articleId": "12OmNAgGwhc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mwscas/2009/4479/0/05236019", "title": "Digital beam-forming implementation for downlink smart antenna system", "doi": null, "abstractUrl": "/proceedings-article/mwscas/2009/05236019/12OmNBO3K3r", "parentPublication": { "id": "proceedings/mwscas/2009/4479/0", "title": "Circuits and Systems, Midwest Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2016/4155/0/4155a311", "title": "Research of Vector Array STMV Beam-Forming Technology and Its Sea Trial Application", "doi": null, "abstractUrl": "/proceedings-article/icris/2016/4155a311/12OmNwE9OJg", "parentPublication": { "id": "proceedings/icris/2016/4155/0", "title": "2016 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwmc/2008/3274/0/3274a315", "title": "Adjustable Dual Beam Wireless Base Station Antenna", "doi": null, "abstractUrl": "/proceedings-article/icwmc/2008/3274a315/12OmNwwMeZ9", "parentPublication": { "id": "proceedings/icwmc/2008/3274/0", "title": "Wireless and Mobile Communications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2015/9961/0/9961a255", "title": "A Test Based on Beam Angle of Ultrasonic Transducer Array", "doi": null, "abstractUrl": "/proceedings-article/csa/2015/9961a255/12OmNx76TGg", "parentPublication": { "id": "proceedings/csa/2015/9961/0", "title": "2015 International Conference on Computer Science and Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mncapps/2012/4720/0/4720a005", "title": "A Novelistic Approach for Rapid Beam Forming in Smart Antennas for Wireless Applications Using Smart-Fractal Concepts and New Algorithm", "doi": null, "abstractUrl": "/proceedings-article/mncapps/2012/4720a005/12OmNxTmHK1", "parentPublication": { "id": "proceedings/mncapps/2012/4720/0", "title": "2012 International Conference on Advances in Mobile Network, Communication and Its Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07374736", "title": "3D Beam Tracing Based on Visibility Lookup for Interactive Acoustic Modeling", "doi": null, "abstractUrl": "/journal/tg/2016/10/07374736/13rRUIJcWlr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ises/2022/9922/0/992200a078", "title": "Power Pattern Synthesis of Time Modulated Circular Array Antenna Employing Optimization Algorithm", "doi": null, "abstractUrl": "/proceedings-article/ises/2022/992200a078/1KrgzsTUP16", "parentPublication": { "id": "proceedings/ises/2022/9922/0", "title": "2022 IEEE International Symposium on Smart Electronic Systems (iSES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctec/2017/5784/0/578400a858", "title": "Digital Beam Forming Analysis Based on Phased Array", "doi": null, "abstractUrl": "/proceedings-article/icctec/2017/578400a858/1cks3iuAm1G", "parentPublication": { "id": "proceedings/icctec/2017/5784/0", "title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2019/2542/0/254200a292", "title": "Near Field Beam Forming Characteristics of Conformal Antenna Arrays", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2019/254200a292/1gjRXLPc13i", "parentPublication": { "id": "proceedings/cyberc/2019/2542/0", "title": "2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c145", "title": "Digital Beam Forming Based On A Kind Of Multicarrier Wideband Waveforms", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c145/1tzyB5E4qaI", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMZ", "title": "2008 12th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNApcufs", "doi": "10.1109/IV.2008.62", "title": "Creating Local Geographies for Map-Based Cyber Navigation", "normalizedTitle": "Creating Local Geographies for Map-Based Cyber Navigation", "abstract": "Although Internet and WWW phenomena are often described using spatial metaphors, the commonest means of geographic orientation - the map - is little used in online navigation. Maps of the physical world are however available online, as are maps illustrating physical Internet topography, semantic maps showing content linkages and maps of gaming environments, usually realistic simulations. Lacking an underlying geography, maps of entire virtual spaces such as cooperative knowledge spaces seem impossible or impractical as long as their sites are conceived only as unstructured or at most hierarchical) addresses.The ViCToR project (Virtual Cooperation in Teaching and Research) at the Technische Universit?t Berlin uses a room metaphor to implement a shared, user-defined space for carrying out cooperative work in education and research. So far navigation in the hierarchically structured rooms is poorly developed. This paper explores the possibilities for implementing map-based domain navigation using a community-created local geography based on coordinates.", "abstracts": [ { "abstractType": "Regular", "content": "Although Internet and WWW phenomena are often described using spatial metaphors, the commonest means of geographic orientation - the map - is little used in online navigation. Maps of the physical world are however available online, as are maps illustrating physical Internet topography, semantic maps showing content linkages and maps of gaming environments, usually realistic simulations. Lacking an underlying geography, maps of entire virtual spaces such as cooperative knowledge spaces seem impossible or impractical as long as their sites are conceived only as unstructured or at most hierarchical) addresses.The ViCToR project (Virtual Cooperation in Teaching and Research) at the Technische Universit?t Berlin uses a room metaphor to implement a shared, user-defined space for carrying out cooperative work in education and research. So far navigation in the hierarchically structured rooms is poorly developed. This paper explores the possibilities for implementing map-based domain navigation using a community-created local geography based on coordinates.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although Internet and WWW phenomena are often described using spatial metaphors, the commonest means of geographic orientation - the map - is little used in online navigation. Maps of the physical world are however available online, as are maps illustrating physical Internet topography, semantic maps showing content linkages and maps of gaming environments, usually realistic simulations. Lacking an underlying geography, maps of entire virtual spaces such as cooperative knowledge spaces seem impossible or impractical as long as their sites are conceived only as unstructured or at most hierarchical) addresses.The ViCToR project (Virtual Cooperation in Teaching and Research) at the Technische Universit?t Berlin uses a room metaphor to implement a shared, user-defined space for carrying out cooperative work in education and research. So far navigation in the hierarchically structured rooms is poorly developed. This paper explores the possibilities for implementing map-based domain navigation using a community-created local geography based on coordinates.", "fno": "3268a397", "keywords": [ "Cybergeography", "Virtual Space", "Map Based Navigation", "Computer Supported Cooperative Work" ], "authors": [ { "affiliation": null, "fullName": "Sabine Cikic", "givenName": "Sabine", "surname": "Cikic", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sabina Jeschke", "givenName": "Sabina", "surname": "Jeschke", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fritz Lehmann-Grube", "givenName": "Fritz", "surname": "Lehmann-Grube", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "397-402", "year": "2008", "issn": "1550-6037", "isbn": "978-0-7695-3268-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3268a391", "articleId": "12OmNx2zjwN", "__typename": "AdjacentArticleType" }, "next": { "fno": "3268a403", "articleId": "12OmNzxyiCj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgiv/2009/3789/0/3789a497", "title": "Integrated Tourist Navigation System", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a497/12OmNA0dMJB", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2009/3767/0/3767a075", "title": "Pervasive Scene Map on Wireless Devices for City Navigation", "doi": null, "abstractUrl": "/proceedings-article/nbis/2009/3767a075/12OmNB8kHXo", "parentPublication": { "id": "proceedings/nbis/2009/3767/0", "title": "2009 International Conference on Network-Based Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcecs/2008/3555/0/3555a219", "title": "An e-Map Navigation System: Provide Region Search and Visualize Landmark Information", "doi": null, "abstractUrl": "/proceedings-article/wcecs/2008/3555a219/12OmNC8MsKF", "parentPublication": { "id": "proceedings/wcecs/2008/3555/0", "title": "World Congress on Engineering and Computer Science, Advances in Electrical and Electronics Engineering - IAENG Special Edition of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoip/2010/4252/2/4252b066", "title": "One New Map Matching Model for Vehicle-Borne Navigation System", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252b066/12OmNCf1DnZ", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socinfo/2009/3706/0/3706a023", "title": "TimePlace: Towards a Populated 3D Information Place", "doi": null, "abstractUrl": "/proceedings-article/socinfo/2009/3706a023/12OmNrNh0wc", "parentPublication": { "id": "proceedings/socinfo/2009/3706/0", "title": "Social Informatics, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/2007/2772/0/27720397", "title": "I-Navigate: Intelligent, Self-adapting Navigation Maps", "doi": null, "abstractUrl": "/proceedings-article/ecbs/2007/27720397/12OmNvH7fkP", "parentPublication": { "id": "proceedings/ecbs/2007/2772/0", "title": "14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2009/3929/0/3929a169", "title": "Learning Navigation Map on Ontology", "doi": null, "abstractUrl": "/proceedings-article/dasc/2009/3929a169/12OmNvxbhLE", "parentPublication": { "id": "proceedings/dasc/2009/3929/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoip/2010/4252/1/4252a569", "title": "Forecast Map Matching Model for Vehicle-borne Navigation Based on Roadway Characteristic", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252a569/12OmNxwWoEE", "parentPublication": { "id": "proceedings/icoip/2010/4252/2", "title": "Optoelectronics and Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2012/4655/0/4655a101", "title": "Ubiquitous Navigation Based on Physical Maps and GPS", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a101/12OmNz4SOAL", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408581", "title": "CNT: concept-map based navigation and discovery in a repository of learning content", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408581/12OmNzn38Nt", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyfdOIW", "title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)", "acronym": "3dui", "groupId": "1001623", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwwMf5A", "doi": "10.1109/3DUI.2012.6184223", "title": "A gaming interface using body gestures for collaborative navigation", "normalizedTitle": "A gaming interface using body gestures for collaborative navigation", "abstract": "We designed a collaborative navigation interface in which one user (the controller) guides a second, remote user (the navigator) through a 3D game environment. Both sides of the interface use commercially available gaming hardware. The controller uses full-body gestures to send navigation cues to the navigator, who travels through the environment using typical 3D gaming controls. In an exploratory study, all participants completed the game scenario, and they viewed the system as usable and fun overall, although the limited communication provided by the system was somewhat of a hindrance to collaboration. Navigators, who were led to believe they were being guided by an intelligent system, did not guess that guidance was provided by another human, and felt that an \"intelligent system\" would typically be more consistent than a human being.", "abstracts": [ { "abstractType": "Regular", "content": "We designed a collaborative navigation interface in which one user (the controller) guides a second, remote user (the navigator) through a 3D game environment. Both sides of the interface use commercially available gaming hardware. The controller uses full-body gestures to send navigation cues to the navigator, who travels through the environment using typical 3D gaming controls. In an exploratory study, all participants completed the game scenario, and they viewed the system as usable and fun overall, although the limited communication provided by the system was somewhat of a hindrance to collaboration. Navigators, who were led to believe they were being guided by an intelligent system, did not guess that guidance was provided by another human, and felt that an \"intelligent system\" would typically be more consistent than a human being.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We designed a collaborative navigation interface in which one user (the controller) guides a second, remote user (the navigator) through a 3D game environment. Both sides of the interface use commercially available gaming hardware. The controller uses full-body gestures to send navigation cues to the navigator, who travels through the environment using typical 3D gaming controls. In an exploratory study, all participants completed the game scenario, and they viewed the system as usable and fun overall, although the limited communication provided by the system was somewhat of a hindrance to collaboration. Navigators, who were led to believe they were being guided by an intelligent system, did not guess that guidance was provided by another human, and felt that an \"intelligent system\" would typically be more consistent than a human being.", "fno": "06184223", "keywords": [ "Navigation", "Games", "Collaboration", "Three Dimensional Displays", "Intelligent Systems", "Animals" ], "authors": [ { "affiliation": "Center for Human-Computer Interaction, Department of Computer Science, Virginia Tech", "fullName": "Panagiotis Apostolellis", "givenName": "Panagiotis", "surname": "Apostolellis", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Human-Computer Interaction, Department of Computer Science, Virginia Tech", "fullName": "Bireswar Laha", "givenName": "Bireswar", "surname": "Laha", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Human-Computer Interaction, Department of Computer Science, Virginia Tech", "fullName": "Doug A. Bowman", "givenName": "Doug A.", "surname": "Bowman", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dui", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-03-01T00:00:00", "pubType": "proceedings", "pages": "185-186", "year": "2012", "issn": null, "isbn": "978-1-4673-1204-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06184222", "articleId": "12OmNxWcH4u", "__typename": "AdjacentArticleType" }, "next": { "fno": "06184224", "articleId": "12OmNs0TKNc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2008/2570/0/04607604", "title": "Using human body gestures as inputs for gaming via depth analysis", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607604/12OmNBhHtjc", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2009/3965/0/04811198", "title": "Measuring the effect of gaming experience on virtual environment navigation tasks", "doi": null, "abstractUrl": "/proceedings-article/3dui/2009/04811198/12OmNzBOhHq", "parentPublication": { "id": "proceedings/3dui/2009/3965/0", "title": "2009 IEEE Symposium on 3D User Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352362", "title": "3D Navigation on Impossible Figures via Dynamically Reconfigurable Maze", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352362/13rRUxAAT0X", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2014/03/mic2014030012", "title": "Toward Gaming as a Service", "doi": null, "abstractUrl": "/magazine/ic/2014/03/mic2014030012/13rRUynpT9n", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798340", "title": "Augmented Reality Map Navigation with Freehand Gestures", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798340/1cJ1fg0gjAY", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/05/08998307", "title": "Getting There Together: Group Navigation in Distributed Virtual Environments", "doi": null, "abstractUrl": "/journal/tg/2020/05/08998307/1hpPBi8EjJe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a312", "title": "Augmented Reality for Easy Sailing", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a312/1pBMkXnz4Fa", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2021/04/09351621", "title": "Improved Speaker and Navigator for Vision-and-Language Navigation", "doi": null, "abstractUrl": "/magazine/mu/2021/04/09351621/1r50rE3jRZe", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700d742", "title": "Auto-Navigator: Decoupled Neural Architecture Search for Visual Navigation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700d742/1uqGAyRc3Go", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/10/09488322", "title": "Adversarial Reinforced Instruction Attacker for Robust Vision-Language Navigation", "doi": null, "abstractUrl": "/journal/tp/2022/10/09488322/1vhIavPG69W", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrAdsty", "title": "2014 International Conference on Teaching and Learning in Computing and Engineering (LaTiCE)", "acronym": "latice", "groupId": "1802640", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNz5s0SQ", "doi": "10.1109/LaTiCE.2014.48", "title": "Addressing the Needs of Gaming Approach in Hazard Identification Training", "normalizedTitle": "Addressing the Needs of Gaming Approach in Hazard Identification Training", "abstract": "Construction industry is reportedly the third highest accident occurrence after manufacturing and agriculture. Research have shown that hazard is the major factor that contributes to accident on construction sites. Thus, training on hazard identification is important to construction workers as they need to understand how to identify and act wisely in handling hazards. Construction Industry Development Board (CIDB) and National Institute of Occupational Safety and Health (NIOSH) through government initiatives provide trainings in order to enhance the knowledge on safety among the construction individuals. Currently, trainings are conducted through lectures, hands-on and video demonstration. However, these approaches can only increase the awareness and theoretical knowledge of the trainee which 70% of the training modules cover the theoretical aspects and the rest is the hands-on. Unfortunately, they are not able to practice the theories that they have learnt. Moreover, the cost of training is high and not all levels of construction workers could afford to attend the training. Gaming approach seems to be an approach that could provide more hands-on training. Unlike the above mentioned conventional approach, the gaming approach allows users to experience and practice a real life scenario within a gaming environment. As well as it is an affordable module, this approach offers flexibility to users in term of time and venues. The purpose of this paper is to address the needs of gaming approach to enhance the hazard identification training, by providing an immersive, real experience and affordable approach to training.", "abstracts": [ { "abstractType": "Regular", "content": "Construction industry is reportedly the third highest accident occurrence after manufacturing and agriculture. Research have shown that hazard is the major factor that contributes to accident on construction sites. Thus, training on hazard identification is important to construction workers as they need to understand how to identify and act wisely in handling hazards. Construction Industry Development Board (CIDB) and National Institute of Occupational Safety and Health (NIOSH) through government initiatives provide trainings in order to enhance the knowledge on safety among the construction individuals. Currently, trainings are conducted through lectures, hands-on and video demonstration. However, these approaches can only increase the awareness and theoretical knowledge of the trainee which 70% of the training modules cover the theoretical aspects and the rest is the hands-on. Unfortunately, they are not able to practice the theories that they have learnt. Moreover, the cost of training is high and not all levels of construction workers could afford to attend the training. Gaming approach seems to be an approach that could provide more hands-on training. Unlike the above mentioned conventional approach, the gaming approach allows users to experience and practice a real life scenario within a gaming environment. As well as it is an affordable module, this approach offers flexibility to users in term of time and venues. The purpose of this paper is to address the needs of gaming approach to enhance the hazard identification training, by providing an immersive, real experience and affordable approach to training.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Construction industry is reportedly the third highest accident occurrence after manufacturing and agriculture. Research have shown that hazard is the major factor that contributes to accident on construction sites. Thus, training on hazard identification is important to construction workers as they need to understand how to identify and act wisely in handling hazards. Construction Industry Development Board (CIDB) and National Institute of Occupational Safety and Health (NIOSH) through government initiatives provide trainings in order to enhance the knowledge on safety among the construction individuals. Currently, trainings are conducted through lectures, hands-on and video demonstration. However, these approaches can only increase the awareness and theoretical knowledge of the trainee which 70% of the training modules cover the theoretical aspects and the rest is the hands-on. Unfortunately, they are not able to practice the theories that they have learnt. Moreover, the cost of training is high and not all levels of construction workers could afford to attend the training. Gaming approach seems to be an approach that could provide more hands-on training. Unlike the above mentioned conventional approach, the gaming approach allows users to experience and practice a real life scenario within a gaming environment. As well as it is an affordable module, this approach offers flexibility to users in term of time and venues. The purpose of this paper is to address the needs of gaming approach to enhance the hazard identification training, by providing an immersive, real experience and affordable approach to training.", "fno": "3592a212", "keywords": [ "Training", "Games", "Hazards", "Accidents", "Solid Modeling", "Gaming Approach", "Safety Training", "Hazard Identification" ], "authors": [ { "affiliation": null, "fullName": "Norhazren Izatie Mohd", "givenName": "Norhazren Izatie", "surname": "Mohd", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kherun Nita Ali", "givenName": "Kherun Nita", "surname": "Ali", "__typename": "ArticleAuthorType" } ], "idPrefix": "latice", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-04-01T00:00:00", "pubType": "proceedings", "pages": "212-215", "year": "2014", "issn": null, "isbn": "978-1-4799-3592-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3592a206", "articleId": "12OmNBKW9uz", "__typename": "AdjacentArticleType" }, "next": { "fno": "3592a216", "articleId": "12OmNAiFI8y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2014/2871/0/06802090", "title": "Simulating cooperative fire evacuation training in a virtual environment using gaming technology", "doi": null, "abstractUrl": "/proceedings-article/vr/2014/06802090/12OmNB8Cj9y", "parentPublication": { "id": "proceedings/vr/2014/2871/0", "title": "2014 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsacw/2014/3578/0/3578a547", "title": "A Hazard Detection Method for Bicycles by Using Probe Bicycle", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2014/3578a547/12OmNBtCCGf", "parentPublication": { "id": "proceedings/compsacw/2014/3578/0", "title": "2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2014/5701/0/5701a256", "title": "Prospective Hazard Analysis for Information System", "doi": null, "abstractUrl": "/proceedings-article/ichi/2014/5701a256/12OmNButq0p", "parentPublication": { "id": "proceedings/ichi/2014/5701/0", "title": "2014 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2015/9957/0/07373916", "title": "Automatic Evaluation Methods of Trainee's Answers to Develop a 4R Risk Prediction Training System", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2015/07373916/12OmNqBtiZV", "parentPublication": { "id": "proceedings/iiai-aai/2015/9957/0", "title": "2015 IIAI 4th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hase/2017/4636/0/07911871", "title": "Arguing from Hazard Analysis in Safety Cases: A Modular Argument Pattern", "doi": null, "abstractUrl": "/proceedings-article/hase/2017/07911871/12OmNxUdv6a", "parentPublication": { "id": "proceedings/hase/2017/4636/0", "title": "2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsoft/2015/8139/1/07521150", "title": "Extracting knowledge for searching for and identifying hazards on construction site", "doi": null, "abstractUrl": "/proceedings-article/icsoft/2015/07521150/12OmNz2TCCp", "parentPublication": { "id": "proceedings/icsoft/2015/8139/1", "title": "2015 10th International Joint Conference on Software Technologies (ICSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/05/09714120", "title": "Synthesizing Personalized Construction Safety Training Scenarios for VR Training", "doi": null, "abstractUrl": "/journal/tg/2022/05/09714120/1B0Y17ScN7G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a513", "title": "Group-based VR Training to Improve Hazard Recognition, Evaluation, and Control for Highway Construction Workers", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a513/1CJdIvmlVrW", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2023/01/09813517", "title": "Interference Moral Hazard in Large Multihop Networks", "doi": null, "abstractUrl": "/journal/nt/2023/01/09813517/1EECtofCkQo", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798371", "title": "Validating Virtual Reality as an Effective Training Medium in the Security Domain", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798371/1cJ1cVDOG8E", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBV9Icn", "title": "2017 11th IEEE Symposium on Service-Oriented System Engineering (SOSE)", "acronym": "sose", "groupId": "1002082", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzcxZuL", "doi": "10.1109/SOSE.2017.13", "title": "A 2D and 3D Indoor Mapping Approach for Virtual Navigation Services", "normalizedTitle": "A 2D and 3D Indoor Mapping Approach for Virtual Navigation Services", "abstract": "Specific navigation systems are necessary to navigate in complex buildings and these should provide a realistic virtual indoor environment. A key issue is creation and management of building documentation. Map information is typically proprietary, sometimes recorded on heterogeneous media, and it is even volatile, such as layouts in a shopping mall, where change is continuous. In order to create a navigation system with a realistic indoor virtual environment, we propose a 2D and 3D indoor mapping approach, which is a key module of indoor services life cycle. Our approach is based on a 3D game engine, which 1) can build an effective 2D SVG map that updates selectively, 2) converts it into a 3D virtual scene automatically at back-end, 3) includes an information management system at back-end, 4) renders and interacts efficiently and effectively on a smart phone, and 5) provides a vivid virtual indoor visualization for users' navigation at front-end. Our solution of back-end includes 2D SVG indoor map management and 3D indoor model creation. Front-end includes indoor 3D modeling and navigation scene implementation in Unity3D. Such indoor mapping approach provides a solid foundation for further indoor management and navigation services.", "abstracts": [ { "abstractType": "Regular", "content": "Specific navigation systems are necessary to navigate in complex buildings and these should provide a realistic virtual indoor environment. A key issue is creation and management of building documentation. Map information is typically proprietary, sometimes recorded on heterogeneous media, and it is even volatile, such as layouts in a shopping mall, where change is continuous. In order to create a navigation system with a realistic indoor virtual environment, we propose a 2D and 3D indoor mapping approach, which is a key module of indoor services life cycle. Our approach is based on a 3D game engine, which 1) can build an effective 2D SVG map that updates selectively, 2) converts it into a 3D virtual scene automatically at back-end, 3) includes an information management system at back-end, 4) renders and interacts efficiently and effectively on a smart phone, and 5) provides a vivid virtual indoor visualization for users' navigation at front-end. Our solution of back-end includes 2D SVG indoor map management and 3D indoor model creation. Front-end includes indoor 3D modeling and navigation scene implementation in Unity3D. Such indoor mapping approach provides a solid foundation for further indoor management and navigation services.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Specific navigation systems are necessary to navigate in complex buildings and these should provide a realistic virtual indoor environment. A key issue is creation and management of building documentation. Map information is typically proprietary, sometimes recorded on heterogeneous media, and it is even volatile, such as layouts in a shopping mall, where change is continuous. In order to create a navigation system with a realistic indoor virtual environment, we propose a 2D and 3D indoor mapping approach, which is a key module of indoor services life cycle. Our approach is based on a 3D game engine, which 1) can build an effective 2D SVG map that updates selectively, 2) converts it into a 3D virtual scene automatically at back-end, 3) includes an information management system at back-end, 4) renders and interacts efficiently and effectively on a smart phone, and 5) provides a vivid virtual indoor visualization for users' navigation at front-end. Our solution of back-end includes 2D SVG indoor map management and 3D indoor model creation. Front-end includes indoor 3D modeling and navigation scene implementation in Unity3D. Such indoor mapping approach provides a solid foundation for further indoor management and navigation services.", "fno": "07943298", "keywords": [ "Computer Games", "Data Visualisation", "Solid Modelling", "Virtual Reality", "2 D Indoor Mapping Approach", "3 D Indoor Mapping Approach", "Virtual Navigation Services", "Complex Buildings", "Realistic Virtual Indoor Environment", "Building Documentation", "Heterogeneous Media", "Shopping Mall Layouts", "3 D Game Engine", "2 D SVG Map", "3 D Virtual Scene", "Information Management System", "Vivid Virtual Indoor Visualization", "2 D SVG Indoor Map Management", "3 D Indoor Model Creation", "Unity 3 D", "Three Dimensional Displays", "Two Dimensional Displays", "Navigation", "Transforms", "Buildings", "Solid Modeling", "Games", "Indoor Navigation Services", "Indoor Mapping", "2 D SVG", "3 D SVG Conversion", "3 D Virtual Scenes" ], "authors": [ { "affiliation": null, "fullName": "Kaixu Liu", "givenName": "Kaixu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gianmario Motta", "givenName": "Gianmario", "surname": "Motta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bige Tunçer", "givenName": "Bige", "surname": "Tunçer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Iman Abuhashish", "givenName": "Iman", "surname": "Abuhashish", "__typename": "ArticleAuthorType" } ], "idPrefix": "sose", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "102-107", "year": "2017", "issn": null, "isbn": "978-1-5090-6320-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07943297", "articleId": "12OmNz6iOh9", "__typename": "AdjacentArticleType" }, "next": { "fno": "07943299", "articleId": "12OmNzGlREV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icss/2016/2727/0/2727a074", "title": "Navigation Services for Indoor and Outdoor User Mobility: An Overview", "doi": null, "abstractUrl": "/proceedings-article/icss/2016/2727a074/12OmNAKM011", "parentPublication": { "id": "proceedings/icss/2016/2727/0", "title": "2016 9th International Conference on Service Science (ICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816739", "title": "Constructing indoor navigation systems from digital building information", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816739/12OmNvEQsg3", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2012/4818/0/4818a091", "title": "Study of Location and Navigation Services in Complex Indoor Scenes Based on the Android Mobile Computing Platform", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2012/4818a091/12OmNxHrymC", "parentPublication": { "id": "proceedings/dcabes/2012/4818/0", "title": "2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc/2013/5152/0/06809456", "title": "CINA - A Crowdsourced Indoor Navigation Assistant", "doi": null, "abstractUrl": "/proceedings-article/ucc/2013/06809456/12OmNzFMFpP", "parentPublication": { "id": "proceedings/ucc/2013/5152/0", "title": "2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2019/06/08416714", "title": "ViNav: A Vision-Based Indoor Navigation System for Smartphones", "doi": null, "abstractUrl": "/journal/tm/2019/06/08416714/13rRUwInvBF", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/01/mit2014010050", "title": "Experiencing Indoor Navigation on Mobile Devices", "doi": null, "abstractUrl": "/magazine/it/2014/01/mit2014010050/13rRUwdrdOW", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2018/5580/0/558000a451", "title": "GreenMap: Approximated Filtering Towards Energy-Aware Crowdsensing for Indoor Mapping", "doi": null, "abstractUrl": "/proceedings-article/mass/2018/558000a451/17D45WcjjQq", "parentPublication": { "id": "proceedings/mass/2018/5580/0", "title": "2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300h375", "title": "Mapping, Localization and Path Planning for Image-Based Navigation Using Visual Features and Map", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300h375/1gyrs6jzQKQ", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a015", "title": "Visual Navigation Using a Webcam Based on Semantic Segmentation for Indoor Robots", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a015/1j9xFUJxXeE", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300a520", "title": "Towards An Indoor Navigation System Using Monocular Visual SLAM", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300a520/1wLcJvglTqw", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAWH9tH", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzd7baR", "doi": "10.1109/PACIFICVIS.2011.5742367", "title": "Context-aware volume navigation", "normalizedTitle": "Context-aware volume navigation", "abstract": "The trackball metaphor is exploited in many applications where volumetric data needs to be explored. Although it provides an intuitive way to inspect the overall structure of objects of interest, an in-detail inspection can be tedious - or when cavities occur even impossible. Therefore we propose a context-aware navigation technique for the exploration of volumetric data. While navigation techniques for polygonal data require information about the rendered geometry, this strategy is not sufficient in the area of volume rendering. Since rendering parameters, e.g., the transfer function, have a strong influence on the visualized structures, they also affect the features to be explored. To compensate for this effect we propose a novel image-based navigation approach for volumetric data. While being intuitive to use, the proposed technique allows the user to perform complex navigation tasks, in particular to get an overview as well as to perform an in-detail inspection without any navigation mode switches. The technique can be easily integrated into raycasting based volume renderers, needs no extra data structures and is independent of the data set as well as the rendering parameters. We will discuss the underlying concepts, explain how to enable the navigation at interactive frame rates using OpenCL, and evaluate its usability as well as its performance.", "abstracts": [ { "abstractType": "Regular", "content": "The trackball metaphor is exploited in many applications where volumetric data needs to be explored. Although it provides an intuitive way to inspect the overall structure of objects of interest, an in-detail inspection can be tedious - or when cavities occur even impossible. Therefore we propose a context-aware navigation technique for the exploration of volumetric data. While navigation techniques for polygonal data require information about the rendered geometry, this strategy is not sufficient in the area of volume rendering. Since rendering parameters, e.g., the transfer function, have a strong influence on the visualized structures, they also affect the features to be explored. To compensate for this effect we propose a novel image-based navigation approach for volumetric data. While being intuitive to use, the proposed technique allows the user to perform complex navigation tasks, in particular to get an overview as well as to perform an in-detail inspection without any navigation mode switches. The technique can be easily integrated into raycasting based volume renderers, needs no extra data structures and is independent of the data set as well as the rendering parameters. We will discuss the underlying concepts, explain how to enable the navigation at interactive frame rates using OpenCL, and evaluate its usability as well as its performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The trackball metaphor is exploited in many applications where volumetric data needs to be explored. Although it provides an intuitive way to inspect the overall structure of objects of interest, an in-detail inspection can be tedious - or when cavities occur even impossible. Therefore we propose a context-aware navigation technique for the exploration of volumetric data. While navigation techniques for polygonal data require information about the rendered geometry, this strategy is not sufficient in the area of volume rendering. Since rendering parameters, e.g., the transfer function, have a strong influence on the visualized structures, they also affect the features to be explored. To compensate for this effect we propose a novel image-based navigation approach for volumetric data. While being intuitive to use, the proposed technique allows the user to perform complex navigation tasks, in particular to get an overview as well as to perform an in-detail inspection without any navigation mode switches. The technique can be easily integrated into raycasting based volume renderers, needs no extra data structures and is independent of the data set as well as the rendering parameters. We will discuss the underlying concepts, explain how to enable the navigation at interactive frame rates using OpenCL, and evaluate its usability as well as its performance.", "fno": "05742367", "keywords": [ "Data Visualisation", "Ray Tracing", "Rendering Computer Graphics", "Context Aware Volume Navigation", "Trackball Metaphor", "Volumetric Data", "Polygonal Data", "Rendered Geometry", "Volume Rendering", "Image Based Navigation", "Raycasting", "Data Structures", "Navigation", "Cameras", "Rendering Computer Graphics", "Data Visualization", "Mice", "Inspection", "Geometry", "Navigation", "Volume Rendering" ], "authors": [ { "affiliation": "Visualization and Computer Graphics Research Group (VisCG), University of Münster, Germany", "fullName": "Stefan Diepenbrock", "givenName": "Stefan", "surname": "Diepenbrock", "__typename": "ArticleAuthorType" }, { "affiliation": "Visualization and Computer Graphics Research Group (VisCG), University of Münster, Germany", "fullName": "Timo Ropinski", "givenName": "Timo", "surname": "Ropinski", "__typename": "ArticleAuthorType" }, { "affiliation": "Visualization and Computer Graphics Research Group (VisCG), University of Münster, Germany", "fullName": "Klaus Hinrichs", "givenName": "Klaus", "surname": "Hinrichs", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-03-01T00:00:00", "pubType": "proceedings", "pages": "11-18", "year": "2011", "issn": "2165-8765", "isbn": "978-1-61284-935-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05742355", "articleId": "12OmNC3XhlV", "__typename": "AdjacentArticleType" }, "next": { "fno": "05742368", "articleId": "12OmNvSKO3J", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icig/2013/5050/0/5050a838", "title": "Pseudo-Three-Dimensional Navigation in Helical Scan Security Inspection", "doi": null, "abstractUrl": "/proceedings-article/icig/2013/5050a838/12OmNBhZ4kD", "parentPublication": { "id": "proceedings/icig/2013/5050/0", "title": "2013 Seventh International Conference on Image and Graphics (ICIG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1994/6627/0/00346340", "title": "VolVis: a diversified volume visualization system", "doi": null, "abstractUrl": "/proceedings-article/visual/1994/00346340/12OmNroijkk", "parentPublication": { "id": "proceedings/visual/1994/6627/0", "title": "Proceedings Visualization '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1992/2897/0/00235231", "title": "Towards a comprehensive volume visualization system", "doi": null, "abstractUrl": "/proceedings-article/visual/1992/00235231/12OmNwwd2JM", "parentPublication": { "id": "proceedings/visual/1992/2897/0", "title": "Proceedings Visualization '92", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2015/9795/0/9795a454", "title": "Interior Surface Unwrapping System of Volume CT Data", "doi": null, "abstractUrl": "/proceedings-article/csci/2015/9795a454/12OmNyLA5zi", "parentPublication": { "id": "proceedings/csci/2015/9795/0", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1994/6627/0/00346314", "title": "Volume rendering methods for computational fluid dynamics visualization", "doi": null, "abstractUrl": "/proceedings-article/visual/1994/00346314/12OmNyuy9NX", "parentPublication": { "id": "proceedings/visual/1994/6627/0", "title": "Proceedings Visualization '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1995/02/v0117", "title": "Grouping Volume Renderers for Enhanced Visualization in Computational Fluid Dynamics", "doi": null, "abstractUrl": "/journal/tg/1995/02/v0117/13rRUNvgyW6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1998/03/v0243", "title": "Interactive Volume Navigation", "doi": null, "abstractUrl": "/journal/tg/1998/03/v0243/13rRUx0Pqpq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/05/mcg2010050020", "title": "Spatial Navigation for Context-Aware Video Surveillance", "doi": null, "abstractUrl": "/magazine/cg/2010/05/mcg2010050020/13rRUx0xPOd", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a282", "title": "DNN-VolVis: Interactive Volume Visualization Supported by Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a282/1cMF6YRpyH6", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/08/09409710", "title": "Interactive Focus+Context Rendering for Hexahedral Mesh Inspection", "doi": null, "abstractUrl": "/journal/tg/2021/08/09409710/1sXjFab9xYc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1HpDQxVk82k", "title": "2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)", "acronym": "ccict", "groupId": "1842684", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1HpDVF6molW", "doi": "10.1109/CCiCT56684.2022.00083", "title": "Enhancing action maze video games using Shuffled Frog Leaping Algorithm", "normalizedTitle": "Enhancing action maze video games using Shuffled Frog Leaping Algorithm", "abstract": "Shuffled Frog Leaping Algorithm(SFLA) is a very popular population-based meta-heuristic algorithm, created by Eusuff and Lansey in 2006. Because of its limited variables and easiness in implementation, it is used in memetics and particle swarm optimization to give several use cases. We believe one unexplored application of this algorithm is in video games, primarily in the genre of action based video games. They involve optimizations in path planning and navigation where SFLA can be utilized. We also believe these games can serve as simulations for real-life scenarios of navigation, thereby giving a virtual environment to enhance this algorithm further. Finally, we compare this method with popular nature based ones such as BFA and SPPSO algorithms and conclude on their optimization efficiency for action maze video games like Pac-Man.", "abstracts": [ { "abstractType": "Regular", "content": "Shuffled Frog Leaping Algorithm(SFLA) is a very popular population-based meta-heuristic algorithm, created by Eusuff and Lansey in 2006. Because of its limited variables and easiness in implementation, it is used in memetics and particle swarm optimization to give several use cases. We believe one unexplored application of this algorithm is in video games, primarily in the genre of action based video games. They involve optimizations in path planning and navigation where SFLA can be utilized. We also believe these games can serve as simulations for real-life scenarios of navigation, thereby giving a virtual environment to enhance this algorithm further. Finally, we compare this method with popular nature based ones such as BFA and SPPSO algorithms and conclude on their optimization efficiency for action maze video games like Pac-Man.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Shuffled Frog Leaping Algorithm(SFLA) is a very popular population-based meta-heuristic algorithm, created by Eusuff and Lansey in 2006. Because of its limited variables and easiness in implementation, it is used in memetics and particle swarm optimization to give several use cases. We believe one unexplored application of this algorithm is in video games, primarily in the genre of action based video games. They involve optimizations in path planning and navigation where SFLA can be utilized. We also believe these games can serve as simulations for real-life scenarios of navigation, thereby giving a virtual environment to enhance this algorithm further. Finally, we compare this method with popular nature based ones such as BFA and SPPSO algorithms and conclude on their optimization efficiency for action maze video games like Pac-Man.", "fno": "722400a432", "keywords": [ "Computer Games", "Evolutionary Computation", "Optimisation", "Particle Swarm Optimisation", "Path Planning", "Search Problems", "Popular Population Based Meta Heuristic Algorithm", "Particle Swarm Optimization", "Path Planning", "Navigation", "Action Maze Video Games", "Shuffled Frog Leaping Algorithm", "Video Games", "Three Dimensional Displays", "Navigation", "Heuristic Algorithms", "Virtual Environments", "Games", "Streaming Media", "Shuffled Frog Leaping Algorithm", "Nature Inspired Algorithm", "Path Planning", "Action Maze Video Games", "Pac Man", "Heurisitic", "Computational Intelligence", "Evolutionary Computation" ], "authors": [ { "affiliation": "PES University,Computer Science dept,Bangalore,India", "fullName": "Dheeraj Gharde", "givenName": "Dheeraj", "surname": "Gharde", "__typename": "ArticleAuthorType" }, { "affiliation": "PES University,Computer Science dept,Bangalore,India", "fullName": "N Suryanarayan", "givenName": "N", "surname": "Suryanarayan", "__typename": "ArticleAuthorType" }, { "affiliation": "PES University,Computer Science dept,Bangalore,India", "fullName": "V R Badri Prasad", "givenName": "V R Badri", "surname": "Prasad", "__typename": "ArticleAuthorType" } ], "idPrefix": "ccict", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "432-438", "year": "2022", "issn": null, "isbn": "978-1-6654-7224-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "722400a427", "articleId": "1HpDRbw5aUg", "__typename": "AdjacentArticleType" }, "next": { "fno": "722400a439", "articleId": "1HpDTX5bjfW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/digitel/2010/3993/0/3993a134", "title": "Examining the Potentials of Computer Games for English Learning", "doi": null, "abstractUrl": "/proceedings-article/digitel/2010/3993a134/12OmNrJAebI", "parentPublication": { "id": "proceedings/digitel/2010/3993/0", "title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imccc/2011/4519/0/4519b016", "title": "A Modified Shuffled Frog Leaping Algorithm with Convergence of Update Process in Local Search", "doi": null, "abstractUrl": "/proceedings-article/imccc/2011/4519b016/12OmNvA1h3O", "parentPublication": { "id": "proceedings/imccc/2011/4519/0", "title": "Instrumentation, Measurement, Computer, Communication and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2011/1612/0/06112368", "title": "Multiobjective optizition shuffled frog-leaping biclustering", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2011/06112368/12OmNvlg8ge", "parentPublication": { "id": "proceedings/bibmw/2011/1612/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ibica/2011/4606/0/4606a203", "title": "An Improved Shuffled Frog-Leaping Algorithm for Job-Shop Scheduling Problem", "doi": null, "abstractUrl": "/proceedings-article/ibica/2011/4606a203/12OmNwnH4Qu", "parentPublication": { "id": "proceedings/ibica/2011/4606/0", "title": "Innovations in Bio-inspired Computing and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/artcom/2009/3845/0/3845a517", "title": "Color Image Segmentation Using Clonal Selection-Based Shuffled Frog Leaping Algorithm", "doi": null, "abstractUrl": "/proceedings-article/artcom/2009/3845a517/12OmNxYbT0r", "parentPublication": { "id": "proceedings/artcom/2009/3845/0", "title": "Advances in Recent Technologies in Communication and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2008/3382/3/3382c228", "title": "Solving TSP with Shuffled Frog-Leaping Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isda/2008/3382c228/12OmNz61d1G", "parentPublication": { "id": "proceedings/isda/2008/3382/3", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2009/3887/0/pid980594", "title": "Application of Shuffled Frog Leaping Algorithm and Wavelet Neural Network in Sound Source Location", "doi": null, "abstractUrl": "/proceedings-article/icise/2009/pid980594/12OmNzahbXq", "parentPublication": { "id": "proceedings/icise/2009/3887/0", "title": "Information Science and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2008/3304/1/3304a481", "title": "The Chaos-Based Shuffled Frog Leaping Algorithm and Its Application", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304a481/12OmNzwHvlv", "parentPublication": { "id": "icnc/2008/3304/1", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icctech/2022/9918/0/991800a096", "title": "Prediction and Analysis of MBR Membrane Flux Based on Wavelet Neural Network Optimized by Shuffled Frog-Leaping Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icctech/2022/991800a096/1KYsZko6paw", "parentPublication": { "id": "proceedings/icctech/2022/9918/0", "title": "2022 International Conference on Computer Technologies (ICCTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a196", "title": "Using Shuffled Frog Leaping Algorithm to View Selection Problem Subject to Dual Constraints", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a196/1dUo0r5pA9q", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1nRPfK5nqmI", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "acronym": "iscc", "groupId": "1000156", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1nRPnxjKMqk", "doi": "10.1109/ISCC50000.2020.9219722", "title": "Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game", "normalizedTitle": "Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game", "abstract": "Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M<sup>2</sup>NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker&#x2019;s strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.", "abstracts": [ { "abstractType": "Regular", "content": "Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M<sup>2</sup>NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker&#x2019;s strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interaction between a defender who uses limited Security Resources(SRs) to harden network and an attacker who adopts a multi-stage plan to attack the network. The game model is derived from Stackelberg games called a Multi-stage Maze Network Game (M2NG) in which the characteristics of APT are fully considered. The possible plans of the attacker are compactly represented using attack graphs(AGs), but the compact representation of the attacker’s strategies presents a computational challenge and reaching the Nash Equilibrium(NE) is NP-hard. We present a method that first translates AGs into Markov Decision Process(MDP) and then achieves the optimal SRs allocation using the policy hill-climbing(PHC) algorithm. Finally, we present an empirical evaluation of the model and analyze the scalability and sensitivity of the algorithm. Simulation results exhibit that our proposed reinforcement learning-based SRs allocation is feasible and efficient.", "fno": "09219722", "keywords": [ "Game Theory", "Learning Artificial Intelligence", "Markov Processes", "Security Of Data", "Advanced Persistent Threats", "Multistage Maze Network Game", "Advanced Persistent Threat", "APT", "Stealthy Method", "Continuous Method", "Network Attacks", "Serious Privacy Leakage", "Game Theoretic Framework", "Multistage Plan", "Game Model", "Stackelberg Games", "Optimal Network Security", "Policy Hill Climbing Algorithm", "Nash Equilibrium", "Privacy", "Sensitivity", "Computational Modeling", "Simulation", "Scalability", "Games", "Network Security", "Advanced Persistent Threat", "Stackelberg Games", "Attack Graphs", "Policy Hill Climbing", "Reinforcement Learning RL" ], "authors": [ { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Hangsheng Zhang", "givenName": "Hangsheng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Haitao Liu", "givenName": "Haitao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Jie Liang", "givenName": "Jie", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Ting Li", "givenName": "Ting", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Liru Geng", "givenName": "Liru", "surname": "Geng", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China,100093", "fullName": "Yinlong Liu", "givenName": "Yinlong", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "China cybersecurity review technology and certification center,Beijing,China,100020", "fullName": "Shujuan Chen", "givenName": "Shujuan", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2020", "issn": null, "isbn": "978-1-7281-8086-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09219611", "articleId": "1nRPkvISZGM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09219739", "articleId": "1nRPgmrMnfi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/srds/2017/1679/0/1679a204", "title": "Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis", "doi": null, "abstractUrl": "/proceedings-article/srds/2017/1679a204/12OmNBE7MoE", "parentPublication": { "id": "proceedings/srds/2017/1679/0", "title": "2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2014/4171/0/4171a097", "title": "A Network Gene-Based Framework for Detecting Advanced Persistent Threats", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2014/4171a097/12OmNvk7K6T", "parentPublication": { "id": "proceedings/3pgcic/2014/4171/0", "title": "2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2014/5079/0/5079a491", "title": "A Game Model for Predicting the Attack Path of APT", "doi": null, "abstractUrl": "/proceedings-article/dasc/2014/5079a491/12OmNyRPgKQ", "parentPublication": { "id": "proceedings/dasc/2014/5079/0", "title": "2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2018/11/08310016", "title": "Attacker-Centric View of a Detection Game against Advanced Persistent Threats", "doi": null, "abstractUrl": "/journal/tm/2018/11/08310016/143fh0tknny", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2021/03/08630504", "title": "Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach", "doi": null, "abstractUrl": "/journal/cc/2021/03/08630504/17D45VVho2y", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2021/0878/0/087800a450", "title": "An Intelligent Game Theory Framework for Detecting Advanced Persistent Threats", "doi": null, "abstractUrl": "/proceedings-article/icpads/2021/087800a450/1D4LEBeZ9sY", "parentPublication": { "id": "proceedings/icpads/2021/0878/0", "title": "2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccps/2020/5501/0/09095996", "title": "Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach", "doi": null, "abstractUrl": "/proceedings-article/iccps/2020/09095996/1jXvvLVuTFS", "parentPublication": { "id": "proceedings/iccps/2020/5501/0", "title": "2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2020/06/08417919", "title": "A Risk Management Approach to Defending Against the Advanced Persistent Threat", "doi": null, "abstractUrl": "/journal/tq/2020/06/08417919/1ovEYaiNKow", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2020/9916/0/991600a323", "title": "Optimal Defense Strategy against Evasion Attacks", "doi": null, "abstractUrl": "/proceedings-article/msn/2020/991600a323/1sBO9WJBR28", "parentPublication": { "id": "proceedings/msn/2020/9916/0", "title": "2020 16th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/02/09627773", "title": "Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach", "doi": null, "abstractUrl": "/journal/tq/2022/02/09627773/1yQwFrIZ05i", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pBMeBWXAZ2", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pBMicBhWGA", "doi": "10.1109/ISMAR-Adjunct51615.2020.00048", "title": "A Virtual Morris Water Maze to Study Neurodegenarative Disorders", "normalizedTitle": "A Virtual Morris Water Maze to Study Neurodegenarative Disorders", "abstract": "Navigation is a crucial cognitive skill that allows humans and animals to move from one place to another without getting lost. In neurological patients this skill can be impaired, when neural structures that form the brain networks important for spatial learning and navigation are impaired. Thus, spatial navigation represents an important measure of cognitive health that is impossible to test in a clinical examination, due to lack of space in examination rooms. Consequently, spatial navigation is largely neglected in the clinical assessment of neurological, neurosurgical and psychiatric patients. Virtual reality represents a unique opportunity to develop a systematic assessment of spatial navigation for diagnosis and therapeutic monitoring of millions of patients presenting with cognitive decline in the clinical routine. Therefore, we have adapted a classical spatial navigation paradigm that was developed for animal research, the \"Morris Water Maze\" as an openly available Virtual Reality (VR) application, that allows objective quantification of navigational skills in humans. This tool may be used in the future to aid the assessment of the human navigation system in health and neurological disease.", "abstracts": [ { "abstractType": "Regular", "content": "Navigation is a crucial cognitive skill that allows humans and animals to move from one place to another without getting lost. In neurological patients this skill can be impaired, when neural structures that form the brain networks important for spatial learning and navigation are impaired. Thus, spatial navigation represents an important measure of cognitive health that is impossible to test in a clinical examination, due to lack of space in examination rooms. Consequently, spatial navigation is largely neglected in the clinical assessment of neurological, neurosurgical and psychiatric patients. Virtual reality represents a unique opportunity to develop a systematic assessment of spatial navigation for diagnosis and therapeutic monitoring of millions of patients presenting with cognitive decline in the clinical routine. Therefore, we have adapted a classical spatial navigation paradigm that was developed for animal research, the \"Morris Water Maze\" as an openly available Virtual Reality (VR) application, that allows objective quantification of navigational skills in humans. This tool may be used in the future to aid the assessment of the human navigation system in health and neurological disease.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Navigation is a crucial cognitive skill that allows humans and animals to move from one place to another without getting lost. In neurological patients this skill can be impaired, when neural structures that form the brain networks important for spatial learning and navigation are impaired. Thus, spatial navigation represents an important measure of cognitive health that is impossible to test in a clinical examination, due to lack of space in examination rooms. Consequently, spatial navigation is largely neglected in the clinical assessment of neurological, neurosurgical and psychiatric patients. Virtual reality represents a unique opportunity to develop a systematic assessment of spatial navigation for diagnosis and therapeutic monitoring of millions of patients presenting with cognitive decline in the clinical routine. Therefore, we have adapted a classical spatial navigation paradigm that was developed for animal research, the \"Morris Water Maze\" as an openly available Virtual Reality (VR) application, that allows objective quantification of navigational skills in humans. This tool may be used in the future to aid the assessment of the human navigation system in health and neurological disease.", "fno": "767500a141", "keywords": [ "Brain", "Cognition", "Diseases", "Medical Computing", "Navigation", "Neurophysiology", "Patient Diagnosis", "Psychology", "Virtual Reality", "Classical Spatial Navigation Paradigm", "Virtual Reality Application", "Human Navigation System", "Neurological Disease", "Virtual Morris Water Maze", "Crucial Cognitive Skill", "Neurological Patients", "Spatial Learning", "Cognitive Health", "Clinical Assessment", "Neurosurgical Patients", "Psychiatric Patients", "Cognitive Decline", "Systematics", "Navigation", "Animals", "Design Methodology", "Tools", "Synchronization", "Open Source Software", "Human Centered Computing", "Human Computer Interaction HCI", "HCI Design And Evaluation Methods", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Technical University of Munich", "fullName": "Daniel Roth", "givenName": "Daniel", "surname": "Roth", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Würzburg", "fullName": "Christian Felix Purps", "givenName": "Christian Felix", "surname": "Purps", "__typename": "ArticleAuthorType" }, { "affiliation": "Charite – Universitätsmedizin Berlin", "fullName": "Wolf-Julian Neumann", "givenName": "Wolf-Julian", "surname": "Neumann", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "141-146", "year": "2020", "issn": null, "isbn": "978-1-7281-7675-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "767500a135", "articleId": "1pBMl1Z7xw4", "__typename": "AdjacentArticleType" }, "next": { "fno": "767500a147", "articleId": "1pBMiVCpEGY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acii/2013/5048/0/5048a179", "title": "Bodily Manifestations of Affects: The Example of Gait and Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a179/12OmNx8wTgB", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2010/6237/0/05444800", "title": "Multimodal virtual reality application for the study of unilateral spatial neglect", "doi": null, "abstractUrl": "/proceedings-article/vr/2010/05444800/12OmNyo1nZ5", "parentPublication": { "id": "proceedings/vr/2010/6237/0", "title": "2010 IEEE Virtual Reality Conference (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240308", "title": "Virtual Reality Technology for Psychological/Neuropsychological/Motor Assessment and Rehabilitation: Applications and Issues", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240308/12OmNzWx03k", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446125", "title": "Immersive Robot-Assisted Virtual Reality Therapy for Neurologically-Caused Gait Impairments", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446125/13bd1fWcuDE", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/04/07829437", "title": "Emulation of Physician Tasks in Eye-Tracked Virtual Reality for Remote Diagnosis of Neurodegenerative Disease", "doi": null, "abstractUrl": "/journal/tg/2017/04/07829437/13rRUIIVlcP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09912775", "title": "Telerehabilitation of cognitive, motor and sleep disorders in neurological pathologies: the REHOME project", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09912775/1HBKmhmxjNu", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090606", "title": "Memory Journalist: Creating Virtual Reality Exergames for the Treatment of Older Adults with Dementia", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090606/1jIxlPij9Je", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/03/09112351", "title": "Augmented Reality and Virtual Reality Transforming Spinal Imaging Landscape: A Feasibility Study", "doi": null, "abstractUrl": "/magazine/cg/2021/03/09112351/1kwiMGwOmTC", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a723", "title": "DC: Clinical Application of Immersive VR in Spatial Cognition: The Assessment of Spatial Memory and Unilateral Spatial Neglect in Neurological Patients", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a723/1tnXQzeM5Tq", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09618863", "title": "Automatic emotion recognition in clinical scenario: a systematic review of methods", "doi": null, "abstractUrl": "/journal/ta/5555/01/09618863/1yBAtJLts7S", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tuAeQeDJja", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tuAPQPWR2g", "doi": "10.1109/VR50410.2021.00060", "title": "Using Fuzzy Logic to Involve Individual Differences for Predicting Cybersickness during VR Navigation", "normalizedTitle": "Using Fuzzy Logic to Involve Individual Differences for Predicting Cybersickness during VR Navigation", "abstract": "Many studies have explored how individual differences can affect users' susceptibility to cybersickness in a VR application. However, the lack of strategy to integrate the influence of each factor on cybersickness makes it difficult to utilize the results of existing research. Based on the fuzzy logic theory that can represent the effect of different factors as a single value containing integrated information, we developed two approaches including the knowledge-based Mamdani-type fuzzy inference system and the data-driven Adaptive neuro-fuzzy inference system (ANFIS) to involve three individual differences (Age, Gaming experience and Ethnicity). We correlated the corresponding outputs with the simulator sickness questionnaire (SSQ) scores in a simple navigation scenario. The correlation coefficients obtained through a 4- fold cross validation were found statistically significant with both fuzzy logic approaches, indicating their effectiveness to influence the occurrence and the level of cybersickness. Our work provides insights to establish customized experiences for VR navigation by involving individual differences.", "abstracts": [ { "abstractType": "Regular", "content": "Many studies have explored how individual differences can affect users' susceptibility to cybersickness in a VR application. However, the lack of strategy to integrate the influence of each factor on cybersickness makes it difficult to utilize the results of existing research. Based on the fuzzy logic theory that can represent the effect of different factors as a single value containing integrated information, we developed two approaches including the knowledge-based Mamdani-type fuzzy inference system and the data-driven Adaptive neuro-fuzzy inference system (ANFIS) to involve three individual differences (Age, Gaming experience and Ethnicity). We correlated the corresponding outputs with the simulator sickness questionnaire (SSQ) scores in a simple navigation scenario. The correlation coefficients obtained through a 4- fold cross validation were found statistically significant with both fuzzy logic approaches, indicating their effectiveness to influence the occurrence and the level of cybersickness. Our work provides insights to establish customized experiences for VR navigation by involving individual differences.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many studies have explored how individual differences can affect users' susceptibility to cybersickness in a VR application. However, the lack of strategy to integrate the influence of each factor on cybersickness makes it difficult to utilize the results of existing research. Based on the fuzzy logic theory that can represent the effect of different factors as a single value containing integrated information, we developed two approaches including the knowledge-based Mamdani-type fuzzy inference system and the data-driven Adaptive neuro-fuzzy inference system (ANFIS) to involve three individual differences (Age, Gaming experience and Ethnicity). We correlated the corresponding outputs with the simulator sickness questionnaire (SSQ) scores in a simple navigation scenario. The correlation coefficients obtained through a 4- fold cross validation were found statistically significant with both fuzzy logic approaches, indicating their effectiveness to influence the occurrence and the level of cybersickness. Our work provides insights to establish customized experiences for VR navigation by involving individual differences.", "fno": "255600a373", "keywords": [ "Fuzzy Neural Nets", "Fuzzy Reasoning", "Fuzzy Set Theory", "Virtual Reality", "Cybersickness Prediction", "VR Navigation", "VR Application", "Fuzzy Logic Theory", "Integrated Information", "Knowledge Based Mamdani Type Fuzzy Inference System", "Simulator Sickness Questionnaire Scores", "Simple Navigation Scenario", "Fuzzy Logic Approaches", "Data Driven Adaptive Neuro Fuzzy Inference System", "ANFIS", "SSQ Scores", "Fuzzy Logic", "Correlation Coefficient", "Visualization", "Solid Modeling", "Three Dimensional Displays", "Cybersickness", "Navigation", "Human Centered Computing Human Computer Interaction HCI Interaction Paradigms Virtual Reality", "Computing Methodologies Artificial Intelligence Knowledge Representation And Reasoning Vagueness And Fuzzy Logic", "Information Systems Information Retrieval Users And Interactive Retrieval Personalization" ], "authors": [ { "affiliation": "Arts et Metiers Institute of Technology LISPEN, HESAM Université, UBFC", "fullName": "Yuyang Wang", "givenName": "Yuyang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Arts et Metiers Institute of Technology LISPEN, HESAM Université, UBFC", "fullName": "Jean-Rémy Chardonnet", "givenName": "Jean-Rémy", "surname": "Chardonnet", "__typename": "ArticleAuthorType" }, { "affiliation": "Arts et Metiers Institute of Technology LISPEN, HESAM Université, UBFC", "fullName": "Frédéric Merienne", "givenName": "Frédéric", "surname": "Merienne", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Information Management in Engineering Karlsruhe Institute of Technology", "fullName": "Jivka Ovtcharova", "givenName": "Jivka", "surname": "Ovtcharova", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "373-381", "year": "2021", "issn": null, "isbn": "978-1-6654-1838-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "255600a363", "articleId": "1tuBqndPqhy", "__typename": "AdjacentArticleType" }, "next": { "fno": "255600a382", "articleId": "1tuAsJYxQ8E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar-adjunct/2018/7592/0/08699319", "title": "Effect of Navigation Speed and VR Devices on Cybersickness", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699319/19F1OrW6KxW", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09737429", "title": "Intentional Head-Motion Assisted Locomotion for Reducing Cybersickness", "doi": null, "abstractUrl": "/journal/tg/5555/01/09737429/1BQidPzNjBS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a777", "title": "TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a777/1JrR1CsIUjC", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a307", "title": "Demographic and Behavioral Correlates of Cybersickness: A Large Lab-in-the-Field Study of 837 Participants", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a307/1JrRjge0g6I", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049731", "title": "Cybersickness, Cognition, &#x0026; Motor Skills: The Effects of Music, Gender, and Gaming Experience", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049731/1KYow8CUV20", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a561", "title": "You Make Me Sick&#x0021; The Effect of Stairs on Presence, Cybersickness, and Perception of Embodied Conversational Agents", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a561/1MNgq5zE1BS", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a609", "title": "LiteVR: Interpretable and Lightweight Cybersickness Detection using Explainable AI", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a609/1MNgzF7scM0", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090607", "title": "Exploring Blink-Rate Behaviors for Cybersickness Detection in VR", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090607/1jIxAfKUpbO", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a161", "title": "Individual Differences &#x0026; Task Attention in Cybersickness: A Call for a Standardized Approach to Data Sharing", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a161/1tnXecXunPa", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a138", "title": "Using Trajectory Compression Rate to Predict Changes in Cybersickness in Virtual Reality Games", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a138/1yeD4ffM0c8", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzVGcID", "title": "2009 IEEE International Conference on Data Mining Workshops", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNya72rr", "doi": "10.1109/ICDMW.2009.55", "title": "Ensemble-Vis: A Framework for the Statistical Visualization of Ensemble Data", "normalizedTitle": "Ensemble-Vis: A Framework for the Statistical Visualization of Ensemble Data", "abstract": "Scientists increasingly use ensemble data sets to explore relationships present in dynamic systems. Ensemble data sets combine spatio-temporal simulation results generated using multiple numerical models, sampled input conditions and perturbed parameters. While ensemble data sets are a powerful tool for mitigating uncertainty, they pose significant visualization and analysis challenges due to their complexity. In this article, we present Ensemble-Vis, a framework consisting of a collection of overview and statistical displays linked through a high level of interactivity. Ensemble-Vis allows scientists to gain key scientific insight into the distribution of simulation results as well as the uncertainty associated with the scientific data. In contrast to methods that present large amounts of diverse information in a single display, we argue that combining multiple linked displays yields a clearer presentation of the data and facilitates a greater level of visual data analysis. We demonstrate our framework using driving problems from climate modeling and meteorology and discuss generalizations to other fields.", "abstracts": [ { "abstractType": "Regular", "content": "Scientists increasingly use ensemble data sets to explore relationships present in dynamic systems. Ensemble data sets combine spatio-temporal simulation results generated using multiple numerical models, sampled input conditions and perturbed parameters. While ensemble data sets are a powerful tool for mitigating uncertainty, they pose significant visualization and analysis challenges due to their complexity. In this article, we present Ensemble-Vis, a framework consisting of a collection of overview and statistical displays linked through a high level of interactivity. Ensemble-Vis allows scientists to gain key scientific insight into the distribution of simulation results as well as the uncertainty associated with the scientific data. In contrast to methods that present large amounts of diverse information in a single display, we argue that combining multiple linked displays yields a clearer presentation of the data and facilitates a greater level of visual data analysis. We demonstrate our framework using driving problems from climate modeling and meteorology and discuss generalizations to other fields.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scientists increasingly use ensemble data sets to explore relationships present in dynamic systems. Ensemble data sets combine spatio-temporal simulation results generated using multiple numerical models, sampled input conditions and perturbed parameters. While ensemble data sets are a powerful tool for mitigating uncertainty, they pose significant visualization and analysis challenges due to their complexity. In this article, we present Ensemble-Vis, a framework consisting of a collection of overview and statistical displays linked through a high level of interactivity. Ensemble-Vis allows scientists to gain key scientific insight into the distribution of simulation results as well as the uncertainty associated with the scientific data. In contrast to methods that present large amounts of diverse information in a single display, we argue that combining multiple linked displays yields a clearer presentation of the data and facilitates a greater level of visual data analysis. We demonstrate our framework using driving problems from climate modeling and meteorology and discuss generalizations to other fields.", "fno": "05360497", "keywords": [ "Data Visualization", "Weather Forecasting", "Data Analysis", "Uncertainty", "Meteorology", "Computational Modeling", "Displays", "Predictive Models", "Laboratories", "Numerical Models" ], "authors": [], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "233-240", "year": "2009", "issn": null, "isbn": "978-0-7695-3902-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": null, "next": { "fno": "3902z004", "articleId": "12OmNBtl1rU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a285", "title": "The Joint Ensemble Forecast System (JEFS) Experiment", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a285/12OmNBZHikk", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143a994", "title": "Severe Hail Prediction within a Spatiotemporal Relational Data Mining Framework", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143a994/12OmNzZWbJ9", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1990/2083/0/00146361", "title": "The VIS-5D system for easy interactive visualization", "doi": null, "abstractUrl": "/proceedings-article/visual/1990/00146361/12OmNzcPAHQ", "parentPublication": { "id": "proceedings/visual/1990/2083/0", "title": "1990 First IEEE Conference on Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019883", "title": "Visualizing Confidence in Cluster-Based Ensemble Weather Forecast Analyses", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019883/13rRUyv53Fz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08126857", "title": "Visualization in Meteorology—A Survey of Techniques and Tools for Data Analysis Tasks", "doi": null, "abstractUrl": "/journal/tg/2018/12/08126857/14H4WxkfGxO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440052", "title": "An Interactive Framework for Visualization of Weather Forecast Ensembles", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440052/17D45XDIXW9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2021/0878/0/087800a332", "title": "A Forecasting Method of Dual Traffic Condition Indicators Based on Ensemble Learning", "doi": null, "abstractUrl": "/proceedings-article/icpads/2021/087800a332/1D4LNtWduhi", "parentPublication": { "id": "proceedings/icpads/2021/0878/0", "title": "2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2020/9998/0/999800a001", "title": "A 1024-Member Ensemble Data Assimilation with 3.5-Km Mesh Global Weather Simulations", "doi": null, "abstractUrl": "/proceedings-article/sc/2020/999800a001/1oeORswZpYY", "parentPublication": { "id": "proceedings/sc/2020/9998/0/", "title": "2020 SC20: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a046", "title": "An Extension of Empirical Orthogonal Functions for the Analysis of Time-Dependent 2D Scalar Field Ensembles", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a046/1tTts2Wm4UM", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/04/09669058", "title": "<italic>EnConVis</italic>: A Unified Framework for Ensemble Contour Visualization", "doi": null, "abstractUrl": "/journal/tg/2023/04/09669058/1zTfZV1Ocnu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H0O0Y6xZOo", "doi": "10.1109/CVPR52688.2022.01456", "title": "Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability", "normalizedTitle": "Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability", "abstract": "The black-box adversarial attack has attracted impressive attention for its practical use in the field of deep learning security. Meanwhile, it is very challenging as there is no access to the network architecture or internal weights of the target model. Based on the hypothesis that if an example remains adversarial for multiple models, then it is more likely to transfer the attack capability to other models, the ensemble-based adversarial attack methods are efficient and widely used for black-box attacks. However, ways of ensemble attack are rather less investigated, and existing ensemble attacks simply fuse the outputs of all the models evenly. In this work, we treat the iterative ensemble attack as a stochastic gradient descent optimization process, in which the variance of the gradients on different models may lead to poor local optima. To this end, we propose a novel attack method called the stochastic variance reduced ensemble (SVRE) attack, which could reduce the gradient variance of the ensemble models and take full advantage of the ensemble attack. Empirical results on the standard ImageNet dataset demonstrate that the proposed method could boost the adversarial transferability and outperforms existing ensemble attacks significantly. Code is available at https://github.com/JHL-HUST/SVRE.", "abstracts": [ { "abstractType": "Regular", "content": "The black-box adversarial attack has attracted impressive attention for its practical use in the field of deep learning security. Meanwhile, it is very challenging as there is no access to the network architecture or internal weights of the target model. Based on the hypothesis that if an example remains adversarial for multiple models, then it is more likely to transfer the attack capability to other models, the ensemble-based adversarial attack methods are efficient and widely used for black-box attacks. However, ways of ensemble attack are rather less investigated, and existing ensemble attacks simply fuse the outputs of all the models evenly. In this work, we treat the iterative ensemble attack as a stochastic gradient descent optimization process, in which the variance of the gradients on different models may lead to poor local optima. To this end, we propose a novel attack method called the stochastic variance reduced ensemble (SVRE) attack, which could reduce the gradient variance of the ensemble models and take full advantage of the ensemble attack. Empirical results on the standard ImageNet dataset demonstrate that the proposed method could boost the adversarial transferability and outperforms existing ensemble attacks significantly. Code is available at https://github.com/JHL-HUST/SVRE.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The black-box adversarial attack has attracted impressive attention for its practical use in the field of deep learning security. Meanwhile, it is very challenging as there is no access to the network architecture or internal weights of the target model. Based on the hypothesis that if an example remains adversarial for multiple models, then it is more likely to transfer the attack capability to other models, the ensemble-based adversarial attack methods are efficient and widely used for black-box attacks. However, ways of ensemble attack are rather less investigated, and existing ensemble attacks simply fuse the outputs of all the models evenly. In this work, we treat the iterative ensemble attack as a stochastic gradient descent optimization process, in which the variance of the gradients on different models may lead to poor local optima. To this end, we propose a novel attack method called the stochastic variance reduced ensemble (SVRE) attack, which could reduce the gradient variance of the ensemble models and take full advantage of the ensemble attack. Empirical results on the standard ImageNet dataset demonstrate that the proposed method could boost the adversarial transferability and outperforms existing ensemble attacks significantly. Code is available at https://github.com/JHL-HUST/SVRE.", "fno": "694600o4963", "keywords": [ "Computer Crime", "Deep Learning Artificial Intelligence", "Gradient Methods", "Optimisation", "Stochastic Processes", "Black Box Adversarial Attack", "Ensemble Based Adversarial Attack Methods", "Stochastic Gradient Descent Optimization Process", "Ensemble Models", "Adversarial Transferability", "Stochastic Variance Reduced Ensemble Adversarial Attack", "Deep Learning Security", "Local Optima", "SVRE", "Gradient Variance", "Deep Learning", "Fuses", "Stochastic Processes", "Network Architecture", "Boosting", "Pattern Recognition", "Security" ], "authors": [ { "affiliation": "Huazhong University of Science and Technology,Department of Computer Science,Wuhan,China", "fullName": "Yifeng Xiong", "givenName": "Yifeng", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": "Huazhong University of Science and Technology,Department of Computer Science,Wuhan,China", "fullName": "Jiadong Lin", "givenName": "Jiadong", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Huazhong University of Science and Technology,Department of Computer Science,Wuhan,China", "fullName": "Min Zhang", "givenName": "Min", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University,Department of Computer Science,Ithaca,NY,USA", "fullName": "John E. Hopcroft", "givenName": "John E.", "surname": "Hopcroft", "__typename": "ArticleAuthorType" }, { "affiliation": "Huazhong University of Science and Technology,Department of Computer Science,Wuhan,China", "fullName": "Kun He", "givenName": "Kun", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "14963-14972", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H0O0USZZn2", "name": "pcvpr202269460-09878754s1-mm_694600o4963.zip", "size": "2.05 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09878754s1-mm_694600o4963.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600o4953", "articleId": "1H1nh1Xh7S8", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600o4973", "articleId": "1H1hUnBlWbC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000j185", "title": "Boosting Adversarial Attacks with Momentum", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000j185/17D45VUZMXG", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200q6138", "title": "Admix: Enhancing the Transferability of Adversarial Attacks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200q6138/1BmIaR3ExvG", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09774934", "title": "TREND: Transferability based Robust ENsemble Design", "doi": null, "abstractUrl": "/journal/ai/5555/01/09774934/1DliiUgkt2M", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4973", "title": "Improving Adversarial Transferability via Neuron Attribution-based Attacks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4973/1H1hUnBlWbC", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600p5074", "title": "Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600p5074/1H1mrSsvCM0", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2020/4905/0/09049702", "title": "Cross-Layer Strategic Ensemble Defense Against Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/icnc/2020/09049702/1iERUvodBzW", "parentPublication": { "id": "proceedings/icnc/2020/4905/0", "title": "2020 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b238", "title": "Boosting Black-box Adversarial Attack with a Better Convergence", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b238/1tzyRcD1Vcc", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b924", "title": "Enhancing the Transferability of Adversarial Attacks through Variance Tuning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b924/1yeIA2RCEak", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j020", "title": "Improving the Transferability of Adversarial Samples with Adversarial Transformations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j020/1yeJbXy7XhK", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09612007", "title": "Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tq/2023/01/09612007/1yrDczhero4", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1IHotVZum6Q", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "9956007", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1IHq9h4Xzkk", "doi": "10.1109/ICPR56361.2022.9956231", "title": "AutoDEUQ: Automated Deep Ensemble with Uncertainty Quantification", "normalizedTitle": "AutoDEUQ: Automated Deep Ensemble with Uncertainty Quantification", "abstract": "Deep neural networks are powerful predictors for a variety of tasks. However, they do not capture uncertainty directly. Using neural network ensembles to quantify uncertainty is competitive with approaches based on Bayesian neural networks while benefiting from better computational scalability. However, building ensembles of neural networks is a challenging task because, in addition to choosing the right neural architecture or hyperparameters for each member of the ensemble, there is an added cost of training each model. To address this issue, we propose AutoDEUQ, an automated approach for generating an ensemble of deep neural networks. Our approach leverages joint neural architecture and hyperparameter search to generate ensembles. We use the law of total variance to decompose the predictive variance of deep ensembles into aleatoric (data) and epistemic (model) uncertainties. We show that AutoDEUQ outperforms probabilistic backpropagation, Monte Carlo dropout, deep ensemble, distribution-free ensembles, and hyper ensemble methods on a number of regression benchmarks.", "abstracts": [ { "abstractType": "Regular", "content": "Deep neural networks are powerful predictors for a variety of tasks. However, they do not capture uncertainty directly. Using neural network ensembles to quantify uncertainty is competitive with approaches based on Bayesian neural networks while benefiting from better computational scalability. However, building ensembles of neural networks is a challenging task because, in addition to choosing the right neural architecture or hyperparameters for each member of the ensemble, there is an added cost of training each model. To address this issue, we propose AutoDEUQ, an automated approach for generating an ensemble of deep neural networks. Our approach leverages joint neural architecture and hyperparameter search to generate ensembles. We use the law of total variance to decompose the predictive variance of deep ensembles into aleatoric (data) and epistemic (model) uncertainties. We show that AutoDEUQ outperforms probabilistic backpropagation, Monte Carlo dropout, deep ensemble, distribution-free ensembles, and hyper ensemble methods on a number of regression benchmarks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep neural networks are powerful predictors for a variety of tasks. However, they do not capture uncertainty directly. Using neural network ensembles to quantify uncertainty is competitive with approaches based on Bayesian neural networks while benefiting from better computational scalability. However, building ensembles of neural networks is a challenging task because, in addition to choosing the right neural architecture or hyperparameters for each member of the ensemble, there is an added cost of training each model. To address this issue, we propose AutoDEUQ, an automated approach for generating an ensemble of deep neural networks. Our approach leverages joint neural architecture and hyperparameter search to generate ensembles. We use the law of total variance to decompose the predictive variance of deep ensembles into aleatoric (data) and epistemic (model) uncertainties. We show that AutoDEUQ outperforms probabilistic backpropagation, Monte Carlo dropout, deep ensemble, distribution-free ensembles, and hyper ensemble methods on a number of regression benchmarks.", "fno": "09956231", "keywords": [ "Belief Networks", "Deep Learning Artificial Intelligence", "Auto DEUQ", "Automated Approach", "Automated Deep Ensemble", "Bayesian Neural Networks", "Computational Scalability", "Deep Neural Networks", "Distribution Free Ensembles", "Ensemble Methods", "Hyperparameter Neural Architecture", "Joint Neural Architecture", "Neural Network Ensembles", "Uncertainty Quantification", "Deep Learning", "Training", "Uncertainty", "Scalability", "Neural Networks", "Computer Architecture", "Predictive Models" ], "authors": [ { "affiliation": "Argonne National Laboratory,USA", "fullName": "Romain Egele", "givenName": "Romain", "surname": "Egele", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory,Lemont,Illinois,USA", "fullName": "Romit Maulik", "givenName": "Romit", "surname": "Maulik", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory,Lemont,Illinois,USA", "fullName": "Krishnan Raghavan", "givenName": "Krishnan", "surname": "Raghavan", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory,Lemont,Illinois,USA", "fullName": "Bethany Lusch", "givenName": "Bethany", "surname": "Lusch", "__typename": "ArticleAuthorType" }, { "affiliation": "Université Paris-Saclay,Paris,France", "fullName": "Isabelle Guyon", "givenName": "Isabelle", "surname": "Guyon", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory,Lemont,Illinois,USA", "fullName": "Prasanna Balaprakash", "givenName": "Prasanna", "surname": "Balaprakash", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "1908-1914", "year": "2022", "issn": null, "isbn": "978-1-6654-9062-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09956061", "articleId": "1IHov0UQFvW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09956081", "articleId": "1IHoGhzlKTe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07364081", "title": "Data analytics and uncertainty quantification for energy prediction in manufacturing", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364081/12OmNBE7MuZ", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b433", "title": "Boosting Deep Ensemble Performance with Hierarchical Pruning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b433/1AqxrLgruFi", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718387", "title": "Ensemble Deep Learning Models for Fine-grained Plant Species Identification", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718387/1Boh1SxVzhe", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmbs/2022/6770/0/677000a044", "title": "Estimating Predictive Uncertainty in Gastrointestinal Polyp Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cmbs/2022/677000a044/1GhW2gvViNO", "parentPublication": { "id": "proceedings/cmbs/2022/6770/0", "title": "2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2023/9336/0/933600b901", "title": "Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective", "doi": null, "abstractUrl": "/proceedings-article/sp/2023/933600b901/1Js0Esvi9RC", "parentPublication": { "id": "proceedings/sp/2023/9336/0/", "title": "2023 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d213", "title": "Automated Detection of Label Errors in Semantic Segmentation Datasets via Deep Learning and Uncertainty Quantification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d213/1L8qnBPlbK8", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2020/4905/0/09049702", "title": "Cross-Layer Strategic Ensemble Defense Against Adversarial Examples", "doi": null, "abstractUrl": "/proceedings-article/icnc/2020/09049702/1iERUvodBzW", "parentPublication": { "id": "proceedings/icnc/2020/4905/0", "title": "2020 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2021/9101/0/09333853", "title": "Bitcoin Price Forecasting via Ensemble-based LSTM Deep Learning Networks", "doi": null, "abstractUrl": "/proceedings-article/icoin/2021/09333853/1qTrTEUVIOY", "parentPublication": { "id": "proceedings/icoin/2021/9101/0", "title": "2021 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2021/6836/0/683600a436", "title": "Uncertainty-Wizard: Fast and User-Friendly Neural Network Uncertainty Quantification", "doi": null, "abstractUrl": "/proceedings-article/icst/2021/683600a436/1tRPbwVMRoc", "parentPublication": { "id": "proceedings/icst/2021/6836/0", "title": "2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900n3534", "title": "Masksembles for Uncertainty Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900n3534/1yeL8d0tHCE", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtpUW1NwA", "doi": "10.1109/PacificVis52677.2021.00017", "title": "Visual Analysis of Spatio-Temporal Trends in Time-Dependent Ensemble Data Sets on the Example of the North Atlantic Oscillation", "normalizedTitle": "Visual Analysis of Spatio-Temporal Trends in Time-Dependent Ensemble Data Sets on the Example of the North Atlantic Oscillation", "abstract": "A driving factor of the winter weather in Western Europe is the North Atlantic Oscillation (NAO), manifested by fluctuations in the difference of sea level pressure between the Icelandic Low and the Azores High. Different methods have been developed that describe the strength of this oscillation, but they rely on certain assumptions, e.g., fixed positions of these two pressure systems. It is possible that climate change affects the mean location of both the Low and the High and thus the validity of these descriptive methods. This study is the first to visually analyze large ensemble climate change simulations (the MPI Grand Ensemble) to robustly assess shifts of the drivers of the NAO phenomenon using the uncertain northern hemispheric surface pressure fields. For this, we use a sliding window approach and compute empirical orthogonal functions (EOFs) for each window and ensemble member, then compare the uncertainty of local extrema in the results as well as their temporal evolution across different CO<inf>2</inf> scenarios. We find systematic northeastward shifts in the location of the pressure systems that correlate with the simulated warming. Applying visualization techniques for this analysis was not straightforward; we reflect and give some lessons learned for the field of visualization.", "abstracts": [ { "abstractType": "Regular", "content": "A driving factor of the winter weather in Western Europe is the North Atlantic Oscillation (NAO), manifested by fluctuations in the difference of sea level pressure between the Icelandic Low and the Azores High. Different methods have been developed that describe the strength of this oscillation, but they rely on certain assumptions, e.g., fixed positions of these two pressure systems. It is possible that climate change affects the mean location of both the Low and the High and thus the validity of these descriptive methods. This study is the first to visually analyze large ensemble climate change simulations (the MPI Grand Ensemble) to robustly assess shifts of the drivers of the NAO phenomenon using the uncertain northern hemispheric surface pressure fields. For this, we use a sliding window approach and compute empirical orthogonal functions (EOFs) for each window and ensemble member, then compare the uncertainty of local extrema in the results as well as their temporal evolution across different CO<inf>2</inf> scenarios. We find systematic northeastward shifts in the location of the pressure systems that correlate with the simulated warming. Applying visualization techniques for this analysis was not straightforward; we reflect and give some lessons learned for the field of visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A driving factor of the winter weather in Western Europe is the North Atlantic Oscillation (NAO), manifested by fluctuations in the difference of sea level pressure between the Icelandic Low and the Azores High. Different methods have been developed that describe the strength of this oscillation, but they rely on certain assumptions, e.g., fixed positions of these two pressure systems. It is possible that climate change affects the mean location of both the Low and the High and thus the validity of these descriptive methods. This study is the first to visually analyze large ensemble climate change simulations (the MPI Grand Ensemble) to robustly assess shifts of the drivers of the NAO phenomenon using the uncertain northern hemispheric surface pressure fields. For this, we use a sliding window approach and compute empirical orthogonal functions (EOFs) for each window and ensemble member, then compare the uncertainty of local extrema in the results as well as their temporal evolution across different CO2 scenarios. We find systematic northeastward shifts in the location of the pressure systems that correlate with the simulated warming. Applying visualization techniques for this analysis was not straightforward; we reflect and give some lessons learned for the field of visualization.", "fno": "393100a071", "keywords": [ "Atmospheric Composition", "Atmospheric Pressure", "Atmospheric Temperature", "Climatology", "Global Warming", "Ensemble Climate Change Simulations", "MPI Grand Ensemble", "NAO Phenomenon", "Sliding Window Approach", "Compute Empirical Orthogonal Functions", "Temporal Evolution", "Pressure Systems", "Visualization Techniques", "Visual Analysis", "Spatio Temporal Trends", "Time Dependent Ensemble Data Sets", "North Atlantic Oscillation", "Winter Weather", "Western Europe", "Sea Level Pressure", "Icelandic Low", "Azores High", "Northern Hemispheric Surface Pressure Fields", "Carbon Dioxide Scenarios", "Simulated Warming", "Climate Change", "Visualization", "Sea Surface", "Uncertainty", "Systematics", "Data Visualization", "Market Research", "Human Centered Computing", "Visualization", "Visualization Systems And Tools", "Visualization Toolkits", "Computing Methodologies", "Artificial Intelligence", "Computer Vision", "Computer Vision Problems Object Detection" ], "authors": [ { "affiliation": "Leipzig University", "fullName": "Dominik Vietinghoff", "givenName": "Dominik", "surname": "Vietinghoff", "__typename": "ArticleAuthorType" }, { "affiliation": "Leipzig University", "fullName": "Christian Heine", "givenName": "Christian", "surname": "Heine", "__typename": "ArticleAuthorType" }, { "affiliation": "Deutsches Klimarechenzentrum", "fullName": "Michael Böttinger", "givenName": "Michael", "surname": "Böttinger", "__typename": "ArticleAuthorType" }, { "affiliation": "Max Planck Institute for Meteorology", "fullName": "Nicola Maher", "givenName": "Nicola", "surname": "Maher", "__typename": "ArticleAuthorType" }, { "affiliation": "Max Planck Institute for Meteorology", "fullName": "Johann Jungclaus", "givenName": "Johann", "surname": "Jungclaus", "__typename": "ArticleAuthorType" }, { "affiliation": "Leipzig University", "fullName": "Gerik Scheuermann", "givenName": "Gerik", "surname": "Scheuermann", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "71-80", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a061", "articleId": "1tTtq7bTYJi", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a081", "articleId": "1tTtqNuHyBq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2015/7964/0/07113427", "title": "SHAHED: A MapReduce-based system for querying and visualizing spatio-temporal satellite data", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113427/12OmNyPQ4Lg", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352365", "title": "Visual Trends Analysis in Time-Varying Ensembles", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352365/13rRUwI5TR2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2007/03/c3065", "title": "An Ice-Free Arctic? Opportunities for Computational Science", "doi": null, "abstractUrl": "/magazine/cs/2007/03/c3065/13rRUxD9h12", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2018/7445/0/744500a332", "title": "The Influence of Climate Change on Vulnerability about Fragile and Stable", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2018/744500a332/17D45X2fUHO", "parentPublication": { "id": "proceedings/dcabes/2018/7445/0", "title": "2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbase/2021/2709/0/270900a089", "title": "Spatial differentiation of sea surface salinity in the South China Sea and the adjacent Northwest Pacific based on big data analysis", "doi": null, "abstractUrl": "/proceedings-article/icbase/2021/270900a089/1AH8dvlDlC0", "parentPublication": { "id": "proceedings/icbase/2021/2709/0", "title": "2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800b171", "title": "Parallel PCA-Based Bacterial Foraging Optimization Algorithm for Identifying Optimal Precursors of North Atlantic Oscillation", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800b171/1dPokhI5QE8", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2020/6698/0/669800a181", "title": "Review of Ecological Coast Construction Technology", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2020/669800a181/1kuHXDfCnao", "parentPublication": { "id": "proceedings/icitbs/2020/6698/0", "title": "2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a046", "title": "An Extension of Empirical Orthogonal Functions for the Analysis of Time-Dependent 2D Scalar Field Ensembles", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a046/1tTts2Wm4UM", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600b967", "title": "New research progress on synthesis and properities of eco-friendly insulating gas heptafluoroisobutyronitrile((i-C<inf>4</inf>F<inf>7</inf>N))", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600b967/1x3l6Hnko0M", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900b092", "title": "Towards Indirect Top-Down Road Transport Emissions Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900b092/1yXsHPkKPJu", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa6fk", "title": "Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects", "acronym": "mnrao", "groupId": "1001997", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNC8dgfo", "doi": "10.1109/MNRAO.1994.346243", "title": "Spatio-temporal analysis of nonrigid motion from 4D data", "normalizedTitle": "Spatio-temporal analysis of nonrigid motion from 4D data", "abstract": "Presents a method for analysis of nonrigid motion in time sequences of volume images (4D data). In this method, nonrigid motion of the deforming object's contour is dynamically approximated by a deformable surface. In order to reduce the number of parameters describing the deformation, we make use of modal analysis, which provides a spatial smoothing of the surface, and Fourier analysis of the time signals of the main deformation spectrum components, which provides a temporal smoothing. Thus, a complex nonrigid deformation displayed in 4D data is described by very few parameters: the main excited spatial modes and the main Fourier harmonics. Therefore, 4D data can be analyzed and reduced in a very efficient way. The power of the approach is illustrated by results on 4D heart-scan data.<>", "abstracts": [ { "abstractType": "Regular", "content": "Presents a method for analysis of nonrigid motion in time sequences of volume images (4D data). In this method, nonrigid motion of the deforming object's contour is dynamically approximated by a deformable surface. In order to reduce the number of parameters describing the deformation, we make use of modal analysis, which provides a spatial smoothing of the surface, and Fourier analysis of the time signals of the main deformation spectrum components, which provides a temporal smoothing. Thus, a complex nonrigid deformation displayed in 4D data is described by very few parameters: the main excited spatial modes and the main Fourier harmonics. Therefore, 4D data can be analyzed and reduced in a very efficient way. The power of the approach is illustrated by results on 4D heart-scan data.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents a method for analysis of nonrigid motion in time sequences of volume images (4D data). In this method, nonrigid motion of the deforming object's contour is dynamically approximated by a deformable surface. In order to reduce the number of parameters describing the deformation, we make use of modal analysis, which provides a spatial smoothing of the surface, and Fourier analysis of the time signals of the main deformation spectrum components, which provides a temporal smoothing. Thus, a complex nonrigid deformation displayed in 4D data is described by very few parameters: the main excited spatial modes and the main Fourier harmonics. Therefore, 4D data can be analyzed and reduced in a very efficient way. The power of the approach is illustrated by results on 4D heart-scan data.", "fno": "00346243", "keywords": [ "Motion Estimation", "Fourier Analysis", "Deformation", "Data Analysis", "Data Reduction", "Cardiology", "Image Sequences", "Spatiotemporal Analysis", "Nonrigid Motion", "4 D Data Reduction", "Time Sequences", "Volume Images", "Deforming Object Contour", "Dynamic Approximation", "Deformable Surface", "Modal Analysis", "Spatial Smoothing", "Fourier Analysis", "Time Signals", "Deformation Spectrum Components", "Temporal Smoothing", "Excited Spatial Modes", "Fourier Harmonics", "4 D Data Analysis", "4 D Heart Scan Data", "Motion Analysis", "Modal Analysis", "Deformable Models", "Computer Vision", "Image Motion Analysis", "Image Analysis", "Image Sequence Analysis", "Smoothing Methods", "Heart", "Signal Analysis" ], "authors": [ { "affiliation": "Inst. Nat. de Recherche en Inf. et Autom., Le Chesnay, France", "fullName": "C. Nastar", "givenName": "C.", "surname": "Nastar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "N. Ayache", "givenName": "N.", "surname": "Ayache", "__typename": "ArticleAuthorType" } ], "idPrefix": "mnrao", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "146,147,148,149,150,151", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00346242", "articleId": "12OmNvTTcca", "__typename": "AdjacentArticleType" }, "next": { "fno": "00346244", "articleId": "12OmNvqW6Yr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/1992/2910/0/00201510", "title": "Extracting nonrigid moving objects by temporal edges", "doi": null, "abstractUrl": "/proceedings-article/icpr/1992/00201510/12OmNAZOJVG", "parentPublication": { "id": "proceedings/icpr/1992/2910/0", "title": "1992 11th IAPR International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206854", "title": "Shape evolution for rigid and nonrigid shape registration and recovery", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206854/12OmNwx3Qag", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wvm/1991/2153/0/00212770", "title": "Recursive estimation of shape and nonrigid motion", "doi": null, "abstractUrl": "/proceedings-article/wvm/1991/00212770/12OmNxeutdo", "parentPublication": { "id": "proceedings/wvm/1991/2153/0", "title": "Proceedings of the IEEE Workshop on Visual Motion", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bia/1994/5802/0/00315865", "title": "Classification of nonrigid motion in 3D images using physics-based vibration analysis", "doi": null, "abstractUrl": "/proceedings-article/bia/1994/00315865/12OmNxwncuc", "parentPublication": { "id": "proceedings/bia/1994/5802/0", "title": "Proceedings of IEEE Workshop on Biomedical Image Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1991/2148/0/00139712", "title": "Constrained deformable superquadrics and nonrigid motion tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1991/00139712/12OmNxzMnPf", "parentPublication": { "id": "proceedings/cvpr/1991/2148/0", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1997/8183/2/81832117", "title": "A Spatiotemporal Finite Element Mesh Model of Cyclical Deforming Motion and Its Application in Myocardial Motion Analysis Using Phase Contrast MR Images", "doi": null, "abstractUrl": "/proceedings-article/icip/1997/81832117/12OmNywOWN4", "parentPublication": { "id": "proceedings/icip/1997/8183/2", "title": "Proceedings of International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1996/11/i1067", "title": "Frequency-Based Nonrigid Motion Analysis: Application to Four Dimensional Medical Images", "doi": null, "abstractUrl": "/journal/tp/1996/11/i1067/13rRUwInvg8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2003/04/i0492", "title": "Layered 4D Representation and Voting for Grouping from Motion", "doi": null, "abstractUrl": "/journal/tp/2003/04/i0492/13rRUwbs2hs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/03/mcg2012030037", "title": "Nonrigid-Deformation Recovery for 3D Face Recognition Using Multiscale Registration", "doi": null, "abstractUrl": "/magazine/cg/2012/03/mcg2012030037/13rRUy0ZzSd", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1991/07/i0730", "title": "Recovery of Nonrigid Motion and Structure", "doi": null, "abstractUrl": "/journal/tp/1991/07/i0730/13rRUyYjK3C", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAnMuCO", "title": "Biomedical Image Analysis, Workshop on", "acronym": "wbia", "groupId": "1000079", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNwqft3c", "doi": "10.1109/BIA.1998.692437", "title": "The Integration of Automatic Segmentation and Motion Tracking for 4D Reconstruction and Visualization of Musculoskeletal Structures", "normalizedTitle": "The Integration of Automatic Segmentation and Motion Tracking for 4D Reconstruction and Visualization of Musculoskeletal Structures", "abstract": "The 3D reconstruction of high contrast anatomical structures has been widely explored. However, a class of important clinical problems involves the motion of very complex musculoskeletal structures including the joints, hence a 4D reconstruction is desired. Practical difficulties with 4D reconstruction with MRI include the time required for data acquisition, the resolution required for visualization of small but critical structures, the gross inhomogeneities of field coil response, the degree of noise present with the signal and the extreme low-contrast details between some distinct anatomical structures. We present a comprehensive approach to 4D musculoskeletal imagery that address the above challenges. Specific MR imaging protocols; segmentation, motion estimation and motion tracking algorithms are developed and applied to render complex 4D musculoskeletal systems. Applications of the approach include the analysis of the rotation of the upper arm and the knee extension.", "abstracts": [ { "abstractType": "Regular", "content": "The 3D reconstruction of high contrast anatomical structures has been widely explored. However, a class of important clinical problems involves the motion of very complex musculoskeletal structures including the joints, hence a 4D reconstruction is desired. Practical difficulties with 4D reconstruction with MRI include the time required for data acquisition, the resolution required for visualization of small but critical structures, the gross inhomogeneities of field coil response, the degree of noise present with the signal and the extreme low-contrast details between some distinct anatomical structures. We present a comprehensive approach to 4D musculoskeletal imagery that address the above challenges. Specific MR imaging protocols; segmentation, motion estimation and motion tracking algorithms are developed and applied to render complex 4D musculoskeletal systems. Applications of the approach include the analysis of the rotation of the upper arm and the knee extension.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The 3D reconstruction of high contrast anatomical structures has been widely explored. However, a class of important clinical problems involves the motion of very complex musculoskeletal structures including the joints, hence a 4D reconstruction is desired. Practical difficulties with 4D reconstruction with MRI include the time required for data acquisition, the resolution required for visualization of small but critical structures, the gross inhomogeneities of field coil response, the degree of noise present with the signal and the extreme low-contrast details between some distinct anatomical structures. We present a comprehensive approach to 4D musculoskeletal imagery that address the above challenges. Specific MR imaging protocols; segmentation, motion estimation and motion tracking algorithms are developed and applied to render complex 4D musculoskeletal systems. Applications of the approach include the analysis of the rotation of the upper arm and the knee extension.", "fno": "84600154", "keywords": [], "authors": [ { "affiliation": "University of Rochester", "fullName": "Jose G. Tamez-Pena", "givenName": "Jose G.", "surname": "Tamez-Pena", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Rochester", "fullName": "Kevin J. Parker", "givenName": "Kevin J.", "surname": "Parker", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Rochester", "fullName": "Saara Totterman", "givenName": "Saara", "surname": "Totterman", "__typename": "ArticleAuthorType" } ], "idPrefix": "wbia", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-06-01T00:00:00", "pubType": "proceedings", "pages": "154", "year": "1998", "issn": null, "isbn": "0-8186-8460-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "84600144", "articleId": "12OmNyPQ4JJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "84600164", "articleId": "12OmNvzJFWM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy9Prj1", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxu6p8h", "doi": "10.1109/ICCVW.2017.139", "title": "4D Effect Video Classification with Shot-Aware Frame Selection and Deep Neural Networks", "normalizedTitle": "4D Effect Video Classification with Shot-Aware Frame Selection and Deep Neural Networks", "abstract": "A 4D effect video played at cinema or other designated places is a video annotated with physical effects such as motion, vibration, wind, flashlight, water spray, and scent. In order to automate the time-consuming and labor-intensive process of creating such videos, we propose a new method to classify videos into 4D effect types with shot-aware frame selection and deep neural networks (DNNs). Shot-aware frame selection is a process of selecting video frames across multiple shots based on the shot length ratios to subsample every video down to a fixed number of frames for classification. For empirical evaluation, we collect a new dataset of 4D effect videos where most of the videos consist of multiple shots. Our extensive experiments show that the proposed method consistently outperforms DNNs without considering multi-shot aspect by up to 8.8% in terms of mean average precision.", "abstracts": [ { "abstractType": "Regular", "content": "A 4D effect video played at cinema or other designated places is a video annotated with physical effects such as motion, vibration, wind, flashlight, water spray, and scent. In order to automate the time-consuming and labor-intensive process of creating such videos, we propose a new method to classify videos into 4D effect types with shot-aware frame selection and deep neural networks (DNNs). Shot-aware frame selection is a process of selecting video frames across multiple shots based on the shot length ratios to subsample every video down to a fixed number of frames for classification. For empirical evaluation, we collect a new dataset of 4D effect videos where most of the videos consist of multiple shots. Our extensive experiments show that the proposed method consistently outperforms DNNs without considering multi-shot aspect by up to 8.8% in terms of mean average precision.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A 4D effect video played at cinema or other designated places is a video annotated with physical effects such as motion, vibration, wind, flashlight, water spray, and scent. In order to automate the time-consuming and labor-intensive process of creating such videos, we propose a new method to classify videos into 4D effect types with shot-aware frame selection and deep neural networks (DNNs). Shot-aware frame selection is a process of selecting video frames across multiple shots based on the shot length ratios to subsample every video down to a fixed number of frames for classification. For empirical evaluation, we collect a new dataset of 4D effect videos where most of the videos consist of multiple shots. Our extensive experiments show that the proposed method consistently outperforms DNNs without considering multi-shot aspect by up to 8.8% in terms of mean average precision.", "fno": "1034b148", "keywords": [ "Motion Pictures", "Three Dimensional Displays", "Vibrations", "Visualization", "Two Dimensional Displays", "Neural Networks" ], "authors": [ { "affiliation": null, "fullName": "Thomhert S. Siadari", "givenName": "Thomhert S.", "surname": "Siadari", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mikyong Han", "givenName": "Mikyong", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hyunjin Yoon", "givenName": "Hyunjin", "surname": "Yoon", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "1148-1155", "year": "2017", "issn": "2473-9944", "isbn": "978-1-5386-1034-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1034b140", "articleId": "12OmNyvoXjj", "__typename": "AdjacentArticleType" }, "next": { "fno": "1034b156", "articleId": "12OmNARRYfl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iih-msp/2007/2994/2/29940539", "title": "Shot Segmentation and Classification in Basketball Videos", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2007/29940539/12OmNB0nWeK", "parentPublication": { "id": "proceedings/iih-msp/2007/2994/2", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2017/2937/0/2937a583", "title": "A Fast Video Shot Boundary Detection Employing OTSU’s Method and Dual Pauta Criterion", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a583/12OmNqIQS6h", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2011/1101/0/06126284", "title": "Automatic construction of an action video shot database using web videos", "doi": null, "abstractUrl": "/proceedings-article/iccv/2011/06126284/12OmNvkpl1Y", "parentPublication": { "id": "proceedings/iccv/2011/1101/0", "title": "2011 IEEE International Conference on Computer Vision (ICCV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2010/4062/0/4062a312", "title": "Dissolve Detection Based Shot Identification Using Singular Value Decomposition", "doi": null, "abstractUrl": "/proceedings-article/ams/2010/4062a312/12OmNz61d1z", "parentPublication": { "id": "proceedings/ams/2010/4062/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2018/6909/0/690901a049", "title": "Graph-Based User Interface for Digest Video Creation Focusing on Specific Persons", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2018/690901a049/13bd1eOELLi", "parentPublication": { "id": "proceedings/nicoint/2018/6909/0", "title": "2018 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546119", "title": "Shot Level Egocentric Video Co-summarization", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546119/17D45WKWnJe", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0422", "title": "U4D: Unsupervised 4D Dynamic Scene Understanding", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0422/1hQqutyasIU", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a166", "title": "Landmarks-assisted Collaborative Deep Framework for Automatic 4D Facial Expression Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a166/1kecHYD1alq", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2591", "title": "Multi-shot Temporal Event Localization: a Benchmark", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2591/1yeKfyamWzK", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4199", "title": "Point 4D Transformer Networks for Spatio-Temporal Modeling in Point Cloud Videos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4199/1yeKopG5aHm", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XvMcaC", "doi": "10.1109/CVPR.2018.00775", "title": "Now You Shake Me: Towards Automatic 4D Cinema", "normalizedTitle": "Now You Shake Me: Towards Automatic 4D Cinema", "abstract": "We are interested in enabling automatic 4D cinema by parsing physical and special effects from untrimmed movies. These include effects such as physical interactions, water splashing, light, and shaking, and are grounded to either a character in the scene or the camera. We collect a new dataset referred to as the Movie4D dataset which annotates over 9K effects in 63 movies. We propose a Conditional Random Field model atop a neural network that brings together visual and audio information, as well as semantics in the form of person tracks. Our model further exploits correlations of effects between different characters in the clip as well as across movie threads. We propose effect detection and classification as two tasks, and present results along with ablation studies on our dataset, paving the way towards 4D cinema in everyone's homes.", "abstracts": [ { "abstractType": "Regular", "content": "We are interested in enabling automatic 4D cinema by parsing physical and special effects from untrimmed movies. These include effects such as physical interactions, water splashing, light, and shaking, and are grounded to either a character in the scene or the camera. We collect a new dataset referred to as the Movie4D dataset which annotates over 9K effects in 63 movies. We propose a Conditional Random Field model atop a neural network that brings together visual and audio information, as well as semantics in the form of person tracks. Our model further exploits correlations of effects between different characters in the clip as well as across movie threads. We propose effect detection and classification as two tasks, and present results along with ablation studies on our dataset, paving the way towards 4D cinema in everyone's homes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are interested in enabling automatic 4D cinema by parsing physical and special effects from untrimmed movies. These include effects such as physical interactions, water splashing, light, and shaking, and are grounded to either a character in the scene or the camera. We collect a new dataset referred to as the Movie4D dataset which annotates over 9K effects in 63 movies. We propose a Conditional Random Field model atop a neural network that brings together visual and audio information, as well as semantics in the form of person tracks. Our model further exploits correlations of effects between different characters in the clip as well as across movie threads. We propose effect detection and classification as two tasks, and present results along with ablation studies on our dataset, paving the way towards 4D cinema in everyone's homes.", "fno": "642000h425", "keywords": [ "Audio Signal Processing", "Cameras", "Cinematography", "Feature Extraction", "Image Classification", "Image Sequences", "Neural Nets", "Video Signal Processing", "Automatic 4 D Cinema", "Untrimmed Movies", "Physical Interactions", "Water Splashing", "Shaking", "Visual Information", "Audio Information", "Movie Threads", "Classification", "Random Field Model", "Light", "Camera", "Movie 4 D Dataset", "Neural Network", "Motion Pictures", "Wind", "Cameras", "Task Analysis", "Gravity", "Visualization" ], "authors": [ { "affiliation": null, "fullName": "Yuhao Zhoul", "givenName": "Yuhao", "surname": "Zhoul", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Makarand Tapaswi", "givenName": "Makarand", "surname": "Tapaswi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sanja Fidler", "givenName": "Sanja", "surname": "Fidler", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "7425-7434", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000h415", "articleId": "17D45Xtvpau", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000h435", "articleId": "17D45XwUALC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wsc/1990/72/0/00129499", "title": "Computer animation with Cinema", "doi": null, "abstractUrl": "/proceedings-article/wsc/1990/00129499/12OmNBhZ4fW", "parentPublication": { "id": "proceedings/wsc/1990/72/0", "title": "1990 Winter Simulation Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607537", "title": "Comparison between JPEG2000 and H.264 for digital cinema", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607537/12OmNqzcvCk", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1994/2109/0/00717223", "title": "Introduction to SIMAN/Cinema", "doi": null, "abstractUrl": "/proceedings-article/wsc/1994/00717223/12OmNs4S8xV", "parentPublication": { "id": "proceedings/wsc/1994/2109/0", "title": "Proceedings of Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2011/9222/0/05772390", "title": "Streaming Media with Sensory Effect", "doi": null, "abstractUrl": "/proceedings-article/icisa/2011/05772390/12OmNvsm6B8", "parentPublication": { "id": "proceedings/icisa/2011/9222/0", "title": "2011 International Conference on Information Science and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034b148", "title": "4D Effect Video Classification with Shot-Aware Frame Selection and Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b148/12OmNxu6p8h", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsia/2017/2198/0/08339086", "title": "High-dimensional scientific data exploration via cinema", "doi": null, "abstractUrl": "/proceedings-article/dsia/2017/08339086/12OmNxymoc7", "parentPublication": { "id": "proceedings/dsia/2017/2198/0", "title": "2017 IEEE Workshop on Data Systems for Interactive Analysis (DSIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1991/0181/0/00185604", "title": "Computer animation with CINEMA", "doi": null, "abstractUrl": "/proceedings-article/wsc/1991/00185604/12OmNybfr3l", "parentPublication": { "id": "proceedings/wsc/1991/0181/0", "title": "1991 Winter Simulation Conference Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352357", "title": "Motion Effects Synthesis for 4D Films", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352357/13rRUwInv4s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/05/mit2014050050", "title": "Cinema Cloud: An Enabling Technology for the Movie Industry", "doi": null, "abstractUrl": "/magazine/it/2014/05/mit2014050050/13rRUwdrdMA", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940178", "title": "The Research of Seat Differential Pricing in Cinema", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940178/1gjRKHDbBIc", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tuAeQeDJja", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tuAj8UMqVa", "doi": "10.1109/VR50410.2021.00093", "title": "Camera Space Synthesis of Motion Effects Emphasizing a Moving Object in 4D films", "normalizedTitle": "Camera Space Synthesis of Motion Effects Emphasizing a Moving Object in 4D films", "abstract": "Four-dimensional (4D) films, which provide special physical effects to the audience with audiovisual stimuli, are gaining more popularity and acceptance. One of the most frequent 4D effects is the object-based motion effect, which refers to the vestibular stimulus generated by a motion chair to emphasize a moving object of interest, e.g., the flying iron man, displayed on the screen. In this paper, we present an algorithm for synthesizing convincing object-based motion effects automatically from a given object motion trajectory. While previous approaches use the 2D object position on the screen as input, our method takes the 3D position and orientation of the object in the camera space and computes its motion proxy that reflects both the object translation and rotation, as well as its size to the viewers' eyes. The proxy is determined based on the results of a perceptual experiment that presents an optimal additive rule of the translation and rotation information scaled by the object's visual size. The motion proxy is fed to a motion cueing algorithm (MCA) that computes the command using a washout filter or model predictive control. The most appropriate MCA for our purpose is selected from six candidates by a user study. We also consider the effects of visual perception by incorporating two types of motion field equations into the computation of the visually perceived velocity. The results of a user study indicate that our algorithm can generate compelling object-based motion effects that better enhance the 4D film viewing experience than the previous methods.", "abstracts": [ { "abstractType": "Regular", "content": "Four-dimensional (4D) films, which provide special physical effects to the audience with audiovisual stimuli, are gaining more popularity and acceptance. One of the most frequent 4D effects is the object-based motion effect, which refers to the vestibular stimulus generated by a motion chair to emphasize a moving object of interest, e.g., the flying iron man, displayed on the screen. In this paper, we present an algorithm for synthesizing convincing object-based motion effects automatically from a given object motion trajectory. While previous approaches use the 2D object position on the screen as input, our method takes the 3D position and orientation of the object in the camera space and computes its motion proxy that reflects both the object translation and rotation, as well as its size to the viewers' eyes. The proxy is determined based on the results of a perceptual experiment that presents an optimal additive rule of the translation and rotation information scaled by the object's visual size. The motion proxy is fed to a motion cueing algorithm (MCA) that computes the command using a washout filter or model predictive control. The most appropriate MCA for our purpose is selected from six candidates by a user study. We also consider the effects of visual perception by incorporating two types of motion field equations into the computation of the visually perceived velocity. The results of a user study indicate that our algorithm can generate compelling object-based motion effects that better enhance the 4D film viewing experience than the previous methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Four-dimensional (4D) films, which provide special physical effects to the audience with audiovisual stimuli, are gaining more popularity and acceptance. One of the most frequent 4D effects is the object-based motion effect, which refers to the vestibular stimulus generated by a motion chair to emphasize a moving object of interest, e.g., the flying iron man, displayed on the screen. In this paper, we present an algorithm for synthesizing convincing object-based motion effects automatically from a given object motion trajectory. While previous approaches use the 2D object position on the screen as input, our method takes the 3D position and orientation of the object in the camera space and computes its motion proxy that reflects both the object translation and rotation, as well as its size to the viewers' eyes. The proxy is determined based on the results of a perceptual experiment that presents an optimal additive rule of the translation and rotation information scaled by the object's visual size. The motion proxy is fed to a motion cueing algorithm (MCA) that computes the command using a washout filter or model predictive control. The most appropriate MCA for our purpose is selected from six candidates by a user study. We also consider the effects of visual perception by incorporating two types of motion field equations into the computation of the visually perceived velocity. The results of a user study indicate that our algorithm can generate compelling object-based motion effects that better enhance the 4D film viewing experience than the previous methods.", "fno": "255600a670", "keywords": [ "Cameras", "Computer Animation", "Image Motion Analysis", "Motion Control", "Motion Estimation", "Neurophysiology", "Object Detection", "Predictive Control", "Visual Perception", "Convincing Object Based Motion Effects", "Given Object Motion Trajectory", "Motion Proxy", "Object Translation", "Rotation Information", "Motion Cueing Algorithm", "Motion Field Equations", "Compelling Object Based Motion Effects", "4 D Film Viewing Experience", "Camera Space Synthesis", "Moving Object", "Four Dimensional Films", "Special Physical Effects", "Object Based Motion Effect", "Motion Chair", "Flying Iron Man", "Visualization", "Three Dimensional Displays", "Films", "Virtual Reality", "User Interfaces", "Cameras", "Prediction Algorithms", "Information Systems Information Systems Applications Multimedia Information Systems Multimedia Content Creation", "Computing Methodologies Computer Graphics Graphics Systems And Interfaces Virtual Reality" ], "authors": [ { "affiliation": "POSTECH", "fullName": "Sangyoon Han", "givenName": "Sangyoon", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "POSTECH", "fullName": "Gyeore Yun", "givenName": "Gyeore", "surname": "Yun", "__typename": "ArticleAuthorType" }, { "affiliation": "POSTECH", "fullName": "Seungmoon Choi", "givenName": "Seungmoon", "surname": "Choi", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "670-678", "year": "2021", "issn": null, "isbn": "978-1-6654-1838-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1tuAiyfYgqA", "name": "pvr202118380-09417709s1-mm_255600a670.zip", "size": "108 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvr202118380-09417709s1-mm_255600a670.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "255600a661", "articleId": "1tuAHSFJomA", "__typename": "AdjacentArticleType" }, "next": { "fno": "255600a679", "articleId": "1tuAQT1z2EM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/advcomp/2009/3829/0/3829a083", "title": "Improvement of Link Process in 4D CAD Viewer by Using Interface Board for Construction Project Management", "doi": null, "abstractUrl": "/proceedings-article/advcomp/2009/3829a083/12OmNB836FQ", "parentPublication": { "id": "proceedings/advcomp/2009/3829/0", "title": "Advanced Engineering Computing and Applications in Sciences, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402554", "title": "Interactive 4D overview and detail visualization in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402554/12OmNy3iFjC", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2004/2128/2/212820245", "title": "Reconstructing a Dynamic Surface from Video Sequences Using Graph Cuts in 4D Space-Time", "doi": null, "abstractUrl": "/proceedings-article/icpr/2004/212820245/12OmNybfr6E", "parentPublication": { "id": "proceedings/icpr/2004/2128/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352357", "title": "Motion Effects Synthesis for 4D Films", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352357/13rRUwInv4s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2015/04/07124506", "title": "Direct Visuo-Haptic 4D Volume Rendering Using Respiratory Motion Models", "doi": null, "abstractUrl": "/journal/th/2015/04/07124506/13rRUwInvfi", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1688", "title": "Shadow-Driven 4D Haptic Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1688/13rRUwcAqq9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/05/ttg2013050762", "title": "Interactive Animation of 4D Performance Capture", "doi": null, "abstractUrl": "/journal/tg/2013/05/ttg2013050762/13rRUxOve9H", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5415", "title": "4D-Net for Learned Multi-Modal Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5415/1BmGClB4XVS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0981", "title": "HOI4D: A 4D Egocentric Dataset for Category-Level Human-Object Interaction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0981/1H0L2NJvjsQ", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900f336", "title": "Learning Compositional Representation for 4D Captures with Neural ODE", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900f336/1yeIAJRzfOg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwCJOY5", "title": "2015 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNCctfp7", "doi": "10.1109/BigData.2015.7364110", "title": "Modeling the learning behaviors of massive open online courses", "normalizedTitle": "Modeling the learning behaviors of massive open online courses", "abstract": "With the help of Internet, Massive Open Online Courses (MOOC) are recognized as a new path to learn courses via the web instead of in the traditional classrooms. MOOC can break many limits such as distance, time, participants, on the traditional courses. At the same time, it brings some new issues, such as high drop out ratio. Nowadays increasing MOOC courses are available and even more common people are involved into this kind of new learning procedure. How to evaluate the learning behaviors of MOOC is still an open problem. We propose an efficient algorithm to cluster the MOOC learning events into many closely related sets and name such set as LES (Learning Events Set) to model one basic learning procedure on MOOC. The quality of LES is highly dependent on the maximum time period Tmax between two LESes. We systematically investigate this problem and propose an efficient method to set the value of Tmax. Our method has been employed into one MOOC platform, XuetangX and the experimental results demonstrate that our method can really work.", "abstracts": [ { "abstractType": "Regular", "content": "With the help of Internet, Massive Open Online Courses (MOOC) are recognized as a new path to learn courses via the web instead of in the traditional classrooms. MOOC can break many limits such as distance, time, participants, on the traditional courses. At the same time, it brings some new issues, such as high drop out ratio. Nowadays increasing MOOC courses are available and even more common people are involved into this kind of new learning procedure. How to evaluate the learning behaviors of MOOC is still an open problem. We propose an efficient algorithm to cluster the MOOC learning events into many closely related sets and name such set as LES (Learning Events Set) to model one basic learning procedure on MOOC. The quality of LES is highly dependent on the maximum time period Tmax between two LESes. We systematically investigate this problem and propose an efficient method to set the value of Tmax. Our method has been employed into one MOOC platform, XuetangX and the experimental results demonstrate that our method can really work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the help of Internet, Massive Open Online Courses (MOOC) are recognized as a new path to learn courses via the web instead of in the traditional classrooms. MOOC can break many limits such as distance, time, participants, on the traditional courses. At the same time, it brings some new issues, such as high drop out ratio. Nowadays increasing MOOC courses are available and even more common people are involved into this kind of new learning procedure. How to evaluate the learning behaviors of MOOC is still an open problem. We propose an efficient algorithm to cluster the MOOC learning events into many closely related sets and name such set as LES (Learning Events Set) to model one basic learning procedure on MOOC. The quality of LES is highly dependent on the maximum time period Tmax between two LESes. We systematically investigate this problem and propose an efficient method to set the value of Tmax. Our method has been employed into one MOOC platform, XuetangX and the experimental results demonstrate that our method can really work.", "fno": "07364110", "keywords": [ "Education", "Conferences", "Big Data", "Data Models", "Internet", "Clustering Algorithms", "Time Frequency Analysis", "Statistical Analysis", "MOOC", "Learning Behavior Pattern", "Learning Events Set" ], "authors": [ { "affiliation": "Tsinghua National Laboratory for information Science and Technology, Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", "fullName": "Zhenhui Liu", "givenName": "Zhenhui", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua National Laboratory for information Science and Technology, Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", "fullName": "Jingjing He", "givenName": "Jingjing", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua National Laboratory for information Science and Technology, Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", "fullName": "Yufei Xue", "givenName": "Yufei", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, Tsinghua University, 100084, Beijing, China", "fullName": "Zhenzhong Huang", "givenName": "Zhenzhong", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, Tsinghua University, 100084, Beijing, China", "fullName": "Manli Li", "givenName": "Manli", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua National Laboratory for information Science and Technology, Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", "fullName": "Zhihui Du", "givenName": "Zhihui", "surname": "Du", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "2883-2885", "year": "2015", "issn": null, "isbn": "978-1-4799-9926-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07364109", "articleId": "12OmNAOsMGO", "__typename": "AdjacentArticleType" }, "next": { "fno": "07364111", "articleId": "12OmNyp9MgQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156373", "title": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156373/12OmNxEBzlW", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a231", "title": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a231/12OmNyUWQXF", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a124", "title": "Determinants of Acceptance of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a124/12OmNyYm2yu", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477163", "title": "ViSeq: Visual Analytics of Learning Sequence in Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477163/14gwrq0I1sk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718478", "title": "Measuring The Success of Massive Open Online Courses: A Mixed-Method Case Study", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718478/1BogRZX0tSE", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155902", "title": "Success Indicators for Massive Open Online Courses (MOOCs)", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155902/1m1j5K80m8U", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2020/1560/0/156000a377", "title": "Understanding Learners Behavior in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/clei/2020/156000a377/1uOu1PlxAu4", "parentPublication": { "id": "proceedings/clei/2020/1560/0", "title": "2020 XLVI Latin American Computing Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2021/6834/0/683400a248", "title": "The Impact of Massive Open Online Courses Globalization on the Educational Equity", "doi": null, "abstractUrl": "/proceedings-article/icekim/2021/683400a248/1vmLAmZDdHa", "parentPublication": { "id": "proceedings/icekim/2021/6834/0", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2021/2663/0/266300a080", "title": "AI Education in Massive Open Online Courses: A Content Analysis", "doi": null, "abstractUrl": "/proceedings-article/cste/2021/266300a080/1wG5OLo4zsI", "parentPublication": { "id": "proceedings/cste/2021/2663/0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEBzlW", "doi": "10.1109/PACIFICVIS.2015.7156373", "title": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "normalizedTitle": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "abstract": "Massive Open Online Courses (MOOCs) platforms are becoming increasingly popular in recent years. With thousands of students watching course videos, enormous amounts of clickstream data are produced and recorded by the MOOCs platforms for each course. Such large-scale data provide a great opportunity for instructors and educational analysts to gain insight into online learning behaviors on an unprecedented scale. Nevertheless, the growing scale and unique characteristics of the data also pose a special challenge for effective data analysis. In this paper, we introduce VisMOOC, a visual analytic system to help analyze user learning behaviors by using video clickstream data from MOOC platforms. We work closely with the instructors of two Coursera courses to understand the data and collect task analysis requirements. A complete user-centered design process is further employed to design and develop VisMOOC. It includes three main linked views: the List View to show an overview of the clickstream differences among course videos, the Content-based View to show temporal variations in the total number of each type of click action along the video timeline, the Dashboard View to show various statistical information such as demographic information and temporal information. We conduct two case studies with the instructors to demonstrate the usefulness of VisMOOC and discuss new findings on learning behaviors.", "abstracts": [ { "abstractType": "Regular", "content": "Massive Open Online Courses (MOOCs) platforms are becoming increasingly popular in recent years. With thousands of students watching course videos, enormous amounts of clickstream data are produced and recorded by the MOOCs platforms for each course. Such large-scale data provide a great opportunity for instructors and educational analysts to gain insight into online learning behaviors on an unprecedented scale. Nevertheless, the growing scale and unique characteristics of the data also pose a special challenge for effective data analysis. In this paper, we introduce VisMOOC, a visual analytic system to help analyze user learning behaviors by using video clickstream data from MOOC platforms. We work closely with the instructors of two Coursera courses to understand the data and collect task analysis requirements. A complete user-centered design process is further employed to design and develop VisMOOC. It includes three main linked views: the List View to show an overview of the clickstream differences among course videos, the Content-based View to show temporal variations in the total number of each type of click action along the video timeline, the Dashboard View to show various statistical information such as demographic information and temporal information. We conduct two case studies with the instructors to demonstrate the usefulness of VisMOOC and discuss new findings on learning behaviors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Massive Open Online Courses (MOOCs) platforms are becoming increasingly popular in recent years. With thousands of students watching course videos, enormous amounts of clickstream data are produced and recorded by the MOOCs platforms for each course. Such large-scale data provide a great opportunity for instructors and educational analysts to gain insight into online learning behaviors on an unprecedented scale. Nevertheless, the growing scale and unique characteristics of the data also pose a special challenge for effective data analysis. In this paper, we introduce VisMOOC, a visual analytic system to help analyze user learning behaviors by using video clickstream data from MOOC platforms. We work closely with the instructors of two Coursera courses to understand the data and collect task analysis requirements. A complete user-centered design process is further employed to design and develop VisMOOC. It includes three main linked views: the List View to show an overview of the clickstream differences among course videos, the Content-based View to show temporal variations in the total number of each type of click action along the video timeline, the Dashboard View to show various statistical information such as demographic information and temporal information. We conduct two case studies with the instructors to demonstrate the usefulness of VisMOOC and discuss new findings on learning behaviors.", "fno": "07156373", "keywords": [ "Streaming Media", "Data Visualization", "Education", "Image Color Analysis", "Interviews", "Visual Analytics" ], "authors": [ { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Conglei Shi", "givenName": null, "surname": "Conglei Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Siwei Fu", "givenName": null, "surname": "Siwei Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Qing Chen", "givenName": null, "surname": "Qing Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Huamin Qu", "givenName": null, "surname": "Huamin Qu", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "159-166", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156372", "articleId": "12OmNwkzulc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07156374", "articleId": "12OmNzxgHpT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2017/5920/0/08190588", "title": "Massive open online courses in software engineering education", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190588/12OmNwcUk0n", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042528", "title": "VisMOOC: Visualizing video clickstream data from massive open online courses", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042528/12OmNx2QUE2", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752262", "title": "An analysis of student behavior in two massive open online courses", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752262/12OmNxGja7v", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2017/0629/0/0629a293", "title": "Gamification in Massive Open Online Courses (MOOCs) to Support Chinese Language Learning", "doi": null, "abstractUrl": "/proceedings-article/eitt/2017/0629a293/12OmNzRZq1l", "parentPublication": { "id": "proceedings/eitt/2017/0629/0", "title": "2017 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883517", "title": "DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883517/12OmNzZmZrv", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477163", "title": "ViSeq: Visual Analytics of Learning Sequence in Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477163/14gwrq0I1sk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ict4m/2018/7525/0/752500a249", "title": "Massive Open Online Courses (MOOCs) and Their Effect on Learners' Motivation", "doi": null, "abstractUrl": "/proceedings-article/ict4m/2018/752500a249/17D45Xq6dB3", "parentPublication": { "id": "proceedings/ict4m/2018/7525/0", "title": "2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659120", "title": "Massive Open Online Courses on Web Development Education: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659120/18j95uU8are", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2020/1560/0/156000a377", "title": "Understanding Learners Behavior in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/clei/2020/156000a377/1uOu1PlxAu4", "parentPublication": { "id": "proceedings/clei/2020/1560/0", "title": "2020 XLVI Latin American Computing Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Tm", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUWQXF", "doi": "10.1109/ICTAI.2017.00045", "title": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "normalizedTitle": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "abstract": "Massive Open Online Courses (MOOCs) are attracting the attention of people all over the world. Regardless the platform, numbers of registrants for online courses are impressive but in the same time, completion rates are disappointing. Understanding the mechanisms of dropping out based on the learner profile arises as a crucial task in MOOCs, since it will allow intervening at the right moment in order to assist the learner in completing the course. In this paper, the dropout behaviour of learners in a MOOC is thoroughly studied by first extracting features that describe the behavior of learners within the course and then by comparing three classifiers (Logistic Regression, Random Forest and AdaBoost) in two tasks: predicting which users will have dropped out by a certain week and predicting which users will drop out on a specific week. The former has showed to be considerably easier, with all three classifiers performing equally well. However, the accuracy for the second task is lower, and Logistic Regression tends to perform slightly better than the other two algorithms. We found that features that reflect an active attitude of the user towards the MOOC, such as submitting their assignment, posting on the Forum and filling their Profile, are strong indicators of persistence.", "abstracts": [ { "abstractType": "Regular", "content": "Massive Open Online Courses (MOOCs) are attracting the attention of people all over the world. Regardless the platform, numbers of registrants for online courses are impressive but in the same time, completion rates are disappointing. Understanding the mechanisms of dropping out based on the learner profile arises as a crucial task in MOOCs, since it will allow intervening at the right moment in order to assist the learner in completing the course. In this paper, the dropout behaviour of learners in a MOOC is thoroughly studied by first extracting features that describe the behavior of learners within the course and then by comparing three classifiers (Logistic Regression, Random Forest and AdaBoost) in two tasks: predicting which users will have dropped out by a certain week and predicting which users will drop out on a specific week. The former has showed to be considerably easier, with all three classifiers performing equally well. However, the accuracy for the second task is lower, and Logistic Regression tends to perform slightly better than the other two algorithms. We found that features that reflect an active attitude of the user towards the MOOC, such as submitting their assignment, posting on the Forum and filling their Profile, are strong indicators of persistence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Massive Open Online Courses (MOOCs) are attracting the attention of people all over the world. Regardless the platform, numbers of registrants for online courses are impressive but in the same time, completion rates are disappointing. Understanding the mechanisms of dropping out based on the learner profile arises as a crucial task in MOOCs, since it will allow intervening at the right moment in order to assist the learner in completing the course. In this paper, the dropout behaviour of learners in a MOOC is thoroughly studied by first extracting features that describe the behavior of learners within the course and then by comparing three classifiers (Logistic Regression, Random Forest and AdaBoost) in two tasks: predicting which users will have dropped out by a certain week and predicting which users will drop out on a specific week. The former has showed to be considerably easier, with all three classifiers performing equally well. However, the accuracy for the second task is lower, and Logistic Regression tends to perform slightly better than the other two algorithms. We found that features that reflect an active attitude of the user towards the MOOC, such as submitting their assignment, posting on the Forum and filling their Profile, are strong indicators of persistence.", "fno": "387601a231", "keywords": [ "Computer Aided Instruction", "Educational Administrative Data Processing", "Educational Courses", "Educational Institutions", "Feature Extraction", "Pattern Classification", "Regression Analysis", "Logistic Regression", "MOOC", "Massive Open Online Courses Temporal Profiling", "Dropout Prediction", "Feature Extraction", "Random Forest", "Ada Boost", "Feature Extraction", "Logistics", "Prediction Algorithms", "Forestry", "Education", "Task Analysis", "Machine Learning", "Massive Open Online Courses", "Imbalanced Classification", "Temporal Dropout Prediction" ], "authors": [ { "affiliation": null, "fullName": "Tom Rolandus Hagedoorn", "givenName": "Tom", "surname": "Rolandus Hagedoorn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gerasimos Spanakis", "givenName": "Gerasimos", "surname": "Spanakis", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "231-238", "year": "2017", "issn": "2375-0197", "isbn": "978-1-5386-3876-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "387601a223", "articleId": "12OmNAP1Z0P", "__typename": "AdjacentArticleType" }, "next": { "fno": "387601a239", "articleId": "12OmNBqMDCI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2015/8493/0/8493a256", "title": "Temporal Models for Predicting Student Dropout in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a256/12OmNBhpS96", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190588", "title": "Massive open online courses in software engineering education", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190588/12OmNwcUk0n", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a124", "title": "Determinants of Acceptance of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a124/12OmNyYm2yu", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883517", "title": "DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883517/12OmNzZmZrv", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477163", "title": "ViSeq: Visual Analytics of Learning Sequence in Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477163/14gwrq0I1sk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718478", "title": "Measuring The Success of Massive Open Online Courses: A Mixed-Method Case Study", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718478/1BogRZX0tSE", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2020/5882/0/09096670", "title": "Workshop: Evaluation Strategies and Metrics for Massive Open Online Courses (MOOCs)", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2020/09096670/1l6SCYmusFO", "parentPublication": { "id": "proceedings/icedeg/2020/5882/0", "title": "2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155902", "title": "Success Indicators for Massive Open Online Courses (MOOCs)", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155902/1m1j5K80m8U", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2020/1560/0/156000a377", "title": "Understanding Learners Behavior in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/clei/2020/156000a377/1uOu1PlxAu4", "parentPublication": { "id": "proceedings/clei/2020/1560/0", "title": "2020 XLVI Latin American Computing Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2021/2663/0/266300a080", "title": "AI Education in Massive Open Online Courses: A Content Analysis", "doi": null, "abstractUrl": "/proceedings-article/cste/2021/266300a080/1wG5OLo4zsI", "parentPublication": { "id": "proceedings/cste/2021/2663/0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrMHOdd", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZmZrv", "doi": "10.1109/VAST.2016.7883517", "title": "DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction", "normalizedTitle": "DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction", "abstract": "Aiming at massive participation and open access education, Massive Open Online Courses (MOOCs) have attracted millions of learners over the past few years. However, the high dropout rate of learners is considered to be one of the most crucial factors that may hinder the development of MOOCs. To tackle this problem, statistical models have been developed to predict dropout behavior based on learner activity logs. Although predictive models can foresee the dropout behavior, it is still difficult for users to understand the reasons behind the predicted results and further design interventions to prevent dropout. In addition, with a better understanding of dropout, researchers in the area of predictive modeling in turn can improve the models. In this paper, we introduce DropoutSeer, a visual analytics system which not only helps instructors and education experts understand the reasons for dropout, but also allows researchers to identify crucial features which can further improve the performance of the models. Both the heterogeneous data extracted from three different kinds of learner activity logs (i.e., clickstream, forum posts and assignment records) and the predicted results are visualized in the proposed system. Case studies and expert interviews have been conducted to demonstrate the usefulness and effectiveness of DropoutSeer.", "abstracts": [ { "abstractType": "Regular", "content": "Aiming at massive participation and open access education, Massive Open Online Courses (MOOCs) have attracted millions of learners over the past few years. However, the high dropout rate of learners is considered to be one of the most crucial factors that may hinder the development of MOOCs. To tackle this problem, statistical models have been developed to predict dropout behavior based on learner activity logs. Although predictive models can foresee the dropout behavior, it is still difficult for users to understand the reasons behind the predicted results and further design interventions to prevent dropout. In addition, with a better understanding of dropout, researchers in the area of predictive modeling in turn can improve the models. In this paper, we introduce DropoutSeer, a visual analytics system which not only helps instructors and education experts understand the reasons for dropout, but also allows researchers to identify crucial features which can further improve the performance of the models. Both the heterogeneous data extracted from three different kinds of learner activity logs (i.e., clickstream, forum posts and assignment records) and the predicted results are visualized in the proposed system. Case studies and expert interviews have been conducted to demonstrate the usefulness and effectiveness of DropoutSeer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aiming at massive participation and open access education, Massive Open Online Courses (MOOCs) have attracted millions of learners over the past few years. However, the high dropout rate of learners is considered to be one of the most crucial factors that may hinder the development of MOOCs. To tackle this problem, statistical models have been developed to predict dropout behavior based on learner activity logs. Although predictive models can foresee the dropout behavior, it is still difficult for users to understand the reasons behind the predicted results and further design interventions to prevent dropout. In addition, with a better understanding of dropout, researchers in the area of predictive modeling in turn can improve the models. In this paper, we introduce DropoutSeer, a visual analytics system which not only helps instructors and education experts understand the reasons for dropout, but also allows researchers to identify crucial features which can further improve the performance of the models. Both the heterogeneous data extracted from three different kinds of learner activity logs (i.e., clickstream, forum posts and assignment records) and the predicted results are visualized in the proposed system. Case studies and expert interviews have been conducted to demonstrate the usefulness and effectiveness of DropoutSeer.", "fno": "07883517", "keywords": [ "Data Visualization", "Predictive Models", "Data Models", "Feature Extraction", "Education", "Visual Analytics", "Design Studies", "Visualization In Education", "Machine Learning", "Time Series Data" ], "authors": [ { "affiliation": "Hong Kong University of Science and Technology, China", "fullName": "Yuanzhe Chen", "givenName": "Yuanzhe", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology, China", "fullName": "Qing Chen", "givenName": "Qing", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology, China", "fullName": "Mingqian Zhao", "givenName": null, "surname": "Mingqian Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Massachusetts Institute of Technology, United States of America", "fullName": "Sebastien Boyer", "givenName": "Sebastien", "surname": "Boyer", "__typename": "ArticleAuthorType" }, { "affiliation": "Massachusetts Institute of Technology, United States of America", "fullName": "Kalyan Veeramachaneni", "givenName": "Kalyan", "surname": "Veeramachaneni", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology, China", "fullName": "Huamin Qu", "givenName": "Huamin", "surname": "Qu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "111-120", "year": "2016", "issn": null, "isbn": "978-1-5090-5661-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07883516", "articleId": "12OmNwnH4T4", "__typename": "AdjacentArticleType" }, "next": { "fno": "07883518", "articleId": "12OmNyRg4mj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2015/8493/0/8493a256", "title": "Temporal Models for Predicting Student Dropout in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a256/12OmNBhpS96", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156373", "title": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156373/12OmNxEBzlW", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a440", "title": "Big Data Application in Education: Dropout Prediction in Edx MOOCs", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a440/12OmNy6qfRl", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a231", "title": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a231/12OmNyUWQXF", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477163", "title": "ViSeq: Visual Analytics of Learning Sequence in Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477163/14gwrq0I1sk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2022/8188/0/818800a178", "title": "A Hybrid Deep Learning Model for MOOCs Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/cste/2022/818800a178/1J7VZ2Kv7Py", "parentPublication": { "id": "proceedings/cste/2022/8188/0", "title": "2022 4th International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2022/5537/0/553700a562", "title": "EDPS: Early Dropout Prediction System of MOOC Courses", "doi": null, "abstractUrl": "/proceedings-article/apsec/2022/553700a562/1KOv8nTGZX2", "parentPublication": { "id": "proceedings/apsec/2022/5537/0", "title": "2022 29th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2020/8448/0/844800a197", "title": "MOOCs Dropout Prediction Based on Hybrid Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2020/844800a197/1qJueDar7TG", "parentPublication": { "id": "proceedings/cyberc/2020/8448/0", "title": "2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378001", "title": "ONet &#x2013; A Temporal Meta Embedding Network for MOOC Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378001/1s64TcQUhJm", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxQOjzV", "title": "2014 IEEE International Symposium on Multimedia (ISM)", "acronym": "ism", "groupId": "1001094", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzuIjtK", "doi": "10.1109/ISM.2014.51", "title": "Learning Analytics in Linked Open Online Courses", "normalizedTitle": "Learning Analytics in Linked Open Online Courses", "abstract": "Learning offerings and learners' activities are increasingly moving to decentralized learning environments in the cloud. The advent of MOOC platforms gives a good example for this ongoing evolution. However, most learning applications use proprietary data models. As learners nowadays not only use only one e-learning offering, the analysis of learner activities is challenging in such decentralized and heterogeneous learning environments. To address this problem, we present three different learning applications and show the potential of exploiting Semantic Web technologies.", "abstracts": [ { "abstractType": "Regular", "content": "Learning offerings and learners' activities are increasingly moving to decentralized learning environments in the cloud. The advent of MOOC platforms gives a good example for this ongoing evolution. However, most learning applications use proprietary data models. As learners nowadays not only use only one e-learning offering, the analysis of learner activities is challenging in such decentralized and heterogeneous learning environments. To address this problem, we present three different learning applications and show the potential of exploiting Semantic Web technologies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Learning offerings and learners' activities are increasingly moving to decentralized learning environments in the cloud. The advent of MOOC platforms gives a good example for this ongoing evolution. However, most learning applications use proprietary data models. As learners nowadays not only use only one e-learning offering, the analysis of learner activities is challenging in such decentralized and heterogeneous learning environments. To address this problem, we present three different learning applications and show the potential of exploiting Semantic Web technologies.", "fno": "4311a369", "keywords": [ "Ontologies", "Semantic Web", "Interoperability", "Discussion Forums", "Data Models", "Electronic Learning", "Distributed Databases", "Interoperability", "Learning Analytics", "Semantic Web", "Lecture Recording", "Ontology" ], "authors": [ { "affiliation": null, "fullName": "Kai Michael Hover", "givenName": "Kai Michael", "surname": "Hover", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Max Muhlhauser", "givenName": "Max", "surname": "Muhlhauser", "__typename": "ArticleAuthorType" } ], "idPrefix": "ism", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "369-374", "year": "2014", "issn": null, "isbn": "978-1-4799-4311-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4311a363", "articleId": "12OmNqJ8toK", "__typename": "AdjacentArticleType" }, "next": { "fno": "4311a375", "articleId": "12OmNwM6A21", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a546", "title": "LOOCs -- Linked Open Online Courses: A Vision", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a546/12OmNCcKQCk", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2014/4311/0/4311a375", "title": "Evaluating a Linked Open Online Course", "doi": null, "abstractUrl": "/proceedings-article/ism/2014/4311a375/12OmNwM6A21", "parentPublication": { "id": "proceedings/ism/2014/4311/0", "title": "2014 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a124", "title": "Determinants of Acceptance of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a124/12OmNyYm2yu", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a006", "title": "MOOC for Skill Development in 3D Animation: Comparing Learning Perceptions of First Time and Experienced Online Learner", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a006/12OmNzahc9g", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/04/07762189", "title": "How Learners’ Interactions Sustain Engagement: A MOOC Case Study", "doi": null, "abstractUrl": "/journal/lt/2017/04/07762189/13rRUxNW1VS", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a085", "title": "Learning and Reflection of Technology Based Collaborative MOOC Design and Its Evaluation, Validation and Results", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a085/17D45W1Oa3O", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a065", "title": "iLTI-QAT: A Model to Orchestrate Interaction Sessions in Hybrid MOOCs", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a065/17D45XDIXSS", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a069", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a069/17D45XzbnJV", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658884", "title": "Comparison of Live, Late and Archived Mode Learner Behavior in an Advanced Engineering MOOC", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658884/18j947SpUJ2", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jZacXR14xa", "title": "2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)", "acronym": "icedeg", "groupId": "1803698", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1l6SCYmusFO", "doi": "10.1109/ICEDEG48599.2020.9096670", "title": "Workshop: Evaluation Strategies and Metrics for Massive Open Online Courses (MOOCs)", "normalizedTitle": "Workshop: Evaluation Strategies and Metrics for Massive Open Online Courses (MOOCs)", "abstract": "The use of online and open education has become popular over the years. Using Massive Open Online Courses (MOOCs) a larger audience can be educated than with traditional means. Yet, maintaining the quality with such a large group can be challenging. The audience is often diverse, have different expectations and vary in their speed of learning. This workshop aims to discuss with audience evaluation strategies and metrics for MOOCs. The workshop will be divided in 4 parts. In the first part the workshop objectives and activities are introduced. After that, this session describes what a MOOC is and how a MOOC can be created, since it is expected audience has no or low level of intimacy with the topic. The second part provides an overview of evaluation strategies and will show the state-of-the-art in MOOC evaluation is. Durint the third part the audience will be challenged to discuss what are suitable strategies and metrics to evaluate a MOOC. If there will be a large audience then the evaluation will be done in smaller groups of 4-6 persons. Each of these groups would be in given the tasks to evaluate a specific part of MOOCs. The fourth sections starts with the presentation of all groups followed by a discussion. After each group presentation, chairs will open the discussion to all audience, aiming to improve the strategies and metrics presented by the group. At the end of this fourth part, the chairs will wrap-up all the groups presentation and have an online discussion in which the participants can vote on a number of suggestions. This will be represented in a graphical view (probably using MindMap, electronic spreadsheet or similar tool). The audience it is not expected to have any previous knowledge about MOOC development or evaluation. Various forms of MOOCS will be demonstrated to provide insight into what constituted a MOOC. The participants do not need any other physical material or software. It is a must for the audience bring a lot of creativity and enthusiasm to help create sharper strategies and metrics for MOOCs' evaluation. If possible, audience should bring laptops to browse Internet and organize in format of slides presentation (e.g.: Power Point, keynote) all the potential strategies and metrics identified by the group and present it to others group. Also for the voting the use of smart phone is encouraged.", "abstracts": [ { "abstractType": "Regular", "content": "The use of online and open education has become popular over the years. Using Massive Open Online Courses (MOOCs) a larger audience can be educated than with traditional means. Yet, maintaining the quality with such a large group can be challenging. The audience is often diverse, have different expectations and vary in their speed of learning. This workshop aims to discuss with audience evaluation strategies and metrics for MOOCs. The workshop will be divided in 4 parts. In the first part the workshop objectives and activities are introduced. After that, this session describes what a MOOC is and how a MOOC can be created, since it is expected audience has no or low level of intimacy with the topic. The second part provides an overview of evaluation strategies and will show the state-of-the-art in MOOC evaluation is. Durint the third part the audience will be challenged to discuss what are suitable strategies and metrics to evaluate a MOOC. If there will be a large audience then the evaluation will be done in smaller groups of 4-6 persons. Each of these groups would be in given the tasks to evaluate a specific part of MOOCs. The fourth sections starts with the presentation of all groups followed by a discussion. After each group presentation, chairs will open the discussion to all audience, aiming to improve the strategies and metrics presented by the group. At the end of this fourth part, the chairs will wrap-up all the groups presentation and have an online discussion in which the participants can vote on a number of suggestions. This will be represented in a graphical view (probably using MindMap, electronic spreadsheet or similar tool). The audience it is not expected to have any previous knowledge about MOOC development or evaluation. Various forms of MOOCS will be demonstrated to provide insight into what constituted a MOOC. The participants do not need any other physical material or software. It is a must for the audience bring a lot of creativity and enthusiasm to help create sharper strategies and metrics for MOOCs' evaluation. If possible, audience should bring laptops to browse Internet and organize in format of slides presentation (e.g.: Power Point, keynote) all the potential strategies and metrics identified by the group and present it to others group. Also for the voting the use of smart phone is encouraged.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of online and open education has become popular over the years. Using Massive Open Online Courses (MOOCs) a larger audience can be educated than with traditional means. Yet, maintaining the quality with such a large group can be challenging. The audience is often diverse, have different expectations and vary in their speed of learning. This workshop aims to discuss with audience evaluation strategies and metrics for MOOCs. The workshop will be divided in 4 parts. In the first part the workshop objectives and activities are introduced. After that, this session describes what a MOOC is and how a MOOC can be created, since it is expected audience has no or low level of intimacy with the topic. The second part provides an overview of evaluation strategies and will show the state-of-the-art in MOOC evaluation is. Durint the third part the audience will be challenged to discuss what are suitable strategies and metrics to evaluate a MOOC. If there will be a large audience then the evaluation will be done in smaller groups of 4-6 persons. Each of these groups would be in given the tasks to evaluate a specific part of MOOCs. The fourth sections starts with the presentation of all groups followed by a discussion. After each group presentation, chairs will open the discussion to all audience, aiming to improve the strategies and metrics presented by the group. At the end of this fourth part, the chairs will wrap-up all the groups presentation and have an online discussion in which the participants can vote on a number of suggestions. This will be represented in a graphical view (probably using MindMap, electronic spreadsheet or similar tool). The audience it is not expected to have any previous knowledge about MOOC development or evaluation. Various forms of MOOCS will be demonstrated to provide insight into what constituted a MOOC. The participants do not need any other physical material or software. It is a must for the audience bring a lot of creativity and enthusiasm to help create sharper strategies and metrics for MOOCs' evaluation. If possible, audience should bring laptops to browse Internet and organize in format of slides presentation (e.g.: Power Point, keynote) all the potential strategies and metrics identified by the group and present it to others group. Also for the voting the use of smart phone is encouraged.", "fno": "09096670", "keywords": [ "Computer Aided Instruction", "Educational Courses", "Internet", "MOOC Evaluation", "Group Presentation", "MOOC Development", "Massive Open Online Courses", "Audience Evaluation Strategies", "Online Education", "Open Education", "Measurement", "Conferences", "Education", "Electronic Government", "Information Management", "Decision Support Systems" ], "authors": [ { "affiliation": "Delft University of Technology (TUDelft)", "fullName": "Ricardo Matheus", "givenName": "Ricardo", "surname": "Matheus", "__typename": "ArticleAuthorType" }, { "affiliation": "Delft University of Technology (TUDelft)", "fullName": "Marijn Janssen", "givenName": "Marijn", "surname": "Janssen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icedeg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "17-18", "year": "2020", "issn": null, "isbn": "978-1-7281-5882-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09096665", "articleId": "1jZag2N62dO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09096874", "articleId": "1jZahlx7KbC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a013", "title": "Why We Need High Drop-Out Rates in MOOCs: New Evaluation and Personalization Strategies for the Quality of Open Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a013/12OmNAle6K9", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a361", "title": "MOOCs for K-12 and Higher Education in Taiwan", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a361/12OmNBpVQ9V", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a124", "title": "Determinants of Acceptance of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a124/12OmNyYm2yu", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2017/0629/0/0629a293", "title": "Gamification in Massive Open Online Courses (MOOCs) to Support Chinese Language Learning", "doi": null, "abstractUrl": "/proceedings-article/eitt/2017/0629a293/12OmNzRZq1l", "parentPublication": { "id": "proceedings/eitt/2017/0629/0", "title": "2017 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a705", "title": "Towards MOOCs and Their Role in Engineering Education", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a705/12OmNzaQomC", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2018/7616/0/761600a278", "title": "Research on the Theory and Practice of IP Courses Construction in China MOOCs", "doi": null, "abstractUrl": "/proceedings-article/icime/2018/761600a278/17D45WODaqe", "parentPublication": { "id": "proceedings/icime/2018/7616/0", "title": "2018 International Joint Conference on Information, Media and Engineering (ICIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ict4m/2018/7525/0/752500a249", "title": "Massive Open Online Courses (MOOCs) and Their Effect on Learners' Motivation", "doi": null, "abstractUrl": "/proceedings-article/ict4m/2018/752500a249/17D45Xq6dB3", "parentPublication": { "id": "proceedings/ict4m/2018/7525/0", "title": "2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718478", "title": "Measuring The Success of Massive Open Online Courses: A Mixed-Method Case Study", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718478/1BogRZX0tSE", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155902", "title": "Success Indicators for Massive Open Online Courses (MOOCs)", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155902/1m1j5K80m8U", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2021/2663/0/266300a080", "title": "AI Education in Massive Open Online Courses: A Content Analysis", "doi": null, "abstractUrl": "/proceedings-article/cste/2021/266300a080/1wG5OLo4zsI", "parentPublication": { "id": "proceedings/cste/2021/2663/0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m1j0uKS6ZO", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m1j5K80m8U", "doi": "10.1109/ICALT49669.2020.00018", "title": "Success Indicators for Massive Open Online Courses (MOOCs)", "normalizedTitle": "Success Indicators for Massive Open Online Courses (MOOCs)", "abstract": "Massive Open Online Courses (MOOCs) represent a popular option for delivery at scale. However, their effectiveness is still a matter of debate. There is no consensus on what success looks like in a MOOC. Common measures, such as completion rates and learner feedback, often fail to capture the diversity of goals and perceptions from different stakeholders. This paper addresses this issue, considering the views of MOOC providers, designers, facilitators, students, and other related institutions. It describes a variety of metrics based on a range of expectations, aims, and motivations. For a university, a MOOC might be successful if it results in an increase of its international prestige. For a learner, it might be so simply if studying the course keeps them active. The proposed model still requires further study, discussion, and refinement. Despite its limitations, it highlights the value of a multi-stakeholder, contextual approach.", "abstracts": [ { "abstractType": "Regular", "content": "Massive Open Online Courses (MOOCs) represent a popular option for delivery at scale. However, their effectiveness is still a matter of debate. There is no consensus on what success looks like in a MOOC. Common measures, such as completion rates and learner feedback, often fail to capture the diversity of goals and perceptions from different stakeholders. This paper addresses this issue, considering the views of MOOC providers, designers, facilitators, students, and other related institutions. It describes a variety of metrics based on a range of expectations, aims, and motivations. For a university, a MOOC might be successful if it results in an increase of its international prestige. For a learner, it might be so simply if studying the course keeps them active. The proposed model still requires further study, discussion, and refinement. Despite its limitations, it highlights the value of a multi-stakeholder, contextual approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Massive Open Online Courses (MOOCs) represent a popular option for delivery at scale. However, their effectiveness is still a matter of debate. There is no consensus on what success looks like in a MOOC. Common measures, such as completion rates and learner feedback, often fail to capture the diversity of goals and perceptions from different stakeholders. This paper addresses this issue, considering the views of MOOC providers, designers, facilitators, students, and other related institutions. It describes a variety of metrics based on a range of expectations, aims, and motivations. For a university, a MOOC might be successful if it results in an increase of its international prestige. For a learner, it might be so simply if studying the course keeps them active. The proposed model still requires further study, discussion, and refinement. Despite its limitations, it highlights the value of a multi-stakeholder, contextual approach.", "fno": "09155902", "keywords": [ "Computer Aided Instruction", "Educational Courses", "Further Education", "Success Indicators", "Massive Open Online Courses", "Learner Feedback", "MOOC Providers", "Multistakeholder", "Contextual Approach", "Education", "Measurement", "Stakeholders", "Technological Innovation", "Companies", "Systematics", "Conferences", "Massive Open Online Courses", "MOO Cs", "Success", "Completion", "Metrics", "Course Effectiveness", "Indicators" ], "authors": [ { "affiliation": "Universidad Autonoma de Nuevo Leon,Faculty of Psychology,Monterrey,Mexico", "fullName": "Brenda Cecilia Padilla Rodriguez", "givenName": "Brenda Cecilia", "surname": "Padilla Rodriguez", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "39-41", "year": "2020", "issn": null, "isbn": "978-1-7281-6090-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09155981", "articleId": "1m1j6i91YAg", "__typename": "AdjacentArticleType" }, "next": { "fno": "09155778", "articleId": "1m1j4eLXKPm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a013", "title": "Why We Need High Drop-Out Rates in MOOCs: New Evaluation and Personalization Strategies for the Quality of Open Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a013/12OmNAle6K9", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a231", "title": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a231/12OmNyUWQXF", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2018/6049/0/604901a001", "title": "Gap between MOOC Designers' and MOOC Learners' Perspectives on Interaction and Experiences in MOOCs: Findings from the Global MOOC Quality Survey", "doi": null, "abstractUrl": "/proceedings-article/icalt/2018/604901a001/12OmNzVoBCV", "parentPublication": { "id": "proceedings/icalt/2018/6049/0", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2018/7616/0/761600a278", "title": "Research on the Theory and Practice of IP Courses Construction in China MOOCs", "doi": null, "abstractUrl": "/proceedings-article/icime/2018/761600a278/17D45WODaqe", "parentPublication": { "id": "proceedings/icime/2018/7616/0", "title": "2018 International Joint Conference on Information, Media and Engineering (ICIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ict4m/2018/7525/0/752500a249", "title": "Massive Open Online Courses (MOOCs) and Their Effect on Learners' Motivation", "doi": null, "abstractUrl": "/proceedings-article/ict4m/2018/752500a249/17D45Xq6dB3", "parentPublication": { "id": "proceedings/ict4m/2018/7525/0", "title": "2018 International Conference on Information and Communication Technology for the Muslim World (ICT4M)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2019/4288/0/428800a071", "title": "Revisiting the myth of disruptive innovation: An exploratory study of Chinese Learners&#x2019; Perception of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/eitt/2019/428800a071/1fHkRj0AlNe", "parentPublication": { "id": "proceedings/eitt/2019/4288/0", "title": "2019 Eighth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2020/5882/0/09096670", "title": "Workshop: Evaluation Strategies and Metrics for Massive Open Online Courses (MOOCs)", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2020/09096670/1l6SCYmusFO", "parentPublication": { "id": "proceedings/icedeg/2020/5882/0", "title": "2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2020/9171/0/917100a047", "title": "Case Study of Collaborative Learning in a Massive Open Online Course", "doi": null, "abstractUrl": "/proceedings-article/eitt/2020/917100a047/1qyxssJL8PK", "parentPublication": { "id": "proceedings/eitt/2020/9171/0", "title": "2020 Ninth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2021/6834/0/683400a248", "title": "The Impact of Massive Open Online Courses Globalization on the Educational Equity", "doi": null, "abstractUrl": "/proceedings-article/icekim/2021/683400a248/1vmLAmZDdHa", "parentPublication": { "id": "proceedings/icekim/2021/6834/0", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vmLvNYq8QU", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "acronym": "icekim", "groupId": "1841184", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1vmLAmZDdHa", "doi": "10.1109/ICEKIM52309.2021.00061", "title": "The Impact of Massive Open Online Courses Globalization on the Educational Equity", "normalizedTitle": "The Impact of Massive Open Online Courses Globalization on the Educational Equity", "abstract": "Massive Open Online Courses (MOOC) has become a hot topic in the field of education, which has caused widespread attention and influence in the field of higher education in recent years. Many top universities in the world have already joined MOOC. As a large-scale open online learning system, MOOC has broken the old rules of global academic exchange and cooperation. It not only established a new order, logic and mechanism for the internationalization of higher education, but also provided a new structure and opportunity for the globalization of higher education. This paper will discuss the impact of MOOC globalization on the higher education equity and the development trend of higher education MOOC in Mainland China in the context of globalization from the perspective of higher education.", "abstracts": [ { "abstractType": "Regular", "content": "Massive Open Online Courses (MOOC) has become a hot topic in the field of education, which has caused widespread attention and influence in the field of higher education in recent years. Many top universities in the world have already joined MOOC. As a large-scale open online learning system, MOOC has broken the old rules of global academic exchange and cooperation. It not only established a new order, logic and mechanism for the internationalization of higher education, but also provided a new structure and opportunity for the globalization of higher education. This paper will discuss the impact of MOOC globalization on the higher education equity and the development trend of higher education MOOC in Mainland China in the context of globalization from the perspective of higher education.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Massive Open Online Courses (MOOC) has become a hot topic in the field of education, which has caused widespread attention and influence in the field of higher education in recent years. Many top universities in the world have already joined MOOC. As a large-scale open online learning system, MOOC has broken the old rules of global academic exchange and cooperation. It not only established a new order, logic and mechanism for the internationalization of higher education, but also provided a new structure and opportunity for the globalization of higher education. This paper will discuss the impact of MOOC globalization on the higher education equity and the development trend of higher education MOOC in Mainland China in the context of globalization from the perspective of higher education.", "fno": "683400a248", "keywords": [ "Computer Aided Instruction", "Educational Courses", "Further Education", "Globalisation", "MOOC Globalization", "Higher Education Equity", "Higher Education MOOC", "Educational Equity", "Global Academic Exchange", "Massive Open Online Courses Globalization", "Education Field", "Large Scale Open Online Learning System", "Higher Education Internationalization", "Mainland China", "Learning Systems", "Computer Aided Instruction", "Technological Innovation", "Electronic Learning", "Education", "Government", "Globalization", "Equitable Development", "Openness", "Resource Sharing" ], "authors": [ { "affiliation": "Wuchang University of Technology,Wuhan,China", "fullName": "Yao Li", "givenName": "Yao", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icekim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "248-251", "year": "2021", "issn": null, "isbn": "978-1-7281-6834-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "683400a243", "articleId": "1vmLNtQyzBK", "__typename": "AdjacentArticleType" }, "next": { "fno": "683400a252", "articleId": "1vmLKjAm7E4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2005/9077/0/01612039", "title": "Invited panel - engineering and computer science education in the era of globalization", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612039/12OmNAWYKJt", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04418040", "title": "Globalization: Effects and opportunities for higher education", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04418040/12OmNB1NVOk", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2006/0360/1/04022882", "title": "Database Globalization in Enterprise Applications", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2006/04022882/12OmNBrlPBH", "parentPublication": { "id": "proceedings/aqtr/2006/0360/1", "title": "2006 IEEE-TTTC International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2000/6424/1/00897645", "title": "\"UC-Russia\" globalization educational initiative", "doi": null, "abstractUrl": "/proceedings-article/fie/2000/00897645/12OmNqHItvi", "parentPublication": { "id": "proceedings/fie/2000/6424/1", "title": "30th Annual Frontiers in Education Conference. Building on A Century of Progress in Engineering Education. Conference Proceedings (IEEE Cat. No.00CH37135)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417800", "title": "Critical theory, globalization and teacher education in a technocratic era", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417800/12OmNrIJqpw", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01612129", "title": "Invited panel - engineering technology education in the era of globalization", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612129/12OmNzTH0KT", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718478", "title": "Measuring The Success of Massive Open Online Courses: A Mixed-Method Case Study", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718478/1BogRZX0tSE", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900a921", "title": "Exploration on Internationalization of Graduate Education under the Big Data-Driven Era -- Based on the Nanyang Technological University Case", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900a921/1C8GJj1SemQ", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2020/9638/0/963800a283", "title": "Internationalization Process of &#x201C;Double First Class&#x201D; Universities Based on Big Data", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2020/963800a283/1rxhvsf8t4A", "parentPublication": { "id": "proceedings/mlbdbi/2020/9638/0", "title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cste/2021/2663/0/266300a080", "title": "AI Education in Massive Open Online Courses: A Content Analysis", "doi": null, "abstractUrl": "/proceedings-article/cste/2021/266300a080/1wG5OLo4zsI", "parentPublication": { "id": "proceedings/cste/2021/2663/0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wG5O0Vxdu0", "title": "2021 3rd International Conference on Computer Science and Technologies in Education (CSTE)", "acronym": "cste", "groupId": "1842924", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wG5OLo4zsI", "doi": "10.1109/CSTE53634.2021.00023", "title": "AI Education in Massive Open Online Courses: A Content Analysis", "normalizedTitle": "AI Education in Massive Open Online Courses: A Content Analysis", "abstract": "This study aims to explore the current state of AI education in massive open online courses (MOOCs). We screened 128 sample MOOC courses from 10 learning platforms and coded information on course overviews, content outlines, recommended materials and teaching methods as a way to understand the content and teaching methods of AI education on MOOC platforms. The results show that: (1) Coursera and Edx platforms offer the largest number of ESD-related courses, the organizations offering MOOCs are mostly companies and universities, and the number of AI education-related courses started from 2012 to the present has increased year by year. The average number of participants is exceeds 120,000, and AI courses are currently very popular; (2) Core algorithms and topics related to typical applications are the main content of AI education; (3) Online procedural teaching, task-driven teaching and online collaborative learning are the most used pedagogical methods in MOOCs at this stage. However, pedagogical approaches such as scenario-based learning and project-based learning are not yet fully utilized in the MOOC environment. Our findings suggest that MOOC AI education in research a practical and innovative approach in preparing and learning AI education-related MOOC courses.", "abstracts": [ { "abstractType": "Regular", "content": "This study aims to explore the current state of AI education in massive open online courses (MOOCs). We screened 128 sample MOOC courses from 10 learning platforms and coded information on course overviews, content outlines, recommended materials and teaching methods as a way to understand the content and teaching methods of AI education on MOOC platforms. The results show that: (1) Coursera and Edx platforms offer the largest number of ESD-related courses, the organizations offering MOOCs are mostly companies and universities, and the number of AI education-related courses started from 2012 to the present has increased year by year. The average number of participants is exceeds 120,000, and AI courses are currently very popular; (2) Core algorithms and topics related to typical applications are the main content of AI education; (3) Online procedural teaching, task-driven teaching and online collaborative learning are the most used pedagogical methods in MOOCs at this stage. However, pedagogical approaches such as scenario-based learning and project-based learning are not yet fully utilized in the MOOC environment. Our findings suggest that MOOC AI education in research a practical and innovative approach in preparing and learning AI education-related MOOC courses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study aims to explore the current state of AI education in massive open online courses (MOOCs). We screened 128 sample MOOC courses from 10 learning platforms and coded information on course overviews, content outlines, recommended materials and teaching methods as a way to understand the content and teaching methods of AI education on MOOC platforms. The results show that: (1) Coursera and Edx platforms offer the largest number of ESD-related courses, the organizations offering MOOCs are mostly companies and universities, and the number of AI education-related courses started from 2012 to the present has increased year by year. The average number of participants is exceeds 120,000, and AI courses are currently very popular; (2) Core algorithms and topics related to typical applications are the main content of AI education; (3) Online procedural teaching, task-driven teaching and online collaborative learning are the most used pedagogical methods in MOOCs at this stage. However, pedagogical approaches such as scenario-based learning and project-based learning are not yet fully utilized in the MOOC environment. Our findings suggest that MOOC AI education in research a practical and innovative approach in preparing and learning AI education-related MOOC courses.", "fno": "266300a080", "keywords": [ "Computer Aided Instruction", "Educational Courses", "Groupware", "Teaching", "Course Overviews", "Content Outlines", "Recommended Materials", "Teaching Methods", "MOOC Platforms", "ESD Related Courses", "Task Driven Teaching", "Online Collaborative Learning", "Massive Open Online Courses", "Content Analysis", "Sample MOOC Courses", "Online Procedural Teaching", "AI Education Related MOOC Courses", "Computer Science", "Computer Aided Instruction", "Electronic Learning", "Distance Learning", "Education", "Companies", "Collaborative Work", "Artificial Intelligence Education", "MOOC", "Open Educational Resource", "Open Courseware", "Content Analysis", "Learning Content", "Pedagogical Methods" ], "authors": [ { "affiliation": "South China Normal University,School of Information Technology in Education,Guangzhou,China", "fullName": "Xinyu Zhou", "givenName": "Xinyu", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "South China Normal University,School of Information Technology in Education,Guangzhou,China", "fullName": "Yao Tong", "givenName": "Yao", "surname": "Tong", "__typename": "ArticleAuthorType" }, { "affiliation": "South China Normal University,School of Information Technology in Education,Guangzhou,China", "fullName": "Xixin Lan", "givenName": "Xixin", "surname": "Lan", "__typename": "ArticleAuthorType" }, { "affiliation": "South China Normal University,School of Information Technology in Education,Guangzhou,China", "fullName": "Kelin Zheng", "givenName": "Kelin", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "South China Normal University,School of Information Technology in Education,Guangzhou,China", "fullName": "Zehui Zhan", "givenName": "Zehui", "surname": "Zhan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cste", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-05-01T00:00:00", "pubType": "proceedings", "pages": "80-85", "year": "2021", "issn": null, "isbn": "978-1-6654-2663-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "266300a075", "articleId": "1wG5Pt7IB32", "__typename": "AdjacentArticleType" }, "next": { "fno": "266300a087", "articleId": "1wG5PmJaYkU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a546", "title": "LOOCs -- Linked Open Online Courses: A Vision", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a546/12OmNCcKQCk", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190588", "title": "Massive open online courses in software engineering education", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190588/12OmNwcUk0n", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752262", "title": "An analysis of student behavior in two massive open online courses", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752262/12OmNxGja7v", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a231", "title": "Massive Open Online Courses Temporal Profiling for Dropout Prediction", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a231/12OmNyUWQXF", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2016/6115/0/6115a124", "title": "Determinants of Acceptance of Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a124/12OmNyYm2yu", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718478", "title": "Measuring The Success of Massive Open Online Courses: A Mixed-Method Case Study", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718478/1BogRZX0tSE", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbaie/2020/6499/0/09196495", "title": "Exploring the Determinants of Massive Open Online Courses Reusage Intention in Humanities", "doi": null, "abstractUrl": "/proceedings-article/icbaie/2020/09196495/1n90YO2yWhG", "parentPublication": { "id": "proceedings/icbaie/2020/6499/0", "title": "2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clei/2020/1560/0/156000a377", "title": "Understanding Learners Behavior in Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/clei/2020/156000a377/1uOu1PlxAu4", "parentPublication": { "id": "proceedings/clei/2020/1560/0", "title": "2020 XLVI Latin American Computing Conference (CLEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2021/6834/0/683400a248", "title": "The Impact of Massive Open Online Courses Globalization on the Educational Equity", "doi": null, "abstractUrl": "/proceedings-article/icekim/2021/683400a248/1vmLAmZDdHa", "parentPublication": { "id": "proceedings/icekim/2021/6834/0", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAndiq9", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwAt1DI", "doi": "10.1109/PacificVis.2013.6596138", "title": "iTree: Exploring time-varying data using indexable tree", "normalizedTitle": "iTree: Exploring time-varying data using indexable tree", "abstract": "Significant advances have been made in time-varying data analysis and visualization, mainly in improving our ability to identify temporal trends and classify the underlying data. However, the ability to perform cost-effective data querying and indexing is often not incorporated, which posts a serious limitation as the size of time-varying data continue to grow. In this paper, we present a new approach that unifies data compacting, indexing and classification into a single framework. We achieve this by transforming the time-activity curve representation of a time-varying data set into a hierarchical symbolic representation. We further build an indexable version of the data hierarchy, from which we create the iTree for visual representation of the time-varying data. A hyperbolic layout algorithm is employed to draw the iTree with a large number of nodes and provide focus+context visualization for interaction. We achieve effective querying, searching and tracking of time-varying data sets by enabling multiple coordinated views consisting of the iTree, the symbolic view and the spatial view.", "abstracts": [ { "abstractType": "Regular", "content": "Significant advances have been made in time-varying data analysis and visualization, mainly in improving our ability to identify temporal trends and classify the underlying data. However, the ability to perform cost-effective data querying and indexing is often not incorporated, which posts a serious limitation as the size of time-varying data continue to grow. In this paper, we present a new approach that unifies data compacting, indexing and classification into a single framework. We achieve this by transforming the time-activity curve representation of a time-varying data set into a hierarchical symbolic representation. We further build an indexable version of the data hierarchy, from which we create the iTree for visual representation of the time-varying data. A hyperbolic layout algorithm is employed to draw the iTree with a large number of nodes and provide focus+context visualization for interaction. We achieve effective querying, searching and tracking of time-varying data sets by enabling multiple coordinated views consisting of the iTree, the symbolic view and the spatial view.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Significant advances have been made in time-varying data analysis and visualization, mainly in improving our ability to identify temporal trends and classify the underlying data. However, the ability to perform cost-effective data querying and indexing is often not incorporated, which posts a serious limitation as the size of time-varying data continue to grow. In this paper, we present a new approach that unifies data compacting, indexing and classification into a single framework. We achieve this by transforming the time-activity curve representation of a time-varying data set into a hierarchical symbolic representation. We further build an indexable version of the data hierarchy, from which we create the iTree for visual representation of the time-varying data. A hyperbolic layout algorithm is employed to draw the iTree with a large number of nodes and provide focus+context visualization for interaction. We achieve effective querying, searching and tracking of time-varying data sets by enabling multiple coordinated views consisting of the iTree, the symbolic view and the spatial view.", "fno": "06596138", "keywords": [ "Data Analysis", "Data Visualisation", "Database Indexing", "Query Languages", "Query Processing", "I Tree", "Time Varying Data Analysis", "Data Visualization", "Cost Effective Data Querying", "Data Compacting", "Data Indexing", "Data Classification", "Time Activity Curve Representation", "Hierarchical Symbolic Representation", "Data Hierarchy", "Visual Representation", "Data Sets", "Symbolic View", "Spatial View", "Multiple Coordinated Views", "Data Visualization", "Indexing", "Visualization", "Histograms", "Market Research", "Earthquakes", "Transforms" ], "authors": [ { "affiliation": "Michigan Technological University, USA", "fullName": "Yi Gu", "givenName": "Yi", "surname": "Gu", "__typename": "ArticleAuthorType" }, { "affiliation": "Michigan Technological University, USA", "fullName": "Chaoli Wang", "givenName": "Chaoli", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-02-01T00:00:00", "pubType": "proceedings", "pages": "137-144", "year": "2013", "issn": "2165-8765", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06596137", "articleId": "12OmNzC5SHi", "__typename": "AdjacentArticleType" }, "next": { "fno": "06596139", "articleId": "12OmNwF0BOI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2011/935/0/05742369", "title": "Static correlation visualization for large time-varying volume data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742369/12OmNCbCrZa", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742378", "title": "Analyzing information transfer in time-varying multivariate data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742378/12OmNvA1h6P", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571382", "title": "A 3D Visualization Technique for Large Scale Time-Varying Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571382/12OmNx0RIWs", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790097", "title": "Time-Varying Data Visualization Using Information Flocking Boids", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790097/12OmNyoiYSe", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352365", "title": "Visual Trends Analysis in Time-Varying Ensembles", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352365/13rRUwI5TR2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/12/07118241", "title": "Morphable Word Clouds for Time-Varying Text Data Visualization", "doi": null, "abstractUrl": "/journal/tg/2015/12/07118241/13rRUwfZBVn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2003/02/c2034", "title": "Visualizing Time-Varying Volume Data", "doi": null, "abstractUrl": "/magazine/cs/2003/02/c2034/13rRUxNmPJy", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328521", "title": "Exploring Dynamic Granules for Time-Varying Big Data", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328521/17D45WrVg26", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440120", "title": "Exploring Time-Varying Multivariate Volume Data Using Matrix of Isosurface Similarity Maps", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440120/17D45Wuc38E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933759", "title": "A Deep Learning Approach to Selecting Representative Time Steps for Time-Varying Multivariate Data", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933759/1fTgHn243W8", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6h9t3Kc3S", "doi": "10.1109/VIS54862.2022.00040", "title": "Accelerated Probabilistic Marching Cubes by Deep Learning for Time-Varying Scalar Ensembles", "normalizedTitle": "Accelerated Probabilistic Marching Cubes by Deep Learning for Time-Varying Scalar Ensembles", "abstract": "Visualizing the uncertainty of ensemble simulations is challenging due to the large size and multivariate and temporal features of en-semble data sets. One popular approach to studying the uncertainty of ensembles is analyzing the positional uncertainty of the level sets. Probabilistic marching cubes is a technique that performs Monte Carlo sampling of multivariate Gaussian noise distributions for positional uncertainty visualization of level sets. However, the technique suffers from high computational time, making interactive visualization and analysis impossible to achieve. This paper introduces a deep-learning-based approach to learning the level-set uncertainty for two-dimensional ensemble data with a multivariate Gaussian noise assumption. We train the model using the first few time steps from time-varying ensemble data in our workflow. We demonstrate that our trained model accurately infers uncertainty in level sets for new time steps and is up to 170X faster than that of the original probabilistic model with serial computation and 10X faster than that of the original parallel computation.", "abstracts": [ { "abstractType": "Regular", "content": "Visualizing the uncertainty of ensemble simulations is challenging due to the large size and multivariate and temporal features of en-semble data sets. One popular approach to studying the uncertainty of ensembles is analyzing the positional uncertainty of the level sets. Probabilistic marching cubes is a technique that performs Monte Carlo sampling of multivariate Gaussian noise distributions for positional uncertainty visualization of level sets. However, the technique suffers from high computational time, making interactive visualization and analysis impossible to achieve. This paper introduces a deep-learning-based approach to learning the level-set uncertainty for two-dimensional ensemble data with a multivariate Gaussian noise assumption. We train the model using the first few time steps from time-varying ensemble data in our workflow. We demonstrate that our trained model accurately infers uncertainty in level sets for new time steps and is up to 170X faster than that of the original probabilistic model with serial computation and 10X faster than that of the original parallel computation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualizing the uncertainty of ensemble simulations is challenging due to the large size and multivariate and temporal features of en-semble data sets. One popular approach to studying the uncertainty of ensembles is analyzing the positional uncertainty of the level sets. Probabilistic marching cubes is a technique that performs Monte Carlo sampling of multivariate Gaussian noise distributions for positional uncertainty visualization of level sets. However, the technique suffers from high computational time, making interactive visualization and analysis impossible to achieve. This paper introduces a deep-learning-based approach to learning the level-set uncertainty for two-dimensional ensemble data with a multivariate Gaussian noise assumption. We train the model using the first few time steps from time-varying ensemble data in our workflow. We demonstrate that our trained model accurately infers uncertainty in level sets for new time steps and is up to 170X faster than that of the original probabilistic model with serial computation and 10X faster than that of the original parallel computation.", "fno": "881200a155", "keywords": [ "Data Visualisation", "Deep Learning Artificial Intelligence", "Gaussian Noise", "Monte Carlo Methods", "Accelerated Probabilistic Marching Cubes", "Deep Learning", "Ensemble Simulations", "Interactive Visualization", "Level Set Uncertainty", "Monte Carlo Sampling", "Multivariate Gaussian Noise Assumption", "Multivariate Gaussian Noise Distributions", "Positional Uncertainty Visualization", "Temporal Features", "Time Varying Ensemble Data", "Time Varying Scalar Ensembles", "Two Dimensional Ensemble Data", "Deep Learning", "Uncertainty", "Monte Carlo Methods", "Level Set", "Computational Modeling", "Gaussian Noise", "Visual Analytics", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Scientific Visualization", "Computing Methodologies", "Machine Learning", "Machine Learning Approaches", "Neural Networks" ], "authors": [ { "affiliation": "Oak Ridge National Laboratory", "fullName": "Mengjiao Han", "givenName": "Mengjiao", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Scientific Computing and Imaging Institute", "fullName": "Tushar M. Athawale", "givenName": "Tushar M.", "surname": "Athawale", "__typename": "ArticleAuthorType" }, { "affiliation": "Scientific Computing and Imaging Institute", "fullName": "David Pugmire", "givenName": "David", "surname": "Pugmire", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory", "fullName": "Chris R. Johnson", "givenName": "Chris R.", "surname": "Johnson", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "155-159", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J6h9pOcZI4", "name": "pvis202288120-09973217s1-mm_881200a155.zip", "size": "227 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pvis202288120-09973217s1-mm_881200a155.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "881200a150", "articleId": "1J6h5DX0BAA", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a160", "articleId": "1J6hbizj1Xq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156370", "title": "Visualizing 2D scalar fields with hierarchical topology", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156370/12OmNC0y5GB", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122743", "title": "Comparative Visual Analysis of Lagrangian Transport in CFD Ensembles", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122743/13rRUwbs2b4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060980", "title": "Matching Visual Saliency to Confidence in Plots of Uncertain Data", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060980/13rRUxZRbnY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2000/06/i0554", "title": "Exploring Texture Ensembles by Efficient Markov Chain Monte Carlo-Toward a 'Trichromacy' Theory of Texture", "doi": null, "abstractUrl": "/journal/tp/2000/06/i0554/13rRUypp58B", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440052", "title": "An Interactive Framework for Visualization of Weather Forecast Ensembles", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440052/17D45XDIXW9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000j368", "title": "The Power of Ensembles for Active Learning in Image Classification", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000j368/17D45Xtvpe4", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903471", "title": "Fiber Uncertainty Visualization for Bivariate Data With Parametric and Nonparametric Noise Models", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903471/1GZolxWTqPS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a145", "title": "Visualizing Confidence Intervals for Critical Point Probabilities in 2D Scalar Field Ensembles", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a145/1J6h7HNSI0g", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a719", "title": "Experiments with Random Projections Ensembles: Linear Versus Quadratic Discriminants", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a719/1gAwZ1JtQty", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/04/09187994", "title": "Uncertainty Visualization of 2D Morse Complex Ensembles Using Statistical Summary Maps", "doi": null, "abstractUrl": "/journal/tg/2022/04/09187994/1mXkiNpxvvq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIUg06", "title": "2012 IEEE 12th International Conference on Data Mining", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBDyAaU", "doi": "10.1109/ICDM.2012.27", "title": "Multi-task Learning for Classifying Proteins Using Dual Hierarchies", "normalizedTitle": "Multi-task Learning for Classifying Proteins Using Dual Hierarchies", "abstract": "Several biological databases organize information in taxonomies/hierarchies. These databases differ in terms of curation process, input data, coverage and annotation errors. SCOP and CATH are examples of two databases that classify proteins hierarchically into structurally related groups based on experimentally determined structures. Given the large number of protein sequences with unavailable structure, there is a need to develop prediction methods to classify protein sequences into structural classes. We have developed a novel classification approach that utilizes the underlying relationships across multiple hierarchical source databases within a multi-task learning (MTL) framework. MTL is used to simultaneously learn multiple related tasks, and has been shown to improve generalization performance. Specifically, we have developed and evaluated an MTL approach for predicting the structural class, as defined by two hierarchical databases, CATH and SCOP, using protein sequence information only. We define one task per node of the hierarchies and formulate the MTL problem as a combination of these binary classification tasks. Our experimental evaluation demonstrates that the MTL approach that integrates both the hierarchies outperforms the base-line approach that trains independent models per task, as well as a MTL approach that integrates tasks across a single hierarchical database. We also performed extensive experiments that evaluate different regularization penalties and incorporate different task relationships that achieve superior classification performance.", "abstracts": [ { "abstractType": "Regular", "content": "Several biological databases organize information in taxonomies/hierarchies. These databases differ in terms of curation process, input data, coverage and annotation errors. SCOP and CATH are examples of two databases that classify proteins hierarchically into structurally related groups based on experimentally determined structures. Given the large number of protein sequences with unavailable structure, there is a need to develop prediction methods to classify protein sequences into structural classes. We have developed a novel classification approach that utilizes the underlying relationships across multiple hierarchical source databases within a multi-task learning (MTL) framework. MTL is used to simultaneously learn multiple related tasks, and has been shown to improve generalization performance. Specifically, we have developed and evaluated an MTL approach for predicting the structural class, as defined by two hierarchical databases, CATH and SCOP, using protein sequence information only. We define one task per node of the hierarchies and formulate the MTL problem as a combination of these binary classification tasks. Our experimental evaluation demonstrates that the MTL approach that integrates both the hierarchies outperforms the base-line approach that trains independent models per task, as well as a MTL approach that integrates tasks across a single hierarchical database. We also performed extensive experiments that evaluate different regularization penalties and incorporate different task relationships that achieve superior classification performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Several biological databases organize information in taxonomies/hierarchies. These databases differ in terms of curation process, input data, coverage and annotation errors. SCOP and CATH are examples of two databases that classify proteins hierarchically into structurally related groups based on experimentally determined structures. Given the large number of protein sequences with unavailable structure, there is a need to develop prediction methods to classify protein sequences into structural classes. We have developed a novel classification approach that utilizes the underlying relationships across multiple hierarchical source databases within a multi-task learning (MTL) framework. MTL is used to simultaneously learn multiple related tasks, and has been shown to improve generalization performance. Specifically, we have developed and evaluated an MTL approach for predicting the structural class, as defined by two hierarchical databases, CATH and SCOP, using protein sequence information only. We define one task per node of the hierarchies and formulate the MTL problem as a combination of these binary classification tasks. Our experimental evaluation demonstrates that the MTL approach that integrates both the hierarchies outperforms the base-line approach that trains independent models per task, as well as a MTL approach that integrates tasks across a single hierarchical database. We also performed extensive experiments that evaluate different regularization penalties and incorporate different task relationships that achieve superior classification performance.", "fno": "4905a834", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Anveshi Charuvaka", "givenName": "Anveshi", "surname": "Charuvaka", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huzefa Rangwala", "givenName": "Huzefa", "surname": "Rangwala", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "834-839", "year": "2012", "issn": "1550-4786", "isbn": "978-1-4673-4649-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4905a828", "articleId": "12OmNAOsMKj", "__typename": "AdjacentArticleType" }, "next": { "fno": "4905a840", "articleId": "12OmNro0HXn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2009/3736/2/3736b181", "title": "Using Parallel Combined Classifiers to Improve Classification of Proteins", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736b181/12OmNAJm0mO", "parentPublication": { "id": "proceedings/icnc/2009/3736/2", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2013/3163/0/06701559", "title": "Prediction of enzymatic activity of proteins based on structural and functional domains", "doi": null, "abstractUrl": "/proceedings-article/bibe/2013/06701559/12OmNvJXezP", "parentPublication": { "id": "proceedings/bibe/2013/3163/0", "title": "2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/266", "title": "Poster: Identification and classification of internal repeats in proteins", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/266/12OmNxy4MZn", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2013/2972/0/06735276", "title": "Classifying Documents within Multiple Hierarchical Datasets Using Multi-task Learning", "doi": null, "abstractUrl": "/proceedings-article/ictai/2013/06735276/12OmNym2bTe", "parentPublication": { "id": "proceedings/ictai/2013/2972/0", "title": "2013 IEEE 25th International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/04684893", "title": "Functional Neighbors: Inferring Relationships between Non-Homologous Protein Families Using Family-Specific Packing Motifs", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/04684893/12OmNzTYC99", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2006/2735/0/27350180", "title": "Impact of the Predicted Protein Structural Content on Prediction of Structural Classes for the Twilight Zone Proteins", "doi": null, "abstractUrl": "/proceedings-article/icmla/2006/27350180/12OmNzcPAu8", "parentPublication": { "id": "proceedings/icmla/2006/2735/0", "title": "2006 International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/06/06855357", "title": "Classifying Protein Sequences Using Regularized Multi-Task Learning", "doi": null, "abstractUrl": "/journal/tb/2014/06/06855357/13rRUxly9cm", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2010/03/ttb2010030563", "title": "A Study of Hierarchical and Flat Classification of Proteins", "doi": null, "abstractUrl": "/journal/tb/2010/03/ttb2010030563/13rRUyY28WO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09854200", "title": "ContactLib-ATT: a structure-based search engine for homologous proteins", "doi": null, "abstractUrl": "/journal/tb/5555/01/09854200/1FJ0EbHJOSY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2008/2890/0/04686206", "title": "An integrated database for complex protein structure modeling", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2008/04686206/1oHlzoQdjYk", "parentPublication": { "id": "proceedings/bibmw/2008/2890/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomeidcine Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNC0y5GB", "doi": "10.1109/PACIFICVIS.2015.7156370", "title": "Visualizing 2D scalar fields with hierarchical topology", "normalizedTitle": "Visualizing 2D scalar fields with hierarchical topology", "abstract": "This paper describes an effort to create new visualizations by exploiting hierarchical scalar topology. First, we build a hierarchical topology through synchronously constructing and simplifying Contour Tree (CT) and Morse-Smale (MS) complex of scalar fields. We then introduce three algorithms based on the hierarchical topology: (1) topology-based multi-resolution contouring — an overview provided for a scalar field by extracting iso-values from the simplified CT and tracing approximate contours across the MS complex cells; (2) topology based spaghetti plots for uncertainty — a seeding scheme based on the hierarchical topology for visualizing uncertainty among ensemble scalar data; (3) virtual ribbons — a new scheme for visualizing multivariate data invented by overlapping visual ribbons which encode the scalar variation of a region covered by uniform contours. We compare the new approaches with current alternatives.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes an effort to create new visualizations by exploiting hierarchical scalar topology. First, we build a hierarchical topology through synchronously constructing and simplifying Contour Tree (CT) and Morse-Smale (MS) complex of scalar fields. We then introduce three algorithms based on the hierarchical topology: (1) topology-based multi-resolution contouring — an overview provided for a scalar field by extracting iso-values from the simplified CT and tracing approximate contours across the MS complex cells; (2) topology based spaghetti plots for uncertainty — a seeding scheme based on the hierarchical topology for visualizing uncertainty among ensemble scalar data; (3) virtual ribbons — a new scheme for visualizing multivariate data invented by overlapping visual ribbons which encode the scalar variation of a region covered by uniform contours. We compare the new approaches with current alternatives.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes an effort to create new visualizations by exploiting hierarchical scalar topology. First, we build a hierarchical topology through synchronously constructing and simplifying Contour Tree (CT) and Morse-Smale (MS) complex of scalar fields. We then introduce three algorithms based on the hierarchical topology: (1) topology-based multi-resolution contouring — an overview provided for a scalar field by extracting iso-values from the simplified CT and tracing approximate contours across the MS complex cells; (2) topology based spaghetti plots for uncertainty — a seeding scheme based on the hierarchical topology for visualizing uncertainty among ensemble scalar data; (3) virtual ribbons — a new scheme for visualizing multivariate data invented by overlapping visual ribbons which encode the scalar variation of a region covered by uniform contours. We compare the new approaches with current alternatives.", "fno": "07156370", "keywords": [ "Approximation Methods", "Topology", "Data Visualization", "Visualization", "Uncertainty", "Feature Extraction", "Image Color Analysis", "Spaghetti Plot", "Scalar Topology", "Contour Tree", "Morse Smale Complex", "Multivariate Map", "Contouring" ], "authors": [ { "affiliation": "I. M. Systems Group (IMSG) at NOAA, USA", "fullName": "Keqin Wu", "givenName": null, "surname": "Keqin Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Mississippi State University, USA", "fullName": "Song Zhang", "givenName": "Song", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "141-145", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156369", "articleId": "12OmNvUaNmy", "__typename": "AdjacentArticleType" }, "next": { "fno": "07156371", "articleId": "12OmNzJbR3z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498weber", "title": "Exploring Scalar Fields Using Critical Isovalues", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498weber/12OmNAYXWzS", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780062", "title": "A Topology Simplification Method for 2D Vector Fields", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780062/12OmNx7G5XZ", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2017/6543/0/6543a215", "title": "Analyzing and Visualizing Scalar Fields on Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2017/6543a215/12OmNxvO038", "parentPublication": { "id": "proceedings/icde/2017/6543/0", "title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1998/9176/0/91760051", "title": "Visualization of Scalar Topology for Structural Enhancement", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760051/12OmNzVoBtU", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875976", "title": "Multiscale Symmetry Detection in Scalar Fields by Clustering Contours", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875976/13rRUEgarBw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2003/02/v0206", "title": "GraphSplatting: Visualizing Graphs as Continuous Fields", "doi": null, "abstractUrl": "/journal/tg/2003/02/v0206/13rRUwj7cp1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/11/ttg2013111948", "title": "Visualizing the Variability of Gradients in Uncertain 2D Scalar Fields", "doi": null, "abstractUrl": "/journal/tg/2013/11/ttg2013111948/13rRUy0qnGm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011121842", "title": "Topological Spines: A Structure-preserving Visual Representation of Scalar Fields", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011121842/13rRUygT7mU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061475", "title": "Interactive Comparison of Scalar Fields Based on Largest Contours with Applications to Flow Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061475/13rRUyuegp2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08667696", "title": "Stippling of 2D Scalar Fields", "doi": null, "abstractUrl": "/journal/tg/2019/06/08667696/18q6oNdp5cs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwHQB7U", "doi": "10.1109/PACIFICVIS.2015.7156358", "title": "Laplacian-based dynamic graph visualization", "normalizedTitle": "Laplacian-based dynamic graph visualization", "abstract": "Visualizing dynamic graphs are challenging due to the difficulty to preserving a coherent mental map of the changing graphs. In this paper, we propose a novel layout algorithm which is capable of maintaining the overall structure of a sequence graphs. Through Laplacian constrained distance embedding, our method works online and maintains the aesthetic of individual graphs and the shape similarity between adjacent graphs in the sequence. By preserving the shape of the same graph components across different time steps, our method can effectively help users track and gain insights into the graph changes. Two datasets are tested to demonstrate the effectiveness of our algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Visualizing dynamic graphs are challenging due to the difficulty to preserving a coherent mental map of the changing graphs. In this paper, we propose a novel layout algorithm which is capable of maintaining the overall structure of a sequence graphs. Through Laplacian constrained distance embedding, our method works online and maintains the aesthetic of individual graphs and the shape similarity between adjacent graphs in the sequence. By preserving the shape of the same graph components across different time steps, our method can effectively help users track and gain insights into the graph changes. Two datasets are tested to demonstrate the effectiveness of our algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualizing dynamic graphs are challenging due to the difficulty to preserving a coherent mental map of the changing graphs. In this paper, we propose a novel layout algorithm which is capable of maintaining the overall structure of a sequence graphs. Through Laplacian constrained distance embedding, our method works online and maintains the aesthetic of individual graphs and the shape similarity between adjacent graphs in the sequence. By preserving the shape of the same graph components across different time steps, our method can effectively help users track and gain insights into the graph changes. Two datasets are tested to demonstrate the effectiveness of our algorithm.", "fno": "07156358", "keywords": [ "Layout", "Heuristic Algorithms", "Shape", "Visualization", "Collaboration", "Animation", "Force", "Stress Model", "Dynamic Graph", "Graph Layout Algorithm", "Laplican Matrix", "Force Directed Layout" ], "authors": [ { "affiliation": "Baidu, Inc, China", "fullName": "Limei Che", "givenName": "Limei", "surname": "Che", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception, (Ministry of Education), and School of EECS, Peking University, China", "fullName": "Jie Liang", "givenName": null, "surname": "Jie Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception, (Ministry of Education), and School of EECS, Peking University, China", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Baidu, Inc, China", "fullName": "Jianping Shen", "givenName": null, "surname": "Jianping Shen", "__typename": "ArticleAuthorType" }, { "affiliation": "Baidu, Inc, China", "fullName": "Jinquan Xu", "givenName": null, "surname": "Jinquan Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Baidu, Inc, China", "fullName": "Yong Li", "givenName": null, "surname": "Yong Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "69-73", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156357", "articleId": "12OmNrFTr4v", "__typename": "AdjacentArticleType" }, "next": { "fno": "07156359", "articleId": "12OmNwK7o9E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2016/8942/0/8942a001", "title": "Isoline-Enhanced Dynamic Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a001/12OmNBTJIGQ", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2012/0852/0/06344514", "title": "Rapid Serial Visual Presentation in dynamic graph visualization", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2012/06344514/12OmNxYL5fe", "parentPublication": { "id": "proceedings/vlhcc/2012/0852/0", "title": "2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031607", "title": "dNNG: Quality metrics and layout for neighbourhood faithfulness", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031607/12OmNxvwoZW", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a230", "title": "Dynamic Graph Visualization on Different Temporal Granularities", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a230/12OmNzxPTGk", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/08/06636295", "title": "Bundled Visualization of DynamicGraph and Trail Data", "doi": null, "abstractUrl": "/journal/tg/2014/08/06636295/13rRUwd9CG3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/04/ttg2008040727", "title": "Online Dynamic Graph Drawing", "doi": null, "abstractUrl": "/journal/tg/2008/04/ttg2008040727/13rRUxBJhvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07352369", "title": "Visualizing Dynamic Hierarchies in Graph Sequences", "doi": null, "abstractUrl": "/journal/tg/2016/10/07352369/13rRUzp02os", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/07/08580419", "title": "Event-Based Dynamic Graph Visualisation", "doi": null, "abstractUrl": "/journal/tg/2020/07/08580419/17D45WK5Amw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a051", "title": "dGG, dRNG, DSC: New Degree-based Shape-based Faithfulness Metrics for Large and Complex Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a051/1E2wj8PptTi", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047320", "title": "Research on Dynamic Graph Layout by Parallel Computing and Markov Process", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047320/1iC6u9JRT2w", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdDFD0", "title": "2014 ACM/IEEE International Workshop on System Level Interconnect Prediction (SLIP)", "acronym": "slip", "groupId": "1800746", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNz4Bdun", "doi": "", "title": "Range-based dynamic routing of hierarchical on chip network traffic", "normalizedTitle": "Range-based dynamic routing of hierarchical on chip network traffic", "abstract": "In this paper, we propose a technique for dynamically routing packets within a hierarchical network on chip (NoC). The concept of a local router range (analogous to other forms of locality awareness) determines on which hierarchy level a packet should be routed. In previous work, the degree of this locality awareness was static and uniform across the entire network. This paper shows that, using a decentralized control mechanism, a single network node can estimate the value and variation in network-wide instantaneous average throughput and delay. Utilizing this ability in a control algorithm, we evaluate the effect of dynamic locality awareness at each network node and show overall throughput:delay ratio increases up to 3.42× that of unoptimized hierarchical networks.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a technique for dynamically routing packets within a hierarchical network on chip (NoC). The concept of a local router range (analogous to other forms of locality awareness) determines on which hierarchy level a packet should be routed. In previous work, the degree of this locality awareness was static and uniform across the entire network. This paper shows that, using a decentralized control mechanism, a single network node can estimate the value and variation in network-wide instantaneous average throughput and delay. Utilizing this ability in a control algorithm, we evaluate the effect of dynamic locality awareness at each network node and show overall throughput:delay ratio increases up to 3.42× that of unoptimized hierarchical networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a technique for dynamically routing packets within a hierarchical network on chip (NoC). The concept of a local router range (analogous to other forms of locality awareness) determines on which hierarchy level a packet should be routed. In previous work, the degree of this locality awareness was static and uniform across the entire network. This paper shows that, using a decentralized control mechanism, a single network node can estimate the value and variation in network-wide instantaneous average throughput and delay. Utilizing this ability in a control algorithm, we evaluate the effect of dynamic locality awareness at each network node and show overall throughput:delay ratio increases up to 3.42× that of unoptimized hierarchical networks.", "fno": "06886040", "keywords": [ "Topology", "Throughput", "Routing", "Network Topology", "Delays", "Heuristic Algorithms", "Runtime" ], "authors": [ { "affiliation": "Electrical and Computer Engineering Department, Drexel University, Philadelphia, Pennsylvania 19104, USA", "fullName": "Julian Kemmerer", "givenName": "Julian", "surname": "Kemmerer", "__typename": "ArticleAuthorType" }, { "affiliation": "Electrical and Computer Engineering Department, Drexel University, Philadelphia, Pennsylvania 19104, USA", "fullName": "Baris Taskin", "givenName": "Baris", "surname": "Taskin", "__typename": "ArticleAuthorType" } ], "idPrefix": "slip", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2014", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06886038", "articleId": "12OmNqJZgLL", "__typename": "AdjacentArticleType" }, "next": { "fno": "06886039", "articleId": "12OmNyPQ4T1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpca/2009/2932/0/04798252", "title": "Design and evaluation of a hierarchical on-chip interconnect for next-generation CMPs", "doi": null, "abstractUrl": "/proceedings-article/hpca/2009/04798252/12OmNCcbE9x", "parentPublication": { "id": "proceedings/hpca/2009/2932/0", "title": "2009 IEEE 15th International Symposium on High Performance Computer Architecture", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2016/5142/0/07753330", "title": "Energy aware routing of multi-level Network-on-Chip traffic", "doi": null, "abstractUrl": "/proceedings-article/iccd/2016/07753330/12OmNqN6R2Z", "parentPublication": { "id": "proceedings/iccd/2016/5142/0", "title": "2016 IEEE 34th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2014/1845/0/1845a056", "title": "Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network", "doi": null, "abstractUrl": "/proceedings-article/acsat/2014/1845a056/12OmNwErpVQ", "parentPublication": { "id": "proceedings/acsat/2014/1845/0", "title": "2014 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nocs/2012/4677/0/4677a083", "title": "Hierarchical Network-on-Chip and Traffic Compression for Spiking Neural Network Implementations", "doi": null, "abstractUrl": "/proceedings-article/nocs/2012/4677a083/12OmNxA3Z4h", "parentPublication": { "id": "proceedings/nocs/2012/4677/0", "title": "Networks-on-Chip, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2015/8795/0/07498055", "title": "Traffic-aware compatible controller deployment", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2015/07498055/12OmNyqiaQG", "parentPublication": { "id": "proceedings/chinacom/2015/8795/0", "title": "2015 10th International Conference on Communications and Networking in China (ChinaCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-css-icess/2014/6123/0/07056723", "title": "HSR: Hierarchical Source Routing Model for Network-on-Chip", "doi": null, "abstractUrl": "/proceedings-article/hpcc-css-icess/2014/07056723/12OmNyvGyiQ", "parentPublication": { "id": "proceedings/hpcc-css-icess/2014/6123/0", "title": "2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2013/12/ttd2013122451", "title": "Scalable Hierarchical Network-on-Chip Architecture for Spiking Neural Network Hardware Implementations", "doi": null, "abstractUrl": "/journal/td/2013/12/ttd2013122451/13rRUwkfAYV", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047356", "title": "DATRA: A Power-Aware Dynamic Adaptive Threshold Routing Algorithm for Dragonfly Network-on-Chip Topology", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047356/1iC6uhuInnO", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139842", "title": "DELTA: Distributed Locality-Aware Cache Partitioning for Tile-based Chip Multiprocessors", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139842/1lss6vsDbfa", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtcsa/2020/4403/0/09203662", "title": "ILP-Based Routing and Scheduling of Multicast Realtime Traffic in Time-Sensitive Networks", "doi": null, "abstractUrl": "/proceedings-article/rtcsa/2020/09203662/1nkD8yVmuic", "parentPublication": { "id": "proceedings/rtcsa/2020/4403/0", "title": "2020 IEEE 26th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cJ6WsGCn96", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1cJ6YlaGtAA", "doi": "10.1109/VAST.2018.8802392", "title": "Visual Analysis for Subgroups in a Dynamic Network", "normalizedTitle": "Visual Analysis for Subgroups in a Dynamic Network", "abstract": "The VAST 2018 company communication dataset reflects current challenges in analyzing specific sub-group within a large dynamic network. We apply multiple visual analytic techniques. This also includes a traceability system, a custom visualization tool enable tracing a focused group on multivariate dynamic networks. We manage to tackle the tasks of abstracting group structural features and discovering other groups tied closely.", "abstracts": [ { "abstractType": "Regular", "content": "The VAST 2018 company communication dataset reflects current challenges in analyzing specific sub-group within a large dynamic network. We apply multiple visual analytic techniques. This also includes a traceability system, a custom visualization tool enable tracing a focused group on multivariate dynamic networks. We manage to tackle the tasks of abstracting group structural features and discovering other groups tied closely.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The VAST 2018 company communication dataset reflects current challenges in analyzing specific sub-group within a large dynamic network. We apply multiple visual analytic techniques. This also includes a traceability system, a custom visualization tool enable tracing a focused group on multivariate dynamic networks. We manage to tackle the tasks of abstracting group structural features and discovering other groups tied closely.", "fno": "08802392", "keywords": [ "Data Analysis", "Data Visualisation", "Visual Analysis", "Dynamic Network", "VAST 2018 Company Communication Dataset", "Multiple Visual Analytic Techniques", "Traceability System", "Multivariate Dynamic Networks", "Group Structural Features", "Visualization Tool", "Companies", "Visual Analytics", "Data Visualization", "Security", "Task Analysis", "Image Color Analysis", "Animation", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Visual Analytics" ], "authors": [ { "affiliation": "Sky Eye Lab, 360 Enterprise Security Corp., Endpoint Security, Inc.", "fullName": "Qi Ma", "givenName": "Qi", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Sky Eye Lab, 360 Enterprise Security Corp., Endpoint Security, Inc.", "fullName": "Xueshi Wei", "givenName": "Xueshi", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University", "fullName": "Liwenhan Xie", "givenName": "Liwenhan", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University", "fullName": "Zhiyi Yin", "givenName": "Zhiyi", "surname": "Yin", "__typename": "ArticleAuthorType" }, { "affiliation": "Sky Eye Lab, 360 Enterprise Security Corp., Endpoint Security, Inc.", "fullName": "Yiping Liu", "givenName": "Yiping", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Sky Eye Lab, 360 Enterprise Security Corp., Endpoint Security, Inc.", "fullName": "Chuanming Huang", "givenName": "Chuanming", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), and School of EECS, Peking University", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "106-107", "year": "2018", "issn": null, "isbn": "978-1-5386-6861-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08802502", "articleId": "1cJ6YgVgISI", "__typename": "AdjacentArticleType" }, "next": { "fno": "08802457", "articleId": "1cJ6YACp4sg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2016/5661/0/07883520", "title": "Visual analysis and coding of data-rich user behavior", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883520/12OmNzXFoyS", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/08/08017630", "title": "Wavelet-Based Visual Analysis of Dynamic Networks", "doi": null, "abstractUrl": "/journal/tg/2018/08/08017630/13rRUwInuWy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192717", "title": "Reducing Snapshots to Points: A Visual Analytics Approach to Dynamic Network Exploration", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192717/13rRUyp7tWY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443131", "title": "Vulnus: Visual Vulnerability Analysis for Network Security", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443131/17D45WIXbOh", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807220", "title": "Visual Analysis of High-Dimensional Event Sequence Data via Dynamic Hierarchical Aggregation", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807220/1cG6bfa8KkM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802426", "title": "A Visualization Study on Visual Analysis to Explore the Organizational Structure of the Group Within a Factory", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802426/1cJ6Y8E3XI4", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802457", "title": "TimeMatrix: Visual Representation for Temporal Pattern Detection in Dynamic Networks, VAST 2018 Mini-Challenge 3", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802457/1cJ6YACp4sg", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802447", "title": "Visual Bird Watcher: Interactive Visual Analysis on Bird Distribution and Migration", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802447/1cJ6YMmczXG", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802397", "title": "They do Move! Visual Analytics of Rose-Crested Blue Pipit Habitat", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802397/1cJ6YpdBSzC", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222072", "title": "Multiscale Snapshots: Visual Analysis of Temporal Summaries in Dynamic Graphs", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222072/1nTqwNTE1AQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmjHZJFxXa", "doi": "10.1109/ICPR48806.2021.9412177", "title": "On Morphological Hierarchies for Image Sequences", "normalizedTitle": "On Morphological Hierarchies for Image Sequences", "abstract": "Morphological hierarchies form a popular framework aiming at emphasizing the multiscale structure of digital image by performing an unsupervised spatial partitioning of the data. These hierarchies have been recently extended to cope with image sequences, and different strategies have been proposed to allow their construction from spatio-temporal data. In this paper, we compare these hierarchical representation strategies for image sequences according to their structural properties. We introduce a projection method to make these representations comparable. Furthermore, we extend one of these recent strategies in order to obtain more efficient hierarchical representations for image sequences. Experiments were conducted on both synthetic and real datasets, the latter being made of satellite image time series. We show that building one hierarchy by using spatial and temporal information together is more efficient comparing to other existing strategies.", "abstracts": [ { "abstractType": "Regular", "content": "Morphological hierarchies form a popular framework aiming at emphasizing the multiscale structure of digital image by performing an unsupervised spatial partitioning of the data. These hierarchies have been recently extended to cope with image sequences, and different strategies have been proposed to allow their construction from spatio-temporal data. In this paper, we compare these hierarchical representation strategies for image sequences according to their structural properties. We introduce a projection method to make these representations comparable. Furthermore, we extend one of these recent strategies in order to obtain more efficient hierarchical representations for image sequences. Experiments were conducted on both synthetic and real datasets, the latter being made of satellite image time series. We show that building one hierarchy by using spatial and temporal information together is more efficient comparing to other existing strategies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Morphological hierarchies form a popular framework aiming at emphasizing the multiscale structure of digital image by performing an unsupervised spatial partitioning of the data. These hierarchies have been recently extended to cope with image sequences, and different strategies have been proposed to allow their construction from spatio-temporal data. In this paper, we compare these hierarchical representation strategies for image sequences according to their structural properties. We introduce a projection method to make these representations comparable. Furthermore, we extend one of these recent strategies in order to obtain more efficient hierarchical representations for image sequences. Experiments were conducted on both synthetic and real datasets, the latter being made of satellite image time series. We show that building one hierarchy by using spatial and temporal information together is more efficient comparing to other existing strategies.", "fno": "09412177", "keywords": [ "Artificial Satellites", "Image Representation", "Image Sequences", "Time Series", "Morphological Hierarchies", "Image Sequences", "Digital Image", "Unsupervised Spatial Partitioning", "Spatio Temporal Data", "Hierarchical Representation Strategies", "Satellite Image Time Series", "Satellites", "Filtering", "Digital Images", "Time Series Analysis", "Image Sequence Analysis", "Gray Scale", "Image Sequences" ], "authors": [ { "affiliation": "Université Bretagne Sud, IRISA,Vannes,France", "fullName": "Caglayan Tuna", "givenName": "Caglayan", "surname": "Tuna", "__typename": "ArticleAuthorType" }, { "affiliation": "CNES,Toulouse,France", "fullName": "Alain Giros", "givenName": "Alain", "surname": "Giros", "__typename": "ArticleAuthorType" }, { "affiliation": "Université Bretagne Sud, IRISA,Vannes,France", "fullName": "François Merciol", "givenName": "François", "surname": "Merciol", "__typename": "ArticleAuthorType" }, { "affiliation": "Université Bretagne Sud, IRISA,Vannes,France", "fullName": "Sébastien Lefèvre", "givenName": "Sébastien", "surname": "Lefèvre", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "6235-6242", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412077", "articleId": "1tmjLVFUEuI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412469", "articleId": "1tmjCaznjTG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/esiat/2009/3682/2/3682b365", "title": "Automatic Matching of Infrared Image Sequences Based on Rotation Invariant", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682b365/12OmNAoUTdA", "parentPublication": { "id": "esiat/2009/3682/2", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2009/3899/0/3899a366", "title": "Hierarchical Reconstruction on Image Sequences under Occluded Condition", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a366/12OmNBZpHby", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2011/4541/0/4541a244", "title": "Fusion Algorithm for Infrared-Visual Image Sequences", "doi": null, "abstractUrl": "/proceedings-article/icig/2011/4541a244/12OmNs0TL0I", "parentPublication": { "id": "proceedings/icig/2011/4541/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2006/2542/0/25420027", "title": "Evaluation of Colour Image Segmentation Hierarchies", "doi": null, "abstractUrl": "/proceedings-article/crv/2006/25420027/12OmNs59JU8", "parentPublication": { "id": "proceedings/crv/2006/2542/0", "title": "The 3rd Canadian Conference on Computer and Robot Vision (CRV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1991/2148/0/00139703", "title": "Temporal slice analysis of image sequences", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1991/00139703/12OmNvmG7X4", "parentPublication": { "id": "proceedings/cvpr/1991/2148/0", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2000/0878/0/08780276", "title": "Image Decomposition in Morphological Residues: An Approach for Image Filtering and Segmentation", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2000/08780276/12OmNwCJOPG", "parentPublication": { "id": "proceedings/sibgrapi/2000/0878/0", "title": "Proceedings 13th Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00878)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323935", "title": "Integration of transitory image sequences", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323935/12OmNwKGAqw", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2008/3278/0/3278a414", "title": "Automatic Target Detection and Tracking in FLIR Image Sequences Using Morphological Connected Operator", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2008/3278a414/12OmNzIUfT8", "parentPublication": { "id": "proceedings/iih-msp/2008/3278/0", "title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1991/04/i0307", "title": "Hierarchical Image Analysis Using Irregular Tessellations", "doi": null, "abstractUrl": "/journal/tp/1991/04/i0307/13rRUILtJrU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1995/04/k0609", "title": "Symbolic Description and Visual Querying of Image Sequences Using Spatio-Temporal Logic", "doi": null, "abstractUrl": "/journal/tk/1995/04/k0609/13rRUxZRboj", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxG1yTG", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNAle6sT", "doi": "10.1109/CVPR.1992.223235", "title": "Uncertain views", "normalizedTitle": "Uncertain views", "abstract": "The possibility that what we do not know about the world can be used to guide the way in which they explore it is raised. The authors previously hypothesized that the spatial structure of uncertainty can be used to guide the acquisition of additional data in a way that significantly improves knowledge of a scene. An exploration strategy based on the hypothesis is constructed, and experimental results which verified that it works are presented. Conditions which cause it to break down are studied. The results indicate that there are inherent degeneracies in certain data configurations, but that the authors' strategy can navigate these areas successfully.<>", "abstracts": [ { "abstractType": "Regular", "content": "The possibility that what we do not know about the world can be used to guide the way in which they explore it is raised. The authors previously hypothesized that the spatial structure of uncertainty can be used to guide the acquisition of additional data in a way that significantly improves knowledge of a scene. An exploration strategy based on the hypothesis is constructed, and experimental results which verified that it works are presented. Conditions which cause it to break down are studied. The results indicate that there are inherent degeneracies in certain data configurations, but that the authors' strategy can navigate these areas successfully.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The possibility that what we do not know about the world can be used to guide the way in which they explore it is raised. The authors previously hypothesized that the spatial structure of uncertainty can be used to guide the acquisition of additional data in a way that significantly improves knowledge of a scene. An exploration strategy based on the hypothesis is constructed, and experimental results which verified that it works are presented. Conditions which cause it to break down are studied. The results indicate that there are inherent degeneracies in certain data configurations, but that the authors' strategy can navigate these areas successfully.", "fno": "00223235", "keywords": [ "Image Recognition", "Uncertainty Handling", "Wooden Mannequin Image", "Surface Predictors", "Superellipsoid Models", "Sampled Prediction Error", "Improvement Hypothesis", "Spatial Structure", "Exploration Strategy", "Degeneracies", "Data Configurations", "Layout", "Equations", "Shape Control", "Machine Intelligence", "Uncertainty", "Navigation", "Laser Modes", "Rotation Measurement", "Coordinate Measuring Machines", "Maximum Likelihood Estimation" ], "authors": [ { "affiliation": "McGill Res. Center for Intelligent Machines, McGill Univ., Montreal, Que., Canada", "fullName": "P. Whaite", "givenName": "P.", "surname": "Whaite", "__typename": "ArticleAuthorType" }, { "affiliation": "McGill Res. Center for Intelligent Machines, McGill Univ., Montreal, Que., Canada", "fullName": "F.P. Ferrie", "givenName": "F.P.", "surname": "Ferrie", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "3,4,5,6,7,8,9", "year": "1992", "issn": "1063-6919", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00223234", "articleId": "12OmNzZWbI7", "__typename": "AdjacentArticleType" }, "next": { "fno": "00223236", "articleId": "12OmNxd4tzD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/rvsp/2013/3184/0/3184a242", "title": "Camera Based 3D Probe Control in Measuring Gear Profile", "doi": null, "abstractUrl": "/proceedings-article/rvsp/2013/3184a242/12OmNrJAdKG", "parentPublication": { "id": "proceedings/rvsp/2013/3184/0", "title": "2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576362", "title": "Optimal registration of multiple range views", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576362/12OmNwJgAJq", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2004/2131/0/01342773", "title": "CodeCrawler - polymetric views in action", "doi": null, "abstractUrl": "/proceedings-article/ase/2004/01342773/12OmNzmclre", "parentPublication": { "id": "proceedings/ase/2004/2131/0", "title": "Proceedings. 19th International Conference on Automated Software Engineering, 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1978/12/01675020", "title": "An Efficient Coordinate Rotation Algorithm", "doi": null, "abstractUrl": "/journal/tc/1978/12/01675020/13rRUB6SpZg", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2012/09/ttc2012091296", "title": "Progressive Congestion Management Based on Packet Marking and Validation Techniques", "doi": null, "abstractUrl": "/journal/tc/2012/09/ttc2012091296/13rRUwwaKso", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2006/2728/0/04031883", "title": "Variables Interaction for Mining Negative and Positive Quantitative Association Rules", "doi": null, "abstractUrl": "/proceedings-article/ictai/2006/04031883/17QjJdmePBK", "parentPublication": { "id": "proceedings/ictai/2006/2728/0", "title": "2006 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvisp/2021/0770/0/077000a229", "title": "The Measuring Method of Obtaining Dynamic Geometric Parameters of Precision Moving Parts", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2021/077000a229/1APq87PbQxW", "parentPublication": { "id": "proceedings/icvisp/2021/0770/0", "title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a501", "title": "DV-Hop Localization Algorithm Based on RSSI Hop Number Correction and Improved Artificial Immune Algorithm Optimization", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a501/1cI6p9miuzu", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a443", "title": "Research on AVC Integrated Control Strategy of Power Grid Condenser Based on Hierarchical Access", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a443/1t2nlxNZuw0", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E301", "title": "Rotation Coordinate Descent for Fast Globally Optimal Rotation Averaging", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E301/1yeKW0qo5r2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwkhTjh", "title": "The Twenty-Third Southeastern Symposium on System Theory", "acronym": "ssst", "groupId": "1000732", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNBTs7Fx", "doi": "10.1109/SSST.1991.138520", "title": "Decomposition of the camera calibration matrix", "normalizedTitle": "Decomposition of the camera calibration matrix", "abstract": "Two topics related to camera calibration are discussed. First, a novel system is designed, using a sonic digitizer, to automate the measurement of corresponding 3D object points and 2D image points for use in camera calibration. Second, the calibration matrix, which is estimated during camera calibration, is decomposed into the ten geometric parameters that define the standard pinhole camera model, and an eleventh parameter.<>", "abstracts": [ { "abstractType": "Regular", "content": "Two topics related to camera calibration are discussed. First, a novel system is designed, using a sonic digitizer, to automate the measurement of corresponding 3D object points and 2D image points for use in camera calibration. Second, the calibration matrix, which is estimated during camera calibration, is decomposed into the ten geometric parameters that define the standard pinhole camera model, and an eleventh parameter.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Two topics related to camera calibration are discussed. First, a novel system is designed, using a sonic digitizer, to automate the measurement of corresponding 3D object points and 2D image points for use in camera calibration. Second, the calibration matrix, which is estimated during camera calibration, is decomposed into the ten geometric parameters that define the standard pinhole camera model, and an eleventh parameter.", "fno": "00138520", "keywords": [ "Calibration", "Cameras", "Computer Vision", "Matrix Algebra", "Optical Variables Measurement", "Picture Processing", "Decomposition", "Computer Vision", "Picture Processing", "Camera Calibration Matrix", "Sonic Digitizer", "3 D Object Points", "2 D Image Points", "Geometric Parameters", "Pinhole Camera Model", "Cameras", "Calibration", "Matrix Decomposition", "Sparks", "Computer Interfaces", "Coordinate Measuring Machines", "Delay", "Application Software", "Image Sensors", "Acoustic Sensors" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., South Carolina Univ., Columbia, SC, USA", "fullName": "J. Labuz", "givenName": "J.", "surname": "Labuz", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., South Carolina Univ., Columbia, SC, USA", "fullName": "M. Thaker", "givenName": "M.", "surname": "Thaker", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., South Carolina Univ., Columbia, SC, USA", "fullName": "B. Venkateswaran", "givenName": "B.", "surname": "Venkateswaran", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "89,90,91,92,93", "year": "1991", "issn": "0094-2898", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00138519", "articleId": "12OmNyPQ4Oe", "__typename": "AdjacentArticleType" }, "next": { "fno": "00138522", "articleId": "12OmNviHKhs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visapp/2014/8133/3/07295121", "title": "Hand-eye calibration with a depth camera: 2D or 3D?", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295121/12OmNB1wkJK", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/1995/7190/0/71900169", "title": "Dynamic camera calibration", "doi": null, "abstractUrl": "/proceedings-article/iscv/1995/71900169/12OmNwl8GCC", "parentPublication": { "id": "proceedings/iscv/1995/7190/0", "title": "Computer Vision, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209a184", "title": "Generalized Radial Alignment Constraint for Camera Calibration", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a184/12OmNwnYG1M", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1993/3870/0/00378183", "title": "A complete two-plane camera calibration method and experimental comparisons", "doi": null, "abstractUrl": "/proceedings-article/iccv/1993/00378183/12OmNxGSmae", "parentPublication": { "id": "proceedings/iccv/1993/3870/0", "title": "1993 (4th) International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00220033", "title": "Linear camera calibration", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00220033/12OmNyLiuwo", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2004/2159/3/215930038", "title": "Constraints for Heterogeneous Sensor Auto-Calibration", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2004/215930038/12OmNzb7Zui", "parentPublication": { "id": "proceedings/cvprw/2004/2159/3", "title": "2004 Conference on Computer Vision and Pattern Recognition Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/05/i0469", "title": "Implicit and Explicit Camera Calibration: Theory and Experiments", "doi": null, "abstractUrl": "/journal/tp/1994/05/i0469/13rRUxYIN5d", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1990/07/i0663", "title": "A Unified Approach to the Linear Camera Calibration Problem", "doi": null, "abstractUrl": "/journal/tp/1990/07/i0663/13rRUyfbwrH", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412816", "title": "Calibration and Absolute Pose Estimation of Trinocular Linear Camera Array for Smart City Applications", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412816/1tmj0ExpWdG", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscipt/2021/4137/0/413700a388", "title": "A Space Joint calibration method for lidar and camera on self-driving car and its experimental verification", "doi": null, "abstractUrl": "/proceedings-article/iscipt/2021/413700a388/1zzpBbddG6s", "parentPublication": { "id": "proceedings/iscipt/2021/4137/0", "title": "2021 6th International Symposium on Computer and Information Processing Technology (ISCIPT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8wTfL", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwFid0F", "doi": "10.1109/ICPR.2008.4760981", "title": "Efficient triangulation based on 3D Euclidean optimization", "normalizedTitle": "Efficient triangulation based on 3D Euclidean optimization", "abstract": "This paper presents a method for triangulation of 3D points given their projections in two images. Recent results show that the triangulation mapping can be represented as a linear operator K applied to the outer product of corresponding homogeneous image coordinates, leading to a triangulation of very low computational complexity. K can be determined from the camera matrices, together with a so-called blind plane, but we show here that it can be further refined by a process similar to gold standard methods for camera matrix estimation. In particular, it is demonstrated that K can be adjusted to minimize the Euclidean L1 residual 3D error, bringing it down to the same level as the optimal triangulation by Hartley and Sturm. The resulting K optimally fits a set of 2D+2D+3D data where the error is measured in the 3D space. Assuming that this calibration set is representative for a particular application, where later only the 2D points are known, this K can be used for triangulation of 3D points in an optimal way, which in addition is very efficient since the optimization need only be made once for the point set. The refinement of K is made by iteratively reducing errors in the 3D and 2D domains, respectively. Experiments on real data suggests that very few iterations are needed to accomplish useful results.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a method for triangulation of 3D points given their projections in two images. Recent results show that the triangulation mapping can be represented as a linear operator K applied to the outer product of corresponding homogeneous image coordinates, leading to a triangulation of very low computational complexity. K can be determined from the camera matrices, together with a so-called blind plane, but we show here that it can be further refined by a process similar to gold standard methods for camera matrix estimation. In particular, it is demonstrated that K can be adjusted to minimize the Euclidean L1 residual 3D error, bringing it down to the same level as the optimal triangulation by Hartley and Sturm. The resulting K optimally fits a set of 2D+2D+3D data where the error is measured in the 3D space. Assuming that this calibration set is representative for a particular application, where later only the 2D points are known, this K can be used for triangulation of 3D points in an optimal way, which in addition is very efficient since the optimization need only be made once for the point set. The refinement of K is made by iteratively reducing errors in the 3D and 2D domains, respectively. Experiments on real data suggests that very few iterations are needed to accomplish useful results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a method for triangulation of 3D points given their projections in two images. Recent results show that the triangulation mapping can be represented as a linear operator K applied to the outer product of corresponding homogeneous image coordinates, leading to a triangulation of very low computational complexity. K can be determined from the camera matrices, together with a so-called blind plane, but we show here that it can be further refined by a process similar to gold standard methods for camera matrix estimation. In particular, it is demonstrated that K can be adjusted to minimize the Euclidean L1 residual 3D error, bringing it down to the same level as the optimal triangulation by Hartley and Sturm. The resulting K optimally fits a set of 2D+2D+3D data where the error is measured in the 3D space. Assuming that this calibration set is representative for a particular application, where later only the 2D points are known, this K can be used for triangulation of 3D points in an optimal way, which in addition is very efficient since the optimization need only be made once for the point set. The refinement of K is made by iteratively reducing errors in the 3D and 2D domains, respectively. Experiments on real data suggests that very few iterations are needed to accomplish useful results.", "fno": "04760981", "keywords": [ "Computational Complexity", "Computational Geometry", "Image Reconstruction", "Iterative Methods", "Mathematical Operators", "Matrix Algebra", "Optimisation", "Stereo Image Processing", "Triangulation Mapping", "3 D Euclidean Optimization", "Linear Operator", "Computational Complexity", "Blind Plane", "Gold Standard Method", "Camera Matrix Estimation", "Iterative Method", "Stereo Image Processing", "Image Reconstruction", "Cameras", "Gold", "Calibration", "Optimization Methods", "Computer Vision", "Laboratories", "Computational Complexity", "Coordinate Measuring Machines", "Measurement Errors", "Minimization Methods" ], "authors": [ { "affiliation": "Computer Vision Laboratory, Linköping University, Sweden", "fullName": "Klas Nordberg", "givenName": "Klas", "surname": "Nordberg", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "1051-4651", "isbn": "978-1-4244-2174-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04760980", "articleId": "12OmNrFTr7d", "__typename": "AdjacentArticleType" }, "next": { "fno": "04760982", "articleId": "12OmNqJq4o1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2000/0662/1/06621332", "title": "Image-Consistent Surface Triangulation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2000/06621332/12OmNAYXWDl", "parentPublication": { "id": "proceedings/cvpr/2000/0662/1", "title": "Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visapp/2014/8133/3/07295121", "title": "Hand-eye calibration with a depth camera: 2D or 3D?", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295121/12OmNB1wkJK", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa/2011/4428/0/4428a052", "title": "A Parallel 3D Delaunay Triangulation Method", "doi": null, "abstractUrl": "/proceedings-article/ispa/2011/4428a052/12OmNrIaehr", "parentPublication": { "id": "proceedings/ispa/2011/4428/0", "title": "International Symposium on Parallel and Distributed Processing with Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icia/2006/0528/0/04097782", "title": "A Novel Double Triangulation 3D Camera Design", "doi": null, "abstractUrl": "/proceedings-article/icia/2006/04097782/12OmNvSKNBp", "parentPublication": { "id": "proceedings/icia/2006/0528/0", "title": "2006 International Conference on Information Acquisition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccrd/2010/4043/0/4043a326", "title": "Delaunay Triangulation Based Three Dimensional Anatomical Facial Reconstruction from 2D CT Slices", "doi": null, "abstractUrl": "/proceedings-article/iccrd/2010/4043a326/12OmNvTk00T", "parentPublication": { "id": "proceedings/iccrd/2010/4043/0", "title": "Computer Research and Development, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07299079", "title": "LMI-based 2D-3D registration: From uncalibrated images to Euclidean scene", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07299079/12OmNx8wTu0", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visapp/2014/8133/1/07294792", "title": "A combined calibration of 2D and 3D sensors a novel calibration for laser triangulation sensors based on point correspondences", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07294792/12OmNy50ghm", "parentPublication": { "id": "proceedings/visapp/2014/8133/1", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300m2630", "title": "Multiview 2D/3D Rigid Registration via a Point-Of-Interest Network for Tracking and Triangulation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300m2630/1gyrjtA8Mvu", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300h717", "title": "Learnable Triangulation of Human Pose", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300h717/1hVlLjR0Chq", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412816", "title": "Calibration and Absolute Pose Estimation of Trinocular Linear Camera Array for Smart City Applications", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412816/1tmj0ExpWdG", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgonZRd1ZK", "title": "2010 Second World Congress on Software Engineering", "acronym": "wcse", "groupId": "1002945", "volume": "1", "displayVolume": "1", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNyGbI7d", "doi": "10.1109/WCSE.2010.108", "title": "Utilization of DLT Theory in 2D Image Analysis System", "normalizedTitle": "Utilization of DLT Theory in 2D Image Analysis System", "abstract": "This paper analyzed several mistakes in the traditional 2D analytic theories and then introduced in detail a new method basing on DLT theory from two aspects: the foundation stone of new 2D analytic theories, program design, and also utilized a direct inspection method to analyze the errors between the new method and the old one. The results showed that new method could obtain more accurate than the traditional one.", "abstracts": [ { "abstractType": "Regular", "content": "This paper analyzed several mistakes in the traditional 2D analytic theories and then introduced in detail a new method basing on DLT theory from two aspects: the foundation stone of new 2D analytic theories, program design, and also utilized a direct inspection method to analyze the errors between the new method and the old one. The results showed that new method could obtain more accurate than the traditional one.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper analyzed several mistakes in the traditional 2D analytic theories and then introduced in detail a new method basing on DLT theory from two aspects: the foundation stone of new 2D analytic theories, program design, and also utilized a direct inspection method to analyze the errors between the new method and the old one. The results showed that new method could obtain more accurate than the traditional one.", "fno": "4303a279", "keywords": [ "Image Motion Analysis", "DLT Theory", "2 D Image Analysis System", "Program Design", "Direct Inspection Method", "Coordinate Measuring Machines", "Joints", "Measurement Uncertainty", "Cameras", "Calibration", "Three Dimensional Displays", "Inspection", "2 D Analytic System", "DLT", "Camera Frame" ], "authors": [ { "affiliation": "Health Inst., Wuhan Inst. of Phys. Educ., Wuhan, China", "fullName": "Kaixiang Bai", "givenName": "Kaixiang", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "Health Inst., Wuhan Inst. of Phys. Educ., Wuhan, China", "fullName": "Cheng Yin", "givenName": "Cheng", "surname": "Yin", "__typename": "ArticleAuthorType" }, { "affiliation": "Health Inst., Wuhan Inst. of Phys. Educ., Wuhan, China", "fullName": "Liu Qin", "givenName": "Liu", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Health Inst., Wuhan Inst. of Phys. Educ., Wuhan, China", "fullName": "Gao Ming", "givenName": "Gao", "surname": "Ming", "__typename": "ArticleAuthorType" } ], "idPrefix": "wcse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "279-282", "year": "2010", "issn": null, "isbn": "978-1-4244-9287-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4303a273", "articleId": "12OmNCuDztN", "__typename": "AdjacentArticleType" }, "next": { "fno": "4303a283", "articleId": "12OmNxcMSdi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visapp/2014/8133/3/07295121", "title": "Hand-eye calibration with a depth camera: 2D or 3D?", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295121/12OmNB1wkJK", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2011/4538/0/4538a425", "title": "Towards Network-Aware Divisible Load Theory for Optical Grids", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a425/12OmNBAIASy", "parentPublication": { "id": "proceedings/hpcc-icess/2011/4538/0", "title": "High Performance Computing and Communication &amp; IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1991/2190/0/00138520", "title": "Decomposition of the camera calibration matrix", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138520/12OmNBTs7Fx", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04760981", "title": "Efficient triangulation based on 3D Euclidean optimization", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04760981/12OmNwFid0F", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2016/0641/0/07477630", "title": "Online inspection of 3D parts via a locally overlapping camera network", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477630/12OmNyQGRW6", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmsp/2011/4356/1/4356a256", "title": "Image Acquisition Designing for SMT Solder Paste Deposition 3D Inspection", "doi": null, "abstractUrl": "/proceedings-article/cmsp/2011/4356a256/12OmNyen1up", "parentPublication": { "id": "proceedings/cmsp/2011/4356/1", "title": "Multimedia and Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1988/0878/0/00028220", "title": "A new method for image segmentation", "doi": null, "abstractUrl": "/proceedings-article/icpr/1988/00028220/12OmNzSyCjW", "parentPublication": { "id": "proceedings/icpr/1988/0878/0", "title": "9th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206784", "title": "The geometry of 2D image signals", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206784/12OmNzvQHYG", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/07/06682890", "title": "As-Projective-As-Possible Image Stitching with Moving DLT", "doi": null, "abstractUrl": "/journal/tp/2014/07/06682890/13rRUxC0SPO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/monetec/2022/7246/0/09960751", "title": "DLT design and robustness verification based on random graph theory", "doi": null, "abstractUrl": "/proceedings-article/monetec/2022/09960751/1IHnxjIjEZi", "parentPublication": { "id": "proceedings/monetec/2022/7246/0", "title": "2022 International Conference on Modern Network Technologies (MoNeTec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzwpUaS", "title": "1989 IEEE International Conference on Robotics and Automation", "acronym": "robot", "groupId": "1000639", "volume": "0", "displayVolume": "0", "year": "1989", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmclFS", "doi": "10.1109/ROBOT.1989.100116", "title": "Self-tuning control of planar two-link manipulator with non-rigid arm", "normalizedTitle": "Self-tuning control of planar two-link manipulator with non-rigid arm", "abstract": "The control of the motion of a two-link manipulator with a flexible arm is studied. The first link is rigid, and the second link has a flexible part as an extension of a rigid part. The motion of the manipulator takes place on a horizontal plane. The dynamics of the manipulator are determined in Lagrange's formulation. The positions (output) of specified points on the flexible link are obtained in the Cartesian base coordinate system using strain-gage and joint-variable measurements. The inputs are applied to the actuators of the revolute and prismatic joints. For the controller design, a time-series multivariate model of the autoregressive exogeneous (ARX) type is used to describe the input-output relation. The discounted least-square method is used to estimate parameters of the time-series model. A self-tuning controller (STC) is designed so that the positions of specified points on the flexible link track the given trajectory points. The controller operates on the Cartesian coordinates, specifying the positions of the chosen discrete points on the flexible link. Simulation results as well as laboratory experiments on a Stanford/JPL arm controlled by an STC are presented to illustrate the approach.<>", "abstracts": [ { "abstractType": "Regular", "content": "The control of the motion of a two-link manipulator with a flexible arm is studied. The first link is rigid, and the second link has a flexible part as an extension of a rigid part. The motion of the manipulator takes place on a horizontal plane. The dynamics of the manipulator are determined in Lagrange's formulation. The positions (output) of specified points on the flexible link are obtained in the Cartesian base coordinate system using strain-gage and joint-variable measurements. The inputs are applied to the actuators of the revolute and prismatic joints. For the controller design, a time-series multivariate model of the autoregressive exogeneous (ARX) type is used to describe the input-output relation. The discounted least-square method is used to estimate parameters of the time-series model. A self-tuning controller (STC) is designed so that the positions of specified points on the flexible link track the given trajectory points. The controller operates on the Cartesian coordinates, specifying the positions of the chosen discrete points on the flexible link. Simulation results as well as laboratory experiments on a Stanford/JPL arm controlled by an STC are presented to illustrate the approach.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The control of the motion of a two-link manipulator with a flexible arm is studied. The first link is rigid, and the second link has a flexible part as an extension of a rigid part. The motion of the manipulator takes place on a horizontal plane. The dynamics of the manipulator are determined in Lagrange's formulation. The positions (output) of specified points on the flexible link are obtained in the Cartesian base coordinate system using strain-gage and joint-variable measurements. The inputs are applied to the actuators of the revolute and prismatic joints. For the controller design, a time-series multivariate model of the autoregressive exogeneous (ARX) type is used to describe the input-output relation. The discounted least-square method is used to estimate parameters of the time-series model. A self-tuning controller (STC) is designed so that the positions of specified points on the flexible link track the given trajectory points. The controller operates on the Cartesian coordinates, specifying the positions of the chosen discrete points on the flexible link. Simulation results as well as laboratory experiments on a Stanford/JPL arm controlled by an STC are presented to illustrate the approach.", "fno": "00100116", "keywords": [ "Adaptive Control", "Control System Synthesis", "Dynamics", "Parameter Estimation", "Robots", "Self Adjusting Systems", "Time Series", "Self Adjusting Systems", "Adaptive Control", "Control System Synthesis", "Parameter Estimation", "Robots", "Planar Two Link Manipulator", "Flexible Arm", "Dynamics", "Lagranges Formulation", "Cartesian Base Coordinate System", "Time Series Multivariate Model", "Discounted Least Square Method", "Self Tuning Controller", "Stanford JPL Arm", "Manipulator Dynamics", "Motion Control", "Optimal Control", "Laboratories", "Strain Measurement", "Equations", "Programmable Control", "Adaptive Control", "Lagrangian Functions", "Coordinate Measuring Machines" ], "authors": [ { "affiliation": "Sch. of Electr. Eng., Purdue Univ., West Lafayette, IN, USA", "fullName": "A.J. Koivo", "givenName": "A.J.", "surname": "Koivo", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Electr. Eng., Purdue Univ., West Lafayette, IN, USA", "fullName": "K.S. Lee", "givenName": "K.S.", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "robot", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1989-01-01T00:00:00", "pubType": "proceedings", "pages": "1030,1031,1032,1033,1034,1035", "year": "1989", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00100115", "articleId": "12OmNButq25", "__typename": "AdjacentArticleType" }, "next": { "fno": "00100117", "articleId": "12OmNyKa6gV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ams/2008/3136/0/3136a469", "title": "Vibration Suppression Techniques in Feedback Control of a Very Flexible Robot Manipulator", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a469/12OmNAYGlBg", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00220040", "title": "Real time collision avoidance of a planar manipulator with an interfering single-link arm", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00220040/12OmNApu5Ft", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1991/2163/0/00132063", "title": "Quasi-static hybrid position/force control of a flexible manipulator", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00132063/12OmNAq3hS8", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1988/0852/0/00012068", "title": "Acceleration feedback control for a flexible manipulator arm", "doi": null, "abstractUrl": "/proceedings-article/robot/1988/00012068/12OmNBDyA74", "parentPublication": { "id": "proceedings/robot/1988/0852/0", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1988/0852/0/00012041", "title": "Robust control of a flexible manipulator arm", "doi": null, "abstractUrl": "/proceedings-article/robot/1988/00012041/12OmNC4wtIL", "parentPublication": { "id": "proceedings/robot/1988/0852/0", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/1/3925a249", "title": "Modeling and Control of a Multi Degree of Freedom Flexible Joint Manipulator", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a249/12OmNCdBDD0", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robio/2006/0570/0/04141983", "title": "Design of a PD Position Control based on the Lyapunov Theory for a Robot Manipulator Flexible-Link", "doi": null, "abstractUrl": "/proceedings-article/robio/2006/04141983/12OmNx5piOS", "parentPublication": { "id": "proceedings/robio/2006/0570/0", "title": "IEEE International Conference on Robotics and Biomimetics - ROBIO2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00219941", "title": "Model and adaptive control for a 4-DOF manipulator with a flexible arm", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00219941/12OmNx6xHq4", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1988/0847/0/00017116", "title": "Derivation of Kane's dynamical equations for a three link (3R) manipulator", "doi": null, "abstractUrl": "/proceedings-article/ssst/1988/00017116/12OmNxEjY22", "parentPublication": { "id": "proceedings/ssst/1988/0847/0", "title": "The Twentieth Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2010/3962/3/3962f047", "title": "Trajectory Tracking Control of Space Rigid Flexible Manipulator", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962f047/12OmNxwENoY", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAS9zxb", "title": "Proceedings. 19th International Conference on Automated Software Engineering, 2004.", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmclre", "doi": "10.1109/ASE.2004.1342773", "title": "CodeCrawler - polymetric views in action", "normalizedTitle": "CodeCrawler - polymetric views in action", "abstract": "CodeCrawler is a language independent software visualization tool. It is mainly targeted at visualizing object-oriented software, and in its newest implementation has become a general information visualization tool. It has been validated in several industrial case studies over the past few years. CodeCrawler strongly adheres to lightweight principles: it implements and visualizes polymetric views, visualizations of software enriched with information such as software metrics and other source code semantics.", "abstracts": [ { "abstractType": "Regular", "content": "CodeCrawler is a language independent software visualization tool. It is mainly targeted at visualizing object-oriented software, and in its newest implementation has become a general information visualization tool. It has been validated in several industrial case studies over the past few years. CodeCrawler strongly adheres to lightweight principles: it implements and visualizes polymetric views, visualizations of software enriched with information such as software metrics and other source code semantics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "CodeCrawler is a language independent software visualization tool. It is mainly targeted at visualizing object-oriented software, and in its newest implementation has become a general information visualization tool. It has been validated in several industrial case studies over the past few years. CodeCrawler strongly adheres to lightweight principles: it implements and visualizes polymetric views, visualizations of software enriched with information such as software metrics and other source code semantics.", "fno": "01342773", "keywords": [ "Object Oriented Programming", "Program Visualisation", "Software Metrics", "Code Crawler", "Polymetric Views", "Language Independent Software Visualization Tool", "Object Oriented Software Visualization", "Software Metrics", "Source Code Semantics", "Visualization", "Coordinate Measuring Machines", "Position Measurement", "Software Tools", "Software Engineering", "Size Measurement", "Displays", "Software Metrics", "Object Oriented Modeling", "Java" ], "authors": [ { "affiliation": "Software Eng. Group, Zurich Univ., Switzerland", "fullName": "M. Lanza", "givenName": "M.", "surname": "Lanza", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "394-395", "year": "2004", "issn": "1938-4300", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21310332", "articleId": "12OmNzaQoGr", "__typename": "AdjacentArticleType" }, "next": { "fno": "21310336", "articleId": "12OmNBOCWvu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2017/0535/0/0535a368", "title": "MetricAttitude++: Enhancing Polymetric Views with Information Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icpc/2017/0535a368/12OmNCmpcOx", "parentPublication": { "id": "proceedings/icpc/2017/0535/0", "title": "2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a057", "title": "Enhancing Polymetric Views with Coarse-Grained Views", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a057/12OmNqJq4BA", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rvsp/2013/3184/0/3184a242", "title": "Camera Based 3D Probe Control in Measuring Gear Profile", "doi": null, "abstractUrl": "/proceedings-article/rvsp/2013/3184a242/12OmNrJAdKG", "parentPublication": { "id": "proceedings/rvsp/2013/3184/0", "title": "2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2013/0431/0/06684085", "title": "Robotic manipulation in dimensional measurement", "doi": null, "abstractUrl": "/proceedings-article/icat/2013/06684085/12OmNxbW4TL", "parentPublication": { "id": "proceedings/icat/2013/0431/0", "title": "2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a059", "title": "Viewing Object-Oriented Software with MetricAttitude: An Empirical Evaluation", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a059/12OmNxwWowC", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a008", "title": "Users' Perception on the Use of MetricAttitude to Perform Source Code Comprehension Tasks: A Focus Group Study", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a008/12OmNylsZVB", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2005/963/0/01553647", "title": "CodeCrawler - an information visualization tool for program comprehension", "doi": null, "abstractUrl": "/proceedings-article/icse/2005/01553647/12OmNz4SOr3", "parentPublication": { "id": "proceedings/icse/2005/963/0", "title": "27th International Conference on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2003/09/e0782", "title": "Polymetric Views-A Lightweight Visual Approach to Reverse Engineering", "doi": null, "abstractUrl": "/journal/ts/2003/09/e0782/13rRUwhpBFM", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a286", "title": "The Position Measurement of Excavator Working Device", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a286/1tzz2HnNxcc", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1sXnPbnBr1K", "title": "2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)", "acronym": "ecie", "groupId": "1841224", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1sXnPqMcrsI", "doi": "10.1109/ECIE52353.2021.00041", "title": "Systematic Error Elimination Method for Mechanical Stability Test Data", "normalizedTitle": "Systematic Error Elimination Method for Mechanical Stability Test Data", "abstract": "In the relative positions measuring of mechanical structure system, a general method is to establish a reference coordinate by the selected reference points, then the coordinates of each measuring points in the reference coordinate can be obtained. Due to the influence of environment, equipment and so on, there will be systematic error in the reference points. When the measured points are projected to the reference coordinate, the systematic error of the measured points can be amplified when the reference points have large errors or there has a large distance between the reference points and the measured point. A data processing strategy based on coordinate transformation is proposed, so that the test data doesn't depend on the selection of reference points, which can improve the robustness and the test accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "In the relative positions measuring of mechanical structure system, a general method is to establish a reference coordinate by the selected reference points, then the coordinates of each measuring points in the reference coordinate can be obtained. Due to the influence of environment, equipment and so on, there will be systematic error in the reference points. When the measured points are projected to the reference coordinate, the systematic error of the measured points can be amplified when the reference points have large errors or there has a large distance between the reference points and the measured point. A data processing strategy based on coordinate transformation is proposed, so that the test data doesn't depend on the selection of reference points, which can improve the robustness and the test accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the relative positions measuring of mechanical structure system, a general method is to establish a reference coordinate by the selected reference points, then the coordinates of each measuring points in the reference coordinate can be obtained. Due to the influence of environment, equipment and so on, there will be systematic error in the reference points. When the measured points are projected to the reference coordinate, the systematic error of the measured points can be amplified when the reference points have large errors or there has a large distance between the reference points and the measured point. A data processing strategy based on coordinate transformation is proposed, so that the test data doesn't depend on the selection of reference points, which can improve the robustness and the test accuracy.", "fno": "186900a161", "keywords": [ "Measurement Errors", "Mechanical Stability", "Position Measurement", "Systematic Error Elimination Method", "Mechanical Stability Test Data", "Relative Position Measurement", "Mechanical Structure System", "Selected Reference Points", "Data Processing Strategy", "Coordinate Transformation", "Coordinate Measuring Machines", "Systematics", "Measurement Uncertainty", "Position Measurement", "Data Processing", "Robustness", "Structural Engineering", "Mechanical Stability", "Coordinate Transformation", "Systematic Error Elimination" ], "authors": [ { "affiliation": "Beijing Institute of Space Mechanics & Electricity", "fullName": "Bai Jie", "givenName": "Bai", "surname": "Jie", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Space Mechanics & Electricity", "fullName": "Liu Zijia", "givenName": "Liu", "surname": "Zijia", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Institute of Space Mechanics & Electricity", "fullName": "Sun Yixuan", "givenName": "Sun", "surname": "Yixuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "ecie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "161-164", "year": "2021", "issn": null, "isbn": "978-1-6654-1869-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "186900a157", "articleId": "1sXnWSqd7e8", "__typename": "AdjacentArticleType" }, "next": { "fno": "186900a165", "articleId": "1sXnUrJLr8I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csse/2008/3336/2/04722204", "title": "An automatic multi-view point cloud merging algorithm used in structured light measurement system", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/04722204/12OmNBSBk0Y", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2013/0431/0/06684085", "title": "Robotic manipulation in dimensional measurement", "doi": null, "abstractUrl": "/proceedings-article/icat/2013/06684085/12OmNxbW4TL", "parentPublication": { "id": "proceedings/icat/2013/0431/0", "title": "2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013b364", "title": "A Novel Method to Analyze Accuracy of Target Measurement Based on Entropy", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013b364/12OmNy3RRLx", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b128", "title": "Structural Parameter Identification for Articulated Arm Coordinate Measuring Machines", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b128/12OmNzxPTGQ", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvisp/2021/0770/0/077000a229", "title": "The Measuring Method of Obtaining Dynamic Geometric Parameters of Precision Moving Parts", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2021/077000a229/1APq87PbQxW", "parentPublication": { "id": "proceedings/icvisp/2021/0770/0", "title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2022/9109/0/910900a001", "title": "Research on Dry Beach Length Measurement Based on Improved Mask R-CNN Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2022/910900a001/1HYvaPvyeOI", "parentPublication": { "id": "proceedings/iccnea/2022/9109/0", "title": "2022 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a013", "title": "An improved forward intersection measurement strategy based on structural parameters for machine vision systems", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a013/1HcnnfQlSlq", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a040", "title": "A forward intersection strategy on structural parameters for robotic vision system with 3 or more DOFs", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a040/1HcnqQnAfNm", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2020/7397/0/739700a213", "title": "A Supporting System Design for Basketball Offense Tactics", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2020/739700a213/1tGcnvPWfLy", "parentPublication": { "id": "proceedings/iiai-aai/2020/7397/0", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a193", "title": "Research on Inspection Method of Space Error in Coordinate Measuring Machine", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a193/1tzz9LD2n9S", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmj0ExpWdG", "doi": "10.1109/ICPR48806.2021.9412816", "title": "Calibration and Absolute Pose Estimation of Trinocular Linear Camera Array for Smart City Applications", "normalizedTitle": "Calibration and Absolute Pose Estimation of Trinocular Linear Camera Array for Smart City Applications", "abstract": "A method for calibrating a Trinocular Linear Camera Array (TLCA) for traffic surveillance applications, such as towards smart cities, is presented. A TLCA-specific parametrization guarantees that the calibration finds a model where all the cameras are on a straight line. The method uses both a chequerboard close to the camera, as well as measured 3D points far from the camera: points measured in world coordinates, as well as their corresponding 2D points found manually in the images. Superior calibration accuracy can be obtained compared to standard methods using only a single data source, largely due to the use of chequerboards, while the line constraint in the parametrization allows for joint rectification. The improved triangulation accuracy, from 8-12 cm to around 6 cm when calibrating with 30-50 points in our experiment, allowing better road user analysis. The method is demonstrated by a proof-of-concept application where a point cloud is generated from multiple disparity maps, visualizing road user detections in 3D.", "abstracts": [ { "abstractType": "Regular", "content": "A method for calibrating a Trinocular Linear Camera Array (TLCA) for traffic surveillance applications, such as towards smart cities, is presented. A TLCA-specific parametrization guarantees that the calibration finds a model where all the cameras are on a straight line. The method uses both a chequerboard close to the camera, as well as measured 3D points far from the camera: points measured in world coordinates, as well as their corresponding 2D points found manually in the images. Superior calibration accuracy can be obtained compared to standard methods using only a single data source, largely due to the use of chequerboards, while the line constraint in the parametrization allows for joint rectification. The improved triangulation accuracy, from 8-12 cm to around 6 cm when calibrating with 30-50 points in our experiment, allowing better road user analysis. The method is demonstrated by a proof-of-concept application where a point cloud is generated from multiple disparity maps, visualizing road user detections in 3D.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A method for calibrating a Trinocular Linear Camera Array (TLCA) for traffic surveillance applications, such as towards smart cities, is presented. A TLCA-specific parametrization guarantees that the calibration finds a model where all the cameras are on a straight line. The method uses both a chequerboard close to the camera, as well as measured 3D points far from the camera: points measured in world coordinates, as well as their corresponding 2D points found manually in the images. Superior calibration accuracy can be obtained compared to standard methods using only a single data source, largely due to the use of chequerboards, while the line constraint in the parametrization allows for joint rectification. The improved triangulation accuracy, from 8-12 cm to around 6 cm when calibrating with 30-50 points in our experiment, allowing better road user analysis. The method is demonstrated by a proof-of-concept application where a point cloud is generated from multiple disparity maps, visualizing road user detections in 3D.", "fno": "09412816", "keywords": [ "Calibration", "Cameras", "Image Sensors", "Pose Estimation", "Road Traffic", "Smart Cities", "Stereo Image Processing", "Traffic Surveillance Applications", "Smart Cities", "TLCA Specific Parametrization Guarantees", "Cameras", "Superior Calibration Accuracy", "Standard Methods", "Proof Of Concept Application", "Point Cloud", "Absolute Pose Estimation", "Smart City Applications", "Trinocular Linear Camera Array", "Road User Detections", "Multiple Disparity Maps", "3 D", "2 D Points", "Three Dimensional Displays", "Coordinate Measuring Machines", "Smart Cities", "Surveillance", "Roads", "Traffic Control", "Cameras" ], "authors": [ { "affiliation": "Centre for Mathematical Sciences, LTH, Lund University,Faculty of Engineering", "fullName": "Martin Ahrnbom", "givenName": "Martin", "surname": "Ahrnbom", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Mathematical Sciences, LTH, Lund University,Faculty of Engineering", "fullName": "Mikael Nilsson", "givenName": "Mikael", "surname": "Nilsson", "__typename": "ArticleAuthorType" }, { "affiliation": "Axis Communications AB,Lund,Sweden", "fullName": "Håkan Ardö", "givenName": "Håkan", "surname": "Ardö", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Mathematical Sciences, LTH, Lund University,Faculty of Engineering", "fullName": "Kalle Åström", "givenName": "Kalle", "surname": "Åström", "__typename": "ArticleAuthorType" }, { "affiliation": "LTH, Lund University,Transport and Roads, Faculty of Engineering,Dept. Of Technology & Society", "fullName": "Oksana Yastremska-Kravchenko", "givenName": "Oksana", "surname": "Yastremska-Kravchenko", "__typename": "ArticleAuthorType" }, { "affiliation": "LTH, Lund University,Transport and Roads, Faculty of Engineering,Dept. Of Technology & Society", "fullName": "Aliaksei Laureshyn", "givenName": "Aliaksei", "surname": "Laureshyn", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "103-110", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412878", "articleId": "1tmhKsYHJCM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412860", "articleId": "1tmjjzgSeDC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visapp/2014/8133/3/07295121", "title": "Hand-eye calibration with a depth camera: 2D or 3D?", "doi": null, "abstractUrl": "/proceedings-article/visapp/2014/07295121/12OmNB1wkJK", "parentPublication": { "id": "proceedings/visapp/2014/8133/2", "title": "2014 International Conference on Computer Vision Theory and Applications (VISAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1991/2190/0/00138520", "title": "Decomposition of the camera calibration matrix", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138520/12OmNBTs7Fx", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vspets/2005/9424/0/01570914", "title": "On calibrating a camera network using parabolic trajectories of a bouncing ball", "doi": null, "abstractUrl": "/proceedings-article/vspets/2005/01570914/12OmNCdk2Gu", "parentPublication": { "id": "proceedings/vspets/2005/9424/0", "title": "Proceedings. 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/3/252130960", "title": "Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252130960/12OmNrYlmMa", "parentPublication": { "id": "proceedings/icpr/2006/2521/3", "title": "2006 18th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1992/2910/0/00201497", "title": "Self-calibration of a camera using multiple images", "doi": null, "abstractUrl": "/proceedings-article/icpr/1992/00201497/12OmNwK7o7b", "parentPublication": { "id": "proceedings/icpr/1992/2910/0", "title": "1992 11th IAPR International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciap/2007/2877/0/28770093", "title": "Calibration and Image Generation of Mobile Projector-Camera Systems", "doi": null, "abstractUrl": "/proceedings-article/iciap/2007/28770093/12OmNwtWfIL", "parentPublication": { "id": "proceedings/iciap/2007/2877/0", "title": "2007 14th International Conference on Image Analysis and Processing - ICIAP 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1991/2163/0/00132014", "title": "Laser rangefinder calibration for a walking robot", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00132014/12OmNy9Prfx", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2009/3887/0/pid978796", "title": "Automatic Calibration Method Based on Traditional Camera Calibration Approach", "doi": null, "abstractUrl": "/proceedings-article/icise/2009/pid978796/12OmNyL0TsP", "parentPublication": { "id": "proceedings/icise/2009/3887/0", "title": "Information Science and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2013/5067/0/5067a143", "title": "Minimal Solution for Uncalibrated Absolute Pose Problem with a Known Vanishing Point", "doi": null, "abstractUrl": "/proceedings-article/3dv/2013/5067a143/12OmNyOHFYL", "parentPublication": { "id": "proceedings/3dv/2013/5067/0", "title": "2013 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/05/i0469", "title": "Implicit and Explicit Camera Calibration: Theory and Experiments", "doi": null, "abstractUrl": "/journal/tp/1994/05/i0469/13rRUxYIN5d", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyFCvPp", "title": "Tenth International Conference on Information Visualisation (IV'06)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDzb", "doi": "10.1109/IV.2006.113", "title": "Towards Ubiquitous Brushing for Information Visualization", "normalizedTitle": "Towards Ubiquitous Brushing for Information Visualization", "abstract": "Brushing is a collection of techniques to dynamically query and directly select elements on the visual display. Such interaction allows the user to explore the visualization, to interactively select a subset of points and see how these changes are updated in other related views. Traditionally, the artefacts that are ?brushed? are the plotted elements in the visualization (e.g. the points on a scatterplot, or the bars of a bar chart). In this paper we discuss the concept of Ubiquitous Brushing (UB), which brings together various different types of selection (whether in data space, screen space or views). Not only can users brush over elements in the display but also they can brush over various meta-information such as menus, legends or axis to affect the highlighted elements. The paper discusses the basic idea and demonstrates how subsequent UB operations can be compound together to provide useful dynamic filter operations.", "abstracts": [ { "abstractType": "Regular", "content": "Brushing is a collection of techniques to dynamically query and directly select elements on the visual display. Such interaction allows the user to explore the visualization, to interactively select a subset of points and see how these changes are updated in other related views. Traditionally, the artefacts that are ?brushed? are the plotted elements in the visualization (e.g. the points on a scatterplot, or the bars of a bar chart). In this paper we discuss the concept of Ubiquitous Brushing (UB), which brings together various different types of selection (whether in data space, screen space or views). Not only can users brush over elements in the display but also they can brush over various meta-information such as menus, legends or axis to affect the highlighted elements. The paper discusses the basic idea and demonstrates how subsequent UB operations can be compound together to provide useful dynamic filter operations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Brushing is a collection of techniques to dynamically query and directly select elements on the visual display. Such interaction allows the user to explore the visualization, to interactively select a subset of points and see how these changes are updated in other related views. Traditionally, the artefacts that are ?brushed? are the plotted elements in the visualization (e.g. the points on a scatterplot, or the bars of a bar chart). In this paper we discuss the concept of Ubiquitous Brushing (UB), which brings together various different types of selection (whether in data space, screen space or views). Not only can users brush over elements in the display but also they can brush over various meta-information such as menus, legends or axis to affect the highlighted elements. The paper discusses the basic idea and demonstrates how subsequent UB operations can be compound together to provide useful dynamic filter operations.", "fno": "26020151", "keywords": [ "Brushing", "Exploratory Visualization", "Multiple Linked Views" ], "authors": [ { "affiliation": "University of Kent, UK", "fullName": "Jonathan C. Roberts", "givenName": "Jonathan C.", "surname": "Roberts", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Nottingham, UK", "fullName": "Michael A. E. Wright", "givenName": "Michael A. E.", "surname": "Wright", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "151-156", "year": "2006", "issn": "1550-6037", "isbn": "0-7695-2602-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "26020142", "articleId": "12OmNzwHvos", "__typename": "AdjacentArticleType" }, "next": { "fno": "26020157", "articleId": "12OmNweBUJO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1995/7187/0/71870271", "title": "High Dimensional Brushing for Interactive Exploration of Multivariate Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870271/12OmNBdJ5iK", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2004/2179/0/21790049", "title": "Interactive Focus+Context Visualization with Linked 2D/3D Scatterplots", "doi": null, "abstractUrl": "/proceedings-article/cmv/2004/21790049/12OmNBtl1vO", "parentPublication": { "id": "proceedings/cmv/2004/2179/0", "title": "Proceedings. Second International Conference on Coordinated & Multiple Views in Exploratory Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030061", "title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2001/1195/0/11950757", "title": "Dynamic Queries and Brushing on Choropleth Maps", "doi": null, "abstractUrl": "/proceedings-article/iv/2001/11950757/12OmNwdbVac", "parentPublication": { "id": "proceedings/iv/2001/1195/0", "title": "Proceedings Fifth International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2005/2396/0/23960054", "title": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "doi": null, "abstractUrl": "/proceedings-article/cmv/2005/23960054/12OmNyp9MkT", "parentPublication": { "id": "proceedings/cmv/2005/2396/0", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2002/1751/0/17510127", "title": "Angular Brushing of Extended Parallel Coordinates", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2002/17510127/12OmNzYNNf3", "parentPublication": { "id": "proceedings/ieee-infovis/2002/1751/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2000/02/v0150", "title": "Structure-Based Brushes: A Mechanism for Navigating Hierarchically Organized Data and Information Spaces", "doi": null, "abstractUrl": "/journal/tg/2000/02/v0150/13rRUNvyakx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1373", "title": "Interactive Visual Analysis of Families of Function Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1373/13rRUwkfAZ9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009060929", "title": "Conjunctive Visual Forms", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009060929/13rRUxD9gXA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061459", "title": "Brushing of Attribute Clouds for the Visualization of Multivariate Data", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061459/13rRUxly8Xz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNA0dMMM", "title": "Proceedings. Second International Conference on Coordinated & Multiple Views in Exploratory Visualization", "acronym": "cmv", "groupId": "1000170", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNBtl1vO", "doi": "10.1109/CMV.2004.1319526", "title": "Interactive Focus+Context Visualization with Linked 2D/3D Scatterplots", "normalizedTitle": "Interactive Focus+Context Visualization with Linked 2D/3D Scatterplots", "abstract": "Scatterplots in 2D and 3D are very useful tools, but also suffer from a number of problems. Overplotting hides the true number of points that are displayed, and showing point clouds in 3D is problematic both in terms of perception and interaction. We propose a combination of 2D and 3D scatterplots, together with some extensions to overcome these problems. By linking 2D and 3D views, it is possible to interact in 2D and get feedback in 3D. That feedback is also enhanced by depth cues (color and point size) such that the user gets a better depth impression. Histograms in 2D and 3D show additional information about point densities and additional context can be displayed. An example application demonstrates the usefulness of the technique.", "abstracts": [ { "abstractType": "Regular", "content": "Scatterplots in 2D and 3D are very useful tools, but also suffer from a number of problems. Overplotting hides the true number of points that are displayed, and showing point clouds in 3D is problematic both in terms of perception and interaction. We propose a combination of 2D and 3D scatterplots, together with some extensions to overcome these problems. By linking 2D and 3D views, it is possible to interact in 2D and get feedback in 3D. That feedback is also enhanced by depth cues (color and point size) such that the user gets a better depth impression. Histograms in 2D and 3D show additional information about point densities and additional context can be displayed. An example application demonstrates the usefulness of the technique.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scatterplots in 2D and 3D are very useful tools, but also suffer from a number of problems. Overplotting hides the true number of points that are displayed, and showing point clouds in 3D is problematic both in terms of perception and interaction. We propose a combination of 2D and 3D scatterplots, together with some extensions to overcome these problems. By linking 2D and 3D views, it is possible to interact in 2D and get feedback in 3D. That feedback is also enhanced by depth cues (color and point size) such that the user gets a better depth impression. Histograms in 2D and 3D show additional information about point densities and additional context can be displayed. An example application demonstrates the usefulness of the technique.", "fno": "21790049", "keywords": [ "Scatterplots", "Linked Views", "Brushing" ], "authors": [ { "affiliation": "VRVis Research Center", "fullName": "Harald Piringer", "givenName": "Harald", "surname": "Piringer", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Robert Kosara", "givenName": "Robert", "surname": "Kosara", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Helwig Hauser", "givenName": "Helwig", "surname": "Hauser", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-07-01T00:00:00", "pubType": "proceedings", "pages": "49-60", "year": "2004", "issn": null, "isbn": "0-7695-2179-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21790039", "articleId": "12OmNBpVQ9M", "__typename": "AdjacentArticleType" }, "next": { "fno": "21790061", "articleId": "12OmNykkB5N", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2010/6685/0/05429604", "title": "A model of symbol lightness discrimination in sparse scatterplots", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2010/05429604/12OmNBSSVnf", "parentPublication": { "id": "proceedings/pacificvis/2010/6685/0", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2006/2602/0/26020151", "title": "Towards Ubiquitous Brushing for Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2006/26020151/12OmNBqMDzb", "parentPublication": { "id": "proceedings/iv/2006/2602/0", "title": "Tenth International Conference on Information Visualisation (IV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ivapp/2014/8132/0/07294427", "title": "Eye-tracking investigation during visual analysis of projected multidimensional data with 2D scatterplots", "doi": null, "abstractUrl": "/proceedings-article/ivapp/2014/07294427/12OmNwBjP2n", "parentPublication": { "id": "proceedings/ivapp/2014/8132/0", "title": "2014 International Conference on Information Visualization Theory and Applications (IVAPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2014/4258/0/4258a080", "title": "A Nested Hierarchy of Localized Scatterplots", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2014/4258a080/12OmNy7h3e0", "parentPublication": { "id": "proceedings/sibgrapi/2014/4258/0", "title": "2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2005/2396/0/23960054", "title": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "doi": null, "abstractUrl": "/proceedings-article/cmv/2005/23960054/12OmNyp9MkT", "parentPublication": { "id": "proceedings/cmv/2005/2396/0", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2005/2396/0/23960096", "title": "Interactive Exploration of Unsteady 3D Flow with Linked 2D/3D Texture Advection", "doi": null, "abstractUrl": "/proceedings-article/cmv/2005/23960096/12OmNzwpU4t", "parentPublication": { "id": "proceedings/cmv/2005/2396/0", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08047300", "title": "Cluster-Based Visual Abstraction for Multivariate Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2018/09/08047300/13rRUILLkvy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1373", "title": "Interactive Visual Analysis of Families of Function Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1373/13rRUwkfAZ9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1544", "title": "LiveSync: Deformed Viewing Spheres for Knowledge-Based Navigation", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1544/13rRUxYIN41", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061459", "title": "Brushing of Attribute Clouds for the Visualization of Multivariate Data", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061459/13rRUxly8Xz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKk", "title": "2007 11th International Conference Information Visualization (IV '07)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNxXl5Ca", "doi": "10.1109/IV.2007.35", "title": "Color LinesView:AnApproach toVisualization of Families of Function Graphs", "normalizedTitle": "Color LinesView:AnApproach toVisualization of Families of Function Graphs", "abstract": "Data sets often include information that can be represented as a mapping that describes how a dependent variable depends on an independent variable. Such a mapping, usually represented as a function graph, can be parameterized to provide a family of function graphs. The challenge is how to efficiently aggregate individual function graph views to represent the whole family and allow visual analysis and search for patterns. We propose a novel view, called the color lines view, which provides a two dimensional, rectangular view where each line represents a single function graph. The points on the line correspond to values of the independent variable. The point colors represent the value of the dependent variable. The lines, placed next to each other in parallel, show a family of function graphs. The color lines view offers sorting and brushing features which support visual analysis procedures that are difficult to perform with previously existing views.", "abstracts": [ { "abstractType": "Regular", "content": "Data sets often include information that can be represented as a mapping that describes how a dependent variable depends on an independent variable. Such a mapping, usually represented as a function graph, can be parameterized to provide a family of function graphs. The challenge is how to efficiently aggregate individual function graph views to represent the whole family and allow visual analysis and search for patterns. We propose a novel view, called the color lines view, which provides a two dimensional, rectangular view where each line represents a single function graph. The points on the line correspond to values of the independent variable. The point colors represent the value of the dependent variable. The lines, placed next to each other in parallel, show a family of function graphs. The color lines view offers sorting and brushing features which support visual analysis procedures that are difficult to perform with previously existing views.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data sets often include information that can be represented as a mapping that describes how a dependent variable depends on an independent variable. Such a mapping, usually represented as a function graph, can be parameterized to provide a family of function graphs. The challenge is how to efficiently aggregate individual function graph views to represent the whole family and allow visual analysis and search for patterns. We propose a novel view, called the color lines view, which provides a two dimensional, rectangular view where each line represents a single function graph. The points on the line correspond to values of the independent variable. The point colors represent the value of the dependent variable. The lines, placed next to each other in parallel, show a family of function graphs. The color lines view offers sorting and brushing features which support visual analysis procedures that are difficult to perform with previously existing views.", "fno": "29000059", "keywords": [], "authors": [ { "affiliation": "VRVis Research Center", "fullName": "Kresimir Matkovic", "givenName": "Kresimir", "surname": "Matkovic", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech", "fullName": "Denis Gracanin", "givenName": "Denis", "surname": "Gracanin", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Zoltan Konyha", "givenName": "Zoltan", "surname": "Konyha", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bergen", "fullName": "Helwig Hauser", "givenName": "Helwig", "surname": "Hauser", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "59-64", "year": "2007", "issn": null, "isbn": "0-7695-2907-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29000053", "articleId": "12OmNx4Q6Dl", "__typename": "AdjacentArticleType" }, "next": { "fno": "29000065", "articleId": "12OmNBpVPYK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/focs/2015/8191/0/8191b358", "title": "Interlacing Families IV: Bipartite Ramanujan Graphs of All Sizes", "doi": null, "abstractUrl": "/proceedings-article/focs/2015/8191b358/12OmNqBbHDT", "parentPublication": { "id": "proceedings/focs/2015/8191/0", "title": "2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2005/8735/0/01387099", "title": "Software product line engineering for Web services and UML", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2005/01387099/12OmNrnJ6Km", "parentPublication": { "id": "proceedings/aiccsa/2005/8735/0", "title": "The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2006/2507/9/250790213b", "title": "Using Function Generalization to Design a Cosequential Processing Framework", "doi": null, "abstractUrl": "/proceedings-article/hicss/2006/250790213b/12OmNwBBqdo", "parentPublication": { "id": "proceedings/hicss/2006/2507/9", "title": "Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispw/1996/7725/0/77250089", "title": "Evolution of on-line process fragments families", "doi": null, "abstractUrl": "/proceedings-article/ispw/1996/77250089/12OmNwcCIQE", "parentPublication": { "id": "proceedings/ispw/1996/7725/0", "title": "Software Process Workshop, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispw/1996/7725/0/77250109", "title": "Product families and process families", "doi": null, "abstractUrl": "/proceedings-article/ispw/1996/77250109/12OmNx5YvhV", "parentPublication": { "id": "proceedings/ispw/1996/7725/0", "title": "Software Process Workshop, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/formalise/2017/0422/0/07967991", "title": "Modeling Families of Public Licensing Services: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/formalise/2017/07967991/12OmNxWLTld", "parentPublication": { "id": "proceedings/formalise/2017/0422/0", "title": "2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2005/2396/0/23960054", "title": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "doi": null, "abstractUrl": "/proceedings-article/cmv/2005/23960054/12OmNyp9MkT", "parentPublication": { "id": "proceedings/cmv/2005/2396/0", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/istcs/1997/8037/0/80370085", "title": "Stereoscopic families of permutations, and their applications", "doi": null, "abstractUrl": "/proceedings-article/istcs/1997/80370085/12OmNzaQox9", "parentPublication": { "id": "proceedings/istcs/1997/8037/0", "title": "Theory of Computing Systems, Israel Symposium on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1373", "title": "Interactive Visual Analysis of Families of Function Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1373/13rRUwkfAZ9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1969/03/01671231", "title": "Structures of the Affine Families of Switching Functions", "doi": null, "abstractUrl": "/journal/tc/1969/03/01671231/13rRUygBwd7", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwE9OtC", "title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)", "acronym": "cmv", "groupId": "1000170", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNyp9MkT", "doi": "10.1109/CMV.2005.10", "title": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "normalizedTitle": "Interactive Visual Analysis of Multi-Parameter Families of Function Graphs", "abstract": "The paper describes a method developed for interactive data visualization and exploration with applications in the automotive industry. The input data set contains a large number of function graphs. Each of the graphs is characterized by a set of basic attributes. The technique that is used for visualization includes two linked views: a map view (or attribute space view), where all function graphs are represented as a point or an icon on the map, and a linked function graph view. The map view provides additional visualization possibilities and allows user interaction. Additional features like brushing in both views, graph management, and related issues like interpolation of the graphs are described.", "abstracts": [ { "abstractType": "Regular", "content": "The paper describes a method developed for interactive data visualization and exploration with applications in the automotive industry. The input data set contains a large number of function graphs. Each of the graphs is characterized by a set of basic attributes. The technique that is used for visualization includes two linked views: a map view (or attribute space view), where all function graphs are represented as a point or an icon on the map, and a linked function graph view. The map view provides additional visualization possibilities and allows user interaction. Additional features like brushing in both views, graph management, and related issues like interpolation of the graphs are described.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The paper describes a method developed for interactive data visualization and exploration with applications in the automotive industry. The input data set contains a large number of function graphs. Each of the graphs is characterized by a set of basic attributes. The technique that is used for visualization includes two linked views: a map view (or attribute space view), where all function graphs are represented as a point or an icon on the map, and a linked function graph view. The map view provides additional visualization possibilities and allows user interaction. Additional features like brushing in both views, graph management, and related issues like interpolation of the graphs are described.", "fno": "23960054", "keywords": [ "Interactive Visualization", "Linked Views", "Brushing", "Time Series Data", "Interactive Exploration", "Interpolation", "Kennfeld Diagram" ], "authors": [ { "affiliation": "VRVis Research Center", "fullName": "Kresimir Matkovic", "givenName": "Kresimir", "surname": "Matkovic", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Josip Juric", "givenName": "Josip", "surname": "Juric", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Zoltan Konyha", "givenName": "Zoltan", "surname": "Konyha", "__typename": "ArticleAuthorType" }, { "affiliation": "AVL List GmbH", "fullName": "Jurgen Krasser", "givenName": "Jurgen", "surname": "Krasser", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Research Center", "fullName": "Helwig Hauser", "givenName": "Helwig", "surname": "Hauser", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-07-01T00:00:00", "pubType": "proceedings", "pages": "54-62", "year": "2005", "issn": null, "isbn": "0-7695-2396-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23960042", "articleId": "12OmNyOHG7o", "__typename": "AdjacentArticleType" }, "next": { "fno": "23960063", "articleId": "12OmNCmGNXT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2004/2177/0/21770052", "title": "Integration of Unsupervised Clustering, Interaction and Parallel Coordinates for the Exploration of Large Multivariate Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770052/12OmNAOKnQt", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2006/2602/0/26020151", "title": "Towards Ubiquitous Brushing for Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2006/26020151/12OmNBqMDzb", "parentPublication": { "id": "proceedings/iv/2006/2602/0", "title": "Tenth International Conference on Information Visualisation (IV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a403", "title": "Treemaps and Choropleth Maps Applied to Regional Hierarchical Statistical Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a403/12OmNBqv2d4", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2004/2179/0/21790049", "title": "Interactive Focus+Context Visualization with Linked 2D/3D Scatterplots", "doi": null, "abstractUrl": "/proceedings-article/cmv/2004/21790049/12OmNBtl1vO", "parentPublication": { "id": "proceedings/cmv/2004/2179/0", "title": "Proceedings. Second International Conference on Coordinated & Multiple Views in Exploratory Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000059", "title": "Color LinesView:AnApproach toVisualization of Families of Function Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000059/12OmNxXl5Ca", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061351", "title": "Interactive Visual Analysis of Complex Scientific Data as Families of Data Surfaces", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061351/13rRUwbs1Sr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/02/mcg2006020028", "title": "IDGraphs: Intrusion Detection and Analysis Using Stream Compositing", "doi": null, "abstractUrl": "/magazine/cg/2006/02/mcg2006020028/13rRUwhpBQ1", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1373", "title": "Interactive Visual Analysis of Families of Function Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1373/13rRUwkfAZ9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061436", "title": "Extensions of Parallel Coordinates for Interactive Exploration of Large Multi-Timepoint Data Sets", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061436/13rRUxjQyp8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061459", "title": "Brushing of Attribute Clouds for the Visualization of Multivariate Data", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061459/13rRUxly8Xz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxYL5gh", "doi": "10.1109/PACIFICVIS.2015.7156391", "title": "Interactive high-dimensional visualization of social graphs", "normalizedTitle": "Interactive high-dimensional visualization of social graphs", "abstract": "The paper tackles the problems of the “giant hairballs”, the dense and tangled structures often resulting from visualization of large social graphs. Proposed is a high-dimensional rotation technique called AGI3D, combined with an ability to filter elements based on social centrality values. AGI3D is targeted for a high-dimensional embedding of a social graph and its projection onto 3D space. It allows the user to rotate the social graph layout in the high-dimensional space by mouse dragging of a vertex. Its high-dimensional rotation effects give the user an illusion that he/she is destructively reshaping the social graph layout but in reality, it assists the user to find a preferred positioning and direction in the high-dimensional space to look at the internal structure of the social graph layout, keeping it unmodified. A prototype implementation of the proposal called Social Viewpoint Finder is tested with about 70 social graphs and this paper reports four of the analysis results.", "abstracts": [ { "abstractType": "Regular", "content": "The paper tackles the problems of the “giant hairballs”, the dense and tangled structures often resulting from visualization of large social graphs. Proposed is a high-dimensional rotation technique called AGI3D, combined with an ability to filter elements based on social centrality values. AGI3D is targeted for a high-dimensional embedding of a social graph and its projection onto 3D space. It allows the user to rotate the social graph layout in the high-dimensional space by mouse dragging of a vertex. Its high-dimensional rotation effects give the user an illusion that he/she is destructively reshaping the social graph layout but in reality, it assists the user to find a preferred positioning and direction in the high-dimensional space to look at the internal structure of the social graph layout, keeping it unmodified. A prototype implementation of the proposal called Social Viewpoint Finder is tested with about 70 social graphs and this paper reports four of the analysis results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The paper tackles the problems of the “giant hairballs”, the dense and tangled structures often resulting from visualization of large social graphs. Proposed is a high-dimensional rotation technique called AGI3D, combined with an ability to filter elements based on social centrality values. AGI3D is targeted for a high-dimensional embedding of a social graph and its projection onto 3D space. It allows the user to rotate the social graph layout in the high-dimensional space by mouse dragging of a vertex. Its high-dimensional rotation effects give the user an illusion that he/she is destructively reshaping the social graph layout but in reality, it assists the user to find a preferred positioning and direction in the high-dimensional space to look at the internal structure of the social graph layout, keeping it unmodified. A prototype implementation of the proposal called Social Viewpoint Finder is tested with about 70 social graphs and this paper reports four of the analysis results.", "fno": "07156391", "keywords": [ "Layout", "Social Network Services", "Internet", "Blogs", "Proposals", "Visual Analytics", "Interactive Graph Visualization", "Social Graph Visualization", "Visual Analytics", "Multi Dimensional Scaling" ], "authors": [ { "affiliation": "Tokyo Tech & JST/CREST, Japan", "fullName": "Ken Wakita", "givenName": "Ken", "surname": "Wakita", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Tech, Japan", "fullName": "Masanori Takami", "givenName": "Masanori", "surname": "Takami", "__typename": "ArticleAuthorType" }, { "affiliation": "Hosei University, Japan", "fullName": "Hiroshi Hosobe", "givenName": "Hiroshi", "surname": "Hosobe", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "303-310", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156390", "articleId": "12OmNzC5T4z", "__typename": "AdjacentArticleType" }, "next": { "fno": "07156392", "articleId": "12OmNAYXWFA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/apvis/2007/0808/0/04126224", "title": "Analysis of a high-dimensional approach to interactive graph drawing", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126224/12OmNwcCILb", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400558", "title": "SocialNetSense: Supporting sensemaking of social and structural features in networks with interactive visualization", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400558/12OmNxdm4ya", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a709", "title": "An Interactive Circular Visual Analytic Tool for Visualization of Web Data", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a709/12OmNxwENqO", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2009/3789/0/3789a467", "title": "Large Scale Network Analysis with Interactive Visualisation", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a467/12OmNzahbY0", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nsw/2011/1049/0/06004630", "title": "Time spring layout for visualization of dynamic social networks", "doi": null, "abstractUrl": "/proceedings-article/nsw/2011/06004630/12OmNzvhvAx", "parentPublication": { "id": "proceedings/nsw/2011/1049/0", "title": "IEEE Network Science Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1386", "title": "Generating Graphs for Visual Analytics through Interactive Sketching", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1386/13rRUwcS1CP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/01/mcg2013010058", "title": "Spectrum-Based Network Visualization for Topology Analysis", "doi": null, "abstractUrl": "/magazine/cg/2013/01/mcg2013010058/13rRUygT7Aq", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807220", "title": "Visual Analysis of High-Dimensional Event Sequence Data via Dynamic Hierarchical Aggregation", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807220/1cG6bfa8KkM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09216512", "title": "Auditing the Sensitivity of Graph-based Ranking with Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09216512/1nJsHwdIuqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09477202", "title": "fCoSE: A Fast Compound Graph Layout Algorithm with Constraint Support", "doi": null, "abstractUrl": "/journal/tg/2022/12/09477202/1v2MaDZG6fC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4L", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzQzqgi", "doi": "10.1109/VAST.2006.261432", "title": "Have Green ? A Visual Analytics Framework for Large Semantic Graphs", "normalizedTitle": "Have Green ? A Visual Analytics Framework for Large Semantic Graphs", "abstract": "A semantic graph is a network of heterogeneous nodes and links annotated with a domain ontology. In intelligence analysis, investigators use semantic graphs to organize concepts and relationships as graph nodes and links in hopes of discovering key trends, patterns, and insights. However, as new information continues to arrive from a multitude of sources, the size and complexity of the semantic graphs will soon overwhelm an investigator's cognitive capacity to carry out significant analyses. We introduce a powerful visual analytics framework designed to enhance investigators' natural analytical capabilities to comprehend and analyze large semantic graphs. The paper describes the overall framework design, presents major development accomplishments to date, and discusses future directions of a new visual analytics system known as Have Green", "abstracts": [ { "abstractType": "Regular", "content": "A semantic graph is a network of heterogeneous nodes and links annotated with a domain ontology. In intelligence analysis, investigators use semantic graphs to organize concepts and relationships as graph nodes and links in hopes of discovering key trends, patterns, and insights. However, as new information continues to arrive from a multitude of sources, the size and complexity of the semantic graphs will soon overwhelm an investigator's cognitive capacity to carry out significant analyses. We introduce a powerful visual analytics framework designed to enhance investigators' natural analytical capabilities to comprehend and analyze large semantic graphs. The paper describes the overall framework design, presents major development accomplishments to date, and discusses future directions of a new visual analytics system known as Have Green", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A semantic graph is a network of heterogeneous nodes and links annotated with a domain ontology. In intelligence analysis, investigators use semantic graphs to organize concepts and relationships as graph nodes and links in hopes of discovering key trends, patterns, and insights. However, as new information continues to arrive from a multitude of sources, the size and complexity of the semantic graphs will soon overwhelm an investigator's cognitive capacity to carry out significant analyses. We introduce a powerful visual analytics framework designed to enhance investigators' natural analytical capabilities to comprehend and analyze large semantic graphs. The paper describes the overall framework design, presents major development accomplishments to date, and discusses future directions of a new visual analytics system known as Have Green", "fno": "04035749", "keywords": [ "Information Visualization", "Have Green", "Visual Analytics Framework", "Semantic Graph", "Graph Visualization", "Network Visualization", "Information Analytics" ], "authors": [ { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "Pak Chung Wong", "givenName": null, "surname": "Pak Chung Wong", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "G. Chin", "givenName": "G.", "surname": "Chin", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "H. Foote", "givenName": "H.", "surname": "Foote", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "P. Mackey", "givenName": "P.", "surname": "Mackey", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest Nat. Lab., Richland, WA", "fullName": "J. Thomas", "givenName": "J.", "surname": "Thomas", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "67-74", "year": "2006", "issn": null, "isbn": "1-4244-0591-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04035764", "articleId": "12OmNApLGQU", "__typename": "AdjacentArticleType" }, "next": { "fno": "04035765", "articleId": "12OmNvDZF4u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a610", "title": "Edge Metrics for Visual Graph Analytics: A Comparative Study", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a610/12OmNAnMuJD", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a124", "title": "Force-directed Graph Visualization with Pre-positioning - Improving Convergence Time and Quality of Layout", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a124/12OmNBiygtD", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2016/0662/0/0662a392", "title": "A Knowledge Base Visual Analytics Technique for Semantic Web", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a392/12OmNyv7mla", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1386", "title": "Generating Graphs for Visual Analytics through Interactive Sketching", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1386/13rRUwcS1CP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/04/mcg2014040008", "title": "Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation", "doi": null, "abstractUrl": "/magazine/cg/2014/04/mcg2014040008/13rRUwwslv3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040094", "title": "Semantic Interaction: Coupling Cognition and Computation through Usable Interactive Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040094/13rRUxOveck", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/06/ttg2013061034", "title": "PIWI: Visually Exploring Graphs Based on Their Community Structure", "doi": null, "abstractUrl": "/journal/tg/2013/06/ttg2013061034/13rRUxd2aYZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070056", "title": "Evaluation: A Challenge for Visual Analytics", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070056/13rRUxly90R", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10061369", "title": "Few-Shot Semantic Relation Prediction Across Heterogeneous Graphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/10061369/1LiKJX7pFjW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222249", "title": "CAVA: A Visual Analytics System for Exploratory Columnar Data Augmentation Using Knowledge Graphs", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222249/1nTroT3Yn72", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMZ", "title": "2008 12th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNAnMuJD", "doi": "10.1109/IV.2008.10", "title": "Edge Metrics for Visual Graph Analytics: A Comparative Study", "normalizedTitle": "Edge Metrics for Visual Graph Analytics: A Comparative Study", "abstract": "Visual graph analytics definitely relies on the use of node and edge metrics to identify salient properties in graphs. Most often, these metrics are turned into useful visual cues, or are used to interactively filter out parts of a graph while querying it, for instance. Along the years, analysts coming from different application domains have designed metrics to serve specific needs. Graph analytics, sometimes also called network science, recently developed as a cross-discipline field developing models shared by numerous application domains such as bio-informatics, social network analysis, web graphs, etc.[4] [10]. As a consequence, we end up finding various metrics in the literature aiming at similar goals; different names and analytics description often hide similarity between two metrics that originated from different fields. We survey a list of edge metrics for graphs and compare their relative value and behaviour, in an effort to organize them into a taxonomy and underline the genuine ingredients in each of them disregarding their origin.", "abstracts": [ { "abstractType": "Regular", "content": "Visual graph analytics definitely relies on the use of node and edge metrics to identify salient properties in graphs. Most often, these metrics are turned into useful visual cues, or are used to interactively filter out parts of a graph while querying it, for instance. Along the years, analysts coming from different application domains have designed metrics to serve specific needs. Graph analytics, sometimes also called network science, recently developed as a cross-discipline field developing models shared by numerous application domains such as bio-informatics, social network analysis, web graphs, etc.[4] [10]. As a consequence, we end up finding various metrics in the literature aiming at similar goals; different names and analytics description often hide similarity between two metrics that originated from different fields. We survey a list of edge metrics for graphs and compare their relative value and behaviour, in an effort to organize them into a taxonomy and underline the genuine ingredients in each of them disregarding their origin.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual graph analytics definitely relies on the use of node and edge metrics to identify salient properties in graphs. Most often, these metrics are turned into useful visual cues, or are used to interactively filter out parts of a graph while querying it, for instance. Along the years, analysts coming from different application domains have designed metrics to serve specific needs. Graph analytics, sometimes also called network science, recently developed as a cross-discipline field developing models shared by numerous application domains such as bio-informatics, social network analysis, web graphs, etc.[4] [10]. As a consequence, we end up finding various metrics in the literature aiming at similar goals; different names and analytics description often hide similarity between two metrics that originated from different fields. We survey a list of edge metrics for graphs and compare their relative value and behaviour, in an effort to organize them into a taxonomy and underline the genuine ingredients in each of them disregarding their origin.", "fno": "3268a610", "keywords": [ "Visual Graph Analytics", "Edge Metrics", "Survey" ], "authors": [ { "affiliation": null, "fullName": "Guy Melan?on", "givenName": "Guy", "surname": "Melan?on", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Arnaud Sallaberry", "givenName": "Arnaud", "surname": "Sallaberry", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "610-615", "year": "2008", "issn": "1550-6037", "isbn": "978-0-7695-3268-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3268a600", "articleId": "12OmNAXPy46", "__typename": "AdjacentArticleType" }, "next": { "fno": "3268a616", "articleId": "12OmNzsJ7xO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/metrics/1996/7364/0/73640054", "title": "Inheritance Graph Assessment Using Metrics", "doi": null, "abstractUrl": "/proceedings-article/metrics/1996/73640054/12OmNvpew7A", "parentPublication": { "id": "proceedings/metrics/1996/7364/0", "title": "Software Metrics, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2006/0591/0/04035749", "title": "Have Green ? A Visual Analytics Framework for Large Semantic Graphs", "doi": null, "abstractUrl": "/proceedings-article/vast/2006/04035749/12OmNzQzqgi", "parentPublication": { "id": "proceedings/vast/2006/0591/0", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2013/4796/0/06781845", "title": "KnowYourColors: Visual dashboards for blood metrics and healthcare analytics", "doi": null, "abstractUrl": "/proceedings-article/isspit/2013/06781845/12OmNzlly1J", "parentPublication": { "id": "proceedings/isspit/2013/4796/0", "title": "2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192687", "title": "TrajGraph: A Graph-Based Visual Analytics Approach to Studying Urban Network Centralities Using Taxi Trajectory Data", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192687/13rRUwInvBa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2011/05/mcg2011050018", "title": "Graph Analytics—Lessons Learned and Challenges Ahead", "doi": null, "abstractUrl": "/magazine/cg/2011/05/mcg2011050018/13rRUxASu6j", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070039", "title": "Large-Scale Graph Visualization and Analytics", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070039/13rRUxBrGb7", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09672055", "title": "Visual Understanding of COVID-19 Knowledge Graph for Predictive Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09672055/1A8hmThsSbK", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552902", "title": "Interactive Visual Pattern Search on Graph Data via Graph Representation Learning", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552902/1xic4qsF8zK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2021/7744/0/09605404", "title": "E2E Visual Analytics: Achieving &#x003E;10X Edge/Cloud Optimizations", "doi": null, "abstractUrl": "/proceedings-article/nas/2021/09605404/1yJYcDuMmOc", "parentPublication": { "id": "proceedings/nas/2021/7744/0", "title": "2021 IEEE International Conference on Networking, Architecture and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2021/2067/0/206700a030", "title": "A Multi-Scale Visual Analytics Approach for Exploring Biomedical Knowledge", "doi": null, "abstractUrl": "/proceedings-article/vahc/2021/206700a030/1z0ykZQLK0w", "parentPublication": { "id": "proceedings/vahc/2021/2067/0", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTYC8M", "title": "2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)", "acronym": "cic", "groupId": "1001767", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNweBUHb", "doi": "10.1109/CIC.2016.053", "title": "Differentiating Non-Isomorphic Graphlets for Graph Analytics", "normalizedTitle": "Differentiating Non-Isomorphic Graphlets for Graph Analytics", "abstract": "The identification and enumeration of small, nonisomorphic graphs, called graphlets, within larger graphs is an analytic tool used for graph analytics. The problem of identifying graphlets embedded within a larger graph is a larger implementation of the graph isomorphism problem, with no known polynomial time algorithmic solution. One common method to identify the class of a given subgraph embedded within a supergraph is to make a degree list, called a signature, of it, and compare it to a list of known signatures and their corresponding graphlets. However, some graphlets have the same signature. Extra processing is needed to differentiate between them, and the existing method for determining how to differentiate them is by inspection and on a case by case basis. This paper proposes an algorithm to differentiate graphlets with identical signatures which significantly outperforms the existing method. A search space reduction technique is also proposed to reduce the computation cost.", "abstracts": [ { "abstractType": "Regular", "content": "The identification and enumeration of small, nonisomorphic graphs, called graphlets, within larger graphs is an analytic tool used for graph analytics. The problem of identifying graphlets embedded within a larger graph is a larger implementation of the graph isomorphism problem, with no known polynomial time algorithmic solution. One common method to identify the class of a given subgraph embedded within a supergraph is to make a degree list, called a signature, of it, and compare it to a list of known signatures and their corresponding graphlets. However, some graphlets have the same signature. Extra processing is needed to differentiate between them, and the existing method for determining how to differentiate them is by inspection and on a case by case basis. This paper proposes an algorithm to differentiate graphlets with identical signatures which significantly outperforms the existing method. A search space reduction technique is also proposed to reduce the computation cost.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The identification and enumeration of small, nonisomorphic graphs, called graphlets, within larger graphs is an analytic tool used for graph analytics. The problem of identifying graphlets embedded within a larger graph is a larger implementation of the graph isomorphism problem, with no known polynomial time algorithmic solution. One common method to identify the class of a given subgraph embedded within a supergraph is to make a degree list, called a signature, of it, and compare it to a list of known signatures and their corresponding graphlets. However, some graphlets have the same signature. Extra processing is needed to differentiate between them, and the existing method for determining how to differentiate them is by inspection and on a case by case basis. This paper proposes an algorithm to differentiate graphlets with identical signatures which significantly outperforms the existing method. A search space reduction technique is also proposed to reduce the computation cost.", "fno": "4607a349", "keywords": [ "Inspection", "Algorithm Design And Analysis", "Electronic Mail", "Visualization", "Search Problems", "Social Network Services", "Chemistry", "Embedded Graphs", "Graph Analytics", "Graphlet", "Subgraph Isomorphism" ], "authors": [ { "affiliation": null, "fullName": "John Calvin Alumbaugh", "givenName": "John Calvin", "surname": "Alumbaugh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qinghua Li", "givenName": "Qinghua", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vincent Hu", "givenName": "Vincent", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-11-01T00:00:00", "pubType": "proceedings", "pages": "349-356", "year": "2016", "issn": null, "isbn": "978-1-5090-4607-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4607a339", "articleId": "12OmNx4Q6Gq", "__typename": "AdjacentArticleType" }, "next": { "fno": "4607a357", "articleId": "12OmNx7XH3O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2016/2020/0/07498246", "title": "CSI_GED: An efficient approach for graph edit similarity computation", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498246/12OmNAGw168", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgi/2017/2280/0/2280a223", "title": "Efficient Subgraph Search on Large Anonymized Graphs", "doi": null, "abstractUrl": "/proceedings-article/icgi/2017/2280a223/12OmNAWYKKw", "parentPublication": { "id": "proceedings/icgi/2017/2280/0", "title": "2017 International Conference on Green Informatics (ICGI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/1999/0456/0/04560218", "title": "Removing Node and Edge Overlapping in Graph Layouts by A Modified EGENET Solver", "doi": null, "abstractUrl": "/proceedings-article/ictai/1999/04560218/12OmNC3XhzH", "parentPublication": { "id": "proceedings/ictai/1999/0456/0", "title": "Proceedings 11th International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07846985", "title": "Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07846985/12OmNz6iODm", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2016/3682/0/3682a328", "title": "Reducing Redundant Search in Parallel Graph Mining Using Exceptions", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682a328/12OmNzTYCbz", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870201", "title": "My Name is Legion: Estimating Author Counts Based on Stylistic Diversity", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870201/12OmNzX6crF", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1993/3840/0/00366611", "title": "Job sequencing with quadratic penalties: An A*-based graph search approach", "doi": null, "abstractUrl": "/proceedings-article/caia/1993/00366611/12OmNzlD9ym", "parentPublication": { "id": "proceedings/caia/1993/3840/0", "title": "Proceedings of 9th IEEE Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/01/08051106", "title": "MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs", "doi": null, "abstractUrl": "/journal/tk/2018/01/08051106/13rRUwgyOjJ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/06/08907362", "title": "MSQ-Index: A Succinct Index for Fast Graph Similarity Search", "doi": null, "abstractUrl": "/journal/tk/2021/06/08907362/1f75Jdp1pgk", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j538", "title": "Graph Attention Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j538/1yeIodcMAfK", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxbW4PI", "title": "2009 Cybersecurity Applications & Technology Conference for Homeland Security. CATCH 2009", "acronym": "catch", "groupId": "1002686", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNym2bW6", "doi": "10.1109/CATCH.2009.47", "title": "Visual Analytics for Network Flow Analysis", "normalizedTitle": "Visual Analytics for Network Flow Analysis", "abstract": "Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming – a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.", "abstracts": [ { "abstractType": "Regular", "content": "Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming – a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming – a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.", "fno": "3568a199", "keywords": [ "Network Data Visualization", "Information Assurance", "Visualization System", "Network Flow Analysis" ], "authors": [ { "affiliation": null, "fullName": "John R. Goodall", "givenName": "John R.", "surname": "Goodall", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Daniel R. Tesone", "givenName": "Daniel R.", "surname": "Tesone", "__typename": "ArticleAuthorType" } ], "idPrefix": "catch", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-03-01T00:00:00", "pubType": "proceedings", "pages": "199-204", "year": "2009", "issn": null, "isbn": "978-0-7695-3568-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3568a186", "articleId": "12OmNCdk2Ns", "__typename": "AdjacentArticleType" }, "next": { "fno": "3568a205", "articleId": "12OmNzwZ6uk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/lcn/2006/0418/0/04116641", "title": "Flexible Flow Aggregation for Adaptive Network Monitoring", "doi": null, "abstractUrl": "/proceedings-article/lcn/2006/04116641/12OmNAg7k1k", "parentPublication": { "id": "proceedings/lcn/2006/0418/0", "title": "Proceedings. 2006 31st IEEE Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/catch/2009/3568/0/3568a186", "title": "FloVis: Flow Visualization System", "doi": null, "abstractUrl": "/proceedings-article/catch/2009/3568a186/12OmNCdk2Ns", "parentPublication": { "id": "proceedings/catch/2009/3568/0", "title": "2009 Cybersecurity Applications &amp; Technology Conference for Homeland Security. CATCH 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2010/4258/0/4258a141", "title": "Equilibrium Network with Core-Periphery Architecture of Local Information Flow", "doi": null, "abstractUrl": "/proceedings-article/mines/2010/4258a141/12OmNroijbz", "parentPublication": { "id": "proceedings/mines/2010/4258/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997e702", "title": "The Analysis and Research on Information Flow in Computer Network", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997e702/12OmNyxXltC", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/02/mcg2006020072", "title": "Focusing on Context in Network Traffic Analysis", "doi": null, "abstractUrl": "/magazine/cg/2006/02/mcg2006020072/13rRUwciPgX", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2006/02/mcg2006020048", "title": "Visual Correlation of Network Alerts", "doi": null, "abstractUrl": "/magazine/cg/2006/02/mcg2006020048/13rRUwwslyB", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070030", "title": "Visual Analytics Support for Intelligence Analysis", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070030/13rRUxD9h0P", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876032", "title": "OpinionFlow: Visual Analysis of Opinion Diffusion on Social Media", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876032/13rRUxYINfe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2019/3876/0/09161590", "title": "PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2019/09161590/1m6hHiDxeKY", "parentPublication": { "id": "proceedings/vizsec/2019/3876/0", "title": "2019 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600b095", "title": "Research and Design of Visual Analytics System of Network Security Situation Based on Multi-source Log", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600b095/1x3l9MZHA52", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I0bRZfL0L6", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "acronym": "sc", "groupId": "10046045", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1I0bSLlULiU", "doi": "10.1109/SC41404.2022.00011", "title": "Exaflops Biomedical Knowledge Graph Analytics", "normalizedTitle": "Exaflops Biomedical Knowledge Graph Analytics", "abstract": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99&#x0025; in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "abstracts": [ { "abstractType": "Regular", "content": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99&#x0025; in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99% in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "fno": "544400a061", "keywords": [ "Data Mining", "Directed Graphs", "Graph Theory", "Natural Language Processing", "Parallel Machines", "Semantic Networks", "Text Analysis", "200 Frontier Nodes", "600 GC Ds", "73 GC Ds", "9 Frontier Nodes", "Annotated Text Databases", "Biomedical Literature", "Coast Algorithm", "Curated Biomedical Knowledge Graphs", "Exaflops Biomedical Knowledge Graph Analytics", "Exascale Communication Optimized All Pairs Shortest Path", "Graph Representations", "Guide Optimizations", "Hyperbolic Performance Models", "Large Scale Corpora", "Newly Proposed Methods", "Relationship Mining Problem", "Scholarly Publications", "Spoke Biomedical Knowledge Graph", "Validate Connective Paths", "Databases", "High Performance Computing", "Biological System Modeling", "Memory Management", "Knowledge Graphs", "Tuning", "Optimization", "Shortest Path Problem", "High Performance Computing", "Parallel Algorithms" ], "authors": [ { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Ramakrishnan Kannan", "givenName": "Ramakrishnan", "surname": "Kannan", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Piyush Sao", "givenName": "Piyush", "surname": "Sao", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Hao Lu", "givenName": "Hao", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Advanced Micro Devices, Inc.,USA", "fullName": "Jakub Kurzak", "givenName": "Jakub", "surname": "Kurzak", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Gundolf Schenk", "givenName": "Gundolf", "surname": "Schenk", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Yongmei Shi", "givenName": "Yongmei", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Seung–Hwan Lim", "givenName": "Seung–Hwan", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Sharat Israni", "givenName": "Sharat", "surname": "Israni", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology,Atlanta,GA,USA", "fullName": "Vijay Thakkar", "givenName": "Vijay", "surname": "Thakkar", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Guojing Cong", "givenName": "Guojing", "surname": "Cong", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Robert Patton", "givenName": "Robert", "surname": "Patton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Sergio E. Baranzini", "givenName": "Sergio E.", "surname": "Baranzini", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology,Atlanta,GA,USA", "fullName": "Richard Vuduc", "givenName": "Richard", "surname": "Vuduc", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Thomas Potok", "givenName": "Thomas", "surname": "Potok", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-11", "year": "2022", "issn": null, "isbn": "978-1-6654-5444-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "544400a061", "articleId": "1L07nzK3xjW", "__typename": "AdjacentArticleType" }, "next": { "fno": "544400a072", "articleId": "1L07slwVRW8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2017/2715/0/08258142", "title": "Augmenting word embeddings through external knowledge-base for biomedical application", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258142/17D45Wda7eX", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b415", "title": "BioHanBERT: A Hanzi-aware Pre-trained Language Model for Chinese Biomedical Text Mining", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b415/1AqxedOkH1S", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995583", "title": "BioELM: Integrating Biomedical Knowledge into Language Model with Entity-Linking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995583/1JC23bXjmtG", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a061", "title": "Exaflops Biomedical Knowledge Graph Analytics", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a061/1L07nzK3xjW", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ici2st/2022/5517/0/551700a072", "title": "Automated Web Annotator of Biomedical Entities in Spanish Language", "doi": null, "abstractUrl": "/proceedings-article/ici2st/2022/551700a072/1Lz2dKUtyGQ", "parentPublication": { "id": "proceedings/ici2st/2022/5517/0", "title": "2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a271", "title": "Intrinsic and Extrinsic Evaluation of the Quality of Biomedical Embeddings in Different Languages", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a271/1mLMkZMWFAk", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2020/9998/0/999800a061", "title": "Scalable Knowledge Graph Analytics at 136 Petaflop/s", "doi": null, "abstractUrl": "/proceedings-article/sc/2020/999800a061/1oeORDgCM0g", "parentPublication": { "id": "proceedings/sc/2020/9998/0/", "title": "2020 SC20: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313239", "title": "Dual sentence representation model integrating prior knowledge for bio-text-mining", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313239/1qmfMiQuFMI", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313367", "title": "Extracting biomedical relations via a multi-head attention based graph convolutional network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313367/1qmfMwE1FPa", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313214", "title": "A Novel Method for Multiple Biomedical Events Extraction with Reinforcement Learning and Knowledge Bases", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313214/1qmg9ILRoiY", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I0bRZfL0L6", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "acronym": "sc", "groupId": "10046045", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1L07nzK3xjW", "doi": "10.1109/SC41404.2022.00011", "title": "Exaflops Biomedical Knowledge Graph Analytics", "normalizedTitle": "Exaflops Biomedical Knowledge Graph Analytics", "abstract": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99&#x0025; in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "abstracts": [ { "abstractType": "Regular", "content": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99&#x0025; in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are motivated by newly proposed methods for mining large-scale corpora of scholarly publications (e.g., full biomedical literature), which consists of tens of millions of papers spanning decades of research. In this setting, analysts seek to discover relationships among concepts. They construct graph representations from annotated text databases and then formulate the relationship-mining problem as an all-pairs shortest paths (APSP) and validate connective paths against curated biomedical knowledge graphs (e.g., Spoke). In this context, we present Coast (Exascale Communication-Optimized All-Pairs Shortest Path) and demonstrate 1.004 EF/s on 9,200 Frontier nodes (73,600 GCDs). We develop hyperbolic performance models (HYPERMOD), which guide optimizations and parametric tuning. The proposed Coast algorithm achieved the memory constant parallel efficiency of 99% in the single-precision tropical semiring. Looking forward, Coast will enable the integration of scholarly corpora like PubMed into the Spoke biomedical knowledge graph.", "fno": "544400a061", "keywords": [ "Databases", "High Performance Computing", "Biological System Modeling", "Memory Management", "Knowledge Graphs", "Tuning", "Optimization", "Shortest Path Problem", "High Performance Computing", "Parallel Algorithms" ], "authors": [ { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Ramakrishnan Kannan", "givenName": "Ramakrishnan", "surname": "Kannan", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Piyush Sao", "givenName": "Piyush", "surname": "Sao", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Hao Lu", "givenName": "Hao", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Advanced Micro Devices, Inc.,USA", "fullName": "Jakub Kurzak", "givenName": "Jakub", "surname": "Kurzak", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Gundolf Schenk", "givenName": "Gundolf", "surname": "Schenk", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Yongmei Shi", "givenName": "Yongmei", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Seung–Hwan Lim", "givenName": "Seung–Hwan", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Sharat Israni", "givenName": "Sharat", "surname": "Israni", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology,Atlanta,GA,USA", "fullName": "Vijay Thakkar", "givenName": "Vijay", "surname": "Thakkar", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Guojing Cong", "givenName": "Guojing", "surname": "Cong", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Robert Patton", "givenName": "Robert", "surname": "Patton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,San Francisco,CA,USA", "fullName": "Sergio E. Baranzini", "givenName": "Sergio E.", "surname": "Baranzini", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology,Atlanta,GA,USA", "fullName": "Richard Vuduc", "givenName": "Richard", "surname": "Vuduc", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Thomas Potok", "givenName": "Thomas", "surname": "Potok", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-11", "year": "2022", "issn": null, "isbn": "978-1-6654-5444-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "544400a048", "articleId": "1I0bSKXvg7m", "__typename": "AdjacentArticleType" }, "next": { "fno": "544400a061", "articleId": "1I0bSLlULiU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2017/2715/0/08258142", "title": "Augmenting word embeddings through external knowledge-base for biomedical application", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258142/17D45Wda7eX", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b415", "title": "BioHanBERT: A Hanzi-aware Pre-trained Language Model for Chinese Biomedical Text Mining", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b415/1AqxedOkH1S", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a061", "title": "Exaflops Biomedical Knowledge Graph Analytics", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a061/1I0bSLlULiU", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995583", "title": "BioELM: Integrating Biomedical Knowledge into Language Model with Entity-Linking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995583/1JC23bXjmtG", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ici2st/2022/5517/0/551700a072", "title": "Automated Web Annotator of Biomedical Entities in Spanish Language", "doi": null, "abstractUrl": "/proceedings-article/ici2st/2022/551700a072/1Lz2dKUtyGQ", "parentPublication": { "id": "proceedings/ici2st/2022/5517/0", "title": "2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a271", "title": "Intrinsic and Extrinsic Evaluation of the Quality of Biomedical Embeddings in Different Languages", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a271/1mLMkZMWFAk", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2020/9998/0/999800a061", "title": "Scalable Knowledge Graph Analytics at 136 Petaflop/s", "doi": null, "abstractUrl": "/proceedings-article/sc/2020/999800a061/1oeORDgCM0g", "parentPublication": { "id": "proceedings/sc/2020/9998/0/", "title": "2020 SC20: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313239", "title": "Dual sentence representation model integrating prior knowledge for bio-text-mining", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313239/1qmfMiQuFMI", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313367", "title": "Extracting biomedical relations via a multi-head attention based graph convolutional network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313367/1qmfMwE1FPa", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313214", "title": "A Novel Method for Multiple Biomedical Events Extraction with Reinforcement Learning and Knowledge Bases", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313214/1qmg9ILRoiY", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1q7jvqMQMww", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1q7jvQC41gs", "doi": "10.1109/VAST50239.2020.00007", "title": "Diagnosing Concept Drift with Visual Analytics", "normalizedTitle": "Diagnosing Concept Drift with Visual Analytics", "abstract": "Concept drift is a phenomenon in which the distribution of a data stream changes over time in unforeseen ways, causing prediction models built on historical data to become inaccurate. While a variety of automated methods have been developed to identify when concept drift occurs, there is limited support for analysts who need to understand and correct their models when drift is detected. In this paper, we present a visual analytics method, DriftVis, to support model builders and analysts in the identification and correction of concept drift in streaming data. DriftVis combines a distribution-based drift detection method with a streaming scatterplot to support the analysis of drift caused by the distribution changes of data streams and to explore the impact of these changes on the model&#x2019;s accuracy. A quantitative experiment and two case studies on weather prediction and text classification have been conducted to demonstrate our proposed tool and illustrate how visual analytics can be used to support the detection, examination, and correction of concept drift.", "abstracts": [ { "abstractType": "Regular", "content": "Concept drift is a phenomenon in which the distribution of a data stream changes over time in unforeseen ways, causing prediction models built on historical data to become inaccurate. While a variety of automated methods have been developed to identify when concept drift occurs, there is limited support for analysts who need to understand and correct their models when drift is detected. In this paper, we present a visual analytics method, DriftVis, to support model builders and analysts in the identification and correction of concept drift in streaming data. DriftVis combines a distribution-based drift detection method with a streaming scatterplot to support the analysis of drift caused by the distribution changes of data streams and to explore the impact of these changes on the model&#x2019;s accuracy. A quantitative experiment and two case studies on weather prediction and text classification have been conducted to demonstrate our proposed tool and illustrate how visual analytics can be used to support the detection, examination, and correction of concept drift.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Concept drift is a phenomenon in which the distribution of a data stream changes over time in unforeseen ways, causing prediction models built on historical data to become inaccurate. While a variety of automated methods have been developed to identify when concept drift occurs, there is limited support for analysts who need to understand and correct their models when drift is detected. In this paper, we present a visual analytics method, DriftVis, to support model builders and analysts in the identification and correction of concept drift in streaming data. DriftVis combines a distribution-based drift detection method with a streaming scatterplot to support the analysis of drift caused by the distribution changes of data streams and to explore the impact of these changes on the model’s accuracy. A quantitative experiment and two case studies on weather prediction and text classification have been conducted to demonstrate our proposed tool and illustrate how visual analytics can be used to support the detection, examination, and correction of concept drift.", "fno": "800900a012", "keywords": [ "Data Analysis", "Data Visualisation", "Learning Artificial Intelligence", "Pattern Classification", "Text Analysis", "Weather Forecasting", "Visual Analytics Method", "Distribution Based Drift Detection Method", "Drift Vis", "Model Builder Support", "Concept Drift Identification", "Concept Drift Correction", "Streaming Scatterplot", "Data Stream Distribution Change", "Weather Prediction", "Text Classification", "Analytical Models", "Data Models", "Adaptation Models", "Predictive Models", "Visual Analytics", "Training", "Data Visualization", "Concept Drift", "Streaming Data", "Change Detection", "Scatterplot", "T SNE" ], "authors": [ { "affiliation": "Tsinghua University,School of Software, BNRist", "fullName": "Weikai Yang", "givenName": "Weikai", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,School of Software, BNRist", "fullName": "Zhen Li", "givenName": "Zhen", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft", "fullName": "Mengchen Liu", "givenName": "Mengchen", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Bloomberg L.P.", "fullName": "Yafeng Lu", "givenName": "Yafeng", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,School of Software, BNRist", "fullName": "Kelei Cao", "givenName": "Kelei", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Arizona State University,Computer Science", "fullName": "Ross Maciejewski", "givenName": "Ross", "surname": "Maciejewski", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,School of Software, BNRist", "fullName": "Shixia Liu", "givenName": "Shixia", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "12-23", "year": "2020", "issn": null, "isbn": "978-1-7281-8009-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "800900a001", "articleId": "1q7jwcolR1m", "__typename": "AdjacentArticleType" }, "next": { "fno": "800900a024", "articleId": "1q7jvGd9nJS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/percomw/2013/5075/0/06529455", "title": "Exploring concept drift using interactive simulations", "doi": null, "abstractUrl": "/proceedings-article/percomw/2013/06529455/12OmNqJ8t8L", "parentPublication": { "id": "proceedings/percomw/2013/5075/0", "title": "2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2012/4925/0/4925a402", "title": "Parallel Concept Drift Detection with Online Map-Reduce", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a402/12OmNwtn3Cm", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisa/2014/4443/0/06847357", "title": "An Ensemble Learning Approach for Concept Drift", "doi": null, "abstractUrl": "/proceedings-article/icisa/2014/06847357/12OmNy3RRHH", "parentPublication": { "id": "proceedings/icisa/2014/4443/0", "title": "2014 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2013/5006/0/06597128", "title": "Countering the Concept-Drift Problem in Big Data Using iOVFDT", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2013/06597128/12OmNyQ7G1y", "parentPublication": { "id": "proceedings/bigdata-congress/2013/5006/0", "title": "2013 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/12/08496795", "title": "Learning under Concept Drift: A Review", "doi": null, "abstractUrl": "/journal/tk/2019/12/08496795/14tNJpmuJlG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09729470", "title": "Concept Drift Detection Delay Index", "doi": null, "abstractUrl": "/journal/tk/2023/05/09729470/1Bya28FGIU0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086217", "title": "A Visual Analytics Framework for Reviewing Streaming Performance Data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086217/1kuHmvctSOk", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2020/9926/1/09140292", "title": "Handling Concept Drift for Predictions in Business Process Mining", "doi": null, "abstractUrl": "/proceedings-article/cbi/2020/09140292/1lu6QJrYe6A", "parentPublication": { "id": "cbi/2020/9926/1", "title": "2020 IEEE 22nd Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a001", "title": "ConceptExplorer: Visual Analysis of Concept Drifts in Multi-source Time-series Data", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a001/1q7jwcolR1m", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400b068", "title": "Concept Drift Detection from Multi-Class Imbalanced Data Streams", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400b068/1uGXtovWCqY", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvSbBsE", "title": "2012 IEEE Symposium on Large Data Analysis and Visualization (LDAV 2012)", "acronym": "ldav", "groupId": "1800568", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAPjA7B", "doi": "10.1109/LDAV.2012.6378962", "title": "Interactive exploration of large-scale time-varying data using dynamic tracking graphs", "normalizedTitle": "Interactive exploration of large-scale time-varying data using dynamic tracking graphs", "abstract": "Exploring and analyzing the temporal evolution of features in large-scale time-varying datasets is a common problem in many areas of science and engineering. One natural representation of such data is tracking graphs, i.e., constrained graph layouts that use one spatial dimension to indicate time and show the “tracks” of each feature as it evolves, merges or disappears. However, for practical data sets creating the corresponding optimal graph layouts that minimize the number of intersections can take hours to compute with existing techniques. Furthermore, the resulting graphs are often unmanageably large and complex even with an ideal layout. Finally, due to the cost of the layout, changing the feature definition, e.g. by changing an iso-value, or analyzing properly adjusted sub-graphs is infeasible. To address these challenges, this paper presents a new framework that couples hierarchical feature definitions with progressive graph layout algorithms to provide an interactive exploration of dynamically constructed tracking graphs. Our system enables users to change feature definitions on-the-fly and filter features using arbitrary attributes while providing an interactive view of the resulting tracking graphs. Furthermore, the graph display is integrated into a linked view system that provides a traditional 3D view of the current set of features and allows a cross-linked selection to enable a fully flexible spatio-temporal exploration of data. We demonstrate the utility of our approach with several large-scale scientific simulations from combustion science.", "abstracts": [ { "abstractType": "Regular", "content": "Exploring and analyzing the temporal evolution of features in large-scale time-varying datasets is a common problem in many areas of science and engineering. One natural representation of such data is tracking graphs, i.e., constrained graph layouts that use one spatial dimension to indicate time and show the “tracks” of each feature as it evolves, merges or disappears. However, for practical data sets creating the corresponding optimal graph layouts that minimize the number of intersections can take hours to compute with existing techniques. Furthermore, the resulting graphs are often unmanageably large and complex even with an ideal layout. Finally, due to the cost of the layout, changing the feature definition, e.g. by changing an iso-value, or analyzing properly adjusted sub-graphs is infeasible. To address these challenges, this paper presents a new framework that couples hierarchical feature definitions with progressive graph layout algorithms to provide an interactive exploration of dynamically constructed tracking graphs. Our system enables users to change feature definitions on-the-fly and filter features using arbitrary attributes while providing an interactive view of the resulting tracking graphs. Furthermore, the graph display is integrated into a linked view system that provides a traditional 3D view of the current set of features and allows a cross-linked selection to enable a fully flexible spatio-temporal exploration of data. We demonstrate the utility of our approach with several large-scale scientific simulations from combustion science.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Exploring and analyzing the temporal evolution of features in large-scale time-varying datasets is a common problem in many areas of science and engineering. One natural representation of such data is tracking graphs, i.e., constrained graph layouts that use one spatial dimension to indicate time and show the “tracks” of each feature as it evolves, merges or disappears. However, for practical data sets creating the corresponding optimal graph layouts that minimize the number of intersections can take hours to compute with existing techniques. Furthermore, the resulting graphs are often unmanageably large and complex even with an ideal layout. Finally, due to the cost of the layout, changing the feature definition, e.g. by changing an iso-value, or analyzing properly adjusted sub-graphs is infeasible. To address these challenges, this paper presents a new framework that couples hierarchical feature definitions with progressive graph layout algorithms to provide an interactive exploration of dynamically constructed tracking graphs. Our system enables users to change feature definitions on-the-fly and filter features using arbitrary attributes while providing an interactive view of the resulting tracking graphs. Furthermore, the graph display is integrated into a linked view system that provides a traditional 3D view of the current set of features and allows a cross-linked selection to enable a fully flexible spatio-temporal exploration of data. We demonstrate the utility of our approach with several large-scale scientific simulations from combustion science.", "fno": "06378962", "keywords": [ "Computer Graphics", "Graph Theory", "Interactive Systems", "Interactive Exploration", "Large Scale Time Varying Data", "Dynamic Tracking Graphs", "Temporal Evolution", "Constrained Graph Layouts", "Spatial Dimension", "Feature Definition", "Spatio Temporal Exploration", "Layout", "Feature Extraction", "Data Visualization", "Vegetation", "Correlation", "Measurement", "Visualization", "Time Varying Data", "Feature Detection And Tracking", "Parallel Coordinates", "Topology Based Techniques", "Visualization In Physical Sciences And Engineering" ], "authors": [ { "affiliation": "SCI Institute, University of Utah", "fullName": "Wathsala Widanagamaachchi", "givenName": "Wathsala", "surname": "Widanagamaachchi", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah", "fullName": "Cameron Christensen", "givenName": "Cameron", "surname": "Christensen", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah", "fullName": "Valerio Pascucci", "givenName": "Valerio", "surname": "Pascucci", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah, Lawrence Livermore National Laboratory", "fullName": "Peer-Timo Bremer", "givenName": "Peer-Timo", "surname": "Bremer", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "9-17", "year": "2012", "issn": null, "isbn": "978-1-4673-4733-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06378961", "articleId": "12OmNApu5tJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06378971", "articleId": "12OmNBp52t6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2003/2055/0/20550007", "title": "EdgeLens: An Interactive Method for Managing Edge Congestion in Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550007/12OmNBNM8UK", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004018", "title": "Drawing Semi-bipartite Graphs in Anchor+Matrix Style", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004018/12OmNqJq4Ao", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126224", "title": "Analysis of a high-dimensional approach to interactive graph drawing", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126224/12OmNwcCILb", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2013/4797/0/06596149", "title": "A generative layout approach for rooted tree drawings", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596149/12OmNxXCGLc", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156391", "title": "Interactive high-dimensional visualization of social graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156391/12OmNxYL5gh", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790191", "title": "Dynamic Drawing of Clustered Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790191/12OmNyugyVo", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0805", "title": "Visual Exploration of Complex Time-Varying Graphs", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0805/13rRUxBa5x5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g670", "title": "Generative Layout Modeling using Constraint Graphs", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g670/1BmIILGrL1u", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10024388", "title": "Graph Exploration with Embedding-Guided Layouts", "doi": null, "abstractUrl": "/journal/tg/5555/01/10024388/1KaB9SqICWs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a045", "title": "Effects of Individual Difference on User-Sketched Layouts of Vertex-Weighted Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a045/1rSReYMa9b2", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCf1Dph", "title": "2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzSyChl", "doi": "10.1109/SIBGRAPI.2014.43", "title": "Semantically Aware Dynamic Layouts", "normalizedTitle": "Semantically Aware Dynamic Layouts", "abstract": "Arranging geometric primitives in a two-dimensional layout is a typical problem in graphics and visualization applications. Most existing approaches are either not flexible enough to allow users modify the layout according to their interest or unable to maintain the semantic relation between geometric instances during user manipulation. The few interactive semantic aware layout construction methods relies on computationally costly energy functional that demand intricate GPU implementations to enable real-time user interventions. In this work we propose a novel interactive semantic aware layout construction technique that relies on a simple mathematical and computational formulation that allow users to freely interact with the layout. Our approach is supported by interactive multidimensional projection methods, which enforces similar instances to be placed close to each other during layout updates. The presented results show the versatility, effectiveness, and simplicity of our approach when building semantic aware user tailored layouts.", "abstracts": [ { "abstractType": "Regular", "content": "Arranging geometric primitives in a two-dimensional layout is a typical problem in graphics and visualization applications. Most existing approaches are either not flexible enough to allow users modify the layout according to their interest or unable to maintain the semantic relation between geometric instances during user manipulation. The few interactive semantic aware layout construction methods relies on computationally costly energy functional that demand intricate GPU implementations to enable real-time user interventions. In this work we propose a novel interactive semantic aware layout construction technique that relies on a simple mathematical and computational formulation that allow users to freely interact with the layout. Our approach is supported by interactive multidimensional projection methods, which enforces similar instances to be placed close to each other during layout updates. The presented results show the versatility, effectiveness, and simplicity of our approach when building semantic aware user tailored layouts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Arranging geometric primitives in a two-dimensional layout is a typical problem in graphics and visualization applications. Most existing approaches are either not flexible enough to allow users modify the layout according to their interest or unable to maintain the semantic relation between geometric instances during user manipulation. The few interactive semantic aware layout construction methods relies on computationally costly energy functional that demand intricate GPU implementations to enable real-time user interventions. In this work we propose a novel interactive semantic aware layout construction technique that relies on a simple mathematical and computational formulation that allow users to freely interact with the layout. Our approach is supported by interactive multidimensional projection methods, which enforces similar instances to be placed close to each other during layout updates. The presented results show the versatility, effectiveness, and simplicity of our approach when building semantic aware user tailored layouts.", "fno": "4258a220", "keywords": [ "Computational Geometry", "Semantically Aware Dynamic Layouts", "Geometric Primitives", "Two Dimensional Layout", "Semantic Relation", "Geometric Instance", "User Manipulation", "Interactive Semantic Aware Layout Construction Method", "Energy Functional", "GPU Implementation", "Real Time User Intervention", "Interactive Semantic Aware Layout Construction Technique", "Mathematical Formulation", "Computational Formulation", "Interactive Multidimensional Projection Method", "Layout Updates", "Layout", "Visualization", "Semantics", "Optimization", "Vectors", "Aerospace Electronics", "Data Visualization", "Multidimensional Projection", "Overlap Removal" ], "authors": [ { "affiliation": "Dept. de Mat. Aplic. e Estaistica, Univ. de Sao Paulo, Sao Paulo, Brazil", "fullName": "Erick Gomez Nieto", "givenName": "Erick", "surname": "Gomez Nieto", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. de Mat. Aplic. e Estaistica, Univ. de Sao Paulo, Sao Paulo, Brazil", "fullName": "Danilo Motta", "givenName": "Danilo", "surname": "Motta", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. de Mat. Aplic. e Estaistica, Univ. de Sao Paulo, Sao Paulo, Brazil", "fullName": "Luis Gustavo Nonato", "givenName": "Luis Gustavo", "surname": "Nonato", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "220-226", "year": "2014", "issn": "1530-1834", "isbn": "978-1-4799-4258-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4258a212", "articleId": "12OmNxwncpk", "__typename": "AdjacentArticleType" }, "next": { "fno": "4258a227", "articleId": "12OmNxbEtOb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2013/0015/0/06607473", "title": "Semantic-Spatial Matching for image classification", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607473/12OmNBpVQ7w", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156379", "title": "Clutter-aware label layout", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156379/12OmNyY4rqE", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a217", "title": "Manipulating Bilevel Feature Space for Category-Aware Image Exploration", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a217/12OmNzzfTme", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v1213", "title": "Mesh Layouts for Block-Based Caches", "doi": null, "abstractUrl": "/journal/tg/2006/05/v1213/13rRUILtJlY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/07/08358974", "title": "A Semantic-Based Method for Visualizing Large Image Collections", "doi": null, "abstractUrl": "/journal/tg/2019/07/08358974/13rRUxC0SP1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440827", "title": "Charticulator: Interactive Construction of Bespoke Chart Layouts", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440827/17D45WYQJ6A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440835", "title": "Structure-aware Fisheye Views for Efficient Large Graph Exploration", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440835/17D45XwUAL3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600c426", "title": "Aesthetic Text Logo Synthesis via Content-aware Layout Inferring", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600c426/1H1hPvHfvNe", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807379", "title": "Persistent Homology Guided Force-Directed Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2021/4066/0/406600a547", "title": "Adaptive Spatially Aware I/O for Multiresolution Particle Data Layouts", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2021/406600a547/1uOwcOEBO8M", "parentPublication": { "id": "proceedings/ipdps/2021/4066/0", "title": "2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I6RKhOHxAs", "title": "2022 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1I6ROXhzPzy", "doi": "10.1109/CW55638.2022.00041", "title": "Interactive Drawing Interface for Editing Scene Graph", "normalizedTitle": "Interactive Drawing Interface for Editing Scene Graph", "abstract": "Scene graphs have been widely used in various visual applications, such as image retrieval and generation. However, it is time consuming and challenging to draw scene graphs, especially for images with complex scenes. To resolve this issue, we propose an interactive editing interface for scene graph representation in which users can draw scene graphs simply and conveniently. We provide alternatives for frequently used objects, attributes, and relationships in graph drawing. The proposed function design can greatly reduce the drawing time cost and improve drawing quality. We conducted a user study and confirmed that the proposed interface can help users draw the desired scene graph, as well as providing a good user experience.", "abstracts": [ { "abstractType": "Regular", "content": "Scene graphs have been widely used in various visual applications, such as image retrieval and generation. However, it is time consuming and challenging to draw scene graphs, especially for images with complex scenes. To resolve this issue, we propose an interactive editing interface for scene graph representation in which users can draw scene graphs simply and conveniently. We provide alternatives for frequently used objects, attributes, and relationships in graph drawing. The proposed function design can greatly reduce the drawing time cost and improve drawing quality. We conducted a user study and confirmed that the proposed interface can help users draw the desired scene graph, as well as providing a good user experience.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scene graphs have been widely used in various visual applications, such as image retrieval and generation. However, it is time consuming and challenging to draw scene graphs, especially for images with complex scenes. To resolve this issue, we propose an interactive editing interface for scene graph representation in which users can draw scene graphs simply and conveniently. We provide alternatives for frequently used objects, attributes, and relationships in graph drawing. The proposed function design can greatly reduce the drawing time cost and improve drawing quality. We conducted a user study and confirmed that the proposed interface can help users draw the desired scene graph, as well as providing a good user experience.", "fno": "681400a171", "keywords": [ "Data Visualisation", "Graph Theory", "Image Retrieval", "Rendering Computer Graphics", "Interactive Drawing Interface", "Editing Scene Graph", "Scene Graphs", "Image Retrieval", "Complex Scenes", "Interactive Editing Interface", "Scene Graph Representation", "Graph Drawing", "Drawing Time Cost", "Drawing Quality", "Desired Scene Graph", "Visualization", "Image Resolution", "Costs", "Image Retrieval", "Graph Drawing", "User Experience", "Usability", "Object Oriented Method", "Scene Graph", "Interactive Editing Interface" ], "authors": [ { "affiliation": "Japan Advanced Institute of Science and Technology", "fullName": "Tianyu Zhang", "givenName": "Tianyu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Japan Advanced Institute of Science and Technology", "fullName": "Xusheng Du", "givenName": "Xusheng", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tokyo", "fullName": "Chia-Ming Chang", "givenName": "Chia-Ming", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "Jilin University", "fullName": "Xi Yang", "givenName": "Xi", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Japan Advanced Institute of Science and Technology", "fullName": "Haoran Xie", "givenName": "Haoran", "surname": "Xie", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-09-01T00:00:00", "pubType": "proceedings", "pages": "171-172", "year": "2022", "issn": null, "isbn": "978-1-6654-6814-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "681400a169", "articleId": "1I6RLB7VvGg", "__typename": "AdjacentArticleType" }, "next": { "fno": "681400a173", "articleId": "1I6ROPRJER2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicse/2008/3112/0/3112a110", "title": "A Fast Multi-level Algorithm for Drawing Large Undirected Graphs", "doi": null, "abstractUrl": "/proceedings-article/icicse/2008/3112a110/12OmNAL3Bah", "parentPublication": { "id": "proceedings/icicse/2008/3112/0", "title": "2008 International Conference on Internet Computing in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1998/8712/0/87120032", "title": "A Graph Rewriting Programming Language for Graph Drawing", "doi": null, "abstractUrl": "/proceedings-article/vl/1998/87120032/12OmNB7LvGY", "parentPublication": { "id": "proceedings/vl/1998/8712/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1990/2082/0/089527", "title": "Drawing graphs in the plane with high resolution", "doi": null, "abstractUrl": "/proceedings-article/focs/1990/089527/12OmNBqdr7P", "parentPublication": { "id": "proceedings/focs/1990/2082/0", "title": "Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2013/5051/0/5051a088", "title": "Improving the Quality of Clustered Graph Drawing through a Dummy Element Approach", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2013/5051a088/12OmNvxKtYl", "parentPublication": { "id": "proceedings/cgiv/2013/5051/0", "title": "2013 10th International Conference Computer Graphics, Imaging and Visualization (CGIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126224", "title": "Analysis of a high-dimensional approach to interactive graph drawing", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126224/12OmNwcCILb", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a292", "title": "Interactive Cartographic Drawing within the RIA/Silverlight Environment", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a292/12OmNweBUNE", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790191", "title": "Dynamic Drawing of Clustered Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790191/12OmNyugyVo", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1998/11/t1297", "title": "Interactive Orthogonal Graph Drawing", "doi": null, "abstractUrl": "/journal/tc/1998/11/t1297/13rRUwfZBZo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061082", "title": "Visualization of Graph Products", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061082/13rRUx0xPmX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/05/09476996", "title": "DeepGD: A Deep Learning Framework for Graph Drawing Using GNN", "doi": null, "abstractUrl": "/magazine/cg/2021/05/09476996/1v2MgNY5cuk", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBhpS6P", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "acronym": "passat-socialcom", "groupId": "1800612", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvCRglj", "doi": "10.1109/SocialCom-PASSAT.2012.59", "title": "Centrality Analysis, Role-Based Clustering, and Egocentric Abstraction for Heterogeneous Social Networks", "normalizedTitle": "Centrality Analysis, Role-Based Clustering, and Egocentric Abstraction for Heterogeneous Social Networks", "abstract": "The social network is a powerful data structure allowing the depiction of relationship information between entities. Recent researchers have proposed many successful methods on analyzing homogeneous social networks assuming only a single type of node and relation. Nevertheless, real-world complex networks are usually heterogeneous, which presumes a network can be composed of different types of nodes and relations. In this paper, we propose an unsupervised tensor-based mechanism considering higher-order relational information to model the complex semantics of a heterogeneous social network. Based on the model we present solutions to three critical issues in heterogeneous networks. The first concerns identifying central nodes in the heterogeneous network. Second, we propose a role-based clustering method to identify nodes which play similar roles in the network. Finally, we propose an egocentric abstraction mechanism to facilitate further explorations in a complex social network. The evaluations are conducted on a real-world movie dataset and an artificial crime dataset with promising results.", "abstracts": [ { "abstractType": "Regular", "content": "The social network is a powerful data structure allowing the depiction of relationship information between entities. Recent researchers have proposed many successful methods on analyzing homogeneous social networks assuming only a single type of node and relation. Nevertheless, real-world complex networks are usually heterogeneous, which presumes a network can be composed of different types of nodes and relations. In this paper, we propose an unsupervised tensor-based mechanism considering higher-order relational information to model the complex semantics of a heterogeneous social network. Based on the model we present solutions to three critical issues in heterogeneous networks. The first concerns identifying central nodes in the heterogeneous network. Second, we propose a role-based clustering method to identify nodes which play similar roles in the network. Finally, we propose an egocentric abstraction mechanism to facilitate further explorations in a complex social network. The evaluations are conducted on a real-world movie dataset and an artificial crime dataset with promising results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The social network is a powerful data structure allowing the depiction of relationship information between entities. Recent researchers have proposed many successful methods on analyzing homogeneous social networks assuming only a single type of node and relation. Nevertheless, real-world complex networks are usually heterogeneous, which presumes a network can be composed of different types of nodes and relations. In this paper, we propose an unsupervised tensor-based mechanism considering higher-order relational information to model the complex semantics of a heterogeneous social network. Based on the model we present solutions to three critical issues in heterogeneous networks. The first concerns identifying central nodes in the heterogeneous network. Second, we propose a role-based clustering method to identify nodes which play similar roles in the network. Finally, we propose an egocentric abstraction mechanism to facilitate further explorations in a complex social network. The evaluations are conducted on a real-world movie dataset and an artificial crime dataset with promising results.", "fno": "06406264", "keywords": [ "Complex Networks", "Data Mining", "Data Structures", "Network Theory Graphs", "Pattern Clustering", "Heterogeneous Social Networks", "Role Based Clustering Method", "Centrality Analysis", "Data Structure", "Real World Complex Networks", "Tensor Based Mechanism", "Higher Order Relational Information", "Complex Semantics", "Egocentric Abstraction Mechanism", "Real World Movie Dataset", "Artificial Crime Dataset", "Social Network Services", "Semantics", "Communities", "Tensile Stress", "Motion Pictures", "Vectors", "Joining Processes", "Social Network", "Heterogeneous Information Network", "Centrality", "Clustering", "Abstraction" ], "authors": [ { "affiliation": null, "fullName": "Cheng-Te Li", "givenName": "Cheng-Te", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shou-De Lin", "givenName": "Shou-De", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "passat-socialcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2012", "issn": null, "isbn": "978-1-4673-5638-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4848z030", "articleId": "1h0HwaG3PLa", "__typename": "AdjacentArticleType" }, "next": { "fno": "06406265", "articleId": "12OmNyyO8J9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2015/9504/0/9504a757", "title": "CNL: Collective Network Linkage Across Heterogeneous Social Platforms", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a757/12OmNApLGrP", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2013/2240/0/06785740", "title": "Deconstructing centrality: Thinking locally and ranking globally in networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785740/12OmNvStcHu", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921599", "title": "SSRM: Structural social role mining for dynamic social networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921599/12OmNwcCIRB", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a630", "title": "Modeling and Mining Spatiotemporal Social Contact of Metapopulation from Heterogeneous Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a630/12OmNwp74N0", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2009/3689/0/3689a255", "title": "Egocentric Information Abstraction for Heterogeneous Social Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2009/3689a255/12OmNzIUfJK", "parentPublication": { "id": "proceedings/asonam/2009/3689/0", "title": "2009 International Conference on Advances in Social Network Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2013/2240/0/06785685", "title": "Centrality and mode detection in dynamic contact graphs; a joint diagonalisation approach", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785685/12OmNzWfp6i", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2014/09/06494568", "title": "Leveraging Peer Centrality in the Designof Socially-Informed Peer-to-Peer Systems", "doi": null, "abstractUrl": "/journal/td/2014/09/06494568/13rRUxAAT0y", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1427", "title": "Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1427/13rRUxjQyv9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2019/11/08488508", "title": "QANet: Tensor Decomposition Approach for Query-Based Anomaly Detection in Heterogeneous Information Networks", "doi": null, "abstractUrl": "/journal/tk/2019/11/08488508/14gwrsaYhYQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006072", "title": "Collective Tensor Completion with Multiple Heterogeneous Side Information", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006072/1hJrQUhMze0", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIUg0R", "title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)", "acronym": "music", "groupId": "1801889", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2rRRj", "doi": "10.1109/MUSIC.2012.23", "title": "Building a Semantic Social Network Based on Interpersonal Relationships", "normalizedTitle": "Building a Semantic Social Network Based on Interpersonal Relationships", "abstract": "With the emergence of the Smart phone, people can use Online Social Network Services ubiquitously, leading to a significant increase of the number of participants in online social networks. Under these circumstances, online users will require an intelligent and intuitive social relationship management system such as the ontology-driven browsing method. In this paper, to build a user-centered semantic social network and to represent entities and relationships with ontology to improve retrieval performance of the semantic social network, we will design our ontology extended from FOAF, RELATIONSHIP and propose a new method to compute closeness among friends using resources on social networks. Furthermore, we evaluate our ontology-driven browsing on via implementing a prototype system.", "abstracts": [ { "abstractType": "Regular", "content": "With the emergence of the Smart phone, people can use Online Social Network Services ubiquitously, leading to a significant increase of the number of participants in online social networks. Under these circumstances, online users will require an intelligent and intuitive social relationship management system such as the ontology-driven browsing method. In this paper, to build a user-centered semantic social network and to represent entities and relationships with ontology to improve retrieval performance of the semantic social network, we will design our ontology extended from FOAF, RELATIONSHIP and propose a new method to compute closeness among friends using resources on social networks. Furthermore, we evaluate our ontology-driven browsing on via implementing a prototype system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the emergence of the Smart phone, people can use Online Social Network Services ubiquitously, leading to a significant increase of the number of participants in online social networks. Under these circumstances, online users will require an intelligent and intuitive social relationship management system such as the ontology-driven browsing method. In this paper, to build a user-centered semantic social network and to represent entities and relationships with ontology to improve retrieval performance of the semantic social network, we will design our ontology extended from FOAF, RELATIONSHIP and propose a new method to compute closeness among friends using resources on social networks. Furthermore, we evaluate our ontology-driven browsing on via implementing a prototype system.", "fno": "4727a090", "keywords": [ "Semantics", "Ontologies", "Facebook", "Equations", "Educational Institutions", "Mathematical Model", "Ontology Population", "Interpersonal Relationship Rules", "Closeness", "Semantic Social Network" ], "authors": [ { "affiliation": null, "fullName": "Kee-Sung Lee", "givenName": "Kee-Sung", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Myung-duk Hong", "givenName": "Myung-duk", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jin-guk Jung", "givenName": "Jin-guk", "surname": "Jung", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Geun-sik Jo", "givenName": "Geun-sik", "surname": "Jo", "__typename": "ArticleAuthorType" } ], "idPrefix": "music", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "90-95", "year": "2012", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4727a084", "articleId": "12OmNxwncb4", "__typename": "AdjacentArticleType" }, "next": { "fno": "4727a096", "articleId": "12OmNBZpH7e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ficloud/2015/8103/0/8103a736", "title": "Ontology-Based Approach for Temporal Semantic Modelling of Social Networks", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2015/8103a736/12OmNBPc8sJ", "parentPublication": { "id": "proceedings/ficloud/2015/8103/0", "title": "2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612b103", "title": "A Model of Close-Relationship among Mobile Users on Mobile Social Network", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612b103/12OmNrJAegd", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/06118877", "title": "A Uniform Semantic Web Framework for Co-authorship Networks", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/06118877/12OmNvlg8gj", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2008/3440/1/3440a343", "title": "Learning a Probabilistic Semantic Model from Heterogeneous Social Networks for Relationship Identification", "doi": null, "abstractUrl": "/proceedings-article/ictai/2008/3440a343/12OmNx6Piv3", "parentPublication": { "id": "proceedings/ictai/2008/3440/1", "title": "2008 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncis/2011/4355/2/4355b295", "title": "A Semantic Web Services Query Optimization Method Based on Social Tagging", "doi": null, "abstractUrl": "/proceedings-article/ncis/2011/4355b295/12OmNxWLTDz", "parentPublication": { "id": "proceedings/ncis/2011/4355/2", "title": "Network Computing and Information Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e891", "title": "Online Presence in Adaptive Learning on the Social Semantic Web", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e891/12OmNy5hRb2", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2013/4952/0/4952a027", "title": "System Design for Estimating Social Relationships from Sensing Data", "doi": null, "abstractUrl": "/proceedings-article/waina/2013/4952a027/12OmNylsZAQ", "parentPublication": { "id": "proceedings/waina/2013/4952/0", "title": "2013 27th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2008/3401/0/3401a079", "title": "Community Discovery Based on Social Actors", "doi": null, "abstractUrl": "/proceedings-article/skg/2008/3401a079/12OmNzBOi4B", "parentPublication": { "id": "proceedings/skg/2008/3401/0", "title": "2008 Fourth International Conference on Semantics, Knowledge and Grid (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imccc/2011/4519/0/4519a581", "title": "A Social Influence Model Based on Interpersonal Relationship", "doi": null, "abstractUrl": "/proceedings-article/imccc/2011/4519a581/12OmNzDvSj6", "parentPublication": { "id": "proceedings/imccc/2011/4519/0", "title": "Instrumentation, Measurement, Computer, Communication and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799b128", "title": "An Upper Ontology for the Social Web", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799b128/12OmNzVoBKl", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyRxFmg", "title": "2009 International Conference on Advances in Social Network Analysis and Mining", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzIUfJK", "doi": "10.1109/ASONAM.2009.38", "title": "Egocentric Information Abstraction for Heterogeneous Social Networks", "normalizedTitle": "Egocentric Information Abstraction for Heterogeneous Social Networks", "abstract": "Social network is a powerful data structure that allows the depiction of relationship information between entities. However, real-world social networks are sometimes too complex for human to pursue further analysis. In this work, an unsupervised mechanism is proposed for egocentric information abstraction in heterogeneous social networks. To achieve this goal, we propose a vector space representation for heterogeneous social networks to identify linear combination of relations as features and compute statistical dependencies as feature values. Then we design several abstraction criteria to distill representative and important information to construct the abstracted graphs for visualization. The evaluations conducted on a real world movie dataset and an artificial crime dataset demonstrate that the abstractions can indeed retain important information and facilitate more accurate and efficient human analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Social network is a powerful data structure that allows the depiction of relationship information between entities. However, real-world social networks are sometimes too complex for human to pursue further analysis. In this work, an unsupervised mechanism is proposed for egocentric information abstraction in heterogeneous social networks. To achieve this goal, we propose a vector space representation for heterogeneous social networks to identify linear combination of relations as features and compute statistical dependencies as feature values. Then we design several abstraction criteria to distill representative and important information to construct the abstracted graphs for visualization. The evaluations conducted on a real world movie dataset and an artificial crime dataset demonstrate that the abstractions can indeed retain important information and facilitate more accurate and efficient human analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social network is a powerful data structure that allows the depiction of relationship information between entities. However, real-world social networks are sometimes too complex for human to pursue further analysis. In this work, an unsupervised mechanism is proposed for egocentric information abstraction in heterogeneous social networks. To achieve this goal, we propose a vector space representation for heterogeneous social networks to identify linear combination of relations as features and compute statistical dependencies as feature values. Then we design several abstraction criteria to distill representative and important information to construct the abstracted graphs for visualization. The evaluations conducted on a real world movie dataset and an artificial crime dataset demonstrate that the abstractions can indeed retain important information and facilitate more accurate and efficient human analysis.", "fno": "3689a255", "keywords": [ "Social Network", "Heterogeneous Network", "Abstraction", "Egocentric", "Graph Mining" ], "authors": [ { "affiliation": null, "fullName": "Cheng-Te Li", "givenName": "Cheng-Te", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shou-De Lin", "givenName": "Shou-De", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "255-260", "year": "2009", "issn": null, "isbn": "978-0-7695-3689-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3689a334", "articleId": "12OmNAT0mPh", "__typename": "AdjacentArticleType" }, "next": { "fno": "3689a261", "articleId": "12OmNvpNIub", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2010/4138/0/4138a048", "title": "Detecting Social Positions Using Simulation", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a048/12OmNAWH9Fi", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270a993", "title": "Anonymizing Social Network Using Bipartite Graph", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a993/12OmNApLGwD", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a917", "title": "Hete-CF: Social-Based Collaborative Filtering Recommendation Using Heterogeneous Relations", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a917/12OmNBOCWaO", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2018/4210/0/421001a294", "title": "Early Detection of Rumors in Heterogeneous Mobile Social Network", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a294/12OmNro0HSt", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406264", "title": "Centrality Analysis, Role-Based Clustering, and Egocentric Abstraction for Heterogeneous Social Networks", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406264/12OmNvCRglj", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hldvt/2000/0786/0/07860147", "title": "Toward automated abstraction for protocols on branching networks", "doi": null, "abstractUrl": "/proceedings-article/hldvt/2000/07860147/12OmNwbcJ5R", "parentPublication": { "id": "proceedings/hldvt/2000/0786/0", "title": "Proceedings IEEE International High-Level Design Validation and Test Workshop (Cat. No.PR00786)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905a181", "title": "Link Prediction and Recommendation across Heterogeneous Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905a181/12OmNya72wk", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcsw/2012/4686/0/4686a163", "title": "Discovering Shared Interests in Online Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2012/4686a163/12OmNyugyPq", "parentPublication": { "id": "proceedings/icdcsw/2012/4686/0", "title": "2012 32nd International Conference on Distributed Computing Systems Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2005/05/w5020", "title": "Using Egocentric Networks to Understand Communication", "doi": null, "abstractUrl": "/magazine/ic/2005/05/w5020/13rRUx0xPxq", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1427", "title": "Visual Analysis of Large Heterogeneous Social Networks by Semantic and Structural Abstraction", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1427/13rRUxjQyv9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzuZUuV", "doi": "10.1109/BIBM.2017.8217764", "title": "Generating abstraction networks using semantic similarity measure of ontology concepts", "normalizedTitle": "Generating abstraction networks using semantic similarity measure of ontology concepts", "abstract": "External knowledge sources are commonly used in processing large amounts of data. Large external knowledge sources, such as ontologies, often contain hundreds of thousands of concepts and relationships, making comprehension and navigation difficult. Abstraction networks enhance the usability and comprehensibility of these resources by providing a higher level of abstraction. In this paper, we develop a methodology to generate an ontology's abstraction network based on the semantic similarity measure of concepts. We first score the level of similarity between concepts based on shared hierarchical and semantic relationships. We then partition the original ontology into groups based on the concept pairs' similarity in relation to a user set threshold. We apply our methodology on the SNOMED CT Specimen hierarchy to generate three levels of abstraction.", "abstracts": [ { "abstractType": "Regular", "content": "External knowledge sources are commonly used in processing large amounts of data. Large external knowledge sources, such as ontologies, often contain hundreds of thousands of concepts and relationships, making comprehension and navigation difficult. Abstraction networks enhance the usability and comprehensibility of these resources by providing a higher level of abstraction. In this paper, we develop a methodology to generate an ontology's abstraction network based on the semantic similarity measure of concepts. We first score the level of similarity between concepts based on shared hierarchical and semantic relationships. We then partition the original ontology into groups based on the concept pairs' similarity in relation to a user set threshold. We apply our methodology on the SNOMED CT Specimen hierarchy to generate three levels of abstraction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "External knowledge sources are commonly used in processing large amounts of data. Large external knowledge sources, such as ontologies, often contain hundreds of thousands of concepts and relationships, making comprehension and navigation difficult. Abstraction networks enhance the usability and comprehensibility of these resources by providing a higher level of abstraction. In this paper, we develop a methodology to generate an ontology's abstraction network based on the semantic similarity measure of concepts. We first score the level of similarity between concepts based on shared hierarchical and semantic relationships. We then partition the original ontology into groups based on the concept pairs' similarity in relation to a user set threshold. We apply our methodology on the SNOMED CT Specimen hierarchy to generate three levels of abstraction.", "fno": "08217764", "keywords": [ "Ontologies", "Semantics", "Weight Measurement", "Biomedical Measurement", "Electronic Mail", "Terminology", "Knowledge Representation", "Partitioning", "Semantic Similarity", "Medical Ontology" ], "authors": [ { "affiliation": "Library, New York Institute of Technology, New York, NY", "fullName": "David Cirella", "givenName": "David", "surname": "Cirella", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, New York Institute of Technology, New York, NY", "fullName": "Huanying Gu", "givenName": "Huanying", "surname": "Gu", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "840-843", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217763", "articleId": "12OmNwM6A5T", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217765", "articleId": "12OmNrIrPpF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2015/6799/0/07359731", "title": "Algorithmic detection of inconsistent modeling among SNOMED CT concepts by combining lexical and structural indicators", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359731/12OmNrYCY12", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/2/3570b109", "title": "Ontology-Based Measure of Semantic Similarity between Concepts", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570b109/12OmNrkjVgG", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217835", "title": "Auditing subtype inconsistencies among gene ontology concepts", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217835/12OmNvDqsSy", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2013/5089/0/5089a485", "title": "Improving Online Clinical Trial Search Efficiency Using Natural Language Processing and Biomedical Ontology Mapping Approach", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a485/12OmNwIHowI", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2016/4795/0/4795a141", "title": "Concepts Expansion in Materials Domain Based on Ontology Matching Results", "doi": null, "abstractUrl": "/proceedings-article/skg/2016/4795a141/12OmNwIpNpm", "parentPublication": { "id": "proceedings/skg/2016/4795/0", "title": "2016 12th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217666", "title": "Analysis of the consistency in the structural modeling of SNOMED CT and CORE problem list concepts", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217666/12OmNxdVgZB", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2014/5618/0/5618a180", "title": "Syntactic Compression of Description Logics Terminologies", "doi": null, "abstractUrl": "/proceedings-article/bracis/2014/5618a180/12OmNzUPpjT", "parentPublication": { "id": "proceedings/bracis/2014/5618/0", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2010/6006/0/05460722", "title": "A Survey of Semantic Similarity Methods for Ontology Based Information Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2010/05460722/12OmNzX6cg8", "parentPublication": { "id": "proceedings/icmlc/2010/6006/0", "title": "2nd International Conference on Machine Learning and Computing (ICMLC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/08839064", "title": "An Ontology-Independent Representation Learning for Similar Disease Detection Based on Multi-Layer Similarity Network", "doi": null, "abstractUrl": "/journal/tb/2021/01/08839064/1qV2FklJpF6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313435", "title": "Generating Training Data for Concept-Mining for an &#x2018;Interface Terminology&#x2019; Annotating Cardiology EHRs", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313435/1qmg2ACuIog", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18qcbBot8pq", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18qcd51uXGE", "doi": "10.1109/ICOSC.2019.8665539", "title": "Empathi: An Ontology for Emergency Managing and Planning About Hazard Crisis", "normalizedTitle": "Empathi: An Ontology for Emergency Managing and Planning About Hazard Crisis", "abstract": "In the domain of emergency management during hazard crises, having sufficient situational awareness information is critical. It requires capturing and integrating information from sources such as satellite images, local sensors and social media content generated by local people. A bold obstacle to capturing, representing and integrating such heterogeneous and diverse information is lack of a proper ontology which properly conceptualizes this domain, aggregates and unifies datasets. Thus, in this paper, we introduce empathi ontology which conceptualizes the core concepts describing the domain of emergency managing and planning of hazard crises. Although empathi has a coarse-grained view, it considers the necessary concepts and relations being essential in this domain. This ontology is available at https://w3id.org/empathi/.", "abstracts": [ { "abstractType": "Regular", "content": "In the domain of emergency management during hazard crises, having sufficient situational awareness information is critical. It requires capturing and integrating information from sources such as satellite images, local sensors and social media content generated by local people. A bold obstacle to capturing, representing and integrating such heterogeneous and diverse information is lack of a proper ontology which properly conceptualizes this domain, aggregates and unifies datasets. Thus, in this paper, we introduce empathi ontology which conceptualizes the core concepts describing the domain of emergency managing and planning of hazard crises. Although empathi has a coarse-grained view, it considers the necessary concepts and relations being essential in this domain. This ontology is available at https://w3id.org/empathi/.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the domain of emergency management during hazard crises, having sufficient situational awareness information is critical. It requires capturing and integrating information from sources such as satellite images, local sensors and social media content generated by local people. A bold obstacle to capturing, representing and integrating such heterogeneous and diverse information is lack of a proper ontology which properly conceptualizes this domain, aggregates and unifies datasets. Thus, in this paper, we introduce empathi ontology which conceptualizes the core concepts describing the domain of emergency managing and planning of hazard crises. Although empathi has a coarse-grained view, it considers the necessary concepts and relations being essential in this domain. This ontology is available at https://w3id.org/empathi/.", "fno": "08665539", "keywords": [ "Emergency Management", "Emergency Services", "Ontologies Artificial Intelligence", "Social Networking Online", "Emergency Managing", "Hazard Crisis", "Emergency Management", "Hazard Crises", "Sufficient Situational Awareness Information", "Satellite Images", "Local Sensors", "Social Media Content", "Local People", "Diverse Information", "Proper Ontology", "Empathi Ontology", "Heterogeneous Information", "Ontologies", "Vocabulary", "Hazards", "Social Networking Online", "Organizations", "Crisis Management", "Standards Organizations", "Ontology", "Vocabularies", "Crisis Management", "Hazard Domain", "Emergency", "Ontology Quality", "Knowledge Reuse", "Disaster Management" ], "authors": [ { "affiliation": "Kno.e.sis Center, Dayton, Ohio, USA", "fullName": "Manas Gaur", "givenName": "Manas", "surname": "Gaur", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Dayton, Dayton, Ohio, USA", "fullName": "Saeedeh Shekarpour", "givenName": "Saeedeh", "surname": "Shekarpour", "__typename": "ArticleAuthorType" }, { "affiliation": "Kno.e.sis Center, Dayton, Ohio, USA", "fullName": "Amelie Gyrard", "givenName": "Amelie", "surname": "Gyrard", "__typename": "ArticleAuthorType" }, { "affiliation": "Kno.e.sis Center, Dayton, Ohio, USA", "fullName": "Amit Sheth", "givenName": "Amit", "surname": "Sheth", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-01-01T00:00:00", "pubType": "proceedings", "pages": "396-403", "year": "2019", "issn": "2325-6516", "isbn": "978-1-5386-6783-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08665625", "articleId": "18qcfCP3hUk", "__typename": "AdjacentArticleType" }, "next": { "fno": "08665532", "articleId": "18qccDvg8OQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edcc/2016/1582/0/1582a189", "title": "Towards a Common Safety Ontology for Automobiles and Railway Vehicles", "doi": null, "abstractUrl": "/proceedings-article/edcc/2016/1582a189/12OmNAo45Nd", "parentPublication": { "id": "proceedings/edcc/2016/1582/0", "title": "2016 12th European Dependable Computing Conference (EDCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892a176", "title": "Improving the Crisis to Crisis Learning Process", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892a176/12OmNBqv270", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2012/4814/0/4814a130", "title": "Leveraging UML and Concept Maps for Constructing Crisis Management Ontology", "doi": null, "abstractUrl": "/proceedings-article/cw/2012/4814a130/12OmNqFJhMd", "parentPublication": { "id": "proceedings/cw/2012/4814/0", "title": "2012 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a159", "title": "Ontology of Emergency Shared Situation Awareness and Crisis Interoperability", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a159/12OmNqNXEng", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a504", "title": "The Research of Major Hazard Source Emergency Rescue Command Information System", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a504/12OmNx3HIcs", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367e426", "title": "Project-Based Organizing: The Unexpected Trajectory of the Project to the Crisis", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367e426/12OmNxFsmKY", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a268", "title": "A Study of Spatial Information Sharing Model Based on Geological Hazard Domain Ontology", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a268/12OmNySG3R6", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588838", "title": "An Ontology Pattern for Emergency Event Modeling", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588838/12OmNyshmHT", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0", "title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2017/2141/0/2141a301", "title": "A Hazard Modeling Language for Safety-Critical Systems Based on the Hazard Ontology", "doi": null, "abstractUrl": "/proceedings-article/seaa/2017/2141a301/12OmNzT7OxU", "parentPublication": { "id": "proceedings/seaa/2017/2141/0", "title": "2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2015/7581/0/07406281", "title": "A Situation Awareness Question Generator to Determine a Crisis Situation", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406281/12OmNzayNCq", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19RSpV3wvxS", "title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "acronym": "sitis", "groupId": "1002425", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "19RSuDPUnHG", "doi": "10.1109/SITIS.2018.00091", "title": "Towards Semantic-Based Social Network Analysis", "normalizedTitle": "Towards Semantic-Based Social Network Analysis", "abstract": "We propose a semantic-based methodology for Social Network Analysis (SNA). This methodology addresses computations needed for SNA in a declarative way -in contrast to traditional SNA where computations are procedural. Our ingredients are semantic technologies: We define an ontology to represent graphs, their components (nodes, edges or paths), and the structural relationships between these components. We exploit reasoning capabilities of ontologies to infer structural relations between graph components. We also use ontological queries to perform computations needed in SNA. To demonstrate how does this approach work, we present three showcases of typical network analysis: basic metrics, triadic census, and betweenness centrality. The proposed approaches offer several computational opportunities for analyzing networks with respect to calculation of path-dependent centrality metrics, e.g. in distributed setups.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a semantic-based methodology for Social Network Analysis (SNA). This methodology addresses computations needed for SNA in a declarative way -in contrast to traditional SNA where computations are procedural. Our ingredients are semantic technologies: We define an ontology to represent graphs, their components (nodes, edges or paths), and the structural relationships between these components. We exploit reasoning capabilities of ontologies to infer structural relations between graph components. We also use ontological queries to perform computations needed in SNA. To demonstrate how does this approach work, we present three showcases of typical network analysis: basic metrics, triadic census, and betweenness centrality. The proposed approaches offer several computational opportunities for analyzing networks with respect to calculation of path-dependent centrality metrics, e.g. in distributed setups.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a semantic-based methodology for Social Network Analysis (SNA). This methodology addresses computations needed for SNA in a declarative way -in contrast to traditional SNA where computations are procedural. Our ingredients are semantic technologies: We define an ontology to represent graphs, their components (nodes, edges or paths), and the structural relationships between these components. We exploit reasoning capabilities of ontologies to infer structural relations between graph components. We also use ontological queries to perform computations needed in SNA. To demonstrate how does this approach work, we present three showcases of typical network analysis: basic metrics, triadic census, and betweenness centrality. The proposed approaches offer several computational opportunities for analyzing networks with respect to calculation of path-dependent centrality metrics, e.g. in distributed setups.", "fno": "938500a561", "keywords": [ "Ontologies", "Social Networking Online", "Measurement", "Semantic Technology", "Graph Theory", "Standards", "Ontologies", "Social Network Analysis", "Betweenness Centrality", "SPARQL" ], "authors": [ { "affiliation": null, "fullName": "Raji Ghawi", "givenName": "Raji", "surname": "Ghawi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mirco Schönfeld", "givenName": "Mirco", "surname": "Schönfeld", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jürgen Pfeffer", "givenName": "Jürgen", "surname": "Pfeffer", "__typename": "ArticleAuthorType" } ], "idPrefix": "sitis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "561-568", "year": "2018", "issn": null, "isbn": "978-1-5386-9385-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "938500a553", "articleId": "19RSrDGJQ4w", "__typename": "AdjacentArticleType" }, "next": { "fno": "938500a569", "articleId": "19RSqPS8vKw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2012/4654/0/4654a854", "title": "Evaluating Students Online Discussion Performance by Using Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/itng/2012/4654a854/12OmNAq3hHE", "parentPublication": { "id": "proceedings/itng/2012/4654/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2013/2540/0/06749320", "title": "Human object interactions recognition based on social network analysis", "doi": null, "abstractUrl": "/proceedings-article/aipr/2013/06749320/12OmNwsNRbg", "parentPublication": { "id": "proceedings/aipr/2013/2540/0", "title": "2013 IEEE Applied Imagery Pattern Recognition Workshop: Sensing for Control and Augmentation (AIPR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2010/4138/0/4138a397", "title": "A Multidisciplinary Model of Dynamic and Semantic Social Networks Analysis for Institutions", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a397/12OmNxFJXEb", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190485", "title": "Applying Social Network Analysis in a course supported by a LMS: Report of a case study", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190485/12OmNxX3uFu", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2018/0441/0/08703875", "title": "Toward Semantic Social Network Analysis for Business Big Data", "doi": null, "abstractUrl": "/proceedings-article/skg/2018/08703875/19JEdcve9zy", "parentPublication": { "id": "proceedings/skg/2018/0441/0", "title": "2018 14th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annsim/2022/5288/0/09859368", "title": "Exploring Spatial Patterns In Sustainable Integrated Districts: A Methodology For Early-Phase Urban Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/annsim/2022/09859368/1G4ELJZd1io", "parentPublication": { "id": "proceedings/annsim/2022/5288/0", "title": "2022 Annual Modeling and Simulation Conference (ANNSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsa-c/2019/1876/0/08712369", "title": "Applying Social Network Analysis Techniques to Architectural Smell Prediction", "doi": null, "abstractUrl": "/proceedings-article/icsa-c/2019/08712369/1a3x4Ck77FK", "parentPublication": { "id": "proceedings/icsa-c/2019/1876/0", "title": "2019 IEEE International Conference on Software Architecture Companion (ICSA-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2020/4905/0/09049668", "title": "Time-Ordered Bipartite Graph for Spatio-Temporal Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/icnc/2020/09049668/1iERRhuVft6", "parentPublication": { "id": "proceedings/icnc/2020/4905/0", "title": "2020 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069091", "title": "Finding Factors and Vehicles Involved in Two-Vehicle Accidents Through the Use of Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069091/1j9xVcOlAYM", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273996", "title": "Exploring the Relationship between SPOC Forum Behaviors and Learning Outcomes Based on Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273996/1phRSW3yaoE", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BzWmfS8oRa", "title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)", "acronym": "ainit", "groupId": "1845884", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BzWmp6nJ5e", "doi": "10.1109/AINIT54228.2021.00015", "title": "Finding key nodes on terrorist networks through k-shell based on structural hole", "normalizedTitle": "Finding key nodes on terrorist networks through k-shell based on structural hole", "abstract": "Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.", "abstracts": [ { "abstractType": "Regular", "content": "Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.", "fno": "129600a033", "keywords": [ "Eigenvalues And Eigenfunctions", "Network Theory Graphs", "Social Networking Online", "Terrorism", "Key Nodes", "Terrorist Networks", "Terrorist Attacks", "Economic Development", "Social Development", "Structural Perspective", "Terrorist Organizations", "Social Network Structure", "Network Centrality", "Centrality Indicators", "Structural Hole Method", "Terrorist Organization Networks", "Traditional Centrality Index", "Hollow Structure", "Algorithms K Shell", "Seminars", "Economics", "Social Networking Online", "Terrorism", "Organizations", "Dielectrics", "Indexes", "Complex Networks", "K Shell", "Terrorism", "Structural Hole" ], "authors": [ { "affiliation": "China Aerospace Academy of Systems Science and Engineering,Beijing,China", "fullName": "Zhichao Liang", "givenName": "Zhichao", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "China Aerospace Academy of Systems Science and Engineering,Beijing,China", "fullName": "Boan Tong", "givenName": "Boan", "surname": "Tong", "__typename": "ArticleAuthorType" }, { "affiliation": "China Aerospace Academy of Systems Science and Engineering,Beijing,China", "fullName": "Hui Liu", "givenName": "Hui", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "China Aerospace Academy of Systems Science and Engineering,Beijing,China", "fullName": "Bao Jin", "givenName": "Bao", "surname": "Jin", "__typename": "ArticleAuthorType" } ], "idPrefix": "ainit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "33-37", "year": "2021", "issn": null, "isbn": "978-1-6654-1296-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "129600a029", "articleId": "1BzWoxXvoFq", "__typename": "AdjacentArticleType" }, "next": { "fno": "129600a038", "articleId": "1BzWr0PUW3K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/socialinformatics/2012/5015/0/5015a013", "title": "Shaping Operations to Attack Robust Terror Networks", "doi": null, "abstractUrl": "/proceedings-article/socialinformatics/2012/5015a013/12OmNC943JA", "parentPublication": { "id": "proceedings/socialinformatics/2012/5015/0", "title": "International Conference on Social Informatics (SocialInformatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a005", "title": "Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a005/12OmNx57HJ5", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a338", "title": "The Complexity of Terrorist Networks", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a338/12OmNxyDZed", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a297", "title": "Detecting Key Players in Terrorist Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a297/12OmNyyO8Pu", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2012/4750/0/4750a476", "title": "Multi-factor Analysis of Terrorist Activities Based on Social Network", "doi": null, "abstractUrl": "/proceedings-article/bife/2012/4750a476/12OmNzcxZ7D", "parentPublication": { "id": "proceedings/bife/2012/4750/0", "title": "2012 Fifth International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2015/01/mex2015010053", "title": "Defeating Terrorist Networks with Game Theory", "doi": null, "abstractUrl": "/magazine/ex/2015/01/mex2015010053/13rRUxNW21d", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801a436", "title": "An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801a436/17D45W1Oa4K", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100b159", "title": "A Novel Graph Analytic Approach to Monitor Terrorist Networks", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100b159/18AuLbjEbLy", "parentPublication": { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0", "title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a381", "title": "Visualization Study of Terrorist Activities in North America Based on UCINET", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a381/1KpBSqTvp1C", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c026", "title": "Finding key actors on social movement networks through improved k-shell method", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c026/1tzyyG5asX6", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1DNCoflPzUc", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1DNCtKQps2s", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00320", "title": "Knowledge Engineering in the Social Era", "normalizedTitle": "Knowledge Engineering in the Social Era", "abstract": "We have never been so connected like nowadays. We have become more and more social by forming spontaneous relations and initiating interactions to share information with each other (even with strangers). In this keynote speech, we highlight the evolution of knowledge engineering, point out social systems&#x0027; characteristics, and then, discuss how these characteris-tics could impact knowledge engineering. Indeed, we expect that social systems&#x0027; characteristics will make knowledge engineering adjust to tackle the social era&#x0027;s challenges. Existing knowledge engineering models, practices, techniques, and languages need to be revisited and social systems&#x0027; complexity needs to be mastered with new and advanced knowledge engineering models, practices, techniques, and languages for a better appreciation of knowledge in the social era.", "abstracts": [ { "abstractType": "Regular", "content": "We have never been so connected like nowadays. We have become more and more social by forming spontaneous relations and initiating interactions to share information with each other (even with strangers). In this keynote speech, we highlight the evolution of knowledge engineering, point out social systems&#x0027; characteristics, and then, discuss how these characteris-tics could impact knowledge engineering. Indeed, we expect that social systems&#x0027; characteristics will make knowledge engineering adjust to tackle the social era&#x0027;s challenges. Existing knowledge engineering models, practices, techniques, and languages need to be revisited and social systems&#x0027; complexity needs to be mastered with new and advanced knowledge engineering models, practices, techniques, and languages for a better appreciation of knowledge in the social era.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have never been so connected like nowadays. We have become more and more social by forming spontaneous relations and initiating interactions to share information with each other (even with strangers). In this keynote speech, we highlight the evolution of knowledge engineering, point out social systems' characteristics, and then, discuss how these characteris-tics could impact knowledge engineering. Indeed, we expect that social systems' characteristics will make knowledge engineering adjust to tackle the social era's challenges. Existing knowledge engineering models, practices, techniques, and languages need to be revisited and social systems' complexity needs to be mastered with new and advanced knowledge engineering models, practices, techniques, and languages for a better appreciation of knowledge in the social era.", "fno": "945700c150", "keywords": [ "Knowledge Engineering", "Social Networking Online", "Advanced Knowledge Engineering Models", "Social Era", "Spontaneous Relations", "Social Systems Characteristics", "Knowledge Engineering", "Technology Management", "Social Networking Online", "Organizations", "Complexity Theory", "Software Engineering", "Knowledge Engineering", "Social Systems", "Web 2 0" ], "authors": [ { "affiliation": "State University of Novi Pazar,Novi Pazar,Serbia", "fullName": "Ejub Kajan", "givenName": "Ejub", "surname": "Kajan", "__typename": "ArticleAuthorType" }, { "affiliation": "Zayed University,Dubai,U.A.E", "fullName": "Zakaria Maamar", "givenName": "Zakaria", "surname": "Maamar", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "2150-2155", "year": "2021", "issn": null, "isbn": "978-1-6654-9457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "945700c144", "articleId": "1DNCTeYdMRi", "__typename": "AdjacentArticleType" }, "next": { "fno": "945700c156", "articleId": "1DNEepst5ny", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2009/3823/3/3823d117", "title": "Towards Automating Social Engineering Using Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823d117/12OmNs5rkRq", "parentPublication": { "id": "proceedings/cse/2009/3823/3", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a257", "title": "The Relationship between Social Media Self-efficacy and Learning Engagement of College Students", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a257/1AFspbx1NKM", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a251", "title": "Influence of Learners&#x0027; Online Interaction Characteristics on Collaborative Knowledge Building in a Knowledge Forum", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a251/1AFsv8iNKRq", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsmt/2021/2063/0/206300a160", "title": "The Impact of User Perceived Overload on Continuance Intention to Use Social Commerce: &#x2014;Based on Stimulus-Organism-Response Model", "doi": null, "abstractUrl": "/proceedings-article/iccsmt/2021/206300a160/1E2wcrdfRSw", "parentPublication": { "id": "proceedings/iccsmt/2021/2063/0", "title": "2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100b994", "title": "Social Science Theories in Software Engineering Research", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100b994/1Emsl4o8Z8s", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icikm/2022/6150/0/615000a072", "title": "Social Media as a Field for Knowledge Creation", "doi": null, "abstractUrl": "/proceedings-article/icikm/2022/615000a072/1Jtw21CsP5u", "parentPublication": { "id": "proceedings/icikm/2022/6150/0", "title": "2022 International Conference on Innovation, Knowledge, and Management (ICIKM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381370", "title": "Compression for Very Sparse Big Social Data", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381370/1semxFACLkY", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a843", "title": "The Effect of Consumer&#x2019;s Loneliness on Impulse Buying in the Internet era: A Model Based on Para-social Interaction", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a843/1tV9hQgBSFy", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a449", "title": "Research on the Structure of College Students&#x0027; Learning Network Based on Community Theory", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a449/1wHKhuz43Pa", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&p/2021/1491/0/149100a001", "title": "An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra", "doi": null, "abstractUrl": "/proceedings-article/euros&p/2021/149100a001/1yg1fCVF9S0", "parentPublication": { "id": "proceedings/euros&p/2021/1491/0", "title": "2021 IEEE European Symposium on Security and Privacy (EuroS&P)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tzywdsEsQo", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "acronym": "icmcce", "groupId": "1824464", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1tzzfEECrRK", "doi": "10.1109/ICMCCE51767.2020.00493", "title": "The Analysis on the Role of Social Network in the Field of Anti-Terrorism Take the &#x0022;East Turkistan&#x0022; Organization as an Example", "normalizedTitle": "The Analysis on the Role of Social Network in the Field of Anti-Terrorism Take the \"East Turkistan\" Organization as an Example", "abstract": "In order to analyze the network structure of the &#x201C;East Turkistan&#x201D; organization and identify members with higher individual threats, so as to conduct a better attack on the &#x201C;East Turkistan&#x201D; organization. We use Gephi, a network analysis software, and collect open source information on three batches of 25 terrorists announced by the Ministry of Public Security and use networkX, a Python package to study the structure of complex networks, to conduct social network analysis(SNA) of the &#x201C;East Turkistan&#x201D; organization personnel. The &#x201C;East Turkistan&#x201D; organization presents a combination of scale-free network and hierarchical network in the topological structure. To manifest the analysis of social network methods' importance in combating terrorism, we simulate the effect of removing the core members of the &#x201C;East Turkistan&#x201D; organization. The construction of SNA requires a large deal of open source information. How to obtain intelligence is an important factor that restricts precision strikes. In addition, how to combine social network analysis with computer deep learning knowledge is also a new hot spot and direction in the field of anti-terrorism.", "abstracts": [ { "abstractType": "Regular", "content": "In order to analyze the network structure of the &#x201C;East Turkistan&#x201D; organization and identify members with higher individual threats, so as to conduct a better attack on the &#x201C;East Turkistan&#x201D; organization. We use Gephi, a network analysis software, and collect open source information on three batches of 25 terrorists announced by the Ministry of Public Security and use networkX, a Python package to study the structure of complex networks, to conduct social network analysis(SNA) of the &#x201C;East Turkistan&#x201D; organization personnel. The &#x201C;East Turkistan&#x201D; organization presents a combination of scale-free network and hierarchical network in the topological structure. To manifest the analysis of social network methods' importance in combating terrorism, we simulate the effect of removing the core members of the &#x201C;East Turkistan&#x201D; organization. The construction of SNA requires a large deal of open source information. How to obtain intelligence is an important factor that restricts precision strikes. In addition, how to combine social network analysis with computer deep learning knowledge is also a new hot spot and direction in the field of anti-terrorism.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to analyze the network structure of the “East Turkistan” organization and identify members with higher individual threats, so as to conduct a better attack on the “East Turkistan” organization. We use Gephi, a network analysis software, and collect open source information on three batches of 25 terrorists announced by the Ministry of Public Security and use networkX, a Python package to study the structure of complex networks, to conduct social network analysis(SNA) of the “East Turkistan” organization personnel. The “East Turkistan” organization presents a combination of scale-free network and hierarchical network in the topological structure. To manifest the analysis of social network methods' importance in combating terrorism, we simulate the effect of removing the core members of the “East Turkistan” organization. The construction of SNA requires a large deal of open source information. How to obtain intelligence is an important factor that restricts precision strikes. In addition, how to combine social network analysis with computer deep learning knowledge is also a new hot spot and direction in the field of anti-terrorism.", "fno": "231400c282", "keywords": [ "Complex Networks", "Network Theory Graphs", "Python", "Social Networking Online", "Social Sciences Computing", "Terrorism", "Network Structure", "Network Analysis Software", "East Turkistan Organization Personnel", "Scale Free Network", "Social Network Methods", "Deep Learning", "SNA", "Anti Terrorism", "Gephi", "Open Source Information", "Python", "Knowledge Engineering", "Deep Learning", "Social Networking Online", "Terrorism", "Organizations", "Complex Networks", "Software", "Gephi", "Social Network Analysis", "East Turkistan", "Anti Terrorism", "Python" ], "authors": [ { "affiliation": "School of Information Network Security People's Public Security University of China,Beijing,China", "fullName": "Xiaoyuan Liu", "givenName": "Xiaoyuan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Network Security People's Public Security University of China,Beijing,China", "fullName": "Tianyang Sun", "givenName": "Tianyang", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Network Security People's Public Security University of China,Beijing,China", "fullName": "Fanliang Bu", "givenName": "Fanliang", "surname": "Bu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Investigation People's Public Security University of China,Beijing,China", "fullName": "Hang Qin", "givenName": "Hang", "surname": "Qin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmcce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "2282-2285", "year": "2020", "issn": null, "isbn": "978-1-6654-2314-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "231400c274", "articleId": "1tzyEaaT5hC", "__typename": "AdjacentArticleType" }, "next": { "fno": "231400c286", "articleId": "1tzzaudcbO8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2015/8657/0/8657a185", "title": "Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a185/12OmNBhZ4qc", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccem/2016/4573/0/4573a090", "title": "Visual Analytics of Terrorism Data", "doi": null, "abstractUrl": "/proceedings-article/ccem/2016/4573a090/12OmNwdtwaG", "parentPublication": { "id": "proceedings/ccem/2016/4573/0", "title": "2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a621", "title": "Research on the trade effect of tax coordination on China ASEAN Free Trade Area", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a621/1AUpnCZ9p6w", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itei/2021/8050/0/805000a078", "title": "&#x201C;Hypercycle&#x201D; Learning System Based on &#x201C;Extension Classroom&#x201D;: Take Online Music Teaching During the COVID-19 Pandemic As An Example", "doi": null, "abstractUrl": "/proceedings-article/itei/2021/805000a078/1CzeH4xk69a", "parentPublication": { "id": "proceedings/itei/2021/8050/0", "title": "2021 3rd International Conference on Internet Technology and Educational Informization (ITEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2022/7679/0/767900a347", "title": "AI and Stochastic Terrorism &#x2013; Should it be done?", "doi": null, "abstractUrl": "/proceedings-article/issrew/2022/767900a347/1JqDWGEzMcM", "parentPublication": { "id": "proceedings/issrew/2022/7679/0", "title": "2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2020/6997/0/699700a172", "title": "Smart Advertisement for Maximal Clicks in Online Social Networks Without User Data", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2020/699700a172/1oxodMef8hq", "parentPublication": { "id": "proceedings/smartcomp/2020/6997/0", "title": "2020 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381298", "title": "The Interior of a Network", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381298/1semC14cnqo", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a152", "title": "Research On The Aesthetic Experience of Social Media Textual Language", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a152/1wHKtEcVcvm", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a218", "title": "Visualisation for social media analytics: landscape of R packages", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a218/1y4oIPnbyYU", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2021/4486/0/448600a299", "title": "The Research on the Promotion Path of Digital Elements to Digital Economy", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2021/448600a299/1yEZlcbWTgA", "parentPublication": { "id": "proceedings/iccnea/2021/4486/0", "title": "2021 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yrHuRJhuog", "title": "2021 IEEE International Conference on Web Services (ICWS)", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yrHIq51Fwk", "doi": "10.1109/ICWS53863.2021.00024", "title": "SRaSLR: A Novel Social Relation Aware Service Label Recommendation Model", "normalizedTitle": "SRaSLR: A Novel Social Relation Aware Service Label Recommendation Model", "abstract": "With the rapid development of new technologies such as cloud, edge and mobile computing, the number and diversity of available services are dramatically exploding and services have become increasingly important to people&#x0027;s daily work and life. As a consequence, using service label recommendation techniques to automatically categorize services plays a crucial role in many service computing tasks, such as service discovery, service composition, and service organization. There have been many service label recommendation studies that have achieved remarkable performance. However, these studies mainly focus on using the text information in service profiles to recommend labels for services while overlooking those social relations that widely exist among services. We argue that such social relations can help to obtain more precise recommendation results. In this paper, we propose a novel Social Relation aware Service Label Recommendation model called SRaSLR, which combines text information in service profiles and social network relations among services. A deep learning based model is constructed based on feature fusion of the two perspectives. We conduct extensive experiments on the real-world Programmable Web dataset, and the experiment results show that SRaSLR yields better performance than existing methods. Additionally, we discuss how service social network affects service label recommendation performance based on the experiment results.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid development of new technologies such as cloud, edge and mobile computing, the number and diversity of available services are dramatically exploding and services have become increasingly important to people&#x0027;s daily work and life. As a consequence, using service label recommendation techniques to automatically categorize services plays a crucial role in many service computing tasks, such as service discovery, service composition, and service organization. There have been many service label recommendation studies that have achieved remarkable performance. However, these studies mainly focus on using the text information in service profiles to recommend labels for services while overlooking those social relations that widely exist among services. We argue that such social relations can help to obtain more precise recommendation results. In this paper, we propose a novel Social Relation aware Service Label Recommendation model called SRaSLR, which combines text information in service profiles and social network relations among services. A deep learning based model is constructed based on feature fusion of the two perspectives. We conduct extensive experiments on the real-world Programmable Web dataset, and the experiment results show that SRaSLR yields better performance than existing methods. Additionally, we discuss how service social network affects service label recommendation performance based on the experiment results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid development of new technologies such as cloud, edge and mobile computing, the number and diversity of available services are dramatically exploding and services have become increasingly important to people's daily work and life. As a consequence, using service label recommendation techniques to automatically categorize services plays a crucial role in many service computing tasks, such as service discovery, service composition, and service organization. There have been many service label recommendation studies that have achieved remarkable performance. However, these studies mainly focus on using the text information in service profiles to recommend labels for services while overlooking those social relations that widely exist among services. We argue that such social relations can help to obtain more precise recommendation results. In this paper, we propose a novel Social Relation aware Service Label Recommendation model called SRaSLR, which combines text information in service profiles and social network relations among services. A deep learning based model is constructed based on feature fusion of the two perspectives. We conduct extensive experiments on the real-world Programmable Web dataset, and the experiment results show that SRaSLR yields better performance than existing methods. Additionally, we discuss how service social network affects service label recommendation performance based on the experiment results.", "fno": "168100a087", "keywords": [ "Information Retrieval", "Internet", "Learning Artificial Intelligence", "Mobile Computing", "Recommender Systems", "Social Networking Online", "Web Services", "Novel Social Relation Aware Service Label Recommendation Model", "Available Services", "Service Computing Tasks", "Service Discovery", "Service Composition", "Service Organization", "Service Profiles", "Social Relations", "Social Network Relations", "Service Social Network", "Service Label Recommendation Performance", "Deep Learning", "Social Networking Online", "Web Services", "Conferences", "Service Computing", "Organizations", "Task Analysis", "Web Based Services", "Service Label Recommendation", "Service Social Network", "Feature Fusion", "Deep Learning" ], "authors": [ { "affiliation": "Faculty of Computing, Harbin Institute of Technology,Harbin,China", "fullName": "Yeqi Zhu", "givenName": "Yeqi", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Computing, Harbin Institute of Technology,Harbin,China", "fullName": "Mingyi Liu", "givenName": "Mingyi", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology (Weihai)", "fullName": "Zhiying Tu", "givenName": "Zhiying", "surname": "Tu", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Computing, Harbin Institute of Technology,Harbin,China", "fullName": "Tonghua Su", "givenName": "Tonghua", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "Faculty of Computing, Harbin Institute of Technology,Harbin,China", "fullName": "Zhongjie Wang", "givenName": "Zhongjie", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "87-96", "year": "2021", "issn": null, "isbn": "978-1-6654-1681-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "168100a079", "articleId": "1yrHEfOTi6Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "168100a097", "articleId": "1yrHwTT80G4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ispds/2021/1738/0/173800a116", "title": "FRPI: A novel Followee Recommendation approach based on Potential Interest in social networks", "doi": null, "abstractUrl": "/proceedings-article/ispds/2021/173800a116/1A3i0pLRPcA", "parentPublication": { "id": "proceedings/ispds/2021/1738/0", "title": "2021 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09827970", "title": "Disentangled Modeling of Social Homophily and Influence for Social Recommendation", "doi": null, "abstractUrl": "/journal/tk/2023/06/09827970/1EWSt4m2Eq4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/10122698", "title": "Service Recommendation Model based on Trust and QoS for Social Internet of Things", "doi": null, "abstractUrl": "/journal/sc/5555/01/10122698/1N27q2OwlfG", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a938", "title": "Online Social Media Recommendation Over Streams", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a938/1aDSTR1G2pa", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/03/08807225", "title": "Social-Enhanced Attentive Group Recommendation", "doi": null, "abstractUrl": "/journal/tk/2021/03/08807225/1cG5YIZJ9Ha", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800b445", "title": "Tourism Service Recommendation Based on User Influence in Social Networks and Time Series", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800b445/1dPojfybfO0", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/07/08939381", "title": "Social Recommendation With Learning Personal and Social Latent Factors", "doi": null, "abstractUrl": "/journal/tk/2021/07/08939381/1fZRw3Ez0D6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2020/8786/0/878600a338", "title": "A-HSG: Neural Attentive Service Recommendation based on High-order Social Graph", "doi": null, "abstractUrl": "/proceedings-article/icws/2020/878600a338/1pLJJUCnyNO", "parentPublication": { "id": "proceedings/icws/2020/8786/0", "title": "2020 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a198", "title": "Enhancing Multi-factor Friend Recommendation in Location-based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a198/1rgGk8AlCwg", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2020/1969/0/196900a583", "title": "Intelligent recommendation method of literature reading based on user social network analysis", "doi": null, "abstractUrl": "/proceedings-article/icris/2020/196900a583/1wG5S6l4o92", "parentPublication": { "id": "proceedings/icris/2020/1969/0", "title": "2020 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBUAvUQ", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNBCHMIt", "doi": "10.1109/INFVIS.2003.1249015", "title": "Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets", "normalizedTitle": "Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets", "abstract": "Large numbers of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multi-dimensional visualization techniques, such as Parallel Coordinates, Star Glyphs, and Pixel-Oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is a scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals how our proposed approach greatly improves the effectiveness of high dimensional visualization techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Large numbers of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multi-dimensional visualization techniques, such as Parallel Coordinates, Star Glyphs, and Pixel-Oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is a scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals how our proposed approach greatly improves the effectiveness of high dimensional visualization techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large numbers of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multi-dimensional visualization techniques, such as Parallel Coordinates, Star Glyphs, and Pixel-Oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is a scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals how our proposed approach greatly improves the effectiveness of high dimensional visualization techniques.", "fno": "20550014", "keywords": [ "Dimension Ordering", "Dimension Spacing", "Dimension Filtering", "Multidimensional Visualization", "High Dimensional Datasets" ], "authors": [ { "affiliation": "Worcester Polytechnic Institute, MA", "fullName": "Jing Yang", "givenName": "Jing", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute, MA", "fullName": "Wei Peng", "givenName": "Wei", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute, MA", "fullName": "Matthew O. Ward", "givenName": "Matthew O.", "surname": "Ward", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute, MA", "fullName": "Elke A. Rundensteiner", "givenName": "Elke A.", "surname": "Rundensteiner", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-10-01T00:00:00", "pubType": "proceedings", "pages": "14", "year": "2003", "issn": null, "isbn": "0-7695-2055-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "20550013", "articleId": "12OmNylKAOz", "__typename": "AdjacentArticleType" }, "next": { "fno": "20550015", "articleId": "12OmNyFU77z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/1/3304a121", "title": "A Coevolutionary Algorithm with Dimension Extraction", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304a121/12OmNAR1aS0", "parentPublication": { "id": "icnc/2008/3304/1", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221741", "title": "MultiMap: Preserving disk locality for multidimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221741/12OmNAle6lf", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a175", "title": "Correction Calculation Model of Curve's Interval Fractal Dimension", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a175/12OmNAq3hPj", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2003/8154/0/01249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/infvis/2003/01249015/12OmNviHK7T", "parentPublication": { "id": "proceedings/infvis/2003/8154/0", "title": "IEEE Symposium on Information Visualization 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2006/2701/0/270100330", "title": "Dimension Reduction for Supervised Ordering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2006/270100330/12OmNvqW6VT", "parentPublication": { "id": "proceedings/icdm/2006/2701/0", "title": "Sixth International Conference on Data Mining (ICDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa/2011/4428/0/4428a171", "title": "Spatial Ordering Derivation for One-Dimensional Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/ispa/2011/4428a171/12OmNvsm6y1", "parentPublication": { "id": "proceedings/ispa/2011/4428/0", "title": "International Symposium on Parallel and Distributed Processing with Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1993/3442/0/0262794", "title": "Global semigroup operations in faulty SIMD hypercubes", "doi": null, "abstractUrl": "/proceedings-article/ipps/1993/0262794/12OmNwEJ0RM", "parentPublication": { "id": "proceedings/ipps/1993/3442/0", "title": "Parallel Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2011/4571/0/4571a315", "title": "Near Linear Lower Bound for Dimension Reduction in L1", "doi": null, "abstractUrl": "/proceedings-article/focs/2011/4571a315/12OmNwx3Q9S", "parentPublication": { "id": "proceedings/focs/2011/4571/0", "title": "2011 IEEE 52nd Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1996/04/t0495", "title": "Global Commutative and Associative Reduction Operations in Faulty SIMD Hypercubes", "doi": null, "abstractUrl": "/journal/tc/1996/04/t0495/13rRUx0PqoB", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/01249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/01249015/18M76LncjTO", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvRU0cO", "title": "Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies", "acronym": "infcom", "groupId": "1000359", "volume": "1", "displayVolume": "1", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNBtCCF5", "doi": "10.1109/INFCOM.2000.832197", "title": "Dynamic distance maps of the Internet", "normalizedTitle": "Dynamic distance maps of the Internet", "abstract": "There is an increasing number of Internet applications that attempt to optimize their network communication by considering the network distance across which data is transferred. Such applications range from replication management to mobile agent applications. One major problem of these applications is to efficiently acquire distance information for large computer networks. This paper presents an approach to creating a global view on the Internet, a so-called network distance map, which realizes a hierarchical decomposition of the network into regions and which allows us to estimate the network distance between any two hosts. This view is not only a single snapshot but is dynamically adapted to the continuously changing network conditions. The main idea is to use a certain set of hosts for performing distance measurements and to use the so-gained information for estimating the distance between arbitrary hosts. A hierarchical clustering provides the notion of regions and allows us to coordinate the measurements in such a way that the resulting network load is minimized. An experimental evaluation on the basis of 119 globally distributed measurement servers shows that already a small number of measurement servers allows us to construct fairly accurate distance maps at low cost.", "abstracts": [ { "abstractType": "Regular", "content": "There is an increasing number of Internet applications that attempt to optimize their network communication by considering the network distance across which data is transferred. Such applications range from replication management to mobile agent applications. One major problem of these applications is to efficiently acquire distance information for large computer networks. This paper presents an approach to creating a global view on the Internet, a so-called network distance map, which realizes a hierarchical decomposition of the network into regions and which allows us to estimate the network distance between any two hosts. This view is not only a single snapshot but is dynamically adapted to the continuously changing network conditions. The main idea is to use a certain set of hosts for performing distance measurements and to use the so-gained information for estimating the distance between arbitrary hosts. A hierarchical clustering provides the notion of regions and allows us to coordinate the measurements in such a way that the resulting network load is minimized. An experimental evaluation on the basis of 119 globally distributed measurement servers shows that already a small number of measurement servers allows us to construct fairly accurate distance maps at low cost.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There is an increasing number of Internet applications that attempt to optimize their network communication by considering the network distance across which data is transferred. Such applications range from replication management to mobile agent applications. One major problem of these applications is to efficiently acquire distance information for large computer networks. This paper presents an approach to creating a global view on the Internet, a so-called network distance map, which realizes a hierarchical decomposition of the network into regions and which allows us to estimate the network distance between any two hosts. This view is not only a single snapshot but is dynamically adapted to the continuously changing network conditions. The main idea is to use a certain set of hosts for performing distance measurements and to use the so-gained information for estimating the distance between arbitrary hosts. A hierarchical clustering provides the notion of regions and allows us to coordinate the measurements in such a way that the resulting network load is minimized. An experimental evaluation on the basis of 119 globally distributed measurement servers shows that already a small number of measurement servers allows us to construct fairly accurate distance maps at low cost.", "fno": "00832197", "keywords": [ "Internet", "Computer Network Management", "Telecommunication Traffic", "Minimisation", "Data Communication", "Dynamic Distance Maps", "Internet", "Network Communication Optimization", "Data Transfer", "Replication Management", "Mobile Agent Applications", "Large Computer Networks", "Global View", "Hierarchical Decomposition", "Dynamic Adaptation", "Hierarchical Clustering", "Load Minimization", "Measurement Servers", "Internet", "Application Software", "IP Networks", "Network Servers", "Mobile Communication", "Mobile Agents", "Computer Network Management", "Performance Evaluation", "Distance Measurement", "Coordinate Measuring Machines" ], "authors": [ { "affiliation": "Inst. of Parallel & Distributed High-Performance Syst., Stuttgart Univ., Germany", "fullName": "W. Theilmann", "givenName": "W.", "surname": "Theilmann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Rothermel", "givenName": "K.", "surname": "Rothermel", "__typename": "ArticleAuthorType" } ], "idPrefix": "infcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-01-01T00:00:00", "pubType": "proceedings", "pages": "275,276,277,278,279,280,281,282,283,284", "year": "2000", "issn": "0743-166X", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00832196", "articleId": "12OmNz61dvC", "__typename": "AdjacentArticleType" }, "next": { "fno": "00832198", "articleId": "12OmNyr8YpG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2006/2497/0/24970631", "title": "A Decentralized Network Coordinate System for Robust Internet Distance", "doi": null, "abstractUrl": "/proceedings-article/itng/2006/24970631/12OmNA0dMPQ", "parentPublication": { "id": "proceedings/itng/2006/2497/0", "title": "Proceedings. Third International Conference on Information Technology: New Generation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/2002/7476/1/01019258", "title": "Predicting Internet network distance with coordinates-based approaches", "doi": null, "abstractUrl": "/proceedings-article/infcom/2002/01019258/12OmNAGw152", "parentPublication": { "id": "proceedings/infcom/2002/7476/1", "title": "Proceedings of IEEE Information Communications Conference (INFOCOM 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143a295", "title": "Non-Euclidean Internet Coordinates Embedding", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143a295/12OmNBQTJm0", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nca/2012/4773/0/4773a071", "title": "Internet Distance Prediction Using Node-Pair Geography", "doi": null, "abstractUrl": "/proceedings-article/nca/2012/4773a071/12OmNCeaPV6", "parentPublication": { "id": "proceedings/nca/2012/4773/0", "title": "2012 IEEE 11th International Symposium on Network Computing and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsr/2009/3649/0/3649a171", "title": "Characteristics of Internet Latency and Their Impact on Distance Prediction Accuracy", "doi": null, "abstractUrl": "/proceedings-article/cnsr/2009/3649a171/12OmNy4r3WM", "parentPublication": { "id": "proceedings/cnsr/2009/3649/0", "title": "Communication Networks and Services Research, Annual Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnmc/2003/2033/0/20330474", "title": "A Distributed Tokens-Based Distance-Vector Routing Algorithm for Mobile Ad-hoc Networks", "doi": null, "abstractUrl": "/proceedings-article/iccnmc/2003/20330474/12OmNzd7bCz", "parentPublication": { "id": "proceedings/iccnmc/2003/2033/0", "title": "Computer Networks and Mobile Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2011/4523/3/4523c391", "title": "Network Distance Estimation for Distributed Information Collection", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523c391/12OmNzmLxCj", "parentPublication": { "id": "proceedings/iciii/2011/4523/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2005/03/01458761", "title": "Constructing Internet coordinate system based on delay measurement", "doi": null, "abstractUrl": "/journal/nt/2005/03/01458761/13rRUx0xPFn", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2001/05/00958323", "title": "IDMaps: a global Internet host distance estimation service", "doi": null, "abstractUrl": "/journal/nt/2001/05/00958323/13rRUyft7wh", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2019/01/08608006", "title": "Topology Inference of Unknown Networks Based on Robust Virtual Coordinate Systems", "doi": null, "abstractUrl": "/journal/nt/2019/01/08608006/17PYEmzuTzH", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuirg", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNBubOQz", "doi": "10.1109/VISUAL.2004.51", "title": "Interactive Exploration of Large Remote Micro-CT Scans", "normalizedTitle": "Interactive Exploration of Large Remote Micro-CT Scans", "abstract": "Datasets of tens of gigabytes are becoming common in computational and experimental science. This development is driven by advances in imaging technology, producing detectors with growing resolutions, as well as availability of cheap processing power and memory capacity in commodity-based computing clusters. In this article we describe the design of a visualization system that allows scientists to interactively explore large remote data sets in an efficient and flexible way. The system is broadly applicable and currently used by medical scientists conducting an osteoporosis research project. Human vertebral bodies are scanned using a high resolution micro-CT scanner producing scans of roughly 8 GB size each. All participating research groups require access to the centrally stored data. Due to the rich internal bone structure, scientists need to interactively explore the full dataset at coarse levels, as well as visualize subvolumes of interest at the highest resolution. Our solution is based on HDF5 and GridFTP. When accessing data remotely, the HDF5 data processing pipeline is modified to support efficient retrieval of subvolumes. We reduce the overall latency and optimize throughput by executing high-level operations on the remote side. The GridFTP protocol is used to pass the HDF5 requests to a customized server. The approach takes full advantage of local graphics hardware for rendering. Interactive visualization is accomplished using a background thread to access the datasets stored in a multi-resolution format. A hierarchical volume renderer provides seamless integration of high resolution details with low resolution overviews.", "abstracts": [ { "abstractType": "Regular", "content": "Datasets of tens of gigabytes are becoming common in computational and experimental science. This development is driven by advances in imaging technology, producing detectors with growing resolutions, as well as availability of cheap processing power and memory capacity in commodity-based computing clusters. In this article we describe the design of a visualization system that allows scientists to interactively explore large remote data sets in an efficient and flexible way. The system is broadly applicable and currently used by medical scientists conducting an osteoporosis research project. Human vertebral bodies are scanned using a high resolution micro-CT scanner producing scans of roughly 8 GB size each. All participating research groups require access to the centrally stored data. Due to the rich internal bone structure, scientists need to interactively explore the full dataset at coarse levels, as well as visualize subvolumes of interest at the highest resolution. Our solution is based on HDF5 and GridFTP. When accessing data remotely, the HDF5 data processing pipeline is modified to support efficient retrieval of subvolumes. We reduce the overall latency and optimize throughput by executing high-level operations on the remote side. The GridFTP protocol is used to pass the HDF5 requests to a customized server. The approach takes full advantage of local graphics hardware for rendering. Interactive visualization is accomplished using a background thread to access the datasets stored in a multi-resolution format. A hierarchical volume renderer provides seamless integration of high resolution details with low resolution overviews.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Datasets of tens of gigabytes are becoming common in computational and experimental science. This development is driven by advances in imaging technology, producing detectors with growing resolutions, as well as availability of cheap processing power and memory capacity in commodity-based computing clusters. In this article we describe the design of a visualization system that allows scientists to interactively explore large remote data sets in an efficient and flexible way. The system is broadly applicable and currently used by medical scientists conducting an osteoporosis research project. Human vertebral bodies are scanned using a high resolution micro-CT scanner producing scans of roughly 8 GB size each. All participating research groups require access to the centrally stored data. Due to the rich internal bone structure, scientists need to interactively explore the full dataset at coarse levels, as well as visualize subvolumes of interest at the highest resolution. Our solution is based on HDF5 and GridFTP. When accessing data remotely, the HDF5 data processing pipeline is modified to support efficient retrieval of subvolumes. We reduce the overall latency and optimize throughput by executing high-level operations on the remote side. The GridFTP protocol is used to pass the HDF5 requests to a customized server. The approach takes full advantage of local graphics hardware for rendering. Interactive visualization is accomplished using a background thread to access the datasets stored in a multi-resolution format. A hierarchical volume renderer provides seamless integration of high resolution details with low resolution overviews.", "fno": "87880345", "keywords": [ "Large Data", "Out Of Core Methods", "Remote Visualization", "Multiresolution Visualization" ], "authors": [ { "affiliation": "Zuse Institute Berlin", "fullName": "Steffen Prohaska", "givenName": "Steffen", "surname": "Prohaska", "__typename": "ArticleAuthorType" }, { "affiliation": "Zuse Institute Berlin", "fullName": "Andrei Hutanu", "givenName": "Andrei", "surname": "Hutanu", "__typename": "ArticleAuthorType" }, { "affiliation": "Zuse Institute Berlin", "fullName": "Ralf Kähler", "givenName": "Ralf", "surname": "Kähler", "__typename": "ArticleAuthorType" }, { "affiliation": "Zuse Institute Berlin", "fullName": "Hans-Christian Hege", "givenName": "Hans-Christian", "surname": "Hege", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-10-01T00:00:00", "pubType": "proceedings", "pages": "345-352", "year": "2004", "issn": null, "isbn": "0-7803-8788-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "87880337", "articleId": "12OmNA14A68", "__typename": "AdjacentArticleType" }, "next": { "fno": "87880353", "articleId": "12OmNAXPy8c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipps/1999/0143/0/01430569", "title": "A Fast Multithreaded Out-of-Core Visualization Technique", "doi": null, "abstractUrl": "/proceedings-article/ipps/1999/01430569/12OmNCh0PcO", "parentPublication": { "id": "proceedings/ipps/1999/0143/0", "title": "Parallel Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742364", "title": "Keynote address: Immersive exploration of large datasets", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742364/12OmNrNh0EJ", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660023", "title": "Visualization of Time-Dependent Remote Adaptive Mesh Refinement Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660023/12OmNx965C4", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2006/0360/1/04022905", "title": "Multi-resolution analysis, numerical methods and reverse dynamics, integrated in software instruments for performance improving in the satellite remote sensing", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2006/04022905/12OmNxFsmua", "parentPublication": { "id": "proceedings/aqtr/2006/0360/1", "title": "2006 IEEE-TTTC International Conference on Automation, Quality and Testing, Robotics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2007/2879/0/28790255", "title": "Distributed Technologies for Remote Access of HDF Data", "doi": null, "abstractUrl": "/proceedings-article/wetice/2007/28790255/12OmNy6HQUI", "parentPublication": { "id": "proceedings/wetice/2007/2879/0", "title": "16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498decoro", "title": "XFastMesh: Fast View-dependent Meshing from External Memory", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498decoro/12OmNzVGcTe", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2004/04/mcg2004040064", "title": "Hierarchical Splatting of Scattered 4D Data", "doi": null, "abstractUrl": "/magazine/cg/2004/04/mcg2004040064/13rRUB6Sq4M", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2000/02/v0098", "title": "Accelerated Isosurface Extraction in Time-Varying Fields", "doi": null, "abstractUrl": "/journal/tg/2000/02/v0098/13rRUx0xPIq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/06/v0683", "title": "Adaptive Extraction of Time-Varying Isosurfaces", "doi": null, "abstractUrl": "/journal/tg/2004/06/v0683/13rRUxZRbnS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF3d", "title": "2013 IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops)", "acronym": "lcn-workshops", "groupId": "1802198", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNrH1PDe", "doi": "10.1109/LCNW.2013.6758546", "title": "An investigation into teredo and 6to4 transition mechanisms: Traffic analysis", "normalizedTitle": "An investigation into teredo and 6to4 transition mechanisms: Traffic analysis", "abstract": "The exhaustion of IPv4 address space increases pressure on network operators and content providers to continue the transition to IPv6. The IPv6 transition mechanisms such as Teredo and 6to4 allow IPv4 hosts to connect to IPv6 hosts. On the other hand, they increase network complexity and render ineffective many methods to observe IP traffic. In this paper, we modified our flow-based measurement system to involve transition mechanisms information to provide full IPv6 visibility. Our traffic analysis focuses on IPv6 tunneled traffic and uses data collected over one week in the Czech national research and education network. The results expose various traffic characteristics of native and tunneled IPv6 traffic, among others the TTL and HOP limit distribution, geolocation aspect of the traffic, and list of Teredo servers used in the network. Furthermore, we show how the traffic of IPv6 transition mechanisms has evolved since 2010.", "abstracts": [ { "abstractType": "Regular", "content": "The exhaustion of IPv4 address space increases pressure on network operators and content providers to continue the transition to IPv6. The IPv6 transition mechanisms such as Teredo and 6to4 allow IPv4 hosts to connect to IPv6 hosts. On the other hand, they increase network complexity and render ineffective many methods to observe IP traffic. In this paper, we modified our flow-based measurement system to involve transition mechanisms information to provide full IPv6 visibility. Our traffic analysis focuses on IPv6 tunneled traffic and uses data collected over one week in the Czech national research and education network. The results expose various traffic characteristics of native and tunneled IPv6 traffic, among others the TTL and HOP limit distribution, geolocation aspect of the traffic, and list of Teredo servers used in the network. Furthermore, we show how the traffic of IPv6 transition mechanisms has evolved since 2010.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The exhaustion of IPv4 address space increases pressure on network operators and content providers to continue the transition to IPv6. The IPv6 transition mechanisms such as Teredo and 6to4 allow IPv4 hosts to connect to IPv6 hosts. On the other hand, they increase network complexity and render ineffective many methods to observe IP traffic. In this paper, we modified our flow-based measurement system to involve transition mechanisms information to provide full IPv6 visibility. Our traffic analysis focuses on IPv6 tunneled traffic and uses data collected over one week in the Czech national research and education network. The results expose various traffic characteristics of native and tunneled IPv6 traffic, among others the TTL and HOP limit distribution, geolocation aspect of the traffic, and list of Teredo servers used in the network. Furthermore, we show how the traffic of IPv6 transition mechanisms has evolved since 2010.", "fno": "06758546", "keywords": [ "Flow Measurement", "IP Networks", "Network Servers", "Telecommunication Traffic", "Teredo Transition Mechanism", "6 To 4 Transition Mechanism", "I Pv 4 Address", "I Pv 6 Transition Mechanism", "Flow Based Measurement System", "I Pv 6 Tunneled Traffic Analysis", "Czech National Research", "Education Network", "TTL", "HOP Limit Distribution", "Teredo Server", "Protocols", "Servers", "Relays", "Linux", "Internet", "IP Networks", "Geology", "Teredo", "6 To 4", "I Pv 6", "Transition Mechanisms" ], "authors": [ { "affiliation": "Faculty of Informatics, Masaryk University, Brno, Czech Republic", "fullName": "Martin Elich", "givenName": "Martin", "surname": "Elich", "__typename": "ArticleAuthorType" }, { "affiliation": "CESNET z.s.p.o., Prague, Czech Republic", "fullName": "Petr Velan", "givenName": "Petr", "surname": "Velan", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Computer Science, Masaryk University, Brno, Czech Republic", "fullName": "Tomas Jirsik", "givenName": "Tomas", "surname": "Jirsik", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Computer Science, Masaryk University, Brno, Czech Republic", "fullName": "Pavel Celeda", "givenName": "Pavel", "surname": "Celeda", "__typename": "ArticleAuthorType" } ], "idPrefix": "lcn-workshops", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "1018-1024", "year": "2013", "issn": null, "isbn": "978-1-4799-0540-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06758545", "articleId": "12OmNC4eSlf", "__typename": "AdjacentArticleType" }, "next": { "fno": "06758547", "articleId": "12OmNzTppGN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waina/2009/3639/0/3639a601", "title": "A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition", "doi": null, "abstractUrl": "/proceedings-article/waina/2009/3639a601/12OmNAkWvOQ", "parentPublication": { "id": "proceedings/waina/2009/3639/0", "title": "2009 International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2014/4087/0/4087a014", "title": "Provide IPv4 Service Using Pure IPv6 Servers with Stateless NAT64 Translator", "doi": null, "abstractUrl": "/proceedings-article/nas/2014/4087a014/12OmNBh8h1w", "parentPublication": { "id": "proceedings/nas/2014/4087/0", "title": "2014 9th IEEE International Conference on Networking, Architecture, and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icita/2005/2316/2/231620765", "title": "Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/icita/2005/231620765/12OmNrAMENA", "parentPublication": { "id": "proceedings/icita/2005/2316/2", "title": "Information Technology and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/2002/1867/0/18670072", "title": "Implementing Wireless Networks with Transition Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/sccc/2002/18670072/12OmNvq5jtG", "parentPublication": { "id": "proceedings/sccc/2002/1867/0", "title": "12th International Conference of the Chilean Computer Science Society, 2002. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ems/2008/3325/0/04625322", "title": "Evaluating BDMS and DSTM Transition Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/ems/2008/04625322/12OmNxT56Dw", "parentPublication": { "id": "proceedings/ems/2008/3325/0", "title": "Computer Modeling and Simulation, UKSIM European Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2012/4722/0/4722a144", "title": "IVI-based Locator/ID Separation Architecture for IPv4/IPv6 Transition", "doi": null, "abstractUrl": "/proceedings-article/nas/2012/4722a144/12OmNy68EJr", "parentPublication": { "id": "proceedings/nas/2012/4722/0", "title": "2012 IEEE Seventh International Conference on Networking, Architecture, and Storage", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2002/1591/0/15910441", "title": "Global Mobile IPv6 Addressing Using Transition Mechanisms", "doi": null, "abstractUrl": "/proceedings-article/lcn/2002/15910441/12OmNyKJixQ", "parentPublication": { "id": "proceedings/lcn/2002/1591/0", "title": "27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciic/2010/4152/0/4152a258", "title": "An Innovative Simulation, Comparison Methodology & Framework for Evaluating the Performance Evaluation of a Novel IPv4/IPv6 Transition Mechanisms: BD-SIIT vs DSTM", "doi": null, "abstractUrl": "/proceedings-article/iciic/2010/4152a258/12OmNzmtWId", "parentPublication": { "id": "proceedings/iciic/2010/4152/0", "title": "Integrated Intelligent Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2014/03/mic2014030084", "title": "Configuring IPv4 over IPv6 Networks: Transitioning with DHCP", "doi": null, "abstractUrl": "/magazine/ic/2014/03/mic2014030084/13rRUIJcWt2", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2022/6457/0/645700a555", "title": "Speeding Up IPv4 Connections via IPv6 Infrastructure", "doi": null, "abstractUrl": "/proceedings-article/msn/2022/645700a555/1LUtL3Z8NnW", "parentPublication": { "id": "proceedings/msn/2022/6457/0", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzUPpw4", "title": "IEEE Symposium on Information Visualization 2003", "acronym": "infvis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNviHK7T", "doi": "10.1109/INFVIS.2003.1249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "normalizedTitle": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "abstract": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "fno": "01249015", "keywords": [ "Multidimensional Systems", "Data Visualization", "Face Detection", "Displays", "Navigation", "Information Filtering", "Information Filters", "Visual Databases", "Stacking", "Computer Science" ], "authors": [ { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "Jing Yang", "givenName": null, "surname": "Jing Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "Wei Peng", "givenName": null, "surname": "Wei Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "M.O. Ward", "givenName": "M.O.", "surname": "Ward", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "E.A. Rundensteiner", "givenName": "E.A.", "surname": "Rundensteiner", "__typename": "ArticleAuthorType" } ], "idPrefix": "infvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "105,106,107,108,109,110,111,112", "year": "2003", "issn": null, "isbn": "0-7803-8154-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01249012", "articleId": "12OmNBdJ5hb", "__typename": "AdjacentArticleType" }, "next": { "fno": "01249017", "articleId": "12OmNyUWR03", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2007/0802/0/04221741", "title": "MultiMap: Preserving disk locality for multidimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221741/12OmNAle6lf", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/20550014", "title": "Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550014/12OmNBCHMIt", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790089", "title": "Clutter Reduction in Multi-Dimensional Data Visualization Using Dimension Reordering", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790089/12OmNs5rkRK", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2006/2701/0/270100330", "title": "Dimension Reduction for Supervised Ordering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2006/270100330/12OmNvqW6VT", "parentPublication": { "id": "proceedings/icdm/2006/2701/0", "title": "Sixth International Conference on Data Mining (ICDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122625", "title": "Dimension Projection Matrix/Tree: Interactive Subspace Visual Exploration and Analysis of High Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122625/13rRUx0xPi9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/02/ttg2010020192", "title": "Cross-Filtered Views for Multidimensional Visual Analysis", "doi": null, "abstractUrl": "/journal/tg/2010/02/ttg2010020192/13rRUxBa5bO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534787", "title": "Visualizing Dimension Coverage to Support Exploratory Analysis", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534787/13rRUxcsYLV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/03/v0494", "title": "Value and Relation Display: Interactive Visual Exploration of Large Data Sets with Hundreds of Dimensions", "doi": null, "abstractUrl": "/journal/tg/2007/03/v0494/13rRUyYSWsK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/01249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/01249015/18M76LncjTO", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2019/2128/0/212800a001", "title": "Bacterial Foraging Optimization Algorithm with Dimension by Dimension Improvement", "doi": null, "abstractUrl": "/proceedings-article/iccia/2019/212800a001/1f8MG6Noefm", "parentPublication": { "id": "proceedings/iccia/2019/2128/0", "title": "2019 4th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyNQSGF", "title": "Knowledge and Systems Engineering, International Conference on", "acronym": "kse", "groupId": "1003010", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNwIHoxH", "doi": "10.1109/KSE.2010.22", "title": "Interactive Exploration of Hierarchical Density Clusters in Gene Expression Data", "normalizedTitle": "Interactive Exploration of Hierarchical Density Clusters in Gene Expression Data", "abstract": "Clustering gene expression data is an important task in bioinformatics research and biomedical applications. In this paper, we present an effective clustering algorithm for gene expression data. The clustering algorithm is based on the analysis of data's density distribution. We propose an intersecting partition of gene expression data into the supports of data points. Density clusters are maximally connected regions at certain density levels, and thus, can be organized in a hierarchical structure. For interactive visual exploration, we use a 2D radial layout of the hierarchical density cluster tree with linked as well as embedded views of parallel coordinates and heat maps. Our system supports the understanding of the distribution of density clusters and the patterns of the density clusters. Experimental results for common gene expression data sets shows the effectiveness and scalability of the algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Clustering gene expression data is an important task in bioinformatics research and biomedical applications. In this paper, we present an effective clustering algorithm for gene expression data. The clustering algorithm is based on the analysis of data's density distribution. We propose an intersecting partition of gene expression data into the supports of data points. Density clusters are maximally connected regions at certain density levels, and thus, can be organized in a hierarchical structure. For interactive visual exploration, we use a 2D radial layout of the hierarchical density cluster tree with linked as well as embedded views of parallel coordinates and heat maps. Our system supports the understanding of the distribution of density clusters and the patterns of the density clusters. Experimental results for common gene expression data sets shows the effectiveness and scalability of the algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clustering gene expression data is an important task in bioinformatics research and biomedical applications. In this paper, we present an effective clustering algorithm for gene expression data. The clustering algorithm is based on the analysis of data's density distribution. We propose an intersecting partition of gene expression data into the supports of data points. Density clusters are maximally connected regions at certain density levels, and thus, can be organized in a hierarchical structure. For interactive visual exploration, we use a 2D radial layout of the hierarchical density cluster tree with linked as well as embedded views of parallel coordinates and heat maps. Our system supports the understanding of the distribution of density clusters and the patterns of the density clusters. Experimental results for common gene expression data sets shows the effectiveness and scalability of the algorithm.", "fno": "4213a020", "keywords": [ "Bioinformatics", "Data Analysis", "Pattern Clustering", "Tree Data Structures", "Interactive Exploration", "Hierarchical Density Cluster Tree", "Gene Expression Data", "Bioinformatics Research", "Biomedical Applications", "Data Density Distribution Analysis", "Hierarchical Structure", "2 D Radial Layout", "Gene Expression", "Clustering Algorithms", "Layout", "Partitioning Algorithms", "Density Functional Theory", "Kernel", "Heating", "Gene Expression Data", "Cluster Analysis", "Hierarchical Clustering", "Kernel Density Estimation", "Heatmaps", "Parallel Coordinates" ], "authors": [ { "affiliation": null, "fullName": "Tran Van Long", "givenName": "Tran Van", "surname": "Long", "__typename": "ArticleAuthorType" }, { "affiliation": "Jacobs Univ. Bremen, Bremen, Germany", "fullName": "Lars Linsen", "givenName": "Lars", "surname": "Linsen", "__typename": "ArticleAuthorType" } ], "idPrefix": "kse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "20-27", "year": "2010", "issn": null, "isbn": "978-1-4244-8334-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4213a014", "articleId": "12OmNyr8Yuq", "__typename": "AdjacentArticleType" }, "next": { "fno": "4213a028", "articleId": "12OmNz61dIN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/imsccs/2006/2581/1/25810142", "title": "Clustering of Gene Expression Data: Performance and Similarity Analysis", "doi": null, "abstractUrl": "/proceedings-article/imsccs/2006/25810142/12OmNA14A6F", "parentPublication": { "id": "proceedings/imsccs/2006/2581/1", "title": "Computer and Computational Sciences, International Multi-Symposiums on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2009/5121/0/05332104", "title": "Mining association rules among gene functions in clusters of similar gene expression maps", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332104/12OmNAXPy26", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/1/3118a207", "title": "A Fuzzy Approach for Analyzing Outliers in Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118a207/12OmNqBKTQl", "parentPublication": { "id": "proceedings/bmei/2008/3118/1", "title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csb/2004/2194/0/21940436", "title": "Gene Ontology Friendly Biclustering of Expression Profiles", "doi": null, "abstractUrl": "/proceedings-article/csb/2004/21940436/12OmNrJiCSA", "parentPublication": { "id": "proceedings/csb/2004/2194/0", "title": "Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2010/7779/0/05575916", "title": "Analysis of Gene Expression Data Based on Density and Biological Knowledge", "doi": null, "abstractUrl": "/proceedings-article/fcst/2010/05575916/12OmNxE2mUP", "parentPublication": { "id": "proceedings/fcst/2010/7779/0", "title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a023", "title": "Analysis of Multiplex Gene Expression Maps Obtained by Voxelation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a023/12OmNyNzhuX", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706575", "title": "Unsupervised discovery of fuzzy patterns in gene expression data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706575/12OmNyvY9un", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375550", "title": "Finding Clusters of Positive and Negative Coregulated Genes in Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375550/12OmNzYwbSw", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/02/07931609", "title": "Subspace Weighting Co-Clustering of Gene Expression Data", "doi": null, "abstractUrl": "/journal/tb/2019/02/07931609/13rRUxYrbKy", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/03/06138849", "title": "Empirical Evidence of the Applicability of Functional Clustering through Gene Expression Classification", "doi": null, "abstractUrl": "/journal/tb/2012/03/06138849/13rRUyXKxSY", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4L", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNz4SOzs", "doi": "10.1109/VAST.2006.261438", "title": "Monitoring Network Traffic with Radial Traffic Analyzer", "normalizedTitle": "Monitoring Network Traffic with Radial Traffic Analyzer", "abstract": "Extensive spread of malicious code on the Internet and also within intranets has risen the user's concern about what kind of data is transferred between her or his computer and other hosts on the network. Visual analysis of this kind of information is a challenging task, due to the complexity and volume of the data type considered, and requires special design of appropriate visualization techniques. In this paper, we present a scalable visualization toolkit for analyzing network activity of computer hosts on a network. The visualization combines network packet volume and type distribution information with geographic information, enabling the analyst to use geographic distortion techniques such as the HistoMap technique to become aware of the traffic components in the course of the analysis. The presented analysis tool is especially useful to compare important network load characteristics in a geographically aware display, to relate communication partners, and to identify the type of network traffic occurring. The results of the analysis are helpful in understanding typical network communication activities, and in anticipating potential performance bottlenecks or problems. It is suited for both off-line analysis of historic data, and via animation for on-line monitoring of packet-based network traffic in real time", "abstracts": [ { "abstractType": "Regular", "content": "Extensive spread of malicious code on the Internet and also within intranets has risen the user's concern about what kind of data is transferred between her or his computer and other hosts on the network. Visual analysis of this kind of information is a challenging task, due to the complexity and volume of the data type considered, and requires special design of appropriate visualization techniques. In this paper, we present a scalable visualization toolkit for analyzing network activity of computer hosts on a network. The visualization combines network packet volume and type distribution information with geographic information, enabling the analyst to use geographic distortion techniques such as the HistoMap technique to become aware of the traffic components in the course of the analysis. The presented analysis tool is especially useful to compare important network load characteristics in a geographically aware display, to relate communication partners, and to identify the type of network traffic occurring. The results of the analysis are helpful in understanding typical network communication activities, and in anticipating potential performance bottlenecks or problems. It is suited for both off-line analysis of historic data, and via animation for on-line monitoring of packet-based network traffic in real time", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Extensive spread of malicious code on the Internet and also within intranets has risen the user's concern about what kind of data is transferred between her or his computer and other hosts on the network. Visual analysis of this kind of information is a challenging task, due to the complexity and volume of the data type considered, and requires special design of appropriate visualization techniques. In this paper, we present a scalable visualization toolkit for analyzing network activity of computer hosts on a network. The visualization combines network packet volume and type distribution information with geographic information, enabling the analyst to use geographic distortion techniques such as the HistoMap technique to become aware of the traffic components in the course of the analysis. The presented analysis tool is especially useful to compare important network load characteristics in a geographically aware display, to relate communication partners, and to identify the type of network traffic occurring. The results of the analysis are helpful in understanding typical network communication activities, and in anticipating potential performance bottlenecks or problems. It is suited for both off-line analysis of historic data, and via animation for on-line monitoring of packet-based network traffic in real time", "fno": "04035756", "keywords": [ "Information Visualization", "Network Traffic Monitoring", "Radial Traffic Analyzer", "Internet", "Intranet", "Scalable Visualization Toolkit", "Network Packet Volume", "Network Type Distribution Information", "Geographic Distortion Technique", "Histo Map Technique" ], "authors": [ { "affiliation": "Databases, Data Min.&Visualization Group, Konstanz Univ.", "fullName": "D.A. Keim", "givenName": "D.A.", "surname": "Keim", "__typename": "ArticleAuthorType" }, { "affiliation": "Databases, Data Min.&Visualization Group, Konstanz Univ.", "fullName": "F. Mansmann", "givenName": "F.", "surname": "Mansmann", "__typename": "ArticleAuthorType" }, { "affiliation": "Databases, Data Min.&Visualization Group, Konstanz Univ.", "fullName": "J. Schneidewind", "givenName": "J.", "surname": "Schneidewind", "__typename": "ArticleAuthorType" }, { "affiliation": "Databases, Data Min.&Visualization Group, Konstanz Univ.", "fullName": "T. Schreck", "givenName": "T.", "surname": "Schreck", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "123-128", "year": "2006", "issn": null, "isbn": "1-4244-0591-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04035755", "articleId": "12OmNzn38Ji", "__typename": "AdjacentArticleType" }, "next": { "fno": "04035757", "articleId": "12OmNqAU6pq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/lcn/2012/1565/0/06423680", "title": "Monitoring Traffic Activity Graphs with low-rank matrix approximation", "doi": null, "abstractUrl": "/proceedings-article/lcn/2012/06423680/12OmNAoDhRW", "parentPublication": { "id": "proceedings/lcn/2012/1565/0", "title": "37th Annual IEEE Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2010/4016/0/4016a482", "title": "Case Study: Visualization Methodology for Analysing Network Data", "doi": null, "abstractUrl": "/proceedings-article/uksim/2010/4016a482/12OmNBdJ5j0", "parentPublication": { "id": "proceedings/uksim/2010/4016/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsn/2010/3961/0/3961a313", "title": "Network Traffic Analysis and Intrusion Detection Using Packet Sniffer", "doi": null, "abstractUrl": "/proceedings-article/iccsn/2010/3961a313/12OmNCctfhl", "parentPublication": { "id": "proceedings/iccsn/2010/3961/0", "title": "Communication Software and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/1/3322a450", "title": "Implementation of a Multi-Hop Vehicular Network Analyzer", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322a450/12OmNrIJqvA", "parentPublication": { "id": "proceedings/ncm/2008/3322/1", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2005/9477/0/01532065", "title": "Preserving the big picture: visual network traffic analysis with TNV", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2005/01532065/12OmNrkBwoK", "parentPublication": { "id": "proceedings/vizsec/2005/9477/0", "title": "IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ems/2009/3886/0/3886a445", "title": "Study on Advanced Visualization Tools In Network Monitoring Platform", "doi": null, "abstractUrl": "/proceedings-article/ems/2009/3886a445/12OmNscOUdD", "parentPublication": { "id": "proceedings/ems/2009/3886/0", "title": "Computer Modeling and Simulation, UKSIM European Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/1999/0250/0/02500442", "title": "NOMAD: Traffic-based Network Monitoring Framework for Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/iscc/1999/02500442/12OmNx7G68L", "parentPublication": { "id": "proceedings/iscc/1999/0250/0", "title": "Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2009/3858/0/05368793", "title": "Netpy: Advanced Network Traffic Monitoring", "doi": null, "abstractUrl": "/proceedings-article/incos/2009/05368793/12OmNxGALhw", "parentPublication": { "id": "proceedings/incos/2009/3858/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a845", "title": "The Study and Design of Network Traffic Monitoring Based on Socket", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a845/12OmNxWuizi", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainaw/2008/3096/0/3096a056", "title": "Monitoring Network Traffic to Detect Stepping-Stone Intrusion", "doi": null, "abstractUrl": "/proceedings-article/ainaw/2008/3096a056/12OmNylsZMu", "parentPublication": { "id": "proceedings/ainaw/2008/3096/0", "title": "2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBUAvUQ", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "18M76LncjTO", "doi": "10.1109/INFVIS.2003.1249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "normalizedTitle": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "abstract": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large number of dimensions not only cause clutter in multi-dimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension management, such as dimension ordering, spacing and filtering, is critical for visual exploration of such datasets. Dimension ordering and spacing explicitly reveal dimension relationships in arrangement-sensitive multidimensional visualization techniques, such as parallel coordinates, star glyphs, and pixel-oriented techniques. They facilitate the visual discovery of patterns within the data. Dimension filtering hides some of the dimensions to reduce clutter while preserving the major information of the dataset. In this paper, we propose an interactive hierarchical dimension ordering, spacing and filtering approach, called DOSFA. DOSFA is based on dimension hierarchies derived from similarities among dimensions. It is scalable multi-resolution approach making dimensional management a tractable task. On the one hand, it automatically generates default settings for dimension ordering, spacing and filtering. On the other hand, it allows users to efficiently control all aspects of this dimension management process via visual interaction tools for dimension hierarchy manipulation. A case study visualizing a dataset containing over 200 dimensions reveals high dimensional visualization techniques.", "fno": "01249015", "keywords": [ "Data Mining", "Data Visualisation", "Graphical User Interfaces", "Pattern Clustering", "Multidimensional Visualization", "Dimension Ordering", "Interactive Hierarchical Dimensions", "High Dimensional Datasets", "Dimension Hierarchy Manipulation", "Visual Interaction Tools", "Dimensional Management", "Dimension Hierarchies", "DOSFA", "Pixel Oriented Techniques", "Star Glyphs", "Parallel Coordinates", "Visual Exploration", "Dimension Filtering", "Dimension Spacing", "Dimension Management", "Data Space Navigation", "Multidimensional Visualizations", "High Dimensional Dataset Exploration", "Multidimensional Systems", "Data Visualization", "Face Detection", "Displays", "Navigation", "Information Filtering", "Information Filters", "Visual Databases", "Stacking", "Computer Science" ], "authors": [ { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "Jing Yang", "givenName": null, "surname": "Jing Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "Wei Peng", "givenName": null, "surname": "Wei Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "M.O. Ward", "givenName": "M.O.", "surname": "Ward", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of comuter Sci., Worcester Polytech. Inst., MA, USA", "fullName": "E.A. Rundensteiner", "givenName": "E.A.", "surname": "Rundensteiner", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "105-112", "year": "2003", "issn": null, "isbn": "0-7803-8154-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01249002", "articleId": "12OmNy50ggl", "__typename": "AdjacentArticleType" }, "next": { "fno": "20550001", "articleId": "12OmNCcKQuf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2007/0802/0/04221741", "title": "MultiMap: Preserving disk locality for multidimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221741/12OmNAle6lf", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/20550014", "title": "Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550014/12OmNBCHMIt", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790089", "title": "Clutter Reduction in Multi-Dimensional Data Visualization Using Dimension Reordering", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790089/12OmNs5rkRK", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2003/8154/0/01249015", "title": "Interactive hierarchical dimension ordering, spacing and filtering for exploration of high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/infvis/2003/01249015/12OmNviHK7T", "parentPublication": { "id": "proceedings/infvis/2003/8154/0", "title": "IEEE Symposium on Information Visualization 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2006/2701/0/270100330", "title": "Dimension Reduction for Supervised Ordering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2006/270100330/12OmNvqW6VT", "parentPublication": { "id": "proceedings/icdm/2006/2701/0", "title": "Sixth International Conference on Data Mining (ICDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122625", "title": "Dimension Projection Matrix/Tree: Interactive Subspace Visual Exploration and Analysis of High Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122625/13rRUx0xPi9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/02/ttg2010020192", "title": "Cross-Filtered Views for Multidimensional Visual Analysis", "doi": null, "abstractUrl": "/journal/tg/2010/02/ttg2010020192/13rRUxBa5bO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534787", "title": "Visualizing Dimension Coverage to Support Exploratory Analysis", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534787/13rRUxcsYLV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/03/v0494", "title": "Value and Relation Display: Interactive Visual Exploration of Large Data Sets with Hundreds of Dimensions", "doi": null, "abstractUrl": "/journal/tg/2007/03/v0494/13rRUyYSWsK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2019/2128/0/212800a001", "title": "Bacterial Foraging Optimization Algorithm with Dimension by Dimension Improvement", "doi": null, "abstractUrl": "/proceedings-article/iccia/2019/212800a001/1f8MG6Noefm", "parentPublication": { "id": "proceedings/iccia/2019/2128/0", "title": "2019 4th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1y4oEtZzwCQ", "title": "2021 25th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1y4oENGqh4k", "doi": "10.1109/IV53921.2021.00018", "title": "ExTraVis: Exploration of Traffic Incidents Using a Visual Interactive System", "normalizedTitle": "ExTraVis: Exploration of Traffic Incidents Using a Visual Interactive System", "abstract": "The impact of road traffic incidents (e.g., road accidents, vehicle breakdowns) have become progressively worse over the years, being a major cause of many adverse issues such as serious injury, economic loss, and lifelong disabilities. Thus, it is essential to acknowledge these issues and proactively construct appropriate solutions to mitigate the impact of these issues in the future. This study outlines the history of traffic incident research and covers several solutions such as machine learning, mathematical modeling, and visualization system to traffic incident analysis. In this paper, we design a unique visualization system, ExTraVis, for incident data exploration and analysis that can be used to help traffic management controllers, aid to make decisions, and help them to understand how past incidents affected and where incidents may occur. The key features of this system are visual exploration and analysis to overcome the problems linked with road traffic incidents and to encourage future work and improvements. Additionally, we gather various custom queries for free text search feature. We find that people ask questions and our system provide 90&#x0025; correct visual insights. Finally, we demonstrate the effectiveness and robustness of ExTraVis by comparing with three different incident visualization dashboards and a user study.", "abstracts": [ { "abstractType": "Regular", "content": "The impact of road traffic incidents (e.g., road accidents, vehicle breakdowns) have become progressively worse over the years, being a major cause of many adverse issues such as serious injury, economic loss, and lifelong disabilities. Thus, it is essential to acknowledge these issues and proactively construct appropriate solutions to mitigate the impact of these issues in the future. This study outlines the history of traffic incident research and covers several solutions such as machine learning, mathematical modeling, and visualization system to traffic incident analysis. In this paper, we design a unique visualization system, ExTraVis, for incident data exploration and analysis that can be used to help traffic management controllers, aid to make decisions, and help them to understand how past incidents affected and where incidents may occur. The key features of this system are visual exploration and analysis to overcome the problems linked with road traffic incidents and to encourage future work and improvements. Additionally, we gather various custom queries for free text search feature. We find that people ask questions and our system provide 90&#x0025; correct visual insights. Finally, we demonstrate the effectiveness and robustness of ExTraVis by comparing with three different incident visualization dashboards and a user study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The impact of road traffic incidents (e.g., road accidents, vehicle breakdowns) have become progressively worse over the years, being a major cause of many adverse issues such as serious injury, economic loss, and lifelong disabilities. Thus, it is essential to acknowledge these issues and proactively construct appropriate solutions to mitigate the impact of these issues in the future. This study outlines the history of traffic incident research and covers several solutions such as machine learning, mathematical modeling, and visualization system to traffic incident analysis. In this paper, we design a unique visualization system, ExTraVis, for incident data exploration and analysis that can be used to help traffic management controllers, aid to make decisions, and help them to understand how past incidents affected and where incidents may occur. The key features of this system are visual exploration and analysis to overcome the problems linked with road traffic incidents and to encourage future work and improvements. Additionally, we gather various custom queries for free text search feature. We find that people ask questions and our system provide 90% correct visual insights. Finally, we demonstrate the effectiveness and robustness of ExTraVis by comparing with three different incident visualization dashboards and a user study.", "fno": "382700a048", "keywords": [ "Data Visualisation", "Injuries", "Interactive Systems", "Road Accidents", "Road Safety", "Road Traffic", "Traffic Engineering Computing", "Visual Exploration", "Road Traffic Incidents", "Ex Tra Vis", "Visual Interactive System", "Road Accidents", "Traffic Incident Research", "Traffic Incident Analysis", "Unique Visualization System", "Incident Data Exploration", "Traffic Management Controllers", "Incident Visualization Dashboards", "Visualization", "Road Accidents", "Roads", "Interactive Systems", "Data Visualization", "Machine Learning", "Robustness", "Traffic Incidents", "Interactive System", "Visualization", "Information System" ], "authors": [ { "affiliation": "Advanced Analytics Institute (AAi), University of Technology Sydney,NSW,Australia", "fullName": "Joshua Zerafa", "givenName": "Joshua", "surname": "Zerafa", "__typename": "ArticleAuthorType" }, { "affiliation": "Advanced Analytics Institute (AAi), University of Technology Sydney,NSW,Australia", "fullName": "Md Rafiqul Islam", "givenName": "Md Rafiqul", "surname": "Islam", "__typename": "ArticleAuthorType" }, { "affiliation": "Charles Sturt University,School of Computing and Mathematics,NSW,Australia", "fullName": "Muhammad Ashad Kabir", "givenName": "Muhammad Ashad", "surname": "Kabir", "__typename": "ArticleAuthorType" }, { "affiliation": "Advanced Analytics Institute (AAi), University of Technology Sydney,NSW,Australia", "fullName": "Guandong Xu", "givenName": "Guandong", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "48-53", "year": "2021", "issn": null, "isbn": "978-1-6654-3827-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "382700a042", "articleId": "1y4oJs8zdja", "__typename": "AdjacentArticleType" }, "next": { "fno": "382700a054", "articleId": "1y4oI1vKfmg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2014/2874/0/2874a316", "title": "Traffic Origins: A Simple Visualization Technique to Support Traffic Incident Analysis", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a316/12OmNy2agUV", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a587", "title": "Forecasting Spatiotemporal Impact of Traffic Incidents on Road Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a587/12OmNz2C1rl", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn-workshops/2014/3784/0/06927724", "title": "A SUMO based evaluation of road incidents' impact on traffic congestion level in smart cities", "doi": null, "abstractUrl": "/proceedings-article/lcn-workshops/2014/06927724/12OmNzA6GPi", "parentPublication": { "id": "proceedings/lcn-workshops/2014/3784/0", "title": "2014 IEEE 39th Conference on Local Computer Networks Workshops (LCN Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572632", "title": "AVRA Bangladesh collection, analysis & visualization of road accident data in Bangladesh", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572632/12OmNzkMlOB", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328471", "title": "Real-Time Incident Clearance Time Prediction Using Traffic Data from Internet of Mobility Sensors", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328471/17D45Wda7fr", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09672030", "title": "A Hierarchical Attention Graph Convolutional Network for Traffic Incident Impact Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09672030/1A8hd1kQPgk", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/conisoft/2022/6126/0/612600a112", "title": "Monitoring of traffic incidents in real time for decision making in road infrastructures", "doi": null, "abstractUrl": "/proceedings-article/conisoft/2022/612600a112/1LFLvegdSxi", "parentPublication": { "id": "proceedings/conisoft/2022/6126/0", "title": "2022 10th International Conference in Software Engineering Research and Innovation (CONISOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400a510", "title": "A Decade Bibliometric Review of Road Traffic Accidents and Incidents: A Computational Perspective", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400a510/1jdDVmPGNTa", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2020/4716/0/09156157", "title": "Smartphone-based Risky Traffic Situation Detection and Classification", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2020/09156157/1m1jxtQcHKM", "parentPublication": { "id": "proceedings/percom-workshops/2020/4716/0", "title": "2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900b080", "title": "Analysis of Urban Traffic Incidents Through Road Network Features", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900b080/1t7n2Rdahsk", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCykm7k", "title": "2007 IEEE International Conference on Network Protocols", "acronym": "icnp", "groupId": "1000492", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNBiyguu", "doi": "10.1109/ICNP.2007.4375840", "title": "Inferring the Origin of Routing Changes using Link Weights", "normalizedTitle": "Inferring the Origin of Routing Changes using Link Weights", "abstract": "The global Internet routing infrastructure is a large and complex distributed system where routing changes occur constantly. Our objective in this paper is to develop a simple and effective inference solution that can identify the AS or inter-AS link failures that trigger large scale routing changes in near realtime. We achieve this goal through a novel approach based on link weights. We measure the weight of each inter-AS link by the number of routes carried over that link, and keep track of its expected value and variance. We then correlate the weight changes of adjacent links and use a min-cut heuristic to find candidates for the origin of change. This work makes three contributions. First, we keep track of link weights rather than the routes of individual prefixes and thus our analysis is based on an aggregate view. Second, we use expected value and mean deviation of the link weights to identify routing events and distinguish route changes caused by failures from those by recoveries. Finally we use a min-cut heuristic based on the classification of routing events to accurately identify the AS or inter-AS link most likely responsible for the observed route changes. We verified our design using BGP data collected from operational Internet. Our efficient and accurate routing diagnosis solution can greatly help us gain better understanding of the dynamics in the operational Internet.", "abstracts": [ { "abstractType": "Regular", "content": "The global Internet routing infrastructure is a large and complex distributed system where routing changes occur constantly. Our objective in this paper is to develop a simple and effective inference solution that can identify the AS or inter-AS link failures that trigger large scale routing changes in near realtime. We achieve this goal through a novel approach based on link weights. We measure the weight of each inter-AS link by the number of routes carried over that link, and keep track of its expected value and variance. We then correlate the weight changes of adjacent links and use a min-cut heuristic to find candidates for the origin of change. This work makes three contributions. First, we keep track of link weights rather than the routes of individual prefixes and thus our analysis is based on an aggregate view. Second, we use expected value and mean deviation of the link weights to identify routing events and distinguish route changes caused by failures from those by recoveries. Finally we use a min-cut heuristic based on the classification of routing events to accurately identify the AS or inter-AS link most likely responsible for the observed route changes. We verified our design using BGP data collected from operational Internet. Our efficient and accurate routing diagnosis solution can greatly help us gain better understanding of the dynamics in the operational Internet.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The global Internet routing infrastructure is a large and complex distributed system where routing changes occur constantly. Our objective in this paper is to develop a simple and effective inference solution that can identify the AS or inter-AS link failures that trigger large scale routing changes in near realtime. We achieve this goal through a novel approach based on link weights. We measure the weight of each inter-AS link by the number of routes carried over that link, and keep track of its expected value and variance. We then correlate the weight changes of adjacent links and use a min-cut heuristic to find candidates for the origin of change. This work makes three contributions. First, we keep track of link weights rather than the routes of individual prefixes and thus our analysis is based on an aggregate view. Second, we use expected value and mean deviation of the link weights to identify routing events and distinguish route changes caused by failures from those by recoveries. Finally we use a min-cut heuristic based on the classification of routing events to accurately identify the AS or inter-AS link most likely responsible for the observed route changes. We verified our design using BGP data collected from operational Internet. Our efficient and accurate routing diagnosis solution can greatly help us gain better understanding of the dynamics in the operational Internet.", "fno": "04375840", "keywords": [], "authors": [ { "affiliation": "Computer Science Department, University of California, Los Angeles CA 90095. Email: mohit@cs.ucla.edu", "fullName": "Mohit Lad", "givenName": "Mohit", "surname": "Lad", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, University of California, Los Angeles CA 90095. Email: rveloso@cs.ucla.edu", "fullName": "Ricardo Oliveira", "givenName": "Ricardo", "surname": "Oliveira", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, Colorado State University, Fort Collins, CO 80523. Email: massey@cs.colostate.edu", "fullName": "Dan Massey", "givenName": "Dan", "surname": "Massey", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, University of California, Los Angeles CA 90095. Email: lixia@cs.ucla.edu", "fullName": "Lixia Zhang", "givenName": "Lixia", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "93-102", "year": "2007", "issn": null, "isbn": "978-1-4244-1587-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04375839", "articleId": "12OmNwHhoUm", "__typename": "AdjacentArticleType" }, "next": { "fno": "04375856", "articleId": "12OmNzmclW1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscc/2006/2588/0/258800994", "title": "Choosing Weights for IP Network Dimensioning Optimization", "doi": null, "abstractUrl": "/proceedings-article/iscc/2006/258800994/12OmNAmVH5O", "parentPublication": { "id": "proceedings/iscc/2006/2588/0", "title": "11th IEEE Symposium on Computers and Communications (ISCC'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/2003/7752/2/01208978", "title": "The impact of correlated link weights on QoS routing", "doi": null, "abstractUrl": "/proceedings-article/infcom/2003/01208978/12OmNB9t6sY", "parentPublication": { "id": "proceedings/infcom/2003/7752/2", "title": "IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2013/1270/0/06733585", "title": "Optimal link-state hop-by-hop routing", "doi": null, "abstractUrl": "/proceedings-article/icnp/2013/06733585/12OmNCfSqIn", "parentPublication": { "id": "proceedings/icnp/2013/1270/0", "title": "2013 21st IEEE International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/2003/7752/1/01208692", "title": "An approach to alleviate link overload as observed on an IP backbone", "doi": null, "abstractUrl": "/proceedings-article/infcom/2003/01208692/12OmNvrMUgX", "parentPublication": { "id": "proceedings/infcom/2003/7752/1", "title": "IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccn/1999/5794/0/00805542", "title": "Local restoration algorithm for link-state routing protocols", "doi": null, "abstractUrl": "/proceedings-article/icccn/1999/00805542/12OmNxFJXPH", "parentPublication": { "id": "proceedings/icccn/1999/5794/0", "title": "Proceedings of IC3N'99: Eighth International Conference on Computer Communications and Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2007/1520/0/04381503", "title": "On the setting of QoS link weights to provide per-flow QoS guarantees", "doi": null, "abstractUrl": "/proceedings-article/iscc/2007/04381503/12OmNzahcj6", "parentPublication": { "id": "proceedings/iscc/2007/1520/0", "title": "2007 12th IEEE Symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2010/7754/0/05546520", "title": "Link weight optimization for enhancing IP resilience using multi-plane routing", "doi": null, "abstractUrl": "/proceedings-article/iscc/2010/05546520/12OmNzw8j6C", "parentPublication": { "id": "proceedings/iscc/2010/7754/0", "title": "The IEEE symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2011/06/05743044", "title": "Link-state routing with hop-by-hop forwarding can achieve optimal traffic engineering", "doi": null, "abstractUrl": "/journal/nt/2011/06/05743044/13rRUIM2VEb", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1450", "title": "Visualizing Internet Routing Changes", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1450/13rRUwbs20M", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2009/03/04694005", "title": "Optimal link weights for IP-based networks supporting hose-model VPNs", "doi": null, "abstractUrl": "/journal/nt/2009/03/04694005/13rRUygBweW", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVt", "title": "Proceedings of INFOCOM '94 Conference on Computer Communications", "acronym": "infcom", "groupId": "1000359", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNBr4eIN", "doi": "10.1109/INFCOM.1994.337590", "title": "Area-based, loop-free internet routing", "normalizedTitle": "Area-based, loop-free internet routing", "abstract": "The diffusing update algorithms (DUAL) constitute a family of distributed routing algorithms that has been shown to be loop-free at every instant, to converge after an arbitrary sequence of link-cost or topological changes, and to outperform all other loop-free routing algorithms previously proposed from the standpoint of the combined temporal, message, and storage complexities. Two hierarchical routing schemes based on DUAL are presented to make it more applicable to very large internets. A scheme based on McQuillan's (1974, 1980) hierarchical routing scheme and a backbone-oriented scheme, similar to the one used in OSPF, are introduced to reduce the amount of routing information maintained at each router. The performance of these schemes is compared by simulation to the performance of the basic DUAL, an ideal routing algorithm based on topology broadcast, and OSPF. The simulation results suggest that DUAL with areas outperforms OSPF, and provide additional insight on the performance of OSPF, EIGRP, and area-based routing algorithms in general.<>", "abstracts": [ { "abstractType": "Regular", "content": "The diffusing update algorithms (DUAL) constitute a family of distributed routing algorithms that has been shown to be loop-free at every instant, to converge after an arbitrary sequence of link-cost or topological changes, and to outperform all other loop-free routing algorithms previously proposed from the standpoint of the combined temporal, message, and storage complexities. Two hierarchical routing schemes based on DUAL are presented to make it more applicable to very large internets. A scheme based on McQuillan's (1974, 1980) hierarchical routing scheme and a backbone-oriented scheme, similar to the one used in OSPF, are introduced to reduce the amount of routing information maintained at each router. The performance of these schemes is compared by simulation to the performance of the basic DUAL, an ideal routing algorithm based on topology broadcast, and OSPF. The simulation results suggest that DUAL with areas outperforms OSPF, and provide additional insight on the performance of OSPF, EIGRP, and area-based routing algorithms in general.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The diffusing update algorithms (DUAL) constitute a family of distributed routing algorithms that has been shown to be loop-free at every instant, to converge after an arbitrary sequence of link-cost or topological changes, and to outperform all other loop-free routing algorithms previously proposed from the standpoint of the combined temporal, message, and storage complexities. Two hierarchical routing schemes based on DUAL are presented to make it more applicable to very large internets. A scheme based on McQuillan's (1974, 1980) hierarchical routing scheme and a backbone-oriented scheme, similar to the one used in OSPF, are introduced to reduce the amount of routing information maintained at each router. The performance of these schemes is compared by simulation to the performance of the basic DUAL, an ideal routing algorithm based on topology broadcast, and OSPF. The simulation results suggest that DUAL with areas outperforms OSPF, and provide additional insight on the performance of OSPF, EIGRP, and area-based routing algorithms in general.", "fno": "00337590", "keywords": [ "Computer Networks", "Performance Evaluation", "Network Topology", "Telecommunication Network Routing", "Internetworking", "Loop Free Internet Routing", "Diffusing Update Algorithms", "Distributed Routing Algorithms", "Link Cost", "Loop Free Routing Algorithms", "Storage Complexity", "Temporal Complexity", "Message Complexity", "Hierarchical Routing", "Internets", "Backbone Oriented Scheme", "OSPF", "Routing Information", "Simulation", "Performance", "Topology Broadcast", "EIGRP", "Area Based Routing Algorithms", "Internet", "Routing", "Contracts", "Broadcasting", "Proposals", "Computer Networks", "Network Topology", "Information Systems", "Delay Effects", "Costs" ], "authors": [ { "affiliation": "California Univ., Santa Cruz, CA, USA", "fullName": "J.J. Garcia-Luna-Aceves", "givenName": "J.J.", "surname": "Garcia-Luna-Aceves", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "W.T. Zaumen", "givenName": "W.T.", "surname": "Zaumen", "__typename": "ArticleAuthorType" } ], "idPrefix": "infcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "1000,1001,1002,1003,1004,1005,1006,1007,1008", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00337589", "articleId": "12OmNzZWbOs", "__typename": "AdjacentArticleType" }, "next": { "fno": "00337591", "articleId": "12OmNrJAecj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infcom/1998/4383/2/00665092", "title": "Hierarchical routing using link vectors", "doi": null, "abstractUrl": "/proceedings-article/infcom/1998/00665092/12OmNBJeyIB", "parentPublication": { "id": "proceedings/infcom/1998/4383/2", "title": "Proceedings IEEE INFOCOM'98 Conference on Computer Communications Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies Gateway to the 21st Century", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2006/0500/0/04117864", "title": "Simulation-Based Routing Protocol Performance Analysis - A Case Study", "doi": null, "abstractUrl": "/proceedings-article/wsc/2006/04117864/12OmNCm7Bx1", "parentPublication": { "id": "proceedings/wsc/2006/0500/0", "title": "2006 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ici/2011/4618/0/4618a355", "title": "Performance Analysis of Dynamic Routing Protocol EIGRP and OSPF in IPv4 and IPv6 Network", "doi": null, "abstractUrl": "/proceedings-article/ici/2011/4618a355/12OmNwE9Ozt", "parentPublication": { "id": "proceedings/ici/2011/4618/0", "title": "Informatics and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icns/2010/3969/0/3969a340", "title": "Easy-EIGRP: A Didactic Application for Teaching and Learning of the Enhanced Interior Gateway Routing Protocol", "doi": null, "abstractUrl": "/proceedings-article/icns/2010/3969a340/12OmNwg1UgB", "parentPublication": { "id": "proceedings/icns/2010/3969/0", "title": "2010 Sixth International Conference on Networking and Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnt/2010/4042/0/4042a191", "title": "Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler", "doi": null, "abstractUrl": "/proceedings-article/iccnt/2010/4042a191/12OmNxTVTYf", "parentPublication": { "id": "proceedings/iccnt/2010/4042/0", "title": "Computer and Network Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infocom/1997/7780/0/77800101", "title": "Loop-Free Internet Routing Using Hierarchical Routing Trees", "doi": null, "abstractUrl": "/proceedings-article/infocom/1997/77800101/12OmNzC5Thf", "parentPublication": { "id": "proceedings/infocom/1997/7780/0", "title": "IEEE Computer and Communications Societies, Annual Joint Conference of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infocom/1995/6990/3/69901197", "title": "A loop-free path-finding algorithm: specification, verification and complexity", "doi": null, "abstractUrl": "/proceedings-article/infocom/1995/69901197/12OmNzcPADy", "parentPublication": { "id": "proceedings/infocom/1995/6990/3", "title": "IEEE Computer and Communications Societies, Annual Joint Conference of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscs/2017/1839/0/07968589", "title": "A New Approach to Improve Performance of Routing Protocols for Voice, Video Conferencing and FTP Services", "doi": null, "abstractUrl": "/proceedings-article/cscs/2017/07968589/12OmNzmtWvt", "parentPublication": { "id": "proceedings/cscs/2017/1839/0", "title": "2017 21st International Conference on Control Systems and Computer Science (CSCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/1997/01/00554729", "title": "A path-finding algorithm for loop-free routing", "doi": null, "abstractUrl": "/journal/nt/1997/01/00554729/13rRUxAStXL", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/1993/01/00222913", "title": "Loop-free routing using diffusing computations", "doi": null, "abstractUrl": "/journal/nt/1993/01/00222913/13rRUxjQyrY", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvRU0lX", "title": "2009 17th IEEE International Conference on Network Protocols", "acronym": "icnp", "groupId": "1000492", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwogh3F", "doi": "10.1109/ICNP.2009.5339682", "title": "Multipath load-adaptive routing: putting the emphasis on robustness and simplicity", "normalizedTitle": "Multipath load-adaptive routing: putting the emphasis on robustness and simplicity", "abstract": "We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed method load-balances traffic over several routes in an adaptive way based on its local view of the load in the network. The focus is on robustness and simplicity, rather than optimality, and so it does not rely on a given traffic matrix, nor it is tuned to a specific topology. Instead, we aim to achieve a satisfactory routing under a wide range of traffic and topology scenarios based on each node's independent operation. The scheme avoids the instability risks of previous load-responsive routing schemes, it does not load the control plane with congestion-related signaling, and it can be implemented on top of existing routing protocols. In this paper, we present the proposed scheme, discuss how it aims to meet the objectives of robustness and load-responsiveness, and evaluate its performance under diverse traffic loads and topological changes with flow-level simulations.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed method load-balances traffic over several routes in an adaptive way based on its local view of the load in the network. The focus is on robustness and simplicity, rather than optimality, and so it does not rely on a given traffic matrix, nor it is tuned to a specific topology. Instead, we aim to achieve a satisfactory routing under a wide range of traffic and topology scenarios based on each node's independent operation. The scheme avoids the instability risks of previous load-responsive routing schemes, it does not load the control plane with congestion-related signaling, and it can be implemented on top of existing routing protocols. In this paper, we present the proposed scheme, discuss how it aims to meet the objectives of robustness and load-responsiveness, and evaluate its performance under diverse traffic loads and topological changes with flow-level simulations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a routing and load-balancing approach with the primary goal of being robust to sudden topological changes and significant traffic matrix variations. The proposed method load-balances traffic over several routes in an adaptive way based on its local view of the load in the network. The focus is on robustness and simplicity, rather than optimality, and so it does not rely on a given traffic matrix, nor it is tuned to a specific topology. Instead, we aim to achieve a satisfactory routing under a wide range of traffic and topology scenarios based on each node's independent operation. The scheme avoids the instability risks of previous load-responsive routing schemes, it does not load the control plane with congestion-related signaling, and it can be implemented on top of existing routing protocols. In this paper, we present the proposed scheme, discuss how it aims to meet the objectives of robustness and load-responsiveness, and evaluate its performance under diverse traffic loads and topological changes with flow-level simulations.", "fno": "05339682", "keywords": [ "Telecommunication Traffic", "Telecommunication Network Routing", "Telecommunication Network Topology", "Flow Level Simulations", "Multipath Load Adaptive Routing", "Traffic Matrix Variations", "Congestion Related Signaling", "Load Responsiveness", "Robustness", "Telecommunication Traffic", "Load Management", "Routing Protocols", "Communication System Traffic Control", "Tellurium", "Delay", "Robust Stability", "Network Topology", "Costs" ], "authors": [], "idPrefix": "icnp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-10-01T00:00:00", "pubType": "proceedings", "pages": "203-212", "year": "2009", "issn": "1092-1648", "isbn": "978-1-4244-4635-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05339681", "articleId": "12OmNzlUKnS", "__typename": "AdjacentArticleType" }, "next": { "fno": "05339683", "articleId": "12OmNwqx4b6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsd/2011/1048/0/06037391", "title": "A Cost Effective Centralized Adaptive Routing for Networks-on-Chip", "doi": null, "abstractUrl": "/proceedings-article/dsd/2011/06037391/12OmNAYXWE8", "parentPublication": { "id": "proceedings/dsd/2011/1048/0", "title": "2011 14th Euromicro Conference on Digital System Design. Architectures, Methods and Tools. (DSD 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/npc/2008/3354/0/3354a296", "title": "MP-MAODV: A MAODV-Based Multipath Routing Algorithm", "doi": null, "abstractUrl": "/proceedings-article/npc/2008/3354a296/12OmNBVrji8", "parentPublication": { "id": "proceedings/npc/2008/3354/0", "title": "Network and Parallel Computing Workshops, IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgec/2011/4449/0/4449a303", "title": "Efficient Traffic Aware Multipath Routing Algorithm in Cognitive Networks", "doi": null, "abstractUrl": "/proceedings-article/icgec/2011/4449a303/12OmNqN6QY6", "parentPublication": { "id": "proceedings/icgec/2011/4449/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/2002/7476/2/01019317", "title": "A new class of QoS routing strategies based on network graph reduction", "doi": null, "abstractUrl": "/proceedings-article/infcom/2002/01019317/12OmNy3AgxP", "parentPublication": { "id": "proceedings/infcom/2002/7476/2", "title": "Proceedings of IEEE Information Communications Conference (INFOCOM 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2014/6204/0/6204a143", "title": "Multipath Routing from a Traffic Engineering Perspective: How Beneficial Is It?", "doi": null, "abstractUrl": "/proceedings-article/icnp/2014/6204a143/12OmNzC5T5F", "parentPublication": { "id": "proceedings/icnp/2014/6204/0", "title": "2014 IEEE 22nd International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2007/2909/2/290920546", "title": "LSMR:A Label Switching Multipath Routing Protocol for Ad Hoc Networks", "doi": null, "abstractUrl": "/proceedings-article/snpd/2007/290920546/12OmNzV70lN", "parentPublication": { "id": "proceedings/snpd/2007/2909/2", "title": "Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2007/02/04154742", "title": "Multipath routing algorithms for congestion minimization", "doi": null, "abstractUrl": "/journal/nt/2007/02/04154742/13rRUxC0St3", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2013/10/ttd2013102109", "title": "Topology-Aware Adaptive Routing for Nonstationary Irregular Mesh in Throttled 3D NoC Systems", "doi": null, "abstractUrl": "/journal/td/2013/10/ttd2013102109/13rRUxNW1TF", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2010/02/lca2010020057", "title": "Centralized Adaptive Routing for NoCs", "doi": null, "abstractUrl": "/journal/ca/2010/02/lca2010020057/13rRUxlgxOQ", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmct/2022/7362/0/736200a036", "title": "Destruction-Resistant Routing Protocol Based on Topology Prediction and Backup Path", "doi": null, "abstractUrl": "/proceedings-article/icmct/2022/736200a036/1Ml2h2r4Y6c", "parentPublication": { "id": "proceedings/icmct/2022/7362/0", "title": "2022 7th International Conference on Multimedia Communication Technologies (ICMCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKk", "title": "2007 11th International Conference Information Visualization (IV '07)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNBSjJ0F", "doi": "10.1109/IV.2007.145", "title": "Working with patterns in large multivariate datasets - Karnaugh-Veitch-Maps revisited", "normalizedTitle": "Working with patterns in large multivariate datasets - Karnaugh-Veitch-Maps revisited", "abstract": "We present an interactive visualization method for the multivariate analysis of large and complex datasets, based on the layout of Karnaugh-Veitch-diagrams. Working on data categories, we additionally provide an interactive partitioning of value ranges of ordinal types. Multivariate dependencies manifest on the map in characteristic color patterns. These patterns are representations of subsets of the data or attributes which embody significant information. While the task of the user is to identify visual patterns of particular interest to him by clicking on the map, the software identifies a minimal representation of the corresponding subset and gives a visual feedback. Hence, user and machine cooperate on the basis of a strong visual coupling in short iterative cycles. During this process the trade-off between the accuracy and simplicity of a representation, which is crucial for any type of the building of analytical models, can be found in an effective way.", "abstracts": [ { "abstractType": "Regular", "content": "We present an interactive visualization method for the multivariate analysis of large and complex datasets, based on the layout of Karnaugh-Veitch-diagrams. Working on data categories, we additionally provide an interactive partitioning of value ranges of ordinal types. Multivariate dependencies manifest on the map in characteristic color patterns. These patterns are representations of subsets of the data or attributes which embody significant information. While the task of the user is to identify visual patterns of particular interest to him by clicking on the map, the software identifies a minimal representation of the corresponding subset and gives a visual feedback. Hence, user and machine cooperate on the basis of a strong visual coupling in short iterative cycles. During this process the trade-off between the accuracy and simplicity of a representation, which is crucial for any type of the building of analytical models, can be found in an effective way.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an interactive visualization method for the multivariate analysis of large and complex datasets, based on the layout of Karnaugh-Veitch-diagrams. Working on data categories, we additionally provide an interactive partitioning of value ranges of ordinal types. Multivariate dependencies manifest on the map in characteristic color patterns. These patterns are representations of subsets of the data or attributes which embody significant information. While the task of the user is to identify visual patterns of particular interest to him by clicking on the map, the software identifies a minimal representation of the corresponding subset and gives a visual feedback. Hence, user and machine cooperate on the basis of a strong visual coupling in short iterative cycles. During this process the trade-off between the accuracy and simplicity of a representation, which is crucial for any type of the building of analytical models, can be found in an effective way.", "fno": "29000277", "keywords": [], "authors": [ { "affiliation": "Fraunhofer Institute for Computer Graphics, Germany", "fullName": "Thorsten May", "givenName": "Thorsten", "surname": "May", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "277-285", "year": "2007", "issn": null, "isbn": "0-7695-2907-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29000271", "articleId": "12OmNBSSVqa", "__typename": "AdjacentArticleType" }, "next": { "fno": "29000286", "articleId": "12OmNwtEExj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2015/7568/0/7568a310", "title": "A Visualization Technique to Support Searching and Comparing Features of Multivariate Datasets", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a310/12OmNAObbGU", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400536", "title": "The spatiotemporal multivariate hypercube for discovery of patterns in event data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400536/12OmNvnOwsG", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1461", "title": "A Visualization System for Space-Time and Multivariate Patterns (VIS-STAMP)", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1461/13rRUwgQpDk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122518", "title": "Composite Density Maps for Multivariate Trajectories", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122518/13rRUwjXZSb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192673", "title": "Temporal MDS Plots for Analysis of Multivariate Data", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192673/13rRUx0gefm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539320", "title": "Decal-Maps: Real-Time Layering of Decals on Surfaces for Multivariate Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539320/13rRUx0gezV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/07911335", "title": "Indexed-Points Parallel Coordinates Visualization of Multivariate Correlations", "doi": null, "abstractUrl": "/journal/tg/2018/06/07911335/13rRUxly9e1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09956758", "title": "Multivariate Data Explanation by Jumping Emerging Patterns Visualization", "doi": null, "abstractUrl": "/journal/tg/5555/01/09956758/1Iu2JIUXLR6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/01/09064935", "title": "Karnaugh Map Method for Memristive and Spintronic Asymmetric Basis Logic Functions", "doi": null, "abstractUrl": "/journal/tc/2021/01/09064935/1iZGAi16osU", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2008/2935/0/04677368", "title": "Multivariate visual explanation for high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/vast/2008/04677368/1oFGMltTtFC", "parentPublication": { "id": "proceedings/vast/2008/2935/0", "title": "2008 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }